2012
DOI: 10.5121/ijma.2012.4410
|View full text |Cite
|
Sign up to set email alerts
|

Lossless Audio Watermarking Based on the Alpha Statistic Modulation

Abstract: In this paper, we propose a high capacity, self-synchronized, lossless audio watermarking algorithm based on the alpha ('α') MP3 compression, cropping, filtering,

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Most of the recent work reviewed here rely on the concept of quantizing some parameters following the quantization index modulation (QIM) approach [2,6,7,15]. The quantized parameters are in a transformed space, for example, the Walsh-Hadamard [8], or the wavelet domains [2,9,10,11,14,15]. Many of the recent techniques apply singular value decomposition (SVD) [3,6,7] as a means of making the embedding more robust.…”
Section: Audio Watermarking Recent Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Most of the recent work reviewed here rely on the concept of quantizing some parameters following the quantization index modulation (QIM) approach [2,6,7,15]. The quantized parameters are in a transformed space, for example, the Walsh-Hadamard [8], or the wavelet domains [2,9,10,11,14,15]. Many of the recent techniques apply singular value decomposition (SVD) [3,6,7] as a means of making the embedding more robust.…”
Section: Audio Watermarking Recent Workmentioning
confidence: 99%
“…In particular, SS suffers from host rejection problem which reduces its payload capacity to increase the spreading rate, while QIM suffers from low immunity to additive noise and both have problems with MP3 compression/decompression attacks. Recently, there has been a considerable amount of work in robust watermarking of MP3 audio to overcome some of the problems of the traditional techniques [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15]. Recent work focuses on the effects of MP3 compression/decompression sampling rate conversion, and synchronization attacks, among other attacks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation