{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T09:28:50Z","timestamp":1753522130858,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,8,3]],"date-time":"2018-08-03T00:00:00Z","timestamp":1533254400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11235-018-0497-2","type":"journal-article","created":{"date-parts":[[2018,8,3]],"date-time":"2018-08-03T06:38:02Z","timestamp":1533278282000},"page":"583-594","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Short distance data transmission method using inaudible high-frequencies between smart devices"],"prefix":"10.1007","volume":"70","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8886-2961","authenticated-orcid":false,"given":"Myoungbeom","family":"Chung","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,3]]},"reference":[{"issue":"3","key":"497_CR1","doi-asserted-by":"publisher","first-page":"169","DOI":"10.4236\/ijcns.2009.23019","volume":"2","author":"P Pekka","year":"2009","unstructured":"Pekka, P., Chia-Hao, Y., Klaus, D., Cassio, R., Carl, W., Klaus, H., et al. (2009). Device-to-device communication underlaying cellular communications systems. Internaational Journal of Communications, Network and System Sciences,\n                           2(3), 169\u2013178. \n                    https:\/\/doi.org\/10.4236\/ijcns.2009.23019\n                    \n                  .","journal-title":"Internaational Journal of Communications, Network and System Sciences"},{"key":"497_CR2","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1016\/j.procs.2011.07.076","volume":"5","author":"PP Bihler","year":"2011","unstructured":"Bihler, P. P., Imhoff, P., & Cremers, A. B. (2011). SmartGuide\u2014A smartphone museum guide with ultrasound control. Procedia Computer Science,\n                           5, 586\u2013592. \n                    https:\/\/doi.org\/10.1016\/j.procs.2011.07.076\n                    \n                  .","journal-title":"Procedia Computer Science"},{"issue":"2","key":"497_CR3","doi-asserted-by":"publisher","first-page":"327","DOI":"10.13089\/JKIISC.2014.24.2.327","volume":"22","author":"JB Kim","year":"2012","unstructured":"Kim, J. B., Song, J. E., & Lee, M. K. (2012). Authentication of a smart phone user using audio frequency analysis. The Journal of the Korea Institute of Information Security and Cryptology,\n                           22(2), 327\u2013336.","journal-title":"The Journal of the Korea Institute of Information Security and Cryptology"},{"issue":"15","key":"497_CR4","doi-asserted-by":"publisher","first-page":"5955","DOI":"10.1007\/s11042-014-1901-x","volume":"74","author":"MB Chung","year":"2015","unstructured":"Chung, M. B., & Choo, H. S. (2015). Near wireless-control technology between smart devices using inaudible high-frequencies. Multimedia Tools and Applications,\n                           74(15), 5955\u20135971. \n                    https:\/\/doi.org\/10.1007\/s11042-014-1901-x\n                    \n                  .","journal-title":"Multimedia Tools and Applications"},{"issue":"10","key":"497_CR5","doi-asserted-by":"publisher","first-page":"5871","DOI":"10.1007\/s11042-015-2553-1","volume":"75","author":"MB Chung","year":"2016","unstructured":"Chung, M. B. (2016). Effective near advertisement transmission method for smart-devices using inaudible high-frequencies. Multimedia Tools and Applications,\n                           75(10), 5871\u20135886. \n                    https:\/\/doi.org\/10.1007\/s11042-015-2553-1\n                    \n                  .","journal-title":"Multimedia Tools and Applications"},{"key":"497_CR6","doi-asserted-by":"publisher","unstructured":"Park, S. S., Do, Y. S., Park, J. S., Kim, D. S., & Choo, H. S. (2014). Inaudible dual tone data transmission for home appliances. In IEEE fourth international conference on consumer electronics\u2013Berlin (ICCE-Berlin), Berlin, Germany (pp. 131\u2013134). \n                    https:\/\/doi.org\/10.1109\/icce-berlin.2014.7034228\n                    \n                  .","DOI":"10.1109\/icce-berlin.2014.7034228"},{"key":"497_CR7","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/931765","author":"MB Chung","year":"2015","unstructured":"Chung, M. B., & Ko, I. J. (2015). Data-sharing method for multi-smart devices at close range. Mobile Information Systems. \n                    https:\/\/doi.org\/10.1155\/2015\/931765\n                    \n                  .","journal-title":"Mobile Information Systems"},{"key":"497_CR8","doi-asserted-by":"publisher","unstructured":"Zhang, L., Tan, S., & Yang, J. (2017). Hearing your voice is not enough: An articulatory gesture based liveness detection for voice authentication. In The 2017 ACM SIGSAC conference on computer and communications security, Dallas, TX, USA (pp. 57\u201371). \n                    https:\/\/doi.org\/10.1145\/3133956.3133962\n                    \n                  .","DOI":"10.1145\/3133956.3133962"},{"key":"497_CR9","doi-asserted-by":"publisher","unstructured":"Roy, N., Hassanieh, H., & Roy, C. R. (2017). Backdoor: Making microphones hear inaudible sounds. In 15th Annual international conference on mobile systems, applications, and services, Niagara Falls, New York, USA (pp. 2\u201314). \n                    https:\/\/doi.org\/10.1145\/3081333.3081366\n                    \n                  .","DOI":"10.1145\/3081333.3081366"},{"key":"497_CR10","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-981-10-3023-9_2","volume-title":"Advances in Computer Science and Ubiquitous Computing","author":"MB Chung","year":"2016","unstructured":"Chung, M. B., & Ko, I. J. (2016). Detection of a robust high-frequency range via noise analysis in a real-world environment. In J. J. Park, Y. Pan, G. Yi, & V. Loia (Eds.), Advances in Computer Science and Ubiquitous Computing (pp. 9\u201315). Singapore: Springer. \n                    https:\/\/doi.org\/10.1007\/978-981-10-3023-9_2\n                    \n                  ."},{"issue":"4","key":"497_CR11","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1121\/1.398698","volume":"86","author":"PG Stelmachowicz","year":"1989","unstructured":"Stelmachowicz, P. G., Beauchaine, K. A., Kalberer, A., & Jesteadt, W. (1989). Normative thresholds in the 8-to 20-kHz range as a function of age. The Journal of the Acoustical Society of America,\n                           86(4), 1384\u20131391. \n                    https:\/\/doi.org\/10.1121\/1.398698\n                    \n                  .","journal-title":"The Journal of the Acoustical Society of America"},{"issue":"5","key":"497_CR12","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/BF00243505","volume":"65","author":"S Takeda","year":"1992","unstructured":"Takeda, S., Morioka, I., Miyashita, K., Okumura, A., Yoshida, Y., & Matsumoto, K. (1992). Age variation in the upper limit of hearing. European Journal of Applied Physiology and Occupational Physiology,\n                           65(5), 403\u2013408. \n                    https:\/\/doi.org\/10.1007\/BF00243505\n                    \n                  .","journal-title":"European Journal of Applied Physiology and Occupational Physiology"},{"key":"497_CR13","volume-title":"Introduction to Shannon sampling and interpolation theory","author":"II Marks","year":"2012","unstructured":"Marks, I. I., & Robert, J. (2012). Introduction to Shannon sampling and interpolation theory. New York: Springer-Verlag."},{"key":"497_CR14","first-page":"1","volume-title":"Fast Fourier transform-algorithms and applications","author":"KR Rao","year":"2011","unstructured":"Rao, K. R., Kim, D. N., & Hwang, J. J. (2011). Fast Fourier transform-algorithms and applications (pp. 1\u20132). New York: Springer."},{"key":"497_CR15","unstructured":"National Instruments, FFT Fundamentals (Sound and vibration measurement suite). \n                    http:\/\/zone.ni.com\/reference\/en-XX\/help\/372416A-01\/svtconcepts\/fft_funda\/\n                    \n                  . Accessed 6 September 2017."},{"key":"497_CR16","first-page":"7","volume-title":"Fast Fourier transform-algorithms and applications","author":"KR Rao","year":"2011","unstructured":"Rao, K. R., Kim, D. N., & Hwang, J. J. (2011). Fast Fourier transform-algorithms and applications (pp. 7\u201313). New York: Springer."},{"issue":"10","key":"497_CR17","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1364\/JOSAB.17.001795","volume":"17","author":"C Dorrer","year":"2000","unstructured":"Dorrer, C., Belabas, N., Likforman, J. P., & Joffre, M. (2000). Spectral resolution and sampling issues in Fourier-transform spectral interferometry. Journal of the Optical Society of America B,\n                           17(10), 1795\u20131802. \n                    https:\/\/doi.org\/10.1364\/JOSAB.17.001795\n                    \n                  .","journal-title":"Journal of the Optical Society of America B"},{"issue":"5","key":"497_CR18","doi-asserted-by":"publisher","first-page":"1150","DOI":"10.1137\/S1064827593247023","volume":"17","author":"JC Schatzman","year":"1996","unstructured":"Schatzman, J. C. (1996). Accuracy of the discrete Fourier transform and the fast Fourier transform. SIAM Journal on Scientific Computing,\n                           17(5), 1150\u20131166. \n                    https:\/\/doi.org\/10.1137\/S1064827593247023\n                    \n                  .","journal-title":"SIAM Journal on Scientific Computing"},{"key":"497_CR19","first-page":"585","volume-title":"Analog and digital communication","author":"JS Chitode","year":"2009","unstructured":"Chitode, J. S. (Ed.). (2009). Digital amplitude modulation or amplitude shift keying. In Analog and digital communication (pp. 585\u2013662). Pune: Technical Publications."},{"key":"497_CR20","doi-asserted-by":"publisher","unstructured":"Kumar, U. K., & Umashankar, B. S. (2007). Improved hamming code for error detection and correction. In IEEE 2nd international symposium on wireless pervasive computing (ISWPC\u201907), San Juan, Puerto Rico. \n                    https:\/\/doi.org\/10.1109\/iswpc.2007.342654\n                    \n                  .","DOI":"10.1109\/iswpc.2007.342654"},{"key":"497_CR21","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1002\/9780470035726","volume-title":"Essentials of error-control coding","author":"JC Moreira","year":"2006","unstructured":"Moreira, J. C., & Farrell, P. G. (2006). Essentials of error-control coding (pp. 81\u201396). West Sussex: Wiley."},{"key":"497_CR22","unstructured":"Baoshe, Z. (2015). Java FFTPack. \n                    http:\/\/jfftpack.sourceforge.net\n                    \n                  . Accessed 6 September 2017."},{"issue":"2","key":"497_CR23","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.jalgebra.2009.11.031","volume":"324","author":"ME Malandro","year":"2010","unstructured":"Malandro, M. E. (2010). Fast Fourier transforms for finite inverse semigroups. Journal of Algebra,\n                           324(2), 282\u2013312. \n                    https:\/\/doi.org\/10.1016\/j.jalgebra.2009.11.031\n                    \n                  .","journal-title":"Journal of Algebra"},{"issue":"90","key":"497_CR24","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1090\/S0025-5718-1965-0178586-1","volume":"19","author":"JW Cooley","year":"1965","unstructured":"Cooley, J. W., & Tukey, J. W. (1965). An algorithm for the machine calculation of complex Fourier series. Mathematics of Computation,\n                           19(90), 297\u2013301. \n                    https:\/\/doi.org\/10.2307\/2003354\n                    \n                  .","journal-title":"Mathematics of Computation"},{"key":"497_CR25","unstructured":"Palshikar, G. (2009). Simple algorithms for peak detection in time-series. In 1st international conference advanced data analysis, business analytics and intelligence (pp. 2\u201313)."},{"key":"497_CR26","unstructured":"Tinevez, J. Y. (2015). A standard peak detector in time series. \n                    https:\/\/code.google.com\/p\/fiji-bi\/source\/browse\/src-plugins\/FlowMate_\/fiji\/plugin\/flowmate\/analysis\/PeakDetector.java?name=flow-mate&r=0ec4620b8e4aaebd183c2b57c89390595f574564\n                    \n                  . Accessed 6 September 2017."},{"key":"497_CR27","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-540-72697-5_18","volume-title":"Wired\/wireless internet communications","author":"DG Yoon","year":"2007","unstructured":"Yoon, D. G., Shin, S. Y., Park, J. H., Park, H. S., & Kwon, W. H. (2007). Performance analysis of IEEE 802.11 b under multiple IEEE 802.15.4 interferences. In F. Boavida, et al. (Eds.), Wired\/wireless internet communications (pp. 213\u2013222). Berlin: Springer. \n                    https:\/\/doi.org\/10.1007\/978-3-540-72697-5_18\n                    \n                  ."},{"issue":"11","key":"497_CR28","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1016\/S0140-3664(98)00165-0","volume":"21","author":"T Baicheva","year":"1998","unstructured":"Baicheva, T., Dodunekov, S., & Kazakov, P. (1998). On the cyclic redundancy-check codes with 8-bit redundancy. Computer Communications,\n                           21(11), 1030\u20131033. \n                    https:\/\/doi.org\/10.1016\/S0140-3664(98)00165-0\n                    \n                  .","journal-title":"Computer Communications"},{"key":"497_CR29","doi-asserted-by":"publisher","unstructured":"Koopman, P., & Chakravarty, T. (2004). Cyclic redundancy code (CRC) polynomial selection for embedded networks. In IEEE 2004 international conference on dependable systems and networks, Provence, Italy (pp. 145\u2013154). \n                    https:\/\/doi.org\/10.1109\/dsn.2004.1311885\n                    \n                  .","DOI":"10.1109\/dsn.2004.1311885"},{"issue":"9","key":"497_CR30","doi-asserted-by":"publisher","first-page":"996","DOI":"10.1109\/TCOM.1985.1096411","volume":"33","author":"K Witzke","year":"1985","unstructured":"Witzke, K., & Leung, C. (1985). A comparison of some error detecting CRC code standards. IEEE Transactions on Communications,\n                           33(9), 996\u2013998. \n                    https:\/\/doi.org\/10.1109\/TCOM.1985.1096411\n                    \n                  .","journal-title":"IEEE Transactions on Communications"},{"issue":"3","key":"497_CR31","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1080\/09709274.2004.11905735","volume":"16","author":"N Singh","year":"2004","unstructured":"Singh, N., & Davar, S. C. (2004). Noise pollution-sources, effects and control. The Journal of Human Ecology,\n                           16(3), 181\u2013187.","journal-title":"The Journal of Human Ecology"},{"key":"497_CR32","volume-title":"Designing cisco network service architecture (ARCH) foundation learning guide","author":"J Tiso","year":"2011","unstructured":"Tiso, J. (2011). Designing cisco network service architecture (ARCH) foundation learning guide. Indianapolis: Cisco Press."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-018-0497-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-018-0497-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-018-0497-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,2]],"date-time":"2019-08-02T19:08:18Z","timestamp":1564772898000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-018-0497-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,3]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["497"],"URL":"https:\/\/doi.org\/10.1007\/s11235-018-0497-2","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"type":"print","value":"1018-4864"},{"type":"electronic","value":"1572-9451"}],"subject":[],"published":{"date-parts":[[2018,8,3]]},"assertion":[{"value":"3 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}