2009
DOI: 10.1016/j.dsp.2008.11.007
|View full text |Cite
|
Sign up to set email alerts
|

Audio watermarking scheme based on embedding strategy in low frequency components with a binary image

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
35
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 69 publications
(36 citation statements)
references
References 20 publications
1
35
0
Order By: Relevance
“…As for our scheme, the payload, with 4 bits per frame, is $ 187 bps. This is a comparatively high capacity when compared to audio watermarking schemes described in [15,[41][42][43][44][45][46][47][48][49]51]. The payload capacity of the scheme can be improved by embedding more than 4 bits in each frame by modifying more elements in the second column of U.…”
Section: Capacitymentioning
confidence: 90%
See 1 more Smart Citation
“…As for our scheme, the payload, with 4 bits per frame, is $ 187 bps. This is a comparatively high capacity when compared to audio watermarking schemes described in [15,[41][42][43][44][45][46][47][48][49]51]. The payload capacity of the scheme can be improved by embedding more than 4 bits in each frame by modifying more elements in the second column of U.…”
Section: Capacitymentioning
confidence: 90%
“…According to International Federation of the Phonographic Industry (IFPI) [15,51], audio watermarking should be imperceptible when SNR is over 20 dB. SNR has been used widely to measure the quality of watermarked signal [52] which is formulated as SNR ¼ 10 log 10…”
Section: Snrmentioning
confidence: 99%
“…Audio watermarking schemes can be categorized in many different ways because there are many criteria [5]. Based on deployment of properties of a human auditory system, one can categorize audio watermarking into a scheme that is based on human perceptual model [6] and a scheme based solely on mathematical manipulation [7], [8].…”
Section: Introductionmentioning
confidence: 99%
“…In particular, SS suffers from host rejection problem which reduces its payload capacity to increase the spreading rate, while QIM suffers from low immunity to additive noise and both have problems with MP3 compression/decompression attacks. Recently, there has been a considerable amount of work in robust watermarking of MP3 audio to overcome some of the problems of the traditional techniques [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15]. Recent work focuses on the effects of MP3 compression/decompression sampling rate conversion, and synchronization attacks, among other attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Recent work focuses on the effects of MP3 compression/decompression sampling rate conversion, and synchronization attacks, among other attacks. New watermarking techniques have emerged which combine the histogram based embedding, SVD of transform domain coefficients and the QIM are reaching promising payload values with improved robustness to different attacks [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%