{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T17:40:06Z","timestamp":1654105206648},"reference-count":25,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7,1]]},"abstract":"

A speech content authentication algorithm based on pseudo-Zernike moments in DCT domain is proposed in this paper, which is aimed at some shortcomings in some existing digital watermark schemes. The definition of coefficients self-correlation degree is given. Then the frequency domain watermark embedding method based on pseudo-Zernike moments in DCT domain is proposed. Watermark bits are generated by coefficients self-correlation degree and embedded by quantizing the pseudo-Zernike moments of DCT domain low-frequency coefficients. Comparing with the existing audio watermark algorithms based on pseudo-Zernike moments, the algorithm increases the watermarking embedding capacity and improves the efficiency greatly. Theoretical analysis and experimental evaluation results show that the proposed speech content authentication algorithm is effective.<\/p>","DOI":"10.4018\/jdcf.2013070102","type":"journal-article","created":{"date-parts":[[2013,9,9]],"date-time":"2013-09-09T12:59:46Z","timestamp":1378731586000},"page":"15-34","source":"Crossref","is-referenced-by-count":0,"title":["A Speech Content Authentication Algorithm Based on Pseudo-Zernike Moments in DCT Domain"],"prefix":"10.4018","volume":"5","author":[{"given":"Zhenghui","family":"Liu","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China"}]},{"given":"Hongxia","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China"}]}],"member":"2432","reference":[{"key":"jdcf.2013070102-0","unstructured":"Chen, N., & Zhu, J. (2008). A multipurpose audio watermarking scheme for copyright protection and content authentication. In Proceedings of the International Conference on Multimedia and Expo (pp.221-224). New York: IEEE Press."},{"key":"jdcf.2013070102-1","doi-asserted-by":"crossref","unstructured":"Chen, N., Zhu, M. Y., & Liu, S. (2010). A new fragile audio watermarking scheme. In Proceedings of the International Conference on Audio Language and Image Processing (pp. 367-372). New York: IEEE Press.","DOI":"10.1109\/ICALIP.2010.5684577"},{"key":"jdcf.2013070102-2","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2007.896658"},{"key":"jdcf.2013070102-3","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2032890"},{"key":"jdcf.2013070102-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2011.11.002"},{"key":"jdcf.2013070102-5","doi-asserted-by":"crossref","unstructured":"Jiang, W. Z. (2010). Fragile audio watermarking algorithm based on SVD and DWT. In Proceedings of the International Conference on Intelligent Computing and Integrated Systems (pp. 83-86). New York: IEEE Press.","DOI":"10.1109\/ICISS.2010.5655023"},{"key":"jdcf.2013070102-6","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.10.001"},{"key":"jdcf.2013070102-7","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815955"},{"key":"jdcf.2013070102-8","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.03.001"},{"key":"jdcf.2013070102-9","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2008.2007988"},{"key":"jdcf.2013070102-10","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2012.07.005"},{"key":"jdcf.2013070102-11","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2006.12.010"},{"key":"jdcf.2013070102-12","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.115"},{"key":"jdcf.2013070102-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2011.11.004"},{"key":"jdcf.2013070102-14","doi-asserted-by":"crossref","unstructured":"Salma, M., Maha, C., & Chokri, B. A. (2010). A robust audio watermarking technique based on the perceptual evaluation of audio quality algorithm in the multiresolution domain. In Proceedings of the International Symposium on Signal Processing and Information Technology (pp.326-331). New York: IEEE Press.","DOI":"10.1109\/ISSPIT.2010.5711803"},{"key":"jdcf.2013070102-15","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2011.07.009"},{"key":"jdcf.2013070102-16","doi-asserted-by":"publisher","DOI":"10.1007\/s00034-010-9255-8"},{"key":"jdcf.2013070102-17","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-010-0058-0"},{"key":"jdcf.2013070102-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.01.014"},{"key":"jdcf.2013070102-19","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2011.05.011"},{"key":"jdcf.2013070102-20","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2009.44"},{"key":"jdcf.2013070102-21","doi-asserted-by":"crossref","unstructured":"Xiang, S. J., Huang, J. W., & Yang, R. (2006). Robust audio watermarking based on low-order Zernike moments. In Proceedings of the 5th International Workshop of Digital Watermarking (pp.226-240).Berlin, Germany: Springer-Verlag Press.","DOI":"10.1007\/11922841_19"},{"issue":"9","key":"jdcf.2013070102-22","first-page":"1711","article-title":"A novel robust audio watermarking scheme based on nonuniform discrete fourier transform.","volume":"29","author":"L.Xie","year":"2006","journal-title":"Chinese Journal of Computers"},{"key":"jdcf.2013070102-23","doi-asserted-by":"crossref","unstructured":"Yamamoto, K., & Iwakini, M. (2009). Robust audio watermarking with time and frequency division. In Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 76-81). New York, NY: IEEE Press.","DOI":"10.1109\/IIH-MSP.2009.122"},{"key":"jdcf.2013070102-24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2223680"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=84134","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T17:08:32Z","timestamp":1654103312000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdcf.2013070102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,7,1]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,7]]}},"URL":"https:\/\/doi.org\/10.4018\/jdcf.2013070102","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,1]]}}}