信号加密与同步水印研究

VIP免费
3.0 陈辉 2024-11-19 4 4 2.57MB 68 页 15积分
侵权投诉
摘 要
随着计算机网络的普及和数字音频压缩编码技术的进一步成熟,数字音频的制
作、传输和获取变得越来越简易,极大地丰富了人们的日常生活。但是,伴随而
来的盗版问题、数字媒体认证与版权保护问题也变得愈加突出,数字音频水印作
为一种继传统加密技术之后有效的版权保护新技术而备受关注。
本文首先介绍了数字音频水印技术的基本原理,概括了当前国内外的研究现
状。然后分析了各种经典算法的鲁棒性能,并总结了目前仍然存在的问题。在此
基础上,重点研究了音频水印的同步问题。本文采用双同步技术,将基于音频自
身特征的隐同步技术和基于M序列的显同步技术结合起来,对音频水印的鲁棒性进
行了研究。主要工作包括:
1. 对带有标识信息的水印图像做简单的置乱难以达到安
针对低维混沌系统有可能退化为周期
问题以及高维混沌系统计算量大的缺陷,本文提出了基于双混沌互扰系统的图像
加密算法。通过两个简单的 Logistic 映射的互扰,构造一个双混沌互扰系统,以生
成混沌加密序列。其中扰动项包含常数扰动项和随机扰动项,这不仅保证了系统
必要的复杂性,而且增大了系统参数的取值范围。试验结果表明,该算法系
1090能有效地确保水印信息的安全性。
2提出了一种基于相位特征的自适应音频“零”水印算法。该算法首先根据音
频自身局部能量特征进行音频的自适应分段;然后根据量化步长与音频局部能
之间存在的线性关系,提出了一种自适应量化嵌入方案;接着分析了音频信号DCT
系数的特性,发现音频信DCT系数的相位信息对攻击具有不敏感性,在此基
上提出了一种水印构造方法;最后针对于随机剪切和去同步攻击,采用了基于同
步码的显性同步技术控制音频分段的筛选并利用线性插值的恢复技术来对音频进
行恢复。该算法易操作,水印的嵌入量大,还能有效地解决了水印鲁棒性和透明
性之间的矛盾。
3提出了一种基于绝对均值量化和参数估计的抗同步音频水印算法。该算法首
先采用双同步技术,即音频特征的隐含同步技术和M序列的显性同步技术,以实现
水印嵌入区域的精确定位。然后从理论和试验两方面对典型的量化嵌入方案做了
算法性能分析,根据分析结果给出一种新的基于绝对均值的水印量化嵌入方案。
最后针对TSM等去同步攻击,提出一种TSM参数估计方法,依照估计的参数对音频
信号进行恢复,实现水印信息嵌入和水印检测的同步性。
关键词:音频水印 图像加密 混沌系统 离散余弦变换 离散小波变换
自适应算法 零水印 音频恢复 双同步技术
ABSTRACT
With the popularity of Internet and further mature of digital audio compression
coding technology, digital audios become much easier to make, transmit and obtain,
which greatly enrich people's daily lives. However, the concomitant problems of
copyright piracy, digital media authentication and copyright protection issues have
become increasingly prominent, and digital audio watermarking technology as a new
effective copyright protection technology after the traditional encryption method is also,
as a result, under great concern.
The paper firstly introduces the basic principle of audio watermarking technology
and also gives a general summary of current research progress at home and abroad.
Then the robustness performance of a variety of classic literature is analyzed and the
current problems still existed are summarized. Based on results of the analysis, aiming
to solving the synchronization problem mainly existed in audio watermarking algorithm,
we adopt bisynchronous technology, combination of implicit synchronization
technologies based on audio features and the dominant frame synchronization
technologies based on m sequences, to study audio watermarking robustness. The main
content includes:
1 Just doing a simple scrambling encryption on the watermark image with the
identification information often makes the security of the watermark is not enough, so
cryptography technology is needed to combine for designing the encryption algorithm
with higher system security level. Against the defects that low-dimensional chaotic
system could degenerate into a cycle of problems and high-dimensional chaotic system
always needs a large quantity of computational time, an image encryption algorithm
based on dual chaotic systems with mutual interference is proposed in this paper.
Through mutual interference of two simple logistic maps, we construct a two-chaotic
system with inter-perturbation to produce chaotic sequence for encryption. And the
disturbance includes constant disturbance and random disturbance, which is not only
ensures the necessary complexity of the system, but also increases the range of system
parameters. The experiment results show that the system security level reaches up to
90th power of 10, and the algorithm can effectively ensure the security of the watermark
information.
2 An adaptive audio “zero” watermarking algorithm is proposed in this paper based
on audio phase feature. Firstly, we do operation of audio section according to the audio
self-feature of part energy. Secondly, a new adaptive quantitative embedding method is
given based on existed linear relationship between quantization step and audio part
energy. Thirdly, we discover that audio phase information of DCT coefficients is not
sensitive to attacks after having analyzed the audio characteristics of DCT coefficients,
and based on this a watermark construction method is given as followed. Finally,
against the random crop and the de-synchronization attacks, we use synchronization
code technology to control selection of audio section and adopt the recovery technique
of linear interpolation to realize audio restoration. The algorithm is simple and easy to
operate, not only be in great watermark embedding capacity, but also effectively solve
the issue between watermark robustness and transparency.
3 An anti-synchronous audio watermarking algorithm is proposed based on absolute
mean quantization and parameter estimation. Firstly, in order to locate the position of
watermark embedding area accurately, the algorithm adopt bisynchronous technology,
which is the combination of the implicit synchronization technology based on audio
features and the dominant synchronization technology based on m sequence. Secondly,
we do algorithm performance analysis with the typical quantitative embedding method
from both theoretical and experimental, and according to the analysis results we have
done before, a new watermark quantitative embedding method based on the absolute
mean is given as followed. Finally, against the de-synchronization attacks such as TSM,
etc. this paper presents a TSM parameter estimation method. And in accordance with
the estimated parameters, we restore the audio signal, which is to re-implement
synchronization between the watermark embedding and watermark detection.
Key words audio watermarking, image encryption, chaotic system,
DCT, DWT, adaptive algorithm, zero-watermarking, audio restoration,
bisynchronous technology
目 录
摘要
ABSTRACT
第一章 ................................................................................................................ 1
§1.1 研究意义和应用背景 .......................................................................................1
§1.2 国内外研究现状 ...............................................................................................4
§1.3 本文主要内容及结构 .......................................................................................6
第二章 数字音频水印算法 ............................................................................................ 7
§2.1 音频水印的理论框架 .......................................................................................7
§2.2 音频水印的评价标准 .......................................................................................9
§2.3 音频水印的算法回顾 .....................................................................................11
§2.3.1 时域算法 ...............................................................................................11
§2.3.2 变换域算法 ...........................................................................................13
§2.3.3 压缩域算法 ...........................................................................................14
§2.4 音频水印的嵌入策略 .....................................................................................15
§2.5 音频水印的攻击与对策 .................................................................................17
§2.6 主要存在的问题 .............................................................................................19
第三章 基于双混沌互扰系统的图像加密算法 .......................................................... 21
§3.1 引言 .................................................................................................................21
§3.2 双混沌系统互扰方案及混沌实值序列的生成 .............................................22
§3.2.1 双混沌系统互扰方案 ...........................................................................22
§3.2.2 混沌实值序列的产生 ...........................................................................23
§3.3 混沌二值序列的产生 .....................................................................................24
§3.4 混沌伪随机二值序列的随机性分析 .............................................................26
§3.5 加密流程及试验仿真 .....................................................................................28
§3.5.1 加密流程 ...............................................................................................28
§3.5.2 仿真实验 ...............................................................................................28
§3.5.3 安全性分析 ...........................................................................................29
§3.6 结束语 .............................................................................................................30
第四章 基于相位特征的自适应音频“零”水印算法 .............................................. 31
§4.1 引言 .................................................................................................................31
§4.2 算法描述 ....................................................................................................33
§4.2.1 音频分段 ...............................................................................................33
§4.2.2 嵌入同步码 ............................................................................................33
§4.2.3 自适应量化步长 ...................................................................................34
§4.2.4 线性伸缩恢复技术 ...............................................................................35
§4.3 离散余弦变换与水印构造 ........................................................................35
§4.3.1 相位特征 ...............................................................................................36
§4.3.2 水印构造方法 .......................................................................................37
§4.4 算法流程 .........................................................................................................38
§4.4.1 水印调制 ...............................................................................................38
§4.4.2 水印嵌入” ........................................................................................... 39
§4.4.3 水印提取 ...............................................................................................39
§4.5 仿真试验 ....................................................................................................40
§4.5.1 仿真实验数据 .......................................................................................40
§4.5.2 鲁棒性测试 ...........................................................................................41
§4.6 结束语 .............................................................................................................42
第五章 基于绝对均值量化和参数估计的抗同步音频水印算法 .............................. 43
§5.1 引言 ............................................................................................................43
§5.2 双同步机制 ................................................................................................44
§5.2.1 隐含同步 ...............................................................................................44
§5.2.2 显性同步 ...............................................................................................45
§5.2.3 双同步定位 ...........................................................................................46
§5.3 水印量化嵌入算法 ....................................................................................46
§5.3.1 量化方案理论分析 ...............................................................................47
§5.3.2 实验测试 ...............................................................................................51
§5.3.3 绝对均值量化方案 ...............................................................................52
§5.4 TSM 参数估计方法 ........................................................................................ 53
§5.5 算法设计及实验仿真 .....................................................................................54
§5.5.1 算法设计 ...............................................................................................54
§5.5.2 实验仿真 ...............................................................................................55
§5.6 结束语 .............................................................................................................56
第六章 总结与展望 ...................................................................................................... 57
§6.1 本章的工作 .....................................................................................................57
§6.2 后续工作展望 ............................................................................................58
参考文献 .........................................................................................................................59
在读期间公开发表的论文和承担科研项目及取得成............................................ 64
.............................................................................................................................64
第一章 绪论
1
第一章 绪
数字水印技术是多媒体信息安全领域中的一个研究热点。本章着重介绍数字
水印的产生与发展,以及数字水印技术的国内外现状和在实际中的应用情况。最
后,介绍了本章的主要工作及内容安排。
§1.1 研究意义和应用背景
随着电子信息时代的来临,数字化信息革命的浪潮正在大刀阔斧地改变着人
们的工作和生活方式。数字多媒体技术及互联网技术的迅猛发展,特别是各种
码电子设备的发售使得数字多媒体内容以低成本、高效率等模式进行制作、存储
和传输成为可能并变得极为简易。以MP3为代表的网络数字音乐得以在互联网
广泛传播就是得益于音频压缩技术的进一步成熟。科技的更新与进步不断地促使
新事物的诞生,这在给人们带来便利的同时,也带来了许多意想不到的安全问题
和社会问题。例如,数字媒体产品的版权保护MP3非法下载,软件产品的
版、数字文档的非法拷贝、多媒体数据的篡改等,这一系列的非法行为都将使得
数字作品的版权所有者和出版商的合法利益受到损害。由此引发的盗版问题和版
权纷争已成为日益严重的社会问题,阻碍社会的和谐发展和经济的正常运行。因
此,寻求一种有效的数字媒体内容版权保护技术是目前急需解决的现实问题,同
时也成为产业界与学术界共同关注的焦点问题[1]
针对于上述问题以及数字媒体内容版权保护中存在的信息安全问题,人们最
初想到利用传统的密码学技术,虽然成熟的密码学技术是解决当前网络信息安全
的主要手段,但是对于保护数字媒体内容时具有以下不足之处:1) 密码系统无法
监控和约束拥有密钥的合法消费者的非法行为,这种保护具有暂时性和单一性;2)
密码系统使得加密文件因其不够直观、易懂等缺点,阻碍了数字媒体内容的有效
传播;3) 随着计算机处理能力的快速提升,使得仅依靠不断增加密钥长度来提高
系统密级的密码技术变得越来越不安全。在这种背景下,能够有效地实现版权保
护的数字水印(Digital Watermarking) 技术应运而生,它属于信息隐藏技术
(Information Hiding)的范围[2,3]作为信息安全一个崭新的研究方向而备受关注。
字水印技术是在不影响原多媒体数字内容使用价值而又使得用户无法察觉的
利用多媒体数字内容中存在的冗余信息和人类感知系统的特性,将
具有标识性的水印信息直接嵌入多媒体数字内容中。当出现版权纠纷等问题
时,可以通过提取已嵌入到数字内容中的标识信息,以达到判别版权所有、
合法用户以及载体是否被恶意篡改等目的。
摘要:

摘要随着计算机网络的普及和数字音频压缩编码技术的进一步成熟,数字音频的制作、传输和获取变得越来越简易,极大地丰富了人们的日常生活。但是,伴随而来的盗版问题、数字媒体认证与版权保护问题也变得愈加突出,数字音频水印作为一种继传统加密技术之后有效的版权保护新技术而备受关注。本文首先介绍了数字音频水印技术的基本原理,概括了当前国内外的研究现状。然后分析了各种经典算法的鲁棒性能,并总结了目前仍然存在的问题。在此基础上,重点研究了音频水印的同步问题。本文采用双同步技术,将基于音频自身特征的隐同步技术和基于M序列的显同步技术结合起来,对音频水印的鲁棒性进行了研究。主要工作包括:1.对带有标识信息的水印图像做...

展开>> 收起<<
信号加密与同步水印研究.pdf

共68页,预览7页

还剩页未读, 继续阅读

作者:陈辉 分类:高等教育资料 价格:15积分 属性:68 页 大小:2.57MB 格式:PDF 时间:2024-11-19

开通VIP享超值会员特权

  • 多端同步记录
  • 高速下载文档
  • 免费文档工具
  • 分享文档赚钱
  • 每日登录抽奖
  • 优质衍生服务
/ 68
客服
关注