000777041 000__ 04858cam\a2200517Ii\4500 000777041 001__ 777041 000777041 005__ 20230306142556.0 000777041 006__ m\\\\\o\\d\\\\\\\\ 000777041 007__ cr\nn\nnnunnun 000777041 008__ 160811t20162017si\a\\\\ob\\\\000\0\eng\d 000777041 019__ $$a959534355$$a959648974 000777041 020__ $$a9789811020957$$q(electronic book) 000777041 020__ $$a9811020957$$q(electronic book) 000777041 020__ $$z9789811020940 000777041 035__ $$aSP(OCoLC)ocn956505400 000777041 035__ $$aSP(OCoLC)956505400$$z(OCoLC)959534355$$z(OCoLC)959648974 000777041 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dEBLCP$$dIDEBK$$dOCLCQ$$dGW5XE$$dN$T$$dOCLCF$$dYDX$$dDEBBG$$dIDB$$dUAB$$dIOG 000777041 049__ $$aISEA 000777041 050_4 $$aQA76.9.A25 000777041 08204 $$a005.8/2$$223 000777041 1001_ $$aNematollahi, Mohammad Ali,$$eauthor. 000777041 24510 $$aDigital watermarking :$$btechniques and trends /$$cMohammad Ali Nematollahi, Chalee Vorakulpipat, Hamurabi Gamboa Rosales. 000777041 264_1 $$aSingapore :$$bSpringer,$$c[2016]. 000777041 264_4 $$c©2017 000777041 300__ $$a1 online resource (xxv, 203 pages) :$$billustrations. 000777041 336__ $$atext$$btxt$$2rdacontent 000777041 337__ $$acomputer$$bc$$2rdamedia 000777041 338__ $$aonline resource$$bcr$$2rdacarrier 000777041 4901_ $$aSpringer topics in signal processing,$$x1866-2609 ;$$vvolume 11 000777041 504__ $$aIncludes bibliographical references. 000777041 5050_ $$aPreface; Acknowledgements; Contents; About the Authors; Abbreviations; List of Figures; List of Tables; 1 Preliminary on Watermarking Technology; 1.1 Overview; 1.2 Fundamentals of Digital Watermarking; 1.3 Requirements of Digital Watermarking; 1.3.1 Robustness of Digital Watermarking; 1.3.2 Capacity of Digital Watermarking; 1.3.3 Imperceptibility of Digital Watermarking; 1.3.3.1 Objective Measurement; 1.3.3.2 Subjective Measurement; 1.3.3.3 Intelligibility Measurement; 1.3.4 Tamper Resistance; 1.3.5 Computational Cost; 1.3.6 False Positive Rate; 1.3.7 False Negative Rate 000777041 5058_ $$a1.4 Zero Watermarking1.5 Applications of Digital Watermarking; 1.6 Book Structure; References; Part I Signal Watermarking; 2 Audio Watermarking; 2.1 Introduction; 2.2 Transmission Channel; 2.3 Audio Watermarking Techniques; 2.3.1 Temporal Domain; 2.3.1.1 Low-Bit Encoding; 2.3.1.2 Echo Hiding; 2.3.1.3 Hiding in Silence Intervals; 2.3.2 Frequency Domain; 2.3.2.1 Spread Spectrum; 2.3.2.2 Discrete Wavelet Transform; 2.3.2.3 Tone Insertion; 2.3.2.4 Phase Coding; 2.3.2.5 Amplitude Coding; 2.3.2.6 Cepstral Domain; 2.3.3 Coded Domain; 2.3.3.1 In-Encoder Techniques; 2.3.3.2 Post-encoder Techniques 000777041 5058_ $$a2.4 Embedding Approach2.4.1 Embedding Before Encoding (Pre-encoding); 2.4.2 Embedding During Encoding (in-Encoder); 2.4.3 Embedding After Encoding (Post-encoder); 2.5 Audio Attacks; 2.5.1 Dynamics; 2.5.1.1 Compressor; 2.5.1.2 Denoiser; 2.5.2 Filter; 2.5.3 Ambience; 2.5.4 Conversion; 2.5.5 Loss Compression; 2.5.6 Noise; 2.5.7 Modulation; 2.5.8 Time Stretch and Pitch Shift; 2.5.9 Sample Permutations; 2.6 Comparison Among Different Audio Watermarking Methods; References; 3 Speech Watermarking; 3.1 Introduction; 3.2 Speech Versus Audio; 3.3 Linear Predictive Analysis (LPA) 000777041 5058_ $$a3.4 Speech Watermarking Techniques3.4.1 Speech Watermarking Based on auditory Masking; 3.4.1.1 Frequency Masking; 3.4.1.2 Temporal Masking; 3.4.2 Speech Watermarking Based on Phase Modulation; 3.4.2.1 Autoregressive (AR) Phase Model; 3.4.2.2 DFT Phase Model; 3.4.2.3 Lapped Orthogonal Transforms; 3.4.3 Speech Watermarking Based on Quantization; 3.4.3.1 QIM; 3.4.3.2 RDM; 3.4.4 Speech Watermarking Based on transformation; 3.4.4.1 Spread Spectrum; 3.4.4.2 Bitstream Domain; 3.4.5 Speech Watermarking Based on Parametric Modeling; 3.5 Attacks for Speech Watermarking 000777041 5058_ $$a3.5.1 Additive White Gaussian Noise (AWGN)3.5.2 Low-Pass Filter (LPF); 3.5.3 Band-Pass Filter (BPF); 3.5.4 A-Law; 3.5.5 µ-Law; 3.5.6 CELP; 3.5.7 Amplitude Variation; 3.5.8 Resample; 3.5.9 Requantization; 3.6 Challenges in Speech Watermarking; References; Part II Multimedia Watermarking; 4 Image Watermarking; 4.1 Introduction; 4.2 Background; 4.3 Image Watermarking Techniques; 4.3.1 Spatial Domain; 4.3.2 Transform Domain; 4.3.3 Multiple Domains; 4.4 Image Attacks; 4.5 Challenges in Image Watermarking; 4.6 Image Watermarking Based of Human Visual System; 4.7 Medical Image Watermarking 000777041 506__ $$aAccess limited to authorized users. 000777041 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed August 22, 2016). 000777041 650_0 $$aDigital watermarking. 000777041 7001_ $$aVorakulpipat, Chalee,$$eauthor. 000777041 7001_ $$aRosales, Hamurabi Gamboa,$$eauthor. 000777041 77608 $$iPrint version:$$aNematollahi, Mohammad Ali.$$tDigital watermarking$$z9789811020940 000777041 830_0 $$aSpringer topics in signal processing ;$$vv. 11. 000777041 852__ $$bebk 000777041 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-10-2095-7$$zOnline Access$$91397441.1 000777041 909CO $$ooai:library.usi.edu:777041$$pGLOBAL_SET 000777041 980__ $$aEBOOK 000777041 980__ $$aBIB 000777041 982__ $$aEbook 000777041 983__ $$aOnline 000777041 994__ $$a92$$bISE