Author:
Al-Haj Ali,Bata Lama,Mohammad Ahmad
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Different attacks presence considerations: analyzing the simple and efficient self-marked algorithm performance for highly-sensitive audio signals contents verification;International Journal of Speech Technology;2023-03-12
2. A Secure Biometric Identification Technique Using Spread Spectrum Audio Watermarking;2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS);2016-04
3. Efficient audio integrity verification algorithm using discrete cosine transform;International Journal of Speech Technology;2015-11-12
4. Robust and Energy Efficient Audio Watermarking Scheme Resilient to Desynchronizing Attacks;Communications in Computer and Information Science;2011