{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T18:28:00Z","timestamp":1769884080927,"version":"3.49.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001409","name":"Department of Science and Technology, Government of India","doi-asserted-by":"crossref","award":["DST\/TDT\/SHRI-33\/2018."],"award-info":[{"award-number":["DST\/TDT\/SHRI-33\/2018."]}],"id":[{"id":"10.13039\/501100001409","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s00034-023-02475-3","type":"journal-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T18:02:14Z","timestamp":1693332134000},"page":"348-367","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Robust Audio Watermarking Based on Iterative Filtering"],"prefix":"10.1007","volume":"43","author":[{"given":"Kamran I.","family":"Naqash","sequence":"first","affiliation":[]},{"given":"Shahid A.","family":"Malik","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5983-0912","authenticated-orcid":false,"given":"Shabir A.","family":"Parah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"key":"2475_CR1","unstructured":"A.F. Abdelnour, I.W. Selesnick, Design of 2-band orthogonal near-symmetric CQF, in 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221) (2001)."},{"issue":"9","key":"2475_CR2","first-page":"5617","volume":"79","author":"KM Abdelwahab","year":"2019","unstructured":"K.M. Abdelwahab, S.M. Abd El-atty, W. El-Shafai, S. El-Rabaie, F.E. Abd El-Samie, Efficient SVD-based audio watermarking technique in FRT domain. Multimed. Tools Appl. 79(9), 5617\u20135648 (2019)","journal-title":"Multimed. Tools Appl."},{"key":"2475_CR3","first-page":"102472","volume":"52","author":"P Ayubi","year":"2020","unstructured":"P. Ayubi, S. Setayeshi, A.M. Rahmani, Deterministic Chaos Game: a new fractal based pseudo-random number generator and its cryptographic application. J. Inf. Secur. Appl. 52, 102472 (2020)","journal-title":"J. Inf. Secur. Appl."},{"issue":"2","key":"2475_CR4","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s00371-020-01808-6","volume":"37","author":"S Bagheri Baba Ahmadi","year":"2020","unstructured":"S. Bagheri Baba Ahmadi, G. Zhang, S. Wei, L. Boukela, An intelligent and blind image watermarking scheme based on hybrid SVD transforms using human visual system characteristics. Vis. Comput. 37(2), 385\u2013409 (2020)","journal-title":"Vis. Comput."},{"issue":"2\u20133","key":"2475_CR5","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s11042-010-0515-1","volume":"52","author":"KV Bhat","year":"2010","unstructured":"K.V. Bhat, I. Sengupta, A. Das, An audio watermarking scheme using singular value decomposition and dither-modulation quantization. Multimed. Tools Appl. 52(2\u20133), 369\u2013383 (2010). https:\/\/doi.org\/10.1007\/s11042-010-0515-1","journal-title":"Multimed. Tools Appl."},{"key":"2475_CR6","doi-asserted-by":"publisher","first-page":"12654","DOI":"10.1109\/ACCESS.2022.3145950","volume":"10","author":"M Charfeddine","year":"2022","unstructured":"M. Charfeddine, E. Mezghani, S. Masmoudi, C.B. Amar, H. Alhumyani, Audio watermarking for security and non-security applications. IEEE Access 10, 12654\u201312677 (2022)","journal-title":"IEEE Access"},{"issue":"3","key":"2475_CR7","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1007\/s11075-019-00838-z","volume":"85","author":"A Cicone","year":"2020","unstructured":"A. Cicone, Iterative filtering as a direct method for the decomposition of nonstationary signals. Numer. Algorithms 85(3), 811\u2013827 (2020)","journal-title":"Numer. Algorithms"},{"issue":"1","key":"2475_CR8","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1179\/1743131X11Y.0000000049","volume":"61","author":"F Golshan","year":"2013","unstructured":"F. Golshan, K. Mohammadi, A hybrid intelligent SVD-based perceptual shaping of a digital image watermark in DCT and DWT domain. Imaging Sci. J. 61(1), 35\u201346 (2013)","journal-title":"Imaging Sci. J."},{"key":"2475_CR9","first-page":"102509","volume":"53","author":"M Jafari Barani","year":"2020","unstructured":"M. Jafari Barani, P. Ayubi, M. Yousefi Valandar, B.Y. Irani, A new pseudo random number generator based on generalized Newton Complex Map with dynamic key. J. Inf. Secur. Appl. 53, 102509 (2020)","journal-title":"J. Inf. Secur. Appl."},{"issue":"3","key":"2475_CR10","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s10470-018-1332-0","volume":"99","author":"H Karajeh","year":"2018","unstructured":"H. Karajeh, M. Maqableh, An imperceptible, robust, and high payload capacity audio watermarking scheme based on the DCT transformation and Schur decomposition. Analog Integr. Circuits Signal Process. 99(3), 571\u2013583 (2018)","journal-title":"Analog Integr. Circuits Signal Process."},{"issue":"5","key":"2475_CR11","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1504\/IJCVR.2020.109389","volume":"10","author":"A Khaldi","year":"2020","unstructured":"A. Khaldi, A lossless blind image data hiding scheme for semi-fragile image watermark. Int. J. Comput. Vis. Robotics 10(5), 373 (2020)","journal-title":"Int. J. Comput. Vis. Robotics"},{"key":"2475_CR12","doi-asserted-by":"publisher","first-page":"46194","DOI":"10.1109\/ACCESS.2018.2866153","volume":"6","author":"O-J Kwon","year":"2018","unstructured":"O.-J. Kwon, S. Choi, B. Lee, A watermark-based scheme for authenticating JPEG image integrity. IEEE Access 6, 46194\u201346205 (2018)","journal-title":"IEEE Access"},{"issue":"3","key":"2475_CR13","doi-asserted-by":"publisher","first-page":"100","DOI":"10.17743\/jaes.2022.0067","volume":"71","author":"W-H Lai","year":"2023","unstructured":"W.-H. Lai, T.-Y. Chou, M.-C. Chou, B.W. Schuller, Robust Audio Watermarking based on empirical mode decomposition and group differential relations. J. Audio Eng. Soc. 71(3), 100\u2013117 (2023)","journal-title":"J. Audio Eng. Soc."},{"key":"2475_CR14","doi-asserted-by":"publisher","first-page":"8357251","DOI":"10.1155\/2019\/8357251","volume":"2019","author":"YS Lee","year":"2019","unstructured":"Y.S. Lee, Y.H. Seo, D.W. Kim, Blind image watermarking based on adaptive data spreading in n-Level DWT sub-bands. Secur. Commun. Netw. 2019, 8357251 (2019)","journal-title":"Secur. Commun. Netw."},{"issue":"9","key":"2475_CR15","doi-asserted-by":"publisher","first-page":"1985","DOI":"10.1016\/j.sigpro.2011.12.021","volume":"92","author":"B Lei","year":"2012","unstructured":"B. Lei, I. Yann Soon, F. Zhou, Z. Li, H. Lei, A robust audio watermarking scheme based on lifting wavelet transform and singular value decomposition. Signal Process. 92(9), 1985\u20132001 (2012)","journal-title":"Signal Process."},{"issue":"04","key":"2475_CR16","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1142\/S179353690900028X","volume":"01","author":"L Lin","year":"2009","unstructured":"L. Lin, Y. Wang, H. Zhou, Iterative filtering as an alternative algorithm for empirical mode decomposition. Adv. Adapt. Data Anal. 01(04), 543\u2013560 (2009)","journal-title":"Adv. Adapt. Data Anal."},{"key":"2475_CR17","doi-asserted-by":"publisher","first-page":"1441","DOI":"10.1016\/j.procs.2018.05.076","volume":"132","author":"Poonam","year":"2018","unstructured":"Poonam, S.M. Arora, A DWT-SVD based robust digital watermarking for digital images. Procedia Comput. Sci. 132, 1441\u20131448 (2018)","journal-title":"Procedia Comput. Sci."},{"issue":"16","key":"2475_CR18","doi-asserted-by":"publisher","first-page":"22883","DOI":"10.1007\/s11042-019-7595-3","volume":"78","author":"SM Pourhashemi","year":"2019","unstructured":"S.M. Pourhashemi, M. Mosleh, Y. Erfani, Audio Watermarking based on synergy between Lucas regular sequence and fast Fourier transform. Multimed. Tools Appl. 78(16), 22883\u201322908 (2019)","journal-title":"Multimed. Tools Appl."},{"key":"2475_CR19","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.sigpro.2018.08.011","volume":"154","author":"S Saadi","year":"2019","unstructured":"S. Saadi, A. Merrad, A. Benziane, Novel secured scheme for blind audio\/speech norm-space watermarking by Arnold algorithm. Signal Process. 154, 74\u201386 (2019)","journal-title":"Signal Process."},{"key":"2475_CR20","doi-asserted-by":"publisher","first-page":"107652","DOI":"10.1016\/j.apacoust.2020.107652","volume":"172","author":"E Salah","year":"2021","unstructured":"E. Salah, K. Amine, K. Redouane, K. Fares, A Fourier transform based audio watermarking algorithm. Appl. Acoust. 172, 107652 (2021)","journal-title":"Appl. Acoust."},{"issue":"4","key":"2475_CR21","doi-asserted-by":"publisher","first-page":"3995","DOI":"10.1007\/s13369-019-03751-8","volume":"44","author":"DG Savakar","year":"2019","unstructured":"D.G. Savakar, A. Ghuil, Robust invisible digital image watermarking using hybrid scheme. Arab. J. Sci. Eng. 44(4), 3995\u20134008 (2019)","journal-title":"Arab. J. Sci. Eng."},{"key":"2475_CR22","doi-asserted-by":"crossref","unstructured":"P. Singh, P.K. Srivastava, R.K. Patney, S.D. Joshi, K. Saha, Nonpolynomial spline based empirical mode decomposition, in 2013 International Conference on Signal Processing and Communication (ICSC) (2013).","DOI":"10.1109\/ICSPCom.2013.6719829"},{"issue":"4","key":"2475_CR23","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1016\/j.sigpro.2012.11.003","volume":"93","author":"X Wang","year":"2013","unstructured":"X. Wang, P. Wang, P. Zhang, S. Xu, H. Yang, A norm-space, adaptive, and Blind Audio Watermarking algorithm by discrete wavelet transform. Signal Process. 93(4), 913\u2013922 (2013)","journal-title":"Signal Process."},{"key":"2475_CR24","doi-asserted-by":"crossref","unstructured":"X. Wen, X. Ding, J. Li, L. Gao, H. Sun, An audio watermarking algorithm based on Fast Fourier transform, in 2009 International Conference on Information Management, Innovation Management and Industrial Engineering (2009).","DOI":"10.1109\/ICIII.2009.95"},{"issue":"5","key":"2475_CR25","first-page":"751","volume":"21","author":"W Wu","year":"2019","unstructured":"W. Wu, A novel SVD and LWT based robust blind audio watermarking scheme. Int. J. Netw. Secur. 21(5), 751\u2013759 (2019)","journal-title":"Int. J. Netw. Secur."},{"key":"2475_CR26","unstructured":"L. Xie, J. Zhang, H. He, Robust audio watermarking scheme based on nonuniform discrete Fourier transform, in 2006 IEEE International Conference on Engineering of Intelligent Systems (2006), pp. 1\u20135"},{"key":"2475_CR27","doi-asserted-by":"publisher","first-page":"117325","DOI":"10.1016\/j.eswa.2022.117325","volume":"203","author":"M Yamni","year":"2022","unstructured":"M. Yamni, H. Karmouni, M. Sayyouri, H. Qjidaa, Robust audio watermarking scheme based on fractional Charlier moment transform and dual tree complex wavelet transform. Expert Syst. Appl. 203, 117325 (2022)","journal-title":"Expert Syst. Appl."},{"key":"2475_CR28","doi-asserted-by":"crossref","unstructured":"Y. Yan, H. Rong, X. Mintao, A novel audio watermarking algorithm for copyright protection based on DCT domain. in 2009 Second International Symposium on Electronic Commerce and Security (2009).","DOI":"10.1109\/ISECS.2009.141"}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-023-02475-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-023-02475-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-023-02475-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T22:05:59Z","timestamp":1705010759000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-023-02475-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,29]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["2475"],"URL":"https:\/\/doi.org\/10.1007\/s00034-023-02475-3","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,29]]},"assertion":[{"value":"1 November 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 July 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 July 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors report no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}