{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:50:17Z","timestamp":1762005017435},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,9,21]],"date-time":"2018-09-21T00:00:00Z","timestamp":1537488000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Speech Technol"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s10772-018-9531-8","type":"journal-article","created":{"date-parts":[[2018,9,21]],"date-time":"2018-09-21T11:56:48Z","timestamp":1537531008000},"page":"953-965","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Efficient SVD speech watermarking with encrypted images"],"prefix":"10.1007","volume":"21","author":[{"given":"Safaa","family":"El-Gazar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alaa M.","family":"Abbas","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sami","family":"El-Dolil","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ibrahim M.","family":"El-Dokany","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Moawad I.","family":"Dessouky","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"El-Sayed M.","family":"El-Rabaie","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fathi E.","family":"Abd El-Samie","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,9,21]]},"reference":[{"issue":"1","key":"9531_CR1","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s10772-009-9056-2","volume":"12","author":"FE Abd El-Samie","year":"2009","unstructured":"Abd El-Samie, F. E. (2009). An efficient singular value decomposition algorithm for digital speech watermarking. International Journal of Speech Technology, 12(1), 27\u201345. \n                    https:\/\/doi.org\/10.1186\/s13636-014-0037-2\n                    \n                  .","journal-title":"International Journal of Speech Technology"},{"issue":"4","key":"9531_CR2","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/s10772-015-9292-6","volume":"18","author":"FE Abd El-Samie","year":"2015","unstructured":"Abd El-Samie, F. E., Shafik, A., El-sayed, H. S., Elhalafawy, S. M., Diab, S. M., Sallam, B. M., & Faragallah, O. S. (2015). Sensitivity of automatic speaker identification to SVD digital audio watermarking. International Journal of Speech Technology, 18(4), 565\u2013581.","journal-title":"International Journal of Speech Technology"},{"key":"9531_CR3","doi-asserted-by":"crossref","unstructured":"Arnold, M. (2000). Audio watermarking: Features, applications and algorithms. In Proceeding of the IEEE international conference on multimedia and expo.","DOI":"10.1109\/ICME.2000.871531"},{"issue":"6","key":"9531_CR4","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1016\/j.dsp.2010.02.006","volume":"20","author":"V Bhat","year":"2010","unstructured":"Bhat, V., Sengupta, I., & Das, A. (2010). An adaptive audio watermarking based on the singular value decomposition in the wavelet domain. Digital Signal Processing, 20(6), 1547\u20131558.","journal-title":"Digital Signal Processing"},{"key":"9531_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74450-4_8","volume-title":"A digital watermarking scheme based on singular value decomposition","author":"C-C Chang","year":"2007","unstructured":"Chang, C.-C., Hu, Y.-S., & Lin, C.-C. (2007). A digital watermarking scheme based on singular value decomposition. Berlin: Springer."},{"key":"9531_CR6","doi-asserted-by":"crossref","unstructured":"Cheng, Q., Sorenson, J. (2001). Spread spectrum signaling for speech watermarking. In Proceedings of the IEEE international conference on acoustics, speech, and signal processing (ICASSP) (Vol.\u00a03, pp.\u00a01337\u20131340).","DOI":"10.1109\/ICASSP.2001.941175"},{"key":"9531_CR7","unstructured":"Chouinard, J.-Y. (2002). Design of secure computer system CSI4138\/CEG4394. Notes on the data encryption standard (DES), uottawa.ca."},{"key":"9531_CR8","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-513-9","volume-title":"Digital audio watermarking techniques and technologies. Applications and benchmarks","year":"2007","unstructured":"Cvejic, N., & Seppanen, T. (Eds.). (2007). Digital audio watermarking techniques and technologies. Applications and benchmarks. Hershey: IGI Global. \n                    https:\/\/doi.org\/10.4018\/978-1-59904-513-9\n                    \n                  ."},{"issue":"2","key":"9531_CR9","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s10772-013-9214-4","volume":"17","author":"PK Dhar","year":"2013","unstructured":"Dhar, P. K., & Shimamura, T. (2013). Audio watermarking in transform domain based on singular value decomposition and Cartesian-polar transformation. International Journal of Speech Technology, 17(2), 133\u2013144.","journal-title":"International Journal of Speech Technology"},{"key":"9531_CR10","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.jisa.2014.10.007","volume":"20","author":"PK Dhar","year":"2015","unstructured":"Dhar, P. K., & Shimamura, T. (2015). Blind SVD-based audio watermarking using entropy and log-polar transformation. Journal of Information Security and Applications, 20, 74\u201383.","journal-title":"Journal of Information Security and Applications"},{"key":"9531_CR11","unstructured":"Driedger, J. (2011). Time-scale modication algorithms for music audio signals. Master\u2019s thesis, Saarland University."},{"key":"9531_CR12","doi-asserted-by":"crossref","unstructured":"Fridrich, J. (1997). Image encryption based on chaotic maps. In Proceedings of the IEEE international conference on systems, man, and cybernetics (Vol.\u00a02, pp.\u00a01105\u20131110).","DOI":"10.1109\/ICSMC.1997.638097"},{"issue":"6","key":"9531_CR13","doi-asserted-by":"publisher","first-page":"1259","DOI":"10.1142\/S021812749800098X","volume":"8","author":"J Fridrich","year":"1998","unstructured":"Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and chaos, 8(6), 1259\u20131284.","journal-title":"International Journal of Bifurcation and chaos"},{"key":"9531_CR14","doi-asserted-by":"publisher","DOI":"10.5923\/j.computer.20120205.04","volume-title":"Secure transmission of biometric scan images using data encryption standards (DES) algorithm","author":"G Gaur","year":"2012","unstructured":"Gaur, G., & Meena, R. S. (2012). Secure transmission of biometric scan images using data encryption standards (DES) algorithm. Rosemead: Scientific & Academic Publishing."},{"key":"9531_CR15","doi-asserted-by":"crossref","unstructured":"Girin, L., Marchand, S. (2004). Watermarking of speech signals using the sinusoidal model and frequency modulation of the partials. In Proceedings of the IEEE international conference on acoustics, speech, and signal processing (ICASSP) (Vol.\u00a01, pp.\u00a0633\u2013636).","DOI":"10.1109\/ICASSP.2004.1326065"},{"issue":"3","key":"9531_CR16","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1109\/TASL.2012.2227733","volume":"21","author":"K Khaldi","year":"2013","unstructured":"Khaldi, K., & Boudraa, A. O. (2013). Audio watermarking via EMD. IEEE Transaction on Audio, Speech and Language Processing, 21(3), 675\u2013680. \n                    https:\/\/doi.org\/10.1109\/TASL.2012.2227733\n                    \n                  .","journal-title":"IEEE Transaction on Audio, Speech and Language Processing"},{"issue":"4","key":"9531_CR17","doi-asserted-by":"publisher","first-page":"1518","DOI":"10.1016\/j.chaos.2005.11.090","volume":"32","author":"HS Kwok","year":"2007","unstructured":"Kwok, H. S., & Tang, W. K. S. (2007). A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons & Fractals, 32(4), 1518\u20131529.","journal-title":"Chaos, Solitons & Fractals"},{"issue":"8","key":"9531_CR18","doi-asserted-by":"publisher","first-page":"1973","DOI":"10.1016\/j.sigpro.2011.03.001","volume":"91","author":"BY Lei","year":"2011","unstructured":"Lei, B. Y., Soon, I. Y., & Li, Z. (2011). Blind and robust audio watermarking scheme based on SVD\u2013DCT. Signal Processing, 91(8), 1973\u20131984.","journal-title":"Signal Processing"},{"issue":"12","key":"9531_CR19","doi-asserted-by":"publisher","first-page":"3078","DOI":"10.1016\/j.sigpro.2010.05.012","volume":"90","author":"D Meg\u00edas","year":"2010","unstructured":"Meg\u00edas, D., Serra-ruiz, J., & Fallahpour, M. (2010). Efficient self synchronized blind audio watermarking system based on time domain and FF amplitude modification. Signal Processing, 90(12), 3078\u20133092. \n                    https:\/\/doi.org\/10.1016\/j.sigpro.2010.05.012\n                    \n                  .","journal-title":"Signal Processing"},{"issue":"9","key":"9531_CR20","doi-asserted-by":"publisher","first-page":"2158","DOI":"10.1016\/j.sigpro.2008.02.015","volume":"88","author":"AA Mohammad","year":"2008","unstructured":"Mohammad, A. A., Alhaj, A., & Shaltaf, S. (2008). An improved SVD-based watermarking scheme for protecting rightful ownership. Signal Processing, 88(9), 2158\u20132180.","journal-title":"Signal Processing"},{"key":"9531_CR21","first-page":"1","volume":"78","author":"MA Nematollahi","year":"2013","unstructured":"Nematollahi, M. A., & Al-Haddad, S. A. R. (2013). An overview of digital speech watermarking. International Journal of Speech Technology, 78, 1\u201318.","journal-title":"International Journal of Speech Technology"},{"issue":"4","key":"9531_CR22","doi-asserted-by":"publisher","first-page":"1479","DOI":"10.1109\/TSP.2007.909350","volume":"56","author":"B Ninness","year":"2008","unstructured":"Ninness, B., & Henriksen, S. J. (2008). Time-scale modification of speech signals. IEEE Transactions on Signal Processing, 56(4), 1479\u20131488.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"6","key":"9531_CR23","doi-asserted-by":"publisher","first-page":"764","DOI":"10.1016\/j.dsp.2011.01.013","volume":"21","author":"WA Al-Nuaimy","year":"2011","unstructured":"Al-Nuaimy, W. A., EL-Bendary, M. A. M., Shafik, A., et al. (2011). An SVD audio watermarking approach using chaotic encrypted images. Digital Signal Processing, 21(6), 764\u2013779. \n                    https:\/\/doi.org\/10.1016\/j.dsp.2011.01.013\n                    \n                  .","journal-title":"Digital Signal Processing"},{"issue":"8","key":"9531_CR24","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1016\/j.patrec.2006.12.010","volume":"28","author":"C-M Park","year":"2007","unstructured":"Park, C.-M., Thapa, D., & Wang, G.-N. (2007). Speech authentication system using digital watermarking and pattern recovery. Pattern Recognition Letters, 28(8), 931\u2013938.","journal-title":"Pattern Recognition Letters"},{"key":"9531_CR25","doi-asserted-by":"publisher","unstructured":"Rangding, W., Dawen, X., Jiner, C., & Chengtou, D. (2004). Digital audio watermarking algorithm based on linear predictive coding in wavelet domain. In Proceedings of the 7th IEEE international conference on signal processing (ICSP\u201904) (Vol.\u00a01, pp.\u00a02393\u20132396). \n                    https:\/\/doi.org\/10.1109\/ICOSP.2004.1442262\n                    \n                  .","DOI":"10.1109\/ICOSP.2004.1442262"},{"key":"9531_CR26","volume-title":"Quantization-based watermarking: Methods for amplitude scale estimation security and linear filtering invariance","author":"ID Shterev","year":"2007","unstructured":"Shterev, I. D. (2007). Quantization-based watermarking: Methods for amplitude scale estimation security and linear filtering invariance. Delf: Delft University of Technology."},{"issue":"7","key":"9531_CR27","doi-asserted-by":"publisher","first-page":"3541","DOI":"10.1016\/j.ijleo.2016.01.015","volume":"127","author":"B Wang","year":"2016","unstructured":"Wang, B., Xie, Y., Zhou, C., Zhou, S., & Zheng, X. (2016). Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps. Optik-International Journal for Light and Electron Optics, 127(7), 3541\u20133545.","journal-title":"Optik-International Journal for Light and Electron Optics"},{"key":"9531_CR28","doi-asserted-by":"publisher","unstructured":"Zeng, G., Qiu, Z. (2008). Audio watermarking in DCT: Embedding strategy and algorithm. In Proceedings of the 11th IEEE international conference on signal processing (ICSP\u201908) (Vol.\u00a01, pp.\u00a02193\u20132196). \n                    https:\/\/doi.org\/10.1109\/ICOSP.2008.4697583\n                    \n                  .","DOI":"10.1109\/ICOSP.2008.4697583"}],"container-title":["International Journal of Speech Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10772-018-9531-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-018-9531-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-018-9531-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T19:09:26Z","timestamp":1569006566000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10772-018-9531-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,21]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["9531"],"URL":"https:\/\/doi.org\/10.1007\/s10772-018-9531-8","relation":{},"ISSN":["1381-2416","1572-8110"],"issn-type":[{"value":"1381-2416","type":"print"},{"value":"1572-8110","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,21]]},"assertion":[{"value":"18 September 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}