{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T11:43:19Z","timestamp":1762429399257},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T00:00:00Z","timestamp":1573516800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T00:00:00Z","timestamp":1573516800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Ministry of Higher Education and Scientific Research of Tunisia","award":["LR11ES48"],"award-info":[{"award-number":["LR11ES48"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s00034-019-01299-4","type":"journal-article","created":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T02:02:50Z","timestamp":1573524170000},"page":"3019-3034","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A Semi-Fragile Digital Audio Watermarking Scheme for MP3-Encoded Signals Using Huffman Data"],"prefix":"10.1007","volume":"39","author":[{"given":"Salma","family":"Masmoudi","sequence":"first","affiliation":[]},{"given":"Maha","family":"Charfeddine","sequence":"additional","affiliation":[]},{"given":"Chokri","family":"Ben Amar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,12]]},"reference":[{"issue":"8","key":"1299_CR1","first-page":"3697","volume":"38","author":"K Aniruddha","year":"2018","unstructured":"K. Aniruddha, A. Gnanasekaran, A blind audio watermarking scheme employing DCT-HT-SD technique. Circuits Syst. Signal Process. 38(8), 3697\u20133714 (2018)","journal-title":"Circuits Syst. Signal Process."},{"key":"1299_CR2","unstructured":"T. Bouchrika, M. Zaied, O. Jemai, C. Ben Amar, Ordering computers by hand gestures recognition based on wavelet networks, in Proceedings of the 2nd International Conference on Communications Computing and Control Applications, Marseilles, France (2012). pp. 1\u20136. https:\/\/doi.org\/10. 1109\/CCCA"},{"key":"1299_CR3","unstructured":"H. Boughrara, M. Chtourou, C. Ben Amar, MLP neural network based face recognition system using constructive training algorithm, in Proceedings of the 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012, Tangier, Morocco (2012), pp. 233\u2013238"},{"issue":"3","key":"1299_CR4","doi-asserted-by":"publisher","first-page":"1521","DOI":"10.1007\/s11042-012-1167-0","volume":"70","author":"M Charfeddine","year":"2012","unstructured":"M. Charfeddine, M. El\u2019Arbi, C. Ben Amar, A new DCT audio watermarking scheme based on preliminary MP3 study. Multimed. Tools Appl. 70(3), 1521\u20131557 (2012)","journal-title":"Multimed. Tools Appl."},{"key":"1299_CR5","unstructured":"F. Chaabane, M. Charfeddine, C. Ben Amar, A multimedia tracing traitors scheme using multi-level hierarchical structure for tardos fingerprint based audio watermarking, in Proceedings of the 2014 IEEE International Conference on Signal Processing and Multimedia Applications (SIGMAP), Vienna, Austria (2014), pp. 289\u2013296"},{"key":"1299_CR6","unstructured":"F. Chaabane, M. Charfeddine, C. Ben Amar, A survey on digital tracing traitors schemes, in Proceedings of the IEEE 9th International Conference on Information Assurance and Security (IAS), Gammarth, Tunisia (2013), pp. 85\u201390"},{"key":"1299_CR7","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-513-9","volume-title":"Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks","author":"N Cvejic","year":"2008","unstructured":"N. Cvejic, T. Sepp\u00e4nen, Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks (Information Science Reference, Hershey, 2008)"},{"key":"1299_CR8","unstructured":"M. El\u2019Arbi, M. Charfeddine, S. Masmoudi, M. Koubaa, C. Ben Amar, Video watermarking algorithm with BCH error correcting codes hidden in audio channel, in Proceedings of the, IEEE Symposium Series in Computational Intelligence. Paris (2011), pp. 164\u201317"},{"key":"1299_CR9","unstructured":"M. El\u2019Arbi, C. Ben Amar, H. Nicolas, Video watermarking based on neural networks, in Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, Toronto, Canada (2006), pp. 1577\u20131580"},{"key":"1299_CR10","unstructured":"M. Guedri, M. Zaied, C. Ben Amar, Indexing and images retrieval by content, in Proceedings of the 2011 International Conference on High Performance Computing and Simulation, HPCS 2011, Istanbul, Turkey (2011), pp. 369\u2013375"},{"key":"1299_CR11","unstructured":"International Organization for Standardization\/International Electrotechnical Commission, Coding of moving pictures and associated audio for digital storage media at up to about 1.5 Mbit\/s, ISO\/IEC 11172 (1993)"},{"issue":"2","key":"1299_CR12","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s11042-010-0626-8","volume":"56","author":"M Koubaa","year":"2012","unstructured":"M. Koubaa, M. El\u2019Arbi, C. Ben Amar, H. Nicolas, H. Collusion, MPEG4 compression and frame dropping resistant video watermarking. Multimed. Tools Appl. 56(2), 281\u2013301 (2012)","journal-title":"Multimed. Tools Appl."},{"key":"1299_CR13","unstructured":"A. Lang, et al., Audio watermark attacks: from single to profile attacks, in Proceedings of the 7th Workshop on Multimedia and Security (ACM), New York, NY, USA (2005), pp. 39\u201350"},{"key":"1299_CR14","unstructured":"E. Mezghani, M. Charfeddine, C. Ben Amar, Audio silence deletion before and after MPEG video compression, in Proceedings of the 2013 IEEE International Conference on Computer Applications Technology (ICCAT), Sousse, Tunisia (2013), pp. 1\u20135"},{"key":"1299_CR15","unstructured":"M. Mejdoub, L. Fonteles, C. Ben Amar, M. Antonini, Fast indexing method for image retrieval using tree-structured lattices, in Proceedings of the 2008 International Workshop on Content-Based Multimedia Indexing, CBMI 2008, London, UK (2008), pp. 365\u2013372"},{"key":"1299_CR16","unstructured":"S. Masmoudi, M. Charfeddine, C. Ben Amar, Robust audio watermarking technique based on the perceptual evaluation of audio quality algorithm in the multiresolution domain, in Proceedings of the, IEEE International Symposium on Signal Processing and Information Technology (ISSPIT). Luxor, Egypt (2010), pp. 326\u2013331"},{"issue":"1","key":"1299_CR17","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1142\/S0219691310003353","volume":"8","author":"M Othmani","year":"2010","unstructured":"M. Othmani, W. Bellil, C. Ben Amar, A.M. Alimi, A new structure and training procedure for multi-mother wavelet networks. Int. J. Wavelets Multiresolut. Inf. Process. 8(1), 149\u2013175 (2010)","journal-title":"Int. J. Wavelets Multiresolut. Inf. Process."},{"key":"1299_CR18","unstructured":"R. Raissi, The theory behind MP3. MP3\u2019Tech (2002)"},{"key":"1299_CR19","unstructured":"A.V. Subramanyam, S. Emmanuel, Audio watermarking in partially compressed-encrypted domain, in Proceedings of the 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Seoul, South Korea (2012), pp. 2867\u20132872"},{"key":"1299_CR20","unstructured":"I. Teyeb, O. Jemai M. Zaied, C. Ben Amar, A novel approach for drowsy driver detection using head posture estimation and eyes recognition system based on wavelet network, in Proceedings of the 5th International Conference on Information, Intelligence, Systems and Applications, Chania, Greece (2014), pp. 379\u2013384"},{"key":"1299_CR21","unstructured":"Union Internationale des T\u00e9l\u00e9communications (UIT) . Recommandation B.S. 1387 . M\u00e9thode de mesure objective de la qualit\u00e9 du son per\u00e7u  (2001)"},{"key":"1299_CR22","first-page":"110","volume-title":"A New System for Event Detection from Video Surveillance Sequences, Lecture Notes in Computer Science, 6475 LNCS (PART 2)","author":"A Wali","year":"2010","unstructured":"A. Wali, N. Ben Aoun, H. Karray, C. Ben Amar, A.M. Alimi, A New System for Event Detection from Video Surveillance Sequences, Lecture Notes in Computer Science, 6475 LNCS (PART 2) (Springer, Berlin, 2010), pp. 110\u2013120"},{"key":"1299_CR23","unstructured":"B. Yang, et al., Lossless and secure watermarking scheme in MP3 audio by modifying redundant bit in the frames, in The Proceedings of the IEEE 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), Vol. 1, Xi\u2019an, China (2013), pp. 154\u2013157"},{"issue":"7","key":"1299_CR24","doi-asserted-by":"publisher","first-page":"9363","DOI":"10.1007\/s11042-016-3539-3","volume":"76","author":"S Zhaopin","year":"2017","unstructured":"S. Zhaopin et al., Window switching strategy based semi-fragile watermarking for MP3 tamper detection. Multimed. Tools Appl. 76(7), 9363\u20139386 (2017)","journal-title":"Multimed. Tools Appl."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-019-01299-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00034-019-01299-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-019-01299-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T00:24:45Z","timestamp":1605054285000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00034-019-01299-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,12]]},"references-count":24,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["1299"],"URL":"https:\/\/doi.org\/10.1007\/s00034-019-01299-4","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,12]]},"assertion":[{"value":"19 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 October 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}