{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:02:34Z","timestamp":1740135754679,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T00:00:00Z","timestamp":1708560000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T00:00:00Z","timestamp":1708560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1007\/s00034-024-02618-0","type":"journal-article","created":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T07:03:51Z","timestamp":1708585431000},"page":"3297-3323","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Artificial Intelligence Approach for Tuning Speech-Adaptive Watermarking using Higher-Order Statistics (HOS)"],"prefix":"10.1007","volume":"43","author":[{"given":"Xin","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8927-5929","authenticated-orcid":false,"given":"Mohammad Ali","family":"Nematollahi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,22]]},"reference":[{"issue":"8","key":"2618_CR1","doi-asserted-by":"publisher","first-page":"2487","DOI":"10.1016\/j.sigpro.2010.02.013","volume":"90","author":"MA Akhaee","year":"2010","unstructured":"M.A. Akhaee, N.K. Kalantari, F. Marvasti, Robust audio and speech watermarking using Gaussian and Laplacian modeling. Signal Process. 90(8), 2487\u20132497 (2010)","journal-title":"Signal Process."},{"issue":"1","key":"2618_CR2","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1186\/s40537-023-00727-2","volume":"10","author":"L Alzubaidi","year":"2023","unstructured":"L. Alzubaidi et al., A survey on deep learning tools dealing with data scarcity: definitions, challenges, solutions, tips, and applications. J. Big Data 10(1), 46 (2023)","journal-title":"J. Big Data"},{"key":"2618_CR3","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.comcom.2022.02.023","volume":"188","author":"P Amrit","year":"2022","unstructured":"P. Amrit, A.K. Singh, Survey on watermarking methods in the artificial intelligence domain and beyond. Comput. Commun. 188, 52\u201365 (2022)","journal-title":"Comput. Commun."},{"key":"2618_CR4","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s11042-019-07941-2","volume":"79","author":"P Bhinder","year":"2020","unstructured":"P. Bhinder, N. Jindal, K. Singh, An improved robust image-adaptive watermarking with two watermarks using statistical decoder. Multimed. Tools Appl. 79, 183\u2013217 (2020)","journal-title":"Multimed. Tools Appl."},{"issue":"2","key":"2618_CR5","doi-asserted-by":"publisher","first-page":"277","DOI":"10.18178\/ijmlc.2020.10.2.932","volume":"10","author":"F Deeba","year":"2020","unstructured":"F. Deeba et al., Digital watermarking using deep neural network. Int. J. Mach. Learn. Comput. 10(2), 277\u2013282 (2020)","journal-title":"Int. J. Mach. Learn. Comput."},{"issue":"7","key":"2618_CR6","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/LSP.2003.813679","volume":"10","author":"S Gazor","year":"2003","unstructured":"S. Gazor, W. Zhang, Speech probability distribution. IEEE Signal Process. Lett. 10(7), 204\u2013207 (2003)","journal-title":"IEEE Signal Process. Lett."},{"key":"2618_CR7","unstructured":"C. Gu et al., Watermarking pre-trained language models with backdooring. arXiv preprint arXiv:2210.07543 (2022)"},{"key":"2618_CR8","unstructured":"C.C. Hsu, Synthesizing personalized non-speech vocalization from discrete speech representations. arXiv preprint arXiv:2206.12662 (2022). Available: https:\/\/www.resemble.ai\/neural-speech-watermarker"},{"issue":"4","key":"2618_CR9","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1093\/biomet\/asp053","volume":"96","author":"MC Jones","year":"2009","unstructured":"M.C. Jones, A. Pewsey, Sinh-arcsinh distributions. Biometrika 96(4), 761\u2013780 (2009)","journal-title":"Biometrika"},{"key":"2618_CR10","volume-title":"Stochastic Digital Control System Techniques: Advances in Theory and Applications","author":"CT Leondes","year":"1996","unstructured":"C.T. Leondes, Stochastic Digital Control System Techniques: Advances in Theory and Applications (Academic Press, 1996)"},{"key":"2618_CR11","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.neucom.2021.07.051","volume":"461","author":"Y Li","year":"2021","unstructured":"Y. Li, H. Wang, M. Barni, A survey of deep neural network watermarking techniques. Neurocomputing 461, 171\u2013193 (2021)","journal-title":"Neurocomputing"},{"key":"2618_CR12","doi-asserted-by":"publisher","first-page":"107584","DOI":"10.1016\/j.sigpro.2020.107584","volume":"173","author":"X Liang","year":"2020","unstructured":"X. Liang, S. Xiang, Robust reversible audio watermarking based on high-order difference statistics. Signal Process. 173, 107584 (2020)","journal-title":"Signal Process."},{"key":"2618_CR13","doi-asserted-by":"crossref","unstructured":"S. Lounici et al. Yes we can: watermarking machine learning models beyond classification, in 2021 IEEE 34th Computer Security Foundations Symposium (CSF). IEEE (2021)","DOI":"10.1109\/CSF51468.2021.00044"},{"issue":"10","key":"2618_CR14","doi-asserted-by":"publisher","first-page":"1246","DOI":"10.3390\/e23101246","volume":"23","author":"CO Mawalim","year":"2021","unstructured":"C.O. Mawalim, M. Unoki, Speech watermarking method using McAdams coefficient based on random forest learning. Entropy 23(10), 1246 (2021)","journal-title":"Entropy"},{"key":"2618_CR15","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1966.10490365","volume-title":"Probability, Random Variables, and Stochastic Processes","author":"I Miller","year":"1966","unstructured":"I. Miller, Probability, Random Variables, and Stochastic Processes (JSTOR, 1966)"},{"key":"2618_CR16","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.neucom.2019.01.067","volume":"337","author":"S-M Mun","year":"2019","unstructured":"S.-M. Mun et al., Finding robust domain from attacks: a learning framework for blind watermarking. Neurocomputing 337, 191\u2013202 (2019)","journal-title":"Neurocomputing"},{"key":"2618_CR17","doi-asserted-by":"crossref","unstructured":"M.A. Nematollahi, Digital speech watermarking for online speaker recognition systems (2015)","DOI":"10.1186\/s13636-015-0074-5"},{"key":"2618_CR18","doi-asserted-by":"publisher","DOI":"10.1080\/14488388.2023.2200051","author":"MA Nematollahi","year":"2023","unstructured":"M.A. Nematollahi, A machine learning approach for digital watermarking. Aust. J. Multi Discipl. Eng. (2023). https:\/\/doi.org\/10.1080\/14488388.2023.2200051","journal-title":"Aust. J. Multi Discipl. Eng."},{"key":"2618_CR19","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s40009-016-0430-8","volume":"39","author":"MA Nematollahi","year":"2016","unstructured":"M.A. Nematollahi et al., Speaker frame selection for digital speech watermarking. Natl. Acad. Sci. Lett. 39, 197\u2013201 (2016)","journal-title":"Natl. Acad. Sci. Lett."},{"key":"2618_CR20","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/s10772-013-9192-6","volume":"16","author":"MA Nematollahi","year":"2013","unstructured":"M.A. Nematollahi, S.A.R. Al-Haddad, An overview of digital speech watermarking. Int. J. Speech Technol. 16, 471\u2013488 (2013)","journal-title":"Int. J. Speech Technol."},{"key":"2618_CR21","doi-asserted-by":"publisher","first-page":"7251","DOI":"10.1007\/s11042-016-3350-1","volume":"76","author":"MA Nematollahi","year":"2017","unstructured":"M.A. Nematollahi et al., Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition. Multimed. Tools Appl. 76, 7251\u20137281 (2017)","journal-title":"Multimed. Tools Appl."},{"key":"2618_CR22","doi-asserted-by":"crossref","unstructured":"M.A. Nematollahi, C. Vorakulpipat, H. Gamboa Rosales, Optimization of a blind speech watermarking technique against amplitude scaling. Secur. Commun. Netw. 2017 (2017)","DOI":"10.1155\/2017\/5454768"},{"key":"2618_CR23","doi-asserted-by":"crossref","unstructured":"M.A. Nematollahi, C. Vorakulpipat, H. Gamboa Rosales, Semifragile speech watermarking based on least significant bit replacement of line spectral frequencies. Math. Probl. Eng. 2017 (2017)","DOI":"10.1155\/2017\/3597695"},{"key":"2618_CR24","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/s40010-017-0371-8","volume":"87","author":"MA Nematollahi","year":"2017","unstructured":"M.A. Nematollahi et al., Digital speech watermarking based on linear predictive analysis and singular value decomposition. Proc. Natl. Acad. Sci. India Sect. A 87, 433\u2013446 (2017)","journal-title":"Proc. Natl. Acad. Sci. India Sect. A"},{"key":"2618_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-2095-7","volume-title":"Digital Watermarking","author":"MA Nematollahi","year":"2017","unstructured":"M.A. Nematollahi, C. Vorakulpipat, H.G. Rosales, Digital Watermarking (Springer, 2017)"},{"key":"2618_CR26","doi-asserted-by":"publisher","first-page":"103381","DOI":"10.1016\/j.dsp.2021.103381","volume":"122","author":"K Pavlovi\u0107","year":"2022","unstructured":"K. Pavlovi\u0107 et al., Robust speech watermarking by a jointly trained embedder and detector using a DNN. Digital Signal Process. 122, 103381 (2022)","journal-title":"Digital Signal Process."},{"issue":"10","key":"2618_CR27","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.3390\/electronics11101565","volume":"11","author":"M P\u0142achta","year":"2022","unstructured":"M. P\u0142achta et al., Detection of image steganography using deep learning and ensemble classifiers. Electronics 11(10), 1565 (2022)","journal-title":"Electronics"},{"issue":"1","key":"2618_CR28","doi-asserted-by":"publisher","first-page":"2008613","DOI":"10.1080\/08839514.2021.2008613","volume":"36","author":"P Rathi","year":"2022","unstructured":"P. Rathi, S. Bhadauria, S. Rathi, Watermarking of deep recurrent neural network using adversarial examples to protect intellectual property. Appl. Artif. Intell. 36(1), 2008613 (2022)","journal-title":"Appl. Artif. Intell."},{"key":"2618_CR29","unstructured":"M. Steinebach et al. StirMark benchmark: audio watermarking attacks, in Proceedings International Conference on Information Technology: Coding and Computing. IEEE (2001)"},{"key":"2618_CR30","unstructured":"S. Sun et al. Detect and remove watermark in deep neural networks via generative adversarial networks. in Information Security: 24th International Conference, ISC 2021, Virtual Event, November 10\u201312, 2021, Proceedings 24. Springer (2021)"},{"key":"2618_CR31","unstructured":"L. Tegendal, Watermarking in audio using deep learning (2019)"},{"issue":"4","key":"2618_CR32","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/18.335960","volume":"40","author":"S Verd\u00fa","year":"1994","unstructured":"S. Verd\u00fa, A general formula for channel capacity. IEEE Trans. Inf. Theory 40(4), 1147\u20131157 (1994)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2618_CR33","doi-asserted-by":"publisher","first-page":"109096","DOI":"10.1016\/j.ress.2023.109096","volume":"233","author":"J Zhang","year":"2023","unstructured":"J. Zhang et al., An integrated multi-head dual sparse self-attention network for remaining useful life prediction. Reliab. Eng. Syst. Saf. 233, 109096 (2023)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"2618_CR34","doi-asserted-by":"publisher","DOI":"10.1109\/TPEL.2023.3275791","author":"J Zhang","year":"2023","unstructured":"J. Zhang et al., Lifetime extension approach based on Levenberg-Marquardt neural network and power routing of DC\u2013DC converters. IEEE Trans. Power Electron. (2023). https:\/\/doi.org\/10.1109\/TPEL.2023.3275791","journal-title":"IEEE Trans. Power Electron."},{"key":"2618_CR35","first-page":"1","volume":"72","author":"J Zhang","year":"2022","unstructured":"J. Zhang et al., A parallel hybrid neural network with integration of spatial and temporal features for remaining useful life prediction in prognostics. IEEE Trans. Instrum. Meas. 72, 1\u201312 (2022)","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"2618_CR36","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3232147","author":"J Zhang","year":"2023","unstructured":"J. Zhang et al., An integrated multitasking intelligent bearing fault diagnosis scheme based on representation learning under imbalanced sample condition. IEEE Trans. Neural Netw. Learn. Syst. (2023). https:\/\/doi.org\/10.1109\/TNNLS.2022.3232147","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"2618_CR37","volume-title":"Convex Transformations of Random Variables","author":"WR Zwet","year":"1964","unstructured":"W.R. Zwet, Convex Transformations of Random Variables (Mathematisch Centrum, Amsterdam, 1964)"}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-024-02618-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-024-02618-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-024-02618-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,30]],"date-time":"2024-03-30T12:05:47Z","timestamp":1711800347000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-024-02618-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,22]]},"references-count":37,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["2618"],"URL":"https:\/\/doi.org\/10.1007\/s00034-024-02618-0","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"type":"print","value":"0278-081X"},{"type":"electronic","value":"1531-5878"}],"subject":[],"published":{"date-parts":[[2024,2,22]]},"assertion":[{"value":"17 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}