{"id":"https://openalex.org/W2563410775","doi":"https://doi.org/10.1631/fitee.1500297","title":"A robust intelligent audio watermarking scheme using support vector machine","display_name":"A robust intelligent audio watermarking scheme using support vector machine","publication_year":2016,"publication_date":"2016-12-01","ids":{"openalex":"https://openalex.org/W2563410775","doi":"https://doi.org/10.1631/fitee.1500297","mag":"2563410775"},"language":"en","primary_location":{"id":"doi:10.1631/fitee.1500297","is_oa":false,"landing_page_url":"https://doi.org/10.1631/fitee.1500297","pdf_url":null,"source":{"id":"https://openalex.org/S4210189857","display_name":"Frontiers of Information Technology & Electronic Engineering","issn_l":"2095-9184","issn":["2095-9184","2095-9230"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Information Technology &amp; Electronic Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052947700","display_name":"Mohammad Mosleh","orcid":"https://orcid.org/0000-0002-0991-1623"},"institutions":[{"id":"https://openalex.org/I110525433","display_name":"Islamic Azad University, Tehran","ror":"https://ror.org/01kzn7k21","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Mohammad Mosleh","raw_affiliation_strings":["Department of Computer Engineering, Dezfoul Branch, Islamic Azad University, Dezfoul, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Dezfoul Branch, Islamic Azad University, Dezfoul, Iran","institution_ids":["https://openalex.org/I110525433"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063949207","display_name":"Hadi Latifpour","orcid":null},"institutions":[{"id":"https://openalex.org/I110525433","display_name":"Islamic Azad University, Tehran","ror":"https://ror.org/01kzn7k21","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Hadi Latifpour","raw_affiliation_strings":["Department of Computer Engineering, Dezfoul Branch, Islamic Azad University, Dezfoul, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Dezfoul Branch, Islamic Azad University, Dezfoul, Iran","institution_ids":["https://openalex.org/I110525433"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051621900","display_name":"Mohammad Kheyrandish","orcid":"https://orcid.org/0000-0002-8624-8562"},"institutions":[{"id":"https://openalex.org/I110525433","display_name":"Islamic Azad University, Tehran","ror":"https://ror.org/01kzn7k21","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mohammad Kheyrandish","raw_affiliation_strings":["Department of Computer Engineering, Dezfoul Branch, Islamic Azad University, Dezfoul, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Dezfoul Branch, Islamic Azad University, Dezfoul, Iran","institution_ids":["https://openalex.org/I110525433"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023367813","display_name":"Mahdi Mosleh","orcid":"https://orcid.org/0000-0003-0419-1142"},"institutions":[{"id":"https://openalex.org/I110525433","display_name":"Islamic Azad University, Tehran","ror":"https://ror.org/01kzn7k21","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mahdi Mosleh","raw_affiliation_strings":["Department of Computer Engineering, Andimeshk Branch, Islamic Azad University, Andimeshk, Iran"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Andimeshk Branch, Islamic Azad University, Andimeshk, Iran","institution_ids":["https://openalex.org/I110525433"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036994460","display_name":"Najmeh Hosseinpour","orcid":null},"institutions":[{"id":"https://openalex.org/I110525433","display_name":"Islamic Azad University, Tehran","ror":"https://ror.org/01kzn7k21","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433"]},{"id":"https://openalex.org/I155419210","display_name":"Islamic Azad University, Science and Research Branch","ror":"https://ror.org/03187yj51","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433","https://openalex.org/I155419210"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Najmeh Hosseinpour","raw_affiliation_strings":["Young Researchers and Elite Club, Andimeshk Branch, Islamic Azad University, Andimeshk, Iran"],"affiliations":[{"raw_affiliation_string":"Young Researchers and Elite Club, Andimeshk Branch, Islamic Azad University, Andimeshk, Iran","institution_ids":["https://openalex.org/I110525433","https://openalex.org/I155419210"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5052947700"],"corresponding_institution_ids":["https://openalex.org/I110525433"],"apc_list":null,"apc_paid":null,"fwci":0.8468,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.81595935,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"17","issue":"12","first_page":"1320","last_page":"1330"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.9325821995735168},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.8550490140914917},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7772815227508545},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6059049367904663},{"id":"https://openalex.org/keywords/singular-value-decomposition","display_name":"Singular value decomposition","score":0.6014214158058167},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5407015085220337},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.4967215657234192},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.455790638923645},{"id":"https://openalex.org/keywords/digital-data","display_name":"Digital data","score":0.4229379892349243},{"id":"https://openalex.org/keywords/data-extraction","display_name":"Data extraction","score":0.4210345149040222},{"id":"https://openalex.org/keywords/audio-signal","display_name":"Audio signal","score":0.42032191157341003},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.41914102435112},{"id":"https://openalex.org/keywords/copying","display_name":"Copying","score":0.41031041741371155},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3437241315841675},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.2730717062950134},{"id":"https://openalex.org/keywords/digital-signal-processing","display_name":"Digital signal processing","score":0.22466054558753967},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.22132158279418945},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.2099156677722931}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.9325821995735168},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.8550490140914917},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7772815227508545},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6059049367904663},{"id":"https://openalex.org/C22789450","wikidata":"https://www.wikidata.org/wiki/Q420904","display_name":"Singular value decomposition","level":2,"score":0.6014214158058167},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5407015085220337},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.4967215657234192},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.455790638923645},{"id":"https://openalex.org/C2778864079","wikidata":"https://www.wikidata.org/wiki/Q173285","display_name":"Digital data","level":3,"score":0.4229379892349243},{"id":"https://openalex.org/C2777466982","wikidata":"https://www.wikidata.org/wiki/Q5227287","display_name":"Data extraction","level":3,"score":0.4210345149040222},{"id":"https://openalex.org/C64922751","wikidata":"https://www.wikidata.org/wiki/Q4650799","display_name":"Audio signal","level":3,"score":0.42032191157341003},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41914102435112},{"id":"https://openalex.org/C2779151265","wikidata":"https://www.wikidata.org/wiki/Q1156791","display_name":"Copying","level":2,"score":0.41031041741371155},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3437241315841675},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.2730717062950134},{"id":"https://openalex.org/C84462506","wikidata":"https://www.wikidata.org/wiki/Q173142","display_name":"Digital signal processing","level":2,"score":0.22466054558753967},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.22132158279418945},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.2099156677722931},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C2779473830","wikidata":"https://www.wikidata.org/wiki/Q1540899","display_name":"MEDLINE","level":2,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1631/fitee.1500297","is_oa":false,"landing_page_url":"https://doi.org/10.1631/fitee.1500297","pdf_url":null,"source":{"id":"https://openalex.org/S4210189857","display_name":"Frontiers of Information Technology & Electronic Engineering","issn_l":"2095-9184","issn":["2095-9184","2095-9230"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Information Technology &amp; Electronic Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321389","display_name":"Islamic Azad University","ror":"https://ror.org/01kzn7k21"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1489845255","https://openalex.org/W1524144700","https://openalex.org/W1555749993","https://openalex.org/W1576347883","https://openalex.org/W1978188323","https://openalex.org/W1982174092","https://openalex.org/W1991012909","https://openalex.org/W1997769112","https://openalex.org/W2006015144","https://openalex.org/W2010594585","https://openalex.org/W2031343780","https://openalex.org/W2035864681","https://openalex.org/W2036954184","https://openalex.org/W2039684018","https://openalex.org/W2059193620","https://openalex.org/W2074857651","https://openalex.org/W2076402610","https://openalex.org/W2086776558","https://openalex.org/W2089044658","https://openalex.org/W2092924753","https://openalex.org/W2105301089","https://openalex.org/W2107795203","https://openalex.org/W2119821739","https://openalex.org/W2153173203","https://openalex.org/W2157864342","https://openalex.org/W2161647295","https://openalex.org/W2901556660","https://openalex.org/W4239510810","https://openalex.org/W4245416835","https://openalex.org/W4320800818","https://openalex.org/W6600174328","https://openalex.org/W6682449558"],"related_works":["https://openalex.org/W2588206991","https://openalex.org/W4308771405","https://openalex.org/W2355873265","https://openalex.org/W1550675871","https://openalex.org/W2511915070","https://openalex.org/W2137631325","https://openalex.org/W2357801821","https://openalex.org/W2121173104","https://openalex.org/W1753970369","https://openalex.org/W2620651965"],"abstract_inverted_index":{"Rapid":[0],"growth":[1],"in":[2,10,17,74,112,160,190],"information":[3],"technology":[4,41],"and":[5,37,143,223],"computer":[6],"networks":[7],"has":[8],"resulted":[9],"the":[11,18,22,53,58,61,68,71,81,98,107,157,161,166,178,183,188,195,208,211,228],"universal":[12],"use":[13,108],"of":[14,32,60,70,97,101,109,116,138,186,210],"data":[15,28,33,154],"transmission":[16],"digital":[19,27],"domain.":[20,164],"However,":[21],"major":[23,99],"challenge":[24],"faced":[25],"by":[26,155],"owners":[29],"is":[30,42,106,174],"protection":[31,49],"against":[34,93],"unauthorized":[35],"copying":[36],"distribution.":[38],"Digital":[39,63],"watermark":[40,122,153,179],"starting":[43],"to":[44,51,80,90,206],"be":[45,87,91],"considered":[46],"a":[47,75,127,135,152],"credible":[48],"method":[50,230],"mitigate":[52],"potential":[54,94],"challenges":[55],"that":[56,77],"undermine":[57],"efficiency":[59],"system.":[62,84],"audio":[64,103,131],"watermarking":[65,104,132],"should":[66,86],"retain":[67],"quality":[69],"host":[72],"signal":[73],"way":[76],"remains":[78],"inaudible":[79],"human":[82],"hearing":[83],"It":[85],"sufficiently":[88],"robust":[89,129],"resistant":[92],"attacks.":[95],"One":[96],"deficiencies":[100],"conventional":[102,233],"techniques":[105],"non-intelligent":[110],"decoders":[111],"which":[113],"some":[114],"sets":[115],"specific":[117],"rules":[118],"are":[119],"used":[120],"for":[121,176,227,232],"extraction.":[123],"This":[124],"paper":[125],"presents":[126],"new":[128],"intelligent":[130,170],"scheme":[133],"using":[134,172],"synergistic":[136],"combination":[137],"singular":[139,158],"value":[140],"decomposition":[141],"(SVD)":[142],"support":[144],"vector":[145],"machine":[146],"(SVM).":[147],"The":[148],"methodology":[149],"involves":[150],"embedding":[151],"modulating":[156],"values":[159],"SVD":[162],"transform":[163],"In":[165],"extraction":[167],"process,":[168],"an":[169],"detector":[171,189],"SVM":[173],"suggested":[175],"extracting":[177],"data.":[180],"By":[181],"learning":[182],"destructive":[184],"effects":[185],"noise,":[187],"question":[191],"can":[192],"effectively":[193],"retrieve":[194],"watermark.":[196],"Diverse":[197],"experiments":[198],"under":[199],"various":[200],"conditions":[201],"have":[202],"been":[203],"carried":[204],"out":[205],"verify":[207],"performance":[209],"proposed":[212,229],"scheme.":[213],"Experimental":[214],"results":[215],"showed":[216],"better":[217],"imperceptibility,":[218],"higher":[219,224],"robustness,":[220],"lower":[221],"payload,":[222],"operational":[225],"efficiency,":[226],"than":[231],"techniques.":[234]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3}],"updated_date":"2026-03-15T09:29:46.208133","created_date":"2025-10-10T00:00:00"}
