TY - JOUR
T1 - Research on security transmission of perceptual hash values based on ECC and digital watermarking
AU - Qiuyu, Zhang
AU - Pengfei, Xing
AU - Yangwei, Liu
AU - Qianyun, Zhang
AU - Yibo, Huang
N1 - Publisher Copyright:
© 2015 SERSC.
PY - 2015
Y1 - 2015
N2 - In this paper, a secure method of transmitting perceptual hash is proposed based on error correcting codes (ECC) and digital watermarking, aiming at the fact that perceptual hash string used in audio authentication is easy to alter after been attacked in transmission and the need of extra channel. In this method we embed the binary perceptual hash values into the compressed audio as a digital watermark so that authentication data is dispersed. An ECC is used to pre-process perceptual hash sequence to ensure that speech signal with watermarking can be extracted watermarking information (the perceptual hash values) after been attacked. The experimental result illustrate that this method embeds information without influencing on the content. It is robust to noise and can prevent from common attack. At the same time, this method ensures the hearing transparency of audio perceptual content, the high efficiency of watermark extraction and the efficiency and security of algorithm.
AB - In this paper, a secure method of transmitting perceptual hash is proposed based on error correcting codes (ECC) and digital watermarking, aiming at the fact that perceptual hash string used in audio authentication is easy to alter after been attacked in transmission and the need of extra channel. In this method we embed the binary perceptual hash values into the compressed audio as a digital watermark so that authentication data is dispersed. An ECC is used to pre-process perceptual hash sequence to ensure that speech signal with watermarking can be extracted watermarking information (the perceptual hash values) after been attacked. The experimental result illustrate that this method embeds information without influencing on the content. It is robust to noise and can prevent from common attack. At the same time, this method ensures the hearing transparency of audio perceptual content, the high efficiency of watermark extraction and the efficiency and security of algorithm.
KW - Audio perceptual hash
KW - Digital watermarking
KW - Error correcting code (ECC)
KW - Perceptual hash values
KW - Security analysis
UR - http://www.scopus.com/inward/record.url?scp=84928386688&partnerID=8YFLogxK
U2 - 10.14257/ijseia.2015.9.3.19
DO - 10.14257/ijseia.2015.9.3.19
M3 - 文章
AN - SCOPUS:84928386688
SN - 1738-9976
VL - 9
SP - 255
EP - 266
JO - International Journal of Security and its Applications
JF - International Journal of Security and its Applications
IS - 3
ER -