{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T12:42:00Z","timestamp":1771072920449,"version":"3.50.1"},"reference-count":38,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2011,12,1]],"date-time":"2011-12-01T00:00:00Z","timestamp":1322697600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Digital Signal Processing"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1016\/j.dsp.2011.01.013","type":"journal-article","created":{"date-parts":[[2011,1,23]],"date-time":"2011-01-23T09:31:50Z","timestamp":1295775110000},"page":"764-779","source":"Crossref","is-referenced-by-count":61,"title":["An SVD audio watermarking approach using chaotic encrypted images"],"prefix":"10.1016","volume":"21","author":[{"given":"Waleed","family":"Al-Nuaimy","sequence":"first","affiliation":[]},{"given":"Mohsen A.M.","family":"El-Bendary","sequence":"additional","affiliation":[]},{"given":"Amira","family":"Shafik","sequence":"additional","affiliation":[]},{"given":"Farid","family":"Shawki","sequence":"additional","affiliation":[]},{"given":"A.E.","family":"Abou-El-azm","sequence":"additional","affiliation":[]},{"given":"N.A.","family":"El-Fishawy","sequence":"additional","affiliation":[]},{"given":"Said M.","family":"Elhalafawy","sequence":"additional","affiliation":[]},{"given":"Salaheldin M.","family":"Diab","sequence":"additional","affiliation":[]},{"given":"Bassiouny M.","family":"Sallam","sequence":"additional","affiliation":[]},{"given":"Fathi E.","family":"Abd El-Samie","sequence":"additional","affiliation":[]},{"given":"H.B.","family":"Kazemian","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.dsp.2011.01.013_br0010","series-title":"Wireless Security & Cryptography: Specifications and Implementations","isbn-type":"print","author":"Sklavos","year":"2007","ISBN":"https:\/\/id.crossref.org\/isbn\/084938771X"},{"issue":"6","key":"10.1016\/j.dsp.2011.01.013_br0020","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1109\/JPROC.2004.827361","article-title":"Benchmarking of image watermarking algorithms for digital rights management","volume":"92","author":"Macq","year":"2004","journal-title":"Proc. IEEE"},{"issue":"6","key":"10.1016\/j.dsp.2011.01.013_br0030","doi-asserted-by":"crossref","first-page":"822","DOI":"10.1109\/TIP.2005.847324","article-title":"Multipurpose image watermarking algorithm based on multistage vector quantization","volume":"14","author":"Lu","year":"2005","journal-title":"IEEE Trans. Image Process."},{"issue":"8","key":"10.1016\/j.dsp.2011.01.013_br0040","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1109\/TCSVT.2003.815955","article-title":"Invariant image watermark using Zernike moments","volume":"13","author":"Kim","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"1","key":"10.1016\/j.dsp.2011.01.013_br0050","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/TMM.2003.808816","article-title":"DCT-based image watermarking using subsampling","volume":"5","author":"Chu","year":"2003","journal-title":"IEEE Trans. Multimedia"},{"issue":"4","key":"10.1016\/j.dsp.2011.01.013_br0060","doi-asserted-by":"crossref","first-page":"1519","DOI":"10.1109\/TSP.2006.870624","article-title":"Digital image watermarking using balanced multiwavelets","volume":"54","author":"Ghouti","year":"2006","journal-title":"IEEE Trans. Signal Process."},{"issue":"7","key":"10.1016\/j.dsp.2011.01.013_br0070","doi-asserted-by":"crossref","first-page":"1357","DOI":"10.1109\/TMM.2007.906580","article-title":"Histogram-based audio watermarking against time-scale modification and cropping attacks","volume":"9","author":"Xiang","year":"2007","journal-title":"IEEE Trans. Multimedia"},{"issue":"8","key":"10.1016\/j.dsp.2011.01.013_br0080","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1109\/TCSVT.2003.815960","article-title":"Audio watermarking techniques using sinusoidal patterns based on pseudorandom sequences","volume":"13","author":"Liu","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"4","key":"10.1016\/j.dsp.2011.01.013_br0090","doi-asserted-by":"crossref","first-page":"1088","DOI":"10.1109\/TSP.2003.809372","article-title":"A temporal domain audio watermarking technique","volume":"51","author":"Lemma","year":"2003","journal-title":"IEEE Trans. Signal Process."},{"issue":"1","key":"10.1016\/j.dsp.2011.01.013_br0100","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/TMM.2005.861291","article-title":"Localized audio watermarking technique robust against time-scale modification","volume":"8","author":"Li","year":"2006","journal-title":"IEEE Trans. Multimedia"},{"issue":"5","key":"10.1016\/j.dsp.2011.01.013_br0110","doi-asserted-by":"crossref","first-page":"925","DOI":"10.1109\/TMM.2006.879879","article-title":"A robust audio watermark representation based on linear chirps","volume":"8","author":"Erk\u00fc\u00e7\u00fck","year":"2006","journal-title":"IEEE Trans. Multimedia"},{"issue":"8","key":"10.1016\/j.dsp.2011.01.013_br0120","doi-asserted-by":"crossref","first-page":"2270","DOI":"10.1109\/TASL.2007.906192","article-title":"A new adaptive digital audio watermarking based on support vector regression","volume":"15","author":"Wang","year":"2007","journal-title":"IEEE Trans. Audio Speech Language Process."},{"key":"10.1016\/j.dsp.2011.01.013_br0130","doi-asserted-by":"crossref","unstructured":"H. \u00d6zer, B. Sankur, An SVD based audio watermarking technique, in: Proceedings of the 13th IEEE Conference on Signal Processing and Communications Applications, 2005, pp. 452\u2013455.","DOI":"10.1109\/SIU.2005.1567718"},{"key":"10.1016\/j.dsp.2011.01.013_br0140","unstructured":"F. Han, X. Yu, S. Han, Improved Baker map for image encryption, in: Proceedings of the First International Symposium on Systems and Control in Aerospace and Astronautics, ISSCAA 2006, pp. 1273\u20131276."},{"key":"10.1016\/j.dsp.2011.01.013_br0150","doi-asserted-by":"crossref","unstructured":"J. Fridrich, Image encryption based on chaotic maps, in: Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 1997, pp. 1105\u20131110.","DOI":"10.1109\/ICSMC.1997.638097"},{"key":"10.1016\/j.dsp.2011.01.013_br0160","doi-asserted-by":"crossref","unstructured":"Q. Qian, Z. Chen, Z. Yuan, Video compression and encryption based on multiple chaotic system, in: Proceedings of the 3rd International Conference on Innovative Computing Information and Control (ICICIC\u02bc08), 2008.","DOI":"10.1109\/ICICIC.2008.597"},{"key":"10.1016\/j.dsp.2011.01.013_br0170","doi-asserted-by":"crossref","unstructured":"F. Huang, F. Lei, A novel symmetric image encryption approach based on a new invertible two-dimensional map, in: Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2008), pp. 1340\u20131343.","DOI":"10.1109\/IIH-MSP.2008.227"},{"key":"10.1016\/j.dsp.2011.01.013_br0180","doi-asserted-by":"crossref","unstructured":"S.C. Koduru, V. Chandrasekaran, Integrated confusion\u2013diffusion mechanisms for chaos based image encryption, in: Proceedings of the 8th IEEE International Conference on Computer and Information Technology Workshops, 2008, pp. 260\u2013263.","DOI":"10.1109\/CIT.2008.Workshops.33"},{"key":"10.1016\/j.dsp.2011.01.013_br0190","doi-asserted-by":"crossref","unstructured":"K. Usman, H. Juzojil, I. Nakajimal, Medical image encryption based on pixel arrangement and random permutation for transmission security, in: Proceedings of the 9th International Conference on e-Health Networking, Application and Services, 2007, pp. 244\u2013247.","DOI":"10.1109\/HEALTH.2007.381640"},{"issue":"3","key":"10.1016\/j.dsp.2011.01.013_br0200","doi-asserted-by":"crossref","first-page":"033002","DOI":"10.1117\/1.3167847","article-title":"Homomorphic image encryption","volume":"18","author":"Elashry","year":"2009","journal-title":"J. Electron. Imaging"},{"key":"10.1016\/j.dsp.2011.01.013_br0210","doi-asserted-by":"crossref","first-page":"147","DOI":"10.2528\/PIERB08041306","article-title":"Performance evaluation of block based SVD image watermarking","volume":"8","author":"Ghazy","year":"2008","journal-title":"Prog. Electromagn. Res. B"},{"issue":"1","key":"10.1016\/j.dsp.2011.01.013_br0220","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1109\/6046.985560","article-title":"An SVD-based watermarking scheme for protecting rightful ownership","volume":"4","author":"Liu","year":"2002","journal-title":"IEEE Trans. Multimedia"},{"key":"10.1016\/j.dsp.2011.01.013_br0230","doi-asserted-by":"crossref","unstructured":"X. Sun, J. Liu, J. Sun, Q. Zhang, W. Ji, A robust image watermarking scheme based-on the relationship of SVD, in: Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008.","DOI":"10.1109\/IIH-MSP.2008.190"},{"key":"10.1016\/j.dsp.2011.01.013_br0250","unstructured":"X. Zhu, J. Zhao, H. Xu, A digital watermarking algorithm and implementation based on improved SVD, in: Proceedings of the 18th IEEE International Conference on Pattern Recognition (ICPR\u02bc06), 2006."},{"key":"10.1016\/j.dsp.2011.01.013_br0260","doi-asserted-by":"crossref","unstructured":"R. Kubichek, Mel-cepstral distance measure for objective speech quality assessment, in: Proceedings of the IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 1993, pp. 125\u2013128.","DOI":"10.1109\/PACRIM.1993.407206"},{"issue":"5","key":"10.1016\/j.dsp.2011.01.013_br0270","doi-asserted-by":"crossref","first-page":"819","DOI":"10.1109\/49.138987","article-title":"An objective measure for predicting subjective quality of speech coders","volume":"10","author":"Wang","year":"1992","journal-title":"IEEE J. Select. Areas Commun."},{"key":"10.1016\/j.dsp.2011.01.013_br0280","doi-asserted-by":"crossref","unstructured":"W. Yang, M. Benbouchta, R. Yantorno, Performance of the modified bark spectral distortion as an objective speech quality measure, in: Proceedings of the IEEE International Conf. on Acoustic, Speech and Signal Processing (ICASSP), vol. 1, Washington, USA, May 1998, pp. 541\u2013544.","DOI":"10.1109\/ICASSP.1998.674487"},{"key":"10.1016\/j.dsp.2011.01.013_br0290","doi-asserted-by":"crossref","unstructured":"B.J. McDermott, C. Scaglia, D.J. Goodman, Perceptual and objective evaluation of speech processed by adaptive differential PCM, in: Proceedings of the IEEE International Conf. on Acoustic, Speech and Signal Processing (ICASSP), Tulsa, April 1978, pp. 581\u2013585.","DOI":"10.1109\/ICASSP.1978.1170566"},{"issue":"3","key":"10.1016\/j.dsp.2011.01.013_br0300","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1109\/TASSP.1980.1163417","article-title":"An interpretation of the log likelihood ratio as a measure of waveform coder performance","volume":"Assp-28","author":"Crochiere","year":"1980","journal-title":"IEEE Trans. Acoust. Speech Signal Process."},{"key":"10.1016\/j.dsp.2011.01.013_br0310","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1023\/B:MONE.0000031607.96260.64","article-title":"BlueStar: enabling efficient integration between Bluetooth WPANs and IEEE 802.11 WLANs","volume":"9","author":"Cordeiro","year":"2004","journal-title":"Mobile Networks Appl."},{"key":"10.1016\/j.dsp.2011.01.013_br0320","doi-asserted-by":"crossref","unstructured":"J.J. Chen, T. Sun, Y.C. Chen, Improving Bluetooth throughput using FEC and interleaving, in: International Conference on Mobile Ad Hoc Sensor Networks, Hong Kong, 2006, pp. 726\u2013736.","DOI":"10.1007\/11943952_61"},{"issue":"4","key":"10.1016\/j.dsp.2011.01.013_br0330","article-title":"Performance study on Bluetooth-based wireless personal area networks for real-time health monitoring","volume":"28","author":"Kai","year":"2006","journal-title":"ETRI J."},{"key":"10.1016\/j.dsp.2011.01.013_br0340","doi-asserted-by":"crossref","unstructured":"J. Albert, T.F. Bissyand\u00e9, Y.D. Bromberg, S. Chaumette, L. R\u00e9veill\u00e8re, UbiPAN: A Bluetooth extended personal area network, in: 2010 International Conference on Complex, Intelligent and Software Intensive Systems, 2010, pp. 774\u2013778.","DOI":"10.1109\/CISIS.2010.167"},{"issue":"9","key":"10.1016\/j.dsp.2011.01.013_br0350","doi-asserted-by":"crossref","first-page":"646","DOI":"10.3844\/jcssp.2009.646.650","article-title":"Bluetooth wireless network authentication using radio frequency communication protocol","volume":"5","author":"Waleed","year":"2009","journal-title":"J. Comp. Sci."},{"issue":"2","key":"10.1016\/j.dsp.2011.01.013_br0360","article-title":"Improving pairing mechanism in Bluetooth security","volume":"2","author":"Kumar","year":"2009","journal-title":"Int. J. Recent Trends Eng."},{"key":"10.1016\/j.dsp.2011.01.013_br0370","doi-asserted-by":"crossref","unstructured":"M. Hossain, B. Ahmed, M. Asrafi, A real time speaker identification using artificial neural network, in: 10th International Conference on Computer and Information Technology, December 2007, pp. 1\u20135.","DOI":"10.1109\/ICCITECHN.2007.4579414"},{"key":"10.1016\/j.dsp.2011.01.013_br0380","unstructured":"D. Pullella, Speaker identification using higher order spectra, Dissertation of Bachelor of Electrical and Electronic Engineering, University of Western Australia, 2006."},{"issue":"4","key":"10.1016\/j.dsp.2011.01.013_br0390","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1109\/TNSRE.2005.856074","article-title":"Experiments with fast Fourier transform, linear predictive and cepstral coefficients in dysarthric speech recognition algorithms using hidden Markov model","volume":"13","author":"Polur","year":"2005","journal-title":"IEEE Trans. Neural Syst. Rehabil. Eng."}],"container-title":["Digital Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1051200411000169?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1051200411000169?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T02:59:05Z","timestamp":1740884345000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1051200411000169"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":38,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["S1051200411000169"],"URL":"https:\/\/doi.org\/10.1016\/j.dsp.2011.01.013","relation":{},"ISSN":["1051-2004"],"issn-type":[{"value":"1051-2004","type":"print"}],"subject":[],"published":{"date-parts":[[2011,12]]}}}