×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [3]
内容类型
期刊论文 [3]
发表日期
2015 [3]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共3条,第1-3条
帮助
限定条件
发表日期:2015
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
An improved phase coding-based watermarking algorithm for speech perceptual hashing authentication
期刊论文
Journal of Information Hiding and Multimedia Signal Processing, 2015, 卷号: 6, 期号: 6, 页码: 1231-1241
作者:
Zhang, Qiu-Yu
;
Yu, Shuang
;
Xing, Peng-Fei
;
Huang, Yi-Bo
;
Ren, Zhan-Wei
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/14
Audio watermarking
Authentication
Codes (symbols)
Embeddings
Mapping
Quantization (signal)
Speech
Speech transmission
Bipolar quantization
Blind watermarking scheme
Logistic mapping
Perceptual hashing
Phase coding
Quantitative identification
Speech watermarking
Watermarking algorithms
Research on algorithm of robust speech perceptual hashing for time-frequency domain based on hilbert transform
期刊论文
International Journal of Innovative Computing, Information and Control, 2015, 卷号: 11, 期号: 4, 页码: 1191-1204
作者:
Zhang, Qiuyu
;
Yang, Zhongping
;
Zhang, Qianyun
;
Huang, Yibo
;
Xing, Pengfei
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/11/14
Audio signal processing
Authentication
Discrete cosine transforms
Frequency domain analysis
Low pass filters
Speech
White noise
Hashing algorithms
Hilbert transform
Perceptual feature
Perceptual hashing
Speech content
Tamper localization
Time frequency domain
White Gaussian Noise
Research on security transmission of perceptual hash values based on ECC and digital watermarking
期刊论文
International Journal of Security and its Applications, 2015, 卷号: 9, 期号: 3, 页码: 255-266
作者:
Qiuyu, Zhang
;
Pengfei, Xing
;
Yangwei, Liu
;
Qianyun, Zhang
;
Yibo, Huang
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2020/11/14
Audition
Authentication
Digital watermarking
Error correction
Extraction
Mobile security
Audio authentication
Authentication data
Error correcting code
Extracted watermarking
Perceptual hash
Security analysis
Security transmission
Watermark extraction
©版权所有 ©2017 CSpace - Powered by
CSpace