{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:27:11Z","timestamp":1725852431301},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319319599"},{"type":"electronic","value":"9783319319605"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31960-5_26","type":"book-chapter","created":{"date-parts":[[2016,3,30]],"date-time":"2016-03-30T04:15:28Z","timestamp":1459311328000},"page":"312-320","source":"Crossref","is-referenced-by-count":3,"title":["Audio Watermarking Using Different Wavelet Filters"],"prefix":"10.1007","author":[{"given":"Toshiki","family":"Ito","sequence":"first","affiliation":[]},{"given":"Hyunho","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Keiichi","family":"Iwamura","sequence":"additional","affiliation":[]},{"given":"Kitahiro","family":"Kaneda","sequence":"additional","affiliation":[]},{"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,31]]},"reference":[{"issue":"12","key":"26_CR1","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum: watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. Image Process."},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/978-3-642-40099-5_33","volume-title":"Digital Forensics and Watermaking","author":"Q Chen","year":"2013","unstructured":"Chen, Q., Xiang, S., Luo, X.: Reversible watermarking for audio authentication based on integer DCT and expansion embedding. In: Shi, Y.Q., Kim, H.-J., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IWDW 2012. LNCS, vol. 7809, pp. 395\u2013409. Springer, Heidelberg (2013)"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1007\/978-3-662-43886-2_27","volume-title":"Digital-Forensics and Watermarking","author":"X Huang","year":"2014","unstructured":"Huang, X., Ono, N., Echizen, I., Nishimura, A.: Reversible audio information hiding based on integer DCT coefficients with adaptive hiding locations. In: Shi, Y.Q., Kim, H.-J., P\u00e9rez-Gonz\u00e1lez, F. (eds.) IWDW 2013. LNCS, vol. 8389, pp. 376\u2013390. Springer, Heidelberg (2014)"},{"key":"26_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-642-32205-1_9","volume-title":"Digital Forensics and Watermarking","author":"B Lei","year":"2012","unstructured":"Lei, B., Soon, I.Y., Li, Z.: A robust audio watermarking scheme based on lifting wavelet transform and singular value decomposition. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 86\u201396. Springer, Heidelberg (2012)"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Ono, E.: Robust audio information hiding based on stereo phase difference in time-frequency domain. In: IIHMSP, pp. 260\u2013263 (2014)","DOI":"10.1109\/IIH-MSP.2014.71"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Nishimura, A.: Audio watermarking based on amplitude modulation and modulation masking. In: IWIHC 2014 Proceedings of the 1st International Workshop on Information Hiding and its Criteria for Evaluation, pp. 45\u201355 (2014)","DOI":"10.1145\/2598908.2598915"},{"key":"26_CR7","unstructured":"MathWorks Wavelet Toolbox. \n                      https:\/\/mathworks.com\/help\/wavelet\/index.html"}],"container-title":["Lecture Notes in Computer Science","Digital-Forensics and Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31960-5_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T19:00:16Z","timestamp":1559415616000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31960-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319319599","9783319319605"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31960-5_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}