Cargando…

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn953844157
003 OCoLC
005 20231017213018.0
006 m o d
007 cr mn|||||||||
008 160721t20162016mau ob 000 0 eng d
040 |a YDXCP  |b eng  |e rda  |e pn  |c YDXCP  |d OPELS  |d EBLCP  |d IDEBK  |d N$T  |d UMI  |d OCLCQ  |d OCLCF  |d YDX  |d OCLCO  |d UPM  |d N$T  |d OSU  |d TOH  |d STF  |d COO  |d DEBSZ  |d DEBBG  |d IDB  |d WAU  |d OCLCQ  |d U3W  |d D6H  |d UOK  |d KSU  |d EZ9  |d OCLCQ  |d WYU  |d OCLCO  |d OCLCQ  |d ERF  |d UKMGB  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB6A2129  |2 bnb 
016 7 |a 017944644  |2 Uk 
019 |a 953848625  |a 957278956  |a 958411129 
020 |a 9780128113844  |q (electronic bk.) 
020 |a 0128113847  |q (electronic bk.) 
020 |z 9780128113837 
020 |z 0128113839 
029 1 |a AU@  |b 000061149517 
029 1 |a AU@  |b 000066136280 
029 1 |a AU@  |b 000067113168 
029 1 |a CHBIS  |b 010796356 
029 1 |a CHNEW  |b 001013689 
029 1 |a CHVBK  |b 403952832 
029 1 |a DEBBG  |b BV043895025 
029 1 |a DEBBG  |b BV043969905 
029 1 |a DEBSZ  |b 480364508 
029 1 |a DEBSZ  |b 482472359 
029 1 |a DEBSZ  |b 485804336 
029 1 |a GBVCP  |b 879398566 
029 1 |a GBVCP  |b 882758659 
029 1 |a UKMGB  |b 017944644 
035 |a (OCoLC)953844157  |z (OCoLC)953848625  |z (OCoLC)957278956  |z (OCoLC)958411129 
037 |a 940343  |b MIL 
050 4 |a QA76.9.A25  |b G46 2016eb 
072 7 |a COM  |x 087010  |2 bisacsh 
082 0 4 |a 005.8/2  |2 23 
049 |a UAMI 
100 1 |a Ghorbani, Sogand,  |e author. 
245 1 0 |a Audio content security :  |b attack analysis on audio watermarking /  |c Sogand Ghorbani, Iraj Sadegh Amiri. 
264 1 |a Cambridge, MA :  |b Syngress is an imprint of Elsevier,  |c [2016] 
264 4 |c ©2016 
300 |a 1 online resource (vi, 54 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Syngress advanced topics in information security 
504 |a Includes bibliographical references. 
505 0 |a 1 Introduction; 1.1 Overview; 1.2 Problem Background; 1.3 Problem Statement; 1.4 Purpose of Study; 1.5 Objectives of Study; 1.6 Significance of Study; 1.7 Scope of Study; 1.8 Organization of the Report; 2 Literature Review; 2.1 Introduction; 2.2 Creative Content; 2.2.1 Creative Content Copyright; 2.3 Digital Audio; 2.3.1 Convert a Sound to an Audio File; 2.3.1.1 Effective Parameters on Audio Quality; 2.3.2 Audio Copyright; 2.4 Watermarking; 2.4.1 Audio Watermarking. 
505 8 |a 2.4.1.1 Fundamental Properties of Audio Watermarking2.4.1.2 Types of Watermark; 2.4.1.3 Watermarking Techniques; 2.4.2 Audio Watermarking issues; 2.4.2.1 Conversion Issue; 2.4.2.2 Resampling Issue; 2.4.2.3 Filtering Issue; 2.4.2.4 Delay Issue; 2.4.2.5 Desynchronization Issue; 2.5 Attacks on Audio; 2.6 Evaluation Method; 2.7 Project Criteria; 3 Methodology; 3.1 Introduction; 3.2 Research Framework; 3.2.1 Research Framework Phase One; 3.2.2 Research Framework Phase Two; 3.2.3 Research Framework Phase Three; 3.3 Research Tools Used; 3.4 Summary; 4 Attack Analysis; 4.1 Introduction. 
505 8 |a 4.2 Attack Analysis Watermarking Algorithms4.2.1 Results on the Analysis of Audio Watermarking; 4.2.2 Tag Generation; 4.2.3 Encoding Phase; 4.2.4 Decoding Phase; 4.3 Attacks; 4.3.1 MP3 Attack; 4.3.2 Resampling; 4.3.2.1 Down Sampling; 4.3.2.2 Upsampling; 4.3.3 Low-pass filtering; 4.3.4 High-Pass Filtering; 4.3.5 Echo; 4.4 Final Result; 4.5 Summary; 5 Evaluation Analysis; 5.1 Introduction; 5.2 Correlation Between Power and Size Ratio in Audio Watermarking; 5.2.1 Previous Work; 5.3 Correlation Between PSNR and Sampling Rate in Audio Watermarking; 5.4 Summary; 6 Conclusion; 6.1 Introduction. 
505 8 |a 6.2 Final Achievements6.3 Contribution of Study; 6.4 Future work; References; Back Cover. 
588 0 |a Print version record. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Digital watermarking. 
650 0 |a Sound  |x Recording and reproducing  |x Digital techniques. 
650 0 |a Data encryption (Computer science) 
650 6 |a Tatouage numérique. 
650 6 |a Chiffrement (Informatique) 
650 7 |a digital watermarking.  |2 aat 
650 7 |a COMPUTERS  |x Digital Media  |x Audio.  |2 bisacsh 
650 7 |a Data encryption (Computer science)  |2 fast 
650 7 |a Digital watermarking  |2 fast 
650 7 |a Sound  |x Recording and reproducing  |x Digital techniques  |2 fast 
700 1 |a Amiri, Iraj Sadegh,  |d 1977-  |e author. 
776 0 8 |i Print version:  |a Ghorbani, Sogand.  |t Audio content security.  |d Cambridge, MA : Syngress is an imprint of Elsevier, [2016]  |z 0128113839  |w (OCoLC)961004613 
830 0 |a Syngress advanced topics in information security. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128113844/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a EBSCOhost  |b EBSC  |n 1241655 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis35311177 
938 |a YBP Library Services  |b YANK  |n 13081963 
994 |a 92  |b IZTAP