Copyright protection of music in digital form
Journal of computational and engineering mathematics, Tome 3 (2016) no. 3, pp. 10-18.

Voir la notice de l'article provenant de la source Math-Net.Ru

The work is devoted to consideration of audio data protection against unauthorized copying and distribution from others name, and also identification of audio files for authorship definition. The characteristics of audio files resistant to distortions are investigated. The review of digital watermarks, the digital prints applied as protection methods is carried out.
Keywords: audio file, copyright, digital watermark, digital print, spectrogram.
@article{JCEM_2016_3_3_a1,
     author = {R. R. Dautov and N. D. Zylyarkina},
     title = {Copyright protection of music in digital form},
     journal = {Journal of computational and engineering mathematics},
     pages = {10--18},
     publisher = {mathdoc},
     volume = {3},
     number = {3},
     year = {2016},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a1/}
}
TY  - JOUR
AU  - R. R. Dautov
AU  - N. D. Zylyarkina
TI  - Copyright protection of music in digital form
JO  - Journal of computational and engineering mathematics
PY  - 2016
SP  - 10
EP  - 18
VL  - 3
IS  - 3
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a1/
LA  - en
ID  - JCEM_2016_3_3_a1
ER  - 
%0 Journal Article
%A R. R. Dautov
%A N. D. Zylyarkina
%T Copyright protection of music in digital form
%J Journal of computational and engineering mathematics
%D 2016
%P 10-18
%V 3
%N 3
%I mathdoc
%U http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a1/
%G en
%F JCEM_2016_3_3_a1
R. R. Dautov; N. D. Zylyarkina. Copyright protection of music in digital form. Journal of computational and engineering mathematics, Tome 3 (2016) no. 3, pp. 10-18. http://geodesic.mathdoc.fr/item/JCEM_2016_3_3_a1/

[1] V. G. Gribunin, I. N. Okov, I. V. Turintsev, Kompyuternye virusy iznutri i snaruzhi, Solon–Press, M., 2002, 272 pp.

[2] G. F. Konakhovich, A. Yu. Puzyrenko, Kompyuternaya steganografiya. Teoriya i praktika, MK–Press, Kiev, 2006, 288 pp.

[3] Avery Li-chun Wang, An Industrial-Strength Audio Search Algorithm (accessed on 11 September 2016) http://www.ee.columbia.edu/~dpwe/papers/Wang03-shazam.pdf

[4] W. Bender, D. Gruhl, N. Morimoto, A. Lu, “Techniques or Data Hiding”, IBM Systems Journal, 35:34 (1996), 313–336 | DOI

[5] J. Foote, J. Adco and A. Girgensohn, Time base modulation: a new approach to watermarking audio (accessed on 11 September 2016) http://www.fxpal.com/publications/FXPAL-PR-03-212.pdf

[6] J. Haitsma, T. Kalker, Highly Robust Audio Fingerprinting System (accessed on 8 June 2016) http://ismir2002.ismir.net/proceedings/02-FP042.pdf

[7] S. N. Borisova, “Metody zaschity audiofailov ot nesanktsionirovannogo kopirovaniya i rasprostraneniya”, Fundamentalnye issledovaniya, 2015, no. 5-3, 481–487 (accessed on 25 August 2016) http://fundamental-research.ru/ru/article/view?id=38286