Learn More
Conventional watermarking techniques based on echo hiding provide many benefits, but with several weak points, for example, a lenient decoding process, weakness against multiple encoding attack, etc. In this paper, to improve the weak points of conventional echo hiding, we propose a time-spread echo as an alternative to the conventional echo in the echo(More)
A pitch-scaling modification of a watermarked signal is a severe attack on audio watermarking techniques. In particular, watermarking techniques using a pseudonoise (PN) sequence as a secret key are fragile in the face of this modification because of the desynchronization between the original and embedded PN sequences. We, therefore, propose a log-scaling(More)
must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. generation based on acoustic events detection: A(More)
  • 1