2012
DOI: 10.1016/j.eswa.2012.05.027
|View full text |Cite
|
Sign up to set email alerts
|

On the ability of adaptation of speech signals and data hiding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0
1

Year Published

2012
2012
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 11 publications
0
1
0
1
Order By: Relevance
“…Although the techniques have been improved in [38], they still face the challenge of naturalness. Moreover, VOCo and Double voice models are developed to generate fake speeches based on signal processing mechanisms rather than machine learning algorithms [39,40]. The generated voice copies the accent, pitch, rhythm, genre, and plain text from the original speech based on mthe apping.…”
Section: Iiirelated Workmentioning
confidence: 99%
“…Although the techniques have been improved in [38], they still face the challenge of naturalness. Moreover, VOCo and Double voice models are developed to generate fake speeches based on signal processing mechanisms rather than machine learning algorithms [39,40]. The generated voice copies the accent, pitch, rhythm, genre, and plain text from the original speech based on mthe apping.…”
Section: Iiirelated Workmentioning
confidence: 99%
“…Recientemente, ha sido propuesto el cuadrado del coeficiente de correlación (r 2 ) como un índice de distorsión de las señales de voz [13][14]. Hemos seleccionado el índice de distorsión como nuestro parámetro de similitud de las señales de voz, por varias razones: el resultado es independiente del rango dinámico de las señales a comparar, es normalizado, lo que permite establecer el valor óptimo y el valor mínimo [15], y por último es un parámetro que se calcula con bajo costo computacional.…”
Section: Selección Del Parámetro De Similitudunclassified
“…Steganography and Watermarking are defined as special procedures for embedding signals into digital content [1]. In the first case, the message is hidden for a communication purpose and may be used in military operations.…”
Section: Introductionmentioning
confidence: 99%