Academic literature on the topic 'Spread Spectrum Audio Watermarking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Spread Spectrum Audio Watermarking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Spread Spectrum Audio Watermarking"

1

Can, Yekta Said, Fatih Alagoz, and Melih Evren Burus. "A Novel Spread Spectrum Digital Audio Watermarking Technique." Journal of Advances in Computer Networks 2, no. 1 (2014): 6–9. http://dx.doi.org/10.7763/jacn.2014.v2.71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kirovski, D., and H. S. Malvar. "Spread-spectrum watermarking of audio signals." IEEE Transactions on Signal Processing 51, no. 4 (April 2003): 1020–33. http://dx.doi.org/10.1109/tsp.2003.809384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

HARAHAP, HANNAN, GELAR BUDIMAN, and LEDYA NOVAMIZANTI. "Implementasi Teknik Watermarking menggunakan FFT dan Spread Spectrum Watermark pada Data Audio Digital." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 4, no. 1 (May 2, 2018): 98. http://dx.doi.org/10.26760/elkomika.v4i1.98.

Full text
Abstract:
ABSTRAKPenggunaan teknologi dan internet yang berkembang dengan pesat menyebabkan banyak pemalsuan dan penyebaran yang tidak sah terhadap data digital. Oleh karena itu, sangat diperlukan suatu teknologi yang dapat melindungi hak cipta data multimedia seperti audio. Teknik yang sering digunakan dalam perlindungan hak cipta adalah watermarking karena teknik ini memiliki tiga kriteria utama dalam keamanan data, yaitu robustness, imperceptibility, dan safety. Untuk itu, pada penelitian ini dirancang suatu skema yang dapat melindungi hak cipta data audio. Metode yang digunakan adalah Fast Fourier Transform, yang mengubah data audio asli ke dalam domain frekuensi sebelum dilakukan proses penyisipan watermark dan proses ekstraksi watermark. Watermark disebar pada komponen yang paling signifikan dari spektrum magnitude audio host. Teknik watermarking pada penelitian ini dapat menghasilkan Signal-to-Noise Ratio di atas 20 dB dan Bit Error Rate di bawah 5%.Kata kunci: Audio watermarking, Copyright Protection, Fast Fourier Transform, Spektrum magnitudeABSTRACTThe use of technology and internet has grown rapidly that causes a lot of forgery and illegal proliferation of digital data. It needs a technology that can protect the copyright of multimedia data such as audio. The most common technique in copyright protection is watermarking because it has three main criteria in data security: robustness, imperceptibility, and safety. This research created a scheme that can protect a copyright of audio data. The method that we used is Fast Fourier Transform. This method changes the original audio data into frequency domain before the embedding and extraction process. The watermark is spread into the most significant component of the magnitude spectrum of audio host. This technique obtains Signal-to-Noise Ratio above 20 dB and Bit Error Rate below 5%.Keywords: Audio watermarking, Copyright Protection, Fast Fourier Transform, Magnitude spectrum
APA, Harvard, Vancouver, ISO, and other styles
4

Malik, H., R. Ansari, and A. Khokhar. "Robust audio watermarking using frequency-selective spread spectrum." IET Information Security 2, no. 4 (2008): 129. http://dx.doi.org/10.1049/iet-ifs:20070145.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

LI, L., and X. FANG. "Robust Detection Algorithm for Spread Spectrum Audio Watermarking." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E91-A, no. 11 (November 1, 2008): 3389–92. http://dx.doi.org/10.1093/ietfec/e91-a.11.3389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

He, Xing, and Michael S. Scordilis. "Efficiently Synchronized Spread-Spectrum Audio Watermarking with Improved Psychoacoustic Model." Research Letters in Signal Processing 2008 (2008): 1–5. http://dx.doi.org/10.1155/2008/251868.

Full text
Abstract:
This paper presents an audio watermarking scheme which is based on an efficiently synchronized spread-spectrum technique and a new psychoacoustic model computed using the discrete wavelet packet transform. The psychoacoustic model takes advantage of the multiresolution analysis of a wavelet transform, which closely approximates the standard critical band partition. The goal of this model is to include an accurate time-frequency analysis and to calculate both the frequency and temporal masking thresholds directly in the wavelet domain. Experimental results show that this watermarking scheme can successfully embed watermarks into digital audio without introducing audible distortion. Several common watermark attacks were applied and the results indicate that the method is very robust to those attacks.
APA, Harvard, Vancouver, ISO, and other styles
7

Zhaopin, SU, ZHANG Guofu, ZHOU Xianxian, and LI Wangwang. "Segment‐Adaptive Spread Spectrum Audio Watermarking Using NSGA‐II." Chinese Journal of Electronics 30, no. 4 (July 2021): 727–35. http://dx.doi.org/10.1049/cje.2021.05.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shokri, Shervin, Mahamod Ismail, Nasharuddin Zainal, and Abdollah Shokri. "BER Performance of Audio Watermarking Using Spread Spectrum Technique." Procedia Technology 11 (2013): 107–13. http://dx.doi.org/10.1016/j.protcy.2013.12.168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Budiman, Gelar, Andriyan Bayu Suksmono, and Donny Danudirdjo. "FFT-Based Data Hiding on Audio in LWT-Domain Using Spread Spectrum Technique." Elektronika ir Elektrotechnika 26, no. 3 (June 26, 2020): 20–27. http://dx.doi.org/10.5755/j01.eie.26.3.23950.

Full text
Abstract:
Audio watermarking is a process to hide digital data without being seen or heard by the sense of sight or hearing. Watermaking is applied to insert the copyright on digital media, such as an image file, an audio file or a video file. In this paper, we propose watermarking procedure to embed spread spectrum watermark into frequency domain of adaptive selected subband from host audio. Lifting Wavelet Transform (LWT) is used to decompose the host audio into several subbands, and then Fast Fourier Transform (FFT) transforms selected several subbands with lowest energy. The watermark image is converted into one-dimensional signal, then it is modulated by imperceptible pseudo-noise (PN) code with controlled gain. Next, the frequency domain of audio is added by modulated and imperceptible watermark prior to transforming it to time domain by Inverse FFT (IFFT) obtaining watermarked subbands. Finally, the watermarked subbands are combined with other unused subbands by inverse LWT (ILWT) becoming the perfect version of watermarked audio. The result of this method has good robustness against most attacks from stirmark benchmark experiments, good imperceptibility with Signal to Noise Ratio (SNR) more than 30 dB and payload 172.66 bps.
APA, Harvard, Vancouver, ISO, and other styles
10

Wu, Shiqiang, Ying Huang, Hu Guan, Shuwu Zhang, and Jie Liu. "ECSS: High-Embedding-Capacity Audio Watermarking with Diversity Reception." Entropy 24, no. 12 (December 17, 2022): 1843. http://dx.doi.org/10.3390/e24121843.

Full text
Abstract:
Digital audio watermarking is a promising technology for copyright protection, yet its low embedding capacity remains a challenge for widespread applications. In this paper, the spread-spectrum watermarking algorithm is viewed as a communication channel, and the embedding capacity is analyzed and modeled with information theory. Following this embedding capacity model, we propose the extended-codebook spread-spectrum (ECSS) watermarking algorithm to heighten the embedding capacity. In addition, the diversity reception (DR) mechanism is adopted to optimize the proposed algorithm to obtain both high embedding capacity and strong robustness while the imperceptibility is guaranteed. We experimentally verify the effectiveness of the ECSS algorithm and the DR mechanism, evaluate the performance of the proposed algorithm against common signal processing attacks, and compare the performance with existing high-capacity algorithms. The experiments demonstrate that the proposed algorithm achieves a high embedding capacity with applicable imperceptibility and robustness.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Spread Spectrum Audio Watermarking"

1

Heitel, Tomáš. "Využití psychoakustického modelu a tranformace typu wavelet packet pro vodoznačení audio signálů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218556.

Full text
Abstract:
This Thesis deals with a method to enforce the intellectual property rights and protect digital media from tampering – Digital Audio Watermarking. The main aim of this work is implement an audio watermarking algorithm. The theoretical part defined basic terms, methods and processes, which are used in this area. The practical part shows a process of embedding the digital signature into a host signal and her backward extraction. The embedding rule used spread spectrum technique and a psychoacoustic model. The implemented psychoacoustic model involves two properties of the human auditory system which are frequency masking and representation the frequency scale on limited bands called critical bands. The model is relatively new and based on the DWPT. In terms of above model is then the digital watermark embedded in the wavelet domain. This algorithm is implemented in technical software MATLAB. One part of this work focuses on robustness tests of the algorithm. Common signal processing modifications are applied to the watermarked audio as follows: Cutting of the audio, re-sampling, lossy compression, filtering, equalization, modulation effects, noise addition. The last part of the thesis presents subjective and objective methods usable in order to judge the influence of watermarking embedding on the quality of audio tracks called transparency.
APA, Harvard, Vancouver, ISO, and other styles
2

Kabourek, Jiří. "Využití maskovacích efektů pro vodoznačení audio dat." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217497.

Full text
Abstract:
In this work is presented technique for embedding digital watermark in digital audio signals. Digital watermark must be imperceptible and should be robust against attacks and other types of distortion. Algorithm is implemented for embedding digital watermark using technique spread-spectrum and psychoacoustic model ISO-MPEG I layer I. Robustness was tested for filtering signal, MP3 compression and resample method.
APA, Harvard, Vancouver, ISO, and other styles
3

George, Mercy. "Spread spectrum watermarking for images and video." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape8/PQDD_0006/MQ46574.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Siyue. "Chaotic spread spectrum with application to digital image watermarking." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ65151.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Serdean, Cristian Vasile. "Spread spectrum-based video watermarking algorithms for copyright protection." Thesis, University of Plymouth, 2002. http://hdl.handle.net/10026.1/2263.

Full text
Abstract:
Digital technologies know an unprecedented expansion in the last years. The consumer can now benefit from hardware and software which was considered state-of-the-art several years ago. The advantages offered by the digital technologies are major but the same digital technology opens the door for unlimited piracy. Copying an analogue VCR tape was certainly possible and relatively easy, in spite of various forms of protection, but due to the analogue environment, the subsequent copies had an inherent loss in quality. This was a natural way of limiting the multiple copying of a video material. With digital technology, this barrier disappears, being possible to make as many copies as desired, without any loss in quality whatsoever. Digital watermarking is one of the best available tools for fighting this threat. The aim of the present work was to develop a digital watermarking system compliant with the recommendations drawn by the EBU, for video broadcast monitoring. Since the watermark can be inserted in either spatial domain or transform domain, this aspect was investigated and led to the conclusion that wavelet transform is one of the best solutions available. Since watermarking is not an easy task, especially considering the robustness under various attacks several techniques were employed in order to increase the capacity/robustness of the system: spread-spectrum and modulation techniques to cast the watermark, powerful error correction to protect the mark, human visual models to insert a robust mark and to ensure its invisibility. The combination of these methods led to a major improvement, but yet the system wasn't robust to several important geometrical attacks. In order to achieve this last milestone, the system uses two distinct watermarks: a spatial domain reference watermark and the main watermark embedded in the wavelet domain. By using this reference watermark and techniques specific to image registration, the system is able to determine the parameters of the attack and revert it. Once the attack was reverted, the main watermark is recovered. The final result is a high capacity, blind DWr-based video watermarking system, robust to a wide range of attacks.
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Xiang. "PHYSICAL LAYER WATERMARKING OF DIRECT SEQUENCE SPREAD SPECTRUM SIGNALS." Cleveland State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=csu1368527408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Prandolini, Robert John. "Process gain recovery of direct-sequence spread-spectrum in a time-warped channel." Thesis, Queensland University of Technology, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chammem, Afef. "Robust watermarking techniques for stereoscopic video protection." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00917964.

Full text
Abstract:
The explosion in stereoscopic video distribution increases the concerns over its copyright protection. Watermarking can be considered as the most flexible property right protection technology. The watermarking applicative issue is to reach the trade-off between the properties of transparency, robustness, data payload and computational cost. While the capturing and displaying of the 3D content are solely based on the two left/right views, some alternative representations, like the disparity maps should also be considered during transmission/storage. A specific study on the optimal (with respect to the above-mentioned properties) insertion domain is also required. The present thesis tackles the above-mentioned challenges. First, a new disparity map (3D video-New Three Step Search - 3DV-NTSS) is designed. The performances of the 3DV-NTSS were evaluated in terms of visual quality of the reconstructed image and computational cost. When compared with state of the art methods (NTSS and FS-MPEG) average gains of 2dB in PSNR and 0.1 in SSIM are obtained. The computational cost is reduced by average factors between 1.3 and 13. Second, a comparative study on the main classes of 2D inherited watermarking methods and on their related optimal insertion domains is carried out. Four insertion methods are considered; they belong to the SS, SI and hybrid (Fast-IProtect) families. The experiments brought to light that the Fast-IProtect performed in the new disparity map domain (3DV-NTSS) would be generic enough so as to serve a large variety of applications. The statistical relevance of the results is given by the 95% confidence limits and their underlying relative errors lower than er<0.1
APA, Harvard, Vancouver, ISO, and other styles
9

Soderi, S. (Simone). "Evaluation of industrial wireless communications systems’ security." Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526212463.

Full text
Abstract:
Abstract The worldwide success of wireless communications was originally fueled by the possibility to replace existing cables with wireless solutions. This phenomenon imposed the development of security engineering as a multidisciplinary field. Although wireless solutions can reduce installation costs and allow introducing new services, the end–users expect it to have the same level of security as they would normally have with wired solutions. Secure communications is an important part of the overall security of industrial wireless communications systems (IWCS). The aim of this thesis is to develop new security engineering methodologies for IWCS. The author develops countermeasures against confidentiality and integrity attacks and carries out a security analysis covering the protocol, electromagnetic and physical layer. In the first part of the thesis, Host Identity Protocol (HIP) is utilized to secure communication in an intra–vehicular network. Simulations and measurement campaigns are also conducted to evaluate the impact of the overhead on security in a tunnel, considering line–of–sight (LOS) and non–LOS (NLOS) scenarios. Electromagnetic analysis (EMA) is an important step in the development of safety–related systems. Today, the increasing usage of smaller integrated circuit also increases the susceptibility to electromagnetic (EM) interference. From near–field (NF) to far–field (FF) transformation, a method for the evaluation of the emissions leakage is investigated. The virtual EM (VEM) interface of the device–under–test (DUT) is studied, and it is described how an adversary can exploit it for denial of service (DoS) attacks. An effective jamming attack model is studied, and the theoretical calculations are validated with experiment–based results. Finally, focusing attention on physical layer security, two algorithms are developed. Active radio frequency fingerprinting (RFF) implements the exchange of a public key during the setup of secure communication. Afterwards, utilizing a jamming receiver in conjunction with the spread spectrum (SS) watermarking technique, the watermark–based blind physical layer security (WBPLSec) protocol is presented. The analysis and results indicate how the WBPLSec seems to be a valuable technique for deploying physical layer security by creating a secure region around the receiver
Tiivistelmä Langattoman tietoliikenteen maailmanlaajuista suosiota kiihdytti alun perin mahdollisuus korvata tietoliikennejärjestelmissä käytetyt kaapelit langattomilla ratkaisuilla. Ilmiö lisäsi myös tarvetta kehittää alan turvatekniikkaa monialaisen tutkimuksen pohjalta. Vaikka langattomat ratkaisut merkitsevät pienempiä asennuskustannuksia ja tarjoavat mahdollisuuksia luoda uudenlaisia palveluja, järjestelmien loppukäyttäjät edellyttävät kuitenkin niiden turvallisuuden olevan vastaavalla tasolla kuin langallisissa verkoissa. Myös teollisuuden langattomien tietoliikennejärjestelmen turvallisuus riippuu pitkälti viestintäkanavien turvallisuudesta. Väitöksen tavoitteena on kehittää uusia menetelmiä, joilla teollisuuden langattomat tietoliikennejärjestelmät voitaisiin turvata. Väitöksessä kehitetään toimenpiteitä tietoliikennejärjestelmien luottamuksellisuuteen ja koskemattomuuteen kohdistuvia hyökkäyksiä vastaan ja toteutetaan turvallisuusarviointi, joka kattaa järjestelmän protokollakerroksen sekä sähkömagneettisen ja fyysisen kerroksen. Väitöksen ensimmäisessä osassa hyödynnetään HIP–protokollaa (Host Identity Protocol) liikennevälineen sisäisen tietoliikennejärjestelmän turvallisuuden varmistamisessa. Lisäksi siinä kuvataan simulaatiot ja mittaushankkeet, joiden tavoitteena on arvioida käytetyn protokollan turvallisuusvaikutuksia esteettömän (line–of–sight, LOS) ja esteellisen (non–line–of–sight, NLOS) näköyhteyden tapauksissa. Sähkömagneettinen analyysi on tärkeä vaihe turvajärjestelmien kehitysprosessissa. Järjestelmissä käytetään yhä enemmän pieniä integroituja piirejä, mikä voi myös altistaa ne sähkömagneettisille (electromagnetic, EM) häiriöille. Väitöksessä tutkitaan lähikenttä–kaukokenttä -muunnokseen perustuvan arviointimenetelmän avulla sähkömagneettisen vuotosäteilyn tasoa. Lisäksi perehdytään testattavan laitteen (device under test, DUT) virtuaaliseen EM–liitäntään ja kuvataan, miten vastaavaa liitäntää voidaan hyödyntää palvelunestohyökkäyksissä. Väitöksessä tutkitaan myös tehokasta häirintämallia ja validoidaan teoreettisten laskelmien tulokset kokeellisesti. Lopuksi väitöksessä keskitytään tietoliikennejärjestelmän fyysisen kerroksen turvallisuuteen ja kehitetään kaksi algoritmia. Aktiivisen radiotaajuisen tunnistusmenetelmän avulla voidaan vaihtaa julkisia avaimia turvallista tietoliikenneyhteyttä muodostettaessa. Lisäksi esitellään vesileimausmenetelmään perustuva fyysisen kerroksen salausmenetelmä, WBPLSec. WBPLSec luo vastaanottimen ympärille suoja–alueen, minkä ansiosta se vaikuttaa analyysin ja tutkimustulosten perusteella olevan tehokas menetelmä toteuttaa fyysisen kerroksen suojaus
APA, Harvard, Vancouver, ISO, and other styles
10

Mathon, Benjamin. "Développement de méthodes de tatouage sûres pour le traçage de contenus multimédia." Phd thesis, Université de Grenoble, 2011. http://tel.archives-ouvertes.fr/tel-00618613.

Full text
Abstract:
Dans cette thèse, nous étudions dans une première partie l'impact de la contrainte de sécurité en tatouage. Dans le contexte WOA (Watermarked contents Only Attack), un adversaire possède plusieurs contenus tatoués et cherche à estimer la clé secrète d'insertion afin d'accéder aux messages cachés. Une nouvelle manière de tatouer en étalement de spectre est présentée ici. Celle-ci est basée sur la construction de distributions circulaires dans le sous-espace secret de tatouage. Cette technique permet de minimiser la distorsion en moyenne provoquée par l'ajout de la marque dans le contexte WOA en utilisant l'algorithme d'optimisation des Hongrois et la théorie du transport. Nous vérifions ensuite qu'un tatouage sûr est utilisable en pratique en prenant comme exemple le tatouage d'images naturelles. Dans une seconde partie, nous nous intéressons au cadre de l'estampillage d'oe uvres numériques permettant de tracer les redistributeurs de copies illégales. Les codes traçants utilisés sont ceux proposés par Gabor Tardos et sont résistants aux attaques de coalition, c'est-à-dire au groupement d'adversaires mettant en commun leurs contenus numériques afin de forger une version pirate. Puisque les techniques de tatouage permettent l'insertion de codes traçants dans un contenu numérique, nous avons conçu une attaque "au pire cas" qui dépend du niveau de sécurité et qui permet, pour les adversaires, de baisser leur accusation. Nous montrons que pour le cas particulier de l'estampillage un tatouage sûr sera plus efficace qu'un tatouage non-sûr (à robustesse équivalente). Finalement, une implantation des codes traçants dans un contenu vidéo utilisant des méthodes sûres par étalement de spectre est proposée. Nous montrons alors l'efficacité de l'accusation des adversaires dans ce cadre pratique.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Spread Spectrum Audio Watermarking"

1

Maity, Santi P. Spread Spectrum Watermarking: Principles and Applications in Fading Channel. INTECH Open Access Publisher, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

(Editor), Stefan Katzenbeisser, and Fabien, A.P. Petitcolas (Editor), eds. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House Publishers, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Spread Spectrum Audio Watermarking"

1

Abubakar, Adamu I., Akram M. Zeki, Haruna Chiroma, Sanah Abdullahi Muaz, Eka Novita Sari, and Tutut Herawan. "Spread Spectrum Audio Watermarking Using Vector Space Projections." In Advances in Intelligent Systems and Computing, 297–307. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-11218-3_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cvejic, Nedeljko, and Tapio Seppänen. "Increasing Robustness of an Improved Spread Spectrum Audio Watermarking Method Using Attack Characterization." In Digital Watermarking, 467–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24624-4_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xue, Yiming, Kai Mu, Yan Li, Juan Wen, Ping Zhong, and Shaozhang Niu. "Improved High Capacity Spread Spectrum-Based Audio Watermarking by Hadamard Matrices." In Digital Forensics and Watermarking, 124–36. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11389-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nishimura, Akira. "Reversible and Robust Audio Watermarking Based on Spread Spectrum and Amplitude Expansion." In Digital-Forensics and Watermarking, 215–29. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19321-2_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Koz, Alper, and Claude Delpha. "Adaptive Selection of Embedding Locations for Spread Spectrum Watermarking of Compressed Audio." In Digital Forensics and Watermarking, 97–110. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32205-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhu, Yan, Dengguo Feng, and Wei Zou. "Collusion Secure Convolutional Spread Spectrum Fingerprinting." In Digital Watermarking, 67–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11551492_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kuribayashi, Minoru. "Coded Spread Spectrum Watermarking Scheme." In Digital Forensics and Watermaking, 169–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40099-5_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Meerwald, Peter, and Andreas Uhl. "Scalability Evaluation of Blind Spread-Spectrum Image Watermarking." In Digital Watermarking, 61–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04438-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Piper, Angela, Reihaneh Safavi-Naini, and Alfred Mertins. "Coefficient Selection Methods for Scalable Spread Spectrum Watermarking." In Digital Watermarking, 235–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24624-4_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Karabat, Cagatay. "Space Time Block Coding for Spread Spectrum Watermarking Systems." In Digital Watermarking, 266–77. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04438-0_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Spread Spectrum Audio Watermarking"

1

Lili Li and Xiangzhong Fang. "Adaptive detection for spread spectrum audio watermarking." In 2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS). IEEE, 2010. http://dx.doi.org/10.1109/wcins.2010.5541888.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tafreshi, Hosein Fami, and Ali Asghar Soltani Farani. "Spread spectrum audio watermarking: Enhancement of detection and watermarking capacity." In 2014 22nd Iranian Conference on Electrical Engineering (ICEE). IEEE, 2014. http://dx.doi.org/10.1109/iraniancee.2014.6999767.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shokri, Shervin, Mahamod Ismail, Nasharuddin Zainal, and Abdollah Shokri. "Error probability in spread spectrum (SS) audio watermarking." In 2013 International Conference on Space Science and Communication (IconSpace). IEEE, 2013. http://dx.doi.org/10.1109/iconspace.2013.6599457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lili Li and Xiangzhong Fang. "New detection scheme for spread spectrum audio watermarking." In 2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS). IEEE, 2010. http://dx.doi.org/10.1109/wcins.2010.5541794.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Garlapati, Bala Mallikarjunarao, and Srinivasa Rao Chalamala. "A Symbol Based Watermarking Approach for Spread Spectrum Audio Watermarking Methods." In 2016 7th International Conference on Intelligent Systems, Modelling and Simulation (ISMS). IEEE, 2016. http://dx.doi.org/10.1109/isms.2016.31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cheng, Samuel, Heather Yu, and Zixiang Xiong. "Enhanced spread spectrum watermarking of MPEG-2 AAC audio." In Proceedings of ICASSP '02. IEEE, 2002. http://dx.doi.org/10.1109/icassp.2002.5745466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Baranwal, Neha, and Kamalika Datta. "Comparative study of spread spectrum based audio watermarking techniques." In 2011 International Conference on Recent Trends in Information Technology (ICRTIT). IEEE, 2011. http://dx.doi.org/10.1109/icrtit.2011.5972387.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Yi, Ge Gao, Ying Liu, and Bing Lv. "A cross spread spectrum audio watermarking robust to acoustic transmission." In 2017 36th Chinese Control Conference (CCC). IEEE, 2017. http://dx.doi.org/10.23919/chicc.2017.8028150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhao, Xuemin, Yuhong Guo, Jian Liu, and Yonghong Yan. "A Spread Spectrum Audio Watermarking System with High Perceptual Quality." In 2011 Third International Conference on Communications and Mobile Computing (CMC). IEEE, 2011. http://dx.doi.org/10.1109/cmc.2011.30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Peng, Ye Li, Jingsai Jiang, Yanhong Fan, Qiuyun Hao, and Xiaofeng Ma. "A new informed spread spectrum embedding for robust audio watermarking." In 2016 IEEE 13th International Conference on Signal Processing (ICSP). IEEE, 2016. http://dx.doi.org/10.1109/icsp.2016.7877841.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography