{"title":"二值图像在数字音频水印中的应用","authors":"Lili Cui, Shu-Xun Wang, Tanfeng Sun","doi":"10.1109/ICNNSP.2003.1281159","DOIUrl":null,"url":null,"abstract":"In this paper, we propose apply a visually recognizable binary image as watermarking embedding audio signals cepstrum domain. Cepstrum representation of audio can be shown to be very robust to a wide range of attacks including most challenging time-scaling and pitch-shifting warping. An intuitive psychoacoustic model is employed to control the audibility of introduced distortion. The results have shown the watermark imperceptible and robust against some signal processing, and our method succeeded in detection the embedded binary image. Extensive experimental results prove that the proposed method robustness to against the data compression and some kinds of synchronization attacks such as MP3, Gaussian white noise, filter and so on.","PeriodicalId":336216,"journal":{"name":"International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003","volume":"529 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"24","resultStr":"{\"title\":\"The application of binary image in digital audio watermarking\",\"authors\":\"Lili Cui, Shu-Xun Wang, Tanfeng Sun\",\"doi\":\"10.1109/ICNNSP.2003.1281159\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose apply a visually recognizable binary image as watermarking embedding audio signals cepstrum domain. Cepstrum representation of audio can be shown to be very robust to a wide range of attacks including most challenging time-scaling and pitch-shifting warping. An intuitive psychoacoustic model is employed to control the audibility of introduced distortion. The results have shown the watermark imperceptible and robust against some signal processing, and our method succeeded in detection the embedded binary image. Extensive experimental results prove that the proposed method robustness to against the data compression and some kinds of synchronization attacks such as MP3, Gaussian white noise, filter and so on.\",\"PeriodicalId\":336216,\"journal\":{\"name\":\"International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003\",\"volume\":\"529 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"24\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICNNSP.2003.1281159\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNNSP.2003.1281159","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The application of binary image in digital audio watermarking
In this paper, we propose apply a visually recognizable binary image as watermarking embedding audio signals cepstrum domain. Cepstrum representation of audio can be shown to be very robust to a wide range of attacks including most challenging time-scaling and pitch-shifting warping. An intuitive psychoacoustic model is employed to control the audibility of introduced distortion. The results have shown the watermark imperceptible and robust against some signal processing, and our method succeeded in detection the embedded binary image. Extensive experimental results prove that the proposed method robustness to against the data compression and some kinds of synchronization attacks such as MP3, Gaussian white noise, filter and so on.