Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Speech encryption using chaotic shift keying for secured speech communication
This paper throws light on chaotic shift keying-based speech encryption and decryption
method. In this method, the input speech signals are sampled and its values are segmented …
method. In this method, the input speech signals are sampled and its values are segmented …
Comprehensive review of audio steganalysis methods
Recently, merging signal processing techniques with information security services has
drawn a lot of attention. Steganography and steganalysis are among those trends. Like their …
drawn a lot of attention. Steganography and steganalysis are among those trends. Like their …
Steganalysis of QIM steganography in low-bit-rate speech signals
S Li, Y Jia, CCJ Kuo - IEEE/ACM Transactions on Audio …, 2017 - ieeexplore.ieee.org
Steganalysis of the quantization index modulation (QIM) steganography in a low-bit-rate
encoded speech stream is conducted in this research. According to the speech generation …
encoded speech stream is conducted in this research. According to the speech generation …
Recognition of brand and models of cell-phones from recorded speech signals
Speech signals convey various pieces of information such as the identity of its speaker, the
language spoken, and the linguistic information about the text being spoken, etc. In this …
language spoken, and the linguistic information about the text being spoken, etc. In this …
Load forecasting combining phase space reconstruction and stacking ensemble learning
H Hou, C Liu, Q Wang, B Zhao, L Zhang… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Electric power load forecasting used to rely on some key information such as weather or
socioeconomic development data. However, it is usually difficult to obtain accurate data on …
socioeconomic development data. However, it is usually difficult to obtain accurate data on …
Audio steganalysis based on reversed psychoacoustic model of human hearing
During the last decade, audio information hiding has attracted lots of attention due to its
ability to provide a covert communication channel. On the other hand, various audio …
ability to provide a covert communication channel. On the other hand, various audio …
Steganalysis of VoIP streams with CNN-LSTM network
Steganalysis of the Quantization Index Modulation (QIM) steganography in VoIP (Voice-over
IP) stream is conducted in this research. VoIP is a popular media streaming and …
IP) stream is conducted in this research. VoIP is a popular media streaming and …
Linguistic steganalysis based on meta features and immune mechanism
H Yang, X Cao - Chinese Journal of Electronics, 2010 - ieeexplore.ieee.org
Linguistic steganalysis depends on efficient detection features due to the diversity of syntax
and the polysemia of semantics in natural language processing. This paper presents a novel …
and the polysemia of semantics in natural language processing. This paper presents a novel …
Detection of vocal disorders based on phase space parameters and Lyapunov spectrum
Previous studies have shown that the underlying process of speech generation exhibits
nonlinear characteristics. Since linear features cannot represent a nonlinear system …
nonlinear characteristics. Since linear features cannot represent a nonlinear system …
TENet: leveraging transformer encoders for steganalysis of QIM steganography in VoIP speech streams
C Zhang, S Jiang, Z Chen - Multimedia Tools and Applications, 2024 - Springer
Quantization index modulation (QIM) based steganography allows concealing confidential
information in the Voice-over-Internet-Protocol (VoIP) speech streams. Cyber attackers and …
information in the Voice-over-Internet-Protocol (VoIP) speech streams. Cyber attackers and …