{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T05:44:40Z","timestamp":1777441480820,"version":"3.51.4"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T00:00:00Z","timestamp":1756512000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T00:00:00Z","timestamp":1756512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["no. 2023YFB2704601"],"award-info":[{"award-number":["no. 2023YFB2704601"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s00034-025-03292-6","type":"journal-article","created":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T05:19:22Z","timestamp":1756531162000},"page":"1374-1401","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Robust Watermarking Method for Speech Legitimacy Authentication Based on SSVR and TFJF"],"prefix":"10.1007","volume":"45","author":[{"given":"Fujiu","family":"Xu","sequence":"first","affiliation":[]},{"given":"Jianqiang","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5269-0651","authenticated-orcid":false,"given":"Xi","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,30]]},"reference":[{"issue":"13","key":"3292_CR1","doi-asserted-by":"publisher","first-page":"20177","DOI":"10.1007\/s11042-023-14357-6","volume":"82","author":"S Alshathri","year":"2023","unstructured":"S. Alshathri, E.E. Hemdan, An efficient audio watermarking scheme with scrambled medical images for secure medical internet of things systems. Multimed. Tools Appl. 82(13), 20177\u201320195 (2023)","journal-title":"Multimed. Tools Appl."},{"key":"3292_CR2","doi-asserted-by":"crossref","unstructured":"X.R. Cao, X. Li, D. Jadav, Y.Z. Wu, Z.H. Chen, C. Zeng, W.Q. Wei, Invisible watermarking for audio generation diffusion models, in 2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) (2023), pp. 193\u2013202","DOI":"10.1109\/TPS-ISA58951.2023.00033"},{"issue":"12","key":"3292_CR3","doi-asserted-by":"publisher","first-page":"7194","DOI":"10.1007\/s00034-023-02419-x","volume":"42","author":"ST Chen","year":"2023","unstructured":"S.T. Chen, H.C. Lu, Optimization and minimum-energy approaches for private message security in the wavelet domain of audio signals. Circuits Syst. Signal Process. 42(12), 7194\u20137225 (2023)","journal-title":"Circuits Syst. Signal Process."},{"issue":"6","key":"3292_CR4","doi-asserted-by":"publisher","first-page":"1095","DOI":"10.1016\/j.hoc.2019.08.003","volume":"33","author":"CR Deig","year":"2019","unstructured":"C.R. Deig, A. Kumar, R.F. Thompson, Artificial intelligence in radiation oncology. Hematol. Oncol. Clin. North Am. 33(6), 1095\u20131104 (2019)","journal-title":"Hematol. Oncol. Clin. North Am."},{"key":"3292_CR5","doi-asserted-by":"crossref","unstructured":"M. Farzaneh, R.M. Toroghi, Robust audio watermarking using graph-based transform and singular value decomposition, in 2020 10th International Symposium on Telecommunications (IST) (2020), pp. 137\u2013141","DOI":"10.1109\/IST50524.2020.9345876"},{"key":"3292_CR6","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1002\/9781119847717.ch17","volume":"66","author":"M Garg","year":"2024","unstructured":"M. Garg, J.S. Ubhi, A.K. Aggarwal, Current Advancements in Steganography: a review. Model. Optim. Signals Using Mach. Learn. Tech. 66, 327\u2013348 (2024)","journal-title":"Model. Optim. Signals Using Mach. Learn. Tech."},{"key":"3292_CR7","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0270579","author":"X Guo","year":"2022","unstructured":"X. Guo, D.Y. Huang, L.T. Xu, A robust zero-watermarking scheme based on non-negative matrix factorization for audio protection. PLoS ONE (2022). https:\/\/doi.org\/10.1371\/journal.pone.0270579","journal-title":"PLoS ONE"},{"issue":"12","key":"3292_CR8","doi-asserted-by":"publisher","first-page":"18599","DOI":"10.1007\/s11042-022-14197-w","volume":"82","author":"JJ He","year":"2023","unstructured":"J.J. He, Z.H. Liu, K.J. Lin, Q. Qian, A novel audio watermarking algorithm robust against recapturing attacks. Multimed. Tools Appl. 82(12), 18599\u201318616 (2023)","journal-title":"Multimed. Tools Appl."},{"key":"3292_CR9","doi-asserted-by":"publisher","first-page":"37612","DOI":"10.1109\/ACCESS.2023.3266521","volume":"11","author":"HT Hu","year":"2023","unstructured":"H.T. Hu, S.T. Wu, T.T. Lee, FFT-based dual-mode blind watermarking for hiding binary logos and color images in audio. IEEE Access 11, 37612\u201337622 (2023)","journal-title":"IEEE Access"},{"issue":"2","key":"3292_CR10","first-page":"940","volume":"26","author":"S Kaur","year":"2025","unstructured":"S. Kaur, M.K. Sachan, A.K. Aggarwal, Classification of royal delicious apples using hybrid feature selection and feature weighting method based on SVM classifier. Scalable Comput. Pract. Exper. 26(2), 940\u2013949 (2025)","journal-title":"Scalable Comput. Pract. Exper."},{"key":"3292_CR11","doi-asserted-by":"publisher","first-page":"50645","DOI":"10.1007\/s11042-023-17630-w","volume":"83","author":"NO Korany","year":"2024","unstructured":"N.O. Korany, N.M. Elboghdadly, M.Z. Elabdein, High capacity, secure audio watermarking technique integrating spread spectrum and linear predictive coding. Multimed. Tools Appl. 83, 50645\u201350668 (2024)","journal-title":"Multimed. Tools Appl."},{"issue":"2","key":"3292_CR12","first-page":"91","volume":"65","author":"A Kumar","year":"2013","unstructured":"A. Kumar, A. Banno, S. Ono, T. Oishi, K. Ikeuchi, Global coordinate adjustment of the 3D survey models under unstable GPS condition. Seisan Kenkyu 65(2), 91\u201395 (2013)","journal-title":"Seisan Kenkyu"},{"issue":"2","key":"3292_CR13","first-page":"101","volume":"66","author":"A Kumar","year":"2014","unstructured":"A. Kumar, Y. Sato, T. Oishi, S. Ono, K. Ikeuchi, Improving GPS position accuracy by identification of reflected GPS signals using range data for modeling of urban structures. Seisan Kenkyu 66(2), 101\u2013107 (2014)","journal-title":"Seisan Kenkyu"},{"issue":"9","key":"3292_CR14","doi-asserted-by":"publisher","first-page":"5684","DOI":"10.1007\/s00034-023-02382-7","volume":"42","author":"KP Kumar","year":"2023","unstructured":"K.P. Kumar, A. Kanhe, An adaptive embedding approach for high imperceptible and robust audio watermarking using framelet transform and SVD. Circuits Syst. Signal Process. 42(9), 5684\u20135713 (2023)","journal-title":"Circuits Syst. Signal Process."},{"key":"3292_CR15","volume":"68","author":"R Kumar","year":"2022","unstructured":"R. Kumar, J. Yadav, Vowel and non-vowel frame segmentation based digital speech watermarking technique using LPA method. J. Inf. Secur. Appl. 68, 103218 (2022)","journal-title":"J. Inf. Secur. Appl."},{"issue":"3","key":"3292_CR16","doi-asserted-by":"publisher","first-page":"100","DOI":"10.17743\/jaes.2022.0067","volume":"71","author":"WH Lai","year":"2023","unstructured":"W.H. Lai, T.Y. Chou, M.C. Chou, B.W. Schuller, Robust audio watermarking based on empirical mode decomposition and group differential relations. J. Audio Eng. Soc. 71(3), 100\u2013117 (2023)","journal-title":"J. Audio Eng. Soc."},{"key":"3292_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2022.108561","volume":"198","author":"JX Li","year":"2022","unstructured":"J.X. Li, S.J. Xiang, Audio-lossless robust watermarking against desynchronization attacks. Signal Process. 198, 108561 (2022)","journal-title":"Signal Process."},{"key":"3292_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119362","volume":"649","author":"MJ Li","year":"2023","unstructured":"M.J. Li, C.H. Liu, C. Shan, H.B. Song, Z.H. Lv, A dual-embedded tamper detection framework based on block truncation coding for intelligent multimedia systems. Inf. Sci. 649, 119362 (2023)","journal-title":"Inf. Sci."},{"key":"3292_CR19","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.neucom.2022.11.001","volume":"518","author":"MJ Li","year":"2023","unstructured":"M.J. Li, Z.H. Tian, X.J. Du, X.C. Yuan, C. Shan, M. Guizani, Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme. Neurocomputing 518, 165\u2013173 (2023)","journal-title":"Neurocomputing"},{"key":"3292_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.apacoust.2023.109814","volume":"216","author":"GL Liang","year":"2024","unstructured":"G.L. Liang, S.X. Guo, N. Zou, G.Y. Wu, A characteristic extraction method for voiceprint slice statistics base on joint time-frequency processing. Appl. Acoust. 216, 109814 (2024)","journal-title":"Appl. Acoust."},{"key":"3292_CR21","doi-asserted-by":"publisher","first-page":"40657","DOI":"10.1007\/s11042-023-16827-3","volume":"83","author":"XY Liu","year":"2023","unstructured":"X.Y. Liu, X.J. Li, X.H. Niu, C. Shi, L. Xiong, Q. Qing, Y.S. Liu, T.Y. Yang, Robust audio watermarking algorithm resisting cropping based on SIFT transform. Multimed. Tools Appl. 83, 40657\u201340676 (2023)","journal-title":"Multimed. Tools Appl."},{"key":"3292_CR22","doi-asserted-by":"publisher","first-page":"69443","DOI":"10.1007\/s11042-024-18340-7","volume":"83","author":"XY Liu","year":"2024","unstructured":"X.Y. Liu, X.J. Li, C.H. Shi, X.H. Niu, L. Xiong, A novel SVD-based adaptive robust audio watermarking algorithm. Multimed. Tools Appl. 83, 69443\u201369465 (2024)","journal-title":"Multimed. Tools Appl."},{"key":"3292_CR23","doi-asserted-by":"publisher","first-page":"144497","DOI":"10.1109\/ACCESS.2023.3344653","volume":"11","author":"R Mubarak","year":"2023","unstructured":"R. Mubarak, T. Alsboui, O. Alshaikh, I. Inuwa-Dutse, S. Khan, S. Parkinson, A survey on the detection and impacts of deepfakes in visual, audio, and textual formats. IEEE Access 11, 144497\u2013144529 (2023)","journal-title":"IEEE Access"},{"issue":"1","key":"3292_CR24","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/s00034-023-02475-3","volume":"43","author":"KI Naqash","year":"2024","unstructured":"K.I. Naqash, S.A. Malik, S.A. Parah, Robust audio watermarking based on iterative filtering. Circuits Syst. Signal Process. 43(1), 348\u2013367 (2024)","journal-title":"Circuits Syst. Signal Process."},{"issue":"05","key":"3292_CR25","doi-asserted-by":"publisher","first-page":"2350009","DOI":"10.1142\/S0219691323500091","volume":"21","author":"K Pavlovic","year":"2023","unstructured":"K. Pavlovic, S. Kovacevic, I. Djurovic, A. Wojciechowski, DNN-based speech watermarking resistant to desynchronization attacks. Int. J. Wavelets Multiresolut. Inf. Process. 21(05), 2350009 (2023)","journal-title":"Int. J. Wavelets Multiresolut. Inf. Process."},{"key":"3292_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2021.103381","volume":"122","author":"K Pavlovic","year":"2022","unstructured":"K. Pavlovic, S. Kovacevic, I. Djurovic, A. Wojciechowski, Robust speech watermarking by a jointly trained embedder and detector using a DNN. Digit. Signal Process. 122, 103381 (2022)","journal-title":"Digit. Signal Process."},{"issue":"4","key":"3292_CR27","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1007\/s11235-024-01133-6","volume":"86","author":"S Saadi","year":"2024","unstructured":"S. Saadi, A. Merrad, A novel adaptive watermark embedding approach for enhancing security of biometric voice\/speech systems. Telecommun. Syst. 86(4), 627\u2013643 (2024)","journal-title":"Telecommun. Syst."},{"issue":"6","key":"3292_CR28","doi-asserted-by":"publisher","first-page":"3668","DOI":"10.1007\/s00034-022-02288-w","volume":"42","author":"M Salayani","year":"2023","unstructured":"M. Salayani, B. Bakhtiari, S.H. Ghafarian, A robust zero-watermarking for audio signal using supervised learning. Circuits Syst. Signal Process. 42(6), 3668\u20133705 (2023)","journal-title":"Circuits Syst. Signal Process."},{"issue":"6","key":"3292_CR29","doi-asserted-by":"publisher","first-page":"3055","DOI":"10.1016\/j.jksuci.2020.09.007","volume":"34","author":"A Singha","year":"2022","unstructured":"A. Singha, M.A. Ullah, Development of an audio watermarking with decentralization of the watermarks. J. King Saud Univ. 34(6), 3055\u20133061 (2022)","journal-title":"J. King Saud Univ."},{"issue":"9","key":"3292_CR30","doi-asserted-by":"publisher","first-page":"5108","DOI":"10.1007\/s00034-022-02023-5","volume":"41","author":"G Suresh","year":"2022","unstructured":"G. Suresh, V.L. Narla, D.P. Gangwar, A.K. Sahu, False-positive-free SVD based audio watermarking with integer wavelet transform. Circuits Syst. Signal Process. 41(9), 5108\u20135133 (2022)","journal-title":"Circuits Syst. Signal Process."},{"key":"3292_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-022-03657-9","author":"M Velayatipour","year":"2022","unstructured":"M. Velayatipour, M. Mosleh, M.Y. Nejad, M. Kheyrandish, Quantum reversible circuits for audio watermarking based on echo hiding technique. Quantum Inf. Process. (2022). https:\/\/doi.org\/10.1007\/s11128-022-03657-9","journal-title":"Quantum Inf. Process."},{"key":"3292_CR32","unstructured":"D. Wang, X. Zhang, Thchs-30: a free Chinese speech corpus. arXiv preprint arXiv:1512.01882 (2015)"},{"key":"3292_CR33","doi-asserted-by":"publisher","first-page":"2617107","DOI":"10.1155\/2022\/2617107","volume":"2022","author":"QL Wu","year":"2022","unstructured":"Q.L. Wu, R.Y. Ding, J.C. Wei, Audio watermarking algorithm with a synchronization mechanism based on spectrum distribution. Secur. Commun. Netw. 2022, 2617107 (2022)","journal-title":"Secur. Commun. Netw."},{"issue":"6","key":"3292_CR34","doi-asserted-by":"publisher","first-page":"11482","DOI":"10.3934\/mbe.2023509","volume":"20","author":"QL Wu","year":"2023","unstructured":"Q.L. Wu, D.D. Huang, J.C. Wei, W.H. Chen, Adaptive and blind audio watermarking algorithm based on dither modulation and butterfly optimization algorithm. Math. Biosci. Eng. 20(6), 11482\u201311501 (2023)","journal-title":"Math. Biosci. Eng."},{"issue":"12","key":"3292_CR35","doi-asserted-by":"publisher","first-page":"1843","DOI":"10.3390\/e24121843","volume":"24","author":"SQ Wu","year":"2023","unstructured":"S.Q. Wu, Y. Huang, H. Guan, S.W. Zhang, J. Liu, ECSS high-embedding-capacity audio watermarking with diversity reception. Entropy 24(12), 1843 (2023)","journal-title":"Entropy"},{"key":"3292_CR36","doi-asserted-by":"crossref","unstructured":"S.Q. Wu, J. Liu, Y. Huang, H. Guan, S.W. Zhang, Adversarial audio watermarking embedding watermark into deep feature. In: 2023 IEEE International Conference on Multimedia and Expo (ICME) (2023), pp. 61\u201366","DOI":"10.1109\/ICME55011.2023.00019"},{"key":"3292_CR37","doi-asserted-by":"publisher","DOI":"10.1049\/ell2.12969","author":"LT Xu","year":"2023","unstructured":"L.T. Xu, M.R. He, X. Guo, A zero-watermarking technique based on i-vector model for audio copyright protection. Electron. Lett. (2023). https:\/\/doi.org\/10.1049\/ell2.12969","journal-title":"Electron. Lett."},{"issue":"1","key":"3292_CR38","doi-asserted-by":"publisher","first-page":"18432","DOI":"10.1038\/s41598-023-45619-w","volume":"13","author":"M Yamni","year":"2023","unstructured":"M. Yamni, A. Daoui, H. Karmouni, M. Sayyouri, H. Qjidaa, S. Motahhir, O. Jamil, W. El-Shafai, A.D. Algarni, N.F. Soliman, M.H. Aly, An efficient watermarking algorithm for digital audio data in security applications. Sci. Rep. 13(1), 18432 (2023)","journal-title":"Sci. Rep."},{"key":"3292_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117325","volume":"203","author":"M Yamni","year":"2022","unstructured":"M. Yamni, H. Karmouni, M. Sayyouri, H. Qjidaa, Robust audio watermarking scheme based on fractional Charlier moment transform and dual tree complex wavelet transform. Expert Syst. Appl. 203, 117325 (2022)","journal-title":"Expert Syst. Appl."},{"key":"3292_CR40","doi-asserted-by":"publisher","first-page":"1182","DOI":"10.1109\/TIFS.2023.3236456","volume":"18","author":"GF Zhang","year":"2023","unstructured":"G.F. Zhang, L.L. Zheng, Z.P. Su, Y.F. Zeng, G.Q. Wang, M-sequences and sliding window based audio watermarking robust against large-scale cropping attacks. IEEE Trans. Inf. Forensics Secur. 18, 1182\u20131195 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"3292_CR41","first-page":"3035","volume":"71","author":"XR Zhang","year":"2022","unstructured":"X.R. Zhang, X. Sun, X.M. Sun, W. Sun, S.K. Jha, Robust reversible audio watermarking scheme for telemedicine and privacy protection. CMC-Comput. Mat. Contin. 71(2), 3035\u20133050 (2022)","journal-title":"CMC-Comput. Mat. Contin."},{"key":"3292_CR42","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1109\/TASLP.2022.3225668","volume":"31","author":"J Zhao","year":"2023","unstructured":"J. Zhao, T.R. Zong, Y. Xiang, L.X. Gao, G. Hua, K. Sood, Y.S. Zhang, Ssvs-ssvd based desynchronization attacks resilient watermarking method for stereo signals. IEEE\/ACM Trans. Audio Speech Lang. Process. 31, 448\u2013461 (2023)","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"key":"3292_CR43","doi-asserted-by":"publisher","first-page":"2282","DOI":"10.1109\/TASLP.2021.3092555","volume":"29","author":"J Zhao","year":"2021","unstructured":"J. Zhao, T.R. Zong, Y. Xiang, L.X. Gao, W.L. Zhou, G. Beliakov, Desynchronization attacks resilient watermarking method based on frequency singular value coefficient modification. IEEE\/ACM Trans. Audio Speech Lang. Process. 29, 2282\u20132295 (2021)","journal-title":"IEEE\/ACM Trans. Audio Speech Lang. Process."},{"issue":"17","key":"3292_CR44","doi-asserted-by":"publisher","first-page":"6548","DOI":"10.3390\/s22176548","volume":"22","author":"M Zhao","year":"2022","unstructured":"M. Zhao, S.T. Chen, S.Y. Tu, Wavelet-domain information-hiding technology with high-quality audio signals on MEMS sensors. Sensors 22(17), 6548 (2022)","journal-title":"Sensors"}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-025-03292-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-025-03292-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-025-03292-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T05:40:28Z","timestamp":1773466828000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-025-03292-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,30]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["3292"],"URL":"https:\/\/doi.org\/10.1007\/s00034-025-03292-6","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,30]]},"assertion":[{"value":"6 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 August 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"This paper uses data that was collected from Thchs-30 (\n                      \n                      ). All data was obtained through ethical and informed consent processes, with participants providing consent prior to data collection. The data will be used for research purposes only.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical and Informed Consent for Data Used"}}]}}