{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T20:40:07Z","timestamp":1736628007302,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540488255"},{"type":"electronic","value":"9783540488279"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11922841_19","type":"book-chapter","created":{"date-parts":[[2006,11,2]],"date-time":"2006-11-02T13:35:53Z","timestamp":1162474553000},"page":"226-240","source":"Crossref","is-referenced-by-count":15,"title":["Robust Audio Watermarking Based on Low-Order Zernike Moments"],"prefix":"10.1007","author":[{"given":"Shijun","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Jiwu","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Chuntao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hongmei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1109\/34.3913","volume":"10","author":"C.-H. Teh","year":"1988","unstructured":"Teh, C.-H., Chin, R.T.: On Image Analysis by the Methods of Moments. IEEE Transaction on Pattern Analysis and Machine Intelligence\u00a010, 496\u2013513 (1988)","journal-title":"IEEE Transaction on Pattern Analysis and Machine Intelligence"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1109\/34.55109","volume":"12","author":"Khotanzad","year":"1990","unstructured":"Khotanzad, Hong, Y.H.: Invariant Image Recognition by Zernike Moments. IEEE Transaction on Pattern Analysis and Machine Intelligence\u00a012, 489\u2013497 (1990)","journal-title":"IEEE Transaction on Pattern Analysis and Machine Intelligence"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Farzam, M., Shahram Shirani, S.: A Robust Multimedia Watermarking Technique Using Zernike Transform. In: Proc. of IEEE International Workshop Multimedia Signal Processing, pp. 529\u2013534 (2001)","DOI":"10.1109\/MMSP.2001.962787"},{"issue":"8","key":"19_CR4","doi-asserted-by":"publisher","first-page":"766","DOI":"10.1109\/TCSVT.2003.815955","volume":"13","author":"H.S. Kim","year":"2003","unstructured":"Kim, H.S., Lee, H.K.: Invariant Image Watermark Using Zernike Moments. IEEE Transaction on Circuits and Systems for Video Technology\u00a013(8), 766\u2013775 (2003)","journal-title":"IEEE Transaction on Circuits and Systems for Video Technology"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Xin, Y.Q., Liao, S., Pawlak, M.: A Multibit Geometrically Robust Image Watermark Based on Zernike Moments. In: Proc. of the 17th International Conference on Pattern Recognition, pp. 861\u2013864 (2004)","DOI":"10.1109\/ICPR.2004.1333908"},{"key":"19_CR6","unstructured":"Chen, J., Yao, H.X., Gao, W., Liu, S.H.: A Robust Watermarking Method Based on Wavelet and Zernike Transform. In: Proc. of the 2004 International Symposium on Circuits and Systems, vol.\u00a02, pp. 23\u201326 (2004)"},{"key":"19_CR7","unstructured":"Liu, H.M., Lin, J.L., Huang, J.W.: Image Authentication Using Content Based Watermark. In: Proc. of the 2004 International Symposium on Circuits and Systems, pp. 4014\u20134017 (2005)"},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"1358","DOI":"10.1109\/34.735809","volume":"20","author":"S.X. Liao","year":"1998","unstructured":"Liao, S.X., Pawlak, M.: On the Accuracy of Zernike Moments for Image Analysis. IEEE Transaction on Pattern Analysis and Machine Intelligence\u00a020, 1358\u20131364 (1998)","journal-title":"IEEE Transaction on Pattern Analysis and Machine Intelligence"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Lie, W.N., Chang, L.C.: Robust and High-Quality Time-Domain Audio Watermarking Subject to Psychoacoustic Masking. In: Proc. of IEEE International Symposium on Circuits and Systems, vol.\u00a02, pp. 45\u201348 (2002)","DOI":"10.1109\/ISCAS.2001.921002"},{"key":"19_CR10","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/TSA.2003.812145","volume":"11","author":"I.K. Yeo","year":"2003","unstructured":"Yeo, I.K., Kim, H.J.: Modified patchwork algorithm: A Novel Audio Watermarking Scheme. IEEE Transaction on Speech and Audio Processing\u00a011, 381\u2013386 (2003)","journal-title":"IEEE Transaction on Speech and Audio Processing"},{"key":"19_CR11","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/TBC.2004.838265","volume":"51","author":"S.Q. Wu","year":"2005","unstructured":"Wu, S.Q., Huang, J.W., Huang, D.R., Shi, Y.Q.: Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission. IEEE Transactions on Broadcasting\u00a051, 69\u201376 (2005)","journal-title":"IEEE Transactions on Broadcasting"},{"key":"19_CR12","unstructured":"http:\/\/www.mp3-tech.org\/programmer\/sources\/eaqual.tgz"},{"key":"19_CR13","unstructured":"International Telecommunication Union: Method for Objective Measurements of Perceived Audio Quality (PEAQ). ITU-R BS 1387 (1998)"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Arnold, M.: Subjective and Objective Quality Evaluation of Watermarked Audio Tracks. Web Delivering of Music, 161\u2013167 (2002)","DOI":"10.1117\/12.465264"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Steinebach, M., Petitcolas, F.A.P., Raynal, F., Dittmann, J., Fontaine, C., Seibel, S., Fates, N., Ferri, L.C.: StirMark benchmark: audio watermarking attacks. In: Proc. of International Conference on Information Technology: Coding and Computing, pp. 49\u201354 (2001)","DOI":"10.1109\/ITCC.2001.918764"},{"key":"19_CR16","unstructured":"http:\/\/www.petitcolas.net\/fabien\/watermarking\/stirmark\/"},{"key":"19_CR17","first-page":"230","volume":"3","author":"S.J. Xiang","year":"2006","unstructured":"Xiang, S.J., Huang, J.W.: Analysis of D\/A and A\/D Conversions in Quantization-Based Audio Watermarking. International Journal of Network Security\u00a03, 230\u2013238 (2006)","journal-title":"International Journal of Network Security"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-540-74124-4_7","volume-title":"Information Hiding","author":"S. Xiang","year":"2007","unstructured":"Xiang, S., Huang, J., Yang, R.: Time-scale invariant audio watermarking based on the statistical features in time domain. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol.\u00a04437, pp. 93\u2013108. Springer, Heidelberg (2007)"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Lang, A., Dittmann, J.: Profiles for Evaluation - the Usage of Audio WET. In: Proc. of SPIE Symposium on Electronic Imaging\u00a0vol. 6072, 60721J (2006)","DOI":"10.1117\/12.642695"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11922841_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T20:03:58Z","timestamp":1736625838000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11922841_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540488255","9783540488279"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11922841_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}