List of Tables

Table 1.1 Audio Piracy Estimation 2
Table 2.1 Audio File Categories 9
Table 2.2 Uncompressed Audio File 10
Table 2.3 Lossless File Format 10
Table 2.4 Lossy File Format 11
Table 2.5 Types of Watermark 15
Table 2.6 Techniques of Watermarking 15
Table 2.7 Attacks on Audio Watermarking 18
Table 2.8 Evaluation Methods 19
Table 4.1 Dataset 29
Table 4.2 List of Tags 30
Table 4.3 Information of Embedding Process for Rock Songs 30
Table 4.4 Information of Embedding Process for Pop Songs 31
Table 4.5 Information of Embedding Process for Classical Songs 31
Table 4.6 Information of Embedding Process for Ambient Songs 32
Table 4.7 Information of Extraction Process of Rock Songs 32
Table 4.8 Information of Extraction Process ...

Get Audio Content Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.