{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T07:23:58Z","timestamp":1744183438139,"version":"3.37.3"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,11,22]],"date-time":"2018-11-22T00:00:00Z","timestamp":1542844800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s00034-018-0994-2","type":"journal-article","created":{"date-parts":[[2018,11,22]],"date-time":"2018-11-22T06:11:08Z","timestamp":1542867068000},"page":"3697-3714","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Blind Audio Watermarking Scheme Employing DCT\u2013HT\u2013SD Technique"],"prefix":"10.1007","volume":"38","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3674-2968","authenticated-orcid":false,"given":"Aniruddha","family":"Kanhe","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9625-2477","authenticated-orcid":false,"given":"Aghila","family":"Gnanasekaran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,22]]},"reference":[{"key":"994_CR1","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/T-C.1974.223784","volume":"C\u201323(1)","author":"N Ahmed","year":"1974","unstructured":"N. Ahmed, T. Natarajan, K.R. Rao, Discrete cosine transform. IEEE Trans. Comput. C\u201323(1), 90\u201393 (1974). \n                    https:\/\/doi.org\/10.1109\/T-C.1974.223784","journal-title":"IEEE Trans. Comput."},{"issue":"3","key":"994_CR2","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1109\/TAU.1971.1162193","volume":"19","author":"N Ahmed","year":"1971","unstructured":"N. Ahmed, K. Rao, A. Abdussattar, BIFORE or Hadamard transform. IEEE Trans. Audio Electroacoust. 19(3), 225\u2013234 (1971). \n                    https:\/\/doi.org\/10.1109\/TAU.1971.1162193","journal-title":"IEEE Trans. Audio Electroacoust."},{"issue":"1","key":"994_CR3","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1186\/s13636-014-0037-2","volume":"2014","author":"A Al-Haj","year":"2014","unstructured":"A. Al-Haj, An imperceptible and robust audio watermarking algorithm. EURASIP J. Audio Speech Music Process. 2014(1), 37 (2014). \n                    https:\/\/doi.org\/10.1186\/s13636-014-0037-2","journal-title":"EURASIP J. Audio Speech Music Process."},{"key":"994_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/b97662","volume-title":"Linear Algebra Done Right","author":"S Axler","year":"1997","unstructured":"S. Axler, Linear Algebra Done Right (Springer, Berlin, 1997)"},{"issue":"3.4","key":"994_CR5","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"W. Bender, D. Gruhl, N. Morimoto, A. Lu, Techniques for data hiding. IBM Syst. J. 35(3.4), 313\u2013336 (1996). \n                    https:\/\/doi.org\/10.1147\/sj.353.0313","journal-title":"IBM Syst. J."},{"issue":"5","key":"994_CR6","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1007\/s00034-010-9255-8","volume":"30","author":"KV Bhat","year":"2011","unstructured":"K.V. Bhat, I. Sengupta, A. Das, A new audio watermarking scheme based on singular value decomposition and quantization. Circuits Syst. Signal Process. 30(5), 915\u2013927 (2011). \n                    https:\/\/doi.org\/10.1007\/s00034-010-9255-8","journal-title":"Circuits Syst. Signal Process."},{"issue":"1","key":"994_CR7","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1186\/1687-4722-2013-10","volume":"2013","author":"Z Chen","year":"2013","unstructured":"Z. Chen, C. Zhao, G. Geng, F. Yin, An audio watermark-based speech bandwidth extension method. EURASIP J. Audio Speech Music Process. 2013(1), 10 (2013). \n                    https:\/\/doi.org\/10.1186\/1687-4722-2013-10","journal-title":"EURASIP J. Audio Speech Music Process."},{"key":"994_CR8","doi-asserted-by":"publisher","unstructured":"K. Datta, I. Sengupta, A redundant audio watermarking technique using discrete wavelet transformation, in 2010 Second International Conference on Communication Software and Networks (2010), pp. 27\u201331. \n                    https:\/\/doi.org\/10.1109\/ICCSN.2010.57","DOI":"10.1109\/ICCSN.2010.57"},{"issue":"1","key":"994_CR9","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1186\/1687-4722-2012-25","volume":"2012","author":"F Djebbar","year":"2012","unstructured":"F. Djebbar, B. Ayad, K.A. Meraim, H. Hamam, Comparative study of digital audio steganography techniques. EURASIP J. Audio Speech Music Process. 2012(1), 25 (2012). \n                    https:\/\/doi.org\/10.1186\/1687-4722-2012-25","journal-title":"EURASIP J. Audio Speech Music Process."},{"issue":"4","key":"994_CR10","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1007\/s10772-017-9462-9","volume":"20","author":"AR Elshazly","year":"2017","unstructured":"A.R. Elshazly, M.E. Nasr, M.M. Fouad, F.S. Abdel-Samie, High payload multi-channel dual audio watermarking algorithm based on discrete wavelet transform and singular value decomposition. Int. J. Speech Technol. 20(4), 951\u2013958 (2017)","journal-title":"Int. J. Speech Technol."},{"issue":"8","key":"994_CR11","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1109\/TASLP.2015.2430818","volume":"23","author":"M Fallahpour","year":"2015","unstructured":"M. Fallahpour, D. Megas, Audio watermarking based on fibonacci numbers. IEEE\/ACM Trans. Audio Speech Lang. Process. 23(8), 1273\u20131282 (2015). \n                    https:\/\/doi.org\/10.1109\/TASLP.2015.2430818","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"issue":"4","key":"994_CR12","first-page":"13","volume":"6","author":"A Farmani","year":"2012","unstructured":"A. Farmani, H.B. Bahar, Hardware implementation of 128-bit AES image encryption with low power techniques on FPGA to VHDL. Majlesi J. Electr. Eng. 6(4), 13\u201322 (2012)","journal-title":"Majlesi J. Electr. Eng."},{"key":"994_CR13","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.optlastec.2017.02.007","volume":"93","author":"A Farmani","year":"2017","unstructured":"A. Farmani, M. Farhang, M.H. Sheikhi, High performance polarization-independent quantum dot semiconductor optical amplifier with 22 db fiber to fiber gain using mode propagation tuning without additional polarization controller. Opt. Laser Technol. 93, 127\u2013132 (2017)","journal-title":"Opt. Laser Technol."},{"issue":"3","key":"994_CR14","first-page":"85","volume":"6","author":"A Farmani","year":"2017","unstructured":"A. Farmani, M.H. Sheikhi, Quantum-dot semiconductor optical amplifier: performance and application for optical logic gates. Majlesi J. Telecommun. Dev. 6(3), 85\u201389 (2017)","journal-title":"Majlesi J. Telecommun. Dev."},{"issue":"1","key":"994_CR15","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1007\/s10586-017-0770-2","volume":"20","author":"HT Hu","year":"2017","unstructured":"H.T. Hu, J.R. Chang, Efficient and robust frame-synchronized blind audio watermarking by featuring multilevel DWT and DCT. Cluster Comput. 20(1), 805\u2013816 (2017). \n                    https:\/\/doi.org\/10.1007\/s10586-017-0770-2","journal-title":"Cluster Comput."},{"issue":"2","key":"994_CR16","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/s00034-015-0074-9","volume":"35","author":"HT Hu","year":"2016","unstructured":"H.T. Hu, L.Y. Hsu, A DWT-based rational dither modulation scheme for effective blind audio watermarking. Circuits Syst. Signal Process. 35(2), 553\u2013572 (2016). \n                    https:\/\/doi.org\/10.1007\/s00034-015-0074-9","journal-title":"Circuits Syst. Signal Process."},{"issue":"2","key":"994_CR17","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s11277-016-3178-z","volume":"94","author":"HT Hu","year":"2017","unstructured":"H.T. Hu, L.Y. Hsu, Incorporating spectral shaping filtering into DWT-based vector modulation to improve blind audio watermarking. Wirel. Pers. Commun. 94(2), 221\u2013240 (2017). \n                    https:\/\/doi.org\/10.1007\/s11277-016-3178-z","journal-title":"Wirel. Pers. Commun."},{"issue":"1","key":"994_CR18","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1186\/s13636-017-0106-4","volume":"2017","author":"HT Hu","year":"2017","unstructured":"H.T. Hu, S.J. Lin, L.Y. Hsu, Effective blind speech watermarking via adaptive mean modulation and package synchronization in DWT domain. EURASIP J. Audio Speech Music Process. 2017(1), 10 (2017)","journal-title":"EURASIP J. Audio Speech Music Process."},{"issue":"7","key":"994_CR19","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1016\/j.specom.2006.12.006","volume":"49","author":"Y Hu","year":"2007","unstructured":"Y. Hu, P.C. Loizou, Subjective comparison and evaluation of speech enhancement algorithms. Speech Commun. 49(7), 588\u2013601 (2007)","journal-title":"Speech Commun."},{"issue":"1","key":"994_CR20","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1109\/TASL.2007.911054","volume":"16","author":"Y Hu","year":"2008","unstructured":"Y. Hu, P.C. Loizou, Evaluation of objective quality measures for speech enhancement. IEEE Trans. Speech Audio Process. 16(1), 229\u2013238 (2008). \n                    https:\/\/doi.org\/10.1109\/TASL.2007.911054","journal-title":"IEEE Trans. Speech Audio Process."},{"key":"994_CR21","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.sigpro.2016.04.005","volume":"128","author":"G Hua","year":"2016","unstructured":"G. Hua, J. Huang, Y.Q. Shi, J. Goh, V.L. Thing, Twenty years of digital audio watermarking\u2014a comprehensive review. Signal Process. 128, 222\u2013242 (2016). \n                    https:\/\/doi.org\/10.1016\/j.sigpro.2016.04.005","journal-title":"Signal Process."},{"issue":"1","key":"994_CR22","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/TMM.2017.2721642","volume":"20","author":"MJ Hwang","year":"2018","unstructured":"M.J. Hwang, J. Lee, M. Lee, H.G. Kang, SVD-based adaptive QIM watermarking on stereo audio signals. IEEE Trans. Multimed. 20(1), 45\u201354 (2018)","journal-title":"IEEE Trans. Multimed."},{"key":"994_CR23","doi-asserted-by":"publisher","first-page":"12843","DOI":"10.1109\/ACCESS.2017.2717842","volume":"5","author":"M Imran","year":"2017","unstructured":"M. Imran, Z. Ali, S.T. Bakhsh, S. Akram, Blind detection of copy-move forgery in digital audio forensics. IEEE Access 5, 12843\u201312855 (2017). \n                    https:\/\/doi.org\/10.1109\/ACCESS.2017.2717842","journal-title":"IEEE Access"},{"issue":"11","key":"994_CR24","doi-asserted-by":"publisher","first-page":"5049","DOI":"10.1007\/s00034-018-0805-9","volume":"37","author":"A Kanhe","year":"2018","unstructured":"A. Kanhe, G. Aghila, A DCT-SVD-based speech steganography in voiced frames. Circuits Syst. Signal Process. 37(11), 5049\u20135068 (2018). \n                    https:\/\/doi.org\/10.1007\/s00034-018-0805-9","journal-title":"Circuits Syst. Signal Process."},{"key":"994_CR25","volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","year":"2000","unstructured":"S. Katzenbeisser, F.A. Petitcolas (eds.), Information Hiding Techniques for Steganography and Digital Watermarking, 1st edn. (Artech House, Norwood, 2000)","edition":"1"},{"key":"994_CR26","doi-asserted-by":"publisher","unstructured":"A. Kaur, M.K. Dutta, An optimized high payload audio watermarking algorithm based on LU-factorization. Multimed. Syst. (2017). \n                    https:\/\/doi.org\/10.1007\/s00530-017-0545-x","DOI":"10.1007\/s00530-017-0545-x"},{"key":"994_CR27","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1109\/TC.1979.1675334","volume":"28","author":"H Kunz","year":"1979","unstructured":"H. Kunz, On the equivalence between one-dimensional discrete Walsh\u2013Hadamard and multidimensional discrete Fourier transforms. IEEE Trans. Comput. 28, 267\u2013268 (1979). \n                    https:\/\/doi.org\/10.1109\/TC.1979.1675334","journal-title":"IEEE Trans. Comput."},{"issue":"4","key":"994_CR28","doi-asserted-by":"publisher","first-page":"4545","DOI":"10.1007\/s11042-017-4452-0","volume":"77","author":"J Li","year":"2018","unstructured":"J. Li, C. Yu, B.B. Gupta, X. Ren, Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed. Tools Appl. 77(4), 4545\u20134561 (2018). \n                    https:\/\/doi.org\/10.1007\/s11042-017-4452-0","journal-title":"Multimed. Tools Appl."},{"issue":"5","key":"994_CR29","doi-asserted-by":"publisher","first-page":"3387","DOI":"10.1121\/1.3097493","volume":"125","author":"J Ma","year":"2009","unstructured":"J. Ma, Y. Hu, P.C. Loizou, Objective measures for predicting speech intelligibility in noisy conditions based on new band-importance functions. J. Acoust. Soc. Am. 125(5), 3387\u20133405 (2009)","journal-title":"J. Acoust. Soc. Am."},{"key":"994_CR30","doi-asserted-by":"publisher","unstructured":"W.K. McDowell, W.B. Mikhael, A.P. Berg, Efficiency of the KLT on voiced & unvoiced speech as a function of segment size, in 2012 Proceedings of IEEE Southeastcon (2012), pp. 1\u20135. \n                    https:\/\/doi.org\/10.1109\/SECon.2012.6197063","DOI":"10.1109\/SECon.2012.6197063"},{"key":"994_CR31","volume-title":"Digital Processing of Speech Signals","author":"LR Rabiner","year":"1978","unstructured":"L.R. Rabiner, R.W. Schafer, Digital Processing of Speech Signals, vol. 100 (Prentice-Hall, Englewood Cliffs, 1978)"},{"key":"994_CR32","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.eswa.2017.09.003","volume":"91","author":"D Renza","year":"2018","unstructured":"D. Renza, D.M. Ballesteros Larrota, C. Lemus, Authenticity verification of audio signals based on fragile watermarking for audio forensics. Expert Syst. Appl. 91, 211\u2013222 (2018). \n                    https:\/\/doi.org\/10.1016\/j.eswa.2017.09.003","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"994_CR33","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1016\/j.istr.2013.01.001","volume":"18","author":"V Santhi","year":"2013","unstructured":"V. Santhi, P. Arulmozhivarman, Hadamard transform based adaptive visible\/invisible watermarking scheme for digital images. J. Inf. Secur. Appl. 18(4), 167\u2013179 (2013). \n                    https:\/\/doi.org\/10.1016\/j.istr.2013.01.001","journal-title":"J. Inf. Secur. Appl."},{"issue":"7","key":"994_CR34","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.1016\/j.optcom.2011.12.065","volume":"285","author":"Q Su","year":"2012","unstructured":"Q. Su, Y. Niu, X. Liu, Y. Zhu, Embedding color watermarks in color images based on schur decomposition. Opt. Commun. 285(7), 1792\u20131802 (2012). \n                    https:\/\/doi.org\/10.1016\/j.optcom.2011.12.065","journal-title":"Opt. Commun."},{"issue":"6","key":"994_CR35","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1049\/cje.2016.06.007","volume":"25","author":"X Tang","year":"2016","unstructured":"X. Tang, Z. Ma, X. Niu, Y. Yang, Robust audio watermarking algorithm based on empirical mode decomposition. Chin. J. Electron. 25(6), 1005\u20131010 (2016). \n                    https:\/\/doi.org\/10.1049\/cje.2016.06.007","journal-title":"Chin. J. Electron."},{"issue":"12","key":"994_CR36","doi-asserted-by":"publisher","first-page":"4835","DOI":"10.1109\/TSP.2006.881258","volume":"54","author":"XY Wang","year":"2006","unstructured":"X.Y. Wang, H. Zhao, A novel synchronization invariant audio watermarking scheme based on DWT and DCT. IEEE Trans. Signal Process. 54(12), 4835\u20134840 (2006). \n                    https:\/\/doi.org\/10.1109\/TSP.2006.881258","journal-title":"IEEE Trans. Signal Process."},{"issue":"5","key":"994_CR37","first-page":"2076","volume":"8","author":"Q Wu","year":"2018","unstructured":"Q. Wu, M. Wu, A novel robust audio watermarking algorithm by modifying the average amplitude in transform domain. Appl. Sci. 8(5), 2076\u20133417 (2018)","journal-title":"Appl. Sci."},{"issue":"10","key":"994_CR38","doi-asserted-by":"publisher","first-page":"2372","DOI":"10.1016\/j.sigpro.2008.03.019","volume":"88","author":"S Xiang","year":"2008","unstructured":"S. Xiang, H.J. Kim, J. Huang, Audio watermarking robust against time-scale modification and MP3 compression. Signal Process. 88(10), 2372\u20132387 (2008). \n                    https:\/\/doi.org\/10.1016\/j.sigpro.2008.03.019","journal-title":"Signal Process."},{"key":"994_CR39","doi-asserted-by":"publisher","unstructured":"S. Xiang, L. Yang, Y. Wang, Robust and reversible audio watermarking by modifying statistical features in time domain. Adv. Multimed. (2017). \n                    https:\/\/doi.org\/10.1155\/2017\/8492672","DOI":"10.1155\/2017\/8492672"},{"key":"994_CR40","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.measurement.2017.04.015","volume":"105","author":"P Yao","year":"2017","unstructured":"P. Yao, K. Zhou, Application of short time energy analysis in monitoring the stability of arc sound signal. Measurement 105, 98\u2013105 (2017). \n                    https:\/\/doi.org\/10.1016\/j.measurement.2017.04.015","journal-title":"Measurement"}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-018-0994-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00034-018-0994-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-018-0994-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T19:14:52Z","timestamp":1574363692000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00034-018-0994-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,22]]},"references-count":40,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["994"],"URL":"https:\/\/doi.org\/10.1007\/s00034-018-0994-2","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"type":"print","value":"0278-081X"},{"type":"electronic","value":"1531-5878"}],"subject":[],"published":{"date-parts":[[2018,11,22]]},"assertion":[{"value":"10 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}