참고문헌
- W. Bender, D. Gruhl, and N. Morimoto, "Techniques for Data Hiding," IBM Syst. J., vol. 35, no. 3/4, 1996, pp. 131-336.
- H.T. Hu, L.Y. Hsu, and H.H. Chou, "Perceptual Based DWPT-DCT Framework for Selective Blind Audio Watermarking," Signal Process., vol. 105, Dec. 2014, pp. 316-327. https://doi.org/10.1016/j.sigpro.2014.05.003
- H.T. Hu and L.Y. Hsu, "Robust, Transparent and High Capacity Audio Watermarking in DCT Domain," Signal Process., vol. 109, no. C, Apr. 2015, pp. 226-235. https://doi.org/10.1016/j.sigpro.2014.11.011
- M. Fallahpour and D. Megias, "High Capacity Method for Real-Time Audio Data Hiding Using the FFT Transform," Adv. Inform. Sec. Appl., vol. 36, 2009, pp. 91-97.
- M. Fallahpour and D. Megias, "Audio Watermarking Based on Fibonacci Number," IEEE/ACM Trans. Audio Speech Language Proc., vol. 23, no. 8, Aug. 2015, pp. 1273-1282. https://doi.org/10.1109/TASLP.2015.2430818
- S.-T. Chen, C.-Y. Hsu, and H.-N. Huang, "Wavelet-Domain Audio Watermarking Using Optimal Modification on Low-Frequency Amplitude," IET Signal Proc., vol. 9, no. 2, 2015, pp. 166-176. https://doi.org/10.1049/iet-spr.2013.0399
- M. Mosleh, H. Latifpour, M. Kheyrandish, M. Mosleh, and N. Hosseinpour, "A Robust Intelligent Audio Watermarking Scheme Using Support Vector Machine," Front. Inform. Technol. Electron. Eng., vol. 17, no. 12, Dec. 2016, pp. 1320-1330. https://doi.org/10.1631/FITEE.1500297
- P. Hu, D. Peng, Z. Yi, and Y. Xiang "Robust Time-Spread Echo Watermarking Using Characteristics of Host Signals," IEEE Electron. Lett., vol. 52, no. 1, 2016, pp. 5-6. https://doi.org/10.1049/el.2015.1508
- R. Li, S. Xu, and H. Yang, "Spread Spectrum Audio Watermarking Based on Perceptual; Characteristic Aware Extraction," IET Signal Proc. Lett., vol. 10, no. 3, Apr. 2016, pp. 266-273. https://doi.org/10.1049/iet-spr.2014.0388
- Y. Erfani, R. Pichevar, and J. Rouat, "Audio Watermarking Using Spikegram and a Two-Dictionary Approach," IEEE Trans. Inform. Forensics Secur., vol. 12, no. 4, Apr. 2017, pp. 840-852. https://doi.org/10.1109/TIFS.2016.2636094
- A. Kaur, M.K. Dutta, K.M. Soni, and N. Taneja, "Localized & Self Adaptive Audio Watermarking Algorithm in Wavelet Domain," J. Inform. Security Appl., vol. 33, no. 1, Apr. 2017, pp. 1-15. https://doi.org/10.1016/j.jisa.2016.12.003
- S. Wu, J. Huang, D. Huang, and Y.Q. Shi, "Efficiently Self-Synchronized Audio Watermarking for Assured Data Transmission," IEEE Trans. Broadcast, vol. 51, no. 1, Mar. 2007, pp. 69-76.
- W. Li, X. Xue, and P. Lu, "Localized Audio Watermarking Technique Robust Against Time Scale Modification," IEEE Trans. Multimedia, vol. 8, no. 1, Feb. 2006, pp. 60-69. https://doi.org/10.1109/TMM.2005.861291
- A. Kaur, M.K. Dutta, K.M. Soni, and N. Taneja, "A Blind Audio Watermarking Algorithm Robust Against Synchronization Attacks," IEEE Int. Conf. Signal Process., Comput. Contr., Solan, India, Sept. 26-28, 2013, pp. 1-6.
- R. Wang, D. Xu, J. Chen, and C. Du, "Digital Audio Watermarking Algorithm Based on Linear Predictive Coding in Wavelet Domain," IEEE Int. Conf. Signal Process., (ICSP), Beijing, China, 2004, pp. 2393-2396.
- S. Xiang and J. Huang, "Histogram Based Audio Watermarking Against Time Scale Modification and Cropping Attacks," IEEE Trans. Multimedia, vol. 9, no. 7, Nov. 2007, pp. 1357-1372. https://doi.org/10.1109/TMM.2007.906580
- C.Y. Chang, W.C. Shen, and H.J. Wang, "Using Counter-Propagation Neural Network for Robust Digital Audio Watermarking in DWT Domain," IEEE Int. Conf. Syst., Man Cybernetics, Taipei, Taiwan, Oct. 8-11, 2006, pp. 1214-1219.
- P.K. Dhar and T. Shimamura, "Entropy-Based Audio Watermarking Using Singular Value Decomposition and Log-Polar Transformation," IEEE Int. Midwest Symp. Circuits Syst., Columbus, OH, USA, Aug. 4-7, 2013, pp. 1224-1227.
- V. Bhat, I. Sengupta, and A. Das, "An Audio Watermarking Scheme Using Singular Value Decomposition and dithermodulation Quantization," Multimed. Tools Appl., vol. 52, no. 2-3, Apr. 2011, pp. 369-383. https://doi.org/10.1007/s11042-010-0515-1
- M. Hemis, B. Boudraa, and T. Merazi-Meksen, "Optimized Audio Watermarking Scheme with Swarm Intelligence," IEEE First Int. Conf. New Technol. Inform. Commun. (NTIC), Mila, Algeria, Nov. 8-9, 2015, pp. 1-6.
- A. Kaur, M.K. Dutta, K.M. Soni, and N. Taneja, "Hiding Biometric Features in Audio Signals Using Gram-Schmidt Orthogonalisation," Int. J. Electron. Security Digit. Forensics, vol. 8, no. 1, Dec. 2016, pp. 63-81. https://doi.org/10.1504/IJESDF.2016.073735
피인용 문헌
- Design of wireless audio transmission system for college English language teaching vol.21, pp.6, 2018, https://doi.org/10.3233/jcm-215558