{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:00:14Z","timestamp":1740099614328,"version":"3.37.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030369378"},{"type":"electronic","value":"9783030369385"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-36938-5_18","type":"book-chapter","created":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T19:04:11Z","timestamp":1575918251000},"page":"305-319","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Pre-adjustment Based Anti-collusion Mechanism for Audio Signals"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0518-625X","authenticated-orcid":false,"given":"Juan","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9925-2261","authenticated-orcid":false,"given":"Tianrui","family":"Zong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3545-7863","authenticated-orcid":false,"given":"Yong","family":"Xiang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3026-7537","authenticated-orcid":false,"given":"Longxiang","family":"Gao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9841-5292","authenticated-orcid":false,"given":"Gleb","family":"Beliakov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,10]]},"reference":[{"issue":"4","key":"18_CR1","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1109\/TIFS.2007.908233","volume":"2","author":"X Wang","year":"2007","unstructured":"Wang, X., Wu, J., Niu, P.: A new digital image watermarking algorithm resilient to desynchronization attacks. IEEE Trans. Inf. Forensics Secur. 2(4), 655\u2013663 (2007)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"18_CR2","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TIFS.2011.2163627","volume":"6","author":"E Nezhadarya","year":"2011","unstructured":"Nezhadarya, E., Wang, Z.-J., Ward, R.-K.: Robust image watermarking based on multiscale gradient direction quantization. IEEE Trans. Inf. Forensics Secur. 6(4), 1200\u20131213 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"18_CR3","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1109\/TIFS.2018.2878541","volume":"14","author":"H Fang","year":"2018","unstructured":"Fang, H., Zhang, W., Zhou, H., Cui, H., Yu, N.: Screen-shooting resilient watermarking. IEEE Trans. Inf. Forensics Secur. 14(6), 1403\u20131418 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"18_CR4","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/TIFS.2011.2173678","volume":"7","author":"Y Xiang","year":"2011","unstructured":"Xiang, Y., Natgunanathan, I., Peng, D., Zhou, W., Yu, S.: A dual-channel time-spread echo method for audio watermarking. IEEE Trans. Inf. Forensics Secur. 7(2), 383\u2013392 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"18_CR5","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1109\/TASLP.2014.2328175","volume":"22","author":"Y Xiang","year":"2014","unstructured":"Xiang, Y., Natgunanathan, I., Guo, S., Zhou, W., Nahavandi, S.: Patchwork-based audio watermarking method robust to de-synchronization attacks. IEEE\/ACM Trans. Audio Speech Lang. Process. 22(9), 1413\u20131423 (2014)","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"issue":"10","key":"18_CR6","doi-asserted-by":"publisher","first-page":"2631","DOI":"10.1109\/TMM.2018.2812599","volume":"20","author":"Z Su","year":"2018","unstructured":"Su, Z., Zhang, G., Yue, F., Chang, L., Jiang, J., Yao, X.: SNR-constrained heuristics for optimizing the scaling parameter of robust audio watermarking. IEEE Trans. Multimed. 20(10), 2631\u20132644 (2018)","journal-title":"IEEE Trans. Multimed."},{"issue":"9","key":"18_CR7","doi-asserted-by":"publisher","first-page":"1733","DOI":"10.1109\/TMM.2016.2589208","volume":"18","author":"M Asikuzzaman","year":"2016","unstructured":"Asikuzzaman, M., Alam, M.-J., Lambert, A.-J., Pickering, M.-R.: Robust DT CWT-based DIBR 3D video watermarking using chrominance embedding. IEEE Trans. Multimed. 18(9), 1733\u20131748 (2016)","journal-title":"IEEE Trans. Multimed."},{"key":"18_CR8","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-981-10-1675-2_45","volume-title":"Proceedings of the International Conference on Data Engineering and Communication Technology","author":"AM Joshi","year":"2017","unstructured":"Joshi, A.M., Gupta, S., Girdhar, M., Agarwal, P., Sarker, R.: Combined DWT\u2013DCT-based video watermarking algorithm using arnold transform technique. In: Satapathy, S.C., Bhateja, V., Joshi, A. (eds.) Proceedings of the International Conference on Data Engineering and Communication Technology. AISC, vol. 468, pp. 455\u2013463. Springer, Singapore (2017). \nhttps:\/\/doi.org\/10.1007\/978-981-10-1675-2_45"},{"issue":"3","key":"18_CR9","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1109\/TCE.2018.2852258","volume":"64","author":"H Mareen","year":"2018","unstructured":"Mareen, H., Praeter, J.-D., Wallendael, G.-V., Lambert, P.: A novel video watermarking approach based on implicit distortions. IEEE Trans. Consum. Electron. 64(3), 250\u2013258 (2018)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"2","key":"18_CR10","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/MSP.2004.1276103","volume":"21","author":"M Wu","year":"2004","unstructured":"Wu, M., Trappe, W., Wang, Z.-J., Liu, K.-R.: Collusion-resistant fingerprinting for multimedia. IEEE Signal Process. Mag. 21(2), 15\u201327 (2004)","journal-title":"IEEE Signal Process. Mag."},{"issue":"12","key":"18_CR11","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I-J Cox","year":"1997","unstructured":"Cox, I.-J., Kilian, J., Leighton, F.-T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. Image Process."},{"issue":"6","key":"18_CR12","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/TIP.2005.847284","volume":"14","author":"Z-J Wang","year":"2005","unstructured":"Wang, Z.-J., Wu, M., Zhao, H.-V., Trappe, W., Liu, K.-R.: Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Trans. Image Process. 14(6), 804\u2013821 (2005)","journal-title":"IEEE Trans. Image Process."},{"issue":"4","key":"18_CR13","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1109\/LSP.2013.2247039","volume":"20","author":"A Dessein","year":"2013","unstructured":"Dessein, A., Cont, A.: An information-geometric approach to real-time audio segmentation. IEEE Signal Process. Lett. 20(4), 331\u2013334 (2013)","journal-title":"IEEE Signal Process. Lett."},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.sigpro.2019.04.017","volume":"162","author":"W Jiang","year":"2019","unstructured":"Jiang, W., Huang, X., Quan, Y.: Audio watermarking algorithm against synchronization attacks using global characteristics and adaptive frame division. Signal Process. 162, 153\u2013160 (2019)","journal-title":"Signal Process."},{"issue":"5","key":"18_CR15","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1109\/TIFS.2018.2871748","volume":"14","author":"Z Liu","year":"2019","unstructured":"Liu, Z., Huang, Y., Huang, J.: Patchwork-based audio watermarking robust against de-synchronization and recapturing attacks. IEEE Trans. Inf. Forensics Secur. 14(5), 1171\u20131180 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"18_CR16","doi-asserted-by":"publisher","first-page":"1857","DOI":"10.1109\/26.387423","volume":"43","author":"J-L Wu","year":"1995","unstructured":"Wu, J.-L., Shin, J.: Discrete cosine transform in error control coding. IEEE Trans. Commun. 43(5), 1857\u20131861 (1995)","journal-title":"IEEE Trans. Commun."},{"issue":"2","key":"18_CR17","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/s00530-013-0325-1","volume":"20","author":"M Fallahpour","year":"2014","unstructured":"Fallahpour, M., Meg\u00edas, D.: Secure logarithmic audio watermarking scheme based on the human auditory system. Multimed. Syst. 20(2), 155\u2013164 (2014)","journal-title":"Multimed. Syst."},{"issue":"7","key":"18_CR18","doi-asserted-by":"publisher","first-page":"4843","DOI":"10.1109\/TIT.2011.2146130","volume":"57","author":"M Cheng","year":"2011","unstructured":"Cheng, M., Miao, Y.: On anti-collusion codes and detection algorithms for multimedia fingerprinting. IEEE Trans. Inf. Theory 57(7), 4843\u20134851 (2011)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1\/2","key":"18_CR19","first-page":"3","volume":"48","author":"T Thiede","year":"2000","unstructured":"Thiede, T., et al.: PEAQ-the ITU standard for objective measurement of perceived audio quality. IEEE Trans. Inf. Theory 48(1\/2), 3\u201329 (2000)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2\u20133","key":"18_CR20","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s11042-010-0515-1","volume":"52","author":"V Bhat","year":"2011","unstructured":"Bhat, V., Sengupta, I., Das, A.: An audio watermarking scheme using singular value decomposition and dither-modulation quantization. Multimed. Tools Appl. 52(2\u20133), 369\u2013383 (2011)","journal-title":"Multimed. Tools Appl."}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-36938-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T19:06:32Z","timestamp":1575918392000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-36938-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030369378","9783030369385"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-36938-5_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"10 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sapporo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"89","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.8","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}