دورية أكاديمية

A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform.

التفاصيل البيبلوغرافية
العنوان: A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform.
المؤلفون: Fan, Ming-Quan, Liu, Pei-Pei, Wang, Hong-Xia, Li, Heng-Jian
المصدر: International Journal of Computer Mathematics; Dec2013, Vol. 90 Issue 12, p2588-2602, 15p
مصطلحات موضوعية: DIGITAL watermarking, COMPUTER access control, WAVELET transforms, DISCRETE cosine transforms, DIGITAL signal processing, IMAGE converters
مستخلص: In this paper, a novel semi-fragile watermarking scheme for authenticating an audio signal based on dual-tree complex wavelet transform (DT-CWT) and discrete cosine transform (DCT) is proposed. Specifically, the watermark data are efficiently inserted into the coefficients of the low-frequency sub-band of DT-CWT taking advantages of both DCT and quantization index modulation (QIM). First, the original digital audio signal is segmented and then performed with DT-CWT. Second, based on the energy compression property, the low-frequency sub-band coefficients of the DT-CWT domain are performed with DCT, and the DC component is utilized to embed one distorted watermark bit by the QIM technique. Finally, inverse DCT and DT-CWT are orderly implemented on the watermarked coefficients of each audio segment to get a watermarked audio signal. Simulation results show that the hybrid embedding domain constructed by DT-CWT and DCT is effective, and the proposed watermarking scheme is not only inaudible, but also robust against content persistent non-malicious audio signal processing operations, such as MP3 compression, noise addition, re-sampling, re-quantization, etc. Furthermore, the proposed scheme can effectively authenticate the veracity and integrity of audio content and greatly expands the applicability of the audio watermarking scheme. [ABSTRACT FROM AUTHOR]
Copyright of International Journal of Computer Mathematics is the property of Taylor & Francis Ltd and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Complementary Index
الوصف
تدمد:00207160
DOI:10.1080/00207160.2013.805752