Feature-based Self-synchronous Audio Watermarking Technology
暂无分享,去创建一个
In order to get the robust performance for audio watermarking, a new idea called synchronous valley approach for hiding location is proposed for public audio transmission. As the audio masking principle, the computation is addressed in the low frequency coefficients in discrete wavelet transforming. Five features for seven rules are drawn from the coefficients in the self-synchronous approach. The secrets are firstly coded with BCH technology and then hidden behind the synchronous positions by the algorithm of quantization discrete wavelet transforming. Experimental results show that the synchronous valley approach is very effective when locating the secrets in the watermarking embedding and extracting process. Meanwhile, the watermarking technology is robust to the common attacks, such as MP3 coding, re-sampling, re-quantization, echo delay, Gaussian noise and cropping.
[1] Anand R. Tripathi,et al. Design of the Ajanta system for mobile agent programming , 2002, J. Syst. Softw..
[2] Danny B. Lange,et al. A Security Model for Aglets , 1997, IEEE Internet Comput..
[3] Danny B. Lange,et al. Seven good reasons for mobile agents , 1999, CACM.
[4] Zhao Min. Security problem of mobile agent system , 2004 .
[5] Danny B. Lange,et al. A Security Model for Aglets , 1997, IEEE Internet Comput..