{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:18:30Z","timestamp":1772644710493,"version":"3.50.1"},"reference-count":24,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1998,5,1]],"date-time":"1998-05-01T00:00:00Z","timestamp":893980800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Signal Processing"],"published-print":{"date-parts":[[1998,5]]},"DOI":"10.1016\/s0165-1684(98)00014-0","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T00:56:40Z","timestamp":1027645000000},"page":"337-355","source":"Crossref","is-referenced-by-count":300,"title":["Robust audio watermarking using perceptual masking"],"prefix":"10.1016","volume":"66","author":[{"given":"Mitchell D","family":"Swanson","sequence":"first","affiliation":[]},{"given":"Bin","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Ahmed H","family":"Tewfik","sequence":"additional","affiliation":[]},{"given":"Laurence","family":"Boney","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0165-1684(98)00014-0_BIB1","doi-asserted-by":"crossref","unstructured":"W. Bender, D. Gruhl, N. Morimoto, Techniques for data hiding, Tech. Rep., MIT Media Lab, 1994.","DOI":"10.1117\/12.205315"},{"key":"10.1016\/S0165-1684(98)00014-0_BIB2","unstructured":"O. Bruyndonckx, J.-J. Quisquater, B. Macq, Spatial method for copyright labeling of digital images, Proc. 1995 IEEE Nonlinear Signal Processing Workshop, Thessaloniki, Greece, 1995, pp. 456\u2013459."},{"key":"10.1016\/S0165-1684(98)00014-0_BIB3","unstructured":"I. Cox, J. Kilian, T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia, Tech. Rep. 95-10, NEC Research Institute, 1995."},{"key":"10.1016\/S0165-1684(98)00014-0_BIB4","doi-asserted-by":"crossref","unstructured":"S. Craver, N. Memon, B.-L. Yeo, M. Yeung, Can invisible watermarks resolve rightful ownerships? IBM Research Technical Report RC 20509, IBM Cyber Journal, July 1996.","DOI":"10.1117\/12.263419"},{"key":"10.1016\/S0165-1684(98)00014-0_BIB5","unstructured":"S. Craver, N. Memon, B.-L. Yeo, M. Yeung, Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications, IBM Research Technical Report RC 20755, IBM Cyber Journal, March 1997."},{"key":"10.1016\/S0165-1684(98)00014-0_BIB6","unstructured":"S. Goldwasser, M. Bellare, Lecture notes on cryptography, preprint, July 1996."},{"key":"10.1016\/S0165-1684(98)00014-0_BIB7","unstructured":"F. Hartung, B. Girod, Digital watermarking of raw and compressed video, Proc. SPIE Dig. Comp. Tech. and Systems for Video Comm., Vol. 2952, October 1996, pp. 205\u2013213."},{"key":"10.1016\/S0165-1684(98)00014-0_BIB8","unstructured":"ISO\/CEI, Codage de l\u2019image animee et du son associe pour les supports de stockage numerique jusqu\u2019a environ 1,5 mbit\/s, Tech. Rep. 11172, ISO\/CEI, 1993."},{"key":"10.1016\/S0165-1684(98)00014-0_BIB9","unstructured":"J. Johnston, K. Brandenburg, Wideband coding-perceptual considerations for speech and music, in: S. Furui, M. Sondhi (Eds.), Advances in Speech Signal Processing, Dekker, New York, 1992."},{"key":"10.1016\/S0165-1684(98)00014-0_BIB10","unstructured":"K. Matsui, K. Tanaka, Video steganography: how to secretly embed a signature in a picture, IMA Intellectual Property Project Proc., Vol. 1, 1994, pp. 187\u2013206."},{"key":"10.1016\/S0165-1684(98)00014-0_BIB11","unstructured":"N. Moreau, Techniques de Compression des Signaux, Masson, Paris, 1995."},{"key":"10.1016\/S0165-1684(98)00014-0_BIB12","unstructured":"National Institute of Standards and Technology (NIST), Secure Hash Standard, NIST FIPS Pub. 180-1, April 1995."},{"key":"10.1016\/S0165-1684(98)00014-0_BIB13","doi-asserted-by":"crossref","unstructured":"P. Noll, Wideband speech and audio coding, IEEE Commun. Vol. 31 (11) (November 1993) 34\u201344.","DOI":"10.1109\/35.256878"},{"key":"10.1016\/S0165-1684(98)00014-0_BIB14","doi-asserted-by":"crossref","unstructured":"I. Pitas, A method for signature casting on digital images, Proc. 1996 Int. Conf. on Image Proc., Vol. III, Lausanne, Switzerland, 1996, pp. 215\u2013218.","DOI":"10.1109\/ICIP.1996.560422"},{"key":"10.1016\/S0165-1684(98)00014-0_BIB15","unstructured":"I. Pitas, T. Kaskalis, Applying signatures on digital images, Proc. 1995 IEEE Nonlinear Signal Processing Workshop, Thessaloniki, Greece, 1995, pp. 460\u2013463."},{"key":"10.1016\/S0165-1684(98)00014-0_BIB16","doi-asserted-by":"crossref","unstructured":"R. Rivest, Cryptography, in: J. van Leeuwen (Ed.), Handbook of Theoretical Computer Science, Vol. 1, Ch. 13, MIT Press, Cambridge, MA, 1990, pp. 717\u2013755.","DOI":"10.1016\/B978-0-444-88071-0.50018-7"},{"key":"10.1016\/S0165-1684(98)00014-0_BIB17","doi-asserted-by":"crossref","unstructured":"R. Rivest, The MD4 message digest algorithm, Advances in Cryptology, CRYPTO 92, Springer, Berlin, 1991, pp. 303\u2013311.","DOI":"10.1007\/3-540-38424-3_22"},{"key":"10.1016\/S0165-1684(98)00014-0_BIB18","doi-asserted-by":"crossref","unstructured":"J.J.K.O. Ruanaidh, W.J. Dowling, F.M. Boland, Phase watermarking of digital images, Proc. 1996 Int. Conf. on Image Proc., Vol. III, Lausanne, Switzerland, 1996, pp. 239\u2013242.","DOI":"10.1109\/ICIP.1996.560428"},{"key":"10.1016\/S0165-1684(98)00014-0_BIB19","doi-asserted-by":"crossref","unstructured":"M.D. Swanson, D. Zhu, A.H. Tewfik, Transparent robust image watermarking, Proc. 1996 Int. Conf. on Image Proc., Vol. III, Lausanne, Switzerland, 1996, pp. 211\u2013214.","DOI":"10.1109\/ICIP.1996.560421"},{"key":"10.1016\/S0165-1684(98)00014-0_BIB20","doi-asserted-by":"crossref","unstructured":"M.D. Swanson, B. Zhu, A. Tewfik, Multiresolution video watermarking using perceptual models and scene segmentation, to appear IEEE J. Selected Areas Commun., June 1998.","DOI":"10.1109\/49.668976"},{"key":"10.1016\/S0165-1684(98)00014-0_BIB21","unstructured":"J.F. Tilki, A.A. Beex, Encoding a hidden digital signature onto an audio signal using psychoacoustic masking, Proc. 1996 7th Int. Conf. on Sig. Proc. Apps. and Tech., Boston, MA, 1996, pp. 476\u2013480."},{"key":"10.1016\/S0165-1684(98)00014-0_BIB22","doi-asserted-by":"crossref","unstructured":"R.G. van Schyndel, A.Z. Tirkel, C.F. Osborne, A digital watermark, Proc. 1994 IEEE Int. Conf. on Image Proc., Vol. II, Austin, TX, 1994, pp. 86\u201390.","DOI":"10.1109\/ICIP.1994.413536"},{"key":"10.1016\/S0165-1684(98)00014-0_BIB23","unstructured":"H.L. Van Trees, Detection, Estimation, and Modulation Theory, Vol. 1, Wiley, New York, 1968."},{"key":"10.1016\/S0165-1684(98)00014-0_BIB24","doi-asserted-by":"crossref","unstructured":"R. Wolfgang, E. Delp, A watermark for digital images, Proc. 1996 Int. Conf. on Image Proc., Vol. III, Lausanne, Switzerland, 1996, 219\u2013222.","DOI":"10.1109\/ICIP.1996.560423"}],"container-title":["Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168498000140?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0165168498000140?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T19:56:07Z","timestamp":1580846167000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0165168498000140"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,5]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1998,5]]}},"alternative-id":["S0165168498000140"],"URL":"https:\/\/doi.org\/10.1016\/s0165-1684(98)00014-0","relation":{},"ISSN":["0165-1684"],"issn-type":[{"value":"0165-1684","type":"print"}],"subject":[],"published":{"date-parts":[[1998,5]]}}}