计算机工程与应用 ›› 2009, Vol. 45 ›› Issue (1): 111-112.DOI: 10.3778/j.issn.1002-8331.2009.01.033

• 网络、通信、安全 • 上一篇    下一篇

基于Blakley方案的音频水印分存算法

张慧梅1,吕宏伟1,吴  翔2,郭  耀2   

  1. 1.武警工程学院 训练部,西安 710086
    2.武警工程学院 电子技术系 网络与信息安全武警部队重点实验室,西安 710086
  • 收稿日期:2008-06-02 修回日期:2008-08-11 出版日期:2009-01-01 发布日期:2009-01-01
  • 通讯作者: 张慧梅

Audio watermarking sharing algorithm based on Blakley scheme

ZHANG Hui-mei1,LV Hong-wei1,WU Xiang2,GUO Yao2   

  1. 1.Training Department,Engineering College of the Armed Police Forces,Xi’an 710086,China
    2.Network and Information Security Key Lab,Electronics Department,Engineering College of the Armed Police Forces,Xi’an 710086,China
  • Received:2008-06-02 Revised:2008-08-11 Online:2009-01-01 Published:2009-01-01
  • Contact: ZHANG Hui-mei

摘要: 提出了一种基于Blakley密钥共享方案的音频水印分存算法。算法将密钥分存的思想引入到音频水印算法中,将水印分存到音频数据的不同段中,检测时只需提取出部分水印信息就可以恢复出原始水印。算法同时采用了Bark码来解决剪切攻击带来的同步问题,并利用逼近信号统计特征和纠错码技术来提高算法的鲁棒性。实验证明,算法具有较强的抗剪切攻击能力。

Abstract: Based on Blakley secret key sharing scheme,this paper presents an audio watermarking sharing algorithm.In this algorithm,the key sharing method is introduced into audio watermarking algorithm by separating the watermark in different segments of the audio data,so when detected,the original watermark can be gotten back by extracting only part of the watermark information.At the same time,this algorithm uses Bark code to solve the synchronization problem brought by cropping attack,and uses approximation signal statistical characteristics of approximation signal and error correcting code method to improve the algorithm’s robustness.The experiments prove this algorithm has a nice ability to resist cropping attack.