{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:20:22Z","timestamp":1761582022756,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030620073"},{"type":"electronic","value":"9783030620080"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62008-0_14","type":"book-chapter","created":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T05:03:03Z","timestamp":1603170183000},"page":"201-212","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Robust Blockchain-Based Cross-Platform Audio Copyright Protection System Using Content-Based Fingerprint"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0518-625X","authenticated-orcid":false,"given":"Juan","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9925-2261","authenticated-orcid":false,"given":"Tianrui","family":"Zong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3545-7863","authenticated-orcid":false,"given":"Yong","family":"Xiang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3026-7537","authenticated-orcid":false,"given":"Longxiang","family":"Gao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9841-5292","authenticated-orcid":false,"given":"Gleb","family":"Beliakov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,21]]},"reference":[{"key":"14_CR1","unstructured":"IFPI Digital music report (2015). https:\/\/www.riaa.com\/wp-content\/uploads\/2015\/09\/Digital-Music-Report-2015.pdf. Accessed 11 May 2020"},{"key":"14_CR2","unstructured":"\u2018Game of Thrones\u2019 season 7 was pirated more than 1 billion times. https:\/\/www.businessinsider.com.au\/game-of-thrones-season-7-pirated-1-billion-times-torrents-streaming-muso-2017-9. Accessed 11 May 2020"},{"issue":"2","key":"14_CR3","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1109\/TCC.2015.2469649","volume":"8","author":"E Kabir","year":"2015","unstructured":"Kabir, E., Mahmood, A., Wang, H., Mustafa, A.: Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing. IEEE Trans. Cloud Comput. 8(2), 408\u2013417 (2015)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"14_CR4","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1109\/ACCESS.2016.2556723","volume":"4","author":"T Zong","year":"2016","unstructured":"Zong, T., Xiang, Y., Guo, S., Rong, Y.: Rank-based image watermarking method with high embedding capacity and robustness. IEEE Access 4, 1689\u20131699 (2016)","journal-title":"IEEE Access"},{"issue":"3","key":"14_CR5","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s11633-015-0926-6","volume":"13","author":"T Zong","year":"2016","unstructured":"Zong, T., Xiang, Y., Elbadry, S., Nahavandi, S.: Modified moment-based image watermarking method robust to cropping attack. Int. J. Autom. Comput. 13(3), 259\u2013267 (2016). https:\/\/doi.org\/10.1007\/s11633-015-0926-6","journal-title":"Int. J. Autom. Comput."},{"issue":"5","key":"14_CR6","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/TCSVT.2014.2363743","volume":"25","author":"T Zong","year":"2014","unstructured":"Zong, T., Xiang, Y., Natgunanathan, I., Guo, S., Zhou, W., Beliakov, G.: Robust histogram shape-based method for image watermarking. IEEE Trans. Circuits Syst. Video Technol. 25(5), 717\u2013729 (2014)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"9","key":"14_CR7","doi-asserted-by":"publisher","first-page":"1733","DOI":"10.1109\/TMM.2016.2589208","volume":"18","author":"M Asikuzzaman","year":"2016","unstructured":"Asikuzzaman, M., Alam, M.-J., Lambert, A.-J., Pickering, M.-R.: Robust DT CWT-based DIBR 3D video watermarking using chrominance embedding. IEEE Trans. Multimedia 18(9), 1733\u20131748 (2016)","journal-title":"IEEE Trans. Multimedia"},{"key":"14_CR8","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-981-10-1675-2_45","volume-title":"Proceedings of the International Conference on Data Engineering and Communication Technology","author":"AM Joshi","year":"2017","unstructured":"Joshi, A.M., Gupta, S., Girdhar, M., Agarwal, P., Sarker, R.: Combined DWT\u2013DCT-based video watermarking algorithm using arnold transform technique. In: Satapathy, S.C., Bhateja, V., Joshi, A. (eds.) Proceedings of the International Conference on Data Engineering and Communication Technology. AISC, vol. 468, pp. 455\u2013463. Springer, Singapore (2017). https:\/\/doi.org\/10.1007\/978-981-10-1675-2_45"},{"issue":"3","key":"14_CR9","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1109\/TCE.2018.2852258","volume":"64","author":"H Mareen","year":"2018","unstructured":"Mareen, H., Praeter, J.-D., Wallendael, G.-V., Lambert, P.: A novel video watermarking approach based on implicit distortions. IEEE Trans. Consum. Electron. 64(3), 250\u2013258 (2018)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"1","key":"14_CR10","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TMM.2010.2080668","volume":"13","author":"Y Xiang","year":"2010","unstructured":"Xiang, Y., Peng, D., Natgunanathan, I., Zhou, W.: Effective pseudonoise sequence and decoding function for imperceptibility and robustness enhancement in time-spread echo-based audio watermarking. IEEE Trans. Multimedia 13(1), 2\u201313 (2010)","journal-title":"IEEE Trans. Multimedia"},{"issue":"2","key":"14_CR11","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/TIFS.2011.2173678","volume":"7","author":"Y Xiang","year":"2011","unstructured":"Xiang, Y., Natgunanathan, I., Peng, D., Zhou, W., Yu, S.: A dual-channel time-spread echo method for audio watermarking. IEEE Trans. Inf. Forensics Secur. 7(2), 383\u2013392 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"11","key":"14_CR12","doi-asserted-by":"publisher","first-page":"2176","DOI":"10.1109\/TASLP.2017.2749001","volume":"25","author":"I Natgunanathan","year":"2017","unstructured":"Natgunanathan, I., Xiang, Y., Hua, G., Beliakov, G., Yearwood, J.: Patchwork-based multilayer audio watermarking. IEEE\/ACM Trans. Audio Speech Lang. Process. 25(11), 2176\u20132187 (2017)","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"issue":"12","key":"14_CR13","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. Image Process."},{"issue":"4","key":"14_CR14","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1109\/TSP.2003.809385","volume":"51","author":"HS Malvar","year":"2003","unstructured":"Malvar, H.S., Flor\u00eancio, D.A.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans. Signal Process. 51(4), 898\u2013905 (2003)","journal-title":"IEEE Trans. Signal Process."},{"issue":"12","key":"14_CR15","doi-asserted-by":"publisher","first-page":"2228","DOI":"10.1109\/TASLP.2015.2476755","volume":"23","author":"Y Xiang","year":"2015","unstructured":"Xiang, Y., Natgunanathan, I., Rong, Y., Guo, S.: Spread spectrum-based high embedding capacity watermarking method for audio signals. IEEE\/ACM Trans. Audio Speech Lang. Process. 23(12), 2228\u20132237 (2015)","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"issue":"3","key":"14_CR16","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1109\/TASLP.2017.2782487","volume":"26","author":"Y Xiang","year":"2017","unstructured":"Xiang, Y., Natgunanathan, I., Peng, D., Hua, G., Liu, B.: Spread spectrum audio watermarking using multiple orthogonal PN sequences and variable embedding strengths and polarities. IEEE\/ACM Trans. Audio Speech Lang. Process. 26(3), 529\u2013539 (2017)","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"issue":"8","key":"14_CR17","doi-asserted-by":"publisher","first-page":"2270","DOI":"10.1109\/TASL.2007.906192","volume":"15","author":"X Wang","year":"2007","unstructured":"Wang, X., Qi, W., Niu, P.: A new adaptive digital audio watermarking based on support vector regression. IEEE Trans. Audio Speech Lang. Process. 15(8), 2270\u20132277 (2007)","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"issue":"9","key":"14_CR18","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1109\/TASLP.2014.2328175","volume":"22","author":"Y Xiang","year":"2014","unstructured":"Xiang, Y., Natgunanathan, I., Guo, S., Zhou, W., Nahavandi, S.: Patchwork-based audio watermarking method robust to de-synchronization attacks. IEEE\/ACM Trans. Audio Speech Lang. Process. 22(9), 1413\u20131423 (2014)","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"issue":"5","key":"14_CR19","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1109\/TIFS.2018.2871748","volume":"14","author":"Z Liu","year":"2018","unstructured":"Liu, Z., Huang, Y., Huang, J.: Patchwork-based audio watermarking robust against de-synchronization and recapturing attacks. IEEE Trans. Inf. Forensics Secur. 14(5), 1171\u20131180 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR20","doi-asserted-by":"publisher","unstructured":"Ambili, K.N., Sindhu, M., Sethumadhavan, M.: On federated and proof of validation based consensus algorithms in blockchain. In: IOP Conference Series: Materials Science and Engineering, vol. 225, p. 012198. IOP Publishing, India (2017). https:\/\/doi.org\/10.1088\/1757-899x\/225\/1\/012198","DOI":"10.1088\/1757-899x\/225\/1\/012198"},{"key":"14_CR21","unstructured":"The blockchain phenomenon-the disruptive potential of distributed consensus architectures. https:\/\/www.etla.fi\/wp-content\/uploads\/ETLA-Working-Papers-38.pdf. Accessed 11 May 2020"},{"key":"14_CR22","unstructured":"Bittunes homepage. http:\/\/bittunes.co.uk\/. Accessed 11 May 2020"},{"key":"14_CR23","unstructured":"Mycelia for music. http:\/\/myceliaformusic.org\/. Accessed 11 May 2020"},{"issue":"5","key":"14_CR24","doi-asserted-by":"publisher","first-page":"1857","DOI":"10.1109\/26.387423","volume":"43","author":"JL Wu","year":"1995","unstructured":"Wu, J.L., Shin, J.: Discrete cosine transform in error control coding. IEEE Trans. Commun. 43(5), 1857\u20131861 (1995)","journal-title":"IEEE Trans. Commun."},{"issue":"1","key":"14_CR25","first-page":"3","volume":"48","author":"T Thiede","year":"2000","unstructured":"Thiede, T., et al.: PEAQ-the ITU standard for objective measurement of perceived audio quality. J. Audio Eng. Soc. 48(1), 3\u201329 (2000)","journal-title":"J. Audio Eng. Soc."}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2020"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62008-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,15]],"date-time":"2020-12-15T11:29:44Z","timestamp":1608031784000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62008-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030620073","9783030620080"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62008-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"21 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasp.cs.vu.nl\/WISE2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}