{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T04:07:52Z","timestamp":1769832472344,"version":"3.49.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T00:00:00Z","timestamp":1591142400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T00:00:00Z","timestamp":1591142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Iran J Comput Sci"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s42044-020-00059-x","type":"journal-article","created":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T15:59:11Z","timestamp":1591199951000},"page":"217-232","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Compressed domain secure, robust and high-capacity audio watermarking"],"prefix":"10.1007","volume":"3","author":[{"given":"Uma","family":"Nair","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3531-3958","authenticated-orcid":false,"given":"Gajanan K.","family":"Birajdar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,3]]},"reference":[{"key":"59_CR1","unstructured":"No really,rust. http:\/\/www.jamendo.com\/en\/album\/7365 (2014). Last Accessed on 13 May 2017"},{"key":"59_CR2","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-540-89862-7_20","volume-title":"Information systems security: 4th international conference, ICISS 2008","author":"V Bhat","year":"2008","unstructured":"Bhat, V., Sengupta, I., Das, A.: Audio watermarking based on quantization in wavelet domain. In: Sekar, R., Pujari, A.K. (eds.) Information systems security: 4th international conference, ICISS 2008, pp. 235\u2013242. Springer, Berlin, Heidelberg (2008)"},{"issue":"2","key":"59_CR3","first-page":"369","volume":"52","author":"I Sengupta","year":"2011","unstructured":"Sengupta, I., Das, A., Bhat, K.V.: An audio watermarking scheme using singular value decomposition and dither-modulation quantization. Multimed. Tools Appl. 52(2), 369\u2013389 (2011)","journal-title":"Multimed. Tools Appl."},{"issue":"5","key":"59_CR4","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1007\/s00034-010-9255-8","volume":"30","author":"KV Bhat","year":"2011","unstructured":"Bhat, K.V., Sengupta, I., Das, A.: A new audio watermarking scheme based on singular value decomposition and quantization. Circ. Syst. Signal Process. 30(5), 915\u2013927 (2011)","journal-title":"Circ. Syst. Signal Process."},{"issue":"2","key":"59_CR5","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1007\/s10773-018-3950-9","volume":"58","author":"K Chen","year":"2019","unstructured":"Chen, K., Yan, F., Iliyasu, A.M., Zhao, J.: Dual quantum audio watermarking schemes based on quantum discrete cosine transform. Int. J. Theor. Phys. 58(2), 502\u2013521 (2019). https:\/\/doi.org\/10.1007\/s10773-018-3950-9","journal-title":"Int. J. Theor. Phys."},{"key":"59_CR6","volume-title":"Digital watermarking and steganography","author":"I Cox","year":"2008","unstructured":"Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital watermarking and steganography, 2nd edn. Morgan Kaufmann Publishers Inc, Burlington (2008)","edition":"2"},{"key":"59_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of rijndael","author":"J Daemen","year":"2002","unstructured":"Daemen, J., Rijmen, V.: The design of rijndael. Springer, New York (2002)"},{"key":"59_CR8","first-page":"74","volume":"20","author":"PK Dhar","year":"2015","unstructured":"Dhar, P.K., Shimamura, T.: Blind SVD-based audio watermarking using entropy and log-polar transformation. J. Inf S.ecur. Appl. 20, 74\u201383 (2015)","journal-title":"J. Inf S.ecur. Appl."},{"issue":"11","key":"59_CR9","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1080\/00207217.2012.680786","volume":"99","author":"MAM El-Bendary","year":"2012","unstructured":"El-Bendary, M.A.M., El-Azm, A.E.A., El-Fishawy, N.A., Al-Hosarey, F.S.M., Eltokhy, M.A., El-Samie, F.E.A., Kazemian, H.: JPEG image transmission over mobile network with an efficient channel coding and interleaving. Int. J. Elect. 99(11), 1497\u20131518 (2012)","journal-title":"Int. J. Elect."},{"issue":"8","key":"59_CR10","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1109\/TASLP.2015.2430818","volume":"23","author":"M Fallahpour","year":"2015","unstructured":"Fallahpour, M., Meg\u00edas, D.: Audio watermarking based on Fibonacci numbers. IEEE Trans. Audio Speech Lang. Process. 23(8), 1273\u20131282 (2015)","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"issue":"3","key":"59_CR11","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1016\/j.compeleceng.2008.12.004","volume":"35","author":"M Fan","year":"2009","unstructured":"Fan, M., Wang, H.: Chaos-based discrete fractional sine transform domain audio watermarking scheme. Comput. Elect. Eng. 35(3), 506\u2013516 (2009)","journal-title":"Comput. Elect. Eng."},{"key":"59_CR12","unstructured":"Han, F., Yu, X., Han, S.: Improved baker map for image encryption. In: 1st International Symposium on Systems and Control in Aerospace and Astronautics, pp. 4 pp.\u20131276 (2006)"},{"key":"59_CR13","doi-asserted-by":"publisher","first-page":"19063","DOI":"10.1109\/ACCESS.2019.2893646","volume":"7","author":"H Hu","year":"2019","unstructured":"Hu, H., Lee, T.: High-performance self-synchronous blind audio watermarking in a unified FFT framework. IEEE Access 7, 19063\u201319076 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2893646","journal-title":"IEEE Access"},{"key":"59_CR14","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.sigpro.2014.11.011","volume":"109","author":"HT Hu","year":"2015","unstructured":"Hu, H.T., Hsu, L.Y.: Robust, transparent and high-capacity audio watermarking in DCT domain. Signal Process. 109, 226\u2013235 (2015)","journal-title":"Signal Process."},{"key":"59_CR15","doi-asserted-by":"crossref","unstructured":"Hu, H.T., Hsu, L.Y., Lai, S.Y., Chang, Y.J.: The use of spectral shaping to extend the capacity for DWT-based blind audio watermarking. In: 5th International Conference on IT Convergence and Security (ICITCS), Kuala Lumpur, 2015, pp. 1\u20135 (2015)","DOI":"10.1109\/ICITCS.2015.7293026"},{"key":"59_CR16","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.dsp.2019.01.006","volume":"87","author":"HT Hu","year":"2019","unstructured":"Hu, H.T., Lee, T.T.: Frame-synchronized blind speech watermarking via improved adaptive mean modulation and perceptual-based additive modulation in DWT domain. Digital Signal Process. 87, 75\u201385 (2019). https:\/\/doi.org\/10.1016\/j.dsp.2019.01.006","journal-title":"Digital Signal Process."},{"key":"59_CR17","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.sigpro.2016.04.005","volume":"128","author":"G Hua","year":"2016","unstructured":"Hua, G., Huang, J., Shi, Y.Q., Goh, J., Thing, V.L.: Twenty years of digital audio watermarking\u2014a comprehensive review. Signal Process. 128, 222\u2013242 (2016)","journal-title":"Signal Process."},{"issue":"2","key":"59_CR18","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s11265-013-0863-y","volume":"80","author":"HN Huang","year":"2015","unstructured":"Huang, H.N., Chen, S.T., Lin, M.S., Kung, W.M., Hsu, C.Y.: Optimization-based embedding for wavelet-domain audio watermarking. J. Signal Process. Syst. 80(2), 197\u2013208 (2015)","journal-title":"J. Signal Process. Syst."},{"key":"59_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-4375-6","volume-title":"Information hiding: steganography and watermarking-attacks and countermeasures","author":"N Johnson","year":"2001","unstructured":"Johnson, N., Duric, Z., Jajodia, S.: Information hiding: steganography and watermarking-attacks and countermeasures. Kluwer Academic Publishers, Berlin (2001)"},{"issue":"2","key":"59_CR20","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/TMM.2010.2098850","volume":"13","author":"X Kang","year":"2011","unstructured":"Kang, X., Yang, R., Huang, J.: Geometric invariant audio watermarking based on an LCM feature. IEEE Transa. Multimed. 13(2), 181\u2013190 (2011)","journal-title":"IEEE Transa. Multimed."},{"issue":"8","key":"59_CR21","doi-asserted-by":"publisher","first-page":"3697","DOI":"10.1007\/s00034-018-0994-2","volume":"38","author":"A Kanhe","year":"2019","unstructured":"Kanhe, A., Gnanasekaran, A.: A blind audio watermarking scheme employing DCT-HT-SD technique. Circ. Syst. Signal Process. 38(8), 3697\u20133714 (2019). https:\/\/doi.org\/10.1007\/s00034-018-0994-2","journal-title":"Circ. Syst. Signal Process."},{"key":"59_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7214-3","author":"H Karajeh","year":"2019","unstructured":"Karajeh, H., Khatib, T., Rajab, L., Maqableh, M.: A robust digital audio watermarking scheme based on DWT and Schur decomposition. Multimed. Tools Appl. (2019). https:\/\/doi.org\/10.1007\/s11042-019-7214-3","journal-title":"Multimed. Tools Appl."},{"key":"59_CR23","volume-title":"Information hiding techniques for steganography and digital watermarking","year":"2000","unstructured":"Katzenbeisser, S., Petitcolas, F.A. (eds.): Information hiding techniques for steganography and digital watermarking, 1st edn. Artech House, Inc, Norwood (2000)","edition":"1"},{"key":"59_CR24","first-page":"1","volume":"33","author":"A Kaur","year":"2017","unstructured":"Kaur, A., Dutta, M.K., Soni, K., Taneja, N.: Localized and self adaptive audio watermarking algorithm in the wavelet domain. J. Inf. Secur. Appl. 33, 1\u201315 (2017)","journal-title":"J. Inf. Secur. Appl."},{"issue":"1","key":"59_CR25","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1016\/j.aeue.2014.08.012","volume":"69","author":"B Lei","year":"2015","unstructured":"Lei, B., Soon, I.Y.: Perception-based audio watermarking scheme in the compressed bitstream. AEU Int. J. Electron. Commun. 69(1), 188\u2013197 (2015)","journal-title":"AEU Int. J. Electron. Commun."},{"issue":"9","key":"59_CR26","doi-asserted-by":"publisher","first-page":"1985","DOI":"10.1016\/j.sigpro.2011.12.021","volume":"92","author":"B Lei","year":"2012","unstructured":"Lei, B., Soon, I.Y., Zhou, F., Li, Z., Lei, H.: A robust audio watermarking scheme based on lifting wavelet transform and singular value decomposition. Signal Process. 92(9), 1985\u20132001 (2012)","journal-title":"Signal Process."},{"key":"59_CR27","unstructured":"Lin, Y.Q., Abdulla, W.H.: Audio watermarking for copyrights protection. Tech. rep., University of Auckland, Dept. of Electrical and Computer Engineering (2006)"},{"key":"59_CR28","first-page":"1","volume":"3","author":"U Nair","year":"2016","unstructured":"Nair, U., Birajdar, G.: A secure audio watermarking employing AES technique. Int. Conf. Inven. Comput. Technol. (ICICT) 3, 1\u20135 (2016)","journal-title":"Int. Conf. Inven. Comput. Technol. (ICICT)"},{"key":"59_CR29","doi-asserted-by":"crossref","unstructured":"Natgunanathan, I., Xiang, Y.: A novel pseudonoise sequence for time-spread echo based audio watermarking. In: GLOBECOM 2009\u20132009 IEEE Global Telecommunications Conference, Honolulu, HI, pp. 1\u20136 (2009)","DOI":"10.1109\/GLOCOM.2009.5425791"},{"key":"59_CR30","unstructured":"Nickel, J.: Mathematics: Is God Silent? Ross House Books (2001)"},{"key":"59_CR31","doi-asserted-by":"crossref","unstructured":"\u00d6zer, H., Sankur, B., Memon, N.: An SVD-based audio watermarking technique. In: Proceedings of the 7th Workshop on Multimedia and Security, pp. 51\u201356. ACM (2005)","DOI":"10.1145\/1073170.1073180"},{"key":"59_CR32","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-981-10-8672-4_8","volume-title":"Fundamental research in electrical engineering","author":"A Rezaei","year":"2019","unstructured":"Rezaei, A., Khalili, M.: A robust blind audio watermarking scheme based on DCT-DWT-SVD. In: Montaser Kouhsari, S. (ed.) Fundamental research in electrical engineering, pp. 101\u2013113. Springer, Singapore (2019)"},{"key":"59_CR33","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.sigpro.2018.08.011","volume":"154","author":"S Saadi","year":"2019","unstructured":"Saadi, S., Merrad, A., Benziane, A.: Novel secured scheme for blind audio\/speech norm-space watermarking by Arnold algorithm. Signal Process. 154, 74\u201386 (2019). https:\/\/doi.org\/10.1016\/j.sigpro.2018.08.011","journal-title":"Signal Process."},{"key":"59_CR34","doi-asserted-by":"crossref","unstructured":"Sekhar, A.C., Suneetha, C., NagaLakshmi, G., RaviKumar, B.V.: Fast Fourier transforms and quadratic forms for digital audio watermarking. In: 2009 International Conference on Advances in Recent Technologies in Communication and Computing, pp. 449\u2013452 (2009)","DOI":"10.1109\/ARTCom.2009.112"},{"key":"59_CR35","doi-asserted-by":"publisher","unstructured":"Sharma, B., Dave, M.: Robust hybrid image and audio watermarking using cyclic codes and Arnold transform. In: 2019 International Conference on Communication and Electronics Systems (ICCES), pp. 309\u2013315 (2019). https:\/\/doi.org\/10.1109\/ICCES45898.2019.9002117","DOI":"10.1109\/ICCES45898.2019.9002117"},{"key":"59_CR36","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-981-13-0776-8-42","volume-title":"Nanoelectronics, circuits and communication systems","author":"S Srivastava","year":"2019","unstructured":"Srivastava, S., Chandra, M., Sahoo, G.: Robust voiceprint based audio watermarking using wavelet transform. In: Nath, V., Mandal, J.K. (eds.) Nanoelectronics, circuits and communication systems, pp. 457\u2013467. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-0776-8-42"},{"key":"59_CR37","unstructured":"Standards, N. I. & Technology.: Advanced Encryption Standard. NIST FIPS PUB 197 (2001)"},{"issue":"8","key":"59_CR38","doi-asserted-by":"publisher","first-page":"2270","DOI":"10.1109\/TASL.2007.906192","volume":"15","author":"X Wang","year":"2007","unstructured":"Wang, X., Qi, W., Niu, P.: A new adaptive digital audio watermarking based on support vector regression. IEEE Trans. Audio Speech Lang. Process. 15(8), 2270\u20132277 (2007)","journal-title":"IEEE Trans. Audio Speech Lang. Process."},{"issue":"4","key":"59_CR39","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/j.compeleceng.2011.05.011","volume":"37","author":"XY Wang","year":"2011","unstructured":"Wang, X.Y., Ma, T.X., Niu, P.P.: A pseudo-Zernike moment based audio watermarking scheme robust against desynchronization attacks. Comput. Elect. Eng. 37(4), 425\u2013443 (2011)","journal-title":"Comput. Elect. Eng."},{"key":"59_CR40","doi-asserted-by":"crossref","unstructured":"Wen, X., Ding, X., Li, J., Gao, L., Sun, H.: An audio watermarking algorithm based on fast Fourier transform. In: 2009 International Conference on Information Management, Innovation Management and Industrial Engineering, vol.\u00a01, pp. 363\u2013366 (2009)","DOI":"10.1109\/ICIII.2009.95"},{"key":"59_CR41","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1080\/09298210701859222","volume":"36","author":"G Widmer","year":"2007","unstructured":"Widmer, G., Rocchesso, D., V\u00e4lim\u00e4ki, V., Erkut, C., Gouyon, F., Pressnitzer, D., Penttinen, H., Polotti, P., Volpe, G.: Sound and music computing: research trends and some key issues. J. N. Music Res. 36, 169\u2013184 (2007)","journal-title":"J. N. Music Res."},{"issue":"1","key":"59_CR42","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/1687-6180-2011-3","volume":"2011","author":"S Xiang","year":"2011","unstructured":"Xiang, S.: Audio watermarking robust against D\/A and A\/D conversions. EURASIP J. Adv. Signal Process. 2011(1), 3 (2011)","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"59_CR43","doi-asserted-by":"crossref","unstructured":"Yan, Y., Rong, H., Mintao, X.: A novel audio watermarking algorithm for copyright protection based on DCT domain. In: 2009 Second International Symposium on Electronic Commerce and Security, vol.\u00a01, pp. 184\u2013188 (2009)","DOI":"10.1109\/ISECS.2009.141"},{"key":"59_CR44","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/978-3-030-24271-8-38","volume-title":"Artificial intelligence and security","author":"J Zhang","year":"2019","unstructured":"Zhang, J., Peng, X., Zhang, S.: Robust audio watermarking algorithm based on moving average and DCT. In: Sun, X., Pan, Z., Bertino, E. (eds.) Artificial intelligence and security, pp. 419\u2013429. Springer International Publishing, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-24271-8-38"}],"container-title":["Iran Journal of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-020-00059-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42044-020-00059-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-020-00059-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,3]],"date-time":"2021-06-03T00:50:26Z","timestamp":1622681426000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42044-020-00059-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,3]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["59"],"URL":"https:\/\/doi.org\/10.1007\/s42044-020-00059-x","relation":{},"ISSN":["2520-8438","2520-8446"],"issn-type":[{"value":"2520-8438","type":"print"},{"value":"2520-8446","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,3]]},"assertion":[{"value":"20 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 May 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}