Audio Content Security: Attack Analysis on Audio Watermarking
By Sogand Ghorbani and Iraj Sadegh Amiri
()
About this ebook
Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks.
The results of this study can be used for further studies and to establish the need to have a particular way of audio watermarking for each particular group of songs, each with different characteristics. An additional aspect of this study tests and analyzes two parameters of audio host file and watermark on a specific evaluation method (PSNR) for audio watermarking.
- Describes research using a common audio watermarking method for four different genres of music
- Provides the results of many test attacks
- Presents tests and analyzes two parameters of audio host file and watermark on a specific evaluation method (PSNR) for audio watermarking
Sogand Ghorbani
Sogand Ghorbani received her B. Sc. (software engineering) from University of Basir Abik, Iran, and her M. Sc. in Information Security from University Teknologi Malaysia (UTM). She currently conducts research in telecommunications and computer science.
Related to Audio Content Security
Related ebooks
Robust Automatic Speech Recognition: A Bridge to Practical Applications Rating: 0 out of 5 stars0 ratingsSecuring the Internet of Things Rating: 5 out of 5 stars5/5Mobile Security and Privacy: Advances, Challenges and Future Research Directions Rating: 5 out of 5 stars5/5Cloud Storage Forensics Rating: 4 out of 5 stars4/5Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems Rating: 0 out of 5 stars0 ratingsMPEG-V: Bridging the Virtual and Real World Rating: 0 out of 5 stars0 ratingsManaging the Web of Things: Linking the Real World to the Web Rating: 0 out of 5 stars0 ratingsContemporary Digital Forensic Investigations of Cloud and Mobile Applications Rating: 0 out of 5 stars0 ratingsA Beginner's Guide to Data Agglomeration and Intelligent Sensing Rating: 0 out of 5 stars0 ratingsSpeech in Mobile and Pervasive Environments Rating: 0 out of 5 stars0 ratingsWireless Reconnaissance in Penetration Testing: Using Scanners to Monitor Radios during Penetration Tests Rating: 0 out of 5 stars0 ratingsMachine Learning for Future Fiber-Optic Communication Systems Rating: 0 out of 5 stars0 ratingsManaging Information Security Rating: 0 out of 5 stars0 ratingsAcademic Press Library in Signal Processing, Volume 6: Image and Video Processing and Analysis and Computer Vision Rating: 0 out of 5 stars0 ratingsDeep Learning on Edge Computing Devices: Design Challenges of Algorithm and Architecture Rating: 0 out of 5 stars0 ratingsIntelligent Systems for Security Informatics Rating: 0 out of 5 stars0 ratingsSafety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP Rating: 0 out of 5 stars0 ratingsThe Science and Technology of Counterterrorism: Measuring Physical and Electronic Security Risk Rating: 0 out of 5 stars0 ratingsInformation Security Science: Measuring the Vulnerability to Data Compromises Rating: 0 out of 5 stars0 ratingsSpeech Enhancement: A Signal Subspace Perspective Rating: 0 out of 5 stars0 ratingsSpeech and Audio Processing for Coding, Enhancement and Recognition Rating: 0 out of 5 stars0 ratingsDynamic Risk Assessment and Management of Domino Effects and Cascading Events in the Process Industry Rating: 0 out of 5 stars0 ratingsCISSP Study Guide Rating: 3 out of 5 stars3/5RIoT Control: Understanding and Managing Risks and the Internet of Things Rating: 5 out of 5 stars5/5Taking the LEAP: The Methods and Tools of the Linked Engineering and Manufacturing Platform (LEAP) Rating: 0 out of 5 stars0 ratingsData Hiding Fundamentals and Applications: Content Security in Digital Multimedia Rating: 5 out of 5 stars5/5Computer Security Aspects of Design for Instrumentation and Control Systems at Nuclear Power Plants Rating: 0 out of 5 stars0 ratingsSecurity and Resilience in Intelligent Data-Centric Systems and Communication Networks Rating: 0 out of 5 stars0 ratingsMultimedia Security Technologies for Digital Rights Management Rating: 0 out of 5 stars0 ratings
Technology & Engineering For You
The Big Book of Maker Skills: Tools & Techniques for Building Great Tech Projects Rating: 4 out of 5 stars4/5The Big Book of Hacks: 264 Amazing DIY Tech Projects Rating: 4 out of 5 stars4/5The Art of War Rating: 4 out of 5 stars4/5Ultralearning: Master Hard Skills, Outsmart the Competition, and Accelerate Your Career Rating: 4 out of 5 stars4/5How to Write Effective Emails at Work Rating: 4 out of 5 stars4/5Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future Rating: 4 out of 5 stars4/580/20 Principle: The Secret to Working Less and Making More Rating: 5 out of 5 stars5/5The 48 Laws of Power in Practice: The 3 Most Powerful Laws & The 4 Indispensable Power Principles Rating: 5 out of 5 stars5/5My Inventions: The Autobiography of Nikola Tesla Rating: 4 out of 5 stars4/5Smart Phone Dumb Phone: Free Yourself from Digital Addiction Rating: 0 out of 5 stars0 ratingsThe ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsThe CIA Lockpicking Manual Rating: 5 out of 5 stars5/5Logic Pro X For Dummies Rating: 0 out of 5 stars0 ratingsBroken Money: Why Our Financial System is Failing Us and How We Can Make it Better Rating: 5 out of 5 stars5/5The Art of War Rating: 4 out of 5 stars4/5The Fast Track to Your Technician Class Ham Radio License: For Exams July 1, 2022 - June 30, 2026 Rating: 5 out of 5 stars5/5No Nonsense Technician Class License Study Guide: for Tests Given Between July 2018 and June 2022 Rating: 5 out of 5 stars5/5A History of the American People Rating: 4 out of 5 stars4/5Understanding Media: The Extensions of Man Rating: 4 out of 5 stars4/5Artificial Intelligence: A Guide for Thinking Humans Rating: 4 out of 5 stars4/5The Systems Thinker: Essential Thinking Skills For Solving Problems, Managing Chaos, Rating: 4 out of 5 stars4/5Summary of Nicolas Cole's The Art and Business of Online Writing Rating: 4 out of 5 stars4/5Longitude: The True Story of a Lone Genius Who Solved the Greatest Scientific Problem of His Time Rating: 4 out of 5 stars4/5Ghost Rider: Travels on the Healing Road Rating: 4 out of 5 stars4/5The Invisible Rainbow: A History of Electricity and Life Rating: 4 out of 5 stars4/5Stop Asking Questions: How to Lead High-Impact Interviews and Learn Anything from Anyone Rating: 5 out of 5 stars5/5
Reviews for Audio Content Security
0 ratings0 reviews