{"id":"https://openalex.org/W3035983640","doi":"https://doi.org/10.1109/icccs49078.2020.9118546","title":"A Fragile Watermarking Algorithm for Speech Authentication by Modifying Least Significant Digits","display_name":"A Fragile Watermarking Algorithm for Speech Authentication by Modifying Least Significant Digits","publication_year":2020,"publication_date":"2020-05-01","ids":{"openalex":"https://openalex.org/W3035983640","doi":"https://doi.org/10.1109/icccs49078.2020.9118546","mag":"3035983640"},"language":"en","primary_location":{"id":"doi:10.1109/icccs49078.2020.9118546","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs49078.2020.9118546","pdf_url":null,"source":{"id":"https://openalex.org/S4306498617","display_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065625240","display_name":"Qing Qian","orcid":"https://orcid.org/0000-0002-8411-777X"},"institutions":[{"id":"https://openalex.org/I170172562","display_name":"Guizhou University of Finance and Economics","ror":"https://ror.org/02sw6yz40","country_code":"CN","type":"education","lineage":["https://openalex.org/I170172562"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qing Qian","raw_affiliation_strings":["School of Information International Joint Research Center for Data Science and High-Performance Computing, Guizhou University of Finance and Economics, Guiyang, China","Guizhou University of Finance and Economics,School of Information International Joint Research Center for Data Science and High-Performance Computing,Guiyang,China"],"affiliations":[{"raw_affiliation_string":"School of Information International Joint Research Center for Data Science and High-Performance Computing, Guizhou University of Finance and Economics, Guiyang, China","institution_ids":["https://openalex.org/I170172562"]},{"raw_affiliation_string":"Guizhou University of Finance and Economics,School of Information International Joint Research Center for Data Science and High-Performance Computing,Guiyang,China","institution_ids":["https://openalex.org/I170172562"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084299004","display_name":"Yunhe Cui","orcid":"https://orcid.org/0000-0002-0880-675X"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunhe Cui","raw_affiliation_strings":["School of Computer Science and Technology, Guizhou Provincial Key Laboratory of Public Big Data Guizhou University, Guiyang, China","Guizhou Provincial Key Laboratory of Public Big Data Guizhou University,School of Computer Science and Technology,Guiyang,China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Guizhou Provincial Key Laboratory of Public Big Data Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"Guizhou Provincial Key Laboratory of Public Big Data Guizhou University,School of Computer Science and Technology,Guiyang,China","institution_ids":["https://openalex.org/I178232147"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5065625240"],"corresponding_institution_ids":["https://openalex.org/I170172562"],"apc_list":null,"apc_paid":null,"fwci":0.2453,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.55453048,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"680","last_page":"684"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.9470140933990479},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.9071569442749023},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7210034728050232},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6985801458358765},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.5151623487472534},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5001015663146973},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4568595886230469},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.4515322148799896},{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.4440149664878845},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4204392433166504},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.30737489461898804},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30464157462120056},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.24570611119270325},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.1912761628627777}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.9470140933990479},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.9071569442749023},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7210034728050232},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6985801458358765},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.5151623487472534},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5001015663146973},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4568595886230469},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.4515322148799896},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.4440149664878845},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4204392433166504},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30737489461898804},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30464157462120056},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.24570611119270325},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.1912761628627777},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccs49078.2020.9118546","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccs49078.2020.9118546","pdf_url":null,"source":{"id":"https://openalex.org/S4306498617","display_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 5th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.699999988079071}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1071817344","https://openalex.org/W2006072643","https://openalex.org/W2189438431","https://openalex.org/W2733191164","https://openalex.org/W2740114037","https://openalex.org/W2760486121"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1559740347","https://openalex.org/W1516446231","https://openalex.org/W1577661458","https://openalex.org/W2040356834","https://openalex.org/W2098152888","https://openalex.org/W2385289568","https://openalex.org/W1669086842","https://openalex.org/W2997078490"],"abstract_inverted_index":{"Speech":[0],"content":[1,28,56,78,121],"is":[2,47,55,87,110,131],"often":[3],"faced":[4],"with":[5],"malicious":[6],"forgery":[7],"and":[8,30,50,58,70,117,145],"tampering":[9,31],"in":[10],"transit.":[11],"Therefore,":[12],"we":[13],"introduce":[14],"a":[15,81],"novel":[16],"fragile":[17,132],"watermarking":[18,101,129],"algorithm":[19,130],"by":[20],"modifying":[21],"the":[22,36,44,52,61,64,84,90,99,104,107,114,127],"least":[23,91],"significant":[24,92],"digits":[25,93],"for":[26],"speech":[27,66,77,95],"authentication":[29,38,57],"recovery.":[32,59],"In":[33,60,103],"this":[34],"letter,":[35],"proposed":[37,100,128],"scheme":[39],"consists":[40],"of":[41,94],"two":[42],"processes:":[43],"first":[45],"one":[46,54],"watermark":[48,86,109],"generation":[49],"embedding,":[51],"second":[53],"former":[62],"process,":[63,106],"compressed":[65],"signal,":[67],"frame":[68],"number":[69],"check":[71],"information":[72],"are":[73],"generated":[74,85],"based":[75],"on":[76],"to":[79,112,133],"form":[80],"watermark.":[82],"Subsequently,":[83],"embedded":[88,108],"into":[89],"sampling":[96],"points":[97],"using":[98],"algorithm.":[102],"latter":[105],"utilized":[111],"locate":[113],"tampered":[115,120],"area":[116],"recover":[118],"that":[119,126],"synchronously.":[122],"Experimental":[123],"results":[124],"show":[125],"common":[134],"signal":[135],"processing.":[136],"Additionally,":[137],"it":[138],"has":[139],"favorable":[140],"inaudibility,":[141],"accurate":[142],"location":[143],"ability":[144],"high":[146],"recovery":[147],"quality.":[148]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
