Advances in Audio Watermarking Based on Singular Value Decomposition (SpringerBriefs in Speech Technology)
On Sale Now! Save 9% on the Advances in Audio Watermarking Based on Singular Value Decomposition (SpringerBriefs in Speech Technology) by Springer at Spring Brook Audio. MPN: 8 black & white illustrations, 18 colour. Hurry! Limited time offer. Offer valid only while supplies last. This book introduces audio watermarking methods for copyright protection, which has drawn extensive attention for securing digital data from
This book introduces audio watermarking methods for copyright protection, which has drawn extensive attention for securing digital data from unauthorized copying. The book is divided into two parts. First, an audio watermarking method in discrete wavelet transform (DWT) and discrete cosine transform (DCT) domains using singular value decomposition (SVD) and quantization is introduced. This method is robust against various attacks and provides good imperceptible watermarked sounds. Then, an audio watermarking method in fast Fourier transform (FFT) domain using SVD and Cartesian-polar transformation (CPT) is presented. This method has high imperceptibility and high data payload and it provides good robustness against various attacks. These techniques allow media owners to protect copyright and to show authenticity and ownership of their material in a variety of applications.
· Features new methods of audio watermarking for copyright protection and ownership protection
· Outlines techniques that provide superior performance in terms of imperceptibility, robustness, and data payload
· Includes applications such as data authentication, data indexing, broadcast monitoring, fingerprinting, etc.
|Part Number:||8 black & white illustrations, 18 colour|
|MPN:||8 black & white illustrations, 18 colour|
|Item Weight:||0 pounds|
|Item Size:||0.18 x 9.25 x 9.25 inches|
|Package Weight:||0.31 pounds|
|Package Size:||6.85 x 0.16 x 0.16 inches|
Have questions about this item, or would like to inquire about a custom or bulk order?
If you have any questions about this product by Springer, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.
Related Best Sellers
ean: 9780128013281, isbn: 0128013281,
In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communica...
By Beigi, Homayoon
mpn: 9780387775913, ean: 9780387775913, isbn: 0387775919,
An emerging technology, Speaker Recognition is becoming well-known for providing voice authentication over the telephone for helpdesks, call centres and other enterprise businesses for business process automation. "Fundamentals of Speaker Recognition...
By Syngress Publishing
ean: 9780128113837, isbn: 0128113839,
Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermark...
By Course Technology
ean: 9781435498839, isbn: 1435498836,
Master the skills necessary to launch and complete a successful computer investigation with the updated fourth edition of this popular book, GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS. This resource guides readers through conducting a high-tech i...
By Auerbach Publications
ean: 9781439801963, isbn: 9781439801963,
As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions o...