Secured and Imperceptible Data Transmission Through Digital Audio Signal with Reduced Internal Noise
暂无分享,去创建一个
[1] Nedeljko Cvejic,et al. ALGORITHMS FOR AUDIO WATERMARKING AND STEGANOGRAPHY , 2004 .
[2] Hugo Fastl,et al. Psychoacoustics: Facts and Models , 1990 .
[3] Edward Jones,et al. Audio quality assessment techniques - A review, and recent developments , 2009, Signal Process..
[4] Yong Zhang,et al. Quantization based Semi-fragile Watermarking Scheme for H.264 Video , 2010 .
[5] Michael Arnold. Audio watermarking: features, applications and algorithms , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[6] Nabin Ghoshal,et al. A framework for block based image authentication (FBIA) , 2009, 2009 International Conference on Industrial and Information Systems (ICIIS).
[7] Nabin Ghoshal,et al. Image Authentication by Hiding Large Volume of Data and Secure Message Transmission Technique using Mask (IAHLVDSMTTM) , 2009, 2009 IEEE International Advance Computing Conference.
[8] Ali Al-Haj,et al. DWT-based audio watermarking , 2011, Int. Arab J. Inf. Technol..
[9] Pranab Kumar Dhar,et al. A New DCT-Based Watermarking Method for Copyright Protection of Digital Audio , 2010 .
[10] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[11] Fatiha Djebbar,et al. Comparative study of digital audio steganography techniques , 2012, EURASIP J. Audio Speech Music. Process..
[12] Foo Say Wei,et al. Audio watermarking using time-frequency compression expansion , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[13] Litao Gang,et al. MP3 resistant oblivious steganography , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[14] Yousof Erfani,et al. Robust audio watermarking using improved TS echo hiding , 2009, Digit. Signal Process..
[15] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[16] Ali Al-Haj. An imperceptible and robust audio watermarking algorithm , 2014, EURASIP J. Audio Speech Music. Process..
[17] S. Varadarajan,et al. A novel hybrid audio steganography for imperceptible data hiding , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).
[18] D. Kahn. Cryptology and the origins of spread spectrum: Engineers during World War II developed an unbreakable scrambler to guarantee secure communications between Allied leaders; actress Hedy Lamarr played a role in the technology , 1984, IEEE Spectrum.
[19] J. K. Mandal,et al. Discrete Fourier Transform based multimedia colour image authentication for wireless communication (DFTMCIAWC) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[20] Said Esmail El-Khamy,et al. A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption , 2016, Multimedia Tools and Applications.
[21] Satish Bhalshankar,et al. Audio Steganography: LSB Technique Using a Pyramid Structure and Range of Bytes , 2015, ArXiv.
[22] Wenjun Ma,et al. Quantization-Based Digital Audio Watermarking in Discrete Fourier Transform Domain , 2010, J. Multim..
[23] Karim Abed-Meraim,et al. Unified phase and magnitude speech spectra data hiding algorithm , 2013, Secur. Commun. Networks.
[24] Nabin Ghoshal,et al. Controlled Data Hiding Technique for Color Image Authentication in Frequency Domain (CDHTCIAFD) , 2011, 2011 Second International Conference on Emerging Applications of Information Technology.