Last update: Fri Jan 5 02:08:04 MST 2018
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Arnold:2001:AW,
author = "Michael Arnold",
title = "Audio Watermarking: Burying information in the data",
journal = j-DDJ,
volume = "26",
number = "11",
pages = "21--22, 24--26, 28",
month = nov,
year = "2001",
CODEN = "DDJOEB",
ISSN = "1044-789X",
bibdate = "Tue Feb 12 05:21:40 MST 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/dr-dobbs-2000.bib",
URL = "http://www.ddj.com/ftp/2001/2001_11/watermk.txt;
http://www.ddj.com/ftp/2001/2001_11/watermk.zip",
abstract = "Digital watermarking is a security technique that
provides copy protection, authentication, and more for
audio and other forms of information. The approach
Michael presents here is based on a statistical
algorithm working in the Fourier domain. Additional
resources include {\tt watermk.txt} (listings) and {\tt
watermk.zip} (source code).",
acknowledgement = ack-nhfb,
journal-URL = "http://www.ddj.com/",
}
Related entries
- 25-10-68, 25-11-10, 25-12-82,
26(1)18,
26(7)8
- 25-11-50,
25(11)57,
25(12)33,
26(4)139,
26(9)18,
26(11)73,
26(11)93,
27(3)10
- 25-12-64,
26(7)21,
27(8)z-5
- 25-8-70, 25-11-50, 25-12-56, 26-1-68, 26-1-126,
26(1)181,
26(2)21,
26(6)21,
26(9)117,
26(10)81,
26(11)73,
26(11)111,
27(4)67,
27(5)59
- 26-1-111, 26-2-74, 26-2-84, 26-3-82,
26(4)151,
26(7)99,
26(7)105,
26(10)99
- 26-2-104, 26-6-50,
26(6)131,
26(8)8,
26(8)111,
26(10)8,
26(12)102,
27(1)82,
27(8)z,
27(8)z-2,
27(12)12,
28(2)10
- 26-3-30, 26-3-42,
26(5)97,
26(6)21
- 26-4-106, 26-7-44, 26-7-72, 26-7-88,
26(10)73,
26(11)117,
27(1)36,
27(2)98,
27(5)21,
27(5)59,
27(6)19,
27(8)z-5
- 26-8-63,
26(9)103,
26(10)99,
26(11)99,
26(12)95,
27(2)83,
27(11)73,
27(12)84,
28(1)61,
28(5)77,
28(7)68
- 26-8-87,
26(10)123,
26(11)83,
27(1)69,
28(1)73,
26(10)21,
27(2)36,
27(4)46,
27(4)97,
28(3)12
- algorithm, 25-1-10,
25(1)113,
25(2)123,
25(2)135,
25(3)123,
25(4)23,
25(4)111,
25(5)119,
25(6)131,
25(7)18,
25(7)133,
25(8)133,
25(9)29,
25(9)133,
25(10)18,
25(10)147,
25(11)149,
25(12)18,
25(12)149,
26(1)18,
26(1)189,
26(2)18,
26(3)18,
26(3)137,
26(4)18,
26(4)21,
26(4)145,
26(5)141,
26(6)151,
26(7)132,
26(8)118,
26(9)121,
26(10)123,
26(11)117,
26(12)115,
27(2)98,
27(3)97,
27(4)101,
27(5)21,
27(5)89,
27(6)94,
27(7)93,
27(8)z-8,
27(9)89,
27(10)36,
28(1)48,
28(5)66
- audio, 25-1-76,
26(11)103,
26(12)102,
27(3)10
- authentication,
26(2)145,
26(9)18,
26(11)93
- copy,
27(11)84,
28(5)10
- domain,
25(9)29,
25(12)18
- form,
25(8)18,
26(9)121,
27(1)21,
28(5)12,
28(5)66
- information,
25(2)23,
25(4)z-1,
25(9)8,
25(11)57,
26(1)18,
26(6)101,
26(9)117,
27(7)10,
27(9)10
- protection,
25(8)18,
26(3)8,
28(5)10
- technique, 25-3-32, 25-3-80,
25(4)23,
25(8)145,
25(9)133,
25(10)135,
26(7)21,
26(12)111
- watermarking,
26(7)8,
27(3)10