Huang et al., 2011 - Google Patents
A reversible acoustic steganography for integrity verificationHuang et al., 2011
- Document ID
- 3548578189811832955
- Author
- Huang X
- Nishimura A
- Echizen I
- Publication year
- Publication venue
- Digital Watermarking: 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers 9
External Links
Snippet
Advanced signal-processing technology has provided alternative countermeasures against malicious attacks and tampering with digital multimedia, which are serious issues. We propose a reversible acoustic steganography scheme to verify the integrity of acoustic data …
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signal, using source filter models or psychoacoustic analysis
- G10L19/018—Audio watermarking, i.e. embedding inaudible data in the audio signal
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0052—Embedding of the watermark in the frequency domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L19/00—Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signal, using source filter models or psychoacoustic analysis
- G10L19/02—Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signal, using source filter models or psychoacoustic analysis using spectral analysis, e.g. transform vocoders or subband vocoders
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kirovski et al. | Spread-spectrum watermarking of audio signals | |
Zhu et al. | When seeing isn't believing [multimedia authentication technologies] | |
Nehru et al. | A detailed look of audio steganography techniques using LSB and genetic algorithm approach | |
US6674861B1 (en) | Digital audio watermarking using content-adaptive, multiple echo hopping | |
Renza et al. | Authenticity verification of audio signals based on fragile watermarking for audio forensics | |
Steinebach et al. | Watermarking-based digital audio data authentication | |
Dhar et al. | Audio watermarking in transform domain based on singular value decomposition and Cartesian-polar transformation | |
Dhar et al. | Blind audio watermarking in transform domain based on singular value decomposition and exponential-log operations | |
Dhar et al. | Digital watermarking scheme based on fast Fourier transformation for audio copyright protection | |
CN103456308A (en) | Restorable ciphertext domain speech content authentication method | |
Sarker et al. | FFT-based audio watermarking method with a gray image for copyright protection | |
Huang et al. | A reversible acoustic steganography for integrity verification | |
Li et al. | Audio-lossless robust watermarking against desynchronization attacks | |
Zhang | Audio dual watermarking scheme for copyright protection and content authentication | |
Menendez-Ortiz et al. | Self-recovery scheme for audio restoration after a content replacement attack | |
Huang et al. | A new approach of reversible acoustic steganography for tampering detection | |
Radhakrishnan et al. | Audio content authentication based on psycho-acoustic model | |
Su et al. | Window switching strategy based semi-fragile watermarking for MP3 tamper detection | |
Patel et al. | Secure transmission of password using speech watermarking | |
CN114999502A (en) | Adaptive word framing based voice content watermark generation and embedding method and voice content integrity authentication and tampering positioning method | |
Zmudzinski et al. | Perception-based audio authentication watermarking in the time-frequency domain | |
Dutta et al. | An adaptive robust watermarking algorithm for audio signals using SVD | |
Bhowal et al. | Secured Genetic Algorithm Based Image Hiding Technique with Boolean Functions. | |
Liu et al. | Enhanced perceptual image authentication with tamper localization and self-restoration | |
Jiao et al. | Key-dependent compressed domain audio hashing |