Audio watermarking algorithm for real-time speech integrity and authentication
Proceedings of the 2004 workshop on Multimedia and security
Speech authentication system using digital watermarking and pattern recovery
Pattern Recognition Letters
Improving Zernike Moments Comparison for Optimal Similarity and Rotation Angle Retrieval
IEEE Transactions on Pattern Analysis and Machine Intelligence
Image analysis by Bessel-Fourier moments
Pattern Recognition
Blind and robust audio watermarking scheme based on SVD-DCT
Signal Processing
A pseudo-Zernike moment based audio watermarking scheme robust against desynchronization attacks
Computers and Electrical Engineering
An SVD audio watermarking approach using chaotic encrypted images
Digital Signal Processing
Self-learning speaker identification for enhanced speech recognition
Computer Speech and Language
Robust audio watermarking based on low-order zernike moments
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
IEEE Transactions on Audio, Speech, and Language Processing
Speaker recognition from encrypted VoIP communications
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Accurate Computation of Zernike Moments in Polar Coordinates
IEEE Transactions on Image Processing
Invariant image watermark using Zernike moments
IEEE Transactions on Circuits and Systems for Video Technology
Analysis of algorithms for fast computation of pseudo Zernike moments and their numerical stability
Digital Signal Processing
A learning-based audio watermarking scheme using kernel Fisher discriminant analysis
Digital Signal Processing
Multiple cameras for audio-visual speech recognition in an automotive environment
Computer Speech and Language
Hi-index | 0.00 |
For audio watermark schemes, the method robust against desynchronization attacks based on synchronization codes faces security challenges. In this paper, a content-based method robust against insertion and deletion attacks is given, which is aimed to solve the insecurity problem of synchronization codes embedding, and a speech content authentication algorithm based on Bessel-Fourier moments is proposed. The definition and fast computation of Bessel-Fourier moments of discrete signal are given, and the attack on synchronization codes embedding method is described. For the scheme proposed, the non-synchronized signals caused by desynchronization attack can be re-synchronized by finding the frame that the watermark generated and extracted are equal. Comparing with the synchronization codes embedding method, the scheme not only is robust against insertion and deletion attacks, but also improves the security of watermark system. Theoretical analysis and experimental evaluation results show that the scheme is effective.