Mots-clés : audio file, spectrogram.
@article{JCEM_2016_3_3_a1,
author = {R. R. Dautov and N. D. Zylyarkina},
title = {Copyright protection of music in digital form},
journal = {Journal of computational and engineering mathematics},
pages = {10--18},
year = {2016},
volume = {3},
number = {3},
language = {en},
url = {http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a1/}
}
R. R. Dautov; N. D. Zylyarkina. Copyright protection of music in digital form. Journal of computational and engineering mathematics, Tome 3 (2016) no. 3, pp. 10-18. http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a1/
[1] V. G. Gribunin, I. N. Okov, I. V. Turintsev, Kompyuternye virusy iznutri i snaruzhi, Solon–Press, M., 2002, 272 pp.
[2] G. F. Konakhovich, A. Yu. Puzyrenko, Kompyuternaya steganografiya. Teoriya i praktika, MK–Press, Kiev, 2006, 288 pp.
[3] Avery Li-chun Wang, An Industrial-Strength Audio Search Algorithm (accessed on 11 September 2016) http://www.ee.columbia.edu/~dpwe/papers/Wang03-shazam.pdf
[4] W. Bender, D. Gruhl, N. Morimoto, A. Lu, “Techniques or Data Hiding”, IBM Systems Journal, 35:34 (1996), 313–336 | DOI
[5] J. Foote, J. Adco and A. Girgensohn, Time base modulation: a new approach to watermarking audio (accessed on 11 September 2016) http://www.fxpal.com/publications/FXPAL-PR-03-212.pdf
[6] J. Haitsma, T. Kalker, Highly Robust Audio Fingerprinting System (accessed on 8 June 2016) http://ismir2002.ismir.net/proceedings/02-FP042.pdf
[7] S. N. Borisova, “Metody zaschity audiofailov ot nesanktsionirovannogo kopirovaniya i rasprostraneniya”, Fundamentalnye issledovaniya, 2015, no. 5-3, 481–487 (accessed on 25 August 2016) http://fundamental-research.ru/ru/article/view?id=38286