Audio watermarking algorithm for real-time speech integrity and authentication
暂无分享,去创建一个
[1] Sadaoki Furui,et al. Speaker recognition , 1997, Scholarpedia.
[2] Baugher,et al. The Secure Real-Time Transport Protocol , 2003 .
[3] Jean-Luc Dugelay,et al. Blind detection of malicious alterations on still images using robust watermarks , 2000 .
[4] Der-Chyuan Lou,et al. Fault resilient and compression tolerant digital signature for image authentication , 2000, IEEE Trans. Consumer Electron..
[5] Ton Kalker,et al. Audio watermarking for monitoring and copy protection , 2000, MULTIMEDIA '00.
[6] John D. Howard,et al. An analysis of security incidents on the Internet 1989-1995 , 1998 .
[7] Min Wu,et al. Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[8] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[9] C.-C. Jay Kuo,et al. Speech content integrity verification integrated with ITU G.723.1 speech coding , 2001, Proceedings International Conference on Information Technology: Coding and Computing.
[10] Ralf Steinmetz,et al. Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[11] D. O'Shaughnessy,et al. Speaker recognition , 1986, IEEE ASSP Magazine.
[12] Walter Bender,et al. Echo Hiding , 1996, Information Hiding.
[13] Zhiyuan Li,et al. Energy impact of secure computation on a handheld device , 2002, 2002 IEEE International Workshop on Workload Characterization.