International Multi-Conference on Systems, Sygnals &Amp; Devices 2012
DOI: 10.1109/ssd.2012.6198022
|View full text |Cite
|
Sign up to set email alerts
|

Audio-watermarking based ownership verification system using enhanced DWT-SVD technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…There are many related works that are relevant to the theme of this paper [28]- [30] [32] [38]- [42]. The authors in [28] proposed a secure digital watermarking algorithm.…”
Section: Previous Workmentioning
confidence: 99%
See 2 more Smart Citations
“…There are many related works that are relevant to the theme of this paper [28]- [30] [32] [38]- [42]. The authors in [28] proposed a secure digital watermarking algorithm.…”
Section: Previous Workmentioning
confidence: 99%
“…Moreover, they minimized the period of the original audio signal by reducing the number of watermark bits through using cryptographic hash function which mainly generates and embeds the digest of the thumbprint watermark instead of its image. In [42], the authors ameliorated the audio watermarking algorithms proposed by [39]- [41] through incorporating a new audio signal framing (i.e., taking one frame and skipping the other 29 frames). Moreover, they proposed a new DWT matrix formation to reduce the D components which are repeated several times in the matrix formation produced in [39]- [41].…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore they are non-blind. Other schemes [7], [8], [12], [14], [15], [17]- [20], [22]- [24] do not use the information and are blind [7], [8], [22]- [24] or non-blind [12], [14], [15], [17]- [20]. It should be noted that the robustness of the first category, which employs some information from the watermark, is likely due to false positive detection [10].…”
Section: Introductionmentioning
confidence: 99%
“…The position of modified singular values can be used as a criterion for categorization as well. For example, some schemes [12], [14], [15], [18]- [20] modify only the largest singular value. Other schemes [7], [8], [17], [21], [22] modify all singular values, and there is a scheme [23] that modifies only some small singular values.…”
Section: Introductionmentioning
confidence: 99%