Login       My Wishlist
  My Cart
$0.00 / 0 items
 
Spring Brook Audio
The Best Audio Books on the Web
International Access
Global Shipping Options Available
  Our Catalog   Computers & Technology   Security & Encryption

Advances in Audio Watermarking Based on Singular Value Decomposition (SpringerBriefs in Speech Technology)


On Sale Now! Save 9% on the Advances in Audio Watermarking Based on Singular Value Decomposition (SpringerBriefs in Speech Technology) by Springer at Spring Brook Audio. MPN: 8 black & white illustrations, 18 colour. Hurry! Limited time offer. Offer valid only while supplies last. This book introduces audio watermarking methods for copyright protection, which has drawn extensive attention for securing digital data from unauthorized copying. The book is divided into two parts. First, an audio watermarking method in discrete wavelet transform (DWT) and discrete cosine transform (DCT) domains using singular value decomposition (SVD) and quantization is introduced. This method is robust against various attacks and provides good imperceptible watermarked sounds. Then, an


Product Description & Reviews

This book introduces audio watermarking methods for copyright protection, which has drawn extensive attention for securing digital data from unauthorized copying. The book is divided into two parts. First, an audio watermarking method in discrete wavelet transform (DWT) and discrete cosine transform (DCT) domains using singular value decomposition (SVD) and quantization is introduced. This method is robust against various attacks and provides good imperceptible watermarked sounds. Then, an audio watermarking method in fast Fourier transform (FFT) domain using SVD and Cartesian-polar transformation (CPT) is presented. This method has high imperceptibility and high data payload and it provides good robustness against various attacks. These techniques allow media owners to protect copyright and to show authenticity and ownership of their material in a variety of applications.  ·         Features new methods of audio watermarking for copyright protection and ownership protection·         Outlines techniques that provide superior performance in terms of imperceptibility, robustness, and data payload·         Includes applications such as data authentication, data indexing, broadcast monitoring, fingerprinting, etc.

Features & Highlights

Additional Information

Manufacturer:Springer
Part Number:8 black & white illustrations, 18 colour
Publisher:Springer
Studio:Springer
MPN:8 black & white illustrations, 18 colour
EAN:9783319147994
Item Weight:0 pounds
Item Size:0.18 x 9.25 x 9.25 inches
Package Weight:0.31 pounds
Package Size:6.85 x 0.16 x 0.16 inches

Advances in Audio Watermarking Based on Singular Value Decomposition (SpringerBriefs in Speech Technology) by Springer

Buy Now:
Advances in Audio Watermarking Based on Singular Value Decomposition (SpringerBriefs in Speech Technology)

Brand: Springer
4.1 out of 5 stars with 33 reviews
Condition: New
Lead Time: 1 - 2 Business Days
Availability: In Stock
$69.99
$64.00
You Save: 9%


Quantity:  

 


View More In Security & Encryption.

 


Have questions about this item, or would like to inquire about a custom or bulk order?


If you have any questions about this product by Springer, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.

First Name:
Last Name:
Email Address:
Your Message:

Related Best Sellers


Information Hiding in Speech Signals for Secure Communication
By Syngress
ean: 9780128013281, isbn: 0128013281,
In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art

Fundamentals of Speaker Recognition
By Beigi, Homayoon
mpn: 9780387775913, ean: 9780387775913, isbn: 0387775919,
An emerging technology, Speaker Recognition is becoming well-known for providing voice authentication over the telephone for helpdesks, call centres and other enterprise businesses for business process automation. ''Fundamentals of Speaker Recognition'' introduces Speaker Identification, Speaker Verification, Speaker (Audio Event) Classification, Speaker Detection, Speaker Tracking and more. The technical problems are rigorously defined, and a complete picture is made of the relevance of the

Audio Content Security: Attack Analysis on Audio Watermarking
By Syngress Publishing
ean: 9780128113837, isbn: 0128113839,
Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks. The results of this study can be used for further studies and to establish the need to have a particular way of audio watermarking for each particular group of songs, each with different characteristics. An

Guide to Computer Forensics and Investigations (Book & CD)
By Course Technology
ean: 9781435498839, isbn: 1435498836,
Master the skills necessary to launch and complete a successful computer investigation with the updated fourth edition of this popular book, GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS. This resource guides readers through conducting a high-tech investigation, from acquiring digital evidence to reporting its findings. Updated coverage includes new software and technologies as well as up-to-date reference sections, and content includes how to set up a forensics lab, how to acquire the proper

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS
By Auerbach Publications
ean: 9781439801963, isbn: 9781439801963,
As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with



Privacy Policy / Terms of Service / Accessibility Statement
© 2019 - springbrookaudio.com. All Rights Reserved.