2016
DOI: 10.1016/j.sigpro.2015.10.023
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and recovery algorithm for speech signal based on digital watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 53 publications
(16 citation statements)
references
References 22 publications
0
16
0
Order By: Relevance
“…into unreadable format called cipher text file by using encryption techniques [34,39] and attributes (i.e. keys).…”
Section: Cryptographymentioning
confidence: 99%
See 2 more Smart Citations
“…into unreadable format called cipher text file by using encryption techniques [34,39] and attributes (i.e. keys).…”
Section: Cryptographymentioning
confidence: 99%
“…It is also known as public key cryptography in which a pair of keys private and public keys is used for encryption and decryption for providing confidentiality and authentication [39]. …”
Section: Asymmetric Cryptographymentioning
confidence: 99%
See 1 more Smart Citation
“…Currently, there has been a considerable amount of work on authentication and recovery for digital images [2,7,11,19]. It's a pity that, there are comparatively few schemes for digital speech [4,13].…”
Section: Introductionmentioning
confidence: 99%
“…The watermark bits are inserted within an angle of the wavelet's sub-bands of the speech signal. Z. Liu et al [7] proposed a digital speech watermarking authentication and tamper detection and recovery scheme. The watermark represents the number of frames and the compressed speech signal.…”
Section: Introductionmentioning
confidence: 99%