2016
DOI: 10.1007/s11042-016-3851-y
|View full text |Cite
|
Sign up to set email alerts
|

Data embedding in audio signal using multiple bit marking layers method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 4 publications
0
1
0
Order By: Relevance
“…In this procedure by inserting a secret message into a file, one can then prove ownership and/or guarantee the reliability of the item. Vu et al [41] propose the multi-bit marking layer (MBML) method, which consists of reusing results from the previous embedding time (layer) as input data to continue embedding them in audio signals, the method demonstrates adequate performance in the error and signal to noise ratio (SNR) embedding rate surpassing methods such as LSB, large sample embedding (ELS), bit marking (BM) and BM/SW method (sliding window) which consist of a single layer.…”
Section: 𝐼 = 𝑈𝑆𝑉 𝑡mentioning
confidence: 99%
“…In this procedure by inserting a secret message into a file, one can then prove ownership and/or guarantee the reliability of the item. Vu et al [41] propose the multi-bit marking layer (MBML) method, which consists of reusing results from the previous embedding time (layer) as input data to continue embedding them in audio signals, the method demonstrates adequate performance in the error and signal to noise ratio (SNR) embedding rate surpassing methods such as LSB, large sample embedding (ELS), bit marking (BM) and BM/SW method (sliding window) which consist of a single layer.…”
Section: 𝐼 = 𝑈𝑆𝑉 𝑡mentioning
confidence: 99%
“…6 As a result, a number of enhanced CPA schemes have been developed further. Although this traditional auditing schemes [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23] eliminate "certificate management and key escrow problem but users commonly permit a third-party auditor (TPA)" to verify the integrity of the outsourced data. The trustworthy TPA can also give users reliable auditing findings by reducing communication and computation costs.…”
Section: Introductionmentioning
confidence: 99%