{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:27:52Z","timestamp":1737437272039,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540741237"},{"type":"electronic","value":"9783540741244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74124-4_7","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T03:06:39Z","timestamp":1189652799000},"page":"93-108","source":"Crossref","is-referenced-by-count":8,"title":["Time-Scale Invariant Audio Watermarking Based on the Statistical Features in Time Domain"],"prefix":"10.1007","author":[{"given":"Shijun","family":"Xiang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiwu","family":"Huang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rui","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Arnold, M.: Audio Watermarking: Features, Applications and Algorithms. In: Proc. of IEEE International Conference on Multimedia and Expo, New York, USA, vol. 2, pp. 1013\u20131016 (2000)","DOI":"10.1109\/ICME.2000.871531"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Swanson, M.D., Zhu, B., Tewfik, A.H.: Current State of the Art, Challenges and Future Directions for Audio Watermarking. In: Proc. of IEEE International Conference on Multimedia Computing and Systems, vol. 1, pp. 19\u201324 (1999)","DOI":"10.1109\/MMCS.1999.779114"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Petitcolas, F.A.P.(eds.): Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Inc. (2000)","DOI":"10.1201\/1079\/43263.28.6.20001201\/30373.5"},{"key":"7_CR4","unstructured":"International Evaluation Project for Digital Watermark Technology for Music (2000), http:\/\/www.jasrac.or.jp\/watermark\/ehoukoku.htm"},{"key":"7_CR5","unstructured":"SDMI Call For Proposals, Phase II (2000), http:\/\/www.sdmi.org\/download\/"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/TBC.2004.838265","volume":"51","author":"S.Q. Wu","year":"2005","unstructured":"Wu, S.Q., Huang, J.W., Huang, D., Shi, Y.Q.: Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission. IEEE Trans. on Broadcasting\u00a051, 69\u201376 (2005)","journal-title":"IEEE Trans. on Broadcasting"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Kirovski, D., Malvar, H.: Robust Covert Communication over A Public Audio Channel Using Spread Spectrum. In: Proc. of Information Hiding Workshop, pp. 354\u2013368 (2001)","DOI":"10.1007\/3-540-45496-9_26"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Tachibana, R., Shimizu, S., Nakamura, T., Kobayashi, S.: An Audio Watermarking Method Robust against Time and Frequency Fluctuation. In: Proc. of SPIE International Conference on Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 104\u2013115 (2001)","DOI":"10.1117\/12.435390"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Mansour, M., Tewfik, A.: Time-Scale Invariant Audio Data Embedding. In: Proc. of IEEE International Conference on Multimedia and Expo, pp. 76\u201379 (2001)","DOI":"10.1109\/ICME.2001.1237659"},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1049\/el:20056975","volume":"41","author":"W. Li","year":"2005","unstructured":"Li, W., Xue, X.Y., Lu, P.Z.: Robust Audio Watermarking Based on Rhythm Region Detection. Electronics Letters\u00a041, 218\u2013219 (2005)","journal-title":"Electronics Letters"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Wu, C.P., Su, P.C., Kuo, C.-C.J.: Robust and Efficient Digital Audio Watermarking Using Audio Content Analysis. In: Proc. of SPIE International Conference on Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 382\u2013392 (2000)","DOI":"10.1117\/12.384992"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Sylvain, B., Michiel, V.D.V., Aweke, L.: Informed Detection of Audio Watermark for Resolving Playback Speed Modifications. In: Proc. of the Multimedia and Security Workshop, pp. 117\u2013123 (2004)","DOI":"10.1145\/1022431.1022453"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Tachibana, R.: Improving Audio Watermarking Robustness Using Stretched Patterns against Geometric Distortion. In: Proc. of IEEE International Conference on Multimedia, pp. 647\u2013654 (2002)","DOI":"10.1007\/3-540-36228-2_80"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Coltuc, D., Bolon, P.: Watermarking by Histogram Specification. In: Proc. of SPIE International Conference on Security and Watermarking of Multimedia Contents II, vol. 3657, pp. 252\u2013263 (1999)","DOI":"10.1117\/12.344674"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Roy, S., Chang, E.C.: Watermarking color histograms. In: Proc. of International Conference of Image Processing, vol. 4, pp. 2191\u20132194 (2004)","DOI":"10.1109\/ICIP.2004.1421531"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Steinebach, M., Petitcolas, F.A.P., Raynal, F., Dittmann, J., Fontaine, C., Seibel, S., Fates, N., Ferri, L.C.: StirMark Benchmark: Audio Watermarking Attacks. In: Proc. of International Conference on Information Technology: Coding and Computing, pp. 49\u201354 (2001)","DOI":"10.1109\/ITCC.2001.918764"},{"key":"7_CR17","first-page":"230","volume":"3","author":"S.J. Xiang","year":"2006","unstructured":"Xiang, S.J., Huang, J.W.: Analysis of D\/A and A\/D Conversions in Quantization-Based Audio Watermarking. International Journal of Network Security\u00a03, 230\u2013238 (2006)","journal-title":"International Journal of Network Security"},{"key":"7_CR18","unstructured":"http:\/\/www.mp3-tech.org\/programmer\/sources\/eaqual.tgz"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74124-4_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T23:41:18Z","timestamp":1737416478000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74124-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540741237","9783540741244"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74124-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}