{"id":"https://openalex.org/W2887572427","doi":"https://doi.org/10.1109/iwssip.2018.8439409","title":"Audio Files Protection Using Logo Watermarking, Fingerprinting and Encryption","display_name":"Audio Files Protection Using Logo Watermarking, Fingerprinting and Encryption","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2887572427","doi":"https://doi.org/10.1109/iwssip.2018.8439409","mag":"2887572427"},"language":"en","primary_location":{"id":"doi:10.1109/iwssip.2018.8439409","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwssip.2018.8439409","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 25th International Conference on Systems, Signals and Image Processing (IWSSIP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032060115","display_name":"P. Dymarski","orcid":"https://orcid.org/0000-0001-6884-8065"},"institutions":[{"id":"https://openalex.org/I108403487","display_name":"Warsaw University of Technology","ror":"https://ror.org/00y0xnp53","country_code":"PL","type":"education","lineage":["https://openalex.org/I108403487"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Przemyslaw Dymarski","raw_affiliation_strings":["Warsaw University of Technology, Inst. of Telecommunications, Warsaw, Nowowiejska 15/19, Poland"],"affiliations":[{"raw_affiliation_string":"Warsaw University of Technology, Inst. of Telecommunications, Warsaw, Nowowiejska 15/19, Poland","institution_ids":["https://openalex.org/I108403487"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056137004","display_name":"Hyeseong Lee","orcid":"https://orcid.org/0000-0002-7137-8874"},"institutions":[{"id":"https://openalex.org/I31419693","display_name":"Kyungpook National University","ror":"https://ror.org/040c17130","country_code":"KR","type":"education","lineage":["https://openalex.org/I31419693"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyeseong Lee","raw_affiliation_strings":["Kyungpook National University, Daegu, Korea"],"affiliations":[{"raw_affiliation_string":"Kyungpook National University, Daegu, Korea","institution_ids":["https://openalex.org/I31419693"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090772901","display_name":"Younjeong Jo","orcid":null},"institutions":[{"id":"https://openalex.org/I31419693","display_name":"Kyungpook National University","ror":"https://ror.org/040c17130","country_code":"KR","type":"education","lineage":["https://openalex.org/I31419693"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Younjeong Jo","raw_affiliation_strings":["Kyungpook National University, Daegu, Korea"],"affiliations":[{"raw_affiliation_string":"Kyungpook National University, Daegu, Korea","institution_ids":["https://openalex.org/I31419693"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5032060115"],"corresponding_institution_ids":["https://openalex.org/I108403487"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.08319027,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8291013240814209},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7916595935821533},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6314440369606018},{"id":"https://openalex.org/keywords/copy-protection","display_name":"Copy protection","score":0.5546978116035461},{"id":"https://openalex.org/keywords/spectrogram","display_name":"Spectrogram","score":0.5265940427780151},{"id":"https://openalex.org/keywords/watermarking-attack","display_name":"Watermarking attack","score":0.4963687062263489},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.49181631207466125},{"id":"https://openalex.org/keywords/pseudorandom-number-generator","display_name":"Pseudorandom number generator","score":0.4672643542289734},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.43849214911460876},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.41352248191833496},{"id":"https://openalex.org/keywords/traitor-tracing","display_name":"Traitor tracing","score":0.4102557301521301},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.40999525785446167},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34722253680229187},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2967913746833801},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2756056785583496},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.17417585849761963},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.13260510563850403},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.11548289656639099}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8291013240814209},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7916595935821533},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6314440369606018},{"id":"https://openalex.org/C2780581891","wikidata":"https://www.wikidata.org/wiki/Q15738686","display_name":"Copy protection","level":4,"score":0.5546978116035461},{"id":"https://openalex.org/C45273575","wikidata":"https://www.wikidata.org/wiki/Q578970","display_name":"Spectrogram","level":2,"score":0.5265940427780151},{"id":"https://openalex.org/C122760801","wikidata":"https://www.wikidata.org/wiki/Q2552011","display_name":"Watermarking attack","level":5,"score":0.4963687062263489},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.49181631207466125},{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.4672643542289734},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.43849214911460876},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.41352248191833496},{"id":"https://openalex.org/C2781411299","wikidata":"https://www.wikidata.org/wiki/Q7833043","display_name":"Traitor tracing","level":4,"score":0.4102557301521301},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.40999525785446167},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34722253680229187},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2967913746833801},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2756056785583496},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.17417585849761963},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.13260510563850403},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.11548289656639099},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwssip.2018.8439409","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwssip.2018.8439409","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 25th International Conference on Systems, Signals and Image Processing (IWSSIP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4000000059604645,"display_name":"Clean water and sanitation","id":"https://metadata.un.org/sdg/6"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1489418139","https://openalex.org/W1593044614","https://openalex.org/W1978189136","https://openalex.org/W2047411082","https://openalex.org/W2067574981","https://openalex.org/W2119991698","https://openalex.org/W2132222079","https://openalex.org/W2150879556","https://openalex.org/W2155040846","https://openalex.org/W2175102988","https://openalex.org/W2543198148","https://openalex.org/W2901556660","https://openalex.org/W3088464744","https://openalex.org/W4245416835","https://openalex.org/W6629397219","https://openalex.org/W6635514759","https://openalex.org/W6685433621","https://openalex.org/W6728696941"],"related_works":["https://openalex.org/W2464641319","https://openalex.org/W2107039268","https://openalex.org/W2899593444","https://openalex.org/W2091353019","https://openalex.org/W4386132096","https://openalex.org/W2765265237","https://openalex.org/W2106459310","https://openalex.org/W1974192724","https://openalex.org/W2159506297","https://openalex.org/W1526960545"],"abstract_inverted_index":{"Logo":[0,63],"watermarking":[1],"and":[2,22,65,78],"fingerprinting":[3],"algorithms":[4],"are":[5,16,67,74],"combined":[6,87],"with":[7,88],"encryption":[8],"for":[9],"protection":[10],"of":[11,56],"audio":[12,28,59],"files.":[13],"Graphical":[14],"signs":[15],"embedded":[17,48],"directly":[18],"in":[19],"the":[20,57],"spectrogram,":[21],"may":[23,46],"be":[24,47],"visualized":[25],"using":[26,40],"any":[27],"editing":[29],"software.":[30],"Fingerprinting":[31],"is":[32,61],"based":[33],"on":[34],"long":[35],"pseudorandom":[36],"sequences":[37],"perceptually":[38],"filtered":[39],"an":[41,53],"adaptive":[42],"zero-phase":[43],"filter.":[44],"Fingerprints":[45,73],"at":[49],"receiver":[50],"side,":[51],"if":[52],"encrypted":[54],"copy":[55],"original":[58],"file":[60],"transmitted.":[62],"watermarks":[64],"fingerprints":[66],"robust":[68,75],"to":[69,76],"MP3":[70,89],"noise":[71,90],"attacks.":[72,91],"linear":[77],"some":[79],"nonlinear":[80],"collusion":[81],"attacks":[82],"(more":[83],"than":[84],"20":[85],"colluders)":[86]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
