{"created":"2020-09-01T14:29:41.895531+00:00","id":4309,"links":{},"metadata":{"_buckets":{"deposit":"187ebc1c-e655-49b8-b589-4b31880400ea"},"_deposit":{"id":"4309","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4309"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4309","sets":["1582963302567:1597824322519"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"A Study on an Efficient Tampering Detection and Localization Method for Speech Signals","subitem_1551255648112":"en_US"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Due to the development of digital technologies, new social issues relating to maliciousattacks and unauthorized tampering to speech, such as content replacement and voicemorphing, have arisen. Using advanced speech analysis and synthesis tools enables thespeech to be tampered without leaving any perceptual clues. As an important informationcarrier, the originality, integrity, and authenticity of speech signals should be strictlyconfirmed.Authentication and tampering detection of digital signals is one of the mainapplications of digital watermarking. In this thesis, an efficient speech watermarkingmethod is proposed to generate self-embedding speech signals in that hash representationof a speech signal, which is assumed as watermark, is embedded into the signal itselfwithout affecting the original quality. The proposed system is intended to satisfy blindness,inaudibility, and fragility against malicious modifications.The proposed watermarking method in this thesis is a kind of fragile watermarkingand thus the hash information (watermark) in the tampered regions is destroyed whentampering occurs. This feature helps the receiver to detect and localize the tamperingregions by comparing the original hash information and the extracted hash from thereceived speech. The perfect match of the hash information confirms the integrity andoriginality of the received speech; otherwise it indicates tampering.In this thesis, performance of the proposed system is tested on 40 read speech fileswhich are International news and Burmese news read by 20 female and 20 maleannouncers. The proposed method is implemented in MATLAB and fragility againstmalicious modification is evaluated by applying various kinds of tampering such ascompression, zeroing, adding noise, time scaling, and reverberation attacks on thewatermarked speech files. Experimental results show that the proposed method is relevantwith the main requirements of a good watermarking scheme: inaudibility and blindness inaddition to fragility. Therefore, the proposed system is really useful for applications ofcriminal investigation and digital forensics where the integrity and originality of the speechevidence is extremely important."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-09-23"}],"displaytype":"preview","filename":"Sharr_Wint_Yee_Myint(5CT-4)_Thesis.pdf","filesize":[{"value":"3571 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4309/files/Sharr_Wint_Yee_Myint(5CT-4)_Thesis.pdf"},"version_id":"01eb672b-a040-4a7b-a556-2f517721ab37"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"University of Computer Studies, Yangon","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Myint, Sharr Wint Yee"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Thesis"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2018-11"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/2249"},"item_title":"A Study on an Efficient Tampering Detection and Localization Method for Speech Signals","item_type_id":"21","owner":"1","path":["1597824322519"],"publish_date":"2019-09-23","publish_status":"0","recid":"4309","relation_version_is_last":true,"title":["A Study on an Efficient Tampering Detection and Localization Method for Speech Signals"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-03-24T23:16:17.600382+00:00"}