{"id":"https://openalex.org/W3090533430","doi":"https://doi.org/10.1109/lsp.2020.3028037","title":"A Novel Anti-Collusion Audio Fingerprinting Scheme Based on Fourier Coefficients Reversing","display_name":"A Novel Anti-Collusion Audio Fingerprinting Scheme Based on Fourier Coefficients Reversing","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3090533430","doi":"https://doi.org/10.1109/lsp.2020.3028037","mag":"3090533430"},"language":"en","primary_location":{"id":"doi:10.1109/lsp.2020.3028037","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2020.3028037","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/A_novel_anti-collusion_audio_fingerprinting_scheme_based_on_fourier_coefficients_reversing/20684875","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100351523","display_name":"Ming Li","orcid":"https://orcid.org/0000-0003-3385-8364"},"institutions":[{"id":"https://openalex.org/I75955062","display_name":"Henan Normal University","ror":"https://ror.org/00s13br28","country_code":"CN","type":"education","lineage":["https://openalex.org/I75955062"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ming Li","raw_affiliation_strings":["College of Computer and Information Engineering, Henan Normal University, Xinxiang, China"],"raw_orcid":"https://orcid.org/0000-0003-3385-8364","affiliations":[{"raw_affiliation_string":"College of Computer and Information Engineering, Henan Normal University, Xinxiang, China","institution_ids":["https://openalex.org/I75955062"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057671585","display_name":"Huimin Chang","orcid":"https://orcid.org/0000-0002-2321-5763"},"institutions":[{"id":"https://openalex.org/I75955062","display_name":"Henan Normal University","ror":"https://ror.org/00s13br28","country_code":"CN","type":"education","lineage":["https://openalex.org/I75955062"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huimin Chang","raw_affiliation_strings":["College of Computer and Information Engineering, Henan Normal University, Xinxiang, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer and Information Engineering, Henan Normal University, Xinxiang, China","institution_ids":["https://openalex.org/I75955062"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051297830","display_name":"Yong Xiang","orcid":"https://orcid.org/0000-0003-3545-7863"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yong Xiang","raw_affiliation_strings":["School of Information Technology, Deakin University, Burwood, VIC, Australia"],"raw_orcid":"https://orcid.org/0000-0003-3545-7863","affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Burwood, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101612168","display_name":"Dezhi An","orcid":"https://orcid.org/0000-0002-0861-0220"},"institutions":[{"id":"https://openalex.org/I4210125346","display_name":"Gansu Institute of Political Science and Law","ror":"https://ror.org/025km4h87","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210125346"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dezhi An","raw_affiliation_strings":["School of Cyber Security, Gansu University of Political Science and Law, Lanzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyber Security, Gansu University of Political Science and Law, Lanzhou, China","institution_ids":["https://openalex.org/I4210125346"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100351523"],"corresponding_institution_ids":["https://openalex.org/I75955062"],"apc_list":null,"apc_paid":null,"fwci":0.4906,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.66595928,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"27","issue":null,"first_page":"1794","last_page":"1798"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11309","display_name":"Music and Audio Processing","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.8480581045150757},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7315311431884766},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.7191831469535828},{"id":"https://openalex.org/keywords/frequency-domain","display_name":"Frequency domain","score":0.6508049964904785},{"id":"https://openalex.org/keywords/audio-signal","display_name":"Audio signal","score":0.6358087062835693},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.5407100319862366},{"id":"https://openalex.org/keywords/fingerprint-recognition","display_name":"Fingerprint recognition","score":0.4631364643573761},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.461353063583374},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4430047571659088},{"id":"https://openalex.org/keywords/sound-quality","display_name":"Sound quality","score":0.4288756847381592},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.34764936566352844},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3000423312187195},{"id":"https://openalex.org/keywords/speech-coding","display_name":"Speech coding","score":0.24653440713882446},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19436869025230408},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.19341307878494263},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.13933604955673218},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.08117905259132385}],"concepts":[{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.8480581045150757},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7315311431884766},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.7191831469535828},{"id":"https://openalex.org/C19118579","wikidata":"https://www.wikidata.org/wiki/Q786423","display_name":"Frequency domain","level":2,"score":0.6508049964904785},{"id":"https://openalex.org/C64922751","wikidata":"https://www.wikidata.org/wiki/Q4650799","display_name":"Audio signal","level":3,"score":0.6358087062835693},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.5407100319862366},{"id":"https://openalex.org/C168406668","wikidata":"https://www.wikidata.org/wiki/Q178022","display_name":"Fingerprint recognition","level":3,"score":0.4631364643573761},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.461353063583374},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4430047571659088},{"id":"https://openalex.org/C167310288","wikidata":"https://www.wikidata.org/wiki/Q7564808","display_name":"Sound quality","level":2,"score":0.4288756847381592},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.34764936566352844},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3000423312187195},{"id":"https://openalex.org/C13895895","wikidata":"https://www.wikidata.org/wiki/Q3270773","display_name":"Speech coding","level":2,"score":0.24653440713882446},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19436869025230408},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19341307878494263},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.13933604955673218},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.08117905259132385},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/lsp.2020.3028037","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lsp.2020.3028037","pdf_url":null,"source":{"id":"https://openalex.org/S120629676","display_name":"IEEE Signal Processing Letters","issn_l":"1070-9908","issn":["1070-9908","1558-2361"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Signal Processing Letters","raw_type":"journal-article"},{"id":"pmh:oai:ir.lzu.edu.cn/:262010/441584","is_oa":false,"landing_page_url":"http://ir.lzu.edu.cn/handle/262010/441584","pdf_url":null,"source":{"id":"https://openalex.org/S4406923049","display_name":"Lanzhou University Institutional Repository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"\u671f\u520a\u8bba\u6587"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30144801","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401102","display_name":"Own your potential (DEAKIN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:figshare.com:article/20684875","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/A_novel_anti-collusion_audio_fingerprinting_scheme_based_on_fourier_coefficients_reversing/20684875","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20684875","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/A_novel_anti-collusion_audio_fingerprinting_scheme_based_on_fourier_coefficients_reversing/20684875","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3249454705","display_name":null,"funder_award_id":"201808410142","funder_id":"https://openalex.org/F4320322725","funder_display_name":"China Scholarship Council"},{"id":"https://openalex.org/G8441260951","display_name":null,"funder_award_id":"LP170100458","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"}],"funders":[{"id":"https://openalex.org/F4320322725","display_name":"China Scholarship Council","ror":"https://ror.org/04atp4p48"},{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1968422945","https://openalex.org/W1972502716","https://openalex.org/W2009975783","https://openalex.org/W2035864681","https://openalex.org/W2037637492","https://openalex.org/W2108645386","https://openalex.org/W2120496185","https://openalex.org/W2122751269","https://openalex.org/W2123629501","https://openalex.org/W2131762402","https://openalex.org/W2152545485","https://openalex.org/W2154137035","https://openalex.org/W2170480306","https://openalex.org/W2170687172","https://openalex.org/W2189438431","https://openalex.org/W2219543621","https://openalex.org/W2541632177","https://openalex.org/W2618928741","https://openalex.org/W2773215876","https://openalex.org/W2783198421","https://openalex.org/W2893249048","https://openalex.org/W2901940212","https://openalex.org/W2944049061","https://openalex.org/W2949862294","https://openalex.org/W6684949462"],"related_works":["https://openalex.org/W1988155854","https://openalex.org/W3014822659","https://openalex.org/W2117826006","https://openalex.org/W4362496757","https://openalex.org/W1621827506","https://openalex.org/W2566091814","https://openalex.org/W4205397417","https://openalex.org/W2114937328","https://openalex.org/W2148654711","https://openalex.org/W2608025327"],"abstract_inverted_index":{"Most":[0],"anti-collusion":[1],"audio":[2,14,43,111],"fingerprinting":[3,31,74],"schemes":[4],"are":[5,61,82,143],"aiming":[6],"at":[7],"finding":[8],"colluders":[9],"from":[10,72],"the":[11,17,21,37,48,52,56,68,76,79,86,93,96,101,109,117,122,140,151],"illegal":[12,141],"redistributed":[13,22],"copies.":[15],"However,":[16],"loss":[18],"caused":[19,138],"by":[20,51,85,139],"versions":[23],"is":[24,33,45,103,147],"inevitable.":[25],"In":[26,120],"this":[27],"letter,":[28],"a":[29],"novel":[30],"scheme":[32],"proposed":[34,87,123],"to":[35,47,67,91],"eliminate":[36],"motivation":[38],"of":[39,78,95,116,133,153],"collusion":[40],"attack.":[41],"The":[42],"signal":[44],"transformed":[46],"frequency":[49,59],"domain":[50,60],"Fourier":[53],"transform,":[54],"and":[55,136],"coefficients":[57,77],"in":[58,63,89],"reversed":[62],"different":[64],"degrees":[65],"according":[66],"fingerprint":[69],"sequence.":[70],"Different":[71],"other":[73,128],"schemes,":[75],"host":[80],"media":[81],"excessively":[83],"modified":[84],"method":[88,124],"order":[90],"reduce":[92],"quality":[94],"colluded":[97,110],"version":[98],"significantly,":[99],"but":[100],"imperceptibility":[102],"well":[104],"preserved.":[105],"Experiments":[106],"show":[107],"that":[108],"cannot":[112],"be":[113],"reused":[114],"because":[115],"poor":[118],"quality.":[119],"addition,":[121],"can":[125],"also":[126],"resist":[127],"common":[129],"attacks.":[130],"Various":[131],"kinds":[132],"copyright":[134,152],"risks":[135],"losses":[137],"redistribution":[142],"effectively":[144],"avoided,":[145],"which":[146],"significant":[148],"for":[149],"protecting":[150],"audio.":[154]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
