O'Reilly logo

Audio Content Security by Iraj Sadegh Amiri, Sogand Ghorbani

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

List of Figures

Figure 1.1 Audio processing system architecture 3
Figure 2.1 Continuous waveform 11
Figure 2.2 Sampled and quantized representation 12
Figure 2.3 General architecture of watermarking system 14
Figure 3.1 Research framework 22
Figure 4.1 Proportion of successful extraction 34
Figure 4.2 Successful extraction using number of packets 37
Figure 4.3 Proportion of successful extraction after down sampling 39
Figure 4.4 Representation of low- and high-pass filters 40
Figure 4.5 Proportion of successful extraction after filtering attack 41
Figure 4.6 Proportion of successful extraction for all attacks 43
Figure 5.1 Representation of correlation between size and PSNR 46
Figure 5.2 Representation of correlation between size ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required