List of Tables
Table 1.1 | Audio Piracy Estimation | 2 |
Table 2.1 | Audio File Categories | 9 |
Table 2.2 | Uncompressed Audio File | 10 |
Table 2.3 | Lossless File Format | 10 |
Table 2.4 | Lossy File Format | 11 |
Table 2.5 | Types of Watermark | 15 |
Table 2.6 | Techniques of Watermarking | 15 |
Table 2.7 | Attacks on Audio Watermarking | 18 |
Table 2.8 | Evaluation Methods | 19 |
Table 4.1 | Dataset | 29 |
Table 4.2 | List of Tags | 30 |
Table 4.3 | Information of Embedding Process for Rock Songs | 30 |
Table 4.4 | Information of Embedding Process for Pop Songs | 31 |
Table 4.5 | Information of Embedding Process for Classical Songs | 31 |
Table 4.6 | Information of Embedding Process for Ambient Songs | 32 |
Table 4.7 | Information of Extraction Process of Rock Songs | 32 |
Table 4.8 | Information of Extraction Process ... |
Get Audio Content Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.