Copyright protection of music in digital form
Journal of computational and engineering mathematics, Tome 3 (2016) no. 3, pp. 10-18 Cet article a éte moissonné depuis la source Math-Net.Ru

Voir la notice de l'article

The work is devoted to consideration of audio data protection against unauthorized copying and distribution from others name, and also identification of audio files for authorship definition. The characteristics of audio files resistant to distortions are investigated. The review of digital watermarks, the digital prints applied as protection methods is carried out.
Keywords: copyright, digital watermark, digital print
Mots-clés : audio file, spectrogram.
@article{JCEM_2016_3_3_a1,
     author = {R. R. Dautov and N. D. Zylyarkina},
     title = {Copyright protection of music in digital form},
     journal = {Journal of computational and engineering mathematics},
     pages = {10--18},
     year = {2016},
     volume = {3},
     number = {3},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a1/}
}
TY  - JOUR
AU  - R. R. Dautov
AU  - N. D. Zylyarkina
TI  - Copyright protection of music in digital form
JO  - Journal of computational and engineering mathematics
PY  - 2016
SP  - 10
EP  - 18
VL  - 3
IS  - 3
UR  - http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a1/
LA  - en
ID  - JCEM_2016_3_3_a1
ER  - 
%0 Journal Article
%A R. R. Dautov
%A N. D. Zylyarkina
%T Copyright protection of music in digital form
%J Journal of computational and engineering mathematics
%D 2016
%P 10-18
%V 3
%N 3
%U http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a1/
%G en
%F JCEM_2016_3_3_a1
R. R. Dautov; N. D. Zylyarkina. Copyright protection of music in digital form. Journal of computational and engineering mathematics, Tome 3 (2016) no. 3, pp. 10-18. http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a1/

[1] V. G. Gribunin, I. N. Okov, I. V. Turintsev, Kompyuternye virusy iznutri i snaruzhi, Solon–Press, M., 2002, 272 pp.

[2] G. F. Konakhovich, A. Yu. Puzyrenko, Kompyuternaya steganografiya. Teoriya i praktika, MK–Press, Kiev, 2006, 288 pp.

[3] Avery Li-chun Wang, An Industrial-Strength Audio Search Algorithm (accessed on 11 September 2016) http://www.ee.columbia.edu/~dpwe/papers/Wang03-shazam.pdf

[4] W. Bender, D. Gruhl, N. Morimoto, A. Lu, “Techniques or Data Hiding”, IBM Systems Journal, 35:34 (1996), 313–336 | DOI

[5] J. Foote, J. Adco and A. Girgensohn, Time base modulation: a new approach to watermarking audio (accessed on 11 September 2016) http://www.fxpal.com/publications/FXPAL-PR-03-212.pdf

[6] J. Haitsma, T. Kalker, Highly Robust Audio Fingerprinting System (accessed on 8 June 2016) http://ismir2002.ismir.net/proceedings/02-FP042.pdf

[7] S. N. Borisova, “Metody zaschity audiofailov ot nesanktsionirovannogo kopirovaniya i rasprostraneniya”, Fundamentalnye issledovaniya, 2015, no. 5-3, 481–487 (accessed on 25 August 2016) http://fundamental-research.ru/ru/article/view?id=38286