2011
DOI: 10.1007/s11042-011-0861-7
|View full text |Cite
|
Sign up to set email alerts
|

Speech authentication by semi-fragile speech watermarking utilizing analysis by synthesis and spectral distortion optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(13 citation statements)
references
References 29 publications
0
13
0
Order By: Relevance
“…Linear predictive coding (LPC) or line spectrum pair (LSP) indirectly modifies or quantizes (AR) parameters for embedding the watermark (Gurijala and Deller, 2002;Hatada et al, 2002;Yan and Yin-Jing, 2011;Hofbauer and Kubin, 2006), then watermark data are embedded in the bit stream of the codec, e.g., ACELP (Geiser and vary, 2008), G.729 (Singh et al, 2009), G.711-PCMU (Aoki, 2008) and G.723.1 (Huang et al, 2011), for bypassing the speech compression attacks during or after speech compression.…”
Section: Watermarkingmentioning
confidence: 99%
See 1 more Smart Citation
“…Linear predictive coding (LPC) or line spectrum pair (LSP) indirectly modifies or quantizes (AR) parameters for embedding the watermark (Gurijala and Deller, 2002;Hatada et al, 2002;Yan and Yin-Jing, 2011;Hofbauer and Kubin, 2006), then watermark data are embedded in the bit stream of the codec, e.g., ACELP (Geiser and vary, 2008), G.729 (Singh et al, 2009), G.711-PCMU (Aoki, 2008) and G.723.1 (Huang et al, 2011), for bypassing the speech compression attacks during or after speech compression.…”
Section: Watermarkingmentioning
confidence: 99%
“…It obtains the distance between two sets of speech signals for embedding the watermark data. This procedure is performed by using some statistical methods to change the variance, the energy, and the mean of the sets (Yan and Yin-Jing, 2011;Hofbauer and Kubin, 2006;Geiser and vary, 2008;Singh et al, 2009). The larger the distance obtained, the easier the watermarking embedding.…”
Section: Watermarkingmentioning
confidence: 99%
“…Also, the sharpest and second sharpest bandwidths of the speech formants were manipulated to carry the 0 and 1 watermark bits, respectively. In addition, another semi-fragile speech watermarking approach based on quantization of the linear prediction (LP) parameters has been proposed [25]. For this approach, the LP coefficients were converted into inverse sine (IS) coefficients, in which the watermark bits were embedded using QIM.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Chen and Zhu [9] achieved robust watermarking by embedding watermark bits into codebook indices, while applying multistage vector quantization (MSVQ) to the derived LP coefficients. Yan and Guo [10] converted the LP coefficients to reflection coefficients, which were then transformed to inverse sine (IS) parameters. Watermark embedding was achieved by modifying the IS parameters using odd-even modulation [11].…”
Section: Introductionmentioning
confidence: 99%