{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T09:10:01Z","timestamp":1746177001934,"version":"3.40.4"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2014,4,8]],"date-time":"2014-04-08T00:00:00Z","timestamp":1396915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s11042-014-1988-0","type":"journal-article","created":{"date-parts":[[2014,4,7]],"date-time":"2014-04-07T05:32:38Z","timestamp":1396848758000},"page":"7489-7514","source":"Crossref","is-referenced-by-count":1,"title":["A robust copyright and ownership protection mechanism for music"],"prefix":"10.1007","volume":"74","author":[{"given":"Dong-Her","family":"Shih","sequence":"first","affiliation":[]},{"given":"Ming-Hung","family":"Shih","sequence":"additional","affiliation":[]},{"given":"David C.","family":"Yen","sequence":"additional","affiliation":[]},{"given":"Che-Lun","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,8]]},"reference":[{"issue":"2","key":"1988_CR1","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1109\/TIFS.2007.897258","volume":"2","author":"F Balado","year":"2007","unstructured":"Balado F, Hurley NJ, McCarthy EP, Silvestre GCM (2007) Performance analysis of robust audio hashing. IEEE Trans Inf Forensic Secur 2(2):254\u2013266","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"1988_CR2","doi-asserted-by":"crossref","unstructured":"Bhattacharya S, Chattopadhyay T, Pal A 2006 A survey on different video watermarking techniques and comparative analysis with reference to H.264\/AVC, (ISCE\u201906) IEEE tenth international symposium on consumer electronics, pp 1\u20136","DOI":"10.1109\/ISCE.2006.1689458"},{"issue":"3","key":"1988_CR3","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1080\/13682199.2001.11784377","volume":"14","author":"CC Chang","year":"2001","unstructured":"Chang CC, Wu HC (2001) A copyright forensic scheme of images based on visual cryptography. Imaging Sci J 14(3):141\u2013150","journal-title":"Imaging Sci J"},{"issue":"1","key":"1988_CR4","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/s11042-011-0743-z","volume":"59","author":"M Chung","year":"2012","unstructured":"Chung M, Ko I (2012) Intelligent copyright protection system using a matching video retrieval algorithm. Multimedia Tools Appl 59(1):383\u2013401","journal-title":"Multimedia Tools Appl"},{"issue":"1","key":"1988_CR5","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1049\/el:20030068","volume":"39","author":"O Farooq","year":"2003","unstructured":"Farooq O, Datta S (2003) Wavelet-based denoising for robust feature extraction for speech recognition. Electron Lett 39(1):163\u2013165","journal-title":"Electron Lett"},{"key":"1988_CR6","doi-asserted-by":"crossref","first-page":"992","DOI":"10.1109\/ICOSP.2000.891692","volume":"2","author":"YC Hou","year":"2000","unstructured":"Hou YC, Chen PM (2000) An asymmetric watermarking scheme based on visual cryptography. IEEE Int Conf Signal Process Proc 2:992\u2013995","journal-title":"IEEE Int. Conf Signal Process Proc"},{"issue":"5","key":"1988_CR7","doi-asserted-by":"crossref","first-page":"875","DOI":"10.1109\/41.954550","volume":"48","author":"MS Hsieh","year":"2001","unstructured":"Hsieh MS, Tseng DC, Huang YH (2001) Hiding digital watermarks using multi-resolution wavelet transform. IEEE Trans Ind Electron 48(5):875\u2013882","journal-title":"IEEE Trans Ind Electron"},{"issue":"4","key":"1988_CR8","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1109\/TIFS.2008.2004289","volume":"3","author":"OH Kocal","year":"2008","unstructured":"Kocal OH, Yuruklu E, Avcibas I (2008) Chaotic-type features for speech steganalysis. IEEE Trans Inf Forensic Secur 3(4):651\u2013661","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"1988_CR9","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1016\/S0167-9236(02)00067-2","volume":"34","author":"SH Kwok","year":"2002","unstructured":"Kwok SH, Cheung SC, Wong KC, Tsang KF, Lui SM, Tam KY (2002) Integration of digital rights management into the Internet Open Trading Protocol. Decis Support Syst 34:413\u2013425","journal-title":"Decis Support Syst"},{"key":"1988_CR10","first-page":"27","volume":"1","author":"R Lancini","year":"2004","unstructured":"Lancini R, Mapelli F, Pezzano R (2004) Audio content identification by using perceptual hashing. IEEE Int Conf Multimedia Expo 1:27\u201330","journal-title":"IEEE Int Conf Multimedia Expo"},{"key":"1988_CR11","unstructured":"Li S, Yang X (2006) Digital music starts with CRBT, communicate, Issue 26. Retrieved November 17, 2011, http:\/\/www.huawei.com\/publications\/view.do?id=1122&cid=1782&pid=61"},{"issue":"1","key":"1988_CR12","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s11042-010-0521-3","volume":"57","author":"S Lian","year":"2012","unstructured":"Lian S, Chen X, Wang J (2012) Content distribution and copyright authentication based on combined indexing and watermarking. Multimedia Tools Appl 57(1):49\u201366","journal-title":"Multimedia Tools Appl"},{"issue":"2","key":"1988_CR13","first-page":"130","volume":"25","author":"SD Lin","year":"2003","unstructured":"Lin SD, Shie SC, Chen CF (2003) A DCT based image watermarking with threshold embedding. Int J Comput Appl 25(2):130\u2013135","journal-title":"Int J Comput Appl"},{"issue":"1","key":"1988_CR14","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.csi.2006.02.003","volume":"29","author":"DC Lou","year":"2007","unstructured":"Lou DC, Tso HK, Liu JL (2007) A copyright forensic scheme for digital images using visual cryptography technique. Comput Stand Interfaces 29(1):125\u2013131","journal-title":"Comput Stand Interfaces"},{"key":"1988_CR15","unstructured":"Morse code. In Wikipedia, the Free Encyclopedia. Retrieved November 17, 2010, from: http:\/\/en.wikipedia.org\/w\/index.php?title=Morse_code&oldid=185776159"},{"key":"1988_CR16","unstructured":"Naor N, Shamir A (1995) Visual cryptography, advances in cryptology. Eurocrypt\u201994. Springer, Berlin, pp 1\u201312"},{"issue":"1","key":"1988_CR17","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.forsciint.2008.04.016","volume":"179","author":"R Ni","year":"2008","unstructured":"Ni R, Ruan Q, Zhao Y (2008) Pinpoint authentication watermarking based on a chaotic system. Forensic Sci Int 179(1):54\u201362","journal-title":"Forensic Sci Int"},{"issue":"2\u20133","key":"1988_CR18","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1016\/j.forsciint.2006.08.019","volume":"169","author":"A Noore","year":"2007","unstructured":"Noore A, Singh R, Vatsa M, Houck MM (2007) Enhancing security of fingerprints through contextual biometric watermarking. Forensic Sci Int 169(2\u20133):188\u2013194","journal-title":"Forensic Sci Int"},{"issue":"3","key":"1988_CR19","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1006\/jvci.1998.0391","volume":"9","author":"L Qian","year":"1998","unstructured":"Qian L, Nahrstedt K (1998) Watermarking schemes and protocols for protecting rightful ownership and customer\u2019s rights. J Vis Commun Image Represent 9(3):194\u2013210","journal-title":"J Vis Commun Image Represent"},{"issue":"1","key":"1988_CR20","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1109\/TIFS.2010.2095844","volume":"6","author":"A Rial","year":"2011","unstructured":"Rial A, Balasch J, Preneel B (2011) A privacy-preserving buyer\u2013seller watermarking protocol based on priced oblivious transfer. IEEE Trans Inf Forensic Secur 6(1):202\u2013212","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"1988_CR21","doi-asserted-by":"crossref","unstructured":"Socek D, Magliveras SS (2005) General access structures in audio cryptography. IEEE International Conference on Electro Information Technology, Lincoln, NE, pp 22\u201325","DOI":"10.1109\/EIT.2005.1627018"},{"key":"1988_CR22","unstructured":"Stan S (2003, August 29) The PICAXE Part 7 - get that clever code purring. Silicon Chip, Issue: 179"},{"issue":"11","key":"1988_CR23","doi-asserted-by":"crossref","first-page":"3057","DOI":"10.1016\/j.patcog.2009.01.015","volume":"42","author":"XY Wang","year":"2009","unstructured":"Wang XY, Niu PP, Yang HY (2009) A robust digital audio watermarking based on statistics characteristics. Pattern Recogn 42(11):3057\u20133064","journal-title":"Pattern Recogn"},{"issue":"8","key":"1988_CR24","doi-asserted-by":"crossref","first-page":"2270","DOI":"10.1109\/TASL.2007.906192","volume":"15","author":"X Wang","year":"2007","unstructured":"Wang X, Qi W, Niu P (2007) A new adaptive digital audio watermarking based on support vector regression. IEEE Trans Audio Speech Lang Process 15(8):2270\u20132277","journal-title":"IEEE Trans Audio Speech Lang Process"},{"issue":"8","key":"1988_CR25","first-page":"1589","volume":"E83-A","author":"CC Wang","year":"2000","unstructured":"Wang CC, Tai SC, Yu CS (2000) Repeating image watermarking technique by the visual cryptography. IEICE Trans Fundam Electron E83-A(8):1589\u20131598","journal-title":"IEICE Trans Fundam Electron"},{"issue":"11","key":"1988_CR26","doi-asserted-by":"crossref","first-page":"2189","DOI":"10.1016\/j.ins.2011.01.019","volume":"181","author":"D Wang","year":"2011","unstructured":"Wang D, Yi F, Li X (2011) Probabilistic visual secret sharing schemes for grey-scale images and color images. Inf Sci 181(11):2189\u20132208","journal-title":"Inf Sci"},{"issue":"10","key":"1988_CR27","doi-asserted-by":"crossref","first-page":"6787","DOI":"10.1016\/j.eswa.2010.03.047","volume":"37","author":"CC Wu","year":"2010","unstructured":"Wu CC, Lin CC, Chang CC (2010) Digital rights management for multimedia content over 3G mobile networks. Expert Syst Appl 37(10):6787\u20136797","journal-title":"Expert Syst Appl"},{"key":"1988_CR28","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1109\/SUTC.2006.19","volume":"2","author":"Y Wu","year":"2006","unstructured":"Wu Y, Shimamoto S (2006) A study on DWT-based digital audio watermarking for mobile ad hoc network. IEEE Int Conf Sensor Netw Ubiquit Trustworthy Comput 2:247\u2013251","journal-title":"IEEE Int Conf Sensor Netw Ubiquit Trustworthy Comput"},{"issue":"11","key":"1988_CR29","doi-asserted-by":"crossref","first-page":"2603","DOI":"10.1016\/S0031-3203(03)00086-4","volume":"36","author":"Z Yu","year":"2003","unstructured":"Yu Z, Ip HH, Kwok LF (2003) A robust watermarking scheme for 3D triangular mesh models. Pattern Recogn 36(11):2603\u20132614","journal-title":"Pattern Recogn"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-1988-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-014-1988-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-1988-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T08:53:24Z","timestamp":1746176004000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-014-1988-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,8]]},"references-count":29,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["1988"],"URL":"https:\/\/doi.org\/10.1007\/s11042-014-1988-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2014,4,8]]}}}