A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform

被引:20
作者
Fan, Ming-Quan [1 ]
Liu, Pei-Pei [2 ]
Wang, Hong-Xia [1 ]
Li, Heng-Jian [3 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Peoples R China
[2] Chengdu Univ Technol, Sch Informat Sci & Technol, Chengdu 610059, Peoples R China
[3] Shandong Prov Key Lab Comp Networks, Jinan 250014, Peoples R China
关键词
audio watermarking; semi-fragile watermarking; DT-CWT; tamper detection; tamper localization; 68U20; 94A62; DIGITAL WATERMARKING; SPEECH;
D O I
10.1080/00207160.2013.805752
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In this paper, a novel semi-fragile watermarking scheme for authenticating an audio signal based on dual-tree complex wavelet transform (DT-CWT) and discrete cosine transform (DCT) is proposed. Specifically, the watermark data are efficiently inserted into the coefficients of the low-frequency sub-band of DT-CWT taking advantages of both DCT and quantization index modulation (QIM). First, the original digital audio signal is segmented and then performed with DT-CWT. Second, based on the energy compression property, the low-frequency sub-band coefficients of the DT-CWT domain are performed with DCT, and the DC component is utilized to embed one distorted watermark bit by the QIM technique. Finally, inverse DCT and DT-CWT are orderly implemented on the watermarked coefficients of each audio segment to get a watermarked audio signal. Simulation results show that the hybrid embedding domain constructed by DT-CWT and DCT is effective, and the proposed watermarking scheme is not only inaudible, but also robust against content persistent non-malicious audio signal processing operations, such as MP3 compression, noise addition, re-sampling, re-quantization, etc. Furthermore, the proposed scheme can effectively authenticate the veracity and integrity of audio content and greatly expands the applicability of the audio watermarking scheme.
引用
收藏
页码:2588 / 2602
页数:15
相关论文
共 20 条
[1]   Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1423-1443
[2]   A fragile watermarking scheme for audio detection and recovery [J].
Chen, Fan ;
He, HongJie ;
Wang, HongXia .
CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 5, PROCEEDINGS, 2008, :135-138
[3]   A MULTIPURPOSE AUDIO WATERMARKING SCHEME FOR COPYRIGHT PROTECTION AND CONTENT AUTHENTICATION [J].
Chen, Ning ;
Zhu, Jie .
2008 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-4, 2008, :221-224
[4]   Content-dependent watermarking scheme in compressed speech with identifying manner and location of attacks [J].
Chen, Oscal T. -C. ;
Liu, Chia-Hsiung .
IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2007, 15 (05) :1605-1616
[5]   A fuzzy c-means clustering-based fragile watermarking scheme for image authentication [J].
Chen, Wei-Che ;
Wang, Ming-Shi .
EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (02) :1300-1307
[6]   Comparative evaluation of semifragile watermarking algorithms [J].
Ekici, Ö ;
Sankur, B ;
Coskun, B ;
Naci, U ;
Akcay, M .
JOURNAL OF ELECTRONIC IMAGING, 2004, 13 (01) :209-219
[7]   A dual-tree complex wavelet transform with improved orthogonality and symmetry properties [J].
Kingsbury, N .
2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, 2000, :375-378
[8]   Complex wavelets for shift invariant analysis and filtering of signals [J].
Kingsbury, N .
APPLIED AND COMPUTATIONAL HARMONIC ANALYSIS, 2001, 10 (03) :234-253
[9]  
Liu J. X., 2009, IEEE T SIGNAL PROCES, V31, P395
[10]   Speech authentication system using digital watermarking and pattern recovery [J].
Park, Chang-Mok ;
Thapa, Devinder ;
Wang, Gi-Nam .
PATTERN RECOGNITION LETTERS, 2007, 28 (08) :931-938