{"title":"A new approach combining speech chaotic encryption with fragile image watermarking for audio securing and intrusion detection","authors":"Bouslehi Hamdi, Seddik Hassene","doi":"10.1109/ICEESA.2013.6578390","DOIUrl":null,"url":null,"abstract":"Digital watermarks have been created to be a protection technique of copy rights on digital audio, image, and video. A watermarking can be fragile and robust according to our needs. An attack in watermarking technology is any process that can impact the detection of the watermark. In this paper we studied the evaluating of extracted signal quality before and after attack with the SNR value calculated between extracted signals. This evaluation serves to present the fragility of our watermarking whose the mark is an audio sequence encrypted by a chaotic encryption algorithm method and tested by using various types of attacks. The fragility of watermarking is used as a tool to control intrusion.","PeriodicalId":212631,"journal":{"name":"2013 International Conference on Electrical Engineering and Software Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Electrical Engineering and Software Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEESA.2013.6578390","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Digital watermarks have been created to be a protection technique of copy rights on digital audio, image, and video. A watermarking can be fragile and robust according to our needs. An attack in watermarking technology is any process that can impact the detection of the watermark. In this paper we studied the evaluating of extracted signal quality before and after attack with the SNR value calculated between extracted signals. This evaluation serves to present the fragility of our watermarking whose the mark is an audio sequence encrypted by a chaotic encryption algorithm method and tested by using various types of attacks. The fragility of watermarking is used as a tool to control intrusion.