000 | 03383nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-319-14800-7 | ||
003 | DE-He213 | ||
005 | 20200420221259.0 | ||
007 | cr nn 008mamaa | ||
008 | 150330s2015 gw | s |||| 0|eng d | ||
020 |
_a9783319148007 _9978-3-319-14800-7 |
||
024 | 7 |
_a10.1007/978-3-319-14800-7 _2doi |
|
050 | 4 | _aTK5102.9 | |
050 | 4 | _aTA1637-1638 | |
050 | 4 | _aTK7882.S65 | |
072 | 7 |
_aTTBM _2bicssc |
|
072 | 7 |
_aUYS _2bicssc |
|
072 | 7 |
_aTEC008000 _2bisacsh |
|
072 | 7 |
_aCOM073000 _2bisacsh |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aDhar, Pranab Kumar. _eauthor. |
|
245 | 1 | 0 |
_aAdvances in Audio Watermarking Based on Singular Value Decomposition _h[electronic resource] / _cby Pranab Kumar Dhar, Tetsuya Shimamura. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 |
_aXVIII, 58 p. 26 illus., 18 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Electrical and Computer Engineering, _x2191-8112 |
|
505 | 0 | _aIntroduction -- Background Information -- DWT-DCT-Based Audio Watermarking Using SVD -- FFT-Based Audio Watermarking Using SVD and CPT -- Conclusions. | |
520 | _aThis book introduces audio watermarking methods for copyright protection, which has drawn extensive attention for securing digital data from unauthorized copying. The book is divided into two parts. First, an audio watermarking method in discrete wavelet transform (DWT) and discrete cosine transform (DCT) domains using singular value decomposition (SVD) and quantization is introduced. This method is robust against various attacks and provides good imperceptible watermarked sounds. Then, an audio watermarking method in fast Fourier transform (FFT) domain using SVD and Cartesian-polar transformation (CPT) is presented. This method has high imperceptibility and high data payload and it provides good robustness against various attacks. These techniques allow media owners to protect copyright and to show authenticity and ownership of their material in a variety of applications.   �         Features new methods of audio watermarking for copyright protection and ownership protection �         Outlines techniques that provide superior performance in terms of imperceptibility, robustness, and data payload �         Includes applications such as data authentication, data indexing, broadcast monitoring, fingerprinting, etc. | ||
650 | 0 | _aEngineering. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputational linguistics. | |
650 | 1 | 4 | _aEngineering. |
650 | 2 | 4 | _aSignal, Image and Speech Processing. |
650 | 2 | 4 | _aComputational Linguistics. |
650 | 2 | 4 | _aData Encryption. |
700 | 1 |
_aShimamura, Tetsuya. _eauthor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319147994 |
830 | 0 |
_aSpringerBriefs in Electrical and Computer Engineering, _x2191-8112 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-14800-7 |
912 | _aZDB-2-ENG | ||
942 | _cEBK | ||
999 |
_c53088 _d53088 |