29 research outputs found

    Blind audio watermarking technique based on two dimensional cellular automata

    Full text link
    In this paper we propose a new method of digital audio watermarking based on two dimensional cellular automata; the method increases the dimension of the audio and uses cellular automata in generating the key of watermark embedding. The watermarking method is blind, and does not require the original host audio or any of its features to extract the watermark; the watermark can be easily extracted using the right key. The experimental results show that the watermarks are imperceptible; and show a high similarity between the original and the watermarked audio. Cosine similarity and peak signal-to-noise ratio were used to measure the similarity between the original audio and the watermarked audio

    An SVD-based audio watermarking technique

    Full text link

    A New DCT-Based Watermarking Method for Copyright Protection of Digital Audio

    Full text link

    Π¦ΠΈΡ„Ρ€ΠΎΠ²ΠΎΠ΅ ΠΌΠ°Ρ€ΠΊΠΈΡ€ΠΎΠ²Π°Π½ΠΈΠ΅ аудиосигналов для робастной скрытой акустичСской связи Ρ‡Π΅Ρ€Π΅Π· Π²ΠΎΠ·Π΄ΡƒΡˆΠ½Ρ‹ΠΉ Π°ΡƒΠ΄ΠΈΠΎΠΊΠ°Π½Π°Π»

    Get PDF
    The article presents a digital audio watermarking method for air audio data transmission. The digital watermark occupies the whole frequency range of the audio signal. The digital watermark encodes one bit of information. A decision about transmitted bit is based on a sign of the center value of the mutual correlation function. Two methods to design the digital audio watermark are presented. Low complexity of presented methods of digital audio watermarking makes them suitable for use in smartphones. The method can be used in digital audio watermarking of both speech and music. Information is embedded via the digital watermark in the frequency domain of a host audio signal via amplitude modulation of its frequency constituents. The paper includes results of simulation modeling and natural experiments.Π’ этой Ρ€Π°Π±ΠΎΡ‚Π΅ развиваСтся ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΈΠΊΠ° Ρ†ΠΈΡ„Ρ€ΠΎΠ²ΠΎΠ³ΠΎ маркирования аудиосигналов, ориСнтированная Π½Π° ΠΏΠ΅Ρ€Π΅Π΄Π°Ρ‡Ρƒ Π΄Π°Π½Π½Ρ‹Ρ… Ρ‡Π΅Ρ€Π΅Π· Π²ΠΎΠ·Π΄ΡƒΡˆΠ½Ρ‹ΠΉ Π°ΡƒΠ΄ΠΈΠΎΠΊΠ°Π½Π°Π». ВнСдряСмый Ρ†ΠΈΡ„Ρ€ΠΎΠ²ΠΎΠΉ ΠΌΠ°Ρ€ΠΊΠ΅Ρ€ Π·Π°Π½ΠΈΠΌΠ°Π΅Ρ‚ вСсь ΡΠ»Ρ‹ΡˆΠΈΠΌΡ‹ΠΉ частотный Π΄ΠΈΠ°ΠΏΠ°Π·ΠΎΠ½. Π¦ΠΈΡ„Ρ€ΠΎΠ²ΠΎΠΉ ΠΌΠ°Ρ€ΠΊΠ΅Ρ€ ΠΊΠΎΠ΄ΠΈΡ€ΡƒΠ΅Ρ‚ ΠΎΠ΄ΠΈΠ½ Π±ΠΈΡ‚ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ. РСшСниС ΠΎ Π·Π½Π°Ρ‡Π΅Π½ΠΈΠΈ ΠΏΠ΅Ρ€Π΅Π΄Π°Π½Π½ΠΎΠ³ΠΎ Π±ΠΈΡ‚Π° выносится Π½Π° основании Π·Π½Π°ΠΊΠ° Ρ†Π΅Π½Ρ‚Ρ€Π°Π»ΡŒΠ½ΠΎΠ³ΠΎ значСния Π²Π·Π°ΠΈΠΌΠ½ΠΎ-коррСляционной Ρ„ΡƒΠ½ΠΊΡ†ΠΈΠΈ. ΠŸΡ€Π΅Π΄Π»Π°Π³Π°ΡŽΡ‚ΡΡ Π΄Π²Π΅ ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΈΠΊΠΈ построСния Ρ†ΠΈΡ„Ρ€ΠΎΠ²ΠΎΠ³ΠΎ ΠΌΠ°Ρ€ΠΊΠ΅Ρ€Π°. ОбС ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΈΠΊΠΈ ΡΠΏΠ΅Ρ†ΠΈΠ°Π»ΡŒΠ½ΠΎ ΠΎΡ€ΠΈΠ΅Π½Ρ‚ΠΈΡ€ΠΎΠ²Π°Π½Ρ‹ Π½Π° частотныС свойства ΠΎΠ±Ρ‹Ρ‡Π½Ρ‹Ρ… аудиосигналов. НСвысокая Π²Ρ‹Ρ‡ΠΈΡΠ»ΠΈΡ‚Π΅Π»ΡŒΠ½Π°Ρ ΡΠ»ΠΎΠΆΠ½ΠΎΡΡ‚ΡŒ ΠΏΡ€Π΅Π΄Π»Π°Π³Π°Π΅ΠΌΠΎΠ³ΠΎ ΠΌΠ΅Ρ‚ΠΎΠ΄Π° маркирования позволяСт ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒ Π΅Π³ΠΎ для бСспроводного ΠΎΠ±ΠΌΠ΅Π½Π° ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠ΅ΠΉ ΠΌΠ΅ΠΆΠ΄Ρƒ ΠΎΠ±Ρ‹Ρ‡Π½Ρ‹ΠΌΠΈ смартфонами. ΠœΠ΅Ρ‚ΠΎΠ΄ΠΈΠΊΠ° позволяСт Π²Ρ‹ΠΏΠΎΠ»Π½ΡΡ‚ΡŒ Ρ†ΠΈΡ„Ρ€ΠΎΠ²ΠΎΠ΅ маркирования ΠΊΠ°ΠΊ Ρ€Π΅Ρ‡Π΅Π²Ρ‹Ρ…, Ρ‚Π°ΠΊ ΠΈ ΠΌΡƒΠ·Ρ‹ΠΊΠ°Π»ΡŒΠ½Ρ‹Ρ… аудиосигналов Π±Π΅Π· появлСния ΠΊΠ°ΠΊΠΈΡ…-Π»ΠΈΠ±ΠΎ Π·Π°ΠΌΠ΅Ρ‚Π½ΠΎ ΡΠ»Ρ‹ΡˆΠΈΠΌΡ‹Ρ… Π°Ρ€Ρ‚Π΅Ρ„Π°ΠΊΡ‚ΠΎΠ². Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΡ внСдряСтся Π² Π²ΠΈΠ΄Π΅ ΠΌΠ°Ρ€ΠΊΠ΅Ρ€Π° Π² Ρ‡Π°ΡΡ‚ΠΎΡ‚Π½ΡƒΡŽ ΠΎΠ±Π»Π°ΡΡ‚ΡŒ аудиосигнала ΠΏΡƒΡ‚Π΅ΠΌ Π°ΠΌΠΏΠ»ΠΈΡ‚ΡƒΠ΄Π½ΠΎΠΉ модуляции Π΅Π³ΠΎ частотных ΡΠΎΡΡ‚Π°Π²Π»ΡΡŽΡ‰ΠΈΡ…. Π­Ρ‚Π° Ρ€Π°Π±ΠΎΡ‚Π° снабТСна Ρ€Π΅Π·ΡƒΠ»ΡŒΡ‚Π°Ρ‚Π°ΠΌΠΈ ΠΈΠΌΠΈΡ‚Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠ³ΠΎ модСлирования ΠΈ Π½Π°Ρ‚ΡƒΡ€Π½Ρ‹Ρ… экспСримСнтов, ΠΏΠΎΠ΄Ρ‚Π²Π΅Ρ€ΠΆΠ΄Π°ΡŽΡ‰ΠΈΡ… ΠΏΡ€ΠΈΠΌΠ΅Π½ΠΈΠΌΠΎΡΡ‚ΡŒ ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΈΠΊΠΈ для скрытой ΠΏΠ΅Ρ€Π΅Π΄Π°Ρ‡ΠΈ Π΄Π°Π½Π½Ρ‹Ρ… Ρ‡Π΅Ρ€Π΅Π· Π²ΠΎΠ·Π΄ΡƒΡˆΠ½Ρ‹ΠΉ Π°ΡƒΠ΄ΠΈΠΎΠΊΠ°Π½Π°Π»

    Audio watermarking for monitoring and copy protection

    Full text link
    Based on existing technology used in image and video wa-termarking, we have developed a robust audio watermark-ing technique. The embedding algorithm operates in fre-quency domain, where the magnitudes of the Fourier co-efficients are slightly modified. In the temporal domain, an additional scale parameter and gain function are neces-sary to refine the watermark and achieve perceptual trans-parency. Watermark detection relies on the Symmetrical Phase Only Matched Filtering (SPOMF) cross-correlation approach. Not only the presence of a watermark, but also its cyclic shift is detected. This shift supports a multi-bit payload for one particular watermark sequence. The water-marking technology proved to be very robust o a large num-ber of signal processing "attacks " such as MP3 (64 kb/s), all-pass filtering, echo addition, time-scale modification, re-sampling, noise addition, etc. It is expected that this ap-proach may contribute in a wide variety of existing (e.g. monitoring and copy protection) and future applications

    Steganographic Methods in Information Protection

    Get PDF
    New information protection methods are necessary. Steganography seems to be great opportunity to replace or supplement the cryptographic methods. Steganography gives additional possibilities. It allows to keep in secret the communication fact and communicating sites personality. A lot of existing methods and the proposal of a new one are presented in the article.Нові ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΈ захисту Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–Ρ— Ρ” Π½Π΅ΠΎΠ±Ρ…Ρ–Π΄Π½ΠΈΠΌΠΈ. БтСнографія ΠΌΠΎΠΆΠ΅ Π·Π°ΠΌΡ–Π½ΠΈΡ‚ΠΈ Π°Π±ΠΎ Π΄ΠΎΠΏΠΎΠ²Π½ΠΈΡ‚ΠΈ ΠΊΡ€ΠΈΠΏΡ‚ΠΎΠ³Ρ€Π°Ρ„Ρ–Ρ‡Π½Ρ– ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΈ. Π’ΠΎΠ½Π° Π½Π°Π΄Π°Ρ” Π½ΠΎΠ²Ρ– Π΄ΠΎΠ΄Π°Ρ‚ΠΊΠΎΠ²Ρ– моТливості Ρ– дозволяє Π·Π±Π΅Ρ€Π΅Π³Ρ‚ΠΈ Π² сСкрСті Ρ„Π°ΠΊΡ‚ΠΈ ΠΊΠΎΠΌΡƒΠ½Ρ–ΠΊΠ°Ρ†Ρ–Ρ—, Π° Ρ‚Π°ΠΊΠΎΠΆ дСякі аспСкти особистої ΠΊΠΎΠΌΡƒΠ½Ρ–ΠΊΠ°Ρ†Ρ–Ρ—. Π£ статті ΠΎΠΏΠΈΡΡƒΡ”Ρ‚ΡŒΡΡ Π±Π°Π³Π°Ρ‚ΠΎ ΠΌΠ΅Ρ‚ΠΎΠ΄Ρ–Π² Ρ– Π·Π°ΠΏΡ€ΠΎΠΏΠΎΠ½ΠΎΠ²Π°Π½ΠΈΠΉ Π½ΠΎΠ²ΠΈΠΉ ΠΌΠ΅Ρ‚ΠΎΠ΄ захисту Ρ–Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†Ρ–Ρ—.НовыС ΠΌΠ΅Ρ‚ΠΎΠ΄Ρ‹ Π·Π°Ρ‰ΠΈΡ‚Ρ‹ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ ΡΠ²Π»ΡΡŽΡ‚ΡΡ Π½Π΅ΠΎΠ±Ρ…ΠΎΠ΄ΠΈΠΌΡ‹ΠΌΠΈ. БтСнография ΠΌΠΎΠΆΠ΅Ρ‚ Π·Π°ΠΌΠ΅Π½ΠΈΡ‚ΡŒ ΠΈΠ»ΠΈ Π΄ΠΎΠΏΠΎΠ»Π½ΠΈΡ‚ΡŒ криптографичСскиС ΠΌΠ΅Ρ‚ΠΎΠ΄Ρ‹. Она прСдоставляСт Π½ΠΎΠ²Ρ‹Π΅ Π΄ΠΎΠΏΠΎΠ»Π½ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹Π΅ возмоТности ΠΈ позволяСт ΡΠΎΡ…Ρ€Π°Π½ΠΈΡ‚ΡŒ Π² сСкрСтС Ρ„Π°ΠΊΡ‚Ρ‹ ΠΊΠΎΠΌΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΠΈ, Π° Ρ‚Π°ΠΊΠΆΠ΅ Π½Π΅ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ аспСкты Π»ΠΈΡ‡Π½ΠΎΠΉ ΠΊΠΎΠΌΠΌΡƒΠ½ΠΈΠΊΠ°Ρ†ΠΈΠΈ. Π’ ΡΡ‚Π°Ρ‚ΡŒΠ΅ описываСтся ΠΌΠ½ΠΎΠ³ΠΎ ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΎΠ² ΠΈ ΠΏΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½ Π½ΠΎΠ²Ρ‹ΠΉ ΠΌΠ΅Ρ‚ΠΎΠ΄ Π·Π°Ρ‰ΠΈΡ‚Ρ‹ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ
    corecore