2018
DOI: 10.1109/taslp.2017.2782487
|View full text |Cite
|
Sign up to set email alerts
|

Spread Spectrum Audio Watermarking Using Multiple Orthogonal PN Sequences and Variable Embedding Strengths and Polarities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
46
0
1

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 69 publications
(47 citation statements)
references
References 27 publications
0
46
0
1
Order By: Relevance
“…Afterwards, he starts watermark extraction by initializing G as an empty n × k matrix. Then, S i [1] Afterwards, the pairs in P * are sorted in ascending order according to the lexicographical order. For each pair, denote the modified value as Y, and the embedded bits as a.…”
Section: Watermark Extractionmentioning
confidence: 99%
See 2 more Smart Citations
“…Afterwards, he starts watermark extraction by initializing G as an empty n × k matrix. Then, S i [1] Afterwards, the pairs in P * are sorted in ascending order according to the lexicographical order. For each pair, denote the modified value as Y, and the embedded bits as a.…”
Section: Watermark Extractionmentioning
confidence: 99%
“…In the last decades, researchers mainly focus on the advancement of watermarking technology in multimedia, including algorithms for audio [1][2][3], image [4][5][6][7][8], and video [9][10][11]. Researchers have also proposed many watermarking schemes for texts and databases.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Kode PN merupakan kode yang bersifat ortogonal dan dalam buku (Shulze & Luders, 2005) pada bab CDMA atau pada (Yani, Rizal, & Prasetya, 2008), kode PN dihasilkan dari teknik atau proses Linear Feedback Shift Register (LFSR). Proses LFSR akan menghasilkan kode random bit 0 dan 1 secara acak namun ortogonal satu sama lain, setelah itu pada (Xiang, Natgunanathan, Peng, Hua, & Liu, 2018) kode acak 0 dan 1 tersebut dilakukan proses penguraian dengan prosedur Gram Schmidt menghasilkan kode yang terdiri dari bilangan desimal dan terdistribusi Gaussian dengan persamaan probability density function (pdf) terdistribusi Gaussian sesuai yang ditunjukkan pada Persamaan (1). Umumnya…”
Section: Pendahuluanunclassified
“…Zhang et al exploited the correlation between the host signal and the watermark as well as the bit message to be embedded to improve the decoding performance [19]. Xiang et al proposed a novel SS-based on the audio watermarking method which can not only remove the host signal interference but also maintain higher embedding capacity and better robustness [20]. Whereas, these methods all have the weakness of desynchronization attacks.…”
Section: Introductionmentioning
confidence: 99%