{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:17:22Z","timestamp":1766135842538},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540427339"},{"type":"electronic","value":"9783540454960"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45496-9_26","type":"book-chapter","created":{"date-parts":[[2007,5,5]],"date-time":"2007-05-05T09:08:40Z","timestamp":1178356120000},"page":"354-368","source":"Crossref","is-referenced-by-count":43,"title":["Robust Covert Communication over a Public Audio Channel Using Spread Spectrum"],"prefix":"10.1007","author":[{"given":"Darko","family":"Kirovski","sequence":"first","affiliation":[]},{"given":"Henrique","family":"Malvar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,10,24]]},"reference":[{"volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","year":"2000","key":"26_CR1","unstructured":"Katzenbeisser S., Petitcolas, F. A. P., (eds.): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Boston (2000)."},{"key":"26_CR2","first-page":"25","volume-title":"Proc. EUSIPCO 98","author":"P. Bassia","year":"1998","unstructured":"Bassia, P., Pitas, I.: Robust audio watermarking in the time domain. In: Proc. EUSIPCO 98, vol. 1. Rodos, Greece. IEE (1998) 25\u201328."},{"key":"26_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/3-540-61996-8_41","volume-title":"Information Hiding","author":"I. J. Cox","year":"1996","unstructured":"Cox, I. J., Kilian, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. In: Anderson, R. (ed.): Information Hiding, Cambridge, UK. Lecture Notes in Computer Science, Vol. 1174. Springer-Verlag, Berlin\/Heidelberg (1996) 185\u2013206."},{"key":"26_CR4","volume-title":"105th Convention","author":"C. Neubauer","year":"1998","unstructured":"Neubauer, C., Herr\u00e9, J.: Digital watermarking and its influence on audio quality. In: 105th Convention, San Francisco, CA. Audio Engineering Society (1998)."},{"key":"26_CR5","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/S0165-1684(98)00014-0","volume":"66","author":"M. D. Swanson","year":"1998","unstructured":"Swanson, M. D., Zhu, B., Tewfik, A. H., Boney, L.: Robust audio watermarking using perceptual masking. Signal Processing 66 (1998), 337\u2013355.","journal-title":"Signal Processing"},{"key":"26_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/3-540-61996-8_48","volume-title":"Information Hiding","author":"D. Gruhl","year":"1996","unstructured":"Gruhl, D., Lu, A., Bender, W.: Echo hiding. In: Anderson, R. (ed.): Information Hiding, Cambridge, UK. Lecture Notes in Computer Science, Vol. 1174. Springer-Verlag, Berlin\/Heidelberg (1996) 295\u2013315."},{"key":"26_CR7","first-page":"273","volume-title":"Workshop on Multimedia Signal Processing","author":"B. Chen","year":"1998","unstructured":"Chen, B., Wornell, G. W.: Digital watermarking and Information embedding using dither modulation. In: Workshop on Multimedia Signal Processing, Redondo Beach, CA. IEEE (1998) 273\u2013278."},{"key":"26_CR8","unstructured":"Szepanski, W.: A signal theoretic method for creating forgery-proof documents for automatic verification. In: Carnahan Conf. on Crime Countermeasures, Lexington, KY, (1979) 101\u2013109."},{"key":"26_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/3-540-49380-8_16","volume-title":"Information Hiding","author":"F. A. P. Petitcolas","year":"1998","unstructured":"Petitcolas, F. A. P., Anderson, R. J., Kuhn, M. G.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.): Information Hiding, Portland, OR. Lecture Notes in Computer Science, Vol. 1525. Springer-Verlag, Berlin\/Heidelberg (1998) 218\u2013238."},{"key":"26_CR10","volume-title":"International Conf. on Acoustics, Speech, and Signal Processing","author":"B. W. Gillespie","year":"2001","unstructured":"Gillespie, B. W., Malvar, H. S., Florencio, D. A. F.: Speech dereverberation via maximum-kurtosis subband adaptive filtering. In: International Conf. on Acoustics, Speech, and Signal Processing, Salt Lake City, UT. IEEE (2001), to appear."},{"key":"26_CR11","volume-title":"Detection, Estimation, and Modulation Theory, Part I","author":"H. L. Trees Van","year":"1968","unstructured":"Van Trees, H. L.: Detection, Estimation, and Modulation Theory, Part I. John Wiley & Sons, New York (1968)."},{"key":"26_CR12","first-page":"1421","volume-title":"International Conf. on Acoustics, Speech, and Signal Processing","author":"H. S. Malvar","year":"1999","unstructured":"Malvar, H. S.: A modulated complex lapped transform and its application to audio processing. In: In: International Conf. on Acoustics, Speech, and Signal Processing, Phoenix, AZ. IEEE (1999) 1421\u20131424."},{"volume-title":"Applications of Digital Signal Processing to Audio and Acoustics","year":"1998","key":"26_CR13","unstructured":"Kahrs, M., Brandenburg K. (eds.): Applications of Digital Signal Processing to Audio and Acoustics. Kluwer, Boston (1998)."},{"key":"26_CR14","first-page":"5\/98","volume-title":"International Symposium on Circuits and Systems","author":"H. S. Malvar","year":"1998","unstructured":"Malvar H. S.: Enhancing the performance of subband audio coders for speech signals. In: International Symposium on Circuits and Systems, Monterey, CA. IEEE (1998) 5\/98\u20135\/101."},{"key":"26_CR15","volume-title":"Audio Anecdotes","author":"H. S. Malvar","year":"2001","unstructured":"Malvar, H. S.: Auditory masking in audio compression. In: Greennebaum, K. (ed.): Audio Anecdotes. Kluwer, New York, 2001."},{"key":"26_CR16","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/49.668971","volume":"16","author":"R.J. Anderson","year":"1998","unstructured":"Anderson, R.J., Petitcolas, F. A. P.: On the limits of steganography. IEEE J. Selected Areas in Communications 16 (1998) 474\u2013481.","journal-title":"IEEE J. Selected Areas in Communications"},{"key":"26_CR17","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1117\/12.344665","volume-title":"Security and Watermarking of Multimedia Contents","author":"F. H\u00e4rtung","year":"1999","unstructured":"H\u00e4rtung, F., Su, J. K. Girod, B., Spread spectrum watermarking: malicious attacks and counter-attacks. In: Security and Watermarking of Multimedia Contents, San Jose, CA. SPIE (1999) 147\u2013158."},{"key":"26_CR18","unstructured":"SDMI Call for Proposals, Phase I. In: \n                  http:\/\/www.sdmi.org\n                  \n                 (1999)."}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45496-9_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T09:28:02Z","timestamp":1550309282000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45496-9_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540427339","9783540454960"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-45496-9_26","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}