Title :
An authentication algorithm of audio aggregate based on the (k, n/k=n) method
Author :
Xiong, Yiqun ; Wang, Rangding
Author_Institution :
CKC Software Lab., Ningbo Univ., Ningbo, China
Abstract :
In this paper, an authentication algorithm of audio aggregate based on the (k, n/k=n) method is proposed, which can implement integrity authentication for audio aggregation. Watermark was distributed into n shares by means of the (k, n) method, and these n shares were embedded into each audio carrier of aggregation. Because the watermark is embedded into the whole audio aggregation, the watermark is only visible in the aggregation while it is not meaningful in each audio. The k sharing watermarks were recovered from k audio carriers in aggregation, and then the watermark was constructed by the (k, n) method. In the paper, k is set as n. The recovered watermark is relative with all detected audio signals in aggregation, which improved the fragility of the proposed algorithm. Experimental results show that the proposed algorithm has good imperceptibility, strong fragility and low computational complexity.
Keywords :
audio signal processing; computational complexity; message authentication; watermarking; audio aggregation; authentication algorithm; computational complexity; integrity authentication; watermark; Aggregates; Algorithm design and analysis; Authentication; Computational complexity; Copyright protection; Cryptography; Information technology; Signal detection; Software algorithms; Watermarking; (k, n) method; audio aggregation; authentication; watermarking;
Conference_Titel :
Future Computer and Communication (ICFCC), 2010 2nd International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-5821-9
DOI :
10.1109/ICFCC.2010.5497288