2022
DOI: 10.1016/j.eswa.2022.117325
|View full text |Cite
|
Sign up to set email alerts
|

Robust audio watermarking scheme based on fractional Charlier moment transform and dual tree complex wavelet transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 32 publications
0
10
0
Order By: Relevance
“…The performance of the proposed audio watermarking system is compared with that of six notable audio watermarking systems, each chosen for specific reasons. These systems, namely FrCT-DTCWT 19 , DWT-DTMT 10 , DWT-DCT 9 , DCT-SVD 17 , DWT 3 , DCT 5 , 16 , 18 , and SVD 7 , were selected based on considerations such as the popularity and similarity of the employed transform domains for embedding and their proven track record of robustness against common signal processing manipulations. This comparison assesses the proposed system against these benchmarks in terms of payload capacity, imperceptibility, robustness of the watermark against common signal processing manipulations, and computational complexity.…”
Section: Experiments Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The performance of the proposed audio watermarking system is compared with that of six notable audio watermarking systems, each chosen for specific reasons. These systems, namely FrCT-DTCWT 19 , DWT-DTMT 10 , DWT-DCT 9 , DCT-SVD 17 , DWT 3 , DCT 5 , 16 , 18 , and SVD 7 , were selected based on considerations such as the popularity and similarity of the employed transform domains for embedding and their proven track record of robustness against common signal processing manipulations. This comparison assesses the proposed system against these benchmarks in terms of payload capacity, imperceptibility, robustness of the watermark against common signal processing manipulations, and computational complexity.…”
Section: Experiments Resultsmentioning
confidence: 99%
“…In the watermark extraction process, these synchronization codes are firstly found, and then the watermark bits that follow the synchronization code can be extracted. Without using a synchronization code strategy, we proposed in 19 a hybrid approach robust to attacks, including shifting attacks, based on the Dual Tree Complex Wavelet Transform (DTCWT) and the Fractional Charlier Transform (FrCT). We embedded the watermark in the host signal by manipulating the coefficients resulting from the application of the DTCWT and FrCT, respectively.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The signal after wavelet transformation [27,28] is distributed in m resolutions , and qj is the relative energy of each resolution. Remove the part with small entropy value, that is, the part with less redundancy and information, and keep the part with large entropy value, that is, the part with large uncertainty and more information.…”
Section: Wavelet Entropymentioning
confidence: 99%
“…This adds computational complexity and introduces approximation errors [11]. To this end, many researchers have started to use discrete orthogonal moments [12,13]. Zhu et al [14,15] demonstrated that discrete orthogonal moments are more effective than continuous orthogonal moments at representing images.…”
mentioning
confidence: 99%