{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:26:16Z","timestamp":1743125176230,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176098"},{"type":"electronic","value":"9783642176104"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17610-4_12","type":"book-chapter","created":{"date-parts":[[2010,11,24]],"date-time":"2010-11-24T12:57:18Z","timestamp":1290603438000},"page":"104-113","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection"],"prefix":"10.1007","author":[{"given":"Pranab Kumar","family":"Dhar","sequence":"first","affiliation":[]},{"given":"Mohammad Ibrahim","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Cheol-Hong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jong-Myon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"12_CR1","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TMM.2005.861292","volume":"8","author":"W.N. Lie","year":"2006","unstructured":"Lie, W.N., Chang, L.C.: Robust and High-Quality Time-Domain Audio Watermarking Based on Low-Frequency Amplitude Modification. IEEE Transaction on Multimedia\u00a08(1), 46\u201359 (2006)","journal-title":"IEEE Transaction on Multimedia"},{"issue":"7","key":"12_CR2","doi-asserted-by":"publisher","first-page":"1357","DOI":"10.1109\/TMM.2007.906580","volume":"9","author":"S. Xiang","year":"2007","unstructured":"Xiang, S., Huang, Z.: Histogram-based audio watermarking against time-scale modification and cropping attacks. IEEE Transactions on Multimedia\u00a09(7), 1357\u20131372 (2007)","journal-title":"IEEE Transactions on Multimedia"},{"issue":"2","key":"12_CR3","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/6046.923822","volume":"3","author":"P. Bassia","year":"2001","unstructured":"Bassia, P., Pitas, I., Nikolaidis, N.: Robust Audio Watermarking in the Time domain. IEEE Transaction on Multimedia\u00a03(2), 232\u2013241 (2001)","journal-title":"IEEE Transaction on Multimedia"},{"key":"12_CR4","unstructured":"Xie, L., Zhang, J., He, H.: Robust Audio Watermarking Scheme Based on Nonuniform Discrete Fourier Transform. In: IEEE International Conference on Engineering of Intelligent System, pp. 1\u20135 (2006)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Zeng, G., Qiu, Z.: Audio Watermarking in DCT: Embedding Strategy and Algorithm. In: 9th International Conference on Signal Processing (ICSP 2009), pp. 2193\u20132196 (2008)","DOI":"10.1109\/ICOSP.2008.4697583"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Huang, J., Wang, Y., Shi, Y.Q.: A Blind Audio Watermarking Algorithm with Self-Synchronization. In: IEEE International Symposium on Circuits and Systems (ISCAS 2002), vol.\u00a03, pp. 627\u2013630 (2002)","DOI":"10.1109\/ISCAS.2002.1010302"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Pooyan, M., Delforouzi, A.: Adaptive and Robust Audio watermarking in Wavelet Domain. In: International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), vol.\u00a02, pp. 287\u2013290 (2007)","DOI":"10.1109\/IIH-MSP.2007.68"},{"issue":"12","key":"12_CR8","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I. Cox","year":"1997","unstructured":"Cox, I., Killian, J., Leighton, F., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing\u00a06(12), 1673\u20131687 (1997)","journal-title":"IEEE Transactions on Image Processing"}],"container-title":["Communications in Computer and Information Science","Security Technology, Disaster Recovery and Business Continuity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17610-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T05:16:16Z","timestamp":1740719776000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17610-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176098","9783642176104"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17610-4_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}