Product Description & Reviews
Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks. The results of this study can be used for further studies and to establish the need to have a particular way of audio watermarking for each particular group of songs, each with different characteristics. An additional aspect of this study tests and analyzes two parameters of audio host file and watermark on a specific evaluation method (PSNR) for audio watermarking.Describes research using a common audio watermarking method for four different genres of musicProvides the results of many test attacksPresents tests and analyzes two parameters of audio host file and watermark on a specific evaluation method (PSNR) for audio watermarking
Features & Highlights
|Item Size:||0.15 x 9 x 9 inches|
|Package Weight:||0.02 pounds|
|Package Size:||6 x 0.3 x 0.3 inches|
Have questions about this item, or would like to inquire about a custom or bulk order?
If you have any questions about this product by Syngress Publishing, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.
By Course Technology
ean: 9781435498839, isbn: 1435498836,
Master the skills necessary to launch and complete a successful computer investigation with the updated fourth edition of this popular book, GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS. This resource guides readers through conducting a high-tech investigation, from acquiring digital evidence to reporting its findings. Updated coverage includes new software and technologies as well as up-to-date reference sections, and content includes how to set up a forensics lab, how to acquire the proper
By Auerbach Publications
ean: 9781439801963, isbn: 9781439801963,
As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with