Tags
Language
Tags
May 2024
Su Mo Tu We Th Fr Sa
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1

Multimedia Encryption and Watermarking

Posted By: AvaxGenius
Multimedia Encryption and Watermarking

Multimedia Encryption and Watermarking by Borko Furht
English | PDF | 2005 | 331 Pages | ISBN : 0387244255 | 26.8 MB

Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which enable a secure exchange of multimedia intellectual property.

Robust and Secured Digital Audio Watermarking: Using a DWT-SVD-DSSS Hybrid Approach

Posted By: AvaxGenius
Robust and Secured Digital Audio Watermarking: Using a DWT-SVD-DSSS Hybrid Approach

Robust and Secured Digital Audio Watermarking: Using a DWT-SVD-DSSS Hybrid Approach by Krunal N. Patel
English | EPUB | 2021 | 104 Pages | ISBN : 3030539105 | 15.2 MB

This book discusses digital audio watermarking copyright assurance. The author first outlines the topic of watermarking data that can be used for copyright assurance that incorporates text messages, copyright audio, handwritten text, logo and cell phone numbers. The objective of this book is to propose a new algorithm that can embed and extract the watermarking information. The execution of the newly proposed algorithm is surveyed by testing data utilizing a group of various audio file types and against various attacks.

Robust and Secured Digital Audio Watermarking: Using a DWT-SVD-DSSS Hybrid Approach

Posted By: AvaxGenius
Robust and Secured Digital Audio Watermarking: Using a DWT-SVD-DSSS Hybrid Approach

Robust and Secured Digital Audio Watermarking: Using a DWT-SVD-DSSS Hybrid Approach by Krunal N. Patel
English | PDF | 2021 | 104 Pages | ISBN : 3030539105 | 4.3 MB

This book discusses digital audio watermarking copyright assurance. The author first outlines the topic of watermarking data that can be used for copyright assurance that incorporates text messages, copyright audio, handwritten text, logo and cell phone numbers. The objective of this book is to propose a new algorithm that can embed and extract the watermarking information. The execution of the newly proposed algorithm is surveyed by testing data utilizing a group of various audio file types and against various attacks.