Reversible Audio Watermarking Algorithm Using Non-Causal Prediction

来源 :武汉大学自然科学学报(英文版) | 被引量 : 0次 | 上传用户:lhihxk
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Reversible watermarking technique enables to extract embedded information without any loss of the host signal.For the reduction of the embedding distortion, a desirable reversible wa termarking approach should exploit efficient prediction way to generate prediction errors with a smaller magnitude for expansion embedding.In this paper, we present a reversible audio water marking scheme based on a new non-causal prediction method and embedding strategy.The proposed non-causal prediction method provides non-integer prediction errors and the proposed expansion embedding strategy can proceed them for a lower embedding dis tortion.Experimental results have shown that the proposed re versible technique has a lower embedding distortion for the same embedding payload in comparison with the existing state-of-the art works.
其他文献
  In the data encryption standard (DES) algorithm, there exist several bit-switching functions, including permutations, ex pansion, and permuted choices.They
In this paper, we propose a novel space efficient secret sharing scheme on the basis of minimal linear codes, which satisfies the definition of a computationall
期刊
  In this paper, the cyclic code of the classic circuit is transformed and transplanted; then, the quantum encoding scheme based on cyclic code and quantum er
一.目的:   目前肾移植术已较为成熟,在经历了手术技术、宿主对异体器官排斥反应的困难之后,术后感染已成为器官移植病人的重要并发症和死亡原因,其中肺部感染最为常见。鉴于
本试验用新型栽培种(A)、普通栽培种(T)和能产生2n花粉(FDR)的二倍体杂种(D)以不完全双列杂交设计配制杂种并产生5个杂种群体(TA、TD、AD、AA及TT).这些群体的无性系按完全随
  The mobile botnet, developed from the traditional PC-based botnets, has become a practical underlying trend.In this paper, we design a mobile botnet, which
期刊
Network coding can improve network throughput in large, but it is vulnerable to the data pollution attacks. In this paper, we propose an efficient homomorphic m
期刊
目的 在家兔心肌缺血再灌注模型上观察低温和蟾酥及两者合用对心肌缺血再灌注损伤的保护作用。 方法 将新西兰大耳白兔分随机为五组:A对照组(n=6),左冠状动脉(LAD)穿线但不结
  Protecting the security of sensitive information has become a matter of great concern to everyone.Data hiding tech nique solves the problem to some extent,
期刊
  To solve the problem that the traditional location-based services anonymity model is not applied to the continuous query,quasi real-time cloak algorithm (QR
期刊