西北民族大学电气工程学院电子信息工程(1)班西北民族大学电气工程学院电子信息工程(1)班DWT和DCT结合的变换域音频水印摘要近年来随着网络通信和多媒体技术的迅速发展,盗版问题非常明显,数字水印是一种可以在开放网络环境下保护版权和认证来源的新技术。它将特定意义的标记隐藏在数字图像、音频等数字产品中,来验证创作者对其作品的所有权。音频水印技术主要利用了人类听觉模型,在不影响音频信号质量的前提下,将水印信息隐藏在人耳不能感知的位置,来隐藏水印数据。本文研究DWT和DCT结合的音频水印算法,首先对音频信号进行DWT和DCT变换,根据水印的大小把DCT系数均匀分段,采用量化的方法把直观的二值黑白图像嵌入音频中,然后利用攻击函数攻击音频信号,再从含水印的音频中提取出水印信息,最后通过MATLAB仿真计算信噪比和归一化系数,验证该算法是否具有良好的安全性、鲁棒性和不可感知性。关键字音频水印,离散小波变换,离散余弦变换ABSTRACTInrecentyears,withthedevelopmentofthenetworkcommunicationandmultimediatechnology,theproblemofpiracyisbecomingmoreandmoreobvious.Digitalwatermarkingisanewkindoftechnology,whichcanbeusedtoprotectcopyrightandcertificatesourceundertheopeningnetworkenvironment.Thetechnologywillhidethespecialmarkersinthedigitalimage、audiotoprovethecreators'ownershipoftheirworks.Ontheconditionofnotaffectingthequalityofaudiosignal,audio西北民族大学电气工程学院电子信息工程(1)班watermarkingtechnologymainlyusesthehumanhearingmodeltohidethewatermarkinginformationinthepositionwherepeoples'eyescannotperceive.ThepaperstudiedtheaudiowatermarkingalgorithmbasedonDWTandDCT.FirstlymadeDWTandDCTtransformation,thenDCTcoefficientsweresegmentedequallyaccordingtothesizeofwatermark.Byusingthequantificationmethod,intuitivebinaryblackandwhiteimageswereembededintotheaudiosignal.Laterattackfunctionsareusedtoattacktheaudiosignalandthenextractthewatermarkinginformation.AtlastthoughtheMATLABsimulation,calculatesignaltonoiseratioandnormalizedcoefficienttoprovewhetherthealgorithmsatisfytherequirementsofimperceptibility,safetyandrobustnessornot.Keyword:Audiowatermark,Discretewavelettransform,Discretecosinetransform西北民族大学电气工程学院电子信息工程(1)班目录1.绪论.........................................................................................................................................11.1音频水印的发展..........................................................................................................11.2数字水印原理及简单模型..........................................................................................11.3数字音频水印存在的问题..........................................................................................32.数字音频水印.........................................................................................................................42.1数字音频水印原理及模型..........................................................................................42.1.1数字音频水印的原理及一般模型....................................................................42.1.2音频水印的要求................................................................................................52.2数字音频水印的算法..................................................................................................62.2.1音频水印算法的分类........................................................................................62.2.2音频水印的攻击算法........................................................................................73.DWT和DCT结合的音频水印算法......................................................................................83.1小波变换与余弦变换的理论知识..............................................................................83.1.1小波变换的理论知识........................................................................................83.1.2离散的余弦变换..............................................................................................103.2图像的置乱与加密技术............................................................................................103.2.1图像的Arnold置乱及其恢复.........................................................................103.2.2混沌序列的产生..............................................................................................123.2.3混合光学双稳模型加密水印图像..................................................................123.2.4量化嵌入水印的原理......................................................................................133.3DWT、DCT相结合音频水印的算法步骤..............................................................143.3.1水印嵌入前的预处理操作..............................................................................143.3.2嵌入水印..........................................................................................................143.3.3提取水印..........................................................................................................163.3.4性能分析..........................................................................................................164.MATLAB仿真与结论...........................................................................................................184.1MATLAB仿真测试..................................................................................................184.1.1不可感知性的测试..........................................................................................194.1.2安全性的测试..................................................................................................214.1.3鲁棒性测试......................................................................................................224.2总结............................................................................................................................254.3展望...................................