电讯技术
電訊技術
전신기술
TELECOMMUNICATIONS ENGINEERING
2013年
11期
1476-1481
,共6页
音频内容取证%辨识水印%篡改定位%非均匀量化%时域统计特征%混沌系统
音頻內容取證%辨識水印%篡改定位%非均勻量化%時域統計特徵%混沌繫統
음빈내용취증%변식수인%찬개정위%비균균양화%시역통계특정%혼돈계통
audio content forensics%identifying watermark%tamper localization%non-uniform quantiza-tion%time domain statistical characteristic%chaotic system
针对现有音频内容取证算法采用二值图像作为辨识水印所带来的安全隐患,以及基于音频内容或特征生成的辨识水印稳定性不高,易被常规信号处理操作淹没的问题,提出了一种新的基于时域统计特征的音频内容取证算法。通过对音频信号时域统计平均值进行非均匀量化生成辨识水印。理论和实验结果表明通过该方法生成的辨识水印能够抵抗常规信号处理操作,稳定性高。生成的辨识水印存储于认证中心,组建辨识水印库。对音频内容进行取证时,将由该音频生成的辨识水印与从水印库中提取的对应辨识水印进行比对,即可对待取证音频的真实性、完整性进行鉴定。该取证方法操作简便,对不同类型音频均能实现篡改定位,对常规音频信号处理操作的鲁棒性高,有效扩大了基于内容音频取证算法的应用范围。
針對現有音頻內容取證算法採用二值圖像作為辨識水印所帶來的安全隱患,以及基于音頻內容或特徵生成的辨識水印穩定性不高,易被常規信號處理操作淹沒的問題,提齣瞭一種新的基于時域統計特徵的音頻內容取證算法。通過對音頻信號時域統計平均值進行非均勻量化生成辨識水印。理論和實驗結果錶明通過該方法生成的辨識水印能夠牴抗常規信號處理操作,穩定性高。生成的辨識水印存儲于認證中心,組建辨識水印庫。對音頻內容進行取證時,將由該音頻生成的辨識水印與從水印庫中提取的對應辨識水印進行比對,即可對待取證音頻的真實性、完整性進行鑒定。該取證方法操作簡便,對不同類型音頻均能實現篡改定位,對常規音頻信號處理操作的魯棒性高,有效擴大瞭基于內容音頻取證算法的應用範圍。
침대현유음빈내용취증산법채용이치도상작위변식수인소대래적안전은환,이급기우음빈내용혹특정생성적변식수인은정성불고,역피상규신호처리조작엄몰적문제,제출료일충신적기우시역통계특정적음빈내용취증산법。통과대음빈신호시역통계평균치진행비균균양화생성변식수인。이론화실험결과표명통과해방법생성적변식수인능구저항상규신호처리조작,은정성고。생성적변식수인존저우인증중심,조건변식수인고。대음빈내용진행취증시,장유해음빈생성적변식수인여종수인고중제취적대응변식수인진행비대,즉가대대취증음빈적진실성、완정성진행감정。해취증방법조작간편,대불동류형음빈균능실현찬개정위,대상규음빈신호처리조작적로봉성고,유효확대료기우내용음빈취증산법적응용범위。
Many previous audio content forensics schemes adopt binary image as identifying watermark, which introduces security holes to forensics systems. On the other hand, partial content-based or feature-based identifying watermarks have feeblish stability and may be damaged under various signal processing operations. To overcome these problems, a novel audio content forensics scheme based on time domain sta-tistical characteristic is proposed in this paper. The statistical average value of continuous audio samples is used to generate identifying watermark by non-uniform quantization. Theoretical analysis and experimental results show that the generated identifying watermark is robust against various signal processing operations. Various identifying watermarks generated from different audio signals are stored at CA ( Center of Authenti-cation) . When authenticating the veracity and integrity of audio content, firstly identifying watermark is generated from the to be detected audio, then corresponding identifying watermark is extracted from data-base of CA, finally the two identifying watermarks for audio content forensics are compared. The proposed forensics scheme has lower computation complexity, and the ability of tamper localization and tolerance a-gainst common signal processing operations are excellent. It greatly expands the applicability of content-based audio forensics scheme.