{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:19Z","timestamp":1740122839584,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,16]],"date-time":"2021-01-16T00:00:00Z","timestamp":1610755200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,16]],"date-time":"2021-01-16T00:00:00Z","timestamp":1610755200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Speech Technol"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s10772-019-09638-1","type":"journal-article","created":{"date-parts":[[2021,1,16]],"date-time":"2021-01-16T10:02:36Z","timestamp":1610791356000},"page":"219-234","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Simultaneous Enhancement and Watermarking of Speech Signals"],"prefix":"10.1007","volume":"24","author":[{"given":"Eman","family":"abd-ElMordy","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8002-0543","authenticated-orcid":false,"given":"Safaa","family":"el-Gazar","sequence":"additional","affiliation":[]},{"given":"Alaa M.","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Sami","family":"El-Dolil","sequence":"additional","affiliation":[]},{"given":"Ibrahim M.","family":"El-Dokany","sequence":"additional","affiliation":[]},{"given":"Moawad I.","family":"Dessouky","sequence":"additional","affiliation":[]},{"given":"El-Sayed M.","family":"El-Rabaie","sequence":"additional","affiliation":[]},{"given":"Adel S.","family":"El-Fishawy","sequence":"additional","affiliation":[]},{"given":"Fathi E. Abd","family":"El-Samie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,16]]},"reference":[{"key":"9638_CR1","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s10772-013-9205-5","volume":"17","author":"MA Abd El-Fattah","year":"2014","unstructured":"Abd El-Fattah, M. A., Dessouky, M. I., Abbas, A. M., Diab, S. M., El-Rabaie, E. M., Al-Nuaimy, W., et al. (2014). Speech enhancement with an adaptive Wiener filter. International Journal of Speech Technology, 17, 53\u201364.","journal-title":"International Journal of Speech Technology"},{"key":"9638_CR2","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/s10772-015-9293-5","volume":"18","author":"S Abd El-Moneim","year":"2015","unstructured":"Abd El-Moneim, S., Dessouky, M. I., Abd El-Samie, F. E., Nassar, M. A., & El-Naby, M. A. (2015). Hybrid speech enhancement with empirical mode decomposition and spectral subtraction for efficient speaker identification. International Journal of Speech Technology, 18, 555\u2013564.","journal-title":"International Journal of Speech Technology"},{"key":"9638_CR3","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s10772-009-9056-2","volume":"12","author":"FE Abd El-Samie","year":"2009","unstructured":"Abd El-Samie, F. E. (2009). An efficient singular value decomposition algorithm for digital audio watermarking. International Journal of Speech Technology, 12, 27\u201345.","journal-title":"International Journal of Speech Technology"},{"key":"9638_CR5","first-page":"84","volume":"5","author":"R Aparna","year":"2016","unstructured":"Aparna, R., and Chithra, P.l. (2016) A review on cryptographic algorithms for speech signal security. International Journal of Emerging Trends & Technology in Computer Science(IJETTCS), 5, 84\u201388","journal-title":"International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)"},{"key":"9638_CR4","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.physleta.2005.11.055","volume":"352","author":"G Alvarez","year":"2006","unstructured":"Alvarez, G., & Li, S. (2006). Breaking an encryption scheme based on chaotic baker map. Physics Letters A, 352, 78\u201382.","journal-title":"Physics Letters A"},{"key":"9638_CR6","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1109\/6046.923822","volume":"3","author":"P Bassia","year":"2011","unstructured":"Bassia, P., & Pitas, I. P. (2011). Robust audio watermarking in the time domain. IEEE Transactions on Multimedia Journal, 3, 232\u2013241.","journal-title":"IEEE Transactions on Multimedia Journal"},{"key":"9638_CR7","first-page":"657","volume-title":"Data engineering and intelligent computing. Advances in intelligent systems and computing","author":"K Bhatt","year":"2018","unstructured":"Bhatt, K., Vinitha, C. S., & Gupta, R. (2018). Secure speech enhancement using LPC based FEM in Wiener filter. In S. Satapathy, V. Bhateja, K. Raju, & B. Janakiramaiah (Eds.), Data engineering and intelligent computing. Advances in intelligent systems and computing (Vol. 542, pp. 657\u2013665). Singapore: Springer."},{"key":"9638_CR8","unstructured":"Celik, M., Sharma, G., & Tekalp, A. M. (2005) Pitch and duration modification for speech watermarking. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing."},{"key":"9638_CR9","unstructured":"Cheng, Q., & Sorenson, J. (2001) Spread spectrum signaling for speech watermarking. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing."},{"key":"9638_CR10","doi-asserted-by":"publisher","first-page":"103","DOI":"10.4067\/S0718-18762008000200008","volume":"3","author":"S-C Cheung","year":"2008","unstructured":"Cheung, S.-C., Chiu, D. K. W., & Ho, C. (2008). The use of digital watermarking for intelligence multimedia document distribution. Journal of Theoretical and Applied Electronic Commerce Research, 3, 103\u2013118.","journal-title":"Journal of Theoretical and Applied Electronic Commerce Research"},{"key":"9638_CR11","unstructured":"Cox, I. J., Miller, M. L., & Bloom, J. A. (2000) Watermarking applications and their properties. In Proceedings International Conference on Information Technology: Coding and Computing."},{"issue":"12","key":"9638_CR12","first-page":"33","volume":"3","author":"HV Desai","year":"2012","unstructured":"Desai, H. V. (2012). Steganography, cryptography, watermarking: A comparative study. Journal of Global Research in Computer Science, 3(12), 33\u201335.","journal-title":"Journal of Global Research in Computer Science"},{"key":"9638_CR13","doi-asserted-by":"crossref","unstructured":"Ghazy, R. A., ElFishawy, N. A., Hadhoud, M. M., Dessouky, M. I., & El-Samie, F. E. A. (2007). An efficient block-by-block SVD-based image watermarking scheme. In Proceedings of the National Radio Science Conference.","DOI":"10.1109\/NRSC.2007.371376"},{"key":"9638_CR14","doi-asserted-by":"crossref","unstructured":"Girin, L., & Marchand, S. (2004) Watermarking of speech signals using the sinusoidal model and frequency modulation of the partials. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (Vol.\u00a01, pp.\u00a0633\u2013636).","DOI":"10.1109\/ICASSP.2004.1326065"},{"key":"9638_CR15","doi-asserted-by":"crossref","unstructured":"Gurijala, A., & Deller Jr, J. R. (2007) On the robustness of parametric watermarking of speech. In Proccedings of International Workshop on Multimedia Content Analysis and Mining (Vol.\u00a04577\/2007, pp.\u00a0501\u2013510). Springer, Berlin.","DOI":"10.1007\/978-3-540-73417-8_59"},{"key":"9638_CR16","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1109\/LSP.2004.824017","volume":"11","author":"MK Hasan","year":"2004","unstructured":"Hasan, M. K., Salahddin, S., & Khan, M. R. (2004). A modified a priori SNR for speech enhancement using spectral subtraction rules. IEEE Signal Processing Letters, 11, 450\u2013453.","journal-title":"IEEE Signal Processing Letters"},{"key":"9638_CR17","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1109\/TSP.2003.809384","volume":"51","author":"D Kirovski","year":"2003","unstructured":"Kirovski, D., & Malvar, H. S. (2003). Spread-spectrum watermarking of audio signal. IEEE Transactions on Signal Processing Journal, 51, 1020\u20131033.","journal-title":"IEEE Transactions on Signal Processing Journal"},{"key":"9638_CR18","doi-asserted-by":"publisher","first-page":"1518","DOI":"10.1016\/j.chaos.2005.11.090","volume":"32","author":"HS Kwok","year":"2007","unstructured":"Kwok, H. S., & Tang, W. K. S. (2007). A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons & Fractals, 32, 1518\u20131529.","journal-title":"Chaos, Solitons & Fractals"},{"key":"9638_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2007\/75961","volume":"2007","author":"Y-W Liu","year":"2007","unstructured":"Liu, Y.-W., & Smith, J. O. (2007). Audio watermarking through deterministic plus stochastic signal decomposition. EURASIP Journal on Information Security, 2007, 1\u201312.","journal-title":"EURASIP Journal on Information Security"},{"key":"9638_CR20","first-page":"67","volume":"2","author":"S Mahajan","year":"2012","unstructured":"Mahajan, S., & Singh, A. (2012). A review of methods and approach for secure steganography. International Journal of Advanced Research in Computer Science and Software Engineering, 2, 67\u201370.","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"9638_CR21","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.jisa.2018.12.002","volume":"44","author":"E Najafi","year":"2019","unstructured":"Najafi, E., & Loukhaoukha, K. (2019). Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform. Journal of Information Security and Applications, 44, 144\u2013156.","journal-title":"Journal of Information Security and Applications"},{"key":"9638_CR22","first-page":"1","volume":"78","author":"MA Nematollahi","year":"2013","unstructured":"Nematollahi, M. A., & Al-Haddad, S. A. R. (2013). An overview of digital speech watermarking. International Journal of Speech Technology, 78, 1\u201318.","journal-title":"International Journal of Speech Technology"},{"key":"9638_CR23","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/372398","author":"MA Nematollahi","year":"2015","unstructured":"Nematollahi, M. A., Rosales, H. G., Akhaee, M. A., & Al-Haddad, S. A. R. (2015). Robust digital speech watermarking for online speaker recognition. Mathematical Problems in Engineering. https:\/\/doi.org\/10.1155\/2015\/372398.","journal-title":"Mathematical Problems in Engineering"},{"key":"9638_CR24","doi-asserted-by":"crossref","unstructured":"Nematollahi, M. A., Vorakulpipat, C., & Rosale, H. G. (2016) Speech watermarking. In Digital watermarking. Springer topics in signal processing (Vol.\u00a011, pp.\u00a039\u201353). Springer, Singapore.","DOI":"10.1007\/978-981-10-2095-7_3"},{"issue":"4","key":"9638_CR25","first-page":"3688","volume":"6","author":"P Pattanshetti","year":"2015","unstructured":"Pattanshetti, P., Dongaonkar, S., & Karpe, S. (2015). Digital watermarking in audio using least significant bit and discrete cosine transform. International Journal of Computer Science and Information Technologies, 6(4), 3688\u20133692.","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"9638_CR26","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.dsp.2019.01.023","volume":"88","author":"A Poddar","year":"2019","unstructured":"Poddar, A., Sahidullah, M., & Saha, G. (2019). Quality measures for speaker verification with short utterances. Digital Signal Processing, 88, 66\u201379.","journal-title":"Digital Signal Processing"},{"key":"9638_CR27","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.dib.2016.11.008","volume":"10","author":"D Ramos","year":"2017","unstructured":"Ramos, D., Haraksim, R., & Meuwly, D. (2017). Likelihood ratio data to report the validation of a forensic fingerprint evaluation method. Data in Brief, 10, 75\u201392.","journal-title":"Data in Brief"},{"key":"9638_CR28","doi-asserted-by":"crossref","unstructured":"Sakaguchi, S., Arai, T., & Murahara, Y. (2000). The effect of polarity inversion of speech on human perception and data hiding as an application. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (Vol.\u00a02, pp.\u00a0917\u2013920).","DOI":"10.1109\/ICASSP.2000.859110"},{"key":"9638_CR29","doi-asserted-by":"crossref","unstructured":"Skopin, D. E., El-Emary, I. M. M., Rasras, R. J., & Diab, R. S. (2010) Advanced algorithms in audio steganography for hiding human speech signal. In Proceedings of the International Conference on Advanced Computer Control.","DOI":"10.1109\/ICACC.2010.5486735"},{"key":"9638_CR31","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1016\/j.procs.2015.06.066","volume":"54","author":"N Upadhyay","year":"2015","unstructured":"Upadhyay, N., & Karmakar, A. (2015). Speech enhancement using spectral subtraction-type algorithms: A comparison and simulation study. Procedia Computer Science, 54, 574\u2013584.","journal-title":"Procedia Computer Science"},{"key":"9638_CR30","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.procs.2016.04.061","volume":"84","author":"N Upadhyay","year":"2016","unstructured":"Upadhyay, N., & Jaiswal, R. K. (2016). Single channel speech enhancement: Using Wiener filtering with recursive noise estimation. Procedia Computer Science, 84, 22\u201330.","journal-title":"Procedia Computer Science"},{"key":"9638_CR32","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1109\/49.138987","volume":"10","author":"S Wang","year":"1992","unstructured":"Wang, S., Sekey, A., & Gersho, A. (1992). An objective measure for predicting subjective quality of speech coders. IEEE Journal on Selected Areas in Communications, 10, 819\u2013829.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"9638_CR33","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.physleta.2006.12.020","volume":"364","author":"PT Xiang","year":"2007","unstructured":"Xiang, P. T., Wong, K. W., & Liao, X. (2007). A novel symmetrical cryptosystem based on discretized two-dimensional chaotic map. Physics Letters A, 364, 252\u2013258.","journal-title":"Physics Letters A"},{"key":"9638_CR34","doi-asserted-by":"crossref","unstructured":"Yelwande, A., Kansal, S., & Dixit, A. (2017). Adaptive wiener filter for speech enhancement. In Proceedings of the International Conference on Information, Communication, Instrumentation and Control.","DOI":"10.1109\/ICOMICON.2017.8279110"},{"key":"9638_CR35","doi-asserted-by":"crossref","unstructured":"Zeiler, A., Faltermeier, R., Keck, I. R., Tom\u00e9, A. M., Puntonet, C. G. & Lang, E. W. (2010). Empirical mode decomposition\u2014An introduction. In Proceedings of the International Joint Conference on Neural Networks.","DOI":"10.1109\/IJCNN.2010.5596829"}],"container-title":["International Journal of Speech Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-019-09638-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10772-019-09638-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-019-09638-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T14:24:24Z","timestamp":1724336664000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10772-019-09638-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,16]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["9638"],"URL":"https:\/\/doi.org\/10.1007\/s10772-019-09638-1","relation":{},"ISSN":["1381-2416","1572-8110"],"issn-type":[{"type":"print","value":"1381-2416"},{"type":"electronic","value":"1572-8110"}],"subject":[],"published":{"date-parts":[[2021,1,16]]},"assertion":[{"value":"6 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}