원문정보
초록
영어
In this paper, a secure method of transmitting perceptual hash is proposed based on error correcting codes (ECC) and digital watermarking, aiming at the fact that perceptual hash string used in audio authentication is easy to alter after been attacked in transmission and the need of extra channel. In this method we embed the binary perceptual hash values into the compressed audio as a digital watermark so that authentication data is dispersed. An ECC is used to pre-process perceptual hash sequence to ensure that speech signal with watermarking can be extracted watermarking information (the perceptual hash values) after been attacked. The experimental result illustrate that this method embeds information without influencing on the content. It is robust to noise and can prevent from common attack. At the same time, this method ensures the hearing transparency of audio perceptual content, the high efficiency of watermark extraction and the efficiency and security of algorithm.
목차
1. Introduction
2. Related Works
2.1. Digital Watermarking
2.2. Error Correcting Code (ECC)
2.3. Logistic Mapping
3. The Proposed Scheme
3.1. Algorithmic Process
3.2. Perceptual Hash Values Extraction and Secret Key
3.3. The Generation and the Embedding Process of Watermark
3.4. The Extraction and Matching of Watermark
4. Experimental Results and Analysis
4.1. Experimental Environment
4.2. Algorithmic Performance Analysis
4.3. Security Analysis of Algorithm
4.4. Security of Hash Transmission
4.5. Analysis of Auditory Perceptual
5. Conclusions
Acknowledgments
References
