Research of MP3 Audio Digital Watermark Algorithm Based on Hash Values

Article Preview

Abstract:

This paper puts forwards large audio blind watermark algorithm based on MDCT and compression principles of MP3.Using Hash function, psychoacoustic model and MP3 coding/decoding to realize real-time distilling, and validating watermarking recessive, capability, real-timing and etc through experiment and analysis. Experiments show that the scheme can obtain be a higher embedded capacity to change the original audio signal smaller, has good stealth, integrity watermark extraction time is short, and can be completed synchronously during the audio play process.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 179-180)

Pages:

830-835

Citation:

Online since:

January 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Boney, L.; Tewfik, A.H.; Hamdy, K.N.; Digital watermarks for audio signals,; Multimedia Computing and Systems, 1996, Proceedings of the Third IEEE International Conference on 17-23 June 1996 Page(s): 473 – 480.

DOI: 10.1109/mmcs.1996.535015

Google Scholar

[2] Cvejic, N.; Keskinarkaus, A.; Seppanen, T.; Audio watermarking using m-sequences and temporal masking,; Applications of Signal Processing to Audio and Acoustics, 2001 IEEE Workshop on the 21-24 Oct. 2001 Page(s): 227 – 230.

DOI: 10.1109/aspaa.2001.969584

Google Scholar

[3] W.N. Lie; L.C. Chang; Robust and high-quality time-domain audio watermarking subject to psychoacoustic masking,; IEEE International Sympasium on Circuits and Systems 2001, Page(s): 45-48.

DOI: 10.1109/iscas.2001.921002

Google Scholar

[4] Ching-Te Wang; Tung-Shou Chen; Wen-Hung Chao; A new audio watermarking based on modified discrete cosine transform of MPEG/audio layer III,; Networking, Sensing and Control, 2004 IEEE International Conference on Volume 2, 2004 Page(s): 984 - 989 Vol. 2.

DOI: 10.1109/icnsc.2004.1297081

Google Scholar

[5] Qianghong Chen, Bin Ye, Bingfa Li. Wavelet transform associated with pseudo-random sequence of digital watermarking technology. University of Electronic Science and Technology Journal. 2004: 126-127.

Google Scholar

[6] Noch. Stego-Lame.; Http: /sourceforge. net/projects/stego-lame.

Google Scholar

[7] Jinghong Liang, Daoshun Wang, Liansheng Huang. Research of attacks on MP3Stego. Computer Aided Design and Computer Graphics, 2003. 8, Volume 15, No. 8.

Google Scholar