O'Reilly logo

Audio Content Security by Iraj Sadegh Amiri, Sogand Ghorbani

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

References

1. Atoum MS, et al. A steganography method based on hiding secret data in MPEG/audio layerIII. IJCSNS. 2011;11(5):184.

2. Chen B, Wornell GW. Quantization index modulation methods for digital watermarking and information embedding of multimedia. J VLSI Signal Process Syst Signal Image Video Technol. 2001;27:7–33.

3. Chen S-T, Huang H-N, Chen C-J, Tseng K-K, Tu S-Y. Adaptive audio watermarking via the optimization point of view on the wavelet-based entropy. Digit Signal Process. 2013;23(3):971–980.

4. Cox IJ, Miller ML. The first 50 years of electronic watermarking. EURASIP J Appl Signal Process. 2002;2002:126–132.

5. Deschamp, J., Guerrero, D., Zwiebel, R., 2012. Multi-Channel Audio Display. Google Patents.

6. Fallahpour M, Megías ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required