Dissertations / Theses on the topic 'Spread Spectrum Audio Watermarking'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 24 dissertations / theses for your research on the topic 'Spread Spectrum Audio Watermarking.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Heitel, Tomáš. "Využití psychoakustického modelu a tranformace typu wavelet packet pro vodoznačení audio signálů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218556.
Full textKabourek, Jiří. "Využití maskovacích efektů pro vodoznačení audio dat." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217497.
Full textGeorge, Mercy. "Spread spectrum watermarking for images and video." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape8/PQDD_0006/MQ46574.pdf.
Full textChen, Siyue. "Chaotic spread spectrum with application to digital image watermarking." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ65151.pdf.
Full textSerdean, Cristian Vasile. "Spread spectrum-based video watermarking algorithms for copyright protection." Thesis, University of Plymouth, 2002. http://hdl.handle.net/10026.1/2263.
Full textLi, Xiang. "PHYSICAL LAYER WATERMARKING OF DIRECT SEQUENCE SPREAD SPECTRUM SIGNALS." Cleveland State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=csu1368527408.
Full textPrandolini, Robert John. "Process gain recovery of direct-sequence spread-spectrum in a time-warped channel." Thesis, Queensland University of Technology, 1995.
Find full textChammem, Afef. "Robust watermarking techniques for stereoscopic video protection." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00917964.
Full textSoderi, S. (Simone). "Evaluation of industrial wireless communications systems’ security." Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526212463.
Full textTiivistelmä Langattoman tietoliikenteen maailmanlaajuista suosiota kiihdytti alun perin mahdollisuus korvata tietoliikennejärjestelmissä käytetyt kaapelit langattomilla ratkaisuilla. Ilmiö lisäsi myös tarvetta kehittää alan turvatekniikkaa monialaisen tutkimuksen pohjalta. Vaikka langattomat ratkaisut merkitsevät pienempiä asennuskustannuksia ja tarjoavat mahdollisuuksia luoda uudenlaisia palveluja, järjestelmien loppukäyttäjät edellyttävät kuitenkin niiden turvallisuuden olevan vastaavalla tasolla kuin langallisissa verkoissa. Myös teollisuuden langattomien tietoliikennejärjestelmen turvallisuus riippuu pitkälti viestintäkanavien turvallisuudesta. Väitöksen tavoitteena on kehittää uusia menetelmiä, joilla teollisuuden langattomat tietoliikennejärjestelmät voitaisiin turvata. Väitöksessä kehitetään toimenpiteitä tietoliikennejärjestelmien luottamuksellisuuteen ja koskemattomuuteen kohdistuvia hyökkäyksiä vastaan ja toteutetaan turvallisuusarviointi, joka kattaa järjestelmän protokollakerroksen sekä sähkömagneettisen ja fyysisen kerroksen. Väitöksen ensimmäisessä osassa hyödynnetään HIP–protokollaa (Host Identity Protocol) liikennevälineen sisäisen tietoliikennejärjestelmän turvallisuuden varmistamisessa. Lisäksi siinä kuvataan simulaatiot ja mittaushankkeet, joiden tavoitteena on arvioida käytetyn protokollan turvallisuusvaikutuksia esteettömän (line–of–sight, LOS) ja esteellisen (non–line–of–sight, NLOS) näköyhteyden tapauksissa. Sähkömagneettinen analyysi on tärkeä vaihe turvajärjestelmien kehitysprosessissa. Järjestelmissä käytetään yhä enemmän pieniä integroituja piirejä, mikä voi myös altistaa ne sähkömagneettisille (electromagnetic, EM) häiriöille. Väitöksessä tutkitaan lähikenttä–kaukokenttä -muunnokseen perustuvan arviointimenetelmän avulla sähkömagneettisen vuotosäteilyn tasoa. Lisäksi perehdytään testattavan laitteen (device under test, DUT) virtuaaliseen EM–liitäntään ja kuvataan, miten vastaavaa liitäntää voidaan hyödyntää palvelunestohyökkäyksissä. Väitöksessä tutkitaan myös tehokasta häirintämallia ja validoidaan teoreettisten laskelmien tulokset kokeellisesti. Lopuksi väitöksessä keskitytään tietoliikennejärjestelmän fyysisen kerroksen turvallisuuteen ja kehitetään kaksi algoritmia. Aktiivisen radiotaajuisen tunnistusmenetelmän avulla voidaan vaihtaa julkisia avaimia turvallista tietoliikenneyhteyttä muodostettaessa. Lisäksi esitellään vesileimausmenetelmään perustuva fyysisen kerroksen salausmenetelmä, WBPLSec. WBPLSec luo vastaanottimen ympärille suoja–alueen, minkä ansiosta se vaikuttaa analyysin ja tutkimustulosten perusteella olevan tehokas menetelmä toteuttaa fyysisen kerroksen suojaus
Mathon, Benjamin. "Développement de méthodes de tatouage sûres pour le traçage de contenus multimédia." Phd thesis, Université de Grenoble, 2011. http://tel.archives-ouvertes.fr/tel-00618613.
Full textFriot, Nicolas. "Itérations chaotiques pour la sécurité de l'information dissimulée." Thesis, Besançon, 2014. http://www.theses.fr/2014BESA2035/document.
Full textDiscrete dynamical systems by chaotic or asynchronous iterations have proved to be highly interesting toolsin the field of computer security, thanks to their unpredictible behavior obtained under some conditions. Moreprecisely, these chaotic iterations possess the property of topological chaos and can be programmed in anefficient way. In the state of the art, they have turned out to be really interesting to use notably through digitalwatermarking schemes. However, despite their multiple advantages, these existing algorithms have revealedsome limitations. So, these PhD thesis aims at removing these constraints, proposing new processes whichcan be applied both in the field of digital watermarking and of steganography. We have studied these newschemes on two aspects: the topological security and the security based on a probabilistic approach. Theanalysis of their respective security level has allowed to achieve a comparison with the other existing processessuch as, for example, the spread spectrum. Application tests have also been conducted to steganalyse and toevaluate the robustness of the algorithms studied in this PhD thesis. Thanks to the obtained results, it has beenpossible to determine the best adequation of each processes with targeted application fields as, for example,the anonymity on the Internet, the contribution to the development of the semantic web, or their use for theprotection of digital documents. In parallel to these scientific research works, several valorization perspectiveshave been proposed, aiming at creating a company of innovative technology
Lee, Wei-Cheng, and 李維晟. "Detection and Decoding of Audio Spread-Spectrum Watermarking." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/tp6qxt.
Full text國立交通大學
電信工程系所
92
In this thesis, we address the problem of the performance analysis of audio watermarking systems that use a spread spectrum technique in the discrete cosine transform (DCT) domain. Two tests are involved in the ownership verification process. First, a watermark detector decides whether the audio under test contains a watermark generated with a certain key. If the audio is watermarked , then authorship by the key holder is proved and extraction of hidden message can be performed by a detector. Most current research concentrate on correlation detectors, despite evidence showing that the underlying Gaussian model assumption does not match the intrinsic natures of DCT coefficients. Recognizing this, we first investigate a statistical approach that uses the generalized Gaussian probability to characterize the DCT coefficients and then use it as a basis for the application of statistical decision theory to the design of efficient detector and decoder structures. We also generalize this approach to the possible nonexistence of a statistical description of the original audio.
Yong-SiangSyu and 徐詠翔. "Spread Spectrum Audio Watermarking Based on Complementary Codes." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/x2k96s.
Full textKrishna, Kumar S. "Blind Detection Techniques For Spread Spectrum Audio Watermarking." Thesis, 2007. https://etd.iisc.ac.in/handle/2005/588.
Full textKrishna, Kumar S. "Blind Detection Techniques For Spread Spectrum Audio Watermarking." Thesis, 2007. http://hdl.handle.net/2005/588.
Full text黃恆傑. "Digital Watermarking Based on Spread Spectrum Technique." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/56744541101570382497.
Full text國立中興大學
電機工程學系
90
The advances of computers and communication networks make digital content service such as digital document exchange, E-commerce, video on demand, and digital library very popular. Since digital data can be easily reproduced without any loss, copyright protection becomes an imperative requirement to prevent piracy. Digital watermarking has been proposed as one of the techniques to prevent data piracy and plagiarism. Digital watermarking is a novel and emerging technology. It has developed very quickly for the past few years. A digital watermark is a set of information that is robustly and imperceptibly embedded in the data to be protected. Applications include copyright protection, and authentication. In the thesis, we developed two watermarking techniques using spread-spectrum technique. We interpreted the watermarking technology based on communication theory. The watermark was the signal to be transmitted. The frequency domain of the original image was the transmission channel. The attacks were regarded as channel noise. There were two methods to implement the spread-spectrum system: direct- sequence spread- spectrum (DSSS) and frequency-hopping spread-spectrum (FHSS). Based on these tow methods, we develop FHSS Watermarking and DSSS Watermarking. JPEG compression is the most widely used image because compression technique of its high compression ratio and reasonable image quality. Here, we develop the watermark embedding method especially for JPEG encoding process since block Discrete Cosine Transform (DCT) was used for JPEG. In our approach, a block DCT-based algorithm was used to embed the image watermarking. In order to survive the JPEG compression, the watermark must be embedded in the bands that can with stand the JPEG quantization. Experiments showed that FHSS Watermarking is more resistant to the attack of JPEG compression. The PhotoImpact 5 digital image processing software was used for other attacks. We found that FHSS Watermarking is more robust than DSSS Watermarking in geometric distortions. But in other signal processing modifications, DSSS Watermarking is more robust than FHSS Watermarking. Therefore, we developed a new method that combined with FHSS Watermarking and DSSS Watermarking, we call the new method “combined SS Watermarking”. The experimental results prove that combined SS Watermarking has both the advantages of FHSS Watermarking and DSSS Watermarking. Therefore, combined SS Watermarking is more robust and can with stand many different attacks.
Hsu, Hsiao-Cheng, and 許孝成. "Wavelet Base Secure Spread Spectrum Image Watermarking." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/45502910987963543672.
Full text國立中興大學
電機工程學系
91
The digital watermarks should be hided and invisible by the human visual system. The spread spectrum techniques are used to achieve the goal. The original image is transformed form spatial domain to frequency domain by using discrete wavelet transform (DWT). We insert the spread spectrum PN-code and use modulo-2 operator to secure the watermark. The watermark is embedded into the LL3 sub-band after 3 times DWT. A multilevel detection is proposed to effectively watermark which can increase the retrieval performance. Form the experimental result, the proposed method is robust even under heavy attacks. For example, big compression ratio for JPEG and JPEG 2000, the retrieval watermarks still survive.
Sun, Cheng-Chung, and 孫正忠. "Secure Spread Spectrum Watermarking based on Trellis Coding." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/17443224180632437492.
Full text國立臺灣科技大學
電子工程系
91
ABSTRACT Digital watermarking is a technique that aims at hiding a message signal in a multimedia signal (e.g. speech, image, video signal, etc.) for copyright claim, authentication, device control, and broadcast monitoring, etc. In this thesis, we focus on the topic of embedding watermarks into still images. We hope that the embedded watermark induces low impairment to the original image. We also hope that the embedded watermark possesses enough robustness against tampering (intentional or unintentional) su®ered when it is stored or transmitted. We propose to scramble the watermark with pseudo-noise (PN) or orthogonal codes before it is embedded into an image. In terms of the communication scenario, this operation has the e®ect of spectrum spreading, which turns the watermark signal into additive white Gaussian noise (AWGN). In the extraction of the watermark, the aforementioned PN codes are applied once more to the watermarked image, in the meantime spectrum-spreading the original image and thus turning it into AWGN. This original-image-turned AWGN makes some watermark bits been detected incorrectly. In fact, there are some things more that are turned into AWGN, in addition to the original image. The e®ects of tampering operations such as quantization, compression, filtering, or even jamming, are reduced to AWGN as well. It is natural to consider the possibility of incorporating error correction coding (ECC) into the watermarking scheme to facilitate reduction of the watermark bit error rate (BER). We expect that among the various ECC techniques, trellis based schemes (e.g. trellis-coded modulation (TCM) and turbo code) should be adopted. Due to the similarity between the PN/orthogonal coded watermarking and the spread-spectrum communication, it is natural that, following similar derivations regarding data BER in the latter, we derive certain explicit quantitative relationship regarding the trade-o® between the watermark BER and the distortion su®ered by the original image. Finally, we want to point out that the PN codes can be used as keys for secrecy purpose. If we design a scheme to properly set the accessibility of the PN codes to various users of the watermarked images, this thesis may lead to a work that provides the functions of secrecy and authentication, in addition to copyright claim. Keywords : watermark, pseudo-noise code, trellis-coded modulation, turbo code, spread spectrum
Kai-MingYu and 游凱名. "Multi-layer Spread Spectrum Watermarking by Complementary Codes." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/qend3w.
Full textChu, Yi-Jean, and 邱怡珍. "A Robust Video Watermarking Technique Based on Spread Spectrum and DWT." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/2tj262.
Full text朝陽科技大學
資訊管理系碩士班
93
There have many digital watermarking schemes been explored to solve the problem associated with the copyright enforcement of the multimedia. In this thesis, we present a robust video watermarking technique based on spread spectrum and digital wavelet transformation (DWT) techniques that applied to videos. According to the properties of video, we employ the DWT technique to remove the correlation between spatial domain and temporal domain for dividing a scene of the video into dynamic frames and static ones in the wavelet frequency domain. On the other hand, we develop a watermarking technique using the spread-spectrum technique and complementary modulation strategy. We embed watermarks into all of sub-frequencies throughout. It guarantees that one of the watermarks would survive if the embedded video suffers from attacks. Therefore, the watermark obtains higher robustness. At the same time, we choose some suitable wavelet coefficients to embed watermarks after considering the property of the human visual system. Therefore, the video degradation will not be perceptible. Several experimental results are given to demonstrate the performance of the proposed scheme. The major watermark attacks used in the experiments are grouped into two categories. First category is the common image processings which includes noise addition, sharpening and contrast enhancement upon all frames of the embedded video. The other category is about video processings which includes MPEG compression, frames dropping and averaging. The experimental results show that the proposed scheme has great imperceptibility and is extremely robust against above attacks.
Yang, Bo-Zhi, and 楊博智. "Adaptive Spread Spectrum Digital Video Watermarking Embedding Technique Using Block-Based Discrete Wavelet Transform." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/cyqr7v.
Full text國立嘉義大學
資訊工程學系研究所
95
The major goal of this study is to embed and detect a watermark for digital video. In general, the spatial watermark embedding technique can not obtain better robustness in comparison with other techniques. This study embeds watermark in spatial domain based on image block which contains features with high intensity, high texture, and high motion, and improves the robustness of the watermark embedded in spatial. Since human visual system (HVS) can’t sense variations caused by high brightness, high texture, and fast motion regions within the video frames, an adaptive watermarking technique was developed to embed watermark signals into these regions. To this end, a digital video is first divided into various frames consisting of several blocks. Each block is then transformed by discrete wavelet transform (DWT). Feature blocks are determined based on the image features discussed above. Spread spectrum incorporated with just notice difference (JND) is performed to embed the watermark into feature blocks or non-feature blocks. Because feature block was designed based on HVS, the watermark is imperceptible to human’s eyes. The embedded watermark can be detected only with a frame. The proposed can resist attacks of linear transformation in digital video frames including frame average, frame reduction, and frame shuttle. Experimental results also demonstrate that the proposed method can obtain better performance in comparison with traditional schemes and resist various malicious attacks for still images such as cropping, JPEG compression, MPEG compression, and etc..
Chang, Mei-Chueh, and 張美雀. "A spread spectrum watermarking scheme of H.264 video based on human visual system." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/80345618295164555832.
Full text淡江大學
資訊工程學系碩士在職專班
96
As an effective method for copyright protection and content integrity verification of intellectual property, digital watermarking has become a very active area in the field of multimedia security. We propose a watermarking scheme of H.264 based on Watson’s human visual system. A 4x4 DCT mask combining Watson’s human visual system on DCT will be designed. Using the mask, a spread spectrum watermarking scheme is given to embed the watermark on AC coefficients of 4x4 DCT blocks. And it provides a way to classify 4x4 DCT blocks into edge, textured, or smooth-blocks, and it also is a reference for watermark embedding strength. We also propose a method to resist the frame dropping, reversing, duplicating attacks.
Fang, Tsung-Min, and 方琮珉. "A Filterless Class D Audio Amplifier with Spread-Spectrum Modulation for EMI Reduction." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/23725126078440951993.
Full text國立臺灣大學
電機工程學研究所
98
Current portable electronic product requires small in size and high power efficiency for the long-term usage of batteries. The application products include hearing aids, USB speakers, notebooks, wireless speakers, and automotive audio amplifiers. The high power efficiency design can reduce power supply requirements and elimination of heat sinks, and also reduce the size of products. The Class-D amplifier, for its high efficiency, has drawn much attentions recently. A Class-D amplifier with conventional PWM modulation requires an output filter which needs large area and increasing cost. Therefore, we use spread-spectrum modulation scheme to realize a filterless Class-D power amplifier, and reduce output EMI. The negative feedback is applied in this thesis to reduce the harmonic distortion for better linearity. In addition, to avoid the shoot-through current when both power transistors are switched on at the same time, the dead time control is adopted. The circuit is designed using TSMC 0.35μm 2P4M 3.3V CMOS process. The details of the entire circuit will be described thoroughly in this thesis. When a 0.8V, 1KHz input sine wave is applied, the THD is 0.09% and the efficiency is 86%.
Hsia, Ying-Fen, and 夏英峰. "Integration of Multiple-Description Iterative Coding and Inter-Block Spread Spectrum in Image Watermarking System." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/88743739227524731574.
Full text國立中興大學
電機工程學系所
98
To embed the multiple watermarks is a way to increase robustness in image watermark. The limitation of embedding multiple watermarks is that the limited capacity of an image severely limits the size of the watermark. Multiple-description coding is a good candidate to solve this limitation by trading off between transmission bandwidth and bit error rate. Traditionally, multiple-description coding is considered in on–off channels where channels are not marred by bit errors but occasional connection outages such as dropped packets. To apply multiple-description coding in image watermarking, we need a form of multiple-description coding for noisy channels instead of on–off channels. In this thesis, we propose to add iterative coding in multiple descriptions in order to combat bit errors in image watermarking. We call this method multiple-description iterative coding (MDIC) image watermarking. We tested our system on six images. On average, bit error did not happen until we compressed the image in JPEG to PSNR 36.97 dB. We concluded that MDIC was a very good way to increase robustness for image watermarking. One of the most popular watermark embedding methods is the direct sequence spread spectrum (DSSS) method. The original DSSS technique divides the image into NxN blocks. These blocks are transformed by discrete cosine transform (DCT). Then, the pseudo-noise (PN) sequences are embedded in selected DCT coefficients within the blocks. In this thesis we explore another two aspects in spread spectrum DCT-based watermarks that are yet unexplored in previous researches. The first aspect is what we called “inter-block” method. In previous DSSS watermark algorithms, the PN sequence from one input bit is embedded in one block. We called this approach “intra-block”. On the other hand, we can embed the PN sequence into several different blocks. Thus, we called it “inter-block” method. The rationale for this “inter-block” approach is that it spreads the same bit into a wider region in the image. This wider spreading may be beneficial in watermark counter-attack. The second aspect is the use of frequency-hop spread spectrum (FHSS). Previous researches indicated that FHSS performed better than DSSS in certain channel condition but FHSS has only been used in audio watermarks. Therefore, applying FHSS watermarks in images is worth investigating. To study the above two aspects, we developed three image watermark algorithms. They are called “intra-block FHSS”, “Inter-block DSSS (IDSSS)” and “Inter-block FHSS (IFHSS)”. These three methods and the original DSSS or “intra-block DSSS” were compared by subjecting them to various watermark attacks. From the experiments, we have the following findings. “Inter-block” techniques perform better against all attacks. For filtering and quantization attacks, IDSSS watermarks performed better. For geometric distortion attacks, IFHSS watermarks performed better. In order to utilize the advantages from these two different approaches, we combined IDSSS and IFHSS into a single watermark system, called Inter-Block Combined (IBC) system, and tested it. The results showed that the IBC can resist a broad range of watermark attacks. Finally, we combined the above two systems, MDIC and IBC, together to construct a whole new architecture, called combined MDIC or CMDIC watermarking system. The experimental results showed that CMDIC can defend a wider scope of watermarking attacks.