{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T09:40:07Z","timestamp":1751190007787,"version":"3.41.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,12,29]],"date-time":"2017-12-29T00:00:00Z","timestamp":1514505600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1007\/s11277-017-5095-1","type":"journal-article","created":{"date-parts":[[2017,12,29]],"date-time":"2017-12-29T15:31:01Z","timestamp":1514561461000},"page":"505-518","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Secured and Imperceptible Data Transmission Through Digital Audio Signal with Reduced Internal Noise"],"prefix":"10.1007","volume":"100","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6459-3226","authenticated-orcid":false,"given":"Dipankar","family":"Pal","sequence":"first","affiliation":[]},{"given":"Nabin","family":"Ghoshal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,29]]},"reference":[{"issue":"3","key":"5095_CR1","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender, W., Gruhl, D., & Morimoto, N. (1996). Techniques for data hiding. IBM Systems Journal, 35(3), 313\u2013336.","journal-title":"IBM Systems Journal"},{"key":"5095_CR2","volume-title":"Psychoacoustics\u2013facts and models","author":"E Zwicker","year":"2007","unstructured":"Zwicker, E., & Fastl, H. (2007). Psychoacoustics\u2013facts and models (3rd ed.). Berlin: Springer.","edition":"3"},{"key":"5095_CR3","volume-title":"Algorithms for audio watermarking and steganography","author":"N Cvejic","year":"2004","unstructured":"Cvejic, N. (2004). Algorithms for audio watermarking and steganography. Oulu: University of Oulu."},{"key":"5095_CR4","volume-title":"Digital watermarking for audio data in techniques and applications of digital watermarking and content protection","author":"A Acevedo","year":"2003","unstructured":"Acevedo, A. (2003). Digital watermarking for audio data in techniques and applications of digital watermarking and content protection. Norwood: Artech House."},{"key":"5095_CR5","doi-asserted-by":"crossref","unstructured":"Arnold, M. (2000). Audio watermarking: Features, applications and algorithms. In IEEE international conference on multimedia and expo (pp. 1013\u20131016).","DOI":"10.1109\/ICME.2000.871531"},{"issue":"20","key":"5095_CR6","first-page":"233","volume":"5","author":"S Bhalshankar","year":"2015","unstructured":"Bhalshankar, S. (2015). Audio steganography: LSB technique using a pyramid structure and range of bytes. International Journal of Advanced Computer Research, 5(20), 233.","journal-title":"International Journal of Advanced Computer Research"},{"key":"5095_CR7","doi-asserted-by":"publisher","unstructured":"Pal, D., Goswami, A., & Ghoshal, N. (2012). Lossless audio steganography in spatial domain. In International conference on frontiers of intelligent computing: theory and applications, AISC 199 (pp. 575\u2013582). Springer, Berlin. https:\/\/doi.org\/10.1007\/978-3-642-35314-7.","DOI":"10.1007\/978-3-642-35314-7"},{"key":"5095_CR8","doi-asserted-by":"crossref","first-page":"809","DOI":"10.1016\/j.dsp.2009.04.003","volume":"19","author":"Y Erfani","year":"2009","unstructured":"Erfani, Y., & Siahpoush, S. (2009). Robust audio watermarking using improved TS echo hiding. Digital Signal Process, 19, 809\u2013814.","journal-title":"Digital Signal Process"},{"key":"5095_CR9","unstructured":"Johnson, N., & Katzenbeisser, S. C. (1999) A survey of steganographic techniques."},{"issue":"7","key":"5095_CR10","doi-asserted-by":"crossref","first-page":"1476","DOI":"10.3923\/itj.2010.1476.1482","volume":"9","author":"Y Zhang","year":"2010","unstructured":"Zhang, Y., Lu, Z. M., & Zhao, D. N. (2010). Quantization based semi-fragile watermarking scheme for H264 video. Information Technology Journal, 9(7), 1476\u20131482.","journal-title":"Information Technology Journal"},{"key":"5095_CR11","doi-asserted-by":"crossref","unstructured":"Gang, L., Akansu, A. N., & Ramkumar, M. (2001) MP3 resistant oblivious steganography. In IEEE international conference on acoustics, speech, and signal processing (Vol. 3, pp. 1365\u20131368). Salt Lake City.","DOI":"10.1109\/ICASSP.2001.941182"},{"key":"5095_CR12","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1002\/sec.644","volume":"6","author":"F Djebbar","year":"2012","unstructured":"Djebbar, F., Ayad, B., Abed-Meraim, K., & Habib, H. (2012). Unified phase and magnitude speech spectra data hiding algorithm. Journal of Security and Communication Networks, 6, 961\u2013971.","journal-title":"Journal of Security and Communication Networks"},{"issue":"12","key":"5095_CR13","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox, I. J., Kilian, J., Leighton, F. T., & Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12), 1673\u20131687.","journal-title":"IEEE Transactions on Image Processing"},{"key":"5095_CR14","first-page":"70","volume":"21","author":"K Khan","year":"1984","unstructured":"Khan, K. (1984). Cryptology and the origins of spread spectrum. IEEE Spectrum, 21, 70\u201380.","journal-title":"IEEE Spectrum"},{"key":"5095_CR15","unstructured":"Gopalan, K., & Wenndt, S. (2004). Audio steganography for covert data transmission by imperceptible tone insertion. In WOC 2004, Banff, Canada."},{"key":"5095_CR16","unstructured":"Ghoshal, N., & Mandal, J. K. (2011). Discrete Fourier transform based multimedia color image authentication for wireless communication. In 2nd International conference on wireless communications, vehiculare on emetechnology, information theory and aerospace and electronic systems technology, wireless vitae 2011, Chennai, India."},{"key":"5095_CR17","doi-asserted-by":"crossref","unstructured":"Ghoshal, N., & Mandal, J. K. (2011). Controlled data hiding technique for color image authentication in frequency domain. In 2nd international conference on emerging applications of information technology, EAIT-2011, CSI Kolkata Chapter, Kolkata, India (pp. 284\u2013287).","DOI":"10.1109\/EAIT.2011.23"},{"issue":"2","key":"5095_CR18","first-page":"151","volume":"5","author":"S Yang","year":"2010","unstructured":"Yang, S., Tan, W., Chen, Y., & Ma, W. (2010). Quantization-Based digital audio watermarking in discrete Fourier transform domain. Journal of Multimedia, 5(2), 151.","journal-title":"Journal of Multimedia"},{"issue":"5","key":"5095_CR19","doi-asserted-by":"crossref","first-page":"91","DOI":"10.5121\/ijcsit.2010.2507","volume":"2","author":"PK Dhar","year":"2010","unstructured":"Dhar, P. K., Khan, M. I., & Ahmad, S. (2010). New DCT based watermarking method for copyright protection of digital audio. International Journal of Computer Science and Information TECHNOLOGY (IJCSIT), 2(5), 91\u2013101.","journal-title":"International Journal of Computer Science and Information TECHNOLOGY (IJCSIT)"},{"issue":"3","key":"5095_CR20","first-page":"326","volume":"8","author":"A Al-Haj","year":"2011","unstructured":"Al-Haj, A., Mohammad, A., & Bata, L. (2011). DWT\u2013based audio watermarking. The International Arab Journal of Information Technology, 8(3), 326\u2013333.","journal-title":"The International Arab Journal of Information Technology"},{"key":"5095_CR21","unstructured":"Foo, S. W., Ho, S. M., & Ng, L. M. (2004). Audio watermarking using time-frequency compression expansion. In IEEE international symposium on circuits and systems (pp. 201\u2013204)."},{"key":"5095_CR22","doi-asserted-by":"crossref","unstructured":"Djebbar, F., Ayad, B., Meraim, K. A., & Hamam, H. (2012). Comparative study of digital audio steganography techniques. EURASIP Journal on Audio, Speech and Music Processing.","DOI":"10.1186\/1687-4722-2012-25"},{"key":"5095_CR23","doi-asserted-by":"publisher","DOI":"10.1186\/s13636-014-0037-2","author":"A Al-haj","year":"2014","unstructured":"Al-haj, A. (2014). An imperceptible and robust audio watermarking algorithm. EURASIP Journal on Audio, Speech and Music Processing,. https:\/\/doi.org\/10.1186\/s13636-014-0037-2.","journal-title":"EURASIP Journal on Audio, Speech and Music Processing,"},{"key":"5095_CR24","doi-asserted-by":"publisher","unstructured":"Tvs, G. P., & Varadarajan, S. (2015) A novel hybrid audio steganography for imperceptible data hiding. In International conference on communications and signal processing (ICCSP) Melmaruvathur, India (pp. 0634\u20130638). https:\/\/doi.org\/10.1109\/ICCSP.2015.7322565.","DOI":"10.1109\/ICCSP.2015.7322565"},{"key":"5095_CR25","volume-title":"A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption. Multimedia Tools and Applications","author":"SE El-Khamy","year":"2017","unstructured":"El-Khamy, S. E., Korany, N. O., & El-Sherif, M. H. (2017). A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption. Multimedia Tools and Applications. New York: Springer."},{"issue":"2","key":"5095_CR26","first-page":"73","volume":"4","author":"AR Deshpande","year":"2016","unstructured":"Deshpande, A. R., & Kant, N. N. (2016). Security Enhancement in Audio Steganography by Encryption Algorithm. International Journal of Emerging Technologies in Engineering Research, 4(2), 73\u201376.","journal-title":"International Journal of Emerging Technologies in Engineering Research"},{"key":"5095_CR27","doi-asserted-by":"crossref","unstructured":"Ghoshal, N., Mandal, J. K., Sarkar, A., Chakraborty, D., & Ghosh, S. (2009). Image authentication by hiding large volume of data and secure message transmission technique using mask. In IEEE international advanced computing conference (pp. 3177\u20133182). Patiala: Thapar University.","DOI":"10.1109\/IADCC.2009.4809168"},{"key":"5095_CR28","doi-asserted-by":"crossref","unstructured":"Ghoshal, N., Mandal, J. K., & Khamrui, A. (2009). A framework for block based image authentication. In 4th IEEE international conference on industrial and information systems, ICIIS09 (pp. 343\u2013348). Peradeniya: Peradeniya University.","DOI":"10.1109\/ICIINFS.2009.5429840"},{"key":"5095_CR29","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-59904-513-9","volume-title":"Digital audio watermarking techniques and technologies: Applications and benchmarks. Information Science Reference","author":"N Cvejic","year":"2008","unstructured":"Cvejic, N., & Seppanen, T. (2008). Digital audio watermarking techniques and technologies: Applications and benchmarks. Information Science Reference. New York: Hershey."},{"key":"5095_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2009.02.015","author":"D Campbell","year":"2009","unstructured":"Campbell, D., Jones, E., & Glavin, M. (2009). Audio quality assessment techniques\u2013A review and recent developments. Journal of Signal Processing. https:\/\/doi.org\/10.1016\/j.sigpro.2009.02.015.","journal-title":"Journal of Signal Processing"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-5095-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5095-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-5095-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T09:16:48Z","timestamp":1751188608000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-5095-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,29]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["5095"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-5095-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2017,12,29]]}}}