000 04113cam a2200553Ii 4500
001 ocn953844157
003 OCoLC
005 20190328114815.0
006 m o d
007 cr mn|||||||||
008 160721t20162016mau ob 000 0 eng d
040 _aYDXCP
_beng
_erda
_epn
_cYDXCP
_dOPELS
_dEBLCP
_dIDEBK
_dN$T
_dUMI
_dOCLCQ
_dOCLCF
_dYDX
_dOCLCO
_dUPM
_dN$T
_dOSU
_dTOH
_dSTF
_dCOO
_dDEBSZ
_dDEBBG
_dIDB
_dWAU
_dOCLCQ
_dU3W
_dD6H
_dUOK
_dKSU
_dEZ9
_dOCLCQ
_dWYU
_dOCLCO
019 _a953848625
_a957278956
_a958411129
020 _a9780128113844
_q(electronic bk.)
020 _a0128113847
_q(electronic bk.)
020 _z9780128113837
020 _z0128113839
035 _a(OCoLC)953844157
_z(OCoLC)953848625
_z(OCoLC)957278956
_z(OCoLC)958411129
050 4 _aQA76.9.A25
_bG46 2016eb
072 7 _aCOM
_x087010
_2bisacsh
082 0 4 _a005.8/2
_223
100 1 _aGhorbani, Sogand,
_eauthor.
245 1 0 _aAudio content security : attack analysis on audio watermarking /
_h[electronic resource]
_cSogand Ghorbani, Iraj Sadegh Amiri.
264 1 _aCambridge, MA :
_bSyngress is an imprint of Elsevier,
_c2016.
264 4 _c�2016
300 _a1 online resource (vi, 54 pages).
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aSyngress advanced topics in information security
504 _aIncludes bibliographical references.
505 0 _a1 Introduction; 1.1 Overview; 1.2 Problem Background; 1.3 Problem Statement; 1.4 Purpose of Study; 1.5 Objectives of Study; 1.6 Significance of Study; 1.7 Scope of Study; 1.8 Organization of the Report; 2 Literature Review; 2.1 Introduction; 2.2 Creative Content; 2.2.1 Creative Content Copyright; 2.3 Digital Audio; 2.3.1 Convert a Sound to an Audio File; 2.3.1.1 Effective Parameters on Audio Quality; 2.3.2 Audio Copyright; 2.4 Watermarking; 2.4.1 Audio Watermarking.
505 8 _a2.4.1.1 Fundamental Properties of Audio Watermarking2.4.1.2 Types of Watermark; 2.4.1.3 Watermarking Techniques; 2.4.2 Audio Watermarking issues; 2.4.2.1 Conversion Issue; 2.4.2.2 Resampling Issue; 2.4.2.3 Filtering Issue; 2.4.2.4 Delay Issue; 2.4.2.5 Desynchronization Issue; 2.5 Attacks on Audio; 2.6 Evaluation Method; 2.7 Project Criteria; 3 Methodology; 3.1 Introduction; 3.2 Research Framework; 3.2.1 Research Framework Phase One; 3.2.2 Research Framework Phase Two; 3.2.3 Research Framework Phase Three; 3.3 Research Tools Used; 3.4 Summary; 4 Attack Analysis; 4.1 Introduction.
505 8 _a4.2 Attack Analysis Watermarking Algorithms4.2.1 Results on the Analysis of Audio Watermarking; 4.2.2 Tag Generation; 4.2.3 Encoding Phase; 4.2.4 Decoding Phase; 4.3 Attacks; 4.3.1 MP3 Attack; 4.3.2 Resampling; 4.3.2.1 Down Sampling; 4.3.2.2 Upsampling; 4.3.3 Low-pass filtering; 4.3.4 High-Pass Filtering; 4.3.5 Echo; 4.4 Final Result; 4.5 Summary; 5 Evaluation Analysis; 5.1 Introduction; 5.2 Correlation Between Power and Size Ratio in Audio Watermarking; 5.2.1 Previous Work; 5.3 Correlation Between PSNR and Sampling Rate in Audio Watermarking; 5.4 Summary; 6 Conclusion; 6.1 Introduction.
505 8 _a6.2 Final Achievements6.3 Contribution of Study; 6.4 Future work; References; Back Cover.
588 0 _aPrint version record.
650 0 _aDigital watermarking.
650 0 _aSound
_xRecording and reproducing
_xDigital techniques.
650 0 _aData encryption (Computer science)
650 7 _aCOMPUTERS
_xDigital Media
_xAudio.
_2bisacsh
650 7 _aData encryption (Computer science)
_2fast
_0(OCoLC)fst00887935
650 7 _aDigital watermarking.
_2fast
_0(OCoLC)fst00893746
650 7 _aSound
_xRecording and reproducing
_xDigital techniques.
_2fast
_0(OCoLC)fst01126959
655 4 _aElectronic books.
700 1 _aAmiri, Iraj Sadegh,
_d1977-
_eauthor.
776 0 8 _iPrint version:
_aGhorbani, Sogand.
_tAudio content security.
_dCambridge, MA : Syngress is an imprint of Elsevier, [2016]
_z0128113839
_w(OCoLC)961004613
830 0 _aSyngress advanced topics in information security.
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128113837
999 _c247380
_d247380