2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221)
DOI: 10.1109/icassp.2001.941177
|View full text |Cite
|
Sign up to set email alerts
|

Robust spread-spectrum audio watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
55
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 105 publications
(55 citation statements)
references
References 7 publications
0
55
0
Order By: Relevance
“…Since these α values satisfy the relations in (14) and (15), they also satisfy (12) and (13). For example, two of the eight sets of α values are as follows.…”
Section: ) Segmentation Of Host Audio Signalmentioning
confidence: 97%
See 1 more Smart Citation
“…Since these α values satisfy the relations in (14) and (15), they also satisfy (12) and (13). For example, two of the eight sets of α values are as follows.…”
Section: ) Segmentation Of Host Audio Signalmentioning
confidence: 97%
“…Furthermore, with respect to decoding, blind methods that can extract watermarking data without resort to host audio signal is desirable as semi-blind and non-blind methods are not applicable to most practical applications [1]. Over the past decade, many audio watermarking methods have been developed by using different techniques such as spread-spectrum [14]- [16], support vector regression [17]- [19], echo-hiding [5]- [7], [20]- [21], and patchwork [1], [8], [22]. The watermarking methods based on patchwork technique are very promising due to their remarkable robustness against conventional attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Watermark embedding is a technique that embeds a secret message into the software hosts to determine ownership of code and helps in preventing tampering of source code. Some of the more recent works have developed techniques for embedding watermarks into various other medias, such as images [3]- [5], audio [6] or video files [7]. Other works include those by Collberg, Palsbery etc.…”
Section: Introductionmentioning
confidence: 99%
“…The time-domain methods, such as the least significant bit-replacement (LSB) [3] method and the echo hidingbased methods [4], [5], however, were prone to be not robust. Methods in [6]- [8] and the spread spectrum-based methods [9]- [12] tried to achieve stronger robustness in the transform-domain while inaudibility could not be always satisfied. Since the human auditory system (HAS) is particularly sensitive, several previous studies [13]- [15] exploited the properties of HAS and applied such knowledge for watermarking.…”
Section: Introductionmentioning
confidence: 99%