A novel speech content authentication algorithm based on Bessel–Fourier moments

Z Liu, H Wang - Digital Signal Processing, 2014 - Elsevier
For audio watermark schemes, the method robust against desynchronization attacks based
on synchronization codes faces security challenges. In this paper, a content-based method …

Jawthenticate: Microphone-free Speech-based Authentication using Jaw Motion and Facial Vibrations

T Srivastava, S Pan, P Nguyen, S Jain - … of the 21st ACM Conference on …, 2023 - dl.acm.org
In this paper, we present Jawthenticate, an earable system that authenticates a user using
audible or inaudible speech without using a microphone. This system can overcome the …

Detection of speech tampering using sparse representations and spectral manipulations based information hiding

S Wang, W Yuan, J Wang, M Unoki - Speech Communication, 2019 - Elsevier
Speech tampering has brought serious problems to speech security. Information hiding
method can be used for tampering detection if it can satisfy several competitive …

A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform

MQ Fan, PP Liu, HX Wang, HJ Li - International Journal of …, 2013 - Taylor & Francis
In this paper, a novel semi-fragile watermarking scheme for authenticating an audio signal
based on dual-tree complex wavelet transform (DT-CWT) and discrete cosine transform …

Speech authentication by semi-fragile speech watermarking utilizing analysis by synthesis and spectral distortion optimization

B Yan, YJ Guo - Multimedia tools and applications, 2013 - Springer
This paper proposes an improved semi-fragile speech watermarking scheme by
quantization of linear prediction (LP) parameters, ie, the inverse sine (IS) parameters. The …

Semi-fragile speech watermarking based on singular-spectrum analysis with CNN-based parameter estimation for tampering detection

K Galajit, J Karnjana, M Unoki… - APSIPA Transactions on …, 2019 - cambridge.org
A semi-fragile watermarking scheme is proposed in this paper for detecting tampering in
speech signals. The scheme can effectively identify whether or not original signals have …

Tamper recovery algorithm for digital speech signal based on DWT and DCT

ZH Liu, D Luo, JW Huang, J Wang, CD Qi - Multimedia Tools and …, 2017 - Springer
It is a challenging work to design tamper recovery schemes for digital speech signal. Briefly,
there are two problems need to be solved. One is that the signals used to tamper recovery …

Efficient SVD speech watermarking with encrypted images

S El-Gazar, AM Abbas, S El-Dolil, IM El-Dokany… - International Journal of …, 2018 - Springer
This paper presents a new approach for speech signal watermarking using encrypted
watermarks. The objective of this approach is to increase the degree of security of speech …

A robust content based audio watermarking using UDWT and invariant histogram

H Yang, D Bao, X Wang, P Niu - Multimedia Tools and Applications, 2012 - Springer
Desynchronization attack is known as one of the most difficult attacks to resist, for it can
desynchronize the location of the watermark and hence causes incorrect watermark …

A subband excitation substitute based scheme for narrowband speech watermarking

W Liu, A Hu - Frontiers of Information Technology & Electronic …, 2017 - Springer
We propose a new narrowband speech watermarking scheme by replacing part of the
speech with a scaled and spectrally shaped hidden signal. Theoretically, it is proved that if a …