2013 4th International Conference on Computer and Communication Technology (ICCCT) 2013
DOI: 10.1109/iccct.2013.6749625
|View full text |Cite
|
Sign up to set email alerts
|

A survey: Digital audio watermarking techniques and applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0
2

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 32 publications
0
7
0
2
Order By: Relevance
“…As per the research of Singh et al [36], the DCT-based technique is effective in comparison with spatial domain methods. The reason behind this is because the watermark embedded into the image under such a technique is not possibly destroyed by any attach as the middle-frequency coefficients are used for embedding, and thus the image's visibility is not impacted.…”
Section: Discrete Cosine Transformmentioning
confidence: 75%
See 1 more Smart Citation
“…As per the research of Singh et al [36], the DCT-based technique is effective in comparison with spatial domain methods. The reason behind this is because the watermark embedded into the image under such a technique is not possibly destroyed by any attach as the middle-frequency coefficients are used for embedding, and thus the image's visibility is not impacted.…”
Section: Discrete Cosine Transformmentioning
confidence: 75%
“…Therefore, it can be interpreted based on these results that the use of DWT, DCT, and OTP for watermarking the images is highly effective as any changes to the image do not harm the watermark. The DCT-based strategy is more effective than spatial domain methods [36]. The reason for this is that the watermark implanted in the image using this technique cannot be erased by any attach since middle-frequency coefficients are utilized for embedding; hence the image's visibility is unaffected.…”
Section: Human Visual Qualitymentioning
confidence: 99%
“…Una vez obtenidos los coeficientes de aproximación del audio marcado, se seleccionan P valores de acuerdo a la información contenida en la semilla. Para cada uno de estos P coeficientes de aproximación, se aplica la extracción de bits del método QIM, correspondiente a la ecuación (2). Por cada coeficiente, se obtiene un bit, es decir, un pixel binario de la marca.…”
Section: Módulo De Recepción: Extracción De La Marcaunclassified
“…Dentro de los sectores más afectados por la copia ilegal de contenido se encuentra la industria musical, por ello se hace necesario brindar protección a los derechos de autor y el uso autorizado de la información, buscando mecanismos en donde se pueda identificar el propietario del contenido. Uno de los mecanismos más utilizados en la protección de contenido musical es el marcado de agua, ya que permite "firmar" el audio sin que se deteriore su calidad [1,2].…”
Section: Introductionunclassified
“…Nowadays, 3D mesh has found many applications in the field of virtual reality, computer‐aided design (CAD), entertainment and so on [5 ]. Although abundant watermarking schemes have been designed for digital images, audios and videos due to much exposure of such content over the internet [6–9 ], much less work is done in the domain of 3D mesh watermarking as schemes fabricated for 2D domain cannot be readily applied to 3D models.…”
Section: Introductionmentioning
confidence: 99%