2009
DOI: 10.1007/978-3-642-04431-1_11
|View full text |Cite
|
Sign up to set email alerts
|

Perception-Based Audio Authentication Watermarking in the Time-Frequency Domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…The final decision measure and rules are defined in Eq. (7)(8). If , the dubious music is judged as authentic and otherwise inauthentic.…”
Section: Content Authenticity Verificationmentioning
confidence: 99%
See 1 more Smart Citation
“…The final decision measure and rules are defined in Eq. (7)(8). If , the dubious music is judged as authentic and otherwise inauthentic.…”
Section: Content Authenticity Verificationmentioning
confidence: 99%
“…To the authors' knowledge, we are not aware of any previous work concentrated on music authentication. Most algorithms are focused on speech authentication [1][2][3][4] or general audio authentication [5][6][7][8][9]. In the latter case some algorithms take music signals as part of the test data.…”
Section: Introductionmentioning
confidence: 99%
“…Alternative reversible hiding methods have been studied [1], [2], [3], [4], [5], [6]. Methods have also been proposed to detect audible modifications or to identify usages [7], [8], [9]. Technologies utilized to verify the integrity of the transmitted speech signal [10], enhance the security of speaker identification system [11], and etc.…”
Section: A Previous Studiesmentioning
confidence: 99%
“…In the literature, only few audio authentication algorithms have been published [1][2][3][4][5][6]. One desirable feature of audio authentication is to determine authenticity of a received segment [7].…”
Section: Introductionmentioning
confidence: 99%