000 03658nam a22005415i 4500
001 978-3-030-53911-5
003 DE-He213
005 20220801213607.0
007 cr nn 008mamaa
008 201025s2021 sz | s |||| 0|eng d
020 _a9783030539115
_9978-3-030-53911-5
024 7 _a10.1007/978-3-030-53911-5
_2doi
050 4 _aTK5102.9
072 7 _aTJF
_2bicssc
072 7 _aUYS
_2bicssc
072 7 _aTEC008000
_2bisacsh
072 7 _aTJF
_2thema
072 7 _aUYS
_2thema
082 0 4 _a621.382
_223
100 1 _aPatel, Krunal N.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_933073
245 1 0 _aRobust and Secured Digital Audio Watermarking
_h[electronic resource] :
_bUsing a DWT-SVD-DSSS Hybrid Approach /
_cby Krunal N. Patel.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aXVIII, 88 p. 68 illus., 62 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Speech Technology, Studies in Speech Signal Processing, Natural Language Understanding, and Machine Learning,
_x2191-7388
505 0 _aIntroduction -- Path To Digital Watermarking -- Existing Methods Of Digital Watermarking -- Main Objective -- Technique For Enhancing The Imperceptibility And Robustness Of Digital Audio Watermarking -- Technique For Enhancing The Robustness, Imperceptibility And The Security Of Digital Audio Watermarking -- Conclusion And Future Work.
520 _aThis book discusses digital audio watermarking copyright assurance. The author first outlines the topic of watermarking data that can be used for copyright assurance that incorporates text messages, copyright audio, handwritten text, logo and cell phone numbers. The objective of this book is to propose a new algorithm that can embed and extract the watermarking information. The execution of the newly proposed algorithm is surveyed by testing data utilizing a group of various audio file types and against various attacks. The book also presents a new digital watermark algorithm that preserves the copyright property of the audio files. To do this, the author uses two techniques -- DWT and SVD -- with the combination of other techniques (DFT and DSSS) to enhance security and also provide high robustness and imperceptibility against various malicious attacks. Implements an audio watermarking algorithm that gives high robustness against various malicious attacks; Provides a solution for preventing and tackling attacks for all types of audio data; Includes a secured algorithm that can be used in defense systems for transmitting hidden messages in audio signal.
650 0 _aSignal processing.
_94052
650 0 _aTelecommunication.
_910437
650 1 4 _aSignal, Speech and Image Processing .
_931566
650 2 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aCommunications Engineering, Networks.
_931570
710 2 _aSpringerLink (Online service)
_933074
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030539108
776 0 8 _iPrinted edition:
_z9783030539122
830 0 _aSpringerBriefs in Speech Technology, Studies in Speech Signal Processing, Natural Language Understanding, and Machine Learning,
_x2191-7388
_933075
856 4 0 _uhttps://doi.org/10.1007/978-3-030-53911-5
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c75367
_d75367