{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T09:32:24Z","timestamp":1751275944345,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T00:00:00Z","timestamp":1705449600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T00:00:00Z","timestamp":1705449600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-18202-2","type":"journal-article","created":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T06:01:56Z","timestamp":1705471316000},"page":"64637-64662","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["MP3 Audio watermarking using calibrated side information features for tamper detection and localization"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4827-2158","authenticated-orcid":false,"given":"Salma","family":"Masmoudi","sequence":"first","affiliation":[]},{"given":"Maha","family":"Charfeddine","sequence":"additional","affiliation":[]},{"given":"Chokri","family":"Ben Amar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,17]]},"reference":[{"key":"18202_CR1","unstructured":"Awasthi A, Nirmal ML. Multiple image watermarking approach based on anfis for copyright protection and image authentication: A review"},{"issue":"10","key":"18202_CR2","first-page":"780","volume":"42","author":"K Brandenburg","year":"1994","unstructured":"Brandenburg K, Stoll G (1994) Iso\/mpeg-1 audio: A generic standard for coding of high-quality digital audio. J Audio Eng Soc 42(10):780\u2013792","journal-title":"J Audio Eng Soc"},{"key":"18202_CR3","unstructured":"Bailong Y, Penghui W, Yaque J, Jing M (2013) Lossless and Secure Watermarking Scheme in MP3 Audio by Modifying Redundant Bit in the Frames. In: The Proceedings of the IEEE 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), Vol. 1, Xi\u2019an, China, pp. 154-157"},{"key":"18202_CR4","first-page":"1","volume":"1","author":"T Bianchi","year":"2014","unstructured":"Bianchi T, Rosa AD, Fontani M, Rocciolo G, Piva A (2014) Detection and localization of double compression in MP3 audio tracks. EURASIP J Inf Secur 1:1\u201314","journal-title":"EURASIP J Inf Secur"},{"key":"18202_CR5","doi-asserted-by":"publisher","first-page":"12654","DOI":"10.1109\/ACCESS.2022.3145950","volume":"10","author":"M Charfeddine","year":"2022","unstructured":"Charfeddine M, Mezghani E, Masmoudi S, Amar CB, Alhumyani H (2022) Audio Watermarking for Security and Non-Security Applications. IEEE Access 10:12654\u201312677","journal-title":"IEEE Access"},{"key":"18202_CR6","doi-asserted-by":"crossref","unstructured":"Chaabane F, Charfeddine M, Amar CB (2013) A survey on digital tracing traitors schemes. In: 2013 9th International Conference on Information Assurance and Security (IAS) (pp. 85-90). IEEE","DOI":"10.1109\/ISIAS.2013.6947738"},{"key":"18202_CR7","doi-asserted-by":"crossref","unstructured":"Chaabane F, Charfeddine M, Puech W, Amar CB (2015) A QR-code based audio watermarking technique for tracing traitors. In: 2015 23rd European Signal Processing Conference (EUSIPCO) (pp. 51-55). IEEE","DOI":"10.1109\/EUSIPCO.2015.7362343"},{"key":"18202_CR8","doi-asserted-by":"crossref","unstructured":"Chaabane F, Charfeddine M, Amar CB (2014) A multimedia tracing traitors scheme using multi-level hierarchical structure for tardos fingerprint based audio watermarking. In: 2014 International Conference on Signal Processing and Multimedia Applications (SIGMAP) (pp. 289-296). IEEE","DOI":"10.5220\/0005066602890296"},{"key":"18202_CR9","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.inffus.2017.12.007","volume":"44","author":"D Charte","year":"2017","unstructured":"Charte D et al (2017) A practical tutorial on autoencoders for nonlinear feature fusion: Taxonomy, models, software and guidelines. Inf Fusion 44:78\u201396","journal-title":"Inf Fusion"},{"issue":"3","key":"18202_CR10","doi-asserted-by":"publisher","first-page":"1521","DOI":"10.1007\/s11042-012-1167-0","volume":"70","author":"M Charfeddine","year":"2014","unstructured":"Charfeddine M, El\u2019arbi M, Amar CB (2014) A new DCT audio watermarking scheme based on preliminary MP3 study. Multimedia Tools Appl 70(3):1521\u20131557","journal-title":"Multimedia Tools Appl"},{"issue":"13","key":"18202_CR11","doi-asserted-by":"publisher","first-page":"17729","DOI":"10.1007\/s11042-022-12719-0","volume":"81","author":"Y Hu","year":"2022","unstructured":"Hu Y, Lu W, Ma M, Sun Q, Wei J (2022) A semi fragile watermarking algorithm based on compressed sensing applied for audio tampering detection and recovery. Multimedia Tools Appl 81(13):17729\u201317746","journal-title":"Multimedia Tools Appl"},{"key":"18202_CR12","doi-asserted-by":"publisher","first-page":"180395","DOI":"10.1109\/ACCESS.2019.2958095","volume":"7","author":"H Hu","year":"2019","unstructured":"Hu H, Lee T (2019) Hybrid blind audio watermarking for proprietary protection, tamper proofing, and self-recovery. IEEE Access 7:180395\u2013180408","journal-title":"IEEE Access"},{"issue":"3","key":"18202_CR13","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s11042-012-1058-4","volume":"68","author":"J Li","year":"2014","unstructured":"Li J, Wang R, Yan D, Li Y (2014) A multipurpose audio aggregation watermarking based on multistage vector quantization. Multimedia Tools Appl 68(3):571\u2013593","journal-title":"Multimedia Tools Appl"},{"key":"18202_CR14","first-page":"164","volume-title":"proceeding of the third IEEE Symposium Series in computational intelligence CICS","author":"M El\u2019Arbi","year":"2011","unstructured":"El\u2019Arbi M, Charfeddine M, Masmoudi S, Koubaa M, Amar CB (2011) Video Watermarking algorithm with BCH error correcting codes hidden in audio channel. proceeding of the third IEEE Symposium Series in computational intelligence CICS. IEEE Symposium on Computational Intelligence in Cyber Security, Paris-France, pp 164\u2013170"},{"key":"18202_CR15","unstructured":"Mezghani E, Charfeddine M, Ben Amar C (2013) Audio Silence Deletion before and after MPEG video compression, Computer Applications Technology (ICCAT), 2013 International Conference on. IEEE"},{"key":"18202_CR16","doi-asserted-by":"publisher","unstructured":"Mezghani E, Charfeddine M, Nicolas H, Amar CB (2016) Multifeature speech\/music discrimination based on mid-term level statistics and supervised classifiers, 2016 IEEE\/ACS 13th International Conference of Computer Systems and Applications (AICCSA 2016), Agadir, pp. 1-8. https:\/\/doi.org\/10.1109\/AICCSA.2016.7945728","DOI":"10.1109\/AICCSA.2016.7945728"},{"key":"18202_CR17","doi-asserted-by":"crossref","unstructured":"Mezghani E., Charfeddine M., Amar C. B., Nicolas H (2015) Audiovisual video characterization using audio watermarking scheme. In: 2015 15th International Conference on Intelligent Systems Design and Applications (ISDA) (pp. 213-218). IEEE","DOI":"10.1109\/ISDA.2015.7489227"},{"key":"18202_CR18","unstructured":"Masmoudi S, Charfeddine M, Amar CB (2011) A robust audio watermarking technique based on the perceptual evaluation of audio quality algorithm in the multi-resolution domain. In: Proceedings of the 10th IEEE international symposium on signal processing and information technology ISSPIT, Luxor-Egypt, pp 326-331"},{"key":"18202_CR19","doi-asserted-by":"publisher","first-page":"3019","DOI":"10.1007\/s00034-019-01299-4","volume":"39","author":"S Masmoudi","year":"2020","unstructured":"Masmoudi S, Charfeddine M, Amar CB (2020) A Semi-Fragile Digital Audio Watermarking Scheme for MP3-Encoded Signals Using Huffman Data. Circ Syst Signal Process 39:3019\u20133034. https:\/\/doi.org\/10.1007\/s00034-019-01299-4","journal-title":"Circ Syst Signal Process"},{"key":"18202_CR20","unstructured":"International Union of T\u00e9l\u00e9communications (UIT) (2001) Recommendation UIT-R B.S. 1387, Method of Objective Measurement of Perceived Sound Quality"},{"key":"18202_CR21","doi-asserted-by":"publisher","first-page":"32925","DOI":"10.1007\/s11042-021-11370-5","volume":"80","author":"VL Narla","year":"2021","unstructured":"Narla VL, Gulivindala S, Chanamallu SR et al (2021) BCH encoded robust and blind audio watermarking with tamper detection using hash. Multimed Tools Appl 80:32925\u201332945. https:\/\/doi.org\/10.1007\/s11042-021-11370-5","journal-title":"Multimed Tools Appl"},{"key":"18202_CR22","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s42044-020-00059-x","volume":"3","author":"U Nair","year":"2020","unstructured":"Nair U, Birajdar GK (2020) Compressed domain secure, robust and high-capacity audio watermarking. Iran J Comput Sci 3:217\u2013232. https:\/\/doi.org\/10.1007\/s42044-020-00059-x","journal-title":"Iran J Comput Sci"},{"issue":"2","key":"18202_CR23","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/93.388209","volume":"2","author":"D Pan","year":"1995","unstructured":"Pan D (1995) A tutorial on MPEG\/audio compression. IEEE multimedia 2(2):60\u201374","journal-title":"IEEE multimedia"},{"key":"18202_CR24","doi-asserted-by":"publisher","first-page":"2581","DOI":"10.1007\/s11277-022-09675-1","volume":"125","author":"S Prasad","year":"2022","unstructured":"Prasad S, Pal AK, Paul S (2022) A Block-Level Image Tamper Detection Scheme Using Modulus Function Based Fragile Watermarking. Wireless Pers Commun 125:2581\u20132619. https:\/\/doi.org\/10.1007\/s11277-022-09675-1","journal-title":"Wireless Pers Commun"},{"key":"18202_CR25","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.eswa.2017.09.003","volume":"91","author":"D Renza","year":"2018","unstructured":"Renza D, Lemus C et al (2018) Authenticity verification of audio signals based on fragile watermarking for audio forensics. Expert Syst Appl 91:211\u2013222","journal-title":"Expert Syst Appl"},{"key":"18202_CR26","doi-asserted-by":"crossref","unstructured":"Subramanyam AV, Emmanuel S (2012) Audio Watermarking in Partially Compressed-encrypted Domain, 2012 IEEE International Conference on Systems, Man, and Cybernetics, Seoul, Korea, October 14-17","DOI":"10.1109\/ICSMC.2012.6378184"},{"key":"18202_CR27","unstructured":"Servetti A, Testa C, De Martin JC (2003) Frequency-selective partial encryption of compressed audio, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings(ICASSP\u201903), 5:V\u2013668"},{"key":"18202_CR28","first-page":"1","volume":"10","author":"M Steinebach","year":"2003","unstructured":"Steinebach M (2003) Dittmann J (2003) Watermarking based digital audio data authentication. EURASIP J Adv Signal Process 10:1\u201315","journal-title":"EURASIP J Adv Signal Process"},{"key":"18202_CR29","doi-asserted-by":"publisher","first-page":"85677","DOI":"10.1109\/ACCESS.2022.3198963","volume":"10","author":"S Sharma","year":"2022","unstructured":"Sharma S, Zou JJ, Fang G (2022) A Novel Multipurpose Watermarking Scheme Capable of Protecting and Authenticating Images With Tamper Detection and Localisation Abilities. IEEE Access 10:85677\u201385700","journal-title":"IEEE Access"},{"issue":"1","key":"18202_CR30","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s00530-022-01006-5","volume":"29","author":"N Tarhouni","year":"2023","unstructured":"Tarhouni N, Masmoudi S, Charfeddine M, Amar CB (2023) Fake COVID-19 videos detector based on frames and audio watermarking. Multimedia Syst 29(1):361\u2013375","journal-title":"Multimedia Syst"},{"key":"18202_CR31","doi-asserted-by":"publisher","first-page":"5059","DOI":"10.1007\/s00034-020-01401-1","volume":"39","author":"N Tarhouni","year":"2020","unstructured":"Tarhouni N, Charfeddine M, Amar CB (2020) Novel and robust image watermarking for copyright protection and integrity control. Circuits, Systems, and Signal Processing 39:5059\u20135103","journal-title":"Circuits, Systems, and Signal Processing"},{"issue":"3","key":"18202_CR32","first-page":"301","volume":"28","author":"X Tong","year":"2013","unstructured":"Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Processing: Image Communication 28(3):301\u2013308","journal-title":"Signal Processing: Image Communication"},{"key":"18202_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.specom.2019.06.004","volume":"112","author":"Sh Wang","year":"2019","unstructured":"Wang Sh, Yuan W, Wang J, Unoki M (2019) Detection of speech tampering using sparse representations and spectral manipulations based information hiding. Speech Commun 112:1\u201314","journal-title":"Speech Commun"},{"key":"18202_CR34","doi-asserted-by":"crossref","unstructured":"Xiang Z, Bestagini P, Tubaro S, Delp EJ (2022) Forensic analysis and localization of multiply compressed mp3 audio using transformers. In: ICASSP 2022, 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pages 2929-2933. IEEE 2022","DOI":"10.1109\/ICASSP43922.2022.9747639"},{"issue":"2","key":"18202_CR35","first-page":"662","volume":"12","author":"D Yan","year":"2018","unstructured":"Yan D, Wang R, Zhou J, Jin C, Wang Z (2018) Compression history detection for mp3 audio. KSII Transactions on Internet and Information Systems (TIIS) 12(2):662\u2013675","journal-title":"KSII Transactions on Internet and Information Systems (TIIS)"},{"issue":"7","key":"18202_CR36","doi-asserted-by":"publisher","first-page":"9363","DOI":"10.1007\/s11042-016-3539-3","volume":"76","author":"S Zhaopin","year":"2017","unstructured":"Zhaopin S, Lejie C, Guofu Z, Jianguo J, Feng Y (2017) Window switching strategy based semi-fragile watermarking for MP3 tamper detection. Multimedia Tools Appl 76(7):9363\u20139386","journal-title":"Multimedia Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18202-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-18202-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18202-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T17:49:51Z","timestamp":1720460991000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-18202-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,17]]},"references-count":36,"journal-issue":{"issue":"24","published-online":{"date-parts":[[2024,7]]}},"alternative-id":["18202"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-18202-2","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,1,17]]},"assertion":[{"value":"26 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 January 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest\/Competing interests"}}]}}