Achieving efficient conjunctive keyword searches over encrypted data
We present two provably secure and efficient schemes for performing conjunctive keyword
searches over symmetrically encrypted data. Our first scheme is based on Shamir Secret …
searches over symmetrically encrypted data. Our first scheme is based on Shamir Secret …
A novel synchronization invariant audio watermarking scheme based on DWT and DCT
XY Wang, H Zhao - IEEE Transactions on signal processing, 2006 - ieeexplore.ieee.org
Synchronization attack is one of the key issues of digital audio watermarking. In this
correspondence, a blind digital audio watermarking scheme against synchronization attack …
correspondence, a blind digital audio watermarking scheme against synchronization attack …
Efficient self-synchronised blind audio watermarking system based on time domain and FFT amplitude modification
Many audio watermarking schemes divide the audio signal into several blocks such that part
of the watermark is embedded into each of them. One of the key issues in these block …
of the watermark is embedded into each of them. One of the key issues in these block …
A robust digital audio watermarking based on statistics characteristics
XY Wang, PP Niu, HY Yang - Pattern recognition, 2009 - Elsevier
In digital audio watermarking, the watermark's vulnerability to desynchronization attacks has
long been a difficult problem. According to the audio statistics characteristics and …
long been a difficult problem. According to the audio statistics characteristics and …
Steganography for MP3 audio by exploiting the rule of window switching
D Yan, R Wang, X Yu, J Zhu - Computers & Security, 2012 - Elsevier
MP3 audio is a promising carrier format for covert communication because of its
popularization. In this paper, we propose an MP3 steganographic method by exploiting the …
popularization. In this paper, we propose an MP3 steganographic method by exploiting the …
Theoretical framework for a practical evaluation and comparison of audio watermarking schemes in the triangle of robustness, transparency and capacity
J Dittmann, D Megías, A Lang… - Transactions on Data …, 2006 - Springer
Digital watermarking is a growing research area to mark digital content (image, audio, video,
etc.) by embedding information into the content itself. This technique opens or provides …
etc.) by embedding information into the content itself. This technique opens or provides …
A robust, digital-audio watermarking method
XY Wang, PP Niu, HY Yang - IEEE MultiMedia, 2009 - computer.org
A Robust, Digital-Audio Watermarking Method Toggle navigation IEEE Computer Society Digital
Library Jobs Tech News Resource Center Press Room Advertising About Us IEEE IEEE …
Library Jobs Tech News Resource Center Press Room Advertising About Us IEEE IEEE …
A blind audio watermarking scheme using peak point extraction
FS Wei, X Feng, L Mengyuan - 2005 IEEE International …, 2005 - ieeexplore.ieee.org
In this paper, a blind digital audio watermarking scheme is proposed. A psychoacoustic
model is used to ensure the imperceptibility of the embedded watermark. The watermark is …
model is used to ensure the imperceptibility of the embedded watermark. The watermark is …
[PDF][PDF] 性能优越的混合域数字音频盲水印算法
王向阳, 杨红颖, 牛盼盼 - 通信学报, 2007 - infocomm-journal.com
提出了一种性能优越的自适应混合域数字音频水印嵌入算法, 首先将原始数字音频划分成音频
数据段; 然后选取巴克码作为同步码, 并在时域内将同步码嵌入到音频段的前部分; …
数据段; 然后选取巴克码作为同步码, 并在时域内将同步码嵌入到音频段的前部分; …
High capacity method for real-time audio data hiding using the FFT transform
M Fallahpour, D Megías - Advances in Information Security and Its …, 2009 - Springer
This paper presents a very efficient method for audio data hiding which is suitable for real-
time applications. The FFT magnitudes which are in a band of frequencies between 5 and …
time applications. The FFT magnitudes which are in a band of frequencies between 5 and …