2010
DOI: 10.4304/jmm.5.2.151-158
|View full text |Cite
|
Sign up to set email alerts
|

Quantization-Based Digital Audio Watermarking in Discrete Fourier Transform Domain

Abstract:

To explore the principle and performances of Quantization Index Modulation (QIM) watermarking algorithm, the realization schemes of this algorithm in Discrete Fourier T Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 6 publications
(2 reference statements)
0
9
0
Order By: Relevance
“…The phase and magnitude of the transform domain coefficients are modified to embed the secret message. Popular transforms include Discrete Fourier Transform (DFT) [10,11,12], Discrete Cosine Transform (DCT) [13] and Discrete Wavelet Transform (DWT) [14].…”
Section: Introductionmentioning
confidence: 99%
“…The phase and magnitude of the transform domain coefficients are modified to embed the secret message. Popular transforms include Discrete Fourier Transform (DFT) [10,11,12], Discrete Cosine Transform (DCT) [13] and Discrete Wavelet Transform (DWT) [14].…”
Section: Introductionmentioning
confidence: 99%
“…The modulated signal is put spectrally in shape by a ( ) H f filter, this filtering has for objective to adapt the spectral density of power of v to a doorstep of masking. The watermark signal is finally got by temporal summons between the audio signal ( ) x n and the signal put in ( ) t n shape [4].The audio signal faces two shapes of disruption; the first is an operation of compression -reconstruction, achieved by a MPEG coder. The second is a desynchronized operation achieved by the transmission via an analogical line between two PCs.…”
Section: Watermarking Systemmentioning
confidence: 99%
“…The watermarking reveals the possibility to use the audio signal as a support of communication. In order to tackle the problem of unauthorized copy and distribution of digital audio data, watermarking systems are employed to insert copyright data into the audio stream [4].…”
Section: Introductionmentioning
confidence: 99%
“…Thus, image encryption using n times Arnold transforms can be written as [19] (3) where k = 1, 2, … , n, and .…”
Section: Arnold Transformmentioning
confidence: 99%
“…For an N×N image the Arnold transform, is given as [18][19] ( 1) where (x,y) and (x',y') express the pixel co-ordinates of the original and encrypted images, respectively and is the two dimensional Arnold transform matrix.…”
Section: Arnold Transformmentioning
confidence: 99%