2011
DOI: 10.1016/j.compeleceng.2011.05.011
|View full text |Cite
|
Sign up to set email alerts
|

A pseudo-Zernike moment based audio watermarking scheme robust against desynchronization attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
29
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(29 citation statements)
references
References 17 publications
0
29
0
Order By: Relevance
“…In Table 4, DYWT represents Dyadic Wavelet Transform. From the results shown in Table 4, it can be concluded that the scheme proposed has many advantages comparing with the schemes, [8,18,[21][22][23].…”
Section: The Ability Of Precisely Tamper Location For the Scheme Propmentioning
confidence: 98%
See 3 more Smart Citations
“…In Table 4, DYWT represents Dyadic Wavelet Transform. From the results shown in Table 4, it can be concluded that the scheme proposed has many advantages comparing with the schemes, [8,18,[21][22][23].…”
Section: The Ability Of Precisely Tamper Location For the Scheme Propmentioning
confidence: 98%
“…So, desynchronization attack is considered to be one of the most difficult attacks to resist [22]. Most of the schemes robust against desynchronization attacks are based on synchronization code [8,21,22].…”
Section: Shortcomings Of the Scheme Based On Synchronization Codesmentioning
confidence: 99%
See 2 more Smart Citations
“…The immunity to noise is better for PZMs. PZMs have been used in face recognition [11], optical character recognition [12],content based image retrieval [13], image watermarking [14], palm print verification [15], audio watermarking [16] etc. Sheng and Shen [17] introduced orthogonal Fourier-Mellin moments (OFMMs).…”
Section: Introductionmentioning
confidence: 99%