O'Reilly logo

Audio Content Security by Iraj Sadegh Amiri, Sogand Ghorbani

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6

Conclusion

Abstract

The discussion about findings of the impact of attacks on Dual method in audio watermarking is discussed in further details. Based on the analysis in Chapters 4, Attack Analysis, and 5, Evaluation Analysis, the findings would be explained here and an overlooked consideration is clarified; also the possible future works based on this project would be introduced too. Following sections discussed about how the study achieved to its objectives and meets its goals which were: (1) to analyze the possible signal processing on audio files and observe their effects on the embedded watermark and the audio itself regarding to different genres of music, (2) to correlate different parameters of audio structure and watermark on ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required