2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) 2017
DOI: 10.1109/apsipa.2017.8282027
|View full text |Cite
|
Sign up to set email alerts
|

Speech watermarking scheme based on singular-spectrum analysis for tampering detection and identification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…It is shown in our previous work that modifying high-order singular values distorts the host signal less but is sensitive to noise or attacks. Contrarily, modifying low-order singular values can improve robustness but causes sound quality to be poor [9,14]. Thus, there is the trade-off between robustness and sound quality.…”
Section: Singular Value Decomposition (Svd)mentioning
confidence: 99%
See 3 more Smart Citations
“…It is shown in our previous work that modifying high-order singular values distorts the host signal less but is sensitive to noise or attacks. Contrarily, modifying low-order singular values can improve robustness but causes sound quality to be poor [9,14]. Thus, there is the trade-off between robustness and sound quality.…”
Section: Singular Value Decomposition (Svd)mentioning
confidence: 99%
“…Sound-quality evaluations: proposed scheme versus other methods. PESQ score LSD (dB) SDR (dB) LSB-based method [21] 4.49 0.19 65.35 CD-based method [7] ∼3.1-4.3 ∼0.6-0.8 -FE-based method [8] ∼3.9 ∼0.4 -SSA-based method (fixed rule) [12] 3.64 0.69 30.96 SSA-based method (with ad hoc parameters) [9] 3 frames from each host signal. Therefore, there were 2400 segments in our training dataset.…”
Section: B) Generating High-quality Datasetmentioning
confidence: 99%
See 2 more Smart Citations
“…Stability of such features under low data rate compression makes the method effective for semifragile authentication. Karnjana et al [15,16] proposed a scheme based on singularspectrum analysis to detect the acoustic feature-based tampering. Wu and Jay Kuo [17] implemented a fragile speech watermarking based on odd/even modulation and exponential scale quantization.…”
Section: Introductionmentioning
confidence: 99%