2014
DOI: 10.4236/jsea.2014.710077
|View full text |Cite
|
Sign up to set email alerts
|

Imperceptible and Robust DWT-SVD-Based Digital Audio Watermarking Algorithm

Abstract: How to cite this paper: Darabkh, K.A. (2014) Imperceptible and Robust DWT-SVD-Based Digital Audio Watermarking Algorithm. Journal of Software Engineering and Applications, 7, 859-871. http://dx. AbstractDigital representation of multimedia is more advantageous than the analog one due to potentially improving the portability, efficiency, and accuracy of the information presented. Despite the challenge of having high hiding capacity like other media watermarking, still audios are likely candidates for data hidin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
7
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
4

Relationship

3
6

Authors

Journals

citations
Cited by 24 publications
(7 citation statements)
references
References 33 publications
0
7
0
Order By: Relevance
“…Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman cryptosystem (RSA) are some of the common encryption methods [13]. The other approach is data hiding which is basically classified into two parts, namely, watermarking and steganography [14][15][16][17]. The main difference between them is that the former secures the carrier-object along with copyright information, while the later secures the embedded message into the carrier-object only [18][19][20][21][22][23][24].…”
Section: Introductionmentioning
confidence: 99%
“…Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman cryptosystem (RSA) are some of the common encryption methods [13]. The other approach is data hiding which is basically classified into two parts, namely, watermarking and steganography [14][15][16][17]. The main difference between them is that the former secures the carrier-object along with copyright information, while the later secures the embedded message into the carrier-object only [18][19][20][21][22][23][24].…”
Section: Introductionmentioning
confidence: 99%
“…Science, mathematics, engineering, computer networking, medical specialties, and even literature are some of the fields which use computer programs in their courses to apply the skills taught theoretically in the class room in a practical way and to create a simulated environment which make the learning process more interactive, realistic, and even efficient compared to the old traditional methods . However, to take advantage of these programs, a basic knowledge of computer software is required by the student along with the physical ability to interact with the machine using input and output devices .…”
Section: Introductionmentioning
confidence: 99%
“…Owing to the easiness of digital duplication and tampering, data security becomes a challenging matter for most of researchers nowadays. One of great interest solutions is the use of information hiding which encompasses many sub-disciplines, among them steganography and watermarking [7][8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%