default search action
Kaliappan Gopalan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [c25]Kaliappan Gopalan:
Audio Steganography for Information Hiding and Covert Communication - a Tutorial. EIT 2018: 242-243 - 2016
- [c24]Kaliappan Gopalan:
An algorithm for fragile audio watermarking by bit modification. INDIN 2016: 1116-1119 - 2015
- [c23]Kaliappan Gopalan, Jiajun Fu:
An imperceptible and robust audio steganography employing bit modification. ICIT 2015: 1635-1638 - 2014
- [c22]Yang Liu, Kaliappan Gopalan:
Speech based analysis of physiological stress using perceptually significant features. EIT 2014: 168-172 - [c21]Dongjian Cai, Kaliappan Gopalan:
Audio watermarking using bit modification of voiced or unvoiced segments. EIT 2014: 491-494 - [c20]Dongjian Cai, Kaliappan Gopalan:
Audio watermarking using bit modification of voiced or unvoiced segments. EIT 2014: 501-504 - 2013
- [c19]Muhammad Sanaullah, Kaliappan Gopalan:
Deception detection in speech using bark band and perceptually significant energy features. MWSCAS 2013: 1212-1215 - 2012
- [c18]Kaliappan Gopalan, Tao Chu:
Keyword word recognition using a fusion of spectral, cepstral and modulation features. CONIELECOMP 2012: 234-238 - [c17]Padmalochini Umakanthan, Kaliappan Gopalan:
Word boundary detection through frame classification using bispectral analysis. EIT 2012: 1-4 - [e1]Kaliappan Gopalan, Sabu M. Thampi:
2012 International Conference on Advances in Computing, Communications and Informatics, ICACCI '12, Chennai, India, August 3-5, 2012. ACM 2012, ISBN 978-1-4503-1196-0 [contents] - 2011
- [c16]Kaliappan Gopalan:
A Bit Modification Technique for Watermarking Images and Streaming Video. ACC (4) 2011: 463-472 - 2010
- [c15]Kaliappan Gopalan, Qidong Shi:
Audio Steganography Using Bit Modification - A Tradeoff on Perceptibility and Data Robustness for Large Payload Audio Embedding. ICCCN 2010: 1-6
2000 – 2009
- 2007
- [c14]Kaliappan Gopalan, Stanley J. Wenndt:
Speech Analysis using Modulation-Based Features for Detecting Deception. DSP 2007: 619-622 - 2006
- [c13]Kaliappan Gopalan:
A One-Dimensional Technique for Embedding Data in A JPEG Color Image. APCCAS 2006: 948-951 - [c12]Kaliappan Gopalan:
A technique for imperceptible embedding of data in a color image. ICINCO-RA 2006: 512-515 - 2005
- [c11]Kaliappan Gopalan:
Audio steganography by cepstrum modification. ICASSP (5) 2005: 481-484 - [c10]Kaliappan Gopalan:
Robust watermarking of music signals by cepstrum modification. ISCAS (5) 2005: 4413-4416 - 2004
- [c9]Kaliappan Gopalan:
Cepstral domain modification of audio signals for data embedding: preliminary results. Security, Steganography, and Watermarking of Multimedia Contents 2004: 151-161 - 2003
- [c8]Kaliappan Gopalan:
Audio steganography using bit modification. ICASSP (2) 2003: 421-424 - [c7]Kaliappan Gopalan:
Audio steganography using bit modification. ICME 2003: 629-632 - [c6]Kaliappan Gopalan, Stanley J. Wenndt, Scott F. Adams, Darren M. Haddad:
Audio steganography by amplitude or phase modification. Security and Watermarking of Multimedia Contents 2003: 67-76 - 2001
- [c5]Kaliappan Gopalan:
On the effect of stress on certain modulation parameters of speech. ICASSP 2001: 101-104 - [c4]Kaliappan Gopalan:
Data embedding in the phase spectrum of speech signals. SIP 2001: 242-246
1990 – 1999
- 1999
- [j1]Kaliappan Gopalan, Timothy R. Anderson, Edward J. Cupples:
A comparison of speaker identification results using features based on cepstrum and Fourier-Bessel expansion. IEEE Trans. Speech Audio Process. 7(3): 289-294 (1999)
1980 – 1989
- 1985
- [c3]C. S. Chen, Kaliappan Gopalan, Pallabi Mitra:
Speech signal analysis and synthesis via Fourier-Bessel representation. ICASSP 1985: 497-500 - [c2]Kaliappan Gopalan, C. S. Chen:
Computation of the two-dimensional Fourier transform of circularly symmetric functions. ICASSP 1985: 1546-1548 - 1983
- [c1]Kaliappan Gopalan, C. S. Chen:
Numerical evaluation of Fourier-Bessel series expansion. ICASSP 1983: 151-154
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint