O'Reilly logo

Audio Content Security by Iraj Sadegh Amiri, Sogand Ghorbani

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

List of Tables

Table 1.1 Audio Piracy Estimation 2
Table 2.1 Audio File Categories 9
Table 2.2 Uncompressed Audio File 10
Table 2.3 Lossless File Format 10
Table 2.4 Lossy File Format 11
Table 2.5 Types of Watermark 15
Table 2.6 Techniques of Watermarking 15
Table 2.7 Attacks on Audio Watermarking 18
Table 2.8 Evaluation Methods 19
Table 4.1 Dataset 29
Table 4.2 List of Tags 30
Table 4.3 Information of Embedding Process for Rock Songs 30
Table 4.4 Information of Embedding Process for Pop Songs 31
Table 4.5 Information of Embedding Process for Classical Songs 31
Table 4.6 Information of Embedding Process for Ambient Songs 32
Table 4.7 Information of Extraction Process of Rock Songs 32
Table 4.8 Information of Extraction Process ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required