{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T17:00:48Z","timestamp":1755795648407,"version":"3.41.2"},"reference-count":23,"publisher":"World Scientific Pub Co Pte Ltd","issue":"02","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Patt. Recogn. Artif. Intell."],"published-print":{"date-parts":[[2022,2]]},"abstract":"<jats:p> The watermark embedded by traditional methods is easy to be lost under some attacks. To overcome this problem, this study proposes a novel method based on DWT. It adopts a digital audio watermarking state-switching system which optimizes DWT coefficients doubly. Firstly, it combines the quantization-embedding system and the weights of DWT coefficients with SNR to obtain an optimization model for watermarking. Next, the Lagrange principle, Hessian matrix, and minimum energy play three essential roles to obtain the optimal DWT coefficients and weights. Moreover, the almost invariant feature of the optimal weights holds demonstrating resistance to amplitude scaling. Compared with similar algorithms, the experimental results verify that the embedded audio in the proposed method has higher signal-to-noise ratio (SNR) and lower bit error rate (BER). At the same time, it indicates stronger robustness against various attacks, such as re-sampling, amplitude scaling, and mp3 compression. <\/jats:p>","DOI":"10.1142\/s0218001422580022","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T02:41:10Z","timestamp":1646102470000},"source":"Crossref","is-referenced-by-count":3,"title":["Private Data Hiding System Using State-Switch DWT Coefficients Quantization on Digital Signal"],"prefix":"10.1142","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1647-1769","authenticated-orcid":false,"given":"Ming","family":"Zhao","sequence":"first","affiliation":[{"name":"School of Computer Science, Yangtze University, Jingzhou City, Hubei Province, China"}]},{"given":"Meng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, Yangtze University, Jingzhou City, Hubei Province, China"}]},{"given":"Xindi","family":"Tong","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Information Engineering, The Chinese University of Hong Kong, Hong Kong China"}]},{"given":"Jie","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science, Yangtze University, Jingzhou City, Hubei Province, China"}]},{"given":"Shuo-Tsung","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics, Tunghai University, Taichung 40704, Taiwan, R.O.C."},{"name":"Department of Computer Science and Information Engineering, National Yunlin University of Science and Technology, Yunlin 64002, Taiwan, R.O.C."}]}],"member":"219","published-online":{"date-parts":[[2022,2,25]]},"reference":[{"key":"S0218001422580022BIB001","volume-title":"The Elements of Real Analysis","author":"Bartle R. G.","year":"1976","edition":"2"},{"volume-title":"Introduction to Wavelet Theory and its Application","year":"1998","author":"Burrus C. S.","key":"S0218001422580022BIB002"},{"key":"S0218001422580022BIB003","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-9714-1_15"},{"key":"S0218001422580022BIB004","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-014-0054-9"},{"key":"S0218001422580022BIB005","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2013.0399"},{"key":"S0218001422580022BIB006","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2500-1"},{"key":"S0218001422580022BIB007","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2012.12.013"},{"key":"S0218001422580022BIB008","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2009.0184"},{"key":"S0218001422580022BIB009","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2009.0187"},{"key":"S0218001422580022BIB010","doi-asserted-by":"publisher","DOI":"10.13164\/re.2017.0552"},{"key":"S0218001422580022BIB011","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-013-0863-y"},{"volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","year":"2000","author":"Katzenbeisser S.","key":"S0218001422580022BIB012"},{"volume-title":"Optimal Control","year":"1986","author":"Lewis F. L.","key":"S0218001422580022BIB013"},{"key":"S0218001422580022BIB014","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5024-z"},{"key":"S0218001422580022BIB015","doi-asserted-by":"publisher","DOI":"10.1109\/34.192463"},{"key":"S0218001422580022BIB016","first-page":"6","volume":"70","author":"Mishra J.","year":"2013","journal-title":"Int. J. Comput. Appl."},{"issue":"2","key":"S0218001422580022BIB017","first-page":"91","volume":"2","author":"Noriega R. M.","year":"2011","journal-title":"J. Inf. Hiding Multimed. Signal Process."},{"issue":"10","key":"S0218001422580022BIB018","first-page":"375","volume":"6","author":"Shankar T.","year":"2017","journal-title":"Int. J. Electron. Electr. Comput. Syst."},{"key":"S0218001422580022BIB019","doi-asserted-by":"publisher","DOI":"10.3390\/s140203721"},{"key":"S0218001422580022BIB020","doi-asserted-by":"publisher","DOI":"10.3390\/app8050723"},{"key":"S0218001422580022BIB021","first-page":"1","volume":"3","author":"Xiang S.","year":"2011","journal-title":"EURASIP J. Adv. Signal Process."},{"issue":"3","key":"S0218001422580022BIB022","first-page":"485","volume":"16","author":"Zhao M.","year":"2015","journal-title":"J. Internet Technol."},{"issue":"3","key":"S0218001422580022BIB023","first-page":"473","volume":"23","author":"Zhao M.","year":"2021","journal-title":"Int. J. Netw. Secur."}],"container-title":["International Journal of Pattern Recognition and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218001422580022","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,25]],"date-time":"2022-03-25T06:01:49Z","timestamp":1648188109000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218001422580022"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2]]},"references-count":23,"journal-issue":{"issue":"02","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["10.1142\/S0218001422580022"],"URL":"https:\/\/doi.org\/10.1142\/s0218001422580022","relation":{},"ISSN":["0218-0014","1793-6381"],"issn-type":[{"type":"print","value":"0218-0014"},{"type":"electronic","value":"1793-6381"}],"subject":[],"published":{"date-parts":[[2022,2]]},"article-number":"2258002"}}