2018
DOI: 10.1371/journal.pone.0204442
|View full text |Cite
|
Sign up to set email alerts
|

Self-recovery scheme for audio restoration using auditory masking

Abstract: Self-recovery schemes identify and restore tampering, using as a reference a compressed representation of a signal embedded into itself. In addition, audio self-recovery must comply with a transparency threshold, adequate for applications such as on-line music distribution or speech transmission. In this manuscript, an audio self-recovery scheme is proposed. Auditory masking properties of the signals are used to determine the frequencies that better mask the embedding distortion. Frequencies in the Fourier dom… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…This method, as well as the previous one performs the restoration of tampered areas in an iterative manner, where the first iterations yield approximate restoration, but as the iterations increase so does the restoration quality. In [99] a self-recovery scheme for audio signals is presented. To the best of our knowledge, this is the first effort in the literature to propose such a scheme for audio signals.…”
Section: ) Approximate Reconstructionmentioning
confidence: 99%
See 1 more Smart Citation
“…This method, as well as the previous one performs the restoration of tampered areas in an iterative manner, where the first iterations yield approximate restoration, but as the iterations increase so does the restoration quality. In [99] a self-recovery scheme for audio signals is presented. To the best of our knowledge, this is the first effort in the literature to propose such a scheme for audio signals.…”
Section: ) Approximate Reconstructionmentioning
confidence: 99%
“…Later, a master's thesis [113] follows the construction proposed by [112] and implements several combinations of fragile reversible watermarking schemes and three self-recovery schemes for images with perfect restoration, presented in Table 7. Later, a PhD thesis implements this kind of framework for audio signals; a reversible watermarking scheme for audio [115] and a self-recovery scheme for audio [99] had to be designed to complete the framework.…”
Section: Reversible Watermarking With Watermark and Signal Robustnessmentioning
confidence: 99%
“…The scheme in [42] involves embedding the control bits for self-recovery in the integer discrete cosine transform (intDCT) domain and then adopts a compressive sensing technique to retrieve the tampered intDCT coefficients. In a subsequent development [43], the auditory masking properties are employed to select suitable intDCT coefficients for watermark embedding. For those schemes in [41]- [43], tampering detection and signal recovery require that the size of the replaced segment remain unchanged; however, the replaced segment is often a different size.…”
Section: Introductionmentioning
confidence: 99%
“…In a subsequent development [43], the auditory masking properties are employed to select suitable intDCT coefficients for watermark embedding. For those schemes in [41]- [43], tampering detection and signal recovery require that the size of the replaced segment remain unchanged; however, the replaced segment is often a different size. The scheme in [44] uses a synchronization strategy to overcome the size discrepancy problem; however, the overall approach is somewhat simplistic.…”
Section: Introductionmentioning
confidence: 99%