{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:26:59Z","timestamp":1725852419635},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_17","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T04:15:28Z","timestamp":1459311328000},"page":"206-219","source":"Crossref","is-referenced-by-count":1,"title":["An Authentication and Recovery Scheme for Digital Speech Signal Based on DWT"],"prefix":"10.1007","author":[{"given":"Jing","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhenghui","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Junjie","family":"He","sequence":"additional","affiliation":[]},{"given":"Chuanda","family":"Qi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"issue":"11","key":"17_CR1","doi-asserted-by":"publisher","first-page":"2412","DOI":"10.1109\/TASL.2013.2279312","volume":"21","author":"CM Pun","year":"2013","unstructured":"Pun, C.M., Yuan, X.C.: Robust segments detector for de-synchronization resilient audio watermarking. IEEE Trans. Audio Speech Lang. Process. 21(11), 2412\u20132424 (2013)","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"issue":"1","key":"17_CR2","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1016\/j.dsp.2012.08.006","volume":"23","author":"H Peng","year":"2013","unstructured":"Peng, H., Li, B., Luo, X.H.: A learning-based audio watermarking scheme using kernel Fisher discriminant analysis. Digit. Sig. Proc. 23(1), 382\u2013389 (2013)","journal-title":"Digit. Sig. Proc."},{"issue":"11","key":"17_CR3","doi-asserted-by":"publisher","first-page":"2368","DOI":"10.1109\/TASL.2013.2277929","volume":"21","author":"B Lei","year":"2013","unstructured":"Lei, B., Soon, I.Y., Tan, E.L.: Robust SVD-based audio watermarking scheme with differential evolution optimization. IEEE Trans. Audio Speech Lang. Process. 21(11), 2368\u20132378 (2013)","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"issue":"8","key":"17_CR4","doi-asserted-by":"publisher","first-page":"2487","DOI":"10.1016\/j.sigpro.2010.02.013","volume":"90","author":"MA Akhaee","year":"2010","unstructured":"Akhaee, M.A., Kalantari, N.K., Marvasti, F.: Robust audio and speech satermarking using Gaussian and Laplacian modeling. Sig. Process. 90(8), 2487\u20132497 (2010)","journal-title":"Sig. Process."},{"issue":"3","key":"17_CR5","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.csl.2011.11.002","volume":"26","author":"T Herbig","year":"2012","unstructured":"Herbig, T., Gerl, F., Minker, W.: Self-learning speaker identification for enhanced speech recognition. Comput. Speech Lang. 26(3), 210\u2013227 (2012)","journal-title":"Comput. Speech Lang."},{"issue":"1\u20132","key":"17_CR6","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.diin.2009.10.001","volume":"7","author":"LA Khan","year":"2010","unstructured":"Khan, L.A., Baig, M.S., Youssef, A.M.: Speaker recognition from encrypted VoIP communications. Digital Invest. 7(1\u20132), 65\u201373 (2010)","journal-title":"Digital Invest."},{"issue":"4","key":"17_CR7","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1016\/j.csl.2012.07.005","volume":"27","author":"R Navarathna","year":"2013","unstructured":"Navarathna, R., Dean, D., Sridharan, S.: Multiple cameras for audio-visual speech recognition in an automotive environment. Comput. Speech Lang. 27(4), 911\u2013927 (2013)","journal-title":"Comput. Speech Lang."},{"issue":"4","key":"17_CR8","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1016\/j.specom.2011.11.004","volume":"54","author":"M Sahidullah","year":"2012","unstructured":"Sahidullah, M., Saha, G.: Design, analysis and experimental evaluation of block based transformation in MFCC computation for speaker recognition. Speech Commun. 54(4), 543\u2013565 (2012)","journal-title":"Speech Commun."},{"issue":"8","key":"17_CR9","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1016\/j.patrec.2006.12.010","volume":"28","author":"C Park","year":"2007","unstructured":"Park, C., Thapa, M.D., Wang, G.N.: Speech authentication system using digital watermarking and pattern recovery. Pattern Recogn. Lett. 28(8), 931\u2013938 (2007)","journal-title":"Pattern Recogn. Lett."},{"issue":"5","key":"17_CR10","doi-asserted-by":"publisher","first-page":"1605","DOI":"10.1109\/TASL.2007.896658","volume":"15","author":"OTC Chen","year":"2007","unstructured":"Chen, O.T.C., Liu, C.H.: Content-dependent watermarking scheme in compressed speech with identifying manner and location of attacks. IEEE Trans. Audio Speech Lang. Process. 15(5), 1605\u20131616 (2007)","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Yuan, S., Huss, S.A.: Audio watermarking algorithm for real-time speech integrity and authentication. In: Proceedings of the 2004 Workshop on Multimedia and Security, pp. 220\u2013226 (2004)","DOI":"10.1145\/1022431.1022470"},{"issue":"3","key":"17_CR12","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1016\/j.compeleceng.2009.12.003","volume":"36","author":"R Chamlawi","year":"2010","unstructured":"Chamlawi, R., Khan, A., Usman, I.: Authentication and recovery of images using multiple watermarks. Comput. Electr. Eng. 36(3), 578\u2013584 (2010)","journal-title":"Comput. Electr. Eng."},{"issue":"11","key":"17_CR13","doi-asserted-by":"publisher","first-page":"3497","DOI":"10.1016\/j.patcog.2008.05.003","volume":"41","author":"TY Lee","year":"2008","unstructured":"Lee, T.Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497\u20133506 (2008)","journal-title":"Pattern Recogn."},{"issue":"4","key":"17_CR14","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.csi.2012.01.003","volume":"34","author":"CL Li","year":"2012","unstructured":"Li, C.L., Wang, Y.H., Ma, B., Zhang, Z.X.: Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme. Comput. Stan. Interfaces 34(4), 367\u2013379 (2012)","journal-title":"Comput. Stan. Interfaces"},{"issue":"1","key":"17_CR15","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.image.2012.11.006","volume":"28","author":"LR Roldan","year":"2013","unstructured":"Roldan, L.R., Hernandez, M.C., Miyatake, M.N., Meana, H.P., Kurkoski, B.: Watermarking-based image authentication with recovery capability using halftoning technique. Sig. Process. Image Commun. 28(1), 69\u201383 (2013)","journal-title":"Sig. Process. Image Commun."},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Fakhr, M.W.: Sparse watermark embedding and recovery using compressed sensing framework for audio signals. In: Proceedings of International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, pp. 535\u2013539 (2012)","DOI":"10.1109\/CyberC.2012.99"},{"issue":"5","key":"17_CR17","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1007\/s00034-010-9255-8","volume":"30","author":"BK Vivekananda","year":"2011","unstructured":"Vivekananda, B.K., Indranil, S., Abhijit, D.: A new audio watermarking scheme based on singular value decomposition and quantization. Circuits Syst. Sig. Process. 30(5), 915\u2013927 (2011)","journal-title":"Circuits Syst. Sig. Process."},{"issue":"8","key":"17_CR18","doi-asserted-by":"publisher","first-page":"1973","DOI":"10.1016\/j.sigpro.2011.03.001","volume":"91","author":"BY Lei","year":"2011","unstructured":"Lei, B.Y., Soon, I.Y., Li, Z.: Blind and robust audio watermarking scheme based on SVD-DCT. Sig. Process. 91(8), 1973\u20131984 (2011)","journal-title":"Sig. Process."},{"issue":"4","key":"17_CR19","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/j.compeleceng.2011.05.011","volume":"37","author":"XY Wang","year":"2011","unstructured":"Wang, X.Y., Ma, T.X., Niu, P.P.: A pseudo-Zernike moments based audio watermarking scheme robust against desynchronization attacks. Comput. Electr. Eng. 37(4), 425\u2013443 (2011)","journal-title":"Comput. Electr. Eng."},{"key":"17_CR20","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.dsp.2013.09.007","volume":"24","author":"ZH Liu","year":"2014","unstructured":"Liu, Z.H., Wang, H.X.: A novel speech content authentication algorithm based on Bessel-Fourier moments. Digital Sig. Process. 24, 197\u2013208 (2014)","journal-title":"Digital Sig. Process."},{"issue":"13","key":"17_CR21","first-page":"1","volume":"2010","author":"Y Wang","year":"2010","unstructured":"Wang, Y., Wu, S.Q., Huang, J.W.: Audio watermarking scheme robust against desynchronization based on the dyadic wavelet transform. J. Adv. Sig. Process. 2010(13), 1\u201317 (2010)","journal-title":"J. Adv. Sig. Process."}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,20]],"date-time":"2019-01-20T23:30:16Z","timestamp":1548027016000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}