Nothing Special   »   [go: up one dir, main page]

Huang et al., 2011 - Google Patents

A reversible acoustic steganography for integrity verification

Huang et al., 2011

Document ID
3548578189811832955
Author
Huang X
Nishimura A
Echizen I
Publication year
Publication venue
Digital Watermarking: 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers 9

External Links

Snippet

Advanced signal-processing technology has provided alternative countermeasures against malicious attacks and tampering with digital multimedia, which are serious issues. We propose a reversible acoustic steganography scheme to verify the integrity of acoustic data …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signal, using source filter models or psychoacoustic analysis
    • G10L19/018Audio watermarking, i.e. embedding inaudible data in the audio signal
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L19/00Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signal, using source filter models or psychoacoustic analysis
    • G10L19/02Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocoders; Coding or decoding of speech or audio signal, using source filter models or psychoacoustic analysis using spectral analysis, e.g. transform vocoders or subband vocoders

Similar Documents

Publication Publication Date Title
Kirovski et al. Spread-spectrum watermarking of audio signals
Zhu et al. When seeing isn't believing [multimedia authentication technologies]
Nehru et al. A detailed look of audio steganography techniques using LSB and genetic algorithm approach
US6674861B1 (en) Digital audio watermarking using content-adaptive, multiple echo hopping
Renza et al. Authenticity verification of audio signals based on fragile watermarking for audio forensics
Steinebach et al. Watermarking-based digital audio data authentication
Dhar et al. Audio watermarking in transform domain based on singular value decomposition and Cartesian-polar transformation
Dhar et al. Blind audio watermarking in transform domain based on singular value decomposition and exponential-log operations
Dhar et al. Digital watermarking scheme based on fast Fourier transformation for audio copyright protection
CN103456308A (en) Restorable ciphertext domain speech content authentication method
Sarker et al. FFT-based audio watermarking method with a gray image for copyright protection
Huang et al. A reversible acoustic steganography for integrity verification
Li et al. Audio-lossless robust watermarking against desynchronization attacks
Zhang Audio dual watermarking scheme for copyright protection and content authentication
Menendez-Ortiz et al. Self-recovery scheme for audio restoration after a content replacement attack
Huang et al. A new approach of reversible acoustic steganography for tampering detection
Radhakrishnan et al. Audio content authentication based on psycho-acoustic model
Su et al. Window switching strategy based semi-fragile watermarking for MP3 tamper detection
Patel et al. Secure transmission of password using speech watermarking
CN114999502A (en) Adaptive word framing based voice content watermark generation and embedding method and voice content integrity authentication and tampering positioning method
Zmudzinski et al. Perception-based audio authentication watermarking in the time-frequency domain
Dutta et al. An adaptive robust watermarking algorithm for audio signals using SVD
Bhowal et al. Secured Genetic Algorithm Based Image Hiding Technique with Boolean Functions.
Liu et al. Enhanced perceptual image authentication with tamper localization and self-restoration
Jiao et al. Key-dependent compressed domain audio hashing