2016
DOI: 10.1007/s11042-016-3664-z
|View full text |Cite
|
Sign up to set email alerts
|

Tamper recovery algorithm for digital speech signal based on DWT and DCT

Abstract: It is a challenging work to design tamper recovery schemes for digital speech signal. Briefly, there are two problems need to be solved. One is that the signals used to tamper recovery are difficult to generate and embed, and the second is that it's hard to tamper location precisely for attacked speech signal. In this paper, compression and reconstruction method based on discrete wavelet transform (DWT) and discrete cosine transform (DCT) is given, to obtain the compressed signals used to tamper recovery. And … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…The schemes [21, 22], and [23] are compared with our proposed scheme. In order to present a quantitative comparison for standardized transparency evaluation, implementations of all the schemes are needed, which is future research.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…The schemes [21, 22], and [23] are compared with our proposed scheme. In order to present a quantitative comparison for standardized transparency evaluation, implementations of all the schemes are needed, which is future research.…”
Section: Resultsmentioning
confidence: 99%
“…Table 6 presents a comparison of the most significant properties of the schemes reported by the authors. As can be seen, the schemes of [21] and [22] present good transparency of their watermarked and restored signals. However, since they use a lossy compressed version of the signals to construct the information for self-recovery, these schemes cannot achieve perfect restoration.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…All of these algorithms are designed in a single-transform domain, and there are many schemes designed in hybrid domains in recent years. Liu [24] proposed a scheme for audio signal tamper recovery and location tampering based on DWT and DCT. Hu [25] proposed an audio watermarking algorithm to achieve invisible data hiding based on DWPT, SVD and quantization index modulation (QIM) hybrid domains.…”
Section: Introductionmentioning
confidence: 99%