A pseudo-Zernike moment based audio watermarking scheme robust against desynchronization attacks
Desynchronization attack is known as one of the most difficult attacks to resist, for it can desynchronize the location of the watermark and hence causes incorrect watermark detection. It is a challenging work to design a robust audio watermarking scheme against desynchronization attacks. Based on p...
Saved in:
| Published in | Computers & electrical engineering Vol. 37; no. 4; pp. 425 - 443 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
Elsevier Ltd
01.07.2011
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 0045-7906 1879-0755 |
| DOI | 10.1016/j.compeleceng.2011.05.011 |
Cover
| Abstract | Desynchronization attack is known as one of the most difficult attacks to resist, for it can desynchronize the location of the watermark and hence causes incorrect watermark detection. It is a challenging work to design a robust audio watermarking scheme against desynchronization attacks. Based on pseudo-Zernike moment and synchronization code, we propose a new digital audio watermarking algorithm with good auditory quality and reasonable resistance toward desynchronization attacks in this paper. Firstly, the origin digital audio is segmented and then each segment is cut into two parts. Secondly, with the spatial watermarking technique, synchronization code is embedded into the statistics average value of audio samples in the first part. And then, map 1D digital audio signal in the second part into 2D form, and calculate its pseudo-Zernike moments. Finally, the watermark bit is embedded into the average value of modulus of the low-order pseudo-Zernike moments. Meanwhile combining the two adjacent synchronization code searching technology, the algorithm can extract the watermark without the help from the origin digital audio signal. Simulation results show that the proposed watermarking scheme is not only inaudible and robust against common signals processing such as MP3 compression, noise addition, resampling, re-quantization, etc., but also robust against the desynchronization attacks such as random cropping, amplitude variation, pitch shifting, jittering, etc. |
|---|---|
| AbstractList | Desynchronization attack is known as one of the most difficult attacks to resist, for it can desynchronize the location of the watermark and hence causes incorrect watermark detection. It is a challenging work to design a robust audio watermarking scheme against desynchronization attacks. Based on pseudo-Zernike moment and synchronization code, we propose a new digital audio watermarking algorithm with good auditory quality and reasonable resistance toward desynchronization attacks in this paper. Firstly, the origin digital audio is segmented and then each segment is cut into two parts. Secondly, with the spatial watermarking technique, synchronization code is embedded into the statistics average value of audio samples in the first part. And then, map 1D digital audio signal in the second part into 2D form, and calculate its pseudo-Zernike moments. Finally, the watermark bit is embedded into the average value of modulus of the low-order pseudo-Zernike moments. Meanwhile combining the two adjacent synchronization code searching technology, the algorithm can extract the watermark without the help from the origin digital audio signal. Simulation results show that the proposed watermarking scheme is not only inaudible and robust against common signals processing such as MP3 compression, noise addition, resampling, re-quantization, etc., but also robust against the desynchronization attacks such as random cropping, amplitude variation, pitch shifting, jittering, etc. |
| Author | Ma, Tian-Xiao Niu, Pan-Pan Wang, Xiang-Yang |
| Author_xml | – sequence: 1 givenname: Xiang-Yang surname: Wang fullname: Wang, Xiang-Yang email: wxy37@126.com organization: School of Computer and Information Technology, Liaoning Normal University, Dalian 116029, China – sequence: 2 givenname: Tian-Xiao surname: Ma fullname: Ma, Tian-Xiao organization: School of Computer and Information Technology, Liaoning Normal University, Dalian 116029, China – sequence: 3 givenname: Pan-Pan surname: Niu fullname: Niu, Pan-Pan organization: School of Computer and Information Technology, Liaoning Normal University, Dalian 116029, China |
| BookMark | eNqNkEtLxDAUhYMoOD7-Q1y5ak3aJm1XIoMvENzoxk1Mk9sxM20yJqky_nqj40Jcufq4cM7h8h2gXessIHRCSU4J5WfLXLlxDQMosIu8IJTmhOUJO2hGm7rNSM3YLpoRUrGsbgnfRwchLEm6OW1m6PkCrwNM2mVP4K1ZAR7dCDbiTgbQWE7aOPwuI_hR-pWxCxzUC4yAveumELFcSGMTNYSNVS_eWfMho3EWyxilWoUjtNfLIcDxDw_R49Xlw_wmu7u_vp1f3GWqZGXMKl7ospK9JkXRcc561mvZaFIRzoqed5x1HZBW9pWuKWOUti2tNO3rrim1qnV5iE63u2vvXicIUYwmKBgGacFNQbTJVkNo2aTk-TapvAvBQy-Uid8_Ry_NICgRX2rFUvxSK77UCsJEQlpo_yysvUl-Nv_qzrddSDLeDHgRlAGrQBsPKgrtzD9WPgETYp_t |
| CitedBy_id | crossref_primary_10_4018_jdcf_2013070102 crossref_primary_10_1007_s11042_012_1235_5 crossref_primary_10_1016_j_patcog_2016_02_014 crossref_primary_10_1016_j_dsp_2013_09_007 crossref_primary_10_1631_FITEE_1500297 crossref_primary_10_1007_s11042_016_3533_9 crossref_primary_10_1016_j_dsp_2013_12_004 crossref_primary_10_1016_j_sigpro_2015_10_023 crossref_primary_10_1007_s11042_016_4027_5 crossref_primary_10_1016_j_scijus_2016_06_004 crossref_primary_10_1016_j_ijleo_2016_05_097 crossref_primary_10_1007_s11042_023_16032_2 crossref_primary_10_1364_OE_506062 crossref_primary_10_1007_s10772_015_9318_0 crossref_primary_10_1007_s11042_016_3664_z crossref_primary_10_1016_j_amc_2018_04_001 crossref_primary_10_1007_s11042_024_19664_0 crossref_primary_10_1007_s42044_020_00059_x crossref_primary_10_12720_jcm_9_9_723_728 crossref_primary_10_1109_ACCESS_2024_3434576 crossref_primary_10_4018_IJDCF_2017040101 |
| Cites_doi | 10.1007/978-3-540-72393-6_6 10.1109/TASL.2007.906192 10.1109/TMM.2005.861291 10.1007/978-3-540-24624-4_22 10.1016/j.apacoust.2007.06.001 10.1109/TMM.2009.2012923 10.1109/TMM.2010.2098850 10.1016/j.dsp.2009.05.004 10.1109/TSP.2006.881258 10.1016/j.sigpro.2010.02.007 10.1109/TSP.2003.809384 10.1109/TBC.2004.838265 10.1007/11922841_19 10.1155/S1110865703305128 10.1109/ISCAS.2005.1465609 10.4018/978-1-59904-513-9 10.1109/ISCAS.2002.1010302 10.1109/WCINS.2010.5541888 10.1016/j.patcog.2009.01.015 10.1016/j.dsp.2009.12.001 |
| ContentType | Journal Article |
| Copyright | 2011 Elsevier Ltd |
| Copyright_xml | – notice: 2011 Elsevier Ltd |
| DBID | AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1016/j.compeleceng.2011.05.011 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1879-0755 |
| EndPage | 443 |
| ExternalDocumentID | 10_1016_j_compeleceng_2011_05_011 S0045790611000802 |
| GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 60773031; 60873222 – fundername: Open Foundation of Key Laboratory of Modern Acoustics Nanjing University grantid: 08-02 – fundername: Liaoning Research Project for Institutions of Higher Education of China grantid: L2010230; 2008351 – fundername: Open Foundation of Network and Data Security Key Laboratory of Sichuan Province – fundername: Open Foundation of State Key Laboratory of Information Security of China grantid: 04-06-1 |
| GroupedDBID | --K --M .DC .~1 0R~ 1B1 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABEFU ABFNM ABJNI ABMAC ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD ADTZH AEBSH AECPX AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W JJJVA KOM LG9 LY7 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG ROL RPZ RXW SBC SDF SDG SDP SES SET SEW SPC SPCBC SST SSV SSZ T5K TAE TN5 UHS VOH WH7 WUQ XPP ZMT ~G- ~S- AATTM AAXKI AAYWO AAYXX ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD 7SC 7SP 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c353t-462d34afd022b665f5fda8d040652f6b65bbe09af4d7155119914d1f7b83dc7d3 |
| IEDL.DBID | .~1 |
| ISSN | 0045-7906 |
| IngestDate | Thu Oct 02 11:13:08 EDT 2025 Wed Oct 01 06:42:40 EDT 2025 Thu Apr 24 23:06:37 EDT 2025 Fri Feb 23 02:32:45 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Language | English |
| License | https://www.elsevier.com/tdm/userlicense/1.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c353t-462d34afd022b665f5fda8d040652f6b65bbe09af4d7155119914d1f7b83dc7d3 |
| Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
| PQID | 901680138 |
| PQPubID | 23500 |
| PageCount | 19 |
| ParticipantIDs | proquest_miscellaneous_901680138 crossref_citationtrail_10_1016_j_compeleceng_2011_05_011 crossref_primary_10_1016_j_compeleceng_2011_05_011 elsevier_sciencedirect_doi_10_1016_j_compeleceng_2011_05_011 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2011-07-01 |
| PublicationDateYYYYMMDD | 2011-07-01 |
| PublicationDate_xml | – month: 07 year: 2011 text: 2011-07-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationTitle | Computers & electrical engineering |
| PublicationYear | 2011 |
| Publisher | Elsevier Ltd |
| Publisher_xml | – name: Elsevier Ltd |
| References | Du, Wang (b0105) 2005; 26 Cvejic N, Seppänen T. Digital audio watermarking techniques and technologies: applications and benchmarks. Information Science Reference, Hershey, PA, USA; 2007. Kim, Choi, Choi, Kim (b0030) 2010; 90 Huang JW, Wang Y, Shi YQ. A blind audio watermarking algorithm with self-synchronization. In: Proceedings of IEEE international symposium on circuits system, vol. 3, Arizona, USA; 2002. p. 627–30. Wang, Nishimura, Suzuki, Mao (b0025) 2008; 69 Khan, Xie, Zhang (b0040) 2010; 20 Wu, Huang, Shi (b0095) 2005; 51 Xiang S, Huang J, Yang R, Wang C, Liu H. Robust audio watermarking based on low-order Zernike moments. In: Proceedings of the fifth international workshop of digital watermarking (IWDW2006). Lecture Notes in Computer Science, vol. 4283; 2006. p. 226–240. Wang, Niu (b0100) 2009; 42 Li W, Xue X. Audio watermarking based on music content analysis: robust against time scale modification. In: Proceedings of the second international workshop of digital watermarking (IWDW 2003). Lecture Notes in Computer Science, vol. 2939; 2004. p. 289–300. Bao, Yang, Qi, Wang (b0080) 2009; 14 Kang, Yang, Huang (b0075) 2011; 13 Haddadnia, Ahmadi, Faez (b0120) 2003; 3 Chang, Wang, Shen (b0115) 2010; 20 Kirovski, Malvar (b0020) 2003; 51 Wei Foo Say, Feng Xue, Mengyuan Li. A blind audio watermarking scheme using peak point extraction. In: IEEE international symposium on circuits and systems; 2005. p. 4409–4412. Akhaee, Saberian, Feizi, Marvasti (b0050) 2009; 11 Wang, Zhao (b0110) 2006; 54 Li, Xue (b0060) 2006; 8 Lian, Kanellopoulos, Ruffo (b0005) 2009; 33 Ma Xiaohong, Zhang Bo, Ding Xiaoyan. Self-synchronization blind audio watermarking based on feature extraction and subsampling. In: International symposium on neural networks. Lecture Notes in Computer Science, vol. 4492; 2007. p. 40–6. Wang, Qi, Niu (b0085) 2007; 15 Li LL, Fang XZ. Adaptive detection for spread spectrum audio watermarking. In: 2010 IEEE international conference on wireless communications, networking and information security (WCNIS), 25–27 June; 2010. p. 58–62. Kirovski, Malvar (b0015) 2001; vol. 2137 Haddadnia (10.1016/j.compeleceng.2011.05.011_b0120) 2003; 3 Wang (10.1016/j.compeleceng.2011.05.011_b0100) 2009; 42 10.1016/j.compeleceng.2011.05.011_b0070 Kirovski (10.1016/j.compeleceng.2011.05.011_b0015) 2001; vol. 2137 10.1016/j.compeleceng.2011.05.011_b0090 Chang (10.1016/j.compeleceng.2011.05.011_b0115) 2010; 20 Wang (10.1016/j.compeleceng.2011.05.011_b0025) 2008; 69 Akhaee (10.1016/j.compeleceng.2011.05.011_b0050) 2009; 11 Wu (10.1016/j.compeleceng.2011.05.011_b0095) 2005; 51 Kim (10.1016/j.compeleceng.2011.05.011_b0030) 2010; 90 Khan (10.1016/j.compeleceng.2011.05.011_b0040) 2010; 20 Kirovski (10.1016/j.compeleceng.2011.05.011_b0020) 2003; 51 10.1016/j.compeleceng.2011.05.011_b0035 Li (10.1016/j.compeleceng.2011.05.011_b0060) 2006; 8 Kang (10.1016/j.compeleceng.2011.05.011_b0075) 2011; 13 Du (10.1016/j.compeleceng.2011.05.011_b0105) 2005; 26 Bao (10.1016/j.compeleceng.2011.05.011_b0080) 2009; 14 Wang (10.1016/j.compeleceng.2011.05.011_b0085) 2007; 15 Lian (10.1016/j.compeleceng.2011.05.011_b0005) 2009; 33 10.1016/j.compeleceng.2011.05.011_b0045 Wang (10.1016/j.compeleceng.2011.05.011_b0110) 2006; 54 10.1016/j.compeleceng.2011.05.011_b0055 10.1016/j.compeleceng.2011.05.011_b0010 10.1016/j.compeleceng.2011.05.011_b0065 |
| References_xml | – reference: Xiang S, Huang J, Yang R, Wang C, Liu H. Robust audio watermarking based on low-order Zernike moments. In: Proceedings of the fifth international workshop of digital watermarking (IWDW2006). Lecture Notes in Computer Science, vol. 4283; 2006. p. 226–240. – volume: 90 start-page: 2605 year: 2010 end-page: 2610 ident: b0030 article-title: Selective correlation detector for additive spread spectrum watermarking in transform domain publication-title: Signal Process – volume: 11 start-page: 834 year: 2009 end-page: 842 ident: b0050 article-title: Robust audio data hiding using correlated quantization with histogram based detector publication-title: IEEE Trans Multimedia – reference: Huang JW, Wang Y, Shi YQ. A blind audio watermarking algorithm with self-synchronization. In: Proceedings of IEEE international symposium on circuits system, vol. 3, Arizona, USA; 2002. p. 627–30. – volume: 3 start-page: 890 year: 2003 end-page: 901 ident: b0120 article-title: An efficient feature extraction method with pseudo-Zernike moment in RBF neural network-based human face recognition system publication-title: EURASIP J Appl Signal Process – reference: Ma Xiaohong, Zhang Bo, Ding Xiaoyan. Self-synchronization blind audio watermarking based on feature extraction and subsampling. In: International symposium on neural networks. Lecture Notes in Computer Science, vol. 4492; 2007. p. 40–6. – reference: Li LL, Fang XZ. Adaptive detection for spread spectrum audio watermarking. In: 2010 IEEE international conference on wireless communications, networking and information security (WCNIS), 25–27 June; 2010. p. 58–62. – reference: Li W, Xue X. Audio watermarking based on music content analysis: robust against time scale modification. In: Proceedings of the second international workshop of digital watermarking (IWDW 2003). Lecture Notes in Computer Science, vol. 2939; 2004. p. 289–300. – volume: 51 start-page: 69 year: 2005 end-page: 76 ident: b0095 article-title: Efficiently self-synchronized audio watermarking for assured audio data transmission publication-title: IEEE Trans Broadcast – volume: 42 start-page: 3057 year: 2009 end-page: 3064 ident: b0100 article-title: A robust digital audio watermarking based on statistics characteristics publication-title: Pattern Recogn – volume: 20 start-page: 79 year: 2010 end-page: 190 ident: b0040 article-title: Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals publication-title: Digit Signal Process – volume: 8 start-page: 60 year: 2006 end-page: 69 ident: b0060 article-title: Localized audio watermarking technique robust against time-scale modification publication-title: IEEE Trans Multimedia – volume: 69 start-page: 868 year: 2008 end-page: 874 ident: b0025 article-title: Fuzzy self-adaptive digital audio watermarking based on time-spread echo hiding publication-title: Appl Acoust – volume: 13 start-page: 181 year: 2011 end-page: 190 ident: b0075 article-title: Geometric invariant audio watermarking based on an LCM feature publication-title: IEEE Trans Multimedia – reference: Wei Foo Say, Feng Xue, Mengyuan Li. A blind audio watermarking scheme using peak point extraction. In: IEEE international symposium on circuits and systems; 2005. p. 4409–4412. – reference: Cvejic N, Seppänen T. Digital audio watermarking techniques and technologies: applications and benchmarks. Information Science Reference, Hershey, PA, USA; 2007. – volume: vol. 2137 start-page: 354 year: 2001 end-page: 368 ident: b0015 article-title: Robust covert communication over a public audio channel using spread spectrum publication-title: Proceedings of the fourth international workshop on information hiding (IH 2001) – volume: 51 start-page: 1020 year: 2003 end-page: 1033 ident: b0020 article-title: Spread-spectrum watermarking of audio signals publication-title: IEEE Trans Signal Process – volume: 20 start-page: 1087 year: 2010 end-page: 1101 ident: b0115 article-title: Copyright-proving scheme for audio with counter-propagation neural networks publication-title: Digit Signal Process – volume: 54 start-page: 4835 year: 2006 end-page: 4840 ident: b0110 article-title: A novel synchronization invariant digital watermarking scheme based on DWT and DCT publication-title: IEEE Trans Signal Process – volume: 33 start-page: 3 year: 2009 end-page: 24 ident: b0005 article-title: Recent advances in multimedia information system security publication-title: Informatica – volume: 15 start-page: 2270 year: 2007 end-page: 2277 ident: b0085 article-title: A new adaptive digital audio watermarking based on support vector regression publication-title: IEEE Trans Audio Speech Lang Process – volume: 26 start-page: 74 year: 2005 end-page: 79 ident: b0105 article-title: An audio watermarking detecting improved algorithm based on HAS publication-title: J Eng Graph – volume: 14 start-page: 2619 year: 2009 end-page: 2622 ident: b0080 article-title: A content based audio watermarking against desynchronization attacks publication-title: J Image Graph – ident: 10.1016/j.compeleceng.2011.05.011_b0070 doi: 10.1007/978-3-540-72393-6_6 – volume: 15 start-page: 2270 issue: 8 year: 2007 ident: 10.1016/j.compeleceng.2011.05.011_b0085 article-title: A new adaptive digital audio watermarking based on support vector regression publication-title: IEEE Trans Audio Speech Lang Process doi: 10.1109/TASL.2007.906192 – volume: 8 start-page: 60 issue: 1 year: 2006 ident: 10.1016/j.compeleceng.2011.05.011_b0060 article-title: Localized audio watermarking technique robust against time-scale modification publication-title: IEEE Trans Multimedia doi: 10.1109/TMM.2005.861291 – volume: 26 start-page: 74 issue: 1 year: 2005 ident: 10.1016/j.compeleceng.2011.05.011_b0105 article-title: An audio watermarking detecting improved algorithm based on HAS publication-title: J Eng Graph – ident: 10.1016/j.compeleceng.2011.05.011_b0055 doi: 10.1007/978-3-540-24624-4_22 – volume: vol. 2137 start-page: 354 year: 2001 ident: 10.1016/j.compeleceng.2011.05.011_b0015 article-title: Robust covert communication over a public audio channel using spread spectrum – volume: 14 start-page: 2619 issue: 12 year: 2009 ident: 10.1016/j.compeleceng.2011.05.011_b0080 article-title: A content based audio watermarking against desynchronization attacks publication-title: J Image Graph – volume: 69 start-page: 868 issue: 10 year: 2008 ident: 10.1016/j.compeleceng.2011.05.011_b0025 article-title: Fuzzy self-adaptive digital audio watermarking based on time-spread echo hiding publication-title: Appl Acoust doi: 10.1016/j.apacoust.2007.06.001 – volume: 11 start-page: 834 issue: 5 year: 2009 ident: 10.1016/j.compeleceng.2011.05.011_b0050 article-title: Robust audio data hiding using correlated quantization with histogram based detector publication-title: IEEE Trans Multimedia doi: 10.1109/TMM.2009.2012923 – volume: 13 start-page: 181 issue: 2 year: 2011 ident: 10.1016/j.compeleceng.2011.05.011_b0075 article-title: Geometric invariant audio watermarking based on an LCM feature publication-title: IEEE Trans Multimedia doi: 10.1109/TMM.2010.2098850 – volume: 20 start-page: 79 issue: 1 year: 2010 ident: 10.1016/j.compeleceng.2011.05.011_b0040 article-title: Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals publication-title: Digit Signal Process doi: 10.1016/j.dsp.2009.05.004 – volume: 54 start-page: 4835 issue: 12 year: 2006 ident: 10.1016/j.compeleceng.2011.05.011_b0110 article-title: A novel synchronization invariant digital watermarking scheme based on DWT and DCT publication-title: IEEE Trans Signal Process doi: 10.1109/TSP.2006.881258 – volume: 90 start-page: 2605 issue: 8 year: 2010 ident: 10.1016/j.compeleceng.2011.05.011_b0030 article-title: Selective correlation detector for additive spread spectrum watermarking in transform domain publication-title: Signal Process doi: 10.1016/j.sigpro.2010.02.007 – volume: 51 start-page: 1020 issue: 4 year: 2003 ident: 10.1016/j.compeleceng.2011.05.011_b0020 article-title: Spread-spectrum watermarking of audio signals publication-title: IEEE Trans Signal Process doi: 10.1109/TSP.2003.809384 – volume: 51 start-page: 69 issue: 1 year: 2005 ident: 10.1016/j.compeleceng.2011.05.011_b0095 article-title: Efficiently self-synchronized audio watermarking for assured audio data transmission publication-title: IEEE Trans Broadcast doi: 10.1109/TBC.2004.838265 – volume: 33 start-page: 3 issue: 1 year: 2009 ident: 10.1016/j.compeleceng.2011.05.011_b0005 article-title: Recent advances in multimedia information system security publication-title: Informatica – ident: 10.1016/j.compeleceng.2011.05.011_b0045 doi: 10.1007/11922841_19 – volume: 3 start-page: 890 issue: 9 year: 2003 ident: 10.1016/j.compeleceng.2011.05.011_b0120 article-title: An efficient feature extraction method with pseudo-Zernike moment in RBF neural network-based human face recognition system publication-title: EURASIP J Appl Signal Process doi: 10.1155/S1110865703305128 – ident: 10.1016/j.compeleceng.2011.05.011_b0065 doi: 10.1109/ISCAS.2005.1465609 – ident: 10.1016/j.compeleceng.2011.05.011_b0010 doi: 10.4018/978-1-59904-513-9 – ident: 10.1016/j.compeleceng.2011.05.011_b0090 doi: 10.1109/ISCAS.2002.1010302 – ident: 10.1016/j.compeleceng.2011.05.011_b0035 doi: 10.1109/WCINS.2010.5541888 – volume: 42 start-page: 3057 issue: 11 year: 2009 ident: 10.1016/j.compeleceng.2011.05.011_b0100 article-title: A robust digital audio watermarking based on statistics characteristics publication-title: Pattern Recogn doi: 10.1016/j.patcog.2009.01.015 – volume: 20 start-page: 1087 issue: 4 year: 2010 ident: 10.1016/j.compeleceng.2011.05.011_b0115 article-title: Copyright-proving scheme for audio with counter-propagation neural networks publication-title: Digit Signal Process doi: 10.1016/j.dsp.2009.12.001 |
| SSID | ssj0004618 |
| Score | 2.0464084 |
| Snippet | Desynchronization attack is known as one of the most difficult attacks to resist, for it can desynchronize the location of the watermark and hence causes... |
| SourceID | proquest crossref elsevier |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 425 |
| SubjectTerms | Algorithms Audio signals Computer simulation Digital Origins Synchronism Synchronization Watermarking |
| Title | A pseudo-Zernike moment based audio watermarking scheme robust against desynchronization attacks |
| URI | https://dx.doi.org/10.1016/j.compeleceng.2011.05.011 https://www.proquest.com/docview/901680138 |
| Volume | 37 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) customDbUrl: eissn: 1879-0755 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0004618 issn: 0045-7906 databaseCode: GBLVA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier ScienceDirect customDbUrl: eissn: 1879-0755 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0004618 issn: 0045-7906 databaseCode: .~1 dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier ScienceDirect customDbUrl: eissn: 1879-0755 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0004618 issn: 0045-7906 databaseCode: ACRLP dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier ScienceDirect customDbUrl: eissn: 1879-0755 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0004618 issn: 0045-7906 databaseCode: AIKHN dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals customDbUrl: mediaType: online eissn: 1879-0755 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0004618 issn: 0045-7906 databaseCode: AKRWK dateStart: 19730601 isFulltext: true providerName: Library Specific Holdings |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8QwEA6iIHoQn_gmgtfqtk3SFrwsoqyKnhTES0yaidRHu-y2iBd_u5k-dBUEwVOhNLTMJPNNk_m-IWQ_scwlsQa8QEXcY9ytOaXBeiYRHMJAM1P3WLq8EoMbdn7Lb6fIcceFwbLKNvY3Mb2O1u2dw9aah8MsQ44v41Hi8MhvGKPIYGcRdjE4ePcnuJF-E40ZSjP2xCzZ-6rxwrJtbDcD-UOr5okinv5vGPUjWtcQdLpIFtrckfabz1siU5Avk_kJRcEVct-nwzFUpvDuYJRnT0BfUGKhpIhWhqrKZAV9VXU8rnfJqfu7hRego0JX45KqB5W5hJEaGL_laS2c2_A0qSpLpOOvkpvTk-vjgdc2UfDSkIelx0RgQqascWCtheCWW6Ni49au4IEVWnCtoZcoy0yE6ROWQjkH2UjHoUkjE66R6bzIYZ1Q5eDe8jRNIw3Mgq9Z4p6AUKRxYoOe2SBxZzaZtgrj2OjiWXalZI9ywuISLS57XLrLBgk-hw4bmY2_DDrqfCO_zRnp4OAvw2nnT-nWFB6UqByKaixdjiRiPMLd_N8btshcswWN1b3bZLocVbDjcphS79aTdJfM9M8uBlcfu4j1fQ |
| linkProvider | Elsevier |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NS91AEB_UgtaD1I9S-7mC1-hLsrtJoBcR5bVVTwrSy7qbnX3E1uTxXkLpxb-9O_morwVB8BQIGTbM7M5vdnfmNwD7meM-iLUYRDoRARd-zWmDLrCZFBhHhtu2x9L5hRxf8a_X4noJjodaGEqr7H1_59Nbb92_Oey1eTgtCqrx5SLJPB6FXcXoMrzgIkpoB3ZwHy4UR4adO-bEzTiSq7D3kORFedvUbwbLSU_nSSye4WMg9Z-7bjHo9BVs9MEjO-r-bxOWsNyC9QVKwW24OWLTOTa2Cr7jrCx-ILsjjoWaEVxZphtbVOyXbh1ye0zO_PYW75DNKtPMa6YnuvARI7M4_13mLXNuV6jJdF1TPf4OXJ2eXB6Pg76LQpDHIq4DLiMbc-2sR2sjpXDCWZ1av3iliJw0UhiDo0w7bhOKnygXylvIJSaNbZ7Y-DWslFWJb4Bpj_dO5HmeGOQOQ8Mz_wXGMk8zF43sLqSD2lTeU4xTp4ufasglu1ULGlekcTUSyj92IforOu14Np4i9Hmwjfpn0iiPB08RZ4M9lV9UdFOiS6yaufJBkkzpDvft80b4BGvjy_Mzdfbl4ts7eNmdR1Oq73tYqWcNfvABTW0-thP2D2ZF9xI |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+pseudo-Zernike+moment+based+audio+watermarking+scheme+robust+against+desynchronization+attacks&rft.jtitle=Computers+%26+electrical+engineering&rft.au=Wang%2C+Xiang-Yang&rft.au=Ma%2C+Tian-Xiao&rft.au=Niu%2C+Pan-Pan&rft.date=2011-07-01&rft.issn=0045-7906&rft.volume=37&rft.issue=4&rft.spage=425&rft.epage=443&rft_id=info:doi/10.1016%2Fj.compeleceng.2011.05.011&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_compeleceng_2011_05_011 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0045-7906&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0045-7906&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0045-7906&client=summon |