{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T20:57:28Z","timestamp":1774990648032,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T00:00:00Z","timestamp":1674086400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T00:00:00Z","timestamp":1674086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s00034-022-02288-w","type":"journal-article","created":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T04:36:45Z","timestamp":1674103005000},"page":"3668-3705","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Robust Zero-Watermarking for Audio Signal Using Supervised Learning"],"prefix":"10.1007","volume":"42","author":[{"given":"Mehri","family":"Salayani","sequence":"first","affiliation":[]},{"given":"Behzad","family":"Bakhtiari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6557-5129","authenticated-orcid":false,"given":"Seyed Hossein","family":"Ghafarian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,19]]},"reference":[{"issue":"3\u20134","key":"2288_CR1","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"W. Bender, D. Gruhl, N. Morimoto, A. Lu, Techniques for data hiding. IBM Syst. J. 35(3\u20134), 313\u2013335 (1996). https:\/\/doi.org\/10.1147\/sj.353.0313","journal-title":"IBM Syst. J."},{"key":"2288_CR2","doi-asserted-by":"publisher","unstructured":"L. Boney, A.H. Tewfik, K.N. Hamdy, Digital watermarks for audio signals. in International Conference on Multimedia Computing and Systems\u2014Proceedings, (1996) pp 473\u2013480. https:\/\/doi.org\/10.1109\/mmcs.1996.535015","DOI":"10.1109\/mmcs.1996.535015"},{"issue":"February","key":"2288_CR3","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1109\/icip.2001.958299","volume":"3","author":"R Chandramouli","year":"2001","unstructured":"R. Chandramouli, N. Memon, Analysis of LSB based image steganography techniques. IEEE Int. Conf. Image Process. 3(February), 1019\u20131022 (2001). https:\/\/doi.org\/10.1109\/icip.2001.958299","journal-title":"IEEE Int. Conf. Image Process."},{"issue":"12","key":"2288_CR4","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. Image Process."},{"key":"2288_CR5","doi-asserted-by":"publisher","unstructured":"H.L. Dai, D. He, An efficient and robust zero-watermarking scheme for audio based on DWT and DCT. in 1st Asia Pacific Conference on Postgraduate Research in Microelectronics and Electronics, PrimeAsia 2009, (2009), pp 233\u2013236. https:\/\/doi.org\/10.1109\/PRIMEASIA.2009.5397403","DOI":"10.1109\/PRIMEASIA.2009.5397403"},{"key":"2288_CR6","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.sigpro.2016.04.005","volume":"128","author":"G Hua","year":"2016","unstructured":"G. Hua, J. Huang, Y.Q. Shi, J. Goh, V.L. Thing, Twenty years of digital audio watermarking\u2014a comprehensive review. Signal Process. 128, 222\u2013242 (2016). https:\/\/doi.org\/10.1016\/j.sigpro.2016.04.005","journal-title":"Signal Process."},{"key":"2288_CR7","doi-asserted-by":"publisher","unstructured":"A.E.A. Jayarani, M.R. Bhatt, D.D. Geetha, Zero watermarking on audio based on STFT. in Proceedings\u20142018 International Conference on Computing, Electronics and Communications Engineering, iCCECE 2018, (2019), pp 253\u2013256. https:\/\/doi.org\/10.1109\/iCCECOME.2018.8658846","DOI":"10.1109\/iCCECOME.2018.8658846"},{"key":"2288_CR8","unstructured":"C.V.E. Jic, Algorithms for audio watermarking and PhD thesis, University of Oulu (2004)"},{"issue":"12","key":"2288_CR9","doi-asserted-by":"publisher","first-page":"1320","DOI":"10.1631\/FITEE.1500297","volume":"17","author":"M Mosleh","year":"2016","unstructured":"M. Mosleh, H. Latifpour, M. Kheyrandish, M. Mosleh, N. Hosseinpour, A robust intelligent audio watermarking scheme using support vector machine. Front. Inf. Technol. Electr. Eng. 17(12), 1320\u20131330 (2016). https:\/\/doi.org\/10.1631\/FITEE.1500297","journal-title":"Front. Inf. Technol. Electr. Eng."},{"issue":"1","key":"2288_CR10","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.jksuci.2014.03.012","volume":"27","author":"MA Nematollahi","year":"2015","unstructured":"M.A. Nematollahi, S.A. Al-Haddad, F. Zarafshan, Blind digital speech watermarking based on Eigen-value quantization in DWT. J. King Saud Univ. Comput. Inf. Sci. 27(1), 58\u201367 (2015). https:\/\/doi.org\/10.1016\/j.jksuci.2014.03.012","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"4","key":"2288_CR11","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/79.939835","volume":"18","author":"CI Podilchuk","year":"2001","unstructured":"C.I. Podilchuk, E.J. Delp, Digital watermarking: algorithm and application. IEEE Signal Process. Mag. 18(4), 33\u201346 (2001). https:\/\/doi.org\/10.1109\/79.939835","journal-title":"IEEE Signal Process. Mag."},{"issue":"11","key":"2288_CR12","doi-asserted-by":"publisher","first-page":"6161","DOI":"10.1007\/s00521-020-05389-2","volume":"33","author":"SM Pourhashemi","year":"2021","unstructured":"S.M. Pourhashemi, M. Mosleh, Y. Erfani, A novel audio watermarking scheme using ensemble-based watermark detector and discrete wavelet transform. Neural Comput. Appl. 33(11), 6161\u20136181 (2021). https:\/\/doi.org\/10.1007\/s00521-020-05389-2","journal-title":"Neural Comput. Appl."},{"issue":"3","key":"2288_CR13","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1007\/s11042-011-0783-4","volume":"59","author":"J Singh","year":"2012","unstructured":"J. Singh, P. Garg, A.N. De, Audio watermarking based on quantization index modulation using combined perceptual masking. Multimed. Tools Appl. 59(3), 921\u2013939 (2012). https:\/\/doi.org\/10.1007\/s11042-011-0783-4","journal-title":"Multimed. Tools Appl."},{"key":"2288_CR14","doi-asserted-by":"publisher","unstructured":"M. Steinebach, F.A. Petitcolas, F. Raynal, J. Dittmann, C. Fontaine, S. Seibel, N. Fat\u00e8s, L.C. Ferri, StirMark benchmark: audio watermarking attacks. in Proceedings\u2014International Conference on Information Technology: Coding and Computing, ITCC 2001 (Itcc), (2001), pp. 49\u201354. https:\/\/doi.org\/10.1109\/ITCC.2001.918764","DOI":"10.1109\/ITCC.2001.918764"},{"key":"2288_CR15","doi-asserted-by":"publisher","unstructured":"S.M. Tsai, A robust zero-watermarking algorithm for audio based on LPCC. in ICOT 2013\u20141st International Conference on Orange Technologies, (2013), pp 63\u201366. https:\/\/doi.org\/10.1109\/ICOT.2013.6521158","DOI":"10.1109\/ICOT.2013.6521158"},{"issue":"8","key":"2288_CR16","doi-asserted-by":"publisher","first-page":"2270","DOI":"10.1109\/TASL.2007.906192","volume":"15","author":"X Wang","year":"2007","unstructured":"X. Wang, W. Qi, P. Niu, A new adaptive digital audio watermarking based on support vector regression. IEEE Trans. Audio Speech Lang. Process. 15(8), 2270\u20132277 (2007). https:\/\/doi.org\/10.1109\/TASL.2007.906192","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"key":"2288_CR17","doi-asserted-by":"publisher","first-page":"03014","DOI":"10.1051\/matecconf\/202030903014","volume":"309","author":"X Wu","year":"2020","unstructured":"X. Wu, T. Fang, Research on robust audio zero watermarking algorithm based on discrete cosine transform. MATEC Web Conf. 309, 03014 (2020). https:\/\/doi.org\/10.1051\/matecconf\/202030903014","journal-title":"MATEC Web Conf."},{"issue":"7","key":"2288_CR18","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/CC.2014.6895390","volume":"11","author":"Y Yang","year":"2014","unstructured":"Y. Yang, M. Lei, M. Cheng, B. Liu, G. Lin, D. Xiao, An audio zero-watermark scheme based on energy comparing. China Commun. 11(7), 110\u2013116 (2014). https:\/\/doi.org\/10.1109\/CC.2014.6895390","journal-title":"China Commun."},{"issue":"7","key":"2288_CR19","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/CC.2016.7559084","volume":"13","author":"Y Yu","year":"2016","unstructured":"Y. Yu, M. Lei, X. Liu, Z. Qu, C. Wang, Novel zero-watermarking scheme based on DWT-DCT. China Commun. 13(7), 122\u2013126 (2016). https:\/\/doi.org\/10.1109\/CC.2016.7559084","journal-title":"China Commun."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-022-02288-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-022-02288-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-022-02288-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T12:40:55Z","timestamp":1684154455000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-022-02288-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,19]]},"references-count":19,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["2288"],"URL":"https:\/\/doi.org\/10.1007\/s00034-022-02288-w","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,19]]},"assertion":[{"value":"10 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors don\u2019t have any conflict of interest to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}},{"value":"Not Applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}}]}}