000 | 03658nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-030-53911-5 | ||
003 | DE-He213 | ||
005 | 20220801213607.0 | ||
007 | cr nn 008mamaa | ||
008 | 201025s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030539115 _9978-3-030-53911-5 |
||
024 | 7 |
_a10.1007/978-3-030-53911-5 _2doi |
|
050 | 4 | _aTK5102.9 | |
072 | 7 |
_aTJF _2bicssc |
|
072 | 7 |
_aUYS _2bicssc |
|
072 | 7 |
_aTEC008000 _2bisacsh |
|
072 | 7 |
_aTJF _2thema |
|
072 | 7 |
_aUYS _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
100 | 1 |
_aPatel, Krunal N. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _933073 |
|
245 | 1 | 0 |
_aRobust and Secured Digital Audio Watermarking _h[electronic resource] : _bUsing a DWT-SVD-DSSS Hybrid Approach / _cby Krunal N. Patel. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aXVIII, 88 p. 68 illus., 62 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Speech Technology, Studies in Speech Signal Processing, Natural Language Understanding, and Machine Learning, _x2191-7388 |
|
505 | 0 | _aIntroduction -- Path To Digital Watermarking -- Existing Methods Of Digital Watermarking -- Main Objective -- Technique For Enhancing The Imperceptibility And Robustness Of Digital Audio Watermarking -- Technique For Enhancing The Robustness, Imperceptibility And The Security Of Digital Audio Watermarking -- Conclusion And Future Work. | |
520 | _aThis book discusses digital audio watermarking copyright assurance. The author first outlines the topic of watermarking data that can be used for copyright assurance that incorporates text messages, copyright audio, handwritten text, logo and cell phone numbers. The objective of this book is to propose a new algorithm that can embed and extract the watermarking information. The execution of the newly proposed algorithm is surveyed by testing data utilizing a group of various audio file types and against various attacks. The book also presents a new digital watermark algorithm that preserves the copyright property of the audio files. To do this, the author uses two techniques -- DWT and SVD -- with the combination of other techniques (DFT and DSSS) to enhance security and also provide high robustness and imperceptibility against various malicious attacks. Implements an audio watermarking algorithm that gives high robustness against various malicious attacks; Provides a solution for preventing and tackling attacks for all types of audio data; Includes a secured algorithm that can be used in defense systems for transmitting hidden messages in audio signal. | ||
650 | 0 |
_aSignal processing. _94052 |
|
650 | 0 |
_aTelecommunication. _910437 |
|
650 | 1 | 4 |
_aSignal, Speech and Image Processing . _931566 |
650 | 2 | 4 |
_aCommunications Engineering, Networks. _931570 |
650 | 2 | 4 |
_aCommunications Engineering, Networks. _931570 |
710 | 2 |
_aSpringerLink (Online service) _933074 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030539108 |
776 | 0 | 8 |
_iPrinted edition: _z9783030539122 |
830 | 0 |
_aSpringerBriefs in Speech Technology, Studies in Speech Signal Processing, Natural Language Understanding, and Machine Learning, _x2191-7388 _933075 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-53911-5 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c75367 _d75367 |