5th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service. TELSIKS 2001. Proceedin
DOI: 10.1109/telsks.2001.954881
|View full text |Cite
|
Sign up to set email alerts
|

Audio signal watermarking based on replica modulation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0
1

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 40 publications
0
7
0
1
Order By: Relevance
“…However, echo hiding is vulnerable to attack. Replica modulation (Petrovic 2001) is rather secure than echo hiding. Among two-set schemes, the modified patchwork algorithm (Ye0 and Kim 2003) is also very much elaborated.…”
Section: Discussionmentioning
confidence: 99%
“…However, echo hiding is vulnerable to attack. Replica modulation (Petrovic 2001) is rather secure than echo hiding. Among two-set schemes, the modified patchwork algorithm (Ye0 and Kim 2003) is also very much elaborated.…”
Section: Discussionmentioning
confidence: 99%
“…After extracting embedded watermark, the similarity (SIM) between the extracted watermark and the original watermark is calculated as the following formula: sim(W, W') = W .Wj// (2) W is the original watermark and W' is the extracted one. Before the calculation, watermarks have to be mapped to antipodal sequence using BPSK modulation (1 -> -1, 0 -* +1).…”
Section: Proposed Watermarking Systemsmentioning
confidence: 99%
“…Digital watermarking is one solution to prevent copyright infringement where the information signal inserted into the host signal can be text, image, audio or video. This insertion is done in such a way that the inserted information does not interfere with the use of the data host [1]. In this paper we will discuss audio watermarking.…”
Section: Introductionmentioning
confidence: 99%