2022
DOI: 10.1007/s13369-021-06431-8
|View full text |Cite
|
Sign up to set email alerts
|

Secured Speech Watermarking with DCT Compression and Chaotic Embedding Using DWT and SVD

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…There are some limitations on the cryptography technique, such as the certainty of the secret information existence and the difficulties of recovering secret information when the signal processing attack or distortion, such as noise addition, compression, cropping, and re-sampling [28] [29]. The steganography technique conceals the existence of the secret information and exhibits good robustness to the signal processing distortion, therefore the secret information can be recovered with minimum error [29].…”
Section: Results a Steganographymentioning
confidence: 99%
“…There are some limitations on the cryptography technique, such as the certainty of the secret information existence and the difficulties of recovering secret information when the signal processing attack or distortion, such as noise addition, compression, cropping, and re-sampling [28] [29]. The steganography technique conceals the existence of the secret information and exhibits good robustness to the signal processing distortion, therefore the secret information can be recovered with minimum error [29].…”
Section: Results a Steganographymentioning
confidence: 99%
“…Another new publication, was proposed by Kumar, and Kanhe, where a secured speech watermarking with DCT compression and chaotic embedding using DWT and SVD, is presented 22 . Authors of this work claimed that their proposed algorithm can resist to various signal processing attacks such as noise addition, low-pass filtering, requantization, resampling, amplitude scaling, and MP3 compression.…”
Section: Related Workmentioning
confidence: 99%
“…In this algorithm, watermarks are generated by compressed data of GBT (Graph Based Transform), and then the watermarks are embedded into the coefficients of LSFs (Line Spectral Frequencies) via the combination of LP (Linear Prediction) and DM-QIM (Dither Modulation-Quantization Index Modulation). A secured watermarking algorithm based on chaotic is introduced in [18]. e embedding information is the compressed data of DCT of the secret audio, and then the information is embedded into random sequences of matrixes of singular value via the combination of DWT and SVD (Singular Value Decomposition).…”
Section: Introductionmentioning
confidence: 99%