{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:21Z","timestamp":1773615621798,"version":"3.50.1"},"reference-count":10,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080113","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1005-1019","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Method for Watermark Detection in Digital Audio Signals by Authorized Users"],"prefix":"10.3103","volume":"55","author":[{"given":"M. V.","family":"Gofman","sequence":"first","affiliation":[]},{"given":"A. A.","family":"Kornienko","sequence":"additional","affiliation":[]},{"given":"M. L.","family":"Glukharev","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7429_CR1","unstructured":"Shelukhin, O.I. and Kanaev, S.D., Steganografiya. Algoritmy i programmnaya realizatsiya (Steganography: Algorithms and Software Implementation), Moscow: Goryachaya Liniya-Telekom, 2017."},{"key":"7429_CR2","unstructured":"Gribunin, V., Okov, I, and Turintsev, I., Tsifrovaya steganografiya (Digital Steganography), Moscow: SOLON-PRESS, 2009."},{"key":"7429_CR3","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/LSP.2009.2032751","volume":"17","author":"H.S. Yun","year":"2010","unstructured":"Yun, H.S., Cho, K., and Kim, N.S., Acoustic data transmission based on modulated complex lapped transform, IEEE Signal Process. Lett., 2010, vol. 17, no. 1, pp. 67\u201370. \u00a0https:\/\/doi.org\/10.1109\/LSP.2009.2032751","journal-title":"IEEE Signal Process. Lett."},{"key":"7429_CR4","doi-asserted-by":"publisher","unstructured":"Cho, K., Baek, S., Moon, H.G., and Kim, N.S., Multi-microphone approach for reliable acoustic data transmission, IEEE Int. Conf. on Consumer Electronics (ICCE), Las Vegas, 2016, IEEE, 2016, pp. 557\u2013560. \u00a0https:\/\/doi.org\/10.1109\/ICCE.2016.7430730","DOI":"10.1109\/ICCE.2016.7430730"},{"key":"7429_CR5","doi-asserted-by":"publisher","unstructured":"Wang, Q., Ren, K., Zhou, M., Lei, T., Koutsonikolas, D., and Su, L., Messages behind the sound: real-time hidden acoustic signal capture with smartphones, Proc. 22nd Ann. Int. Conf. on Mobile Computing and Networking, New York, 2016, New York: Association for Computing Machinery, 2016, pp. 29\u201341. \u00a0https:\/\/doi.org\/10.1145\/2973750.2973765","DOI":"10.1145\/2973750.2973765"},{"key":"7429_CR6","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/2534169.2486037","volume":"43","author":"R. Nandakumar","year":"2013","unstructured":"Nandakumar, R., Chintalapudi, K.K., Padmanabhan, V., and Venkatesan, R., Dhwani: secure peer-to-peer acoustic NFC, ACM SIGCOMM Comput. Commun. Rev., 2013, vol. 43, no. 4, pp.\u00a063\u201374. \u00a0https:\/\/doi.org\/10.1145\/2534169.2486037","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"7429_CR7","doi-asserted-by":"publisher","unstructured":"Lee, H., Kim, T.H., Choi, J.W., and Choi, S., Chirp signal-based aerial acoustic communication for smart devices, IEEE Conf. on Computer Communications (InfoCom), Kowloon, Hong Kong, 2015, IEEE, 2015, pp. 2407\u20132415. \u00a0https:\/\/doi.org\/10.1109\/INFOCOM.2015.7218629","DOI":"10.1109\/INFOCOM.2015.7218629"},{"key":"7429_CR8","doi-asserted-by":"publisher","unstructured":"Gofman, M.V., A method of hidden data transmission in communication via air audio channel, Tr. SPIIRAN, 2017, no. 2, pp. 97\u2013122. \u00a0https:\/\/doi.org\/10.15622\/sp.51.5","DOI":"10.15622\/sp.51.5"},{"key":"7429_CR9","doi-asserted-by":"publisher","unstructured":"Gofman, M.V., Digital watermarking of audio signals for robust hidden audio communication via air audio channel, Tr. SPIIRAN, 2017, no. 6, pp. 185\u2013215. \u00a0https:\/\/doi.org\/10.15622\/sp.55.8","DOI":"10.15622\/sp.55.8"},{"key":"7429_CR10","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1109\/TMM.2009.2012938","volume":"11","author":"Y. Nakashima","year":"2009","unstructured":"Nakashima, Y., Tachibana, R., and Babaguchi, N., Watermarked movie soundtrack finds the position of the camcorder in a theater, IEEE Trans. Multimedia, 2009, vol. 11, no. 3, pp.\u00a0443\u2013454. \u00a0https:\/\/doi.org\/10.1109\/TMM.2009.2012938","journal-title":"IEEE Trans. Multimedia"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080113.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080113","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080113.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:23Z","timestamp":1773612143000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080113"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":10,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7429"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080113","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"14 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}