{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T22:57:46Z","timestamp":1772751466174,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"7-8","license":[{"start":{"date-parts":[[2008,5,8]],"date-time":"2008-05-08T00:00:00Z","timestamp":1210204800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2008,8]]},"DOI":"10.1007\/s12243-008-0036-3","type":"journal-article","created":{"date-parts":[[2008,5,7]],"date-time":"2008-05-07T08:51:24Z","timestamp":1210150284000},"page":"369-377","source":"Crossref","is-referenced-by-count":13,"title":["Speech signals protection via logo watermarking based on the time\u2013frequency analysis"],"prefix":"10.1007","volume":"63","author":[{"given":"Irena","family":"Orovi\u0107","sequence":"first","affiliation":[]},{"given":"Predrag","family":"Zogovi\u0107","sequence":"additional","affiliation":[]},{"given":"Nikola","family":"\u017dari\u0107","sequence":"additional","affiliation":[]},{"given":"Srdjan","family":"Stankovi\u0107","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,5,8]]},"reference":[{"key":"36_CR1","doi-asserted-by":"crossref","DOI":"10.1201\/9780203913512","volume-title":"Watermarking systems engineering","author":"M Barni","year":"2004","unstructured":"Barni M, Bartolini F (2004) Watermarking systems engineering. Marcel Dekker, New York"},{"issue":"7","key":"36_CR2","doi-asserted-by":"crossref","first-page":"1079","DOI":"10.1109\/5.771066","volume":"87","author":"F Hartung","year":"1999","unstructured":"Hartung F, Kutter M (1999) Multimedia watermarking techniques. Proc IEEE 87(7):1079\u20131107 July","journal-title":"Proc IEEE"},{"issue":"2","key":"36_CR3","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1109\/6046.923822","volume":"3","author":"P Bassia","year":"2001","unstructured":"Bassia P, Pitas I (2001) Robust audio watermarking in the time domain. IEEE Trans Multimedia 3(2):232\u2013241 June","journal-title":"IEEE Trans Multimedia"},{"issue":"2","key":"36_CR4","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1109\/TMM.2005.843366","volume":"7","author":"BS Ko","year":"2005","unstructured":"Ko BS, Nishimura R, Suzuki Y (2005) Time-spread echo method for digital audio watermarking. IEEE Trans Multimedia 7(2):212\u2013221 April","journal-title":"IEEE Trans Multimedia"},{"key":"36_CR5","unstructured":"Cveji\u0107 N (2004) Algorithms for audio watermarking and steganography. University of Oulu"},{"issue":"4","key":"36_CR6","doi-asserted-by":"crossref","first-page":"1020","DOI":"10.1109\/TSP.2003.809384","volume":"51","author":"D Kirovski","year":"2003","unstructured":"Kirovski D, Malvar HS (2003) Spread-spectrum watermarking of audio signals. IEEE Transact Signal Proc 51(4):1020\u20131033 April","journal-title":"IEEE Transact Signal Proc"},{"issue":"3","key":"36_CR7","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1016\/S0165-1684(98)00014-0","volume":"66","author":"MD Swanson","year":"1998","unstructured":"Swanson MD, Zhu B, Twefik AH, Boney L (1998) Robust audio watermarking using perceptual masking. Signal Proc 66(3):337\u2013355 May","journal-title":"Signal Proc"},{"issue":"9","key":"36_CR8","doi-asserted-by":"crossref","first-page":"1605","DOI":"10.1360\/crad20050923","volume":"42","author":"W Jian","year":"2005","unstructured":"Jian W, Fu-zhong L (2005) Digital audio watermarking based on support vector machine (SVM). J Comput Res Dev 42(9):1605\u20131611","journal-title":"J Comput Res Dev"},{"issue":"12","key":"36_CR9","first-page":"24","volume":"11","author":"X Tang","year":"2005","unstructured":"Tang X, Niu Y, Yue H, Yin Z (2005) A digital audio watermark embedding algorithm. Int J Inform Tech 11(12):24\u201331","journal-title":"Int J Inform Tech"},{"key":"36_CR10","first-page":"252","volume":"3","author":"HH Tsai","year":"2003","unstructured":"Tsai HH, Cheng JS, Yu PT (2003) Audio watermarking based on HAS and neural networks in DCT domain. EURASIP J Appl Signal Proc 3:252\u2013263","journal-title":"EURASIP J Appl Signal Proc"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Xu X, Peng H, He C (2007) DWT-based audio watermarking using support vector regression and subsampling. Proc. of the 7th International Workshop on Fuzzy Logic and Applications, WILF 2007, Camogli, Italy, pp. 136\u2013144, July","DOI":"10.1007\/978-3-540-73400-0_17"},{"issue":"1","key":"36_CR12","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1109\/TMM.2003.819747","volume":"6","author":"D Kundur","year":"2004","unstructured":"Kundur D, Hatzinakos D (2004) Toward robust logo watermarking using multiresolution image fusion. IEEE Trans Multimedia 6(1):185\u2013198 Feb","journal-title":"IEEE Trans Multimedia"},{"key":"36_CR13","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1109\/ICIP.1997.647965","volume":"1","author":"GW Braudaway","year":"1997","unstructured":"Braudaway GW (1997) Protecting publicly-available images with an invisible image watermark. Proc IEEE Int Conf Image Proc 1:524\u2013527 Oct","journal-title":"Proc IEEE Int Conf Image Proc"},{"key":"36_CR14","volume-title":"Techniques and applications of digital watermarking and content protection","author":"O Arnold","year":"2003","unstructured":"Arnold O, Wolthusen S, Schmucker M (2003) Techniques and applications of digital watermarking and content protection. Artech House, Norwood"},{"key":"36_CR15","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1117\/12.344680","volume":"3657","author":"PC Su","year":"1999","unstructured":"Su PC, Kuo CCJ (1999) Blind watermarking for cartoon and map images. Proc SPIE Security Watermark Multim Cont 3657:296\u2013306 Jan","journal-title":"Proc SPIE Security Watermark Multim Cont"},{"key":"36_CR16","volume-title":"Time\u2013frequency signal analysis and processing","author":"B Boashash","year":"2003","unstructured":"Boashash B (2003) Time\u2013frequency signal analysis and processing. Elsevier, Amsterdam"},{"issue":"1","key":"36_CR17","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1109\/78.258146","volume":"42","author":"LJ Stankovi\u0107","year":"1994","unstructured":"Stankovi\u0107 LJ (1994) A method for time\u2013frequency signal analysis. IEEE Transact Signal Proc 42(1):225\u2013229 Jan","journal-title":"IEEE Transact Signal Proc"},{"key":"36_CR18","doi-asserted-by":"crossref","unstructured":"Potdar VM, Han S, Chang E (2005) A survey of digital image watermarking techniques. Proc. of IEEE\u2019s 3rd International Conference on Industrial Informatics, INDIN\u201905, pp. 709\u2013716, August","DOI":"10.1109\/INDIN.2005.1560462"},{"issue":"1","key":"36_CR19","first-page":"27","volume":"2","author":"RS Alomari","year":"2004","unstructured":"Alomari RS, Al-Jaber A (2004) A fragile watermarking algorithm for content authentication. Int J Comput Inform Sci 2(1):27\u201337 April","journal-title":"Int J Comput Inform Sci"},{"issue":"4","key":"36_CR20","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1109\/TIFS.2006.885018","volume":"1","author":"O Altun","year":"2006","unstructured":"Altun O, Sharma G, Celik MU, Bocko FM (2006) A set theoretic framework for watermarking and its application to semifragile tamper detection. IEEE Trans Inform Forensics Sec 1(4):479\u2013492 Dec","journal-title":"IEEE Trans Inform Forensics Sec"}],"container-title":["annals of telecommunications - annales des t\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-008-0036-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-008-0036-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-008-0036-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,5]],"date-time":"2020-05-05T09:53:59Z","timestamp":1588672439000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-008-0036-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5,8]]},"references-count":20,"journal-issue":{"issue":"7-8","published-print":{"date-parts":[[2008,8]]}},"alternative-id":["36"],"URL":"https:\/\/doi.org\/10.1007\/s12243-008-0036-3","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,5,8]]}}}