2013
DOI: 10.1016/j.jss.2013.02.022
|View full text |Cite
|
Sign up to set email alerts
|

Robust and secure watermarking scheme for breath sound

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 23 publications
(15 citation statements)
references
References 26 publications
0
15
0
Order By: Relevance
“…This study compared the performance of three wavelet transform (WT)-based speech watermarking methods, namely, DWT-SVD [4], LWT-DCT-SVD, [3] and the proposed DWT-AMM. For the sake of a fair comparison, the watermark bits were embedded in the second-level approximation subband using an identical payload capacity of 200 bps for all three methods.…”
Section: Comparison With Other Wt-based Watermarking Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…This study compared the performance of three wavelet transform (WT)-based speech watermarking methods, namely, DWT-SVD [4], LWT-DCT-SVD, [3] and the proposed DWT-AMM. For the sake of a fair comparison, the watermark bits were embedded in the second-level approximation subband using an identical payload capacity of 200 bps for all three methods.…”
Section: Comparison With Other Wt-based Watermarking Methodsmentioning
confidence: 99%
“…Speech is a specific form of audio signal; therefore, the techniques developed for audio watermarking are presumed to be applicable to speech watermarking. However, speech differs from typical audio signals with regard to spectral bandwidth, intensity distribution, signal continuity, and production modeling [3,4]. The techniques developed for audio watermarking are not necessarily suitable for speech watermarking [5].…”
Section: Introductionmentioning
confidence: 99%
“…In a similar pattern of other evolutionary and stochastic computation techniques, such as GA and tabu-search, PSO shares similar characteristics, but it was proven that PSO could obtain better results in a faster and cheaper way compared with GA methods. Besides, another fascinating feature of PSO is that there are fewer parameters to adjust compared with GA methods (Lei et al 2013). Due to its advantage over other global optimization techniques, a myriad of watermarking scheme is developed and implemented based on PSO in this research.…”
Section: Motivationsmentioning
confidence: 99%
“…Generally, watermarking scheme needs to meet the conflicting requirements of robustness, imperceptibility, capacity and security. To achieve the balance of these constraints, artificial intelligence-based approaches such as particle swarm optimization (PSO), differential evolution (DE), and genetic algorithm have been widely applied in the recent years with demonstrated remarkable performance for watermarking application [2][3][4][5][6]. An objective function is designed to achieve the balance by searching the optimal parameters.…”
Section: Introductionmentioning
confidence: 99%
“…In the recent year, the popular transform domain watermarking methods include discrete Fourier transform (DFT), discrete cosine transform (DCT), wavelet based on lifting, integer, complex transform and the derivatives of these transforms [3][4][5][6]12,13]. There are some other wavelet transforms, such as local fractional continuous and discrete wavelet transforms, [14,15] to deal with or not deal with the non-differentiable signals defined on Cantor sets, but most wavelet transforms have no local phase.…”
Section: Introductionmentioning
confidence: 99%