메뉴 건너뛰기




Volumn 2137, Issue , 2001, Pages 354-368

Robust covert communication over a public audio channel using spread spectrum

Author keywords

[No Author keywords available]

Indexed keywords

SPECTROSCOPY; SPREAD SPECTRUM COMMUNICATION;

EID: 84947260435     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45496-9_26     Document Type: Conference Paper
Times cited : (41)

References (18)
  • 2
    • 0002367981 scopus 로고    scopus 로고
    • Robust audio watermarking in the time domain
    • Rodos, Greece. IEE
    • Bassia, P., Pitas, I.: Robust audio watermarking in the time domain. In: Proc. EUSIPCO 98, vol. 1. Rodos, Greece. IEE (1998) 25-28.
    • (1998) Proc. EUSIPCO 98 , vol.1 , pp. 25-28
    • Bassia, P.1    Pitas, I.2
  • 3
    • 84947937393 scopus 로고    scopus 로고
    • A secure, robust watermark for multimedia
    • Anderson, R. (ed.), Cambridge, UK. Lecture Notes in Computer Science, Springer-Verlag, Berlin/Heidelberg
    • Cox, I. J., Kilian, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. In: Anderson, R. (ed.): Information Hiding, Cambridge, UK. Lecture Notes in Computer Science, Vol. 1174. Springer-Verlag, Berlin/Heidelberg (1996) 185-206.
    • (1996) Information Hiding , vol.1174 , pp. 185-206
    • Cox, I.J.1    Kilian, J.2    Leighton, T.3    Shamoon, T.4
  • 4
    • 0005924560 scopus 로고    scopus 로고
    • Digital watermarking and its influence on audio quality
    • San Francisco, CA. Audio Engineering Society
    • Neubauer, C., Herre, J.: Digital watermarking and its influence on audio quality. In: 105th Convention, San Francisco, CA. Audio Engineering Society (1998).
    • (1998) 105th Convention
    • Neubauer, C.1    Herre, J.2
  • 5
    • 0032069486 scopus 로고    scopus 로고
    • Robust audio watermarking using perceptual masking
    • Swanson, M. D., Zhu, B., Tewfik, A. H., Boney, L.: Robust audio watermarking using perceptual masking. Signal Processing 66 (1998), 337-355.
    • (1998) Signal Processing , vol.66 , pp. 337-355
    • Swanson, M.D.1    Zhu, B.2    Tewfik, A.H.3    Boney, L.4
  • 6
    • 84955119830 scopus 로고    scopus 로고
    • Echo hiding
    • Anderson, R. (ed.), Cambridge, UK. Lecture Notes in Computer Science, Springer-Verlag, Berlin/Heidelberg
    • Gruhl, D., Lu, A., Bender, W.: Echo hiding. In: Anderson, R. (ed.): Information Hiding, Cambridge, UK. Lecture Notes in Computer Science, Vol. 1174. Springer-Verlag, Berlin/Heidelberg (1996) 295-315.
    • (1996) Information Hiding , vol.1174 , pp. 295-315
    • Gruhl, D.1    Lu, A.2    Bender, W.3
  • 7
    • 84952369138 scopus 로고    scopus 로고
    • Digital watermarking and Information embedding using dither modulation
    • Redondo Beach, CA. IEEE
    • Chen, B., Wornell, G. W.: Digital watermarking and Information embedding using dither modulation. In: Workshop on Multimedia Signal Processing, Redondo Beach, CA. IEEE (1998) 273-278.
    • (1998) Workshop on Multimedia Signal Processing , pp. 273-278
    • Chen, B.1    Wornell, G.W.2
  • 8
    • 0018468867 scopus 로고
    • A signal theoretic method for creating forgery-proof documents for automatic verification
    • Lexington, KY
    • Szepanski, W.: A signal theoretic method for creating forgery-proof documents for automatic verification. In: Carnahan Conf. on Crime Countermeasures, Lexington, KY, (1979) 101-109.
    • (1979) Carnahan Conf. on Crime Countermeasures , pp. 101-109
    • Szepanski, W.1
  • 9
    • 84957877979 scopus 로고    scopus 로고
    • Attacks on copyright marking systems
    • Aucsmith, D. (ed.), Portland, OR. Lecture Notes in Computer Science, Springer-Verlag, Berlin/Heidelberg
    • Petitcolas, F. A. P., Anderson, R. J., Kuhn, M. G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.): Information Hiding, Portland, OR. Lecture Notes in Computer Science, Vol. 1525. Springer-Verlag, Berlin/Heidelberg (1998) 218-238.
    • (1998) Information Hiding , vol.1525 , pp. 218-238
    • Petitcolas, F.A.P.1    Anderson, R.J.2    Kuhn, M.G.3
  • 10
    • 0034857681 scopus 로고    scopus 로고
    • Speech dereverberation via maximum-kurtosis subband adaptive filtering
    • Speech, and Signal Processing, Salt Lake City, UT. IEEE, to appear
    • Gillespie, B. W., Malvar, H. S., Florencio, D. A. F.: Speech dereverberation via maximum-kurtosis subband adaptive filtering. In: International Conf. on Acoustics, Speech, and Signal Processing, Salt Lake City, UT. IEEE (2001), to appear.
    • (2001) International Conf. on Acoustics
    • Gillespie, B.W.1    Malvar, H.S.2    Florencio, D.A.F.3
  • 12
    • 0032627304 scopus 로고    scopus 로고
    • A modulated complex lapped transform and its application to audio processing
    • Speech, and Signal Processing, Phoenix, AZ. IEEE
    • Malvar, H. S.: A modulated complex lapped transform and its application to audio processing. In: International Conf. on Acoustics, Speech, and Signal Processing, Phoenix, AZ. IEEE (1999) 1421-1424.
    • (1999) International Conf. on Acoustics , pp. 1421-1424
    • Malvar, H.S.1
  • 14
    • 0031638117 scopus 로고    scopus 로고
    • Enhancing the performance of subband audio coders for speech signals
    • Monterey, CA. IEEE, 5/98-5/101
    • Malvar H. S.: Enhancing the performance of subband audio coders for speech signals. In: International Symposium on Circuits and Systems, Monterey, CA. IEEE (1998) 5/98-5/101.
    • (1998) International Symposium on Circuits and Systems
    • Malvar, H.S.1
  • 15
    • 0038426899 scopus 로고    scopus 로고
    • Auditory masking in audio compression
    • Greennebaum, K. (ed.), Kluwer, New York
    • Malvar, H. S.: Auditory masking in audio compression. In: Greennebaum, K. (ed.): Audio Anecdotes. Kluwer, New York, 2001.
    • (2001) Audio Anecdotes
    • Malvar, H.S.1
  • 17
    • 0033601672 scopus 로고    scopus 로고
    • Spread spectrum watermarking: Malicious attacks and counter-attacks
    • San Jose, CA. SPIE
    • Hartung, F., Su, J. K., Girod, B.: Spread spectrum watermarking: malicious attacks and counter-attacks. In: Security and Watermarking of Multimedia Contents, San Jose, CA. SPIE (1999) 147-158.
    • (1999) Security and Watermarking of Multimedia Contents , pp. 147-158
    • Hartung, F.1    Su, J.K.2    Girod, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.