2013
DOI: 10.1080/00207160.2013.805752
|View full text |Cite
|
Sign up to set email alerts
|

A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…Robustness→detection probability (%) Figure 11: Triangles for the effect of capacity on other watermarking criteria. [3] 0.4780 28.08 33.33-50 309 LSF [7,10] 0.5127 30.32 33.33-50 298 DT-CWT [11] 0.1367 31.36 15.66-976.56 351 Genetic algorithm [12] 0.4513 29.30 N/A 411 watermarking techniques. Apparently, the proposed technique was induced more delay to embedding process due to the checking loop.…”
Section: Capacity→(pbs)mentioning
confidence: 99%
“…Robustness→detection probability (%) Figure 11: Triangles for the effect of capacity on other watermarking criteria. [3] 0.4780 28.08 33.33-50 309 LSF [7,10] 0.5127 30.32 33.33-50 298 DT-CWT [11] 0.1367 31.36 15.66-976.56 351 Genetic algorithm [12] 0.4513 29.30 N/A 411 watermarking techniques. Apparently, the proposed technique was induced more delay to embedding process due to the checking loop.…”
Section: Capacity→(pbs)mentioning
confidence: 99%
“…Discrete cosine transform is an important method which simplifies Fourier transform and is an important transform in digital image processing (16)(17)(18). A lot of important image algorithms are based on the discrete cosine transform.…”
Section: Sub-block 3d Discrete Cosine Transformmentioning
confidence: 99%
“…According to Eqs. (12) and (13), the threshold t lies between t min and t max, and the relationship can be represented as t min ≤ t ≤ t max (14) We apply the same threshold t to N different test audio frames. To define the error S in the detection process, we first define the bool function as follows:…”
Section: Detection Of Malicious Tamperingmentioning
confidence: 99%