{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T16:38:02Z","timestamp":1770741482808,"version":"3.49.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2021,3,23]],"date-time":"2021-03-23T00:00:00Z","timestamp":1616457600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,3,23]],"date-time":"2021-03-23T00:00:00Z","timestamp":1616457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61671418"],"award-info":[{"award-number":["61671418"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s00034-021-01690-0","type":"journal-article","created":{"date-parts":[[2021,3,23]],"date-time":"2021-03-23T10:03:29Z","timestamp":1616493809000},"page":"4651-4685","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Robust Dual Domain Twofold Encrypted Image-in-Audio Watermarking Based on SVD"],"prefix":"10.1007","volume":"40","author":[{"given":"Md. Shohidul","family":"Islam","sequence":"first","affiliation":[]},{"given":"Nuzhat","family":"Naqvi","sequence":"additional","affiliation":[]},{"given":"Aliya Tabassum","family":"Abbasi","sequence":"additional","affiliation":[]},{"given":"Md. Imran","family":"Hossain","sequence":"additional","affiliation":[]},{"given":"Rizwan","family":"Ullah","sequence":"additional","affiliation":[]},{"given":"Rashid","family":"Khan","sequence":"additional","affiliation":[]},{"given":"M. Shujah","family":"Islam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1383-7673","authenticated-orcid":false,"given":"Zhongfu","family":"Ye","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,23]]},"reference":[{"key":"1690_CR1","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1186\/s13636-014-0037-2","volume":"1","author":"A Al-Haj","year":"2014","unstructured":"A. Al-Haj, An imperceptible and robust audio watermarking algorithm. EURASIP J. Audio Speech Music Process. 1, 37 (2014)","journal-title":"EURASIP J. Audio Speech Music Process."},{"key":"1690_CR2","first-page":"37","volume":"8","author":"AT Abbasi","year":"2015","unstructured":"A.T. Abbasi, N. Naqvi, A. Khan, B. Ahmad, Urdu text steganography. Util. Isolat. Lett. 8, 37\u201346 (2015)","journal-title":"Util. Isolat. Lett."},{"issue":"2\u20133","key":"1690_CR3","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s11042-010-0515-1","volume":"52","author":"V Bhat","year":"2011","unstructured":"V. Bhat, I. Sengupta, A. Das, An audio watermarking scheme using singular value decomposition (SVD) and dither-modulation quantization. Multimed. Tools Appl. 52(2\u20133), 369\u2013383 (2011)","journal-title":"Multimed. Tools Appl."},{"issue":"6","key":"1690_CR4","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1016\/j.dsp.2010.02.006","volume":"20","author":"V Bhat","year":"2010","unstructured":"V. Bhat, I. Sengupta, A. Das, An adaptive audio watermarking based on the singular value decomposition in the wavelet domain. Digital Signal Process. 20(6), 1547\u20131558 (2010)","journal-title":"Digital Signal Process."},{"key":"1690_CR5","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1007\/s00034-010-9255-8","volume":"30","author":"KV Bhat","year":"2011","unstructured":"K.V. Bhat, I. Sengupta, A. Das, A new audio watermarking scheme based on singular value decomposition (SVD) and quantization. Circ. Syst. Signal Process. 30, 915\u2013927 (2011)","journal-title":"Circ. Syst. Signal Process."},{"issue":"5","key":"1690_CR6","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1016\/j.csi.2008.09.031","volume":"31","author":"G Bhatnagar","year":"2009","unstructured":"G. Bhatnagar, B. Raman, A new robust reference watermarking scheme based on DWT-SVD. Comput. Stand. Interfaces 31(5), 1002\u20131013 (2009)","journal-title":"Comput. Stand. Interfaces"},{"issue":"4","key":"1690_CR7","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B Chen","year":"2001","unstructured":"B. Chen, G.W. Wornell, quantization index modulation a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423\u20131443 (2001)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"1690_CR8","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/TASL.2007.913022","volume":"16","author":"O Chen","year":"2008","unstructured":"O. Chen, W. Wu, highly robust, secure, and perceptual-quality echo hiding scheme. IEEE Trans. Speech Audio Process. 16(3), 629\u2013638 (2008)","journal-title":"IEEE Trans. Speech Audio Process."},{"issue":"5","key":"1690_CR9","doi-asserted-by":"publisher","first-page":"323","DOI":"10.6029\/smartcr.2013.05.003","volume":"3","author":"AK Chowdhury","year":"2013","unstructured":"A.K. Chowdhury, A. Kumar, M.I. Han, A tutorial for audio watermarking in the cepstrum domain. SmartCR 3(5), 323\u2013335 (2013)","journal-title":"SmartCR"},{"key":"1690_CR10","first-page":"9","volume":"4","author":"JC Dagadu","year":"2017","unstructured":"J.C. Dagadu, J. Li, E.O. Aboagye, X. Ge, Chaotic medical image encryption based on arnold transformation and pseudo-randomly enhanced logistic map. Structure. 4, 9 (2017)","journal-title":"Structure."},{"key":"1690_CR11","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.compeleceng.2019.01.017","volume":"74","author":"JJ Garcia-Hernandez","year":"2019","unstructured":"J.J. Garcia-Hernandez, J.J. Gomez-Ricardez, Hardware architecture for an audio fingerprinting system. Comput. Electr. Eng. 74, 210\u2013222 (2019)","journal-title":"Comput. Electr. Eng."},{"key":"1690_CR12","doi-asserted-by":"publisher","first-page":"71699","DOI":"10.1109\/ACCESS.2018.2882405","volume":"6","author":"M Gonzalez-Lee","year":"2018","unstructured":"M. Gonzalez-Lee et al., Exploring the Cross-correlation as a means for detecting digital watermarks and its reformulation into the fractional calculus framework. IEEE Access. 6, 71699\u201371718 (2018)","journal-title":"IEEE Access."},{"key":"1690_CR13","first-page":"23","volume":"1","author":"MI Hossain","year":"2020","unstructured":"M.I. Hossain, M.S. Islam, M.T. Khatun, R. Ullah, A. Masood, Z. Ye, Dual-transform source separation using sparse non-negative matrix factorization. Circuits Syst. Signal Process. 1, 23 (2020)","journal-title":"Circuits Syst. Signal Process."},{"key":"1690_CR14","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.sigpro.2016.04.005","volume":"128","author":"G Hua","year":"2016","unstructured":"G. Hua, J. Huang, Y.Q. Shi, J. Goh, V.L. Thing, Twenty years of digital audio watermarking\u2014a comprehensive review. Signal Process. 128, 222\u2013242 (2016)","journal-title":"Signal Process."},{"key":"1690_CR15","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.sigpro.2018.02.001","volume":"147","author":"HT Hu","year":"2018","unstructured":"H.T. Hu, J.R. Chang, S.J. Lin, Synchronous blind audio watermarking via shape configuration of sorted LWT coefficient magnitudes. Signal Process. 147, 190\u2013202 (2018)","journal-title":"Signal Process."},{"key":"1690_CR16","doi-asserted-by":"publisher","first-page":"180395","DOI":"10.1109\/ACCESS.2019.2958095","volume":"7","author":"H-T Hu","year":"2019","unstructured":"H.-T. Hu, T.-T. Lee, Hybrid blind audio watermarking for proprietary protection, tamper proofing, and self-recovery. IEEE Access 7, 180395\u2013180408 (2019)","journal-title":"IEEE Access"},{"key":"1690_CR17","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.sigpro.2014.11.011","volume":"109","author":"HT Hu","year":"2015","unstructured":"H.T. Hu, L.Y. Hsu, Robust transparent and high capacity audio watermarking in DCT domain. Signal Process. 109, 226\u2013235 (2015)","journal-title":"Signal Process."},{"issue":"6","key":"1690_CR18","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/s11265-019-01480-7","volume":"92","author":"MS Islam","year":"2020","unstructured":"M.S. Islam, T.H. AlMahmud, W.U. Khan, Z. Ye, Supervised single-channel speech enhancement based on stationary wavelet transforms and non-negative matrix factorization with concatenated framing process and subband smooth ratio mask. J. Signal Process. Syst. 92(6), 445\u2013458 (2020)","journal-title":"J. Signal Process. Syst."},{"key":"1690_CR19","doi-asserted-by":"publisher","first-page":"353","DOI":"10.3390\/electronics8030353","volume":"3","author":"MS Islam","year":"2019","unstructured":"M.S. Islam, T.H. Al Mahmud, W.U. Khan, Z. Ye, Supervised single-channel speech enhancement based on dual-tree complex wavelet transforms and nonnegative matrix factorization using the joint learning process and subband smooth ratio mask. Electronics 3, 353 (2019)","journal-title":"Electronics"},{"key":"1690_CR20","doi-asserted-by":"publisher","first-page":"102697","DOI":"10.1016\/j.dsp.2020.102697","volume":"100","author":"MS Islam","year":"2020","unstructured":"M.S. Islam, Z. Yuanyuan, H.M. Imran, U. Rizwan, Z. Ye, Supervised single channel dual domains speech enhancement using sparse non-negative matrix factorization. Digital Signal Process. 100, 102697 (2020)","journal-title":"Digital Signal Process."},{"key":"1690_CR21","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-981-10-3773-3_42","volume":"554","author":"R Jain","year":"2018","unstructured":"R. Jain, M.C. Trivedi, S. Tiwari, Digital audio watermarking: a survey. Adv. Comput. Comput. Sci. 554, 433\u2013443 (2018)","journal-title":"Adv. Comput. Comput. Sci."},{"key":"1690_CR22","first-page":"21","volume":"58","author":"S Jose","year":"2012","unstructured":"S. Jose, R.C. Roy, S. Nambiar, Robust image watermarking based on DCT-DWT-SVD method. Int. J. Comput. Appl. 58, 21 (2012)","journal-title":"Int. J. Comput. Appl."},{"key":"1690_CR23","first-page":"1","volume":"11","author":"A Joseph","year":"2013","unstructured":"A. Joseph, K. Anusudha, Robust watermarking based on DWT SVD. Int. J. Signal Image Process. 11, 1\u20135 (2013)","journal-title":"Int. J. Signal Image Process."},{"key":"1690_CR24","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1186\/s13636-018-0139-3","volume":"1","author":"A Kanhe","year":"2018","unstructured":"A. Kanhe, A. Gnanasekaran, Robust image-in-audio watermarking technique based on DCT-SVD transforms. EURASIP J. Audio Speech Music Process. 1, 16 (2018)","journal-title":"EURASIP J. Audio Speech Music Process."},{"issue":"3","key":"1690_CR25","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s10470-018-1332-0","volume":"99","author":"H Karajeh","year":"2019","unstructured":"H. Karajeh, M. Maqableh, An imperceptible, robust, and high payload capacity audio watermarking scheme based on the DCT transformation and Schur decomposition. Analog Integr. Circ. Sig. Process 99(3), 571\u2013583 (2019)","journal-title":"Analog Integr. Circ. Sig. Process"},{"issue":"6","key":"1690_CR26","doi-asserted-by":"publisher","first-page":"7005","DOI":"10.1007\/s11042-018-6450-2","volume":"78","author":"CV Kumar","year":"2019","unstructured":"C.V. Kumar, V. Natarajan, K. Nirmala, T. Balasubramanian, K.R. Rao, S. Krishnan, Encrypted separable reversible watermarking with authentication and error correction. Multimed. Tools Appl. 78(6), 7005\u20137027 (2019)","journal-title":"Multimed. Tools Appl."},{"key":"1690_CR27","doi-asserted-by":"publisher","first-page":"14481","DOI":"10.1007\/s11042-017-5024-z","volume":"77","author":"JF Li","year":"2018","unstructured":"J.F. Li, H.X. Wang, T. Wu, X.M. Sun, Q. Qian, Norm ratio-based audio watermarking scheme in DWT domain. Multimed. Tools Appl. 77, 14481\u201314497 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"1690_CR28","first-page":"4","volume":"21","author":"H Liu","year":"2019","unstructured":"H. Liu, B. Zhao, L. Huang, Quantum image encryption scheme using Arnold transform and S-box scrambling. Entropy 21, 4\u2013343 (2019)","journal-title":"Entropy"},{"key":"1690_CR29","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1007\/s00034-019-01200-3","volume":"39","author":"JE Lav\u00edn-Delgado","year":"2019","unstructured":"J.E. Lav\u00edn-Delgado, J.E. Sol\u00eds-P\u00e9rez, J.F. G\u00f3mez-Aguilar et al., A new fractional-order mask for image edge detection based on caputo-fabrizio fractional-order derivative without singular kernel. Circuits Syst. Signal Process. 39, 1419\u20131448 (2019)","journal-title":"Circuits Syst. Signal Process."},{"key":"1690_CR30","doi-asserted-by":"publisher","first-page":"2176","DOI":"10.1109\/TASLP.2017.2749001","volume":"25","author":"I Natgunanathan","year":"2017","unstructured":"I. Natgunanathan, Y. Xiang, G. Hua, G. Beliakov, J. Yearwood, Patchwork-based multi-layer audio watermarking. IEEE Trans. Audio Speech Lang. Process. 25, 2176\u20132187 (2017)","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"issue":"5","key":"1690_CR31","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1016\/j.patrec.2005.09.008","volume":"27","author":"H Noda","year":"2006","unstructured":"H. Noda, M. Niimi, E. Kawaguchi, High-performance JPEG steganography using quantization index modulation in DCT domain. Pattern Recogn. Lett. 27(5), 455\u2013461 (2006)","journal-title":"Pattern Recogn. Lett."},{"issue":"2","key":"1690_CR32","doi-asserted-by":"publisher","first-page":"1563","DOI":"10.1007\/s11277-018-5868-1","volume":"103","author":"N Nuzhat","year":"2018","unstructured":"N. Nuzhat, A.T. Abbasi, R. Hussain, M.A. Khan, B. Ahmad, Multilayer partially homomorphic encryption text steganography (MLPHE-TS): a zero steganography approach. Wirel. Pers. Commun. 103(2), 1563\u20131585 (2018)","journal-title":"Wirel. Pers. Commun."},{"key":"1690_CR33","doi-asserted-by":"crossref","unstructured":"H. Ozer, B. Sankur, N. Memon, An SVD-based audio watermarking technique. in ACM Workshop on Multimedia and Security, p. 51\u201356 (2005)","DOI":"10.1145\/1073170.1073180"},{"key":"1690_CR34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11042-018-6670-5","volume":"78","author":"SM Pour Hashemi","year":"2019","unstructured":"S.M. Pour Hashemi, M. Mosleh, Y. Erfani, Audio watermarking based on synergy between lucas regular sequence and fast Fourier transform. Multimed. Tools Appl. 78, 1\u201326 (2019)","journal-title":"Multimed. Tools Appl."},{"key":"1690_CR35","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1109\/MSP.2005.1550194","volume":"22","author":"IW Selenick","year":"2005","unstructured":"I.W. Selenick, R.G. Baraniuk, N.G. Kingsbury, The dual-tree complex wavelet transforms. IEEE Signal Process. Mag. 22, 123\u2013151 (2005)","journal-title":"IEEE Signal Process. Mag."},{"key":"1690_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-018-7115-x","volume":"78","author":"AK Singh","year":"2019","unstructured":"A.K. Singh, Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimed. Tools Appl. 78, 1\u201311 (2019)","journal-title":"Multimed. Tools Appl."},{"issue":"4","key":"1690_CR37","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s40009-014-0241-8","volume":"37","author":"AK Singh","year":"2014","unstructured":"A.K. Singh, M. Dave, A. Mohan, Hybrid technique for robust and imperceptible image watermarking in DWT\u2013DCT\u2013SVD domain. Natl. Acad. Sci. Lett. 37(4), 351\u2013358 (2014)","journal-title":"Natl. Acad. Sci. Lett."},{"key":"1690_CR38","doi-asserted-by":"publisher","first-page":"7","DOI":"10.3390\/sym10070284","volume":"10","author":"Q Wu","year":"2018","unstructured":"Q. Wu, M. Wu, Adaptive and blind audio watermarking algorithm based on chaotic encryption in hybrid domain. Symmetry 10, 7\u2013284 (2018)","journal-title":"Symmetry"},{"key":"1690_CR39","first-page":"5","volume":"8","author":"Q Wu","year":"2018","unstructured":"Q. Wu, M. Wu, A novel robust audio watermarking algorithm by modifying the average amplitude in transform domain. Appl. Sci. 8, 5\u2013723 (2018)","journal-title":"Appl. Sci."},{"key":"1690_CR40","first-page":"834","volume":"38","author":"QL Wu","year":"2016","unstructured":"Q.L. Wu, M. Wu, Novel audio information hiding algorithm based on wavelet transform. J. Electron. Inf. Technol. 38, 834\u2013840 (2016)","journal-title":"J. Electron. Inf. Technol."},{"issue":"12","key":"1690_CR41","doi-asserted-by":"publisher","first-page":"4835","DOI":"10.1109\/TSP.2006.881258","volume":"54","author":"X Wang","year":"2006","unstructured":"X. Wang, H. Zhao, A novel synchronization invariant audio watermarking scheme based on DWT and DCT. IEEE Trans. Signal Process. 54(12), 4835\u20134840 (2006)","journal-title":"IEEE Trans. Signal Process."},{"issue":"12","key":"1690_CR42","doi-asserted-by":"publisher","first-page":"2228","DOI":"10.1109\/TASLP.2015.2476755","volume":"23","author":"Y Xiang","year":"2015","unstructured":"Y. Xiang, I. Natgunanathan, Y. Rong, S. Guo, Spread spectrum-based high embedding capacity watermarking method for audio signals. IEEE\/ACM Trans. Audio Speech Lang. Process. 23(12), 2228\u20132237 (2015)","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"issue":"19","key":"1690_CR43","doi-asserted-by":"publisher","first-page":"28003","DOI":"10.1007\/s11042-019-07902-9","volume":"78","author":"L Zhang","year":"2019","unstructured":"L. Zhang, D. Wei, Dual DCT-DWT-SVD digital watermarking algorithm based on particle swarm optimization. Multimed. Tools Appl. 78(19), 28003\u201328023 (2019)","journal-title":"Multimed. Tools Appl."},{"key":"1690_CR44","doi-asserted-by":"crossref","unstructured":"L. Zhang, Z. Huang, X. Cao, A digital audio watermarking algorithm based on block encoding. in Proceedings of International Conference on Wireless Communications and Signal Processing, p. 1\u20135 (2011)","DOI":"10.1109\/WCSP.2011.6096942"}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-021-01690-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-021-01690-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-021-01690-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T05:33:43Z","timestamp":1675056823000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-021-01690-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,23]]},"references-count":44,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["1690"],"URL":"https:\/\/doi.org\/10.1007\/s00034-021-01690-0","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,23]]},"assertion":[{"value":"7 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}