2018
DOI: 10.3390/sym10070284
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive and Blind Audio Watermarking Algorithm Based on Chaotic Encryption in Hybrid Domain

Abstract: An adaptive and blind audio watermarking algorithm is proposed based on chaotic encryption in discrete cosine transform (DCT) and discrete wavelet transform (DWT) hybrid domain. Since human ears are not sensitive to small changes in the high-frequency components of the audio media, the encrypted watermark can be embedded into the audio signal according to the special embedding rules. The embedding depth of each audio segment is controlled by the overall average amplitude to effectively improve the robustness a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…In [66], a blind and adaptive audio watermarking technique was suggested based on chaotic encryption in DCT and DWT hybrid domain. The encrypted mark can be hidden into the audio signal according to the special insertion rules.…”
Section: ) Watermarking Techniques Related To Copyright Protection Applicationmentioning
confidence: 99%
See 2 more Smart Citations
“…In [66], a blind and adaptive audio watermarking technique was suggested based on chaotic encryption in DCT and DWT hybrid domain. The encrypted mark can be hidden into the audio signal according to the special insertion rules.…”
Section: ) Watermarking Techniques Related To Copyright Protection Applicationmentioning
confidence: 99%
“…This observation proves the effectiveness of integrating the HPM masking study in the embedding algorithm. Besides, schemes in [64,66,67,68,77] are also robust to MP3 compression.…”
Section: ) Inaudibility and Robustness Comparison With Othersmentioning
confidence: 99%
See 1 more Smart Citation
“…In general, watermarking can be divided into robust and fragile watermarking methods in terms of their robustness. Robust watermarking [9] is used to protect security and resist attacks, while fragile watermarking [10,11] is used to provide integrity authentication. For the occasions with high data security requirements, such as judicial authentication, medical images, etc., more researchers focus on fragile watermarking in the encrypted domain.…”
Section: Introductionmentioning
confidence: 99%
“…With the rapid development of network communication and big data applications, information security has become a more and more popular topic. Scholars have proposed a variety of information security technologies, including information encryption [1][2][3][4][5], watermarking [6,7], privacy protection [8][9][10], and so on. Among them, cryptography is the most basic technology in information security.…”
Section: Introductionmentioning
confidence: 99%