{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:41Z","timestamp":1773615641736,"version":"3.50.1"},"reference-count":16,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625700968","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:33:57Z","timestamp":1771936437000},"page":"1403-1414","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Method for Predicting the Correlation Properties of Marker Bipolar Sequences in Digital Watermarking Using the Patchwork Method"],"prefix":"10.3103","volume":"59","author":[{"given":"M. V.","family":"Gofman","sequence":"first","affiliation":[]},{"given":"A. A.","family":"Kornienko","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7931_CR1","doi-asserted-by":"publisher","first-page":"54","DOI":"10.59461\/ijdiic.v4i1.160","volume":"4","author":"S.M. Shedole","year":"2025","unstructured":"Shedole, S.M. and Santhi, V., A comprehensive study on digital watermarking for security threats and research directions, International Journal of Data Informatics and Intelligent Computing, 2025, vol. 4, no. 1, pp. 54\u201372. https:\/\/doi.org\/10.59461\/ijdiic.v4i1.160","journal-title":"International Journal of Data Informatics and Intelligent Computing"},{"key":"7931_CR2","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1145\/3729165","volume":"57","author":"S. Wendzel","year":"2022","unstructured":"Wendzel, S., Caviglione, L., Mazurczyk, W., Mileva, A., Dittmann, J., Kr\u00e4tzer, Ch., Lamsh\u00f6ft, K., Vielhauer, C., Hartmann, L., Keller, J., Neubert, T., and Zillien, S., A generic taxonomy for steganography methods, ACM Comput. Surv., 2022, vol. 57, no. 9, p. 233. https:\/\/doi.org\/10.1145\/3729165","journal-title":"ACM Comput. Surv."},{"key":"7931_CR3","doi-asserted-by":"publisher","first-page":"102784","DOI":"10.1016\/j.cose.2022.102784","volume":"120","author":"I. Makhdoom","year":"2022","unstructured":"Makhdoom, I., Abolhasan, M., and Lipman, J., A comprehensive survey of covert communication techniques, limitations and future challenges, Comput. Secur., 2022, vol. 120, p. 102784. https:\/\/doi.org\/10.1016\/j.cose.2022.102784","journal-title":"Comput. Secur."},{"key":"7931_CR4","doi-asserted-by":"publisher","first-page":"3225","DOI":"10.1007\/s11277-021-08177-w","volume":"118","author":"P. Kadian","year":"2021","unstructured":"Kadian, P., Arora, Sh.M., and Arora, N., Robust digital watermarking techniques for copyright protection of digital data: A survey, Wireless Pers. Commun., 2021, vol. 118, no. 4, pp. 3225\u20133249. https:\/\/doi.org\/10.1007\/s11277-021-08177-w","journal-title":"Wireless Pers. Commun."},{"key":"7931_CR5","doi-asserted-by":"publisher","unstructured":"Jain, A., Somwanshi, D., Khurana, Ch., and Joshi, K., Review on digital watermarking techniques and its retrieval, 2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP), Uttarakhand, India, 2022, IEEE, 2022, pp. 274\u2013278. https:\/\/doi.org\/10.1109\/icfirtp56122.2022.10059440","DOI":"10.1109\/icfirtp56122.2022.10059440"},{"key":"7931_CR6","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/mpot.2015.2435802","volume":"41","author":"R. Ramasamy","year":"2022","unstructured":"Ramasamy, R. and Arumugam, V., Digital watermarking\u2014A tutorial, IEEE Potentials, 2022, vol. 41, no. 4, pp.\u00a043\u201348. https:\/\/doi.org\/10.1109\/mpot.2015.2435802","journal-title":"IEEE Potentials"},{"key":"7931_CR7","doi-asserted-by":"publisher","unstructured":"Alekseev, V.G. and Korzhik, V.I., Embedding of digital watermark signals with the use of a frequency selective phase changing, Naukoemkie Tekhnologii v Kosmicheskikh Issledovaniyakh Zemli, 2019, vol. 11, no. 6, pp. 22\u201329. https:\/\/doi.org\/10.24411\/2409-5419-2018-10292","DOI":"10.24411\/2409-5419-2018-10292"},{"key":"7931_CR8","doi-asserted-by":"publisher","unstructured":"Sheluhin, O.I., Rybakov, S.Yu., and Magomedova, D.I., Audio steganography method using determined chaos, Naukoemkie Tekhnologii v Kosmicheskikh Issledovaniyakh Zemli, 2021, vol. 13, no. 1, pp. 80\u201391.\nhttps:\/\/doi.org\/10.36724\/2409-5419-2021-13-1-80-91","DOI":"10.36724\/2409-5419-2021-13-1-80-91"},{"key":"7931_CR9","doi-asserted-by":"publisher","first-page":"3635","DOI":"10.1007\/s11042-024-18969-4","volume":"84","author":"E. Salah","year":"2024","unstructured":"Salah, E., Narima, Z., Khaldi, A., and Redouane, K.M., Survey of imperceptible and robust digital audio watermarking systems, Multimedia Tools Appl., 2024, vol. 84, no. 7, pp. 3635\u20133681. https:\/\/doi.org\/10.1007\/s11042-024-18969-4","journal-title":"Multimedia Tools Appl."},{"key":"7931_CR10","doi-asserted-by":"publisher","unstructured":"Uddin, M.S., Hasan, M., and Shimamura, T., Audio watermarking: A comprehensive review, Int. J. Adv. Comput. Sci. Appl., 2024, vol. 15, no. 5. https:\/\/doi.org\/10.14569\/IJACSA.2024.01505141","DOI":"10.14569\/IJACSA.2024.01505141"},{"key":"7931_CR11","doi-asserted-by":"publisher","unstructured":"Bender, W., Gruhl, D., Morimoto, N., and Lu, A., Techniques for data hiding, IBM Systems Journal, 1996, vol.\u00a035, no. 3.4, pp. 313\u2013336. https:\/\/doi.org\/10.1147\/sj.353.0313","DOI":"10.1147\/sj.353.0313"},{"key":"7931_CR12","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/TSA.2003.812145","volume":"11","author":"I.-K. Yeo","year":"2003","unstructured":"Yeo, I.-K. and Kim, H.J., Modified patchwork algorithm: A novel audio watermarking scheme, IEEE Trans. Speech Audio Process., 2003, vol. 11, no. 4, pp. 381\u2013386. https:\/\/doi.org\/10.1109\/TSA.2003.812145","journal-title":"IEEE Trans. Speech Audio Process."},{"key":"7931_CR13","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1109\/tifs.2018.2871748","volume":"14","author":"Zh. Liu","year":"2018","unstructured":"Liu, Zh., Huang, Yu., and Huang, J., Patchwork-based audio watermarking robust against de-synchronization and recapturing attacks, IEEE Trans. Inf. Forensics Secur., 2018, vol. 14, no. 5, pp. 1171\u20131180. https:\/\/doi.org\/10.1109\/tifs.2018.2871748","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7931_CR14","doi-asserted-by":"publisher","unstructured":"Chincholkar, Yu. and Ganorkar, S., Audio watermarking algorithm implementation using patchwork technique, 2019 IEEE 5th International Conference for Convergence in Technology (I2CT), Bombay, 2019, IEEE, 2019, pp. 1\u20135. https:\/\/doi.org\/10.1109\/i2ct45611.2019.9033771","DOI":"10.1109\/i2ct45611.2019.9033771"},{"key":"7931_CR15","doi-asserted-by":"publisher","first-page":"1753","DOI":"10.21917\/ijivp.2018.0246","volume":"8","author":"Y.D. Chincholkar","year":"2018","unstructured":"Chincholkar, Y.D. and Pravin Kude, Sh., Effective robust patchwork method to the vulnerable attack for digital audio watermarking, ICTACT Journal on Image and Video Processing, 2018, vol. 8, no. 4, pp. 1753\u20131758. https:\/\/doi.org\/10.21917\/ijivp.2018.0246","journal-title":"ICTACT Journal on Image and Video Processing"},{"key":"7931_CR16","doi-asserted-by":"publisher","first-page":"221","DOI":"10.15622\/ia.22.2.1","volume":"22","author":"M. Gofman","year":"2023","unstructured":"Gofman, M. and Kornienko, A., Limit bipolar sequences for patchwork-based robust digital audio watermarking, Informatika i Avtomatizatsiya, 2023, vol. 22, no. 2, pp. 221\u2013260. https:\/\/doi.org\/10.15622\/ia.22.2.1","journal-title":"Informatika i Avtomatizatsiya"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700968.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625700968","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700968.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:40Z","timestamp":1773612160000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625700968"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":16,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7931"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625700968","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"12 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}