This paper presents several watermarking methods preventing the estimation of the secret key by an adversary. The constraints for secure embedding using distribution matching, whe...
We investigate in this paper the anchor selection problem with consideration of anchor location uncertainty, which arises naturally from error propagation problem in successive or...
The majority of speaker verification systems proposed in the NIST speaker recognition evaluation are conditioned on the type of data to be processed: telephone or microphone. In ...
Najim Dehak, Zahi N. Karam, Douglas A. Reynolds, R...
Underwater acoustic communication by passive-phase conjugation uses a channel probe signal transmitted prior to the data signal in order to estimate the channel response. At the r...
Guosong Zhang, Jens M. Hovem, Hefeng Dong, Paul A....
Features generated by Non-Negative Matrix Factorization (NMF) have successfully been introduced into robust speech processing, including noise-robust speech recognition and detect...