{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:57Z","timestamp":1750307097220,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,3]],"date-time":"2012-09-03T00:00:00Z","timestamp":1346630400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,3]]},"DOI":"10.1145\/2381716.2381858","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T15:35:23Z","timestamp":1349969723000},"page":"744-748","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Schur decomposition and dither modulation"],"prefix":"10.1145","author":[{"given":"Ankur","family":"Choudhary","sequence":"first","affiliation":[{"name":"ASET, Amity University, Noida, India"}]},{"given":"S. P. S.","family":"Chauhan","sequence":"additional","affiliation":[{"name":"I.T.S. Engineering College, Greater Noida, India"}]},{"given":"M. Afshar","family":"Alam","sequence":"additional","affiliation":[{"name":"Jamia Hamdard University, New Delhi, India"}]},{"given":"Safdar","family":"Tanveer","sequence":"additional","affiliation":[{"name":"Jamia Hamdard University, New Delhi, India"}]}],"member":"320","published-online":{"date-parts":[[2012,9,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Digital Watermarking and Steganography","author":"Cox M.","year":"2007","unstructured":"I. Cox , M. Miller , J. Bloom , J. Fridrich , T. Kalke , Digital Watermarking and Steganography , second Ed., Morgan Kaufmann , Burlington, MA , 2007 . I. Cox, M. Miller, J. Bloom, J. Fridrich, T. Kalke, Digital Watermarking and Steganography, second Ed., Morgan Kaufmann, Burlington, MA, 2007."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2006.384880"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2010.02.006"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11596981_91"},{"key":"e_1_3_2_1_5_1","volume-title":"Linnanmaa","author":"Nedeljko","year":"2004","unstructured":"C. Nedeljko , \"Algorithms For Audio Watermarking And Steganography\", Academic Dissertation , University of Oulu , public discussion in Kuusamonsali (Auditorium YB210) , Linnanmaa , Finland , 2004 . C. Nedeljko, \"Algorithms For Audio Watermarking And Steganography\", Academic Dissertation, University of Oulu, public discussion in Kuusamonsali (Auditorium YB210), Linnanmaa, Finland, 2004."},{"key":"e_1_3_2_1_6_1","volume-title":"Accessed","author":"Polikar Dr.","year":"2001","unstructured":"R. Polikar , \"Home page - Dr. Robi Polikar ,\" Jan 2001 . {Online}.http:\/\/users.rowan.edu\/~polikar\/WAVELETS\/WTtutorial.html . Accessed : July 21, 2010. R. Polikar, \"Home page - Dr. Robi Polikar,\" Jan 2001. {Online}.http:\/\/users.rowan.edu\/~polikar\/WAVELETS\/WTtutorial.html. Accessed: July 21, 2010."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2004.838265"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2008.12.004"},{"key":"e_1_3_2_1_9_1","volume-title":"International Journal of Computer and Electrical Engineering","volume":"2","author":"Chandra Mohan K.","unstructured":"B. Chandra Mohan and K. Veera Swamy . On the use of Schur Decomposition for Copyright Protection of Digital Images . International Journal of Computer and Electrical Engineering , Vol. 2 , No. 4, August, 2010 1793--8163. B. Chandra Mohan and K. Veera Swamy. On the use of Schur Decomposition for Copyright Protection of Digital Images. International Journal of Computer and Electrical Engineering, Vol. 2, No. 4, August, 2010 1793--8163."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.923725"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceeding of the 105th AES Convention","author":"Christian H.","year":"1998","unstructured":"N. Christian , H. Jurgen, Digital watermarking and its influence on audio quality , in: Proceeding of the 105th AES Convention , 1998 preprint 4823. N. Christian, H. Jurgen, Digital watermarking and its influence on audio quality, in: Proceeding of the 105th AES Convention, 1998 preprint 4823."}],"event":{"name":"CUBE '12: CUBE International IT Conference & Exhibition","sponsor":["CUOT Curtin University of Technology"],"location":"Pune India","acronym":"CUBE '12"},"container-title":["Proceedings of the CUBE International Information Technology Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381858","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2381716.2381858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:46Z","timestamp":1750239286000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381858"}},"subtitle":["an efficient and robust audio watermarking technique"],"short-title":[],"issued":{"date-parts":[[2012,9,3]]},"references-count":11,"alternative-id":["10.1145\/2381716.2381858","10.1145\/2381716"],"URL":"https:\/\/doi.org\/10.1145\/2381716.2381858","relation":{},"subject":[],"published":{"date-parts":[[2012,9,3]]},"assertion":[{"value":"2012-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}