期刊文献+
共找到1,044篇文章
< 1 2 53 >
每页显示 20 50 100
Masking quantum information in multipartite systems via Fourier and Hadamard matrices
1
作者 Chen-Ming Bai Meng-Ya Wang +1 位作者 Su-Juan Zhang Lu Liu 《Communications in Theoretical Physics》 2025年第2期99-109,共11页
Quantum information masking(QIM)is a crucial technique for protecting quantum data from being accessed by local subsystems.In this paper,we introduce a novel method for achieving1-uniform QIM in multipartite systems u... Quantum information masking(QIM)is a crucial technique for protecting quantum data from being accessed by local subsystems.In this paper,we introduce a novel method for achieving1-uniform QIM in multipartite systems utilizing a Fourier matrix.We further extend this approach to construct an orthogonal array with the aid of a Hadamard matrix,which is a specific type of Fourier matrix.This allows us to explore the relationship between 2-uniform QIM and orthogonal arrays.Through this framework,we derive two distinct 2-uniform quantum states,enabling the 2-uniform masking of original information within multipartite systems.Furthermore,we prove that the maximum number of quantum bits required for achieving a2-uniformly masked state is 2^(n)-1,and the minimum is 2^(n-1)+3.Moreover,our scheme effectively demonstrates the rich quantum correlations between multipartite systems and has potential application value in quantum secret sharing. 展开更多
关键词 multipartite systems quantum information masking Fourier matrix orthogonal arrays
原文传递
taBOX: A water-soluble tetraanionic rectangular molecular container for conjugated molecules and taste masking for berberine and palmatine
2
作者 Qihan Lin Jiabin Xing +6 位作者 Yue-Yang Liu Gang Wu Shi-Jia Liu Hui Wang Wei Zhou Zhan-Ting Li Dan-Wei Zhang 《Chinese Chemical Letters》 SCIE CAS CSCD 2024年第5期175-178,共4页
A water-soluble macrocycle that bears four carboxylate anions has been designed and prepared,which forms a rectangular cavity that can efficiently encapsulate discrete electron-deficient aromatic compounds,including b... A water-soluble macrocycle that bears four carboxylate anions has been designed and prepared,which forms a rectangular cavity that can efficiently encapsulate discrete electron-deficient aromatic compounds,including berberine and palmatine.This macrocycle is revealed to be highly biocompatible and able to inhibit the bitter taste of the two drugs. 展开更多
关键词 MACROCYCLE Multianion Molecular container Molecular recognition Bitter taste masking
原文传递
Side-Channel Leakage Analysis of Inner Product Masking
3
作者 Yuyuan Li Lang Li Yu Ou 《Computers, Materials & Continua》 SCIE EI 2024年第4期1245-1262,共18页
The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher... The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher level of security.Some previous work unfolds when certain(adversarial and implementation)conditions are met,and we seek to complement these investigations by understanding what happens when these conditions deviate from their expected behaviour.In this paper,we investigate the security characteristics of IPM under different conditions.In adversarial condition,the security properties of first-order IPMs obtained through parametric characterization are preserved in the face of univariate and bivariate attacks.In implementation condition,we construct two new polynomial leakage functions to observe the nonlinear leakage of the IPM and connect the security order amplification to the nonlinear function.We observe that the security of IPMis affected by the degree and the linear component in the leakage function.In addition,the comparison experiments from the coefficients,signal-to-noise ratio(SNR)and the public parameter show that the security properties of the IPM are highly implementation-dependent. 展开更多
关键词 Side-channel analysis inner product masking mutual information nonlinear leakage
在线阅读 下载PDF
基于FFT和Masking的实时语音通话降噪算法
4
作者 徐琳娜 《电声技术》 2024年第5期64-66,共3页
针对语音通话质量的提升问题,提出一种基于快速傅里叶变换(Fast Fourier Transform,FFT)和Masking技术的实时语音通话降噪算法。首先,提出一个实时语音通话降噪的基本框架,并研究了帧分割、窗函数处理及FFT的数学原理。其次,阐述了基于... 针对语音通话质量的提升问题,提出一种基于快速傅里叶变换(Fast Fourier Transform,FFT)和Masking技术的实时语音通话降噪算法。首先,提出一个实时语音通话降噪的基本框架,并研究了帧分割、窗函数处理及FFT的数学原理。其次,阐述了基于人耳听觉特性的Masking方法及其在频域中的应用。最后,通过逆快速傅里叶变换(Inverse Fast Fourier Transform,IFFT)将信号转换回时域,并进行实验分析。实验结果表明,该降噪算法可以有效改善语音的清晰度和整体感知质量。 展开更多
关键词 语音降噪 快速傅里叶变换(FFT) masking技术 频域处理
在线阅读 下载PDF
An Efficient and Secure Privacy-Preserving Federated Learning Framework Based on Multiplicative Double Privacy Masking
5
作者 Cong Shen Wei Zhang +2 位作者 Tanping Zhou Yiming Zhang Lingling Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第9期4729-4748,共20页
With the increasing awareness of privacy protection and the improvement of relevant laws,federal learning has gradually become a new choice for cross-agency and cross-device machine learning.In order to solve the prob... With the increasing awareness of privacy protection and the improvement of relevant laws,federal learning has gradually become a new choice for cross-agency and cross-device machine learning.In order to solve the problems of privacy leakage,high computational overhead and high traffic in some federated learning schemes,this paper proposes amultiplicative double privacymask algorithm which is convenient for homomorphic addition aggregation.The combination of homomorphic encryption and secret sharing ensures that the server cannot compromise user privacy from the private gradient uploaded by the participants.At the same time,the proposed TQRR(Top-Q-Random-R)gradient selection algorithm is used to filter the gradient of encryption and upload efficiently,which reduces the computing overhead of 51.78%and the traffic of 64.87%on the premise of ensuring the accuracy of themodel,whichmakes the framework of privacy protection federated learning lighter to adapt to more miniaturized federated learning terminals. 展开更多
关键词 Federated learning privacy protection homomorphic encryption double mask secret sharing gradient selection
在线阅读 下载PDF
Speech perception in noise:Masking and unmasking 被引量:3
6
作者 Xianhui Wang Li Xu 《Journal of Otology》 CSCD 2021年第2期109-119,共11页
Speech perception is essential for daily communication.Background noise or concurrent talkers,on the other hand,can make it challenging for listeners to track the target speech(i.e.,cocktail party problem).The present... Speech perception is essential for daily communication.Background noise or concurrent talkers,on the other hand,can make it challenging for listeners to track the target speech(i.e.,cocktail party problem).The present study reviews and compares existing findings on speech perception and unmasking in cocktail party listening environments in English and Mandarin Chinese.The review starts with an introduction section followed by related concepts of auditory masking.The next two sections review factors that release speech perception from masking in English and Mandarin Chinese,respectively.The last section presents an overall summary of the findings with comparisons between the two languages.Future research directions with respect to the difference in literature on the reviewed topic between the two languages are also discussed. 展开更多
关键词 Speech perception Auditory masking Speech unmasking Cocktail party problems Mandarin Chinese
暂未订购
A Novel Masking Scheme for SM3 Based MAC
7
作者 QU Kaige WU Liji +2 位作者 WANG An REN Yanting ZHANG Xiangmin 《China Communications》 SCIE CSCD 2015年第6期11-21,共11页
The Chinese hash algorithm SM3 is verified to be secure enough,but improper hardware implementation may lead to leakage.A masking scheme for SM3 algorithm is proposed to ensure the security of SM3 based Message Authen... The Chinese hash algorithm SM3 is verified to be secure enough,but improper hardware implementation may lead to leakage.A masking scheme for SM3 algorithm is proposed to ensure the security of SM3 based Message Authentication Code(MAC).Our scheme was implemented in hardware,which utilizes hardware oriented secure conversion techniques between boolean and arithmetic masking.Security evaluation based on SAKURA-G FPGA board has been done with 2000 power traces from 2000 random plaintexts with random plaintext masks and random key masks.It has been verified that the masked SM3 hardware implementation shows no intermediate value leakage as expected.Our masked SM3 hardware can resist first-order correlation power attack(CPA) and collision correlation attack. 展开更多
关键词 SM3 algorithm masking scheme hardware implementation power analysis boolean and arithmetic masking conversion
在线阅读 下载PDF
Improved design of reconfigurable frequency response masking filters based on second-order cone programming
8
作者 吴尘 徐新洲 +1 位作者 黄程韦 赵力 《Journal of Southeast University(English Edition)》 EI CAS 2014年第4期422-427,共6页
In order to improve the design results for the reconfigurable frequency response masking FRM filters an improved design method based on second-order cone programming SOCP is proposed.Unlike traditional methods that se... In order to improve the design results for the reconfigurable frequency response masking FRM filters an improved design method based on second-order cone programming SOCP is proposed.Unlike traditional methods that separately design the proposed method takes all the desired designing modes into consideration when designing all the subfilters. First an initial solution is obtained by separately designing the subfilters and then the initial solution is updated by iteratively solving a SOCP problem. The proposed method is evaluated on a design example and simulation results demonstrate that jointly designing all the subfilters can obtain significantly lower minimax approximation errors compared to the conventional design method. 展开更多
关键词 frequency response masking FRM filter optimal design reconfigurability second-order cone programming SOCP
在线阅读 下载PDF
Taste masking of ciprofloxacin by ion-exchange resin and sustain release at gastric-intestinal through interpenetrating polymer network 被引量:2
9
作者 A.Michael Rajesh Shreya A.Bhatt +2 位作者 Harshad Brahmbhatt Pritpal Singh Anand Kiritkumar Mangaldas Popat 《Asian Journal of Pharmaceutical Sciences》 SCIE CAS 2015年第4期331-340,共10页
The aim of the study was to taste mask ciprofloxacin(CP)by using ion-exchange resins(IERs)followed by sustain release of CP by forming interpenetrating polymer network(IPN).IERs based on the copolymerization of acryli... The aim of the study was to taste mask ciprofloxacin(CP)by using ion-exchange resins(IERs)followed by sustain release of CP by forming interpenetrating polymer network(IPN).IERs based on the copolymerization of acrylic acid with different cross linking agents were synthesised.Drug-resin complexes(DRCs)with three different ratios of drug to IERs(1:1,1:2,1:4)were prepared&evaluated for taste masking by following in vivo and in vitro methods.Human volunteers graded ADC 1:4,acrylic acid-divinyl benzene(ADC-3)resin as tasteless.Characterization studies such as FTIR,SEM,DSC,P-XRD differentiated ADC 1:4,from physical mixture(PM 1:4)and confirmed the formation of complex.In vitro drug release of ADC 1:4 showed complete release of CP within 60 min at simulated gastric fluid(SGF)i.e.pH 1.2.IPN beads were prepared with ADC 1:4 by using sodium alginate(AL)and sodium alginate-chitosan(AL-CS)for sustain release of CP at SGF pH and followed by simulated intestinal fluid(SIF i.e.pH 7.4).FTIR spectra confirmed the formation of IPN beads.The release of CP was sustain at SGF pH(<20%)whereas in SIF media it was more(>75%).The kinetic model of IPN beads showed the release of CP was non-Fickian diffusion type. 展开更多
关键词 Ion exchange resins Biopolymers In vitro&in vivo taste masking CIPROFLOXACIN Sustain release Release mechanism and kinetics
在线阅读 下载PDF
Nonlinear Masking and Iterative Learning Decryption for Secure Communications 被引量:1
10
作者 Ming-Xuan Sun 《International Journal of Automation and computing》 EI CSCD 2015年第3期297-306,共10页
Typical masking techniques adopted in the conventional secure communication schemes are the additive masking and modulation by multiplication. In order to enhance security, this paper presents a nonlinear masking meth... Typical masking techniques adopted in the conventional secure communication schemes are the additive masking and modulation by multiplication. In order to enhance security, this paper presents a nonlinear masking methodology, applicable to the conventional schemes. In the proposed cryptographic scheme, the plaintext spans over a pre-specified finite-time interval, which is modulated through parameter modulation, and masked chaotically by a nonlinear mechanism. An efficient iterative learning algorithm is exploited for decryption, and the sufficient condition for convergence is derived, by which the learning gain can be chosen. Case studies are conducted to demonstrate the effectiveness of the proposed masking method. 展开更多
关键词 Secure communication masking CONVERGENCE learning algorithms nonlinearities.
原文传递
DNN-Based Speech Enhancement Using Soft Audible Noise Masking for Wind Noise Reduction 被引量:1
11
作者 Haichuan Bai Fengpei Ge Yonghong Yan 《China Communications》 SCIE CSCD 2018年第9期235-243,共9页
This paper presents a deep neural network(DNN)-based speech enhancement algorithm based on the soft audible noise masking for the single-channel wind noise reduction. To reduce the low-frequency residual noise, the ps... This paper presents a deep neural network(DNN)-based speech enhancement algorithm based on the soft audible noise masking for the single-channel wind noise reduction. To reduce the low-frequency residual noise, the psychoacoustic model is adopted to calculate the masking threshold from the estimated clean speech spectrum. The gain for noise suppression is obtained based on soft audible noise masking by comparing the estimated wind noise spectrum with the masking threshold. To deal with the abruptly time-varying noisy signals, two separate DNN models are utilized to estimate the spectra of clean speech and wind noise components. Experimental results on the subjective and objective quality tests show that the proposed algorithm achieves the better performance compared with the conventional DNN-based wind noise reduction method. 展开更多
关键词 wind noise reduction speech enhancement soft audible noise masking psychoacoustic model deep neural network
在线阅读 下载PDF
Data Masking for Chinese Electronic Medical Records with Named Entity Recognition 被引量:1
12
作者 Tianyu He Xiaolong Xu +3 位作者 Zhichen Hu Qingzhan Zhao Jianguo Dai Fei Dai 《Intelligent Automation & Soft Computing》 SCIE 2023年第6期3657-3673,共17页
With the rapid development of information technology,the electronifi-cation of medical records has gradually become a trend.In China,the population base is huge and the supporting medical institutions are numerous,so ... With the rapid development of information technology,the electronifi-cation of medical records has gradually become a trend.In China,the population base is huge and the supporting medical institutions are numerous,so this reality drives the conversion of paper medical records to electronic medical records.Electronic medical records are the basis for establishing a smart hospital and an important guarantee for achieving medical intelligence,and the massive amount of electronic medical record data is also an important data set for conducting research in the medical field.However,electronic medical records contain a large amount of private patient information,which must be desensitized before they are used as open resources.Therefore,to solve the above problems,data masking for Chinese electronic medical records with named entity recognition is proposed in this paper.Firstly,the text is vectorized to satisfy the required format of the model input.Secondly,since the input sentences may have a long or short length and the relationship between sentences in context is not negligible.To this end,a neural network model for named entity recognition based on bidirectional long short-term memory(BiLSTM)with conditional random fields(CRF)is constructed.Finally,the data masking operation is performed based on the named entity recog-nition results,mainly using regular expression filtering encryption and principal component analysis(PCA)word vector compression and replacement.In addi-tion,comparison experiments with the hidden markov model(HMM)model,LSTM-CRF model,and BiLSTM model are conducted in this paper.The experi-mental results show that the method used in this paper achieves 92.72%Accuracy,92.30%Recall,and 92.51%F1_score,which has higher accuracy compared with other models. 展开更多
关键词 Named entity recognition Chinese electronic medical records data masking principal component analysis regular expression
在线阅读 下载PDF
Experimental Investigation of Improving the Performance of the Chaotic Optical Communication with Chaos-Masking through Wavelength Mismatch 被引量:1
13
作者 Wei Chang Xiaolei Chen +2 位作者 Qingchun Zhao Hongxi Yin Nan Zhao 《Optics and Photonics Journal》 2013年第2期183-186,共4页
In this paper, the wavelength mismatch between the message and the chaotic carrier in the chaotic optical communication with chaos-masking has been experimentally investigated. The results show that the decryption per... In this paper, the wavelength mismatch between the message and the chaotic carrier in the chaotic optical communication with chaos-masking has been experimentally investigated. The results show that the decryption performance of the receiver can be improved when the message wavelength is greater than that of the chaotic carrier. When the wavelength offset is set to 0.12 nm, high-speed secure optical communication with a message of 2.5 Gbits/s is achieved. 展开更多
关键词 CHAOS masking CHAOTIC SYNCHRONIZATION CHAOTIC Communication WAVELENGTH MISMATCH
在线阅读 下载PDF
Taste masking of ofloxacin and formation of interpenetrating polymer network beads for sustained release
14
作者 A. Michael Rajesh Kiritkumar Mangaldas Popat 《Journal of Pharmaceutical Analysis》 SCIE CAS CSCD 2017年第4期244-251,共8页
The objective of this study was to carry out taste masking of ofloxacin(Ofl) by ion exchange resins(IERs)followed by sustained release of Ofl by forming interpenetrating polymer network(IPN) beads. Drug-resin complexe... The objective of this study was to carry out taste masking of ofloxacin(Ofl) by ion exchange resins(IERs)followed by sustained release of Ofl by forming interpenetrating polymer network(IPN) beads. Drug-resin complexes(DRCs) with three different ratios of Ofl to IERs(1:1, 1:2, 1:4) were prepared by batch method and investigated for in vivo and in vitro taste masking. DRC of methacrylic acid-divinyl benzene(MD) resin and Ofl prepared at a ratio of 1:4 was used to form IPN beads. IPN beads of MD 1:4 were prepared by following the ionic cross-linking method using sodium carboxymethyl xanthan gum(SCMXG) and SCMXG-sodium carboxymethyl cellulose(SCMXG-SCMC). IPN beads were characterized with FT-IR and further studied on sustained release of Ofl at different pH. In vivo taste masking carried out by human volunteers showed that MD 1:4 significantly reduced the bitterness of Ofl. Characterization studies such as FT-IR, DSC, P-XRD and taste masking showed that complex formation took place between drug and resin. In vitro study at gastric pH showed complete release of drug from MD 1:4 within 30 min whereas IPN beads took 5 h at gastric pH and 10 h at salivary pH for the complete release of drug. As the crosslinking increased the release kinetics changed into non-Fickian diffusion to zero-order release mechanism. MD 1:4 showed better performance for the taste masking of Ofl and IPNs beads prepared from it were found useful for the sustained release of Ofl at both the pH, indicating a versatile drug delivery system. 展开更多
关键词 Ion exchange resins OFLOXACIN in vivo & in VITRO TASTE masking Interpenetrating polymer network SUSTAINED release
暂未订购
MODIFIED QUANTIZATION INDEX MODULATION WATERMARKING ADAPTIVE TO CONTRAST MASKING THRESHOLDS
15
作者 Wang, Guoxi Ma, Lihong +2 位作者 Yu, Decong Cai, Kang Lu, Hanqing 《China Communications》 SCIE CSCD 2007年第1期75-84,共10页
In this paper,we suggest an adaptive watermarking method to improve both transparence and robustness of quantization index modulation(QIM) scheme. Instead of a fixed quantization step-size,we apply a step-size adapted... In this paper,we suggest an adaptive watermarking method to improve both transparence and robustness of quantization index modulation(QIM) scheme. Instead of a fixed quantization step-size,we apply a step-size adapted to image content in each 8×8 block to make a balance of robust extraction and transparent embedding.The modified step-size is determined by contrast masking thresholds of Watson’s perceptual model.From a normalized crossed-correlation value between the original watermark and the detected watermark,we could observe that our method is robust to attacks of additive white Gaussian noise(AWGN),Salt and Pepper noise and Joint Photographic Experts Group(JPEG) compression than the original QIM.By taking into account the contrast insensitivity and visible thresholds of human visual system,the suggested improvement achieves a maximum embedding strength and an appropriate quantization step-size which is consistent with local values of a host signal. 展开更多
关键词 VECTOR projected WATERMARKING ADAPTIVE QUANTIZATION index modulation CONTRAST sensitivity masking
在线阅读 下载PDF
Hyper-chaos encryption using convolutional masking and model free unmasking
16
作者 齐国元 Sandra Bazebo Matondo 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第5期161-166,共6页
In this paper, during the masking process the encrypted message is convolved and embedded into a Qi hyper-chaotic system characterizing a high disorder degree. The masking scheme was tested using both Qi hyper-chaos a... In this paper, during the masking process the encrypted message is convolved and embedded into a Qi hyper-chaotic system characterizing a high disorder degree. The masking scheme was tested using both Qi hyper-chaos and Lorenz chaos and indicated that Qi hyper-chaos based masking can resist attacks of the filtering and power spectrum analysis, while the Lorenz based scheme fails for high amplitude data. To unmask the message at the receiving end, two methods are proposed. In the first method, a model-free synchronizer, i.e. a multivariable higher-order differential feedback controller between the transmitter and receiver is employed to de-convolve the message embedded in the receiving signal. In the second method, no synchronization is required since the message is de-convolved using the information of the estimated derivative. 展开更多
关键词 Qi hyper-chaos masking high-order differentiator chaos-based encryption
原文传递
Open-loop frequency response for a chaotic masking system
17
作者 黄显高 Yu Pei 黄伟 《Chinese Physics B》 SCIE EI CAS CSCD 2006年第12期2894-2901,共8页
In this paper, a new numerical simulation approach is proposed for the study of open-loop frequency response of a chaotic masking system. Using Chua's circuit and the Lorenz system as illustrative examples, we have s... In this paper, a new numerical simulation approach is proposed for the study of open-loop frequency response of a chaotic masking system. Using Chua's circuit and the Lorenz system as illustrative examples, we have shown that one can employ chaos synchronization to separate the feedback network from a chaotic masking system, and then use numerical simulation to obtain the open-loop synchronization response, the phase response, and the amplitude response of a chaotic masking system. Based on the analysis of the frequency response, we have also proved that changing the amplitude of the exciting (input) signal within normal working domain does not influence the frequency response of the chaotic masking system. The new numerical simulation method developed in this paper can be extended to consider the open-loop frequency response of other systems described by differential or difference equations. 展开更多
关键词 OPEN-LOOP frequency response chaotic masking system
原文传递
Image encryption based on a novel memristive chaotic system,Grain-128a algorithm and dynamic pixel masking
18
作者 HUANG Lilian SUN Yi +1 位作者 XIANG Jianhong WANG Linyu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第3期534-550,共17页
In this paper,we first propose a memristive chaotic system and implement it by circuit simulation.The chaotic dynamics and various attractors are analysed by using phase portrait,bifurcation diagram,and Lyapunov expon... In this paper,we first propose a memristive chaotic system and implement it by circuit simulation.The chaotic dynamics and various attractors are analysed by using phase portrait,bifurcation diagram,and Lyapunov exponents.In particular,the system has robust chaos in a wide parameter range and the initial value space,which is favourable to the security communication application.Consequently,we further explore its application in image encryption and present a new scheme.Before image processing,the external key is protected by the Grain-128a algorithm and the initial values of the memristive system are updated with the plain image.We not only perform random pixel extraction and masking with the chaotic cipher,but also use them as control parameters for Brownian motion to obtain the permutation matrix.In addition,multiplication on the finite field GF(2^(8))is added to further enhance the cryptography.Finally,the simulation results verify that the proposed image encryption scheme has better performance and higher security,which can effectively resist various attacks. 展开更多
关键词 memristive chaotic system super-wide parameter range image encryption Grain-128a algorithm dynamic pixel masking
在线阅读 下载PDF
The masking condition for the quantum state in two-dimensional Hilbert space
19
作者 Mei-yi Wang Su-juan Zhang +1 位作者 Chen-ming Bai Lu Liu 《Communications in Theoretical Physics》 SCIE CAS CSCD 2022年第11期77-83,共7页
This paper focuses on quantum information masking for the quantum state in two-dimensional Hilbert space.We present a system of equations as the condition of quantum information masking.It is shown that quantum inform... This paper focuses on quantum information masking for the quantum state in two-dimensional Hilbert space.We present a system of equations as the condition of quantum information masking.It is shown that quantum information contained in a single qubit state can be masked,if and only if the coefficients of the quantum state satisfy the given system of equations.By observing the characteristics of non-orthogonal maskable quantum states,we obtain a related conclusion,namely,if two non-orthogonal two-qubit quantum states can mask a single qubit state,they have the same number of terms and the same basis.Finally,for maskable orthogonal quantum states,we analyze two special examples and give their images for an intuitive description. 展开更多
关键词 quantum information masking limited conditions TWO-QUBIT
原文传递
Single-channel speech enhancement method based on masking properties and minimum statistics
20
作者 JiangXiaoping YaoTianren FuHua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第2期217-224,共8页
A single-channel speech enhancement method of noisy speech signals at very low signal-to-noise ratios is presented, which is based on masking properties of the human auditory system and power spectral density estimati... A single-channel speech enhancement method of noisy speech signals at very low signal-to-noise ratios is presented, which is based on masking properties of the human auditory system and power spectral density estimation of non stationary noise. It allows for an automatic adaptation in time and frequency of the parametric enhancement system, and finds the best tradeoff among the amount of noise reduction, the speech distortion, and the level of musical residual noise based on a criterion correlated with perception and SNR. This leads to a significant reduction of the unnatural structure of the residual noise. The results with several noise types show that the enhanced speech is more pleasant to a human listener. 展开更多
关键词 auditory property masking varying SNR estimation speech enhancement minimum statistics.
在线阅读 下载PDF
上一页 1 2 53 下一页 到第
使用帮助 返回顶部