[1]
COOPERMAN M, MOSKOWITZ S. Steganographic method and device[M]. USA: Patent, (1997).
Google Scholar
[2]
BENDER W, GRUHL D, MORIMOTO N, et a1. Techniques for data hiding[J].IBM System Journal, (1996), 35: 313—336.
DOI: 10.1147/sj.353.0313
Google Scholar
[3]
GRUHL D, BENDER W, LU A. Echo hiding[C]. Proceedings of the l st International Workshop on Information Hiding. [S. 1. ]: Springer, (1996): 295-315.
DOI: 10.1007/3-540-61996-8_48
Google Scholar
[4]
WEN Nung Lie, LI Chun Chang. Robust and high-quality time-domain audio watermarking based on low-frequency amplitude modification[J]. IEEE Transactions on Multimedia, (2006), 8(1): 46-59.
DOI: 10.1109/tmm.2005.861292
Google Scholar
[5]
SEOK Jong Won, HONG Jin Woo, KIM Jin Woong. A novel audio watermarking algorithm for copyright protection of digital audio[J], ETRI Journal, (2002), 24(3): 181-189.
DOI: 10.4218/etrij.02.0102.0301
Google Scholar
[6]
MA Yi-Ping; HAN Ji-Qing. Audio Watermarking in DCT: Embedding Strategy and Algorithm. Acta Electronica Sinica, (2006), 34(7): 1260-1264.
Google Scholar
[7]
YOU Shou-jie, BAI Sen, CAO Wei-wei. Robust blind audio watermarking algorithm in DCT domain. Journal of Chongqing University of Posts and Telecommunications(Natural Science). (2008), 20(2): 206-211.
Google Scholar
[8]
HE Qin, ZOU Hua-xing, BAI Jian. An Audio Hiding Algorithm Based on DWT. Application Research of Computers, (2005), 22(12): 206-211.
Google Scholar
[9]
WANG Xian-chun, HU Wei-wen, CAI Jian-hua. Audio information hiding algorithm based on DCT and DWT. Computer Engineering and Design. (2008), 29(16): 4389-4391.
Google Scholar
[10]
WANG Xiang-yang, ZHAO Hong, CUI Yong-rui. New Adaptive Digital Audio Watermarking Based on DWT and DCT. Mini-Micro Systems. (2006), 27(2): 316-319.
Google Scholar
[11]
YOU Shou-jie, BAI Sen1, ZENG Hui3. Robust Audio Information Hiding Algorithm Based on DWT and DCT. Computer Technology and Development, (2008), 18(3): 169-172.
Google Scholar
[12]
LI Wei, XUE Xiang Yang, LI Xiao Qiang, et a1. A novel feature-based robust audio watermarking for copyright protection [C].Proceedings of the International Conference on Information Technology: Computers and Communications(ITCC'03)2003 IEEE, (2003). (b)Time-domain waveform with a watermark (a)Time-domain waveform of original audio Figure 1. Time-domain waveform of original audio and audio with a watermark. Normalized correlation coefficient is defined as follow: Table. 1 The results demonstrate the robustness of Audio attacks and algorithm comparison attack type Normalized correlation coefficient References [10] References [11] the proposed algorithms Not attack 1 1 1 Low-pass filtering.
DOI: 10.1109/itcc.2003.1197589
Google Scholar
930 8 1 1 Gaussian white noise.
Google Scholar
960 5 1 1 Reverberation Not Mentioned.
Google Scholar
992 6 1 Resampling.
Google Scholar
790 1 1 1 Re-quantification.
Google Scholar
991 3 1 1 MP3 compressed.
Google Scholar
970 1(11: 1).
Google Scholar
998 6(11: 1).
Google Scholar
972 5(3: 1) Sample point cut Not Mentioned.
Google Scholar
955 6(cut 1 point per 400 points).
Google Scholar
926 3(cut 2 point per 400 points).
Google Scholar
826 6(cut 3 point per 400 points) Time-domain linear elongation (+1%) Not Mentioned Not Mentioned.
Google Scholar
975 3 Time-domain linear compression (-1%) Not Mentioned Not Mentioned.
Google Scholar
978 6 Increased tone(+2%) Not Mentioned Not Mentioned.
Google Scholar
895 3 Reduced tone(-2%) Not Mentioned Not Mentioned.
Google Scholar