{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T20:11:37Z","timestamp":1762459897805,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578800"},{"type":"electronic","value":"9783030578817"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-57881-7_16","type":"book-chapter","created":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T14:04:16Z","timestamp":1598882656000},"page":"179-190","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A Robust Zero-Watermarking Algorithm for Medical Images Using Curvelet-Dct and RSA Pseudo-random Sequences"],"prefix":"10.1007","author":[{"given":"Fengming","family":"Qin","sequence":"first","affiliation":[]},{"given":"Jingbing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Saqib Ali","family":"Nawaz","sequence":"additional","affiliation":[]},{"given":"Yanlin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,1]]},"reference":[{"issue":"8","key":"16_CR1","first-page":"39","volume":"21","author":"R Liu","year":"2000","unstructured":"Liu, R., Tan, T.: A review of digital image watermarking. J. Commun. 21(8), 39\u201348 (2000)","journal-title":"J. Commun."},{"issue":"2","key":"16_CR2","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/s11045-015-0363-2","volume":"28","author":"J Wang","year":"2017","unstructured":"Wang, J., Lian, S., Shi, Y.: Hybrid multiplicative multi-watermarking in DWT domain. Multidim. Syst. Signal Process. 28(2), 617\u2013636 (2017)","journal-title":"Multidim. Syst. Signal Process."},{"key":"16_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-017-0497-5","author":"L Xiong","year":"2017","unstructured":"Xiong, L., Xu, Z., Shi, Y.: An integer wavelet transforms-based scheme for reversible data hiding in encrypted images. Multidim. Syst. Signal Process. (2017). \nhttps:\/\/doi.org\/10.1007\/s11045-017-0497-5","journal-title":"Multidim. Syst. Signal Process."},{"key":"16_CR4","unstructured":"Jiang, X.: Digital watermarking and its application in image copyright protection. In: 2010 International Conference on Intelligent Computation Technology and Automation (2010)"},{"key":"16_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28099-3","volume-title":"Digital Preservation Technology for Cultural Heritage","author":"M Zhou","year":"2012","unstructured":"Zhou, M., Geng, G., Wu, Z.: Digital Preservation Technology for Cultural Heritage. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-28099-3"},{"key":"16_CR6","doi-asserted-by":"publisher","DOI":"10.1201\/9781315121109","volume-title":"Digital Watermarking and Steganography: Fundamentals and Techniques","author":"FY Shih","year":"2017","unstructured":"Shih, F.Y.: Digital Watermarking and Steganography: Fundamentals and Techniques. CRC Press, Boca Raton (2017)"},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"8463","DOI":"10.1007\/s11042-018-6877-5","volume":"78","author":"X Wu","year":"2018","unstructured":"Wu, X., et al.: Contourlet-DCT based multiple robust watermarking for medical images. Multimed. Tools Appl. 78, 8463\u20138480 (2018). \nhttps:\/\/doi.org\/10.1007\/s11042-018-6877-5","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"16_CR8","doi-asserted-by":"publisher","first-page":"263","DOI":"10.32604\/cmc.2019.03924","volume":"58","author":"N Jayashree","year":"2019","unstructured":"Jayashree, N., Bhuvaneswaran, R.S.: A robust image watermarking scheme using Z-transform, discrete wavelet transform and bidiagonal singular value decomposition. Comput. Mater. Continua 58(1), 263\u2013285 (2019)","journal-title":"Comput. Mater. Continua"},{"issue":"1","key":"16_CR9","doi-asserted-by":"publisher","first-page":"363","DOI":"10.32604\/cmc.2019.06037","volume":"61","author":"J Liu","year":"2019","unstructured":"Liu, J., Li, J., Chen, Y., Zou, X., Cheng, J., Liu, Y., Bhatti, U.A.: A robust zero-watermarking based on SIFT-DCT for medical images in the encrypted domain. Comput. Mater. Continua 61(1), 363\u2013378 (2019)","journal-title":"Comput. Mater. Continua"},{"issue":"2","key":"16_CR10","doi-asserted-by":"publisher","first-page":"889","DOI":"10.32604\/cmc.2019.06034","volume":"61","author":"J Liu","year":"2019","unstructured":"Liu, J., Li, J., Cheng, J., Ma, J., Sadiq, N., Han, B., Geng, Q., Ai, Y.: A novel robust watermarking algorithm for encrypted medical image based on DTCWT-DCT and chaotic map. Comput. Mater. Continua 61(2), 889\u2013910 (2019)","journal-title":"Comput. Mater. Continua"},{"key":"16_CR11","unstructured":"Zhou, Y., Jin, W.: A novel image zero-watermarking scheme based on DWT-SVD. In: IEEE International Conference on Multimedia Technology, pp. 2873\u20132876 (2009)"},{"key":"16_CR12","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-81-322-1665-0_14","volume-title":"Intelligent Computing, Networking, and Informatics","author":"RSR Channapragada","year":"2014","unstructured":"Channapragada, R.S.R., Prasad, M.V.N.K.: Digital watermarking based on magic square and ridgelet transform techniques. In: Mohapatra, D.P., Patnaik, S. (eds.) Intelligent Computing, Networking, and Informatics. AISC, vol. 243, pp. 143\u2013161. Springer, New Delhi (2014). \nhttps:\/\/doi.org\/10.1007\/978-81-322-1665-0_14"},{"key":"16_CR13","series-title":"SpringerBriefs in Electrical and Computer Engineering","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-319-69069-8_3","volume-title":"Advance Compression and Watermarking Technique for Speech Signals","author":"R Thanki","year":"2018","unstructured":"Thanki, R., Borisagar, K., Borra, S.: Speech watermarking technique using the finite ridgelet transform, discrete wavelet transform, and singular value decomposition. Advance Compression and Watermarking Technique for Speech Signals. SECE, pp. 27\u201345. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-69069-8_3"},{"issue":"2","key":"16_CR14","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/TMM.2015.2508147","volume":"18","author":"H Sadreazami","year":"2016","unstructured":"Sadreazami, H., Ahmad, M.O., Swamy, M.N.S.: Multiplicative Water630 mark decoder in contourlet domain using the normal inverse Gaussian distribution. IEEE Trans. Multimed. 18(2), 196\u2013207 (2016). \nhttps:\/\/doi.org\/10.1109\/TMM.2015.2508147","journal-title":"IEEE Trans. Multimed."},{"key":"16_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6879-3","author":"WH Kim","year":"2019","unstructured":"Kim, W.H., Nam, S.H., Kang, J.H., et al.: Multimed. Tools Appl. (2019). \nhttps:\/\/doi.org\/10.1007\/s11042-018-6879-3","journal-title":"Multimed. Tools Appl."},{"key":"16_CR16","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.image.2017.02.011","volume":"54","author":"L Chen","year":"2017","unstructured":"Chen, L., Zhao, J.: Robust contourlet-based blind watermarking for depth-image-based rendering 3D images. Signal Process. Image Commun. 54, 56\u201365 (2017)","journal-title":"Signal Process. Image Commun."},{"key":"16_CR17","doi-asserted-by":"publisher","first-page":"1519","DOI":"10.1016\/S0165-1684(02)00300-6","volume":"82","author":"EJ Candes","year":"2002","unstructured":"Candes, E.J., Guo, F.: New multiscale transforms, minimum total variation synthesis: Application to edge-preserving image reconstruction. Sig. Process. 82, 1519\u20131543 (2002)","journal-title":"Sig. Process."},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Candes, E.J., Donoho, D.L.: Curvelets, multiresolution representation, and scaling laws. In: Proceedings of SPIE 4119, Wavelet Applications in Signal and Image Processing VIII, 4 December 2000","DOI":"10.1117\/12.408568"},{"key":"16_CR19","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1109\/TIP.2002.1014998","volume":"11","author":"JL Starck","year":"2002","unstructured":"Starck, J.L., Candes, E.J., Donoho, D.L.: The curvelet transform for image denoising. IEEE Trans. Image Process. 11, 670\u2013684 (2002)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"16_CR20","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1137\/05064182X","volume":"5","author":"E Cand\u00e8s","year":"2006","unstructured":"Cand\u00e8s, E., Demanet, L., Donoho, D., Ying, L.: Fast discrete curvelet transforms. Multiscale Model. Simul. 5(3), 861\u2013899 (2006)","journal-title":"Multiscale Model. Simul."},{"key":"16_CR21","first-page":"28","volume":"47","author":"M Mohammad","year":"2019","unstructured":"Mohammad, M., Gholamhossein, E.: A new DCT-based robust image watermarking method using teaching-learning-based optimization. J. Inf. Secur. Appl. 47, 28\u201338 (2019)","journal-title":"J. Inf. Secur. Appl."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57881-7_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T14:31:17Z","timestamp":1598884277000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57881-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030578800","9783030578817"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57881-7_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hohhot","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}