A Speech Content Authentication Algorithm Based on Pseudo-Zernike Moments in DCT Domain

2013 ◽  
Vol 5 (3) ◽  
pp. 15-34
Author(s):  
Zhenghui Liu ◽  
Hongxia Wang

A speech content authentication algorithm based on pseudo-Zernike moments in DCT domain is proposed in this paper, which is aimed at some shortcomings in some existing digital watermark schemes. The definition of coefficients self-correlation degree is given. Then the frequency domain watermark embedding method based on pseudo-Zernike moments in DCT domain is proposed. Watermark bits are generated by coefficients self-correlation degree and embedded by quantizing the pseudo-Zernike moments of DCT domain low-frequency coefficients. Comparing with the existing audio watermark algorithms based on pseudo-Zernike moments, the algorithm increases the watermarking embedding capacity and improves the efficiency greatly. Theoretical analysis and experimental evaluation results show that the proposed speech content authentication algorithm is effective.

2017 ◽  
Vol 9 (2) ◽  
pp. 1-14
Author(s):  
Fang Sun ◽  
Zhenghui Liu ◽  
Chuanda Qi

The existed content authentication schemes based on digital watermark have some shortcomings. In order to solve the problems, a speech content authentication scheme based on high-capacity watermark embedding is proposed, and the high-capacity embedding method is discussed. Firstly, speech signal is framed and segmented, and the samples of each segment are scrambled. Secondly, DCT is performed on the scrambled signal, and low-frequency coefficients are selected as the watermark embedding domain. Lastly, frame number is mapped to a sequence of integers and embedded into the domain based on the embedding method. Theoretical analysis and experimental evaluation results show that the proposed algorithm is inaudible, robust to desynchronous attacks, enhances the embedding capacity, and improves the security of watermark system.


2020 ◽  
pp. 400-413
Author(s):  
Fang Sun ◽  
Zhenghui Liu ◽  
Chuanda Qi

The existed content authentication schemes based on digital watermark have some shortcomings. In order to solve the problems, a speech content authentication scheme based on high-capacity watermark embedding is proposed, and the high-capacity embedding method is discussed. Firstly, speech signal is framed and segmented, and the samples of each segment are scrambled. Secondly, DCT is performed on the scrambled signal, and low-frequency coefficients are selected as the watermark embedding domain. Lastly, frame number is mapped to a sequence of integers and embedded into the domain based on the embedding method. Theoretical analysis and experimental evaluation results show that the proposed algorithm is inaudible, robust to desynchronous attacks, enhances the embedding capacity, and improves the security of watermark system.


Author(s):  
Reena Thomas Et. al.

A hybrid watermarking scheme based on Triangular Vertex Transform (TVT) and Contourlet coefficients for high robustness is implemented. During watermark embedding, the cover image is first decomposed using Contourlet Transform to obtain high frequency and low frequency coefficients. The lower frequency coefficients are applied with TVT. Then, the W coefficients obtained from TVT are again subdivided. The watermark bit is then embedded on the subdivided coefficients to obtain the watermarked image. Reverse operation is followed in the extraction phase. The performance of this algorithm is evaluated using embedding capacity, Normalized cross correlation (Ncc) and Peak Signal to Noise Ratio (PSNR) using standard test images. These evaluation results disclose the domination of proposed scheme over traditional schemes


2015 ◽  
Vol 7 (3) ◽  
pp. 19-36 ◽  
Author(s):  
Fan Zhang ◽  
Zhenghui Liu ◽  
Hongxia Wang

Watermark schemes content-based provide one way to solve the veracity and integrity of speech content. Some existed content-based schemes are vulnerable to feature-analysed substitution attack. Aiming to solve the problems, a secure speech content authentication algorithm is proposed, on the basic of the undeterminate angle of discrete fractional fourier transform. In the paper, the definition and calculation of discrete fractional fourier transform are given. And the watermark generation method based on discrete fractional fourier transform is analyzed. Frame number and watermark bits are embedded into hybrid domain of scrambled signals. Compared with the existed watermark schemes, the features for watermark generation and embedding are secret, which improves the security of watermark system. Theoretical analysis and experimental evaluation results show that the proposed algorithm is inaudible, robust to desynchronous attacks and has the excellent ability of tamper detection and tamper location.


2020 ◽  
Vol 26 (2) ◽  
pp. 170-175
Author(s):  
Grigor Grigorov

AbstractThis report examines the evolution and nature of the concept of motivation. It performs a theoretical analysis of the definitions of motivation and attempts to give a scientific definition of the phenomenon of motivation for practising the military profession. The results of the analysis will enable commanders to understand more clearly military motivation in order to effectively manage their subordinates.


2021 ◽  
Vol 129 ◽  
pp. 41-57
Author(s):  
Raphaël C.-W. Phan ◽  
Yin-Yin Low ◽  
KokSheik Wong ◽  
Kazuki Minemura

Author(s):  
Anastasiya Alekseevna Romanova

The author’s definition of inter-organizational cooperation, interorganizational management accounting and inter-organizational accounting and analytical system and cost calculation system in the framework of inter-organizational relations is given in the article on the basis of theoretical analysis. The features of calculating the cost of interorganizational cooperation are defined, new accounting practices are described, the advantages of implementing this type of accounting are identified, and possible problem areas are identified.


Author(s):  
Яна Валерьевна Самиулина

В статье освещен вопрос, связанный с эволюцией понятия терроризма по законодательству России. Актуальность темы определяется, прежде всего, тем, что проявление терроризма представляет собой серьезную угрозу международной и внутренней безопасности каждого отдельного государства, всего международного сообщества в целом. В результате проведенного теоретического анализа отечественного законодательства об ответственности за совершение преступлений террористического характера автором выделено пять исторических этапов (периодов) его становления, представлена их характеристика. В заключение делается вывод о существовании на современном этапе проблемы выработки определения сложного и многогранного понятия «терроризм». Законодательная дефиниция «терроризм» должна быть принципиально полной, содержать характеризующие специфические признаки, соответствующие современным способам его проявлений. Полагаем, что современная дефиниция, изложенная в п. 1 ст. 3 Федерального закона «О противодействии терроризму», пока не идеальна и продолжает требовать к себе внимания со стороны исследователей и законодателя с целью корректировки терминологии. The issue related to the evolution of the concept of terrorism under Russian legislation is examined in the article The relevance of the topic is determined, first of all, by the fact that the manifestation of terrorism is a serious threat to the international and internal security of each individual state, the entire international community as a whole. As a result of the theoretical analysis of domestic legislation on responsibility for crimes of a terrorist nature, the author has identified five historical stages (periods) of its formation, and presented their characteristics. In conclusion, a conclusion is made about the existence at the present stage of the problem of developing a definition of the complex and multifaceted concept of «terrorism». The definition of terrorism should be fundamentally complete, include characterizing specific features characteristic of modern ways of its manifestations. We believe that the modern definition set forth in paragraph 1 of Art. 3 of the Federal Law «On Countering Terrorism» is not ideal yet and continues to require attention from researchers and legislators in order to correct the terminology.


Sign in / Sign up

Export Citation Format

Share Document