{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:28:07Z","timestamp":1740122887387,"version":"3.37.3"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,6,15]],"date-time":"2023-06-15T00:00:00Z","timestamp":1686787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,15]],"date-time":"2023-06-15T00:00:00Z","timestamp":1686787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902280"],"award-info":[{"award-number":["61902280"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006606","name":"Natural Science Foundation of Tianjin City","doi-asserted-by":"publisher","award":["19JCYBJC15600"],"award-info":[{"award-number":["19JCYBJC15600"]}],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Tianjin Science and Technology Project","award":["20YDTPJC00870"],"award-info":[{"award-number":["20YDTPJC00870"]}]},{"name":"Tianjin Major Project for Civil-Military Integration of Science and Technology","award":["18ZXJMTG00260"],"award-info":[{"award-number":["18ZXJMTG00260"]}]},{"name":"Education and Teaching Reform Project of Tiangong University","award":["2019-2-34"],"award-info":[{"award-number":["2019-2-34"]}]},{"name":"Education and Teaching Reform Project of Tiangong University","award":["2019-2-33"],"award-info":[{"award-number":["2019-2-33"]}]},{"name":"Tianjin Science and Technology Project","award":["19PTZWHZ00020"],"award-info":[{"award-number":["19PTZWHZ00020"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62176182"],"award-info":[{"award-number":["62176182"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s11042-023-15580-x","type":"journal-article","created":{"date-parts":[[2023,6,15]],"date-time":"2023-06-15T08:02:01Z","timestamp":1686816121000},"page":"6711-6729","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Speech watermarking based tamper detection and recovery scheme with high tolerable tamper rate"],"prefix":"10.1007","volume":"83","author":[{"given":"Shengbei","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1900-8259","authenticated-orcid":false,"given":"Weitao","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,15]]},"reference":[{"key":"15580_CR1","unstructured":"And JF, Goljan M (1999) Images with self-correcting capabilities. In: International conference on image processing"},{"key":"15580_CR2","doi-asserted-by":"crossref","unstructured":"Dhawan A, Mitra SK (2008) Hybrid audio watermarking with spread spectrum and singular value decomposition in India Conference","DOI":"10.1109\/INDCON.2008.4768793"},{"key":"15580_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/ATSIP.2019.4","volume":"8","author":"K Galajit","year":"2019","unstructured":"Galajit K, Karnjana J, Unoki M, Aimmanee P (2019) Semi-fragile speech watermarking based on singular-spectrum analysis with cnn-based parameter estimation for tampering detection. APSIPA Trans Signal Inf Process 8:1\u201313","journal-title":"APSIPA Trans Signal Inf Process"},{"issue":"8","key":"15580_CR4","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1016\/j.sigpro.2009.02.009","volume":"89","author":"HJ He","year":"2009","unstructured":"He HJ, Zhang JS, Chen F (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process 89 (8):1557\u20131566","journal-title":"Signal Process"},{"key":"15580_CR5","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1186\/1687-4722-2012-14","volume":"2012","author":"E Hoffmann","year":"2012","unstructured":"Hoffmann E, Kolossa D, K\u00f6hler B, Orglmeister R (2012) Using information theoretic distance measures for solving the permutation problem of blind source separation of speech signals. EURASIP J Audio Speech Music Process 2012:14","journal-title":"EURASIP J Audio Speech Music Process"},{"key":"15580_CR6","doi-asserted-by":"publisher","first-page":"180,395","DOI":"10.1109\/ACCESS.2019.2958095","volume":"7","author":"H Hu","year":"2019","unstructured":"Hu H, Lee T (2019) Hybrid blind audio watermarking for proprietary protection, tamper proofing, and self-recovery. IEEE Access 7:180,395\u2013180,408","journal-title":"IEEE Access"},{"issue":"1","key":"15580_CR7","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1109\/TASL.2007.911054","volume":"16","author":"Y Hu","year":"2008","unstructured":"Hu Y, Loizou PC (2008) Evaluation of objective quality measures for speech enhancement. IEEE Trans Audio Speech Lang Process 16(1):229\u2013238","journal-title":"IEEE Trans Audio Speech Lang Process"},{"key":"15580_CR8","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.sigpro.2016.04.005","volume":"128","author":"G Hua","year":"2016","unstructured":"Hua G, Huang J, Shi YQ, Goh J, Thing VLL (2016) Twenty years of digital audio watermarking - a comprehensive review. Signal Process 128:222\u2013242","journal-title":"Signal Process"},{"key":"15580_CR9","unstructured":"Ito K (2017) The lj speech dataset. https:\/\/keithito.com\/LJ-speech-dataset\/"},{"key":"15580_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13636-018-0139-3","volume":"2018","author":"A Kanhe","year":"2018","unstructured":"Kanhe A, Gnanasekaran A (2018) Robust image-in-audio watermarking technique based on dct-svd transform. EURASIP J Audio Speech Music Process 2018:1","journal-title":"EURASIP J Audio Speech Music Process"},{"key":"15580_CR11","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1186\/s13636-018-0139-3","volume":"2018","author":"A Kanhe","year":"2018","unstructured":"Kanhe A, Aghila G (2018) Robust image-in-audio watermarking technique based on DCT-SVD transform. EURASIP J Audio Speech Music Process 2018:16","journal-title":"EURASIP J Audio Speech Music Process"},{"key":"15580_CR12","doi-asserted-by":"crossref","unstructured":"Karnjana J, Galajit K, Aimmanee P, Wutiwiwatchai C, Unoki M (2017) Speech watermarking scheme based on singular-spectrum analysis for tampering detection and identification. In: 2017 Asia-Pacific signal and information processing association annual summit and conference, APSIPA ASC 2017, Kuala Lumpur, Malaysia, December 12\u201315, 2017, pp 193\u2013202","DOI":"10.1109\/APSIPA.2017.8282027"},{"key":"15580_CR13","doi-asserted-by":"crossref","unstructured":"Karnjana J, Galajit K, Aimmanee P, Wutiwiwatchai C, Unoki M (2017) Speech watermarking scheme based on singular-spectrum analysis for tampering detection and identification. In: Proceedings of 2017 Asia-Pacific signal and information processing association annual summit and conference, APSIPA ASC 2017, Kuala Lumpur, Malaysia, December 12\u201315, 2017, pp 193\u2013202","DOI":"10.1109\/APSIPA.2017.8282027"},{"issue":"11","key":"15580_CR14","doi-asserted-by":"publisher","first-page":"2368","DOI":"10.1109\/TASL.2013.2277929","volume":"21","author":"BY Lei","year":"2013","unstructured":"Lei BY, Soon IY, Tan E (2013) Robust svd-based audio watermarking scheme with differential evolution optimization. IEEE Trans Audio Speech Lang Process 21(11):2368\u20132378","journal-title":"IEEE Trans Audio Speech Lang Process"},{"key":"15580_CR15","doi-asserted-by":"crossref","unstructured":"Li J, Lu W, Zhang C, Wei J, Cao X, Dang J (2016) A study on detection and recovery of speech signal tampering. In: 2016 IEEE, Trustcom\/BigDataSE\/ISPA, Tianjin, China, August 23\u201326, 2016, pp 678\u2013682","DOI":"10.1109\/TrustCom.2016.0125"},{"key":"15580_CR16","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.dsp.2016.07.015","volume":"60","author":"X Lin","year":"2017","unstructured":"Lin X, Kang X (2017) Exposing speech tampering via spectral phase analysis. Digit Signal Process 60:63\u201374","journal-title":"Digit Signal Process"},{"issue":"C","key":"15580_CR17","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.sigpro.2015.10.023","volume":"123","author":"Z Liu","year":"2016","unstructured":"Liu Z, Fan Z, Jing W, Wang H, Huang J (2016) Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Process 123(C):157\u2013166","journal-title":"Signal Process"},{"key":"15580_CR18","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.sigpro.2015.10.023","volume":"123","author":"Z Liu","year":"2016","unstructured":"Liu Z, Zhang F, Wang J, Wang H, Huang J (2016) Authentication and recovery algorithm for speech signal based on digital watermarking. Signal Process 123:157\u2013166","journal-title":"Signal Process"},{"issue":"10","key":"15580_CR19","doi-asserted-by":"publisher","first-page":"12,481","DOI":"10.1007\/s11042-016-3664-z","volume":"76","author":"Z Liu","year":"2017","unstructured":"Liu Z, Luo D, Huang J, Wang J, Qi C (2017) Tamper recovery algorithm for digital speech signal based on DWT and DCT. Multimedia Tools Appl 76(10):12,481\u201312,504","journal-title":"Multimedia Tools Appl"},{"issue":"10","key":"15580_CR20","doi-asserted-by":"publisher","first-page":"12,481","DOI":"10.1007\/s11042-016-3664-z","volume":"76","author":"Z Liu","year":"2017","unstructured":"Liu Z, Luo D, Huang J, Wang J, Qi C (2017) Tamper recovery algorithm for digital speech signal based on DWT and DCT. Multimedia Tools Appl 76(10):12,481\u201312,504","journal-title":"Multimedia Tools Appl"},{"key":"15580_CR21","doi-asserted-by":"crossref","unstructured":"Liu Z, Li Y, Sun F, He J, Qi C, Luo D (2018) A robust recoverable algorithm used for digital speech forensics based on DCT. In: Cloud computing and security - 4th international conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised selected papers, Part VI, pp 300\u2013311","DOI":"10.1007\/978-3-030-00021-9_28"},{"issue":"7","key":"15580_CR22","doi-asserted-by":"publisher","first-page":"2390","DOI":"10.3390\/s18072390","volume":"18","author":"W Lu","year":"2018","unstructured":"Lu W, Chen Z, Ling L, Cao X, Wei J, Xiong N, Jian L, Dang J (2018) Watermarking based on compressive sensing for digital speech detection and recovery? Sensors 18(7):2390","journal-title":"Sensors"},{"key":"15580_CR23","doi-asserted-by":"publisher","first-page":"107122","DOI":"10.1016\/j.compeleceng.2021.107122","volume":"91","author":"Z Mubeen","year":"2021","unstructured":"Mubeen Z, Afzal M, Ali Z, Khan S, Imran M (2021) Detection of impostor and tampered segments in audio by using an intelligent system. Comput Electr Eng 91:107122","journal-title":"Comput Electr Eng"},{"issue":"5","key":"15580_CR24","doi-asserted-by":"publisher","first-page":"7251","DOI":"10.1007\/s11042-016-3350-1","volume":"76","author":"MA Nematollahi","year":"2017","unstructured":"Nematollahi MA, Gamboa-Rosales H, Martinez-Ruiz FJ, Rosa-Vargas JIDL, Al-Haddad SAR, Esmaeilpour M (2017) Multi-factor authentication model based on multipurpose speech watermarking and online speaker recognition. Multimedia Tools Appl 76(5):7251","journal-title":"Multimedia Tools Appl"},{"issue":"4","key":"15580_CR25","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/s10772-013-9192-6","volume":"16","author":"MA Nematollahi","year":"2013","unstructured":"Nematollahi MA, Al-Haddad SAR (2013) An overview of digital speech watermarking. Int J Speech Technol 16(4):471\u2013488","journal-title":"Int J Speech Technol"},{"issue":"4","key":"15580_CR26","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/79.939835","volume":"18","author":"CI Podilchuk","year":"2001","unstructured":"Podilchuk CI, Delp EJ (2001) Digital watermarking: algorithms and applications. IEEE Signal Proc Mag 18(4):33\u201346","journal-title":"IEEE Signal Proc Mag"},{"key":"15580_CR27","doi-asserted-by":"crossref","unstructured":"Qian Q, Wang H, Abdullahi SM, Wang H, Shi C (2016) Speech authentication and recovery scheme in encrypted domain. In: Digital forensics and watermarking - 15th international workshop, IWDW 2016, Beijing, China, September 17\u201319, 2016, Revised Selected Papers, pp 46\u201360","DOI":"10.1007\/978-3-319-53465-7_4"},{"issue":"4","key":"15580_CR28","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/s11235-017-0360-x","volume":"67","author":"Q Qian","year":"2018","unstructured":"Qian Q, Wang H, Sun X, Cui Y, Wang H, Shi C (2018) Speech authentication and content recovery scheme for security communication and storage. Telecommun Syst 67(4):635\u2013649","journal-title":"Telecommun Syst"},{"issue":"C","key":"15580_CR29","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.sigpro.2017.03.033","volume":"138","author":"C Qin","year":"2017","unstructured":"Qin C, Ping J, Zhang X, Jing D, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138(C):280\u2013293","journal-title":"Signal Process"},{"key":"15580_CR30","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1186\/s13640-019-0462-3","volume":"2019","author":"L Rakhmawati","year":"2019","unstructured":"Rakhmawati L, Wirawan, Suwadi (2019) A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability. EURASIP J Image Video Process 2019:61","journal-title":"EURASIP J Image Video Process"},{"key":"15580_CR31","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.ins.2015.08.040","volume":"328","author":"R Rigoni","year":"2016","unstructured":"Rigoni R, Freitas PG, Farias MCQ (2016) Detecting tampering in audio-visual content using QIM watermarking. Inf Sci 328:127\u2013143","journal-title":"Inf Sci"},{"issue":"7","key":"15580_CR32","first-page":"2266","volume":"24","author":"S Saeed","year":"2015","unstructured":"Saeed S, Mohammad Ali A (2015) A source-channel coding approach to digital image protection and self-recovery. IEEE Trans Image Process A Publ IEEE Signal Process Soc 24(7):2266\u201377","journal-title":"IEEE Trans Image Process A Publ IEEE Signal Process Soc"},{"issue":"11","key":"15580_CR33","first-page":"1917","volume":"23","author":"S Sarreshtedari","year":"2015","unstructured":"Sarreshtedari S, Akhaee MA, Abbasfar A (2015) A watermarking method for digital speech self-recovery. IEEE\/ACM Trans Audio Speech Lang Process 23(11):1917\u20131925","journal-title":"IEEE\/ACM Trans Audio Speech Lang Process"},{"issue":"4","key":"15580_CR34","doi-asserted-by":"publisher","first-page":"4457","DOI":"10.1007\/s11277-017-4095-5","volume":"95","author":"S Shokri","year":"2017","unstructured":"Shokri S, Ismail M, Zainal N, Moghaddasi M (2017) Audio-speech watermarking using a channel equalizer. Wirel Pers Commun 95 (4):4457\u20134476","journal-title":"Wirel Pers Commun"},{"key":"15580_CR35","unstructured":"Unoki M, Miyauchi R (2017) Detection of tampering in speech signals with inaudible watermarking technique. In: Proceedings of 8th international conference on intelligent information hiding and multimedia signal processing, IIH-MSP, Piraeus-Athens, Greece, pp 118\u2013121"},{"key":"15580_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.specom.2019.06.004","volume":"112","author":"S Wang","year":"2019","unstructured":"Wang S, Yuan W, Wang J, Unoki M (2019) Detection of speech tampering using sparse representations and spectral manipulations based information hiding. Speech Comm 112:1\u201314","journal-title":"Speech Comm"},{"key":"15580_CR37","doi-asserted-by":"crossref","unstructured":"Wang S, Yuan W, Wang J, Unoki M (2019) Inaudible speech watermarking based on self-compensated echo-hiding and sparse subspace clustering. In: IEEE international conference on acoustics, speech and signal processing, ICASSP, 2019, Brighton, United Kingdom, May 12-17, 2019, pp 2632\u20132636","DOI":"10.1109\/ICASSP.2019.8682352"},{"key":"15580_CR38","unstructured":"Wang S, Yuan W, Zhang Z, Wang J, Unoki M (2021) Tampering detection for speech signals using synchronization code and lsf-based watermarks. In: Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA, ASC 2021, Tokyo, Japan, December 14-17, 2021. IEEE, pp 1621\u20131626"},{"issue":"16","key":"15580_CR39","doi-asserted-by":"publisher","first-page":"24,925","DOI":"10.1007\/s11042-021-10905-0","volume":"80","author":"Q Zhang","year":"2021","unstructured":"Zhang Q, Zhang D, Xu F (2021) An encrypted speech authentication and tampering recovery method based on perceptual hashing. Multimedia Tools Appl 80(16):24,925\u201324,948","journal-title":"Multimedia Tools Appl"},{"issue":"5","key":"15580_CR40","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1016\/j.image.2007.03.004","volume":"22","author":"X Zhu","year":"2007","unstructured":"Zhu X, Ho ATS, Marziliano P (2007) A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process Image Commun 22(5):515\u2013528","journal-title":"Signal Process Image Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15580-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15580-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15580-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,8]],"date-time":"2024-01-08T07:30:18Z","timestamp":1704699018000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15580-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,15]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["15580"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15580-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,6,15]]},"assertion":[{"value":"26 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}