Learn More
Many effective watermarking algorithms have been proposed and implemented for digital images and digital video, however, few algorithms have been proposed for audio watermarking. This is due to the fact that, the human audio system is far more complex and sensitive than the human visual system. In this paper, we describe an imperceptible and robust audio(More)
In this paper, we present a new digital watermarking scheme for ownership protection. The algorithm embeds the watermark in the Schur decomposition components of the cover image. We also show that this algorithm is noninvertible. Comparisons with other algorithms indicate that the proposed algorithm is robust against most common attacks including(More)
Audio watermarking is a relatively new technology that aims to embed copyright information in audio signals as a proof of their ownership. The driving force behind this technology has been the ever-increasing illegal manipulation of genuine audio products released by the music industry. In this paper, we propose an effective, robust, and inaudible audio(More)
Copyright right protection of digital multimedia has been receiving considerable attention in the last decade. Many effective watermarking algorithms have been proposed and implemented for digital images and digital video, however, few algorithms have been proposed for audio watermarking. This is due to the fact that the human audio system (HAS) is far more(More)
Audio watermarking has been proved as a powerful tool against illegal manipulation of audio products. It is generally used as a multimedia copyright protection tool. In this paper, we propose an audio watermarking algorithm based on two mathematical functions: Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD). These algorithms(More)
Telemedicine is a booming healthcare practice that has facilitated the exchange of medical data and expertise between healthcare entities. However, the widespread use of telemedicine applications requires a secured scheme to guarantee confidentiality and verify authenticity and integrity of exchanged medical data. In this paper, we describe a region-based,(More)
  • 1