2015
DOI: 10.1007/s10772-015-9292-6
|View full text |Cite
|
Sign up to set email alerts
|

Sensitivity of automatic speaker identification to SVD digital audio watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…These discrete transforms have an excellent energy compaction property, which is suitable for the elimination of the noise effect. Shafik et al [36] and Abd El-Samie et al [3] proved that the identification of speakers with features extracted in transform domains such as DWT, DCT gives better recognition rates. Li et al [24] proposed the utilization of the DST in the speaker identification systems.…”
Section: Introductionmentioning
confidence: 99%
“…These discrete transforms have an excellent energy compaction property, which is suitable for the elimination of the noise effect. Shafik et al [36] and Abd El-Samie et al [3] proved that the identification of speakers with features extracted in transform domains such as DWT, DCT gives better recognition rates. Li et al [24] proposed the utilization of the DST in the speaker identification systems.…”
Section: Introductionmentioning
confidence: 99%
“…First, there is rapid development in cryptanalysis and eavesdroppers' techniques. Second, there is a rapid increase in audio communication usage in a wide variety of daily lives [5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…Several audio signals are susceptible, and they must be protected and secured from any attacks. Also, a communication system cannot give the required security level against hackers during communications, especially if the audio data over wireless channels is clear or not encrypted [7]. It is usually receivable for any unauthorized eavesdropper.…”
Section: Introductionmentioning
confidence: 99%
“…Also, it must have to ability to decipher it to a reasonable at the side of the receiver. There exist two speech encryption approaches; analogue and digital speech cryptosystems [1][2][3][4][5][6]. Nowadays, analogue audio encryption methods are more popular because it has characteristics of fewer bandwidth requirements.…”
Section: Introductionmentioning
confidence: 99%