{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T03:10:06Z","timestamp":1745550606068,"version":"3.40.4"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031884825","type":"print"},{"value":"9783031884832","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-88483-2_8","type":"book-chapter","created":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T02:37:14Z","timestamp":1745548634000},"page":"159-176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Audio Deep Watermarking and\u00a0Algebraic Transform"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9414-2477","authenticated-orcid":false,"given":"Olena","family":"Vynokurova","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4881-6933","authenticated-orcid":false,"given":"Dmytro","family":"Peleshko","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9315-1590","authenticated-orcid":false,"given":"Marta","family":"Peleshko","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7186-781X","authenticated-orcid":false,"given":"Maksym","family":"Kapys","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3344-8562","authenticated-orcid":false,"given":"Serhii","family":"Shatilo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,26]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113157","volume":"146","author":"M Ahmadi","year":"2020","unstructured":"Ahmadi, M., Norouzi, A., Karimi, N., Samavi, S., Emami, A.: ReDMark: framework for residual diffusion watermarking based on deep networks. Expert Syst. Appl. 146, 113157 (2020). https:\/\/doi.org\/10.1016\/j.eswa.2019.113157","journal-title":"Expert Syst. Appl."},{"key":"8_CR2","doi-asserted-by":"publisher","unstructured":"Amrit, P., Singh, A.K.: Survey on watermarking methods in the artificial intelligence domain and beyond. Comput. Commun. 188, 52\u201365 (2022). https:\/\/doi.org\/10.1016\/j.comcom.2022.02.023","DOI":"10.1016\/j.comcom.2022.02.023"},{"issue":"3","key":"8_CR3","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1109\/TIFS.2013.2293952","volume":"9","author":"M Arnold","year":"2013","unstructured":"Arnold, M., Chen, X., Baum, P., Gries, U., Doerr, G.: A phase-based audio watermarking system robust to acoustic path propagation. IEEE Trans. Inf. Forensics Secur. 9(3), 411\u2013425 (2013). https:\/\/doi.org\/10.1109\/TIFS.2013.2293952","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR4","unstructured":"Arnold, M., Schmucker, M., Wolthusen, S.: Techniques and applications of digital watermarking and content protection, p.\u00a0290. Artech House (2003)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Barni, M., Bartolini, F.: Watermarking systems engineering: enabling digital assets, p.\u00a0488. CRC Press (2004)","DOI":"10.1201\/9780203913512"},{"issue":"5","key":"8_CR6","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1109\/83.918570","volume":"10","author":"M Barni","year":"2001","unstructured":"Barni, M., Bartolini, F., Piva, A.: Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans. Image Process. 10(5), 783\u2013791 (2001). https:\/\/doi.org\/10.1109\/83.918570","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"8_CR7","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/S0165-1684(98)00015-2","volume":"66","author":"M Barni","year":"1998","unstructured":"Barni, M., Bartolini, F., Cappellini, V., Piva, A.: A DCT-domain system for robust image watermarking. Signal Process. 66(3), 357\u2013372 (1998). https:\/\/doi.org\/10.1016\/S0165-1684(98)00015-2","journal-title":"Signal Process."},{"issue":"2","key":"8_CR8","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/6046.923822","volume":"3","author":"P Bassia","year":"2001","unstructured":"Bassia, P., Pitas, I., Nikolaidis, N.: Robust audio watermarking in the time domain. IEEE Trans. Multimedia 3(2), 232\u2013241 (2001). https:\/\/doi.org\/10.1109\/6046.923822","journal-title":"IEEE Trans. Multimedia"},{"key":"8_CR9","doi-asserted-by":"publisher","unstructured":"Chen, H., Rouhani, B., Fu, C., Zhao, J., Koushanfar, F.: DeepMarks: a secure fingerprinting framework for digital rights management of deep learning models. In: International Conference on Multimedia Retrieval, pp. 105\u2013113 (2019). https:\/\/doi.org\/10.1145\/3323873.3325042","DOI":"10.1145\/3323873.3325042"},{"key":"8_CR10","first-page":"488","volume-title":"Digital Watermarking","author":"I Cox","year":"2002","unstructured":"Cox, I., Miller, M., Bloom, J.: Digital Watermarking, p. 488. Morgan Kaufmann Publishers, San Francisco (2002)"},{"key":"8_CR11","first-page":"587","volume-title":"Digital watermarking and steganography","author":"I Cox","year":"2008","unstructured":"Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital watermarking and steganography, p. 587. Elsevier, Morgan Kaufmann Publishers (2008)"},{"issue":"12","key":"8_CR12","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I Cox","year":"1997","unstructured":"Cox, I., Kilian, J., Leighton, F., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673\u20131687 (1997). https:\/\/doi.org\/10.1109\/83.650120","journal-title":"IEEE Trans. Image Process."},{"key":"8_CR13","doi-asserted-by":"publisher","unstructured":"El\u2019arbi, M., Amar, C.B., Nicolas, H.: Video watermarking based on neural networks. In: 2006 IEEE International Conference on Multimedia and Expo, pp. 1577\u20131580 (2006). https:\/\/doi.org\/10.1109\/ICME.2006.262846","DOI":"10.1109\/ICME.2006.262846"},{"key":"8_CR14","doi-asserted-by":"publisher","unstructured":"Ganic, E., Eskicioglu, A.: Robust DWT-SVD domain image watermarking: embedding data in all frequencies. In: The 2004 Workshop on Multimedia and Security, pp. 166\u2013174 (2004). https:\/\/doi.org\/10.1145\/1022431.1022461","DOI":"10.1145\/1022431.1022461"},{"key":"8_CR15","doi-asserted-by":"publisher","unstructured":"Gao, Y., Kang, X., Chen, Y.: A robust video zero-watermarking based on deep convolutional neural network and self-organizing map in polar complex exponential transform domain. Multimed. Tools Appl. 80, 6019\u20136039 (2021). https:\/\/doi.org\/10.1007\/s11042-020-09904-4","DOI":"10.1007\/s11042-020-09904-4"},{"key":"8_CR16","doi-asserted-by":"publisher","unstructured":"Gruhl, D., Lu, A., Bender, W.: Echo hiding. In: International Workshop on Information Hiding, pp. 295\u2013315 (1996). https:\/\/doi.org\/10.1007\/3-540-61996-848","DOI":"10.1007\/3-540-61996-848"},{"key":"8_CR17","doi-asserted-by":"publisher","unstructured":"Gupta, M., Rama\u00a0Kishore, R.: A survey of watermarking technique using deep neural network architecture. In: 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), pp. 630\u2013635 (2021). https:\/\/doi.org\/10.1109\/ICCCIS51004.2021.9397226","DOI":"10.1109\/ICCCIS51004.2021.9397226"},{"key":"8_CR18","doi-asserted-by":"publisher","unstructured":"Hazim, N., Saeb, Z., Hameed, K.: Digital watermarking based on dwt (discrete wavelet transform) and DCT (discrete cosine transform). Int. J. Eng. Technol. 7(4), 4825\u20134829 (2019). https:\/\/doi.org\/10.14419\/ijet.v7i4.25085","DOI":"10.14419\/ijet.v7i4.25085"},{"issue":"3","key":"8_CR19","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1109\/TASL.2012.2227733","volume":"21","author":"K Khaldi","year":"2013","unstructured":"Khaldi, K., Boudraa, A.O.: Audio watermarking via EMD. IEEE Trans. Audio Speech Lang. Process. 21(3), 675\u2013680 (2013). https:\/\/doi.org\/10.1109\/TASL.2012.2227733","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"issue":"7","key":"8_CR20","doi-asserted-by":"publisher","first-page":"8535","DOI":"10.1007\/s11042-018-6942-0","volume":"78","author":"Y Li","year":"2018","unstructured":"Li, Y., Wang, H.-X.: Robust H.264\/AVC video watermarking without intra distortion drift. Multimedia Tools Appl. 78(7), 8535\u20138557 (2018). https:\/\/doi.org\/10.1007\/s11042-018-6942-0","journal-title":"Multimedia Tools Appl."},{"issue":"1\u20132","key":"8_CR21","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.csi.2009.06.004","volume":"32","author":"S Lin","year":"2010","unstructured":"Lin, S., Shie, S., Guo, J.: Improving the robustness of DCT-based image watermarking against jpeg compression. Comput. Stand. Interfaces 32(1\u20132), 54\u201360 (2010). https:\/\/doi.org\/10.1016\/j.csi.2009.06.004","journal-title":"Comput. Stand. Interfaces"},{"key":"8_CR22","doi-asserted-by":"publisher","unstructured":"Liu, Y., Guo, M., Zhang, J., Zhu, Y., Xie, X.: A novel two-stage separable deep learning framework for practical blind watermarking. In: The ACM International Conference on Multimedia, pp. 1509\u20131517 (2019). https:\/\/doi.org\/10.1145\/3343031.3351025","DOI":"10.1145\/3343031.3351025"},{"issue":"10","key":"8_CR23","doi-asserted-by":"publisher","first-page":"2813","DOI":"10.1109\/TIP.2011.2142004","volume":"20","author":"M Luo","year":"2011","unstructured":"Luo, M., Bors, A.: Surface-preserving robust watermarking of 3-d shapes. IEEE Trans. Image Process. 20(10), 2813\u20132826 (2011). https:\/\/doi.org\/10.1109\/TIP.2011.2142004","journal-title":"IEEE Trans. Image Process."},{"key":"8_CR24","unstructured":"Luo, X., Li, Y., Chang, H., Liu, C., Milanfar, P., Yang, F.: DVMark: A deep multiscale framework for video watermarking (2021)"},{"issue":"1","key":"8_CR25","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s13735-018-0147-1","volume":"7","author":"Y Nagai","year":"2018","unstructured":"Nagai, Y., Uchida, Y., Sakazawa, S., Satoh, S.: Digital watermarking for deep neural networks. Int. J. Multimedia Inf. Retrieval 7(1), 3\u201316 (2018). https:\/\/doi.org\/10.1007\/s13735-018-0147-1","journal-title":"Int. J. Multimedia Inf. Retrieval"},{"issue":"3","key":"8_CR26","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/S0165-1684(98)00017-6","volume":"66","author":"N Nikolaidis","year":"1998","unstructured":"Nikolaidis, N., Pitas, I.: Robust image watermarking in the spatial domain. Signal Process. 66(3), 385\u2013403 (1998). https:\/\/doi.org\/10.1016\/S0165-1684(98)00017-6","journal-title":"Signal Process."},{"key":"8_CR27","doi-asserted-by":"publisher","unstructured":"Ohbuchi, R., Ueda, H., Endoh, S.: Robust watermarking of vector digital maps. In: IEEE International Conference on Multimedia and Expo. vol.\u00a01, pp. 577\u2013580 (2002). https:\/\/doi.org\/10.1109\/ICME.2002.1035847","DOI":"10.1109\/ICME.2002.1035847"},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/79.939835","volume":"18","author":"C Podilchuk","year":"2021","unstructured":"Podilchuk, C., Delp, E.: Digital watermarking: algorithms and applications. IEEE Signal Process. Mag. 18, 33\u201346 (2021). https:\/\/doi.org\/10.1109\/79.939835","journal-title":"IEEE Signal Process. Mag."},{"key":"8_CR29","doi-asserted-by":"publisher","unstructured":"Rouhani, B., Chen, H., Koushanfar, F.: DeepSigns: an end-to-end watermarking framework for protecting the ownership of deep neural networks. In: The 24th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 485\u2013497 (2019). https:\/\/doi.org\/10.1145\/3297858.3304051","DOI":"10.1145\/3297858.3304051"},{"issue":"4","key":"8_CR30","doi-asserted-by":"publisher","first-page":"1537","DOI":"10.1109\/TSP.2006.870581","volume":"54","author":"J Seo","year":"2006","unstructured":"Seo, J., Yoo, C.: Image watermarking based on invariant regions of scale-space representation. IEEE Trans. Signal Process. 54(4), 1537\u20131549 (2006). https:\/\/doi.org\/10.1109\/TSP.2006.870581","journal-title":"IEEE Trans. Signal Process."},{"issue":"1","key":"8_CR31","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/TKDE.2007.190668","volume":"20","author":"M Shehab","year":"2007","unstructured":"Shehab, M., Bertino, E., Ghafoor, A.: Watermarking relational databases using optimization-based techniques. IEEE Trans. Knowl. Data Eng. 20(1), 116\u2013129 (2007). https:\/\/doi.org\/10.1109\/TKDE.2007.190668","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"8_CR32","doi-asserted-by":"publisher","unstructured":"Singh, A., Sharma, N., Dave, M., Mohan, A.: A novel technique for digital image watermarking in spatial domain. In: 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, pp. 497\u2013501 (2012). https:\/\/doi.org\/10.1109\/PDGC.2012.6449871","DOI":"10.1109\/PDGC.2012.6449871"},{"issue":"3","key":"8_CR33","doi-asserted-by":"publisher","first-page":"031804","DOI":"10.1117\/1.JEI.32.3.031804","volume":"32","author":"HK Singh","year":"2023","unstructured":"Singh, H.K., Singh, A.K.: Comprehensive review of watermarking techniques in deeplearning environments. J. Electron. Imaging 32(3), 031804\u2013031804 (2023). https:\/\/doi.org\/10.1117\/1.JEI.32.3.031804","journal-title":"J. Electron. Imaging"},{"issue":"6","key":"8_CR34","first-page":"6","volume":"1","author":"N Singh","year":"2013","unstructured":"Singh, N., Jain, M., Sharma, S.: A survey of digital watermarking techniques. Int. J. Mod. Commun. Technol. Res. 1(6), 6\u201311 (2013)","journal-title":"Int. J. Mod. Commun. Technol. Res."},{"key":"8_CR35","doi-asserted-by":"publisher","unstructured":"Sturm, B.L.: The state of the art ten years after a state of the art: future research in music information retrieval. J. New Music Res. 43(2), 147\u2013172 (2014). https:\/\/doi.org\/10.1080\/09298215.2014.894533","DOI":"10.1080\/09298215.2014.894533"},{"key":"8_CR36","doi-asserted-by":"publisher","unstructured":"Tew, Y., Wong, K.: Information hiding in HEVC standard using adaptive coding block size decision. In: 2014 IEEE International Conference on Image Processing (ICIP), pp. 5502\u20135506 (2014). https:\/\/doi.org\/10.1109\/ICIP.2014.7026113","DOI":"10.1109\/ICIP.2014.7026113"},{"issue":"1","key":"8_CR37","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TIFS.2007.916275","volume":"3","author":"TK Tsui","year":"2008","unstructured":"Tsui, T.K., Zhang, X.P., Androutsos, D.: Color image watermarking using multidimensional fourier transforms. IEEE Trans. Inf. Forensics Secur. 3(1), 16\u201328 (2008). https:\/\/doi.org\/10.1109\/TIFS.2007.916275","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR38","unstructured":"Tzanetakis, G., Essl, G., Cook, P.: Automatic musical genre classification of audio signals (2001). http:\/\/ismir2001.ismir.net\/pdf\/tzanetakis.pdf"},{"key":"8_CR39","doi-asserted-by":"publisher","unstructured":"Uchida, Y., Nagai, Y., Sakazawa, S., Satoh, S.: Embedding watermarks into deep neural networks. In: The 2017 ACM on International Conference on Multimedia Retrieval, pp. 269\u2013277 (2017). https:\/\/doi.org\/10.1145\/3078971.3078974","DOI":"10.1145\/3078971.3078974"},{"key":"8_CR40","doi-asserted-by":"crossref","unstructured":"Wang, Z., et al.: Data hiding with deep learning: A survey unifying digital watermarking and steganography (2023)","DOI":"10.1109\/TCSS.2023.3268950"},{"key":"8_CR41","doi-asserted-by":"publisher","unstructured":"Weng, X., Li, Y., Chi, L., Mu., Y.: High-Capacity convolutional video steganography with temporal residual modeling. In: The 2019 on International Conference on Multimedia Retrieval, pp. 87\u201395 (2019). https:\/\/doi.org\/10.1145\/3323873.3325011","DOI":"10.1145\/3323873.3325011"},{"key":"8_CR42","doi-asserted-by":"publisher","unstructured":"Zagoruyko, S., Komodakis, N.: Wide residual networks. In: Proceedings of the British Machine Vision Conference, pp. 87.1\u201387.12 (2016). https:\/\/doi.org\/10.5244\/C.30.87","DOI":"10.5244\/C.30.87"},{"key":"8_CR43","unstructured":"Zhang, C., Lin, C., Benz, P., Chen, K., Zhang, W., Kweon, I.S.: A brief survey on deep learning based data hiding (2022)"},{"key":"8_CR44","doi-asserted-by":"publisher","unstructured":"Zhang, J., et al.: Protecting intellectual property of deep neural networks with watermarking. In: The 2018 on Asia Conference on Computer and Communications Security, pp. 159\u2013172 (2018). https:\/\/doi.org\/10.1145\/3196494.3196550","DOI":"10.1145\/3196494.3196550"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Lecture Notes in Data Engineering, Computational Intelligence, and Decision-Making, Volume 2"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-88483-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T02:37:21Z","timestamp":1745548641000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-88483-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031884825","9783031884832"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-88483-2_8","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"26 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDMCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Scientific Conference \u201cIntellectual Systems of Decision Making and Problem of Computational Intelligence\u201d","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"\u00dast\u00ed nad Labem","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isdmci2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.isdmci.ks.ua\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}