|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn953844157 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr mn||||||||| |
008 |
160721t20162016mau ob 000 0 eng d |
040 |
|
|
|a YDXCP
|b eng
|e rda
|e pn
|c YDXCP
|d OPELS
|d EBLCP
|d IDEBK
|d N$T
|d UMI
|d OCLCQ
|d OCLCF
|d YDX
|d OCLCO
|d UPM
|d N$T
|d OSU
|d TOH
|d STF
|d COO
|d DEBSZ
|d DEBBG
|d IDB
|d WAU
|d OCLCQ
|d U3W
|d D6H
|d UOK
|d KSU
|d EZ9
|d OCLCQ
|d WYU
|d OCLCO
|d OCLCQ
|d ERF
|d UKMGB
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB6A2129
|2 bnb
|
016 |
7 |
|
|a 017944644
|2 Uk
|
019 |
|
|
|a 953848625
|a 957278956
|a 958411129
|
020 |
|
|
|a 9780128113844
|q (electronic bk.)
|
020 |
|
|
|a 0128113847
|q (electronic bk.)
|
020 |
|
|
|z 9780128113837
|
020 |
|
|
|z 0128113839
|
029 |
1 |
|
|a AU@
|b 000061149517
|
029 |
1 |
|
|a AU@
|b 000066136280
|
029 |
1 |
|
|a AU@
|b 000067113168
|
029 |
1 |
|
|a CHBIS
|b 010796356
|
029 |
1 |
|
|a CHNEW
|b 001013689
|
029 |
1 |
|
|a CHVBK
|b 403952832
|
029 |
1 |
|
|a DEBBG
|b BV043895025
|
029 |
1 |
|
|a DEBBG
|b BV043969905
|
029 |
1 |
|
|a DEBSZ
|b 480364508
|
029 |
1 |
|
|a DEBSZ
|b 482472359
|
029 |
1 |
|
|a DEBSZ
|b 485804336
|
029 |
1 |
|
|a GBVCP
|b 879398566
|
029 |
1 |
|
|a GBVCP
|b 882758659
|
029 |
1 |
|
|a UKMGB
|b 017944644
|
035 |
|
|
|a (OCoLC)953844157
|z (OCoLC)953848625
|z (OCoLC)957278956
|z (OCoLC)958411129
|
037 |
|
|
|a 940343
|b MIL
|
050 |
|
4 |
|a QA76.9.A25
|b G46 2016eb
|
072 |
|
7 |
|a COM
|x 087010
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8/2
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Ghorbani, Sogand,
|e author.
|
245 |
1 |
0 |
|a Audio content security :
|b attack analysis on audio watermarking /
|c Sogand Ghorbani, Iraj Sadegh Amiri.
|
264 |
|
1 |
|a Cambridge, MA :
|b Syngress is an imprint of Elsevier,
|c [2016]
|
264 |
|
4 |
|c ©2016
|
300 |
|
|
|a 1 online resource (vi, 54 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Syngress advanced topics in information security
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a 1 Introduction; 1.1 Overview; 1.2 Problem Background; 1.3 Problem Statement; 1.4 Purpose of Study; 1.5 Objectives of Study; 1.6 Significance of Study; 1.7 Scope of Study; 1.8 Organization of the Report; 2 Literature Review; 2.1 Introduction; 2.2 Creative Content; 2.2.1 Creative Content Copyright; 2.3 Digital Audio; 2.3.1 Convert a Sound to an Audio File; 2.3.1.1 Effective Parameters on Audio Quality; 2.3.2 Audio Copyright; 2.4 Watermarking; 2.4.1 Audio Watermarking.
|
505 |
8 |
|
|a 2.4.1.1 Fundamental Properties of Audio Watermarking2.4.1.2 Types of Watermark; 2.4.1.3 Watermarking Techniques; 2.4.2 Audio Watermarking issues; 2.4.2.1 Conversion Issue; 2.4.2.2 Resampling Issue; 2.4.2.3 Filtering Issue; 2.4.2.4 Delay Issue; 2.4.2.5 Desynchronization Issue; 2.5 Attacks on Audio; 2.6 Evaluation Method; 2.7 Project Criteria; 3 Methodology; 3.1 Introduction; 3.2 Research Framework; 3.2.1 Research Framework Phase One; 3.2.2 Research Framework Phase Two; 3.2.3 Research Framework Phase Three; 3.3 Research Tools Used; 3.4 Summary; 4 Attack Analysis; 4.1 Introduction.
|
505 |
8 |
|
|a 4.2 Attack Analysis Watermarking Algorithms4.2.1 Results on the Analysis of Audio Watermarking; 4.2.2 Tag Generation; 4.2.3 Encoding Phase; 4.2.4 Decoding Phase; 4.3 Attacks; 4.3.1 MP3 Attack; 4.3.2 Resampling; 4.3.2.1 Down Sampling; 4.3.2.2 Upsampling; 4.3.3 Low-pass filtering; 4.3.4 High-Pass Filtering; 4.3.5 Echo; 4.4 Final Result; 4.5 Summary; 5 Evaluation Analysis; 5.1 Introduction; 5.2 Correlation Between Power and Size Ratio in Audio Watermarking; 5.2.1 Previous Work; 5.3 Correlation Between PSNR and Sampling Rate in Audio Watermarking; 5.4 Summary; 6 Conclusion; 6.1 Introduction.
|
505 |
8 |
|
|a 6.2 Final Achievements6.3 Contribution of Study; 6.4 Future work; References; Back Cover.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Digital watermarking.
|
650 |
|
0 |
|a Sound
|x Recording and reproducing
|x Digital techniques.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
6 |
|a Tatouage numérique.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
7 |
|a digital watermarking.
|2 aat
|
650 |
|
7 |
|a COMPUTERS
|x Digital Media
|x Audio.
|2 bisacsh
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|
650 |
|
7 |
|a Digital watermarking
|2 fast
|
650 |
|
7 |
|a Sound
|x Recording and reproducing
|x Digital techniques
|2 fast
|
700 |
1 |
|
|a Amiri, Iraj Sadegh,
|d 1977-
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Ghorbani, Sogand.
|t Audio content security.
|d Cambridge, MA : Syngress is an imprint of Elsevier, [2016]
|z 0128113839
|w (OCoLC)961004613
|
830 |
|
0 |
|a Syngress advanced topics in information security.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780128113844/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1241655
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis35311177
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 13081963
|
994 |
|
|
|a 92
|b IZTAP
|