Advances in Audio Watermarking Based on Singular Value Decomposition (Record no. 53088)

000 -LEADER
fixed length control field 03383nam a22005415i 4500
001 - CONTROL NUMBER
control field 978-3-319-14800-7
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200420221259.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150330s2015 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319148007
-- 978-3-319-14800-7
082 04 - CLASSIFICATION NUMBER
Call Number 621.382
100 1# - AUTHOR NAME
Author Dhar, Pranab Kumar.
245 10 - TITLE STATEMENT
Title Advances in Audio Watermarking Based on Singular Value Decomposition
300 ## - PHYSICAL DESCRIPTION
Number of Pages XVIII, 58 p. 26 illus., 18 illus. in color.
490 1# - SERIES STATEMENT
Series statement SpringerBriefs in Electrical and Computer Engineering,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Background Information -- DWT-DCT-Based Audio Watermarking Using SVD -- FFT-Based Audio Watermarking Using SVD and CPT -- Conclusions.
520 ## - SUMMARY, ETC.
Summary, etc This book introduces audio watermarking methods for copyright protection, which has drawn extensive attention for securing digital data from unauthorized copying. The book is divided into two parts. First, an audio watermarking method in discrete wavelet transform (DWT) and discrete cosine transform (DCT) domains using singular value decomposition (SVD) and quantization is introduced. This method is robust against various attacks and provides good imperceptible watermarked sounds. Then, an audio watermarking method in fast Fourier transform (FFT) domain using SVD and Cartesian-polar transformation (CPT) is presented. This method has high imperceptibility and high data payload and it provides good robustness against various attacks. These techniques allow media owners to protect copyright and to show authenticity and ownership of their material in a variety of applications.   �         Features new methods of audio watermarking for copyright protection and ownership protection �         Outlines techniques that provide superior performance in terms of imperceptibility, robustness, and data payload �         Includes applications such as data authentication, data indexing, broadcast monitoring, fingerprinting, etc.
700 1# - AUTHOR 2
Author 2 Shimamura, Tetsuya.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-319-14800-7
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2015.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Engineering.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computational linguistics.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Engineering.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Signal, Image and Speech Processing.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computational Linguistics.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data Encryption.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2191-8112
912 ## -
-- ZDB-2-ENG

No items available.