2021
DOI: 10.1109/lsp.2021.3112338
|View full text |Cite
|
Sign up to set email alerts
|

Graph Fourier Transform Based Audio Zero-Watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…From the experimental results, we can find that the NC values in our scheme can reach more than 99% when resisting common attacks. So the robustness of proposed scheme and above two schemes [15,16] is comparable.…”
Section: Introductionmentioning
confidence: 84%
See 1 more Smart Citation
“…From the experimental results, we can find that the NC values in our scheme can reach more than 99% when resisting common attacks. So the robustness of proposed scheme and above two schemes [15,16] is comparable.…”
Section: Introductionmentioning
confidence: 84%
“…L.Xu et al [15] propose an audio zero-watermarking method based on sparse representation, the OMP algorithm and K-SVD algorithm are adopted. After that, authors propose a novel zero-watermarking technique based on the GFT [16]. They use the combined shift operator to construct the graph signal, and then the stable graph Fourier coefficients are selected for encoding.…”
Section: Introductionmentioning
confidence: 99%
“…The specific attack types include the following several ways: Table 3 presents the BER and NC values of watermarks extracted by the proposed and related zero-watermarking schemes when resisting desynchronization attacks with 64×64 watermark images. Meanwhile, Figures 4-8, respectively, exhibit the 64×64 watermark images extracted by the proposed scheme, DCT-DWT-SVD scheme, K-SVD scheme [9], GFT-K-means scheme [10] and NMF scheme [14] against four types of desynchronization attacks. According to Table 3, the proposed scheme performs well against all four attack types, especially against TSM attacks, which is better than the other three schemes.…”
Section: Robust Performance Analysis Against Desynchronization Attacksmentioning
confidence: 99%
“…The first approaches were proposed to protect multimedia data. Among techniques for multimedia data, some has been specialized on copyright protection and tamper detection on video [38]- [40], audio [41], [42] and images [43], [44]. Later some approaches oriented to protect documents [45], [46] or textual content stored in relational databases [1], [47] emerged.…”
Section: Related Workmentioning
confidence: 99%