Voir la notice de l'article provenant de la source Math-Net.Ru
@article{JCEM_2016_3_3_a1, author = {R. R. Dautov and N. D. Zylyarkina}, title = {Copyright protection of music in digital form}, journal = {Journal of computational and engineering mathematics}, pages = {10--18}, publisher = {mathdoc}, volume = {3}, number = {3}, year = {2016}, language = {en}, url = {http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a1/} }
TY - JOUR AU - R. R. Dautov AU - N. D. Zylyarkina TI - Copyright protection of music in digital form JO - Journal of computational and engineering mathematics PY - 2016 SP - 10 EP - 18 VL - 3 IS - 3 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a1/ LA - en ID - JCEM_2016_3_3_a1 ER -
R. R. Dautov; N. D. Zylyarkina. Copyright protection of music in digital form. Journal of computational and engineering mathematics, Tome 3 (2016) no. 3, pp. 10-18. http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a1/
[1] V. G. Gribunin, I. N. Okov, I. V. Turintsev, Kompyuternye virusy iznutri i snaruzhi, Solon–Press, M., 2002, 272 pp.
[2] G. F. Konakhovich, A. Yu. Puzyrenko, Kompyuternaya steganografiya. Teoriya i praktika, MK–Press, Kiev, 2006, 288 pp.
[3] Avery Li-chun Wang, An Industrial-Strength Audio Search Algorithm (accessed on 11 September 2016) http://www.ee.columbia.edu/~dpwe/papers/Wang03-shazam.pdf
[4] W. Bender, D. Gruhl, N. Morimoto, A. Lu, “Techniques or Data Hiding”, IBM Systems Journal, 35:34 (1996), 313–336 | DOI
[5] J. Foote, J. Adco and A. Girgensohn, Time base modulation: a new approach to watermarking audio (accessed on 11 September 2016) http://www.fxpal.com/publications/FXPAL-PR-03-212.pdf
[6] J. Haitsma, T. Kalker, Highly Robust Audio Fingerprinting System (accessed on 8 June 2016) http://ismir2002.ismir.net/proceedings/02-FP042.pdf
[7] S. N. Borisova, “Metody zaschity audiofailov ot nesanktsionirovannogo kopirovaniya i rasprostraneniya”, Fundamentalnye issledovaniya, 2015, no. 5-3, 481–487 (accessed on 25 August 2016) http://fundamental-research.ru/ru/article/view?id=38286