会议专题

An authentication algorithm of audio aggregate Based on the (k, n/k=n) method

In this paper, an authentication algorithm of audio aggregate based on the (k, n/k=n) method is proposed, which can implement integrity authentication for audio aggregation. Watermark was distributed into n shares by means of the (k, n) method, and these n shares were embedded into each audio carrier of aggregation. Because the watermark is embedded into the whole audio aggregation, the watermark is only visible in the aggregation while it is not meaningful in each audio. The k sharing watermarks were recovered from k audio carriers in aggregation, and then the watermark was constructed by the (k, n) method. In the paper, k is set as n. The recovered watermark is relative with all detected audio signals in aggregation, which improved the fragility of the proposed algorithm. Experimental results show that the proposed algorithm has good imperceptibility, strong fragility and low computational complexity. (Abstract)

audio aggregation (k, n) method authentication,watermarking (key words)

Yiqun Xiong Rangding Wang

CKC Software Lab Ningbo University Ningbo, China

国际会议

The 2010 2nd International Conference on Future Computer and Communication(第二届未来计算机与通信国际会议 ICFCC 2010)

武汉

英文

69-73

2010-05-21(万方平台首次上网日期,不代表论文的发表时间)