Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Usage control architecture options for data sovereignty in business ecosystems
Purpose Current business challenges force companies to exchange critical and sensitive
data. The data provider pays great attention to the usage of their data and wants to control it …
data. The data provider pays great attention to the usage of their data and wants to control it …
Enhancing robustness of speech watermarking using a transformer-based framework exploiting acoustic features
Digital watermarking serves as an effective approach for safeguarding speech signal
copyrights, achieved by the incorporation of ownership information into the original signal …
copyrights, achieved by the incorporation of ownership information into the original signal …
ECG steganography based on tunable Q‐factor wavelet transform and singular value decomposition
P Mathivanan, A Balaji Ganesh - International Journal of …, 2021 - Wiley Online Library
The article presents a novel ECG steganography scheme based on the tunable Q‐factor
wavelet transformation (TQWT) and also singular value decomposition (SVD) techniques …
wavelet transformation (TQWT) and also singular value decomposition (SVD) techniques …
Robust image-in-audio watermarking technique based on DCT-SVD transform
A Kanhe, A Gnanasekaran - EURASIP Journal on Audio, Speech, and …, 2018 - Springer
In this paper, a robust and highly imperceptible audio watermarking technique is presented
based on discrete cosine transform (DCT) and singular value decomposition (SVD). The low …
based on discrete cosine transform (DCT) and singular value decomposition (SVD). The low …
An adaptive audio watermarking with frame-wise control parameter searching
For adaptive audio watermarking methods based on singular value decomposition (SVD),
the choice of the embedding strength parameter is a crucial factor for satisfying the balance …
the choice of the embedding strength parameter is a crucial factor for satisfying the balance …
A QIM-based energy modulation scheme for audio watermarking robust to synchronization attack
A Kanhe, A Gnanasekaran - Arabian Journal for Science and Engineering, 2019 - Springer
In this paper, a synchronization attack resilient DCT–SVD–QIM-based blind audio
watermarking technique is proposed. The synchronization code and watermark bits are …
watermarking technique is proposed. The synchronization code and watermark bits are …
A blind audio watermarking scheme employing DCT–HT–SD technique
A Kanhe, A Gnanasekaran - Circuits, Systems, and Signal Processing, 2019 - Springer
In this paper, a blind audio watermarking technique using discrete cosine transform (DCT),
Hadamard transform (HT) and Schur decomposition (SD) is presented. The embedding of …
Hadamard transform (HT) and Schur decomposition (SD) is presented. The embedding of …
A blind audio watermarking based on singular value decomposition and quantization
In this work, we have proposed a robust audio watermarking technique in which a binary
image is embedded into a host audio signal for copyright protection. In the embedding …
image is embedded into a host audio signal for copyright protection. In the embedding …