000 03383nam a22005415i 4500
001 978-3-319-14800-7
003 DE-He213
005 20200420221259.0
007 cr nn 008mamaa
008 150330s2015 gw | s |||| 0|eng d
020 _a9783319148007
_9978-3-319-14800-7
024 7 _a10.1007/978-3-319-14800-7
_2doi
050 4 _aTK5102.9
050 4 _aTA1637-1638
050 4 _aTK7882.S65
072 7 _aTTBM
_2bicssc
072 7 _aUYS
_2bicssc
072 7 _aTEC008000
_2bisacsh
072 7 _aCOM073000
_2bisacsh
082 0 4 _a621.382
_223
100 1 _aDhar, Pranab Kumar.
_eauthor.
245 1 0 _aAdvances in Audio Watermarking Based on Singular Value Decomposition
_h[electronic resource] /
_cby Pranab Kumar Dhar, Tetsuya Shimamura.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2015.
300 _aXVIII, 58 p. 26 illus., 18 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Electrical and Computer Engineering,
_x2191-8112
505 0 _aIntroduction -- Background Information -- DWT-DCT-Based Audio Watermarking Using SVD -- FFT-Based Audio Watermarking Using SVD and CPT -- Conclusions.
520 _aThis book introduces audio watermarking methods for copyright protection, which has drawn extensive attention for securing digital data from unauthorized copying. The book is divided into two parts. First, an audio watermarking method in discrete wavelet transform (DWT) and discrete cosine transform (DCT) domains using singular value decomposition (SVD) and quantization is introduced. This method is robust against various attacks and provides good imperceptible watermarked sounds. Then, an audio watermarking method in fast Fourier transform (FFT) domain using SVD and Cartesian-polar transformation (CPT) is presented. This method has high imperceptibility and high data payload and it provides good robustness against various attacks. These techniques allow media owners to protect copyright and to show authenticity and ownership of their material in a variety of applications.   �         Features new methods of audio watermarking for copyright protection and ownership protection �         Outlines techniques that provide superior performance in terms of imperceptibility, robustness, and data payload �         Includes applications such as data authentication, data indexing, broadcast monitoring, fingerprinting, etc.
650 0 _aEngineering.
650 0 _aData encryption (Computer science).
650 0 _aComputational linguistics.
650 1 4 _aEngineering.
650 2 4 _aSignal, Image and Speech Processing.
650 2 4 _aComputational Linguistics.
650 2 4 _aData Encryption.
700 1 _aShimamura, Tetsuya.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319147994
830 0 _aSpringerBriefs in Electrical and Computer Engineering,
_x2191-8112
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-14800-7
912 _aZDB-2-ENG
942 _cEBK
999 _c53088
_d53088