Information Technology Reference
In-Depth Information
References
1. Swanson, M.D., et al.: Multimedia Data-Embedding and Watermarking Technologies.
Proc. IEEE, vol. 86 (1998) 1064-1087
2. Cox, J., Kilian, J., Leighton, F.T., and Shamoon, T.: Secure Spread Spectrum Watermark-
ing for images, Audio and Video. IEEE Trans. Image Processing, vol. 6 (1997) 1673-1687
3. Johnson, N.F. et al.: Information Hiding: Steganography and Watermarking Attacks and
Countermeasures. Kluwer Academic Publishers (2000)
4. Swanson, M.D., Zhu, B., Tewfik, A.H., and Boney, L.: Robust Audio Watermarking Using
Perceptual Masking. Signal Processing, vol. 66 (1998) 337-355
5. Bender, W., et al.: Techniques for Data Hiding. IBM System Journal, vol. 35 (1996) 313-
336
6. Bassia, P., Pitas, I., and Nikolaidis, N.: Robust Audio Watermarking in the Time Domain.
IEEE Trans. Multimedia, vol. 3 (2001) 232-241
7. Chen, B., and Wornell, G. “Quantization Index Modulation: a Class of Provably Good
Method for Watermarking and Information Embedding,” IEEE Transactions on Informa-
tion Theory, vol. 47, no. 4 (2001) 1423-1443
8. Tilki, J.F.: Encoding a Hidden Digital Signature Using Psychoacoustic Masking. Thesis
submitted to the Faculty of the Bradley Department of Electrical and Computer Engineer-
ing, Virginia Polytechnic Institute and State University, June 9, 1998
9. Cox, R. V., et al.: “Scanning the Technology: On the Applications of Multimedia Process-
ing to Communications,” Proc. IEEE, vol. 86 (1998) 755-824
10. Johnston, J.D. Transform Coding of Audio Signal Using Perceptual Noise Criteria. IEEE J.
Select. Areas Commu,., vol. 6 (1998) 314-323
11. Tsoukalas, D., Mourjopoulos, J., and Kokkinakis, G.: Speech Enhancement Based on Au-
dio Noise Suppression. IEEE Trans. Speech Audio Processing, vol. 5 (1997) 497-514
12. Brad Meyer, E. “ABX Tests and Testing Procedures,” Boston Audio Society Speaker,
vol.19, no.3, 1990 http://bostonaudiosociety.org/bas_speaker/abx_testing.htm
Search WWH ::




Custom Search