{"created":"2020-09-01T14:32:54.050009+00:00","id":4349,"links":{},"metadata":{"_buckets":{"deposit":"5807840c-c15d-4df6-b55e-7412291f360d"},"_deposit":{"id":"4349","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4349"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4349","sets":["1582963302567:1597824304333"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"An Efficient Tampering Detection and Localization Method for Speech Signals","subitem_1551255648112":"en_US"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"The development in digital technologies andadvanced speech analysis/synthesis tools these daysenable speech signals to be tampered without leavingany perceptual clues. As an important informationcarrier, the integrity of speech signals should bestrictly confirmed and digital watermarking can beused for this purpose. In this paper, a self-embeddingspeech watermarking scheme is proposed fordetection of unauthorized manipulation (tampering)and localization. Firstly, hash code is generated fromoriginal speech signal and then this hash code (as awatermark) is embedded directly into the signal itselfwithout affecting the original quality. Once tamperingoccurred, the watermark in the tampered segmentshould be destroyed and thus the receiver can detectthe tampered position. Experimental results show thatthe proposed method provides not only inaudibilityand blindness but also fragility against tampering anddetects the position of tampering."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Speech watermarking"},{"interim":"inaudibility"},{"interim":"fragility"},{"interim":"authentication"},{"interim":"tampering detection and localization"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-10-11"}],"displaytype":"preview","filename":"NJPSC 2019 Proceedings-pages-15-21.pdf","filesize":[{"value":"1030 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4349/files/NJPSC 2019 Proceedings-pages-15-21.pdf"},"version_id":"b0106765-5413-4da0-99d3-94503d682f84"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"University of Computer Studies, Yangon","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Myint, Sharr Wint Yee"},{"subitem_authors_fullname":"Oo, Twe Ta"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2019-03"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/2286"},"item_title":"An Efficient Tampering Detection and Localization Method for Speech Signals","item_type_id":"21","owner":"1","path":["1597824304333"],"publish_date":"2019-10-11","publish_status":"0","recid":"4349","relation_version_is_last":true,"title":["An Efficient Tampering Detection and Localization Method for Speech Signals"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T01:44:15.294629+00:00"}