{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T21:36:15Z","timestamp":1773524175484,"version":"3.50.1"},"reference-count":29,"publisher":"Zhejiang University Press","issue":"12","license":[{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Frontiers Inf Technol Electronic Eng"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1631\/fitee.1500297","type":"journal-article","created":{"date-parts":[[2016,12,16]],"date-time":"2016-12-16T01:49:20Z","timestamp":1481852960000},"page":"1320-1330","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A robust intelligent audio watermarking scheme using support vector machine"],"prefix":"10.1631","volume":"17","author":[{"given":"Mohammad","family":"Mosleh","sequence":"first","affiliation":[]},{"given":"Hadi","family":"Latifpour","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Kheyrandish","sequence":"additional","affiliation":[]},{"given":"Mahdi","family":"Mosleh","sequence":"additional","affiliation":[]},{"given":"Najmeh","family":"Hosseinpour","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2016,12,17]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10772-009-9056-2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-4761-4_26"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2000.871531"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2010.02.006"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-010-0515-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/bf00994018"},{"key":"ref7","volume-title":"Digital Watermarking and Steganography","author":"Cox","year":"2007"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.10.007"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14834-7_9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2008.12.004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/eurcon.2007.4400269"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/5.771066"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.05.003"},{"key":"ref14","article-title":"An Examination and Interpretation of ITU-R BS. 1387: Perceptual Evaluation of Audio Quality","volume-title":"TSP Lab Technical Report, Department of Electrical & Computer Engineering","author":"Kabal","year":"2002"},{"key":"ref15","author":"Lang","year":"2005","journal-title":"Stirmark Benchmark for Audio (SMBA): Evaluation of Watermarking Schemes for Audio"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.12.021"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.02.022"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1694-3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.03.006"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2012.08.006"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2478\/v10168-010-0037-x"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898719574"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2006.05.002"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.02.045"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1360\/crad20050923"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2007.10.001"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2011.05.011"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.03.033"},{"issue":"2","key":"ref29","first-page":"141","article-title":"SVM based watermarking technique","volume":"9","author":"Yen","year":"2006","journal-title":"Tamkang J. Sci. Eng."}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1631\/FITEE.1500297\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1500297.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1500297.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:33:54Z","timestamp":1771659234000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/FITEE.1500297"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":29,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["143"],"URL":"https:\/\/doi.org\/10.1631\/fitee.1500297","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12]]}}}