{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T05:17:45Z","timestamp":1776230265362,"version":"3.50.1"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2017,4,1]],"date-time":"2017-04-01T00:00:00Z","timestamp":1491004800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/Crown.html"}],"funder":[{"DOI":"10.13039\/501100000038","name":"NSERC","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009874","name":"Universit\u00e9 de Sherbrooke","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100009874","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1109\/tifs.2016.2636094","type":"journal-article","created":{"date-parts":[[2016,12,6]],"date-time":"2016-12-06T14:15:54Z","timestamp":1481033754000},"page":"840-852","source":"Crossref","is-referenced-by-count":39,"title":["Audio Watermarking Using Spikegram and a Two-Dictionary Approach"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8386-3765","authenticated-orcid":false,"given":"Yousof","family":"Erfani","sequence":"first","affiliation":[]},{"given":"Ramin","family":"Pichevar","sequence":"additional","affiliation":[]},{"given":"Jean","family":"Rouat","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721274.007"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.5772\/8529"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.909108"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.acha.2009.04.002"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ASPAA.2007.4392980"},{"key":"ref30","year":"2016","journal-title":"Image-source Method for Room Acoustics"},{"key":"ref37","year":"1997","journal-title":"Methods for the subjective assessment of small impairments in audio systems including multichannel sound systems"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/78.258082"},{"key":"ref35","first-page":"7483","article-title":"Perceptual matching pursuit for audio coding","volume":"124","author":"najaf-zadeh","year":"2008","journal-title":"Audio Eng Soc Conv"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1561\/2200000016"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6637702"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2013.24"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2009.4959505"},{"key":"ref2","author":"cox","year":"2007","journal-title":"Digital Watermarking and Steganography"},{"key":"ref1","author":"siwek","year":"2007","journal-title":"True Cost of Recorded Music Piracy to the U S Economy"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MLSP.2009.5306206"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2168211"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.03.016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1162\/0899766052530839"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2006.1660589"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2227733"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2010.09.008"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2010.02.006"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TSA.2003.812145"},{"key":"ref55","year":"2016","journal-title":"Bensound"},{"key":"ref54","year":"2016","journal-title":"VOA English"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/AIM.2016.7576908"},{"key":"ref52","first-page":"289","article-title":"Robust Audio Watermarking Based on Extended Improved Spread Spectrum with Perceptual Masking","volume":"14","author":"zhang","year":"2012","journal-title":"Int J Fuzzy Syst"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2431997"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2173678"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/35.940053"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2014.2328175"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2013.2279312"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2013.2277929"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2010.05.012"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7177988"},{"key":"ref17","first-page":"123","article-title":"Auditory filters and excitation patterns as representations of frequency resolution","author":"patterson","year":"1987","journal-title":"Frequency Selectivity in Hearing"},{"key":"ref18","article-title":"An efficient implementation of the patterson-holdsworth auditory filter bank","author":"slaney","year":"1993"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1142\/9789812562524_0011"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2230220"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1155\/S1110865703304081"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2293952"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1049\/iet-bmt.2012.0052"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2012.2203810"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2014MUP0017"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1121\/1.382599"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2014.2387385"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.920728"},{"key":"ref45","year":"2016","journal-title":"Matlab"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809384"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2004.838265"},{"key":"ref42","article-title":"An examination and interpretation of: Perceptual evaluation of audio quality","author":"kabal","year":"2002"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-5079-4"},{"key":"ref44","year":"2016","journal-title":"WavePad"},{"key":"ref43","year":"2016","journal-title":"Adobe Audition 3"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7831515\/07775035.pdf?arnumber=7775035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:42:08Z","timestamp":1641987728000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7775035\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":55,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2016.2636094","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4]]}}}