Robust Blind Approach for Digital Speech Watermarking

被引:0
作者
Merrad, Ahmed [1 ]
Saadi, Slami [1 ]
Benziane, Ali [1 ]
Hafaifa, Ahmed [1 ]
机构
[1] Ziane Achour Univ Djelfa UZAD, Fac Exact Sci & Comp, Lab Automat & Appl Ind Diagnost LAADI, BP3117, Djelfa, Algeria
来源
2018 2ND INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE AND SPEECH PROCESSING (ICNLSP) | 2018年
关键词
Speech Watermarking; Blind; DWT; DCT; Attacks; Robust; ALGORITHM;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this work, a combination between Discrete Wavelet (DWT) and Discrete Cosine Transforms (DCT) is used to watermark a digital human speech sequence. This novel combination is tested under hard conditions of attacks and additive noise and proves its imperceptibility and robustness as illustrated in simulation results.
引用
收藏
页码:4 / 8
页数:5
相关论文
共 24 条
[1]   A dual transform audio watermarking algorithm [J].
Al-Haj, Ali .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 73 (03) :1897-1912
[2]  
Antony Sobin, 2012, INT J COMPUTER APPL, V52, P975
[3]   An audio watermarking scheme using singular value decomposition and dither-modulation quantization [J].
Bhat K, Vivekananda ;
Sengupta, Indranil ;
Das, Abhijit .
MULTIMEDIA TOOLS AND APPLICATIONS, 2011, 52 (2-3) :369-383
[4]  
Brannock Evelyn, 2008, WATERMARKING WAVELET
[5]  
Cai Yong-mei, 2013, Journal of Software, V8, P1801, DOI 10.4304/jsw.8.7.1801-1808
[6]  
Dhar Pranab Kumar, 2014, 8 INT C EL COMP ENG
[7]   Corrosion and Inhibition Effects of Mild Steel in Hydrochloric Acid Solutions Containing Organophosphonic Acid [J].
Gupta, Manish ;
Mishra, Jyotsna ;
Pitre, K. S. .
INTERNATIONAL JOURNAL OF CORROSION, 2013, 2013
[8]   New secure and robust audio watermarking algorithm based on QR factorization in wavelet domain [J].
Hemis, Mustapha ;
Boudraa, Bachir ;
Merazi-Meksen, Thouraya .
INTERNATIONAL JOURNAL OF WAVELETS MULTIRESOLUTION AND INFORMATION PROCESSING, 2015, 13 (03)
[9]   Localized & self adaptive audio watermarking algorithm in the wavelet domain [J].
Kaur, Arashdeep ;
Dutta, Malay Kishore ;
Soni, K. M. ;
Taneja, Nidhi .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 33 :1-15
[10]  
Khan M.I., 2012, INT J COMPUTER SCI I, V4