Institutional Repository of Coll Comp & Commun
Research on security transmission of perceptual hash values based on ECC and digital watermarking | |
Qiuyu, Zhang1![]() | |
2015 | |
发表期刊 | International Journal of Security and its Applications
![]() |
ISSN | 17389976 |
卷号 | 9期号:3页码:255-266 |
摘要 | In this paper, a secure method of transmitting perceptual hash is proposed based on error correcting codes (ECC) and digital watermarking, aiming at the fact that perceptual hash string used in audio authentication is easy to alter after been attacked in transmission and the need of extra channel. In this method we embed the binary perceptual hash values into the compressed audio as a digital watermark so that authentication data is dispersed. An ECC is used to pre-process perceptual hash sequence to ensure that speech signal with watermarking can be extracted watermarking information (the perceptual hash values) after been attacked. The experimental result illustrate that this method embeds information without influencing on the content. It is robust to noise and can prevent from common attack. At the same time, this method ensures the hearing transparency of audio perceptual content, the high efficiency of watermark extraction and the efficiency and security of algorithm. © 2015 SERSC. |
关键词 | Audition Authentication Digital watermarking Error correction Extraction Mobile security Audio authentication Authentication data Error correcting code Extracted watermarking Perceptual hash Security analysis Security transmission Watermark extraction |
DOI | 10.14257/ijseia.2015.9.3.19 |
收录类别 | EI |
语种 | 英语 |
WOS研究方向 | Computer Science |
WOS类目 | Computer Science, Information Systems |
WOS记录号 | WOS:000361376600019 |
出版者 | Science and Engineering Research Support Society |
EI入藏号 | 20151800798376 |
EI主题词 | Audio watermarking |
EI分类号 | 721.1 Computer Theory, Includes Formal Logic, Automata Theory, Switching Theory, Programming Theory - 723 Computer Software, Data Handling and Applications - 723.2 Data Processing and Image Processing - 751.1 Acoustic Waves - 802.3 Chemical Operations |
来源库 | Compendex |
分类代码 | 721.1 Computer Theory, Includes Formal Logic, Automata Theory, Switching Theory, Programming Theory - 723 Computer Software, Data Handling and Applications - 723.2 Data Processing and Image Processing - 751.1 Acoustic Waves - 802.3 Chemical Operations |
引用统计 | 无
|
文献类型 | 期刊论文 |
条目标识符 | https://ir.lut.edu.cn/handle/2XXMBERH/113086 |
专题 | 计算机与通信学院 |
作者单位 | 1.School of Computer and Communication, Lanzhou University of Technology, Lanzhou, China; 2.School of Communication and Information Engineering, Shanghai University, Shanghai, China |
第一作者单位 | 兰州理工大学 |
第一作者的第一单位 | 兰州理工大学 |
推荐引用方式 GB/T 7714 | Qiuyu, Zhang,Pengfei, Xing,Yangwei, Liu,et al. Research on security transmission of perceptual hash values based on ECC and digital watermarking[J]. International Journal of Security and its Applications,2015,9(3):255-266. |
APA | Qiuyu, Zhang,Pengfei, Xing,Yangwei, Liu,Qianyun, Zhang,&Yibo, Huang.(2015).Research on security transmission of perceptual hash values based on ECC and digital watermarking.International Journal of Security and its Applications,9(3),255-266. |
MLA | Qiuyu, Zhang,et al."Research on security transmission of perceptual hash values based on ECC and digital watermarking".International Journal of Security and its Applications 9.3(2015):255-266. |
条目包含的文件 | 条目无相关文件。 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论