2021
DOI: 10.1109/taslp.2021.3092555
|View full text |Cite
|
Sign up to set email alerts
|

Desynchronization Attacks Resilient Watermarking Method Based on Frequency Singular Value Coefficient Modification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(9 citation statements)
references
References 35 publications
0
9
0
Order By: Relevance
“…Specifically, we embed the original watermark (wm1) using our proposed method. To further embed the attacker's watermark (wm2), we first adopt existing audio watermarking schemes FSVC [23] and RFDLM [21]. As shown in Table V, the original watermark can still be extracted as the evidence of voice cloning attacks, while the attacker fails to extract his watermark.…”
Section: E Resistance Against Adaptive Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…Specifically, we embed the original watermark (wm1) using our proposed method. To further embed the attacker's watermark (wm2), we first adopt existing audio watermarking schemes FSVC [23] and RFDLM [21]. As shown in Table V, the original watermark can still be extracted as the evidence of voice cloning attacks, while the attacker fails to extract his watermark.…”
Section: E Resistance Against Adaptive Attacksmentioning
confidence: 99%
“…For robustness, some research has demonstrated resilience against common and unavoidable signal processing distortions [47]. More recently, the focus has shifted toward exploring robustness under intricate conditions, such as rerecording [21], [24], desynchronization distortion [23], [20], cropping distortion [48], etc. In a nutshell, existing audio watermarking can already well balance the trade-off between fidelity and normal robustness.…”
Section: Audio Watermarkingmentioning
confidence: 99%
See 1 more Smart Citation
“…Transform domain methods are the most popular due to their capability of exploiting signal characteristics and/or human auditory properties. Typical transform methods include discrete cosine transform (DCT) [2][3][4][5][6], discrete Fourier transform (DFT) [7][8][9][10], discrete wavelet transform (DWT) [3,[11][12][13][14], and singular value decomposition (SVD) [15][16][17]. The above transform-domain methods provide good performance in terms of robustness and imperceptibility; however, the computational overhead is usually higher than that of methods implemented in the time domain.…”
Section: Introductionmentioning
confidence: 99%
“…The rapid development of Internet technology has made multimedia data vulnerable to malicious manipulation and unauthorized distribution, resulting in copyright infringement [1]. Digital watermarking is a promising solution, but there is a trade-off between its imperceptibility and robustness [2].…”
Section: Introductionmentioning
confidence: 99%