Research on security transmission of perceptual hash values based on ECC and digital watermarking
Qiuyu, Zhang1; Pengfei, Xing1; Yangwei, Liu1; Qianyun, Zhang2; Yibo, Huang1
2015
发表期刊International Journal of Security and its Applications
ISSN17389976
卷号9期号:3页码:255-266
摘要In this paper, a secure method of transmitting perceptual hash is proposed based on error correcting codes (ECC) and digital watermarking, aiming at the fact that perceptual hash string used in audio authentication is easy to alter after been attacked in transmission and the need of extra channel. In this method we embed the binary perceptual hash values into the compressed audio as a digital watermark so that authentication data is dispersed. An ECC is used to pre-process perceptual hash sequence to ensure that speech signal with watermarking can be extracted watermarking information (the perceptual hash values) after been attacked. The experimental result illustrate that this method embeds information without influencing on the content. It is robust to noise and can prevent from common attack. At the same time, this method ensures the hearing transparency of audio perceptual content, the high efficiency of watermark extraction and the efficiency and security of algorithm. © 2015 SERSC.
关键词Audition Authentication Digital watermarking Error correction Extraction Mobile security Audio authentication Authentication data Error correcting code Extracted watermarking Perceptual hash Security analysis Security transmission Watermark extraction
DOI10.14257/ijseia.2015.9.3.19
收录类别EI
语种英语
WOS研究方向Computer Science
WOS类目Computer Science, Information Systems
WOS记录号WOS:000361376600019
出版者Science and Engineering Research Support Society
EI入藏号20151800798376
EI主题词Audio watermarking
EI分类号721.1 Computer Theory, Includes Formal Logic, Automata Theory, Switching Theory, Programming Theory - 723 Computer Software, Data Handling and Applications - 723.2 Data Processing and Image Processing - 751.1 Acoustic Waves - 802.3 Chemical Operations
来源库Compendex
分类代码721.1 Computer Theory, Includes Formal Logic, Automata Theory, Switching Theory, Programming Theory - 723 Computer Software, Data Handling and Applications - 723.2 Data Processing and Image Processing - 751.1 Acoustic Waves - 802.3 Chemical Operations
引用统计
文献类型期刊论文
条目标识符https://ir.lut.edu.cn/handle/2XXMBERH/113086
专题计算机与通信学院
作者单位1.School of Computer and Communication, Lanzhou University of Technology, Lanzhou, China;
2.School of Communication and Information Engineering, Shanghai University, Shanghai, China
第一作者单位兰州理工大学
第一作者的第一单位兰州理工大学
推荐引用方式
GB/T 7714
Qiuyu, Zhang,Pengfei, Xing,Yangwei, Liu,et al. Research on security transmission of perceptual hash values based on ECC and digital watermarking[J]. International Journal of Security and its Applications,2015,9(3):255-266.
APA Qiuyu, Zhang,Pengfei, Xing,Yangwei, Liu,Qianyun, Zhang,&Yibo, Huang.(2015).Research on security transmission of perceptual hash values based on ECC and digital watermarking.International Journal of Security and its Applications,9(3),255-266.
MLA Qiuyu, Zhang,et al."Research on security transmission of perceptual hash values based on ECC and digital watermarking".International Journal of Security and its Applications 9.3(2015):255-266.
条目包含的文件
条目无相关文件。
个性服务
查看访问统计
谷歌学术
谷歌学术中相似的文章
[Qiuyu, Zhang]的文章
[Pengfei, Xing]的文章
[Yangwei, Liu]的文章
百度学术
百度学术中相似的文章
[Qiuyu, Zhang]的文章
[Pengfei, Xing]的文章
[Yangwei, Liu]的文章
必应学术
必应学术中相似的文章
[Qiuyu, Zhang]的文章
[Pengfei, Xing]的文章
[Yangwei, Liu]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。