{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:35:46Z","timestamp":1743035746087,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031299551"},{"type":"electronic","value":"9783031299568"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-29956-8_18","type":"book-chapter","created":{"date-parts":[[2023,4,4]],"date-time":"2023-04-04T23:03:58Z","timestamp":1680649438000},"page":"276-291","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Artistic Curve Steganography Carried by\u00a0Musical Audio"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4206-1963","authenticated-orcid":false,"given":"Christopher J.","family":"Tralie","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,1]]},"reference":[{"key":"18_CR1","unstructured":"Applegate, D.: Concorde tsp solver (2001). https:\/\/www.math.uwaterloo.ca\/tsp\/concorde.html. Accessed 12 Feb 2023"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Atoum, M.S., Ibrahimn, S., Sulong, G., Zeki, A., Abubakar, A.: Exploring the challenges of mp3 audio steganography. In: 2013 International Conference on Advanced Computer Science Applications and Technologies, pp. 156\u2013161. IEEE (2013)","DOI":"10.1109\/ACSAT.2013.38"},{"issue":"2","key":"18_CR3","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/6046.923822","volume":"3","author":"P Bassia","year":"2001","unstructured":"Bassia, P., Pitas, I., Nikolaidis, N.: Robust audio watermarking in the time domain. IEEE Trans. Multimedia 3(2), 232\u2013241 (2001)","journal-title":"IEEE Trans. Multimedia"},{"key":"18_CR4","unstructured":"Bosch, R.: Connecting the dots: the ins and outs of tsp art. In: Bridges Leeuwarden: Mathematics, Music, Art, Architecture, Culture, pp. 235\u2013242 (2008)"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Bosch, R.: Jordan as a jordan curve. Mathematical Wizardry for a Gardner, p. 175 (2009)","DOI":"10.1201\/b10670-23"},{"issue":"4","key":"18_CR6","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/j.orl.2003.10.001","volume":"32","author":"R Bosch","year":"2004","unstructured":"Bosch, R., Herman, A.: Continuous line drawings via the traveling salesman problem. Oper. Res. Lett. 32(4), 302\u2013303 (2004)","journal-title":"Oper. Res. Lett."},{"issue":"1","key":"18_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1137\/S1064827595289108","volume":"21","author":"MA Branch","year":"1999","unstructured":"Branch, M.A., Coleman, T.F., Li, Y.: A subspace, interior, and conjugate gradient method for large-scale bound-constrained minimization problems. SIAM J. Sci. Comput. 21(1), 1\u201323 (1999)","journal-title":"SIAM J. Sci. Comput."},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Canny, J.: A computational approach to edge detection. IEEE Trans. Pattern Anal. Mach. Intell., 679\u2013698 (1986)","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Chen, X., Golovinskiy, A., Funkhouser, T.: A benchmark for 3D mesh segmentation. ACM Trans. Graph. (Proc. SIGGRAPH) 28(3) (Aug 2009)","DOI":"10.1145\/1531326.1531379"},{"key":"18_CR10","unstructured":"Cui, W., Liu, S., Jiang, F., Liu, Y., Zhao, D.: Multi-stage residual hiding for image-into-audio steganography"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Cvejic, N., Seppanen, T.: A wavelet domain LSB insertion algorithm for high capacity audio steganography. In: Proceedings of 2002 IEEE 10th Digital Signal Processing Workshop, 2002 and the 2nd Signal Processing Education Workshop, pp. 53\u201355. IEEE (2002)","DOI":"10.1109\/DSPWS.2002.1231075"},{"issue":"1","key":"18_CR12","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1186\/1687-4722-2012-25","volume":"2012","author":"F Djebbar","year":"2012","unstructured":"Djebbar, F., Ayad, B., Meraim, K.A., Hamam, H.: Comparative study of digital audio steganography techniques. EURASIP J. Audio Speech Music Process. 2012(1), 25 (2012)","journal-title":"EURASIP J. Audio Speech Music Process."},{"key":"18_CR13","unstructured":"Dom\u00e8nech Abell\u00f3, T.: Hiding images in their spoken narratives. Master\u2019s thesis, Universitat Polit\u00e8cnica de Catalunya (2022)"},{"issue":"6","key":"18_CR14","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1080\/02564602.2019.1699454","volume":"37","author":"H Dutta","year":"2020","unstructured":"Dutta, H., Das, R.K., Nandi, S., Prasanna, S.R.M.: An overview of digital audio steganography. IETE Tech. Rev. 37(6), 632\u2013650 (2020)","journal-title":"IETE Tech. Rev."},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Eichelberger, M., Tanner, S., Voirol, G., Wattenhofer, R.: Receiving data hidden in music. In: Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, pp. 33\u201338. ACM (2019)","DOI":"10.1145\/3301293.3302360"},{"key":"18_CR16","unstructured":"Geleta, M., Punti, C., McGuinness, K., Pons, J., Canton, C., Giro-i Nieto, X.: PixInWav: Residual steganography for hiding pixels in audio"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Gopalan, K.: A unified audio and image steganography by spectrum modification. In: 2009 IEEE International Conference on Industrial Technology, pp. 1\u20135 (2009)","DOI":"10.1109\/ICIT.2009.4939516"},{"key":"18_CR18","unstructured":"Gopalan, K., Wenndt, S.: Audio steganography for covert data transmission by imperceptible tone insertion. In: Proceedings the IASTED International Conference on Communication Systems and Applications (CSA 2004), Banff, Canada (2004)"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Gopi, M., Eppstien, D.: Single-strip triangulation of manifolds with arbitrary topology. In: Computer Graphics Forum, vol. 23, pp. 371\u2013379. Wiley Online Library (2004)","DOI":"10.1111\/j.1467-8659.2004.00768.x"},{"issue":"2","key":"18_CR20","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1109\/TASSP.1984.1164317","volume":"32","author":"D Griffin","year":"1984","unstructured":"Griffin, D., Lim, J.: Signal estimation from modified short-time fourier transform. IEEE Trans. Acoust. Speech Signal Process. 32(2), 236\u2013243 (1984)","journal-title":"IEEE Trans. Acoust. Speech Signal Process."},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Gruhl, D., Lu, A., Bender, W.: Echo hiding. In: International Workshop on Information Hiding. pp. 295\u2013315. Springer (1996)","DOI":"10.1007\/3-540-61996-8_48"},{"issue":"1","key":"18_CR22","first-page":"215","volume":"1","author":"DS Johnson","year":"1997","unstructured":"Johnson, D.S., McGeoch, L.A.: The traveling salesman problem: a case study in local optimization. Local Search Comb. Optim. 1(1), 215\u2013310 (1997)","journal-title":"Local Search Comb. Optim."},{"key":"18_CR23","unstructured":"Kaplan, C.S., Bosch, R.: Tsp art. In: Renaissance Banff: Mathematics, music, art, culture, pp. 301\u2013308 (2005)"},{"issue":"1","key":"18_CR24","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s12532-009-0002-8","volume":"1","author":"V Kolmogorov","year":"2009","unstructured":"Kolmogorov, V.: Blossom v: a new implementation of a minimum cost perfect matching algorithm. Math. Program. Comput. 1(1), 43\u201367 (2009)","journal-title":"Math. Program. Comput."},{"key":"18_CR25","unstructured":"Lewis, J.: Fast template matching, vision interface 95. Canadian Image Processing and Pattern Recognition Society, pp. 15\u201319 (1995)"},{"key":"18_CR26","doi-asserted-by":"publisher","unstructured":"Li, A., Ranzato, P.: Caltech 101. Accessed 12 Feb 2023. https:\/\/doi.org\/10.22002\/D1.20086","DOI":"10.22002\/D1.20086"},{"key":"18_CR27","unstructured":"Li, H., Mould, D.: Structure-preserving stippling by priority-based error diffusion. In: Proceedings of Graphics Interface 2011, pp. 127\u2013134 (2011)"},{"issue":"3","key":"18_CR28","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/MPRV.2005.50","volume":"4","author":"A Madhavapeddy","year":"2005","unstructured":"Madhavapeddy, A., Scott, D., Tse, A., Sharp, R.: Audio networking: the forgotten wireless technology. IEEE Pervasive Comput. 4(3), 55\u201360 (2005)","journal-title":"IEEE Pervasive Comput."},{"issue":"4","key":"18_CR29","doi-asserted-by":"publisher","first-page":"1296","DOI":"10.1109\/TASL.2007.894509","volume":"15","author":"HMA Malik","year":"2007","unstructured":"Malik, H.M.A., Ansari, R., Khokhar, A.A.: Robust data hiding in audio using allpass filters. IEEE Trans. Audio Speech Lang. Process. 15(4), 1296\u20131304 (2007)","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"issue":"1","key":"18_CR30","first-page":"65","volume":"1","author":"PD Mathews","year":"2004","unstructured":"Mathews, P.D.: Music in his own image: The aphex twin face. Nebula 1(1), 65\u201373 (2004)","journal-title":"Nebula"},{"issue":"8","key":"18_CR31","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1109\/34.149591","volume":"14","author":"F Mokhtarian","year":"1992","unstructured":"Mokhtarian, F., Mackworth, A.K.: A theory of multiscale, curvature-based shape representation for planar curves. IEEE Trans. Pattern Anal. Mach. Intell. 14(8), 789\u2013805 (1992)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"18_CR32","doi-asserted-by":"crossref","unstructured":"Qiao, M., Sung, A.H., Liu, Q.: Steganalysis of MP3stego. In: 2009 International Joint Conference on Neural Networks, pp. 2566\u20132571. IEEE (2009)","DOI":"10.1109\/IJCNN.2009.5178971"},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"Secord, A.: Weighted voronoi stippling. In: Proceedings of the 2nd International Symposium on Non-Photorealistic Animation and Rendering, pp. 37\u201343 (2002)","DOI":"10.1145\/508530.508537"},{"key":"18_CR34","unstructured":"Takahashi, N., Singh, M.K., Mitsufuji, Y.: Source mixing and separation robust audio steganography"},{"issue":"5","key":"18_CR35","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1109\/TSA.2002.800560","volume":"10","author":"G Tzanetakis","year":"2002","unstructured":"Tzanetakis, G., Cook, P.: Musical genre classification of audio signals. IEEE Trans. Speech Audio Process. 10(5), 293\u2013302 (2002)","journal-title":"IEEE Trans. Speech Audio Process."},{"key":"18_CR36","doi-asserted-by":"crossref","unstructured":"Xiaoxiao Dong, Bocko, M., Ignjatovic, Z.: Data hiding via phase manipulation of audio signals. In: 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 5, pp. V-377-80. IEEE (2004)","DOI":"10.1109\/ICASSP.2004.1327126"},{"issue":"1","key":"18_CR37","first-page":"67","volume":"17","author":"HS Yun","year":"2009","unstructured":"Yun, H.S., Cho, K., Kim, N.S.: Acoustic data transmission based on modulated complex lapped transform. IEEE Signal Process. Lett. 17(1), 67\u201370 (2009)","journal-title":"IEEE Signal Process. Lett."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence in Music, Sound, Art and Design"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-29956-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T18:34:22Z","timestamp":1729190062000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-29956-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031299551","9783031299568"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-29956-8_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"1 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EvoMUSART","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Intelligence in Music, Sound, Art and Design (Part of EvoStar)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brno","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"evomusart2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.evostar.org\/2023\/evomusart\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}