{"id":"https://openalex.org/W1968925786","doi":"https://doi.org/10.4018/ijdcf.2013100104","title":"Audio Watermarking Scheme Using IMFs and HHT for Forensic Applications","display_name":"Audio Watermarking Scheme Using IMFs and HHT for Forensic Applications","publication_year":2013,"publication_date":"2013-10-01","ids":{"openalex":"https://openalex.org/W1968925786","doi":"https://doi.org/10.4018/ijdcf.2013100104","mag":"1968925786"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijdcf.2013100104","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075435260","display_name":"Saif alZahir","orcid":"https://orcid.org/0000-0003-1955-5834"},"institutions":[{"id":"https://openalex.org/I151934421","display_name":"University of Northern British Columbia","ror":"https://ror.org/025wzwv46","country_code":"CA","type":"education","lineage":["https://openalex.org/I151934421"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Saif alZahir","raw_affiliation_strings":["Department of Computer Science, University of Northern British Columbia, Prince George, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Northern British Columbia, Prince George, Canada","institution_ids":["https://openalex.org/I151934421"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100515704","display_name":"Md Wahedul Islam","orcid":null},"institutions":[{"id":"https://openalex.org/I151934421","display_name":"University of Northern British Columbia","ror":"https://ror.org/025wzwv46","country_code":"CA","type":"education","lineage":["https://openalex.org/I151934421"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Md Wahedul Islam","raw_affiliation_strings":["Department of Computer Science, University of Northern British Columbia, Prince George, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Northern British Columbia, Prince George, Canada","institution_ids":["https://openalex.org/I151934421"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":65},"biblio":{"volume":"5","issue":"4","first_page":"55","last_page":"67"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11309","display_name":"Music and Audio Processing","score":0.9993,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.44017643}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.851782},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8515184},{"id":"https://openalex.org/C25570617","wikidata":"https://www.wikidata.org/wiki/Q1006462","display_name":"Hilbert\u2013Huang transform","level":3,"score":0.7229152},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.61333925},{"id":"https://openalex.org/C64922751","wikidata":"https://www.wikidata.org/wiki/Q4650799","display_name":"Audio signal","level":3,"score":0.60843635},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5296977},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.44377345},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.44017643},{"id":"https://openalex.org/C2776459999","wikidata":"https://www.wikidata.org/wiki/Q2119376","display_name":"Fidelity","level":2,"score":0.43933362},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.42597666},{"id":"https://openalex.org/C204241405","wikidata":"https://www.wikidata.org/wiki/Q461499","display_name":"Transformation (genetics)","level":3,"score":0.42264822},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30564368},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2558697},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.2409207},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.17736611},{"id":"https://openalex.org/C13895895","wikidata":"https://www.wikidata.org/wiki/Q3270773","display_name":"Speech coding","level":2,"score":0.17224523},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.16570538},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.10771498},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijdcf.2013100104","pdf_url":null,"source":{"id":"https://openalex.org/S8943243","display_name":"International Journal of Digital Crime and Forensics","issn_l":"1941-6210","issn":["1941-6210","1941-6229"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.52,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":19,"referenced_works":["https://openalex.org/W1536198381","https://openalex.org/W1823208675","https://openalex.org/W1999841894","https://openalex.org/W2007221293","https://openalex.org/W2016550788","https://openalex.org/W2031201693","https://openalex.org/W2044674728","https://openalex.org/W2045626557","https://openalex.org/W2051384803","https://openalex.org/W2077036373","https://openalex.org/W2105301089","https://openalex.org/W2112589306","https://openalex.org/W2115046909","https://openalex.org/W2116467012","https://openalex.org/W2126726788","https://openalex.org/W2152483316","https://openalex.org/W2159035631","https://openalex.org/W2166908887","https://openalex.org/W4248016545"],"related_works":["https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W2358993821","https://openalex.org/W2183032046","https://openalex.org/W2137394636","https://openalex.org/W2098152888","https://openalex.org/W2040356834","https://openalex.org/W1559740347","https://openalex.org/W1516446231","https://openalex.org/W1514507288"],"abstract_inverted_index":{"Audio":[0],"signals":[1,94,165],"and":[2,6,19,34,53,66,132,203],"applications":[3,11],"are":[4,24,87],"numerous":[5],"ubiquitous.":[7],"Most":[8],"of":[9,21,55,81,135,138,169,179],"these":[10,32],"especially":[12],"those":[13],"on":[14,62],"the":[15,29,40,74,107,110,115,130,139,162,176,188],"Internet":[16],"require":[17],"authentication":[18,52],"proof(s)":[20],"ownership.":[22,56],"There":[23],"several":[25,92],"efficient":[26],"methods":[27],"in":[28],"literature":[30],"address":[31],"crucial":[33],"critical":[35],"concerns.":[36],"In":[37,71,112],"this":[38,72,113],"paper,":[39],"authors":[41],"present":[42],"a":[43,119],"new":[44],"non-blind":[45],"audio":[46,51,75,164],"watermarking":[47],"scheme":[48,59,190],"for":[49,109,147],"forensic":[50],"proof":[54],"The":[57,183],"proposed":[58,189],"is":[60,77,118,127,143,191],"based":[61],"empirical":[63],"mode":[64],"decomposition":[65],"Hilbert":[67],"Haung":[68],"Transformation":[69],"(HHT).":[70],"method,":[73],"signal":[76,194],"decomposed":[78,89,140],"into":[79,90],"frames":[80,86],"1024":[82],"sample":[83],"each.":[84],"These":[85,100],"further":[88],"its":[91],"mono-component":[93],"called":[95],"Intrinsic":[96,101],"Mode":[97,102],"Functions":[98,103],"(IMF).":[99],"will":[104],"serve":[105],"as":[106,152,154,198],"addressee":[108],"watermark.":[111],"research,":[114],"chosen":[116],"watermark":[117],"pseudo":[120],"random":[121],"number":[122],"generated":[123],"by":[124],"Matlab-7,":[125],"which":[126,174],"added":[128],"to":[129,145],"highest":[131],"lowest":[133],"IMFs":[134],"each":[136],"frame":[137],"signal.":[141],"This":[142],"done":[144],"accommodate":[146],"time":[148,200],"scale":[149,201],"modification":[150],"attacks":[151,196],"well":[153],"MP3":[155],"compression":[156],"respectively.":[157],"Experimental":[158],"results":[159,184],"show":[160,186],"that":[161,187],"watermarked":[163],"maintained":[166],"high":[167],"fidelity":[168],"more":[170],"than":[171],"20":[172],"dBs":[173],"meets":[175],"International":[177],"Federation":[178],"Phonographic":[180],"Industry":[181],"requirements.":[182],"also":[185],"robust":[192],"against":[193],"processing":[195],"such":[197],"MP3,":[199],"modification,":[202],"resizing":[204],"attacks.":[205]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1968925786","counts_by_year":[],"updated_date":"2024-12-08T11:43:11.932637","created_date":"2016-06-24"}