Transport of Context-based Information in Digital Audio Data
نویسندگان
چکیده
In this paper we introduce a technique to embed context-based information into an audio signal and to extract this information from the signal during playback. Context-based information can be any kind of data related to the audio signal such as the lyrics of a song or the score of a piece of music. A typical application will display the extracted information. Techniques from lossy audio compression, especially MPEG-1-Layer-II, are used to ensure inaudibility of the noise introduced into the audio signal by the embedded data. Another aspect of our work deals with synchronized processing of the contextbased information. Applications for embedding text information and for extracting this information during playback have been implemented and are presented in this paper. A variety of tests has been conducted to study the embedding capacity of various audio signals and to verify inaudibility of the embedded information.
منابع مشابه
A survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملContext-aware systems: concept, functions and applications in digital libraries
Background and Aim Among the places that context-aware systems and services would be very useful, are libraries. The purpose of this study is to achieve a coherent definition of context aware systems and applications, especially in digital libraries. Method: This was a review article that was conducted by using Library method by searching articles and e-books on websites and databases. Results:...
متن کاملDetecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملCritical Success Factors of Digital Libraries in Iran: A Qualitative Research
Background and Aim: Myriad of IT projects failed in recent years. Digital libraries (DLs) as the product of the usage of IT in the library organization followed a similar trend. This paper studies the critical success factors (CSFs) of DLs in the context of Iran, with special focus on the Iranian Ministry of Science, Research, and Technology. CSFs, in this paper, are those factors that if follo...
متن کاملA Systematic Review of Data Mining Applications in Digital Libraries
Purpose: Study aimed to identify the applications of data mining in the provision of services, collection and management of digital libraries. Methodology: This is an applied study in terms of purpose and in terms of method is qualitative research that have been done by systematic review method. For this purpose, articles have been obtained by searching databases of Springer, Emerald, ProQuest,...
متن کامل