Watermarking-Based Digital Audio Data Authentication
نویسندگان
چکیده
منابع مشابه
Watermarking-Based Digital Audio Data Authentication
Digital watermarking has become an accepted technology for enabling multimedia protection schemes. While most efforts concentrate on user authentication, recently interest in data authentication to ensure data integrity has been increasing. Existing concepts address mainly image data. Depending on the necessary security level and the sensitivity to detect changes in the media, we differentiate ...
متن کاملDigital Audio Watermarking: Survey
Digital audio watermarking is a technique for embedding additional data along with audio signal. Embedded data is used for copyright owner identification. A number of audio watermarking techniques are proposed. These techniques exploit different ways in order to embed a robust watermark and to maintain the original audio signal fidelity. This paper makes a tutorial in general digital watermarki...
متن کاملDigital Blind Audio Watermarking
Digital audio watermarking techniques are widely applied to protect the ownership of digital audio media. This study presents an audio watermarking scheme for audio e-leaning contents. The proposed audio watermarking method can significantly reduce the bit error rates, so enhance the robustness against common attacks. The experimental results under common attacks demonstrate that our watermarki...
متن کاملDigital Audio Watermarking: An Overview
Digital watermarking is a very recent research area. Digital audio watermarking is a method to embed or hide the Watermark (Information signal) into a digital signal i.e. Image, audio, text or video data. The watermark is difficult to remove from the audio signal. If the signal is copied, the information or watermark is also carried in the copy. A signal may carry several different watermarks a...
متن کاملDWT Based Blind Digital Video Watermarking Scheme for Video Authentication
Digital video is one of the popular multimedia data exchanged in the internet. Due to their perfectly replicable nature many illegal copies of the original video can be made. Methods are needed to protect copyrights of the owner and prevent illegal copying. A video can also undergo several intentional attacks like frame dropping, averaging, cropping and median filtering and unintentional attack...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: EURASIP Journal on Advances in Signal Processing
سال: 2003
ISSN: 1687-6180
DOI: 10.1155/s1110865703304081