Cepstrum-Based Audio Watermarking Algorithm against the A/D and D/A Attacks
暂无分享,去创建一个
[1] Utz Roedig,et al. Intrusion detection systems for IP telephony networks , 2002 .
[2] T.F. Lunt,et al. Real-time intrusion detection , 1989, Digest of Papers. COMPCON Spring 89. Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage.
[3] Wang Rangding,et al. An New Method of Audio-Digital Watermarking Based on Trap Strategy , 2006 .
[4] Xiaoming Zhang,et al. Bisynchronous Approach for Robust Audio Watermarking Technology , 2007, PCM.
[5] Jana Dittmann,et al. Audio watermarking quality evaluation: robustness to DA/AD processes , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.
[6] Shinfeng D. Lin,et al. BCH Code-Based Robust Audio Watermarking in the Cepstrum Domain , 2006, J. Inf. Sci. Eng..
[7] Toshio Modegi. Nearly Lossless Audio Watermark Embedding Techniques to be Extracted Contactlessly by Cell Phone , 2006, 7th International Conference on Mobile Data Management (MDM'06).
[8] Xiang Shi. An Audio Watermarking Algorithm Against the D/A and A/D Conversions , 2006 .
[9] G. Kubin,et al. Safety and security increase for air traffic management through unnoticeable watermark aircraft identification tag transmitted with the VHF voice communication , 2003, Digital Avionics Systems Conference, 2003. DASC '03. The 22nd.
[10] Pedro Cano,et al. Audio Watermarking and Fingerprinting: For Which Applications? , 2003 .