{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:47Z","timestamp":1750220627267,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,19]],"date-time":"2020-06-19T00:00:00Z","timestamp":1592524800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,19]]},"DOI":"10.1145\/3408127.3408133","type":"proceedings-article","created":{"date-parts":[[2020,9,11]],"date-time":"2020-09-11T03:31:13Z","timestamp":1599795073000},"page":"202-206","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Improved wavelet domain centroid-based adaptive audio steganography"],"prefix":"10.1145","author":[{"given":"Dingwei","family":"Tan","sequence":"first","affiliation":[{"name":"National University of Defense Technology, Hefei, Anhui, China"}]},{"given":"Yuliang","family":"Lu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Hefei, Anhui, China"}]},{"given":"Xuehu","family":"Yan","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Hefei, Anhui, China"}]},{"given":"Longlong","family":"Li","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Hefei, Anhui, China"}]}],"member":"320","published-online":{"date-parts":[[2020,9,10]]},"reference":[{"key":"e_1_3_2_1_1_1","article-title":"A Steganographic Approach to Hide Information in Audio Signal using Discrete Wavelet Transforms","volume":"7","author":"Bhowal Krishna","year":"2016","unstructured":"Krishna Bhowal , Debasree Chanda Sarkar , Susanta Biswas , and Partha Pratim Sarkar . 2016 . A Steganographic Approach to Hide Information in Audio Signal using Discrete Wavelet Transforms . International Journal of Advanced Research in Computer Science 7 , 4 (2016). Krishna Bhowal, Debasree Chanda Sarkar, Susanta Biswas, and Partha Pratim Sarkar. 2016. A Steganographic Approach to Hide Information in Audio Signal using Discrete Wavelet Transforms. International Journal of Advanced Research in Computer Science 7, 4 (2016).","journal-title":"International Journal of Advanced Research in Computer Science"},{"key":"e_1_3_2_1_2_1","volume-title":"Xin Xin Niu, and Yi Xian Yang.","author":"Chen Ming","year":"2009","unstructured":"Ming Chen , Ru Zhang , Fan Fan Liu , Xin Xin Niu, and Yi Xian Yang. 2009 . Audio steganography by quantization index modulation in the DCT domain. Journal on Communications ( 2009). Ming Chen, Ru Zhang, Fan Fan Liu, Xin Xin Niu, and Yi Xian Yang. 2009. Audio steganography by quantization index modulation in the DCT domain. Journal on Communications (2009)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2002.1203314"},{"volume-title":"International Conference on Information Technology: Coding & Computing.","author":"Cvejic N.","key":"e_1_3_2_1_4_1","unstructured":"N. Cvejic and T. Seppanen . 2004. Increasing robustness of LSB audio steganography using a novel embedding method . In International Conference on Information Technology: Coding & Computing. N. Cvejic and T. Seppanen. 2004. Increasing robustness of LSB audio steganography using a novel embedding method. In International Conference on Information Technology: Coding & Computing."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Oleg Evsutin Anna Kokurina Roman Mescheryakov and Olga Shumskaya. 2016. An Adaptive Algorithm for the Steganographic Embedding Information into the Discrete Fourier Transform Phase Spectrum.  Oleg Evsutin Anna Kokurina Roman Mescheryakov and Olga Shumskaya. 2016. An Adaptive Algorithm for the Steganographic Embedding Information into the Discrete Fourier Transform Phase Spectrum.","DOI":"10.1007\/978-3-319-33816-3_5"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Mehdi Fallahpour and David. 2009. High Capacity Method for Real-Time Audio Data Hiding Using the FFT Transform.  Mehdi Fallahpour and David. 2009. High Capacity Method for Real-Time Audio Data Hiding Using the FFT Transform.","DOI":"10.1007\/978-3-642-02633-1_12"},{"key":"e_1_3_2_1_7_1","volume-title":"Echo Hiding. In International Workshop on Information Hiding.","author":"Gruhl D","year":"1996","unstructured":"D Gruhl . 1996 . Echo Hiding. In International Workshop on Information Hiding. D Gruhl. 1996. Echo Hiding. In International Workshop on Information Hiding."},{"key":"e_1_3_2_1_8_1","volume-title":"Enhanced security audio steganography by using higher least significant bit. J Adv Res Comput Appl ISSN (online) 2, 1","author":"Krishnan S","year":"2016","unstructured":"S Krishnan and MS Abdullah . 2016. Enhanced security audio steganography by using higher least significant bit. J Adv Res Comput Appl ISSN (online) 2, 1 ( 2016 ), 39--54. S Krishnan and MS Abdullah. 2016. Enhanced security audio steganography by using higher least significant bit. J Adv Res Comput Appl ISSN (online) 2, 1 (2016), 39--54."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2010.2066770"},{"key":"e_1_3_2_1_10_1","article-title":"Centroid-Based Audio Steganography Scheme in Wavelet Domain","volume":"9","author":"Hanlin","year":"2018","unstructured":"Hanlin liu, Jingju Liu , Xuehu Yan , Pengfei Xue , and Song Wan . 2018 . Centroid-Based Audio Steganography Scheme in Wavelet Domain . Journal of Information Hiding and Multimedia Signal Processing 9 , 5 (2018). Hanlin liu, Jingju Liu, Xuehu Yan, Pengfei Xue, and Song Wan. 2018. Centroid-Based Audio Steganography Scheme in Wavelet Domain. Journal of Information Hiding and Multimedia Signal Processing 9, 5 (2018).","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"key":"e_1_3_2_1_11_1","article-title":"Audio data hiding that is robust with respect to aerial transmission and speech codecs","volume":"6","author":"Nishimura Akira","year":"2010","unstructured":"Akira Nishimura . 2010 . Audio data hiding that is robust with respect to aerial transmission and speech codecs . International Journal of Innovative Computing, Information and Control 6 , 3 (2010). Akira Nishimura. 2010. Audio data hiding that is robust with respect to aerial transmission and speech codecs. International Journal of Innovative Computing, Information and Control 6, 3 (2010).","journal-title":"International Journal of Innovative Computing, Information and Control"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1998.675340"},{"key":"e_1_3_2_1_13_1","volume-title":"Methods for objective measurements of perceived audio quality. ITU-RBS 13871","author":"Recommendation ITUR","year":"2001","unstructured":"ITUR Recommendation . 2001. Methods for objective measurements of perceived audio quality. ITU-RBS 13871 ( 2001 ). ITUR Recommendation. 2001. Methods for objective measurements of perceived audio quality. ITU-RBS 13871 (2001)."},{"volume-title":"International Journal of Computer Trends&Technology","year":"2014","key":"e_1_3_2_1_14_1","unstructured":"Rupanshi, Preeti, and Vandana. 2014. Audio Steganography by Direct Sequence Spread Spectrum . International Journal of Computer Trends&Technology ( 2014 ). Rupanshi, Preeti, and Vandana. 2014. Audio Steganography by Direct Sequence Spread Spectrum. International Journal of Computer Trends&Technology (2014)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2019158"},{"key":"e_1_3_2_1_16_1","first-page":"3","article-title":"PEAQ-The ITU standard for objective measurement of perceived audio quality","volume":"48","author":"Thiede Thilo","year":"2000","unstructured":"Thilo Thiede , William C Treurniet , Roland Bitto , Christian Schmidmer , Thomas Sporer , John G Beerends , and Catherine Colomes . 2000 . PEAQ-The ITU standard for objective measurement of perceived audio quality . Journal of the Audio Engineering Society 48 , 1\/2 (2000), 3 -- 29 . Thilo Thiede, William C Treurniet, Roland Bitto, Christian Schmidmer, Thomas Sporer, John G Beerends, and Catherine Colomes. 2000. PEAQ-The ITU standard for objective measurement of perceived audio quality. Journal of the Audio Engineering Society 48, 1\/2 (2000), 3--29.","journal-title":"Journal of the Audio Engineering Society"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-010-0058-0"},{"key":"e_1_3_2_1_18_1","unstructured":"Yu Yang and min Lei. 2015. Audio information hiding and digital watermarking.  Yu Yang and min Lei. 2015. Audio information hiding and digital watermarking."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77048-0_12"},{"key":"e_1_3_2_1_20_1","first-page":"833","article-title":"Optimal snr of audio watermarking by wavelet and compact pso methods","volume":"6","author":"Zhao Ming","year":"2015","unstructured":"Ming Zhao , Jeng-Shyang Pan , and Shuo-Tsung Chen . 2015 . Optimal snr of audio watermarking by wavelet and compact pso methods . Journal of Information Hiding and Multimedia Signal Processing 6 , 5 (2015), 833 -- 846 . Ming Zhao, Jeng-Shyang Pan, and Shuo-Tsung Chen. 2015. Optimal snr of audio watermarking by wavelet and compact pso methods. Journal of Information Hiding and Multimedia Signal Processing 6, 5 (2015), 833--846.","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"}],"event":{"name":"ICDSP 2020: 2020 4th International Conference on Digital Signal Processing","sponsor":["University of Electronic Science and Technology of China University of Electronic Science and Technology of China"],"location":"Chengdu China","acronym":"ICDSP 2020"},"container-title":["Proceedings of the 2020 4th International Conference on Digital Signal Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3408127.3408133","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3408127.3408133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:34Z","timestamp":1750197694000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3408127.3408133"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,19]]},"references-count":20,"alternative-id":["10.1145\/3408127.3408133","10.1145\/3408127"],"URL":"https:\/\/doi.org\/10.1145\/3408127.3408133","relation":{},"subject":[],"published":{"date-parts":[[2020,6,19]]},"assertion":[{"value":"2020-09-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}