๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Watermarking [Vol. 2] (audio, algorithms)

โœ Scribed by M. Das Gupta


Publisher
Intech
Year
2012
Tongue
English
Leaves
283
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Table of Contents


Cover......Page 1
Watermarking โ€“ Volume 2......Page 2
ยฉ......Page 3
Contents......Page 5
1 Recent Advances in Watermarking for Scalable Video Coding......Page 8
2 Perceptual Image Hashing......Page 24
3 Robust Multiple Image Watermarking Based on Spread Transform......Page 50
4 Real Time Implementation of Digital Watermarking Algorithm for Image and Video Application......Page 72
5 Sophisticated Spatial Domain Watermarking by Bit Inverting Transformation......Page 98
6 Performance Evaluation for IP Protection Watermarking Techniques......Page 126
7 Using Digital Watermarking for Copyright Protection......Page 144
8 2D Watermarking: Non Conventional Approaches......Page 166
9 Audio Watermarking for Automatic Identification of Radiotelephone Transmissions in VHF Maritime Communication......Page 216
10 Robust Watermarking Framework for High Dynamic Range Images Against Tone-Mapping Attacks......Page 236
11 Improve Steganalysis by
MWM Feature Selection......Page 250
12 The Digital Watermarking Techniques
Applied to Smart Grid Security......Page 266


๐Ÿ“œ SIMILAR VOLUMES


Algorithms for Audio Watermarking and St
โœ Cvejic Nedeljko. ๐Ÿ“‚ Library ๐ŸŒ English

Publisher: Department of Electrical and Information Engineering, Information Processing Laboratory, University of Oulu <br/>Publication Date : 2004<div class="bb-sep"></div>Excerpts from the Abstract:<div class="bb-sep"></div>Broadband communication networks and multimedia data available in a digita

Audio Content Security. Attack Analysis
โœ Sogand Ghorbani, Iraj Sadegh Amiri ๐Ÿ“‚ Library ๐Ÿ“… 2016 ๐Ÿ› Syngress ๐ŸŒ English

<p><i>Audio Content Security: Attack Analysis on Audio Watermarking </i>describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks. </p> <