2008 IEEE International Symposium on Circuits and Systems (ISCAS) 2008
DOI: 10.1109/iscas.2008.4542080
|View full text |Cite
|
Sign up to set email alerts
|

Quality-aware GSM speech watermarking

Abstract: Abstract-Use of watermarking techniques to provide authentication and tamper proofing of speech in mobile environment is becoming important. However, the current efforts do not allow for user-specifiable quality for the watermarked speech. This paper proposes a watermarking algorithm that allows user-customizable quality for watermarked GSM (Global System for Mobile) speech. Sensitivity (in terms of quality degradation) of each GSM coefficient bits against bit watermark embedding was investigated first, which … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2010
2010
2012
2012

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 8 publications
(12 reference statements)
0
2
0
Order By: Relevance
“…The extracted watermark bit ŵ can be recovered by (4). These embedding and extracting processes use low complex mathematical operation functions, thus reduces the computation time of the watermarking algorithm.…”
Section: Extracting the Watermarksmentioning
confidence: 99%
See 1 more Smart Citation
“…The extracted watermark bit ŵ can be recovered by (4). These embedding and extracting processes use low complex mathematical operation functions, thus reduces the computation time of the watermarking algorithm.…”
Section: Extracting the Watermarksmentioning
confidence: 99%
“…What's more, the parameters, such as line spectrum pair (LSP) coefficients, are shown to be robust against common signal processing operations. Christabel et al [4] investigate the sensitivity of each global system for mobile (GSM) coefficient bits against bit watermark embedding firstly, and then bit manipulations are employed to embed watermark into the suitable and random GSM coefficient bits. The algorithm is time efficient and the transparency-robustness-capacity tradeoff is user-customizable.…”
Section: Introductionmentioning
confidence: 99%