{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T13:40:20Z","timestamp":1773495620827,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T00:00:00Z","timestamp":1667520000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T00:00:00Z","timestamp":1667520000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Speech Technol"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10772-022-09999-0","type":"journal-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T03:02:27Z","timestamp":1667530947000},"page":"997-1011","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Integrity verification of Holy Quran verses recitation via incomplete watermarking authentication"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0923-202X","authenticated-orcid":false,"given":"Adnan","family":"Gutub","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,4]]},"reference":[{"key":"9999_CR1","doi-asserted-by":"publisher","unstructured":"Abu-Hashem, M., & Gutub, A. (2021). Efficient computation of Hash Hirschberg protein alignment utilizing hyper threading multi-core sharing technology. CAAI Transactions on Intelligence Technology, 7(2), 278\u2013291. https:\/\/doi.org\/10.1049\/cit2.12070","DOI":"10.1049\/cit2.12070"},{"key":"9999_CR2","doi-asserted-by":"publisher","first-page":"16283","DOI":"10.1007\/s11042-018-6977-2","volume":"78","author":"M Al-Ghamdi","year":"2019","unstructured":"Al-Ghamdi, M., Al-Ghamdi, M., & Gutub, A. (2019). Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimedia Tools and Applications, 78, 16283\u201316310. https:\/\/doi.org\/10.1007\/s11042-018-6977-2","journal-title":"Multimedia Tools and Applications"},{"key":"9999_CR3","doi-asserted-by":"publisher","first-page":"3403","DOI":"10.1007\/s13369-020-04422-9","volume":"45","author":"T AlKhodaidi","year":"2020","unstructured":"AlKhodaidi, T., & Gutub, A. (2020a). Trustworthy target key alteration helping counting-based secret sharing applicability. Arabian Journal for Science and Engineering, 45, 3403\u20133423. https:\/\/doi.org\/10.1007\/s13369-020-04422-9","journal-title":"Arabian Journal for Science and Engineering"},{"key":"9999_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09720-w","author":"T AlKhodaidi","year":"2020","unstructured":"AlKhodaidi, T., & Gutub, A. (2020b). Refining image steganography distribution for higher security multimedia counting-based secret-sharing. Multimedia Tools and Applications. Advance online publication.\u00a0https:\/\/doi.org\/10.1007\/s11042-020-09720-w","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"9999_CR5","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.jksuci.2018.02.006","volume":"32","author":"M Almazrooie","year":"2020","unstructured":"Almazrooie, M., Samsudin, A., Gutub, A., Salleh, M. S., Omar, M. A., & Hassan, S. A. (2020). Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. Journal of King Saud University-Computer and Information Sciences, 32(1), 24\u201334. https:\/\/doi.org\/10.1016\/j.jksuci.2018.02.006","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"9999_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.06.010","author":"S Al-Nofaie","year":"2019","unstructured":"Al-Nofaie, S., Gutub, A., & Al-Ghamdi, M. (2019). Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces. Journal King Saud University-Computer and Information Sciences. Advance online publication.\u00a0https:\/\/doi.org\/10.1016\/j.jksuci.2019.06.010","journal-title":"Journal King Saud University-Computer and Information Sciences"},{"key":"9999_CR7","doi-asserted-by":"publisher","unstructured":"Ansari, R., Malik, H., & Khokhar, A. (2004). Data-hiding in audio using frequency-selective phase alteration. In IEEE international conference on acoustics, speech, and signal processing (pp. V-389). https:\/\/doi.org\/10.1109\/ICASSP.2004.1327129","DOI":"10.1109\/ICASSP.2004.1327129"},{"key":"9999_CR8","doi-asserted-by":"crossref","unstructured":"Asad, M., Gilani, J., & Khalid, A. (2011). An enhanced least significant bit modification technique for audio steganography. In IEEE international conference on computer networks and information technology (ICCNIT), Abbottabad, Pakistan, 11\u201313 July 2011.","DOI":"10.1109\/ICCNIT.2011.6020921"},{"key":"9999_CR9","doi-asserted-by":"crossref","unstructured":"Bajpai, J., & Kaur, A. (2016). A literature survey-various audio watermarking techniques and their challenges. In IEEE international conference-cloud system and big data engineering (Confluence), Noida, India, 14\u201315 Jan 2016.","DOI":"10.1109\/CONFLUENCE.2016.7508162"},{"key":"9999_CR10","unstructured":"Bandar Balila audio recitation of verses from Holy Quran, recorded during Ramadan month from the Makkah Holy Mosque online media production. Retrieved April 2022, from https:\/\/qurancentral.com\/audio\/bandar-balila\/."},{"issue":"12","key":"9999_CR11","doi-asserted-by":"publisher","first-page":"232","DOI":"10.22937\/IJCSNS.2020.20.12.26","volume":"20","author":"E Bin-Hureib","year":"2020","unstructured":"Bin-Hureib, E., & Gutub, A. (2020). Enhancing medical data security via combining elliptic curve cryptography with 1-LSB and 2-LSB image steganography. International Journal of Computer Science and Network Security (IJCSNS), 20(12), 232\u2013241. https:\/\/doi.org\/10.22937\/IJCSNS.2020.20.12.26","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"issue":"5","key":"9999_CR12","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1016\/j.dsp.2009.04.003","volume":"19","author":"Y Erfani","year":"2009","unstructured":"Erfani, Y., & Siahpoush, S. (2009). Robust audio watermarking using improved TS echo hiding. Digital Signal Processing, 19(5), 809\u2013814.","journal-title":"Digital Signal Processing"},{"issue":"3A","key":"9999_CR14","first-page":"44","volume":"6","author":"A Gutub","year":"2006","unstructured":"Gutub, A. (2006). Merging GF(p) elliptic curve point adding and doubling on pipelined VLSI cryptographic ASIC architecture. International Journal of Computer Science and Network Security (IJCSNS), 6(3A), 44\u201352.","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"issue":"1","key":"9999_CR15","first-page":"56","volume":"2","author":"A Gutub","year":"2010","unstructured":"Gutub, A. (2010). Pixel \u0131ndicator technique for RGB \u0131mage steganography. Journal of Emerging Technologies in Web Intelligence (JETWI), 2(1), 56\u201364.","journal-title":"Journal of Emerging Technologies in Web Intelligence (JETWI)"},{"key":"9999_CR16","doi-asserted-by":"publisher","DOI":"10.5505\/pajes.2021.54837","author":"A Gutub","year":"2022","unstructured":"Gutub, A. (2022). Regulating watermarking semi-authentication of multimedia audio via counting-based secret sharing. Pamukkale University Journal of Engineering Sciences. Advance online publication.\u00a0https:\/\/doi.org\/10.5505\/pajes.2021.54837","journal-title":"Pamukkale University Journal of Engineering Sciences"},{"key":"9999_CR17","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2022010118","author":"A Gutub","year":"2022","unstructured":"Gutub, A. (2022a). Watermarking images via counting-based secret sharing for lightweight semi-complete authentication. International Journal of Information Security and Privacy (IJISP). https:\/\/doi.org\/10.4018\/IJISP.2022010118","journal-title":"International Journal of Information Security and Privacy (IJISP)"},{"key":"9999_CR18","doi-asserted-by":"publisher","DOI":"10.36909\/jer.17853","author":"A Gutub","year":"2022","unstructured":"Gutub, A. (2022b). Dynamic smart random preference for higher medical image confidentiality. Journal of Engineering Research. Advance online publication.\u00a0https:\/\/doi.org\/10.36909\/jer.17853","journal-title":"Journal of Engineering Research"},{"issue":"1","key":"9999_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJISP.307071","volume":"16","author":"Adnan Gutub","year":"2022","unstructured":"Gutub, A., (2022c). Enhancing cryptography of grayscale images via resilience randomization flexibility. International Journal of Information Security and Privacy 16(1) 1\u201328. https:\/\/doi.org\/10.4018\/IJISP.307071","journal-title":"International Journal of Information Security and Privacy"},{"key":"9999_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.06.014","author":"A Gutub","year":"2019","unstructured":"Gutub, A., & Alaseri, K. (2019). Refining Arabic text stego-techniques for shares memorization of counting-based secret sharing. Journal King Saud University-Computer and Information Sciences. Advance online publication.\u00a0https:\/\/doi.org\/10.1016\/j.jksuci.2019.06.014","journal-title":"Journal King Saud University-Computer and Information Sciences"},{"issue":"4","key":"9999_CR20","doi-asserted-by":"publisher","first-page":"2433","DOI":"10.1007\/s13369-019-04010-6","volume":"45","author":"A Gutub","year":"2020","unstructured":"Gutub, A., & Alaseri, K. (2020). Hiding shares of counting-based secret sharing via Arabic text steganography for personal usage. Arabian Journal for Science and Engineering, 45(4), 2433\u20132458. https:\/\/doi.org\/10.1007\/s13369-019-04010-6","journal-title":"Arabian Journal for Science and Engineering"},{"key":"9999_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s13319-019-0216-0","author":"A Gutub","year":"2019","unstructured":"Gutub, A., & Al-Ghamdi, M. (2019). Image based steganography to facilitate improving counting-based secret sharing. 3DResearch. Advance online publication.\u00a0https:\/\/doi.org\/10.1007\/s13319-019-0216-0","journal-title":"3DResearch"},{"issue":"11","key":"9999_CR22","doi-asserted-by":"publisher","first-page":"7951","DOI":"10.1007\/s11042-019-08427-x","volume":"79","author":"A Gutub","year":"2020","unstructured":"Gutub, A., & Al-Ghamdi, M. (2020). Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multimedia Tools and Applications, 79(11), 7951\u20137985. https:\/\/doi.org\/10.1007\/s11042-019-08427-x","journal-title":"Multimedia Tools and Applications"},{"key":"9999_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08695-y","author":"A Gutub","year":"2020","unstructured":"Gutub, A., & Alkhodaidi, T. (2020). Smart expansion of target key for more handlers to access multimedia counting-based secret sharing. Multimedia Tools and Applications. Advance online publication.\u00a0https:\/\/doi.org\/10.1007\/s11042-020-08695-y","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"9999_CR26","doi-asserted-by":"publisher","first-page":"91","DOI":"10.36909\/jer.v8i3.8079","volume":"8","author":"A Gutub","year":"2020","unstructured":"Gutub, A., & Al-Qurashi, A. (2020). Secure shares generation via m-blocks partitioning for counting-based secret sharing. Journal of Engineering Research, 8(3), 91\u2013117. https:\/\/doi.org\/10.36909\/jer.v8i3.8079","journal-title":"Journal of Engineering Research"},{"issue":"3","key":"9999_CR27","doi-asserted-by":"publisher","first-page":"502","DOI":"10.5281\/zenodo.1061621","volume":"1","author":"A Gutub","year":"2007","unstructured":"Gutub, A., & Fattani, M. (2007). A novel arabic text steganography method using letter points and extensions. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 1(3), 502\u2013505. https:\/\/doi.org\/10.5281\/zenodo.1061621","journal-title":"International Journal of Computer, Electrical, Automation, Control and Information Engineering"},{"key":"9999_CR13","doi-asserted-by":"publisher","unstructured":"Gutub, A., Ghouti, L., Amin, A., Alkharobi, T., & Ibrahim, M. K. (2007). Utilizing extension character \u2018kashida\u2019 with pointed letters for arabic text digital watermarking. In International conference on security and cryptography (SECRYPT) (pp. 329\u2013332). Barcelona, Spain. https:\/\/doi.org\/10.5220\/0002116903290332.","DOI":"10.5220\/0002116903290332"},{"issue":"1","key":"9999_CR23","doi-asserted-by":"publisher","first-page":"48","DOI":"10.4304\/jetwi.2.1.48-55","volume":"2","author":"A Gutub","year":"2010","unstructured":"Gutub, A., Al-Haidari, F., Al-Kahsah, K., & Hamodi, J. (2010). e-Text watermarking: Utilizing \u201ckashida\u201d extensions in arabic language electronic writing. Journal of Emerging Technologies in Web Intelligence (JETWI), 2(1), 48\u201355. https:\/\/doi.org\/10.4304\/jetwi.2.1.48-55","journal-title":"Journal of Emerging Technologies in Web Intelligence (JETWI)"},{"issue":"5","key":"9999_CR24","doi-asserted-by":"publisher","first-page":"5591","DOI":"10.1007\/s11042-017-5293-6","volume":"78","author":"A Gutub","year":"2019","unstructured":"Gutub, A., Al-Juaid, N., & Khan, E. (2019). Counting-based secret sharing technique for multimedia applications. Multimedia Tools and Applications, 78(5), 5591\u20135619. https:\/\/doi.org\/10.1007\/s11042-017-5293-6","journal-title":"Multimedia Tools and Applications"},{"issue":"4","key":"9999_CR28","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1109\/TSP.2003.809384","volume":"51","author":"D Kirovski","year":"2003","unstructured":"Kirovski, D., & Malvar, H. S. (2003). Spread-spectrum watermarking of audio signals. IEEE Transactions on Signal Processing, 51(4), 1020\u20131033.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"9999_CR29","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3847092","author":"S Li","year":"2017","unstructured":"Li, S., Song, Z., Wenhuan, Lu., Sun, D., & Wei, J. (2017). Parameterization of LSB in self-recovery speech watermarking framework in big data mining. Security and Communication Networks. Advance online publication.\u00a0https:\/\/doi.org\/10.1155\/2017\/3847092","journal-title":"Security and Communication Networks"},{"key":"9999_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107584","author":"X Liang","year":"2020","unstructured":"Liang, X., & Xiang, S. (2020). Robust reversible audio watermarking based on high-order difference statistics. Signal Processing. Advance online publication.\u00a0https:\/\/doi.org\/10.1016\/j.sigpro.2020.107584","journal-title":"Signal Processing"},{"issue":"11","key":"9999_CR31","doi-asserted-by":"publisher","first-page":"30","DOI":"10.5120\/ijca2015905599","volume":"123","author":"V Mehta","year":"2015","unstructured":"Mehta, V., & Sharma, N. (2015). Secure audio watermarking based on haar wavelet and discrete cosine transform. International Journal of Computer Applications, 123(11), 30\u201336.","journal-title":"International Journal of Computer Applications"},{"key":"9999_CR32","doi-asserted-by":"publisher","first-page":"26489","DOI":"10.1007\/s11042-020-09326-2","volume":"79","author":"MY Nejad","year":"2020","unstructured":"Nejad, M. Y., Mosleh, M., & Heikalabad, S. R. (2020). An enhanced LSB-based quantum audio watermarking scheme for nano communication networks. Multimedia Tools and Applications, 79, 26489\u201326515.","journal-title":"Multimedia Tools and Applications"},{"key":"9999_CR33","unstructured":"Popa, P. (1998). An analysis of steganogrphic techniques. Master Thesis, Department of Computer Science and Software Engineering, Faculty of Automatics and Computers, The Politehnica University of Timisoara."},{"key":"9999_CR34","doi-asserted-by":"publisher","DOI":"10.36909\/jer.13199","author":"MK Shambour","year":"2021","unstructured":"Shambour, M. K., & Gutub, A. (2021). Personal privacy evaluation of smart devices applications serving Hajj and Umrah Rituals. Journal of Engineering Research. Advance online publication.\u00a0https:\/\/doi.org\/10.36909\/jer.13199","journal-title":"Journal of Engineering Research"},{"key":"9999_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-021-05838-7","author":"MK Shambour","year":"2021","unstructured":"Shambour, M. K., & Gutub, A. (2021). Progress of IoT research technologies and applications serving Hajj and Umrah. Arabian Journal for Science and Engineering. Advance online publication.\u00a0https:\/\/doi.org\/10.1007\/s13369-021-05838-7","journal-title":"Arabian Journal for Science and Engineering"},{"key":"9999_CR40","doi-asserted-by":"publisher","unstructured":"Sufi, F., Alsulami, M., & Gutub A. (2022). Automating global threat-maps generation via advancements of news sensors and AI. Arabian Journal for Science and Engineering. Advance online publication. https:\/\/doi.org\/10.1007\/s13369-022-07250-1","DOI":"10.1007\/s13369-022-07250-1"},{"key":"9999_CR36","doi-asserted-by":"publisher","first-page":"65439","DOI":"10.1109\/ACCESS.2022.3182712","volume":"10","author":"R Thabit","year":"2022","unstructured":"Thabit, R., Udzir, N. I., Yasin, S., Asmawi, A., & Gutub, A. (2022). CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data. IEEE Access, 10, 65439\u201365458. https:\/\/doi.org\/10.1109\/ACCESS.2022.3182712","journal-title":"IEEE Access"},{"issue":"1","key":"9999_CR37","first-page":"229","volume":"8","author":"Y Varshney","year":"2017","unstructured":"Varshney, Y. (2017). Attacks on digital watermarks: Classification, implications, benchmarks. International Journal on Emerging Technologies, 8(1), 229\u2013235.","journal-title":"International Journal on Emerging Technologies"},{"issue":"6","key":"9999_CR38","doi-asserted-by":"publisher","first-page":"254","DOI":"10.7753\/IJCATR0606.1004","volume":"6","author":"S Yousif","year":"2017","unstructured":"Yousif, S., Wahbi, T., & Sayed, M. (2017). Audio steganography using tone insertion technique. International Journal of Computer Applications Technology and Research, 6(6), 254\u2013258.","journal-title":"International Journal of Computer Applications Technology and Research"}],"container-title":["International Journal of Speech Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-022-09999-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10772-022-09999-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10772-022-09999-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T11:19:54Z","timestamp":1670843994000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10772-022-09999-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,4]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["9999"],"URL":"https:\/\/doi.org\/10.1007\/s10772-022-09999-0","relation":{},"ISSN":["1381-2416","1572-8110"],"issn-type":[{"value":"1381-2416","type":"print"},{"value":"1572-8110","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,4]]},"assertion":[{"value":"11 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"No need for permission from ethics committee for the article prepared. There is no conflict of interest in the article prepared.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics committee approval and conflict of interest statement"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human participants and\/or animals"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"We declare that this work is original and not considered to be published in any other publication media.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Agreement"}}]}}