A novel speech content authentication algorithm based on Bessel–Fourier moments
Z Liu, H Wang - Digital Signal Processing, 2014 - Elsevier
For audio watermark schemes, the method robust against desynchronization attacks based
on synchronization codes faces security challenges. In this paper, a content-based method …
on synchronization codes faces security challenges. In this paper, a content-based method …
Jawthenticate: Microphone-free Speech-based Authentication using Jaw Motion and Facial Vibrations
In this paper, we present Jawthenticate, an earable system that authenticates a user using
audible or inaudible speech without using a microphone. This system can overcome the …
audible or inaudible speech without using a microphone. This system can overcome the …
Detection of speech tampering using sparse representations and spectral manipulations based information hiding
Speech tampering has brought serious problems to speech security. Information hiding
method can be used for tampering detection if it can satisfy several competitive …
method can be used for tampering detection if it can satisfy several competitive …
A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform
MQ Fan, PP Liu, HX Wang, HJ Li - International Journal of …, 2013 - Taylor & Francis
In this paper, a novel semi-fragile watermarking scheme for authenticating an audio signal
based on dual-tree complex wavelet transform (DT-CWT) and discrete cosine transform …
based on dual-tree complex wavelet transform (DT-CWT) and discrete cosine transform …
Speech authentication by semi-fragile speech watermarking utilizing analysis by synthesis and spectral distortion optimization
B Yan, YJ Guo - Multimedia tools and applications, 2013 - Springer
This paper proposes an improved semi-fragile speech watermarking scheme by
quantization of linear prediction (LP) parameters, ie, the inverse sine (IS) parameters. The …
quantization of linear prediction (LP) parameters, ie, the inverse sine (IS) parameters. The …
Semi-fragile speech watermarking based on singular-spectrum analysis with CNN-based parameter estimation for tampering detection
A semi-fragile watermarking scheme is proposed in this paper for detecting tampering in
speech signals. The scheme can effectively identify whether or not original signals have …
speech signals. The scheme can effectively identify whether or not original signals have …
Tamper recovery algorithm for digital speech signal based on DWT and DCT
ZH Liu, D Luo, JW Huang, J Wang, CD Qi - Multimedia Tools and …, 2017 - Springer
It is a challenging work to design tamper recovery schemes for digital speech signal. Briefly,
there are two problems need to be solved. One is that the signals used to tamper recovery …
there are two problems need to be solved. One is that the signals used to tamper recovery …
Efficient SVD speech watermarking with encrypted images
This paper presents a new approach for speech signal watermarking using encrypted
watermarks. The objective of this approach is to increase the degree of security of speech …
watermarks. The objective of this approach is to increase the degree of security of speech …
A robust content based audio watermarking using UDWT and invariant histogram
H Yang, D Bao, X Wang, P Niu - Multimedia Tools and Applications, 2012 - Springer
Desynchronization attack is known as one of the most difficult attacks to resist, for it can
desynchronize the location of the watermark and hence causes incorrect watermark …
desynchronize the location of the watermark and hence causes incorrect watermark …
A subband excitation substitute based scheme for narrowband speech watermarking
W Liu, A Hu - Frontiers of Information Technology & Electronic …, 2017 - Springer
We propose a new narrowband speech watermarking scheme by replacing part of the
speech with a scaled and spectrally shaped hidden signal. Theoretically, it is proved that if a …
speech with a scaled and spectrally shaped hidden signal. Theoretically, it is proved that if a …