Found: 21
Select item for more details and to access through your institution.
Exposing Speech Transsplicing Forgery with Noise Level Inconsistency.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6659371
- By:
- Publication type:
- Article
An Antiforensic Method against AMR Compression Detection.
- Published in:
- Security & Communication Networks, 2020, p. 1, doi. 10.1155/2020/8849902
- By:
- Publication type:
- Article
Identification of Weakly Pitch-Shifted Voice Based on Convolutional Neural Network.
- Published in:
- International Journal of Digital Multimedia Broadcasting, 2020, p. 1, doi. 10.1155/2020/8927031
- By:
- Publication type:
- Article
Anti-Forensics of Double Compressed MP3 Audio.
- Published in:
- International Journal of Digital Crime & Forensics, 2020, v. 12, n. 3, p. N.PAG, doi. 10.4018/IJDCF.2020070104
- By:
- Publication type:
- Article
Defending and Detecting Audio Adversarial Example using Frame Offsets.
- Published in:
- KSII Transactions on Internet & Information Systems, 2021, v. 15, n. 4, p. 1538, doi. 10.3837/tiis.2021.04.019
- By:
- Publication type:
- Article
A Robust Method for Speech Replay Attack Detection.
- Published in:
- KSII Transactions on Internet & Information Systems, 2020, v. 14, n. 1, p. 168, doi. 10.3837/tiis.2020.01.010
- By:
- Publication type:
- Article
Compression history detection for MP3 audio.
- Published in:
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 2, p. 662, doi. 10.3837/tiis.2018.02.007
- By:
- Publication type:
- Article
Black-box adversarial attacks through speech distortion for speech emotion recognition.
- Published in:
- EURASIP Journal on Audio Speech & Music Processing, 2022, v. 2022, n. 1, p. 1, doi. 10.1186/s13636-022-00254-7
- By:
- Publication type:
- Article
Identification of Fake Stereo Audio Using SVM and CNN.
- Published in:
- Information (2078-2489), 2021, v. 12, n. 7, p. 263, doi. 10.3390/info12070263
- By:
- Publication type:
- Article
Source Cell-Phone Identification in the Presence of Additive Noise from CQT Domain.
- Published in:
- Information (2078-2489), 2018, v. 9, n. 8, p. 205, doi. 10.3390/info9080205
- By:
- Publication type:
- Article
AAC Double Compression Audio Detection Algorithm Based on the Difference of Scale Factor.
- Published in:
- Information (2078-2489), 2018, v. 9, n. 7, p. 161, doi. 10.3390/info9070161
- By:
- Publication type:
- Article
Ordinal synchronization mark sequence and its steganography for a multi-link network covert channel.
- Published in:
- PLoS ONE, 2021, v. 16, n. 6, p. 1, doi. 10.1371/journal.pone.0252813
- By:
- Publication type:
- Article
Speech Resampling Detection Based on Inconsistency of Band Energy.
- Published in:
- Computers, Materials & Continua, 2018, v. 56, n. 2, p. 247, doi. 10.3970/cmc.2018.02902
- By:
- Publication type:
- Article
Imperceptible adversarial audio steganography based on psychoacoustic model.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 17, p. 26451, doi. 10.1007/s11042-023-14772-9
- By:
- Publication type:
- Article
Anti-forensics of fake stereo audio using generative adversarial network.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 12, p. 17155, doi. 10.1007/s11042-022-12448-4
- By:
- Publication type:
- Article
Steganalysis of MP3Stego with low embedding-rate using Markov feature.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 5, p. 6143, doi. 10.1007/s11042-016-3264-y
- By:
- Publication type:
- Article
An efficient algorithm for double compressed AAC audio detection.
- Published in:
- Multimedia Tools & Applications, 2016, v. 75, n. 8, p. 4815, doi. 10.1007/s11042-015-2552-2
- By:
- Publication type:
- Article
Detection of MP3Stego exploiting recompression calibration-based feature.
- Published in:
- Multimedia Tools & Applications, 2014, v. 72, n. 1, p. 865, doi. 10.1007/s11042-013-1406-z
- By:
- Publication type:
- Article
A multipurpose audio aggregation watermarking based on multistage vector quantization.
- Published in:
- Multimedia Tools & Applications, 2014, v. 68, n. 3, p. 571, doi. 10.1007/s11042-012-1058-4
- By:
- Publication type:
- Article
Huffman table swapping-based steganograpy for MP3 audio.
- Published in:
- Multimedia Tools & Applications, 2011, v. 52, n. 2/3, p. 291, doi. 10.1007/s11042-009-0430-5
- By:
- Publication type:
- Article
Antiforensics of Speech Resampling Using Dual-Path Strategy.
- Published in:
- Wireless Communications & Mobile Computing, 2021, p. 1, doi. 10.1155/2021/6640106
- By:
- Publication type:
- Article