{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T14:01:10Z","timestamp":1758981670723,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030588168"},{"type":"electronic","value":"9783030588175"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58817-5_61","type":"book-chapter","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T15:03:56Z","timestamp":1601391836000},"page":"862-877","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Optimized DWT SVD Based Image Watermarking Scheme Using Particle Swarm Optimization"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5652-9614","authenticated-orcid":false,"given":"Megha","family":"Bansal","sequence":"first","affiliation":[]},{"given":"Anurag","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Arpita","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,30]]},"reference":[{"issue":"12","key":"61_CR1","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"J Cox","year":"1997","unstructured":"Cox, J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"61_CR2","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/6046.985560","volume":"4","author":"R Liu","year":"2002","unstructured":"Liu, R., Tan, T.: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed. 4(1), 121\u2013128 (2002)","journal-title":"IEEE Trans. Multimed."},{"issue":"3","key":"61_CR3","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/S0165-1684(98)00017-6","volume":"66","author":"N Nikolaidis","year":"1998","unstructured":"Nikolaidis, N., Pitas, I.: Robust image watermarking in the spatial domain. Signal Process. 66(3), 385\u2013403 (1998)","journal-title":"Signal Process."},{"issue":"14","key":"61_CR4","doi-asserted-by":"publisher","first-page":"1083","DOI":"10.1016\/S0262-8856(01)00068-3","volume":"19","author":"J-C Liu","year":"2001","unstructured":"Liu, J.-C., Chen, S.-Y.: Fast two-layer image watermarking without referring to the original image and watermark. Image Vis. Comput. 19(14), 1083\u20131097 (2001)","journal-title":"Image Vis. Comput."},{"issue":"5","key":"61_CR5","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/83.918569","volume":"10","author":"C-Y Lin","year":"2001","unstructured":"Lin, C.-Y., Wu, M., Bloom, J.A., Cox, I.J., Miller, M.L., Lui, Y.M.: Rotation, scale, and translation resilient watermarking for images. IEEE Trans. Image Process. 10(5), 767\u2013782 (2001)","journal-title":"IEEE Trans. Image Process."},{"issue":"11","key":"61_CR6","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1109\/83.967401","volume":"10","author":"V Solachidis","year":"2001","unstructured":"Solachidis, V., Pitas, L.: Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Trans. Image Process. 10(11), 1741\u20131753 (2001)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"61_CR7","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/83.817598","volume":"9","author":"JR Hernandez","year":"2000","unstructured":"Hernandez, J.R., Amado, M., Perez-Gonzalez, F.: DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Trans. Image Process. 9(1), 55\u201368 (2000)","journal-title":"IEEE Trans. Image Process."},{"issue":"6","key":"61_CR8","doi-asserted-by":"publisher","first-page":"1597","DOI":"10.1016\/j.dsp.2010.03.010","volume":"20","author":"JC Patra","year":"2010","unstructured":"Patra, J.C., Phua, J.E., Bornand, C.: A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digit. Signal Process.s 20(6), 1597\u20131611 (2010)","journal-title":"Digit. Signal Process.s"},{"issue":"1","key":"61_CR9","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.chaos.2003.12.104","volume":"22","author":"Z Dawei","year":"2004","unstructured":"Dawei, Z., Guanrong, C., Wenbo, L.: A chaos-based robust wavelet-domain watermarking algorithm. Chaos Solitons Fractals 22(1), 47\u201354 (2004)","journal-title":"Chaos Solitons Fractals"},{"doi-asserted-by":"crossref","unstructured":"Meerwald, P., Uhl, A.: Survey of wavelet-domain watermarking algorithms. In: Security and Watermarking of Multimedia Contents III, pp. 505\u2013516 (2001)","key":"61_CR10","DOI":"10.1117\/12.435434"},{"doi-asserted-by":"crossref","unstructured":"Liu, F., Liu, Y.: A Watermarking algorithm for digital image based on DCT and SVD. In: 2008 Congress on Image and Signal Processing, pp. 380\u2013383 (2008)","key":"61_CR11","DOI":"10.1109\/CISP.2008.412"},{"issue":"7","key":"61_CR12","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1016\/j.jvcir.2013.07.007","volume":"24","author":"C Agarwal","year":"2013","unstructured":"Agarwal, C., Mishra, A., Sharma, A.: Gray-scale image watermarking using GA-BPN hybrid network. J. Vis. Commun. Image Represent. 24(7), 1135\u20131146 (2013)","journal-title":"J. Vis. Commun. Image Represent."},{"unstructured":"Mei, S.C., Li, R.-H., Dang, H.-M., Wang, Y.-K.: Decision of image watermarking strength based on artificial neural-networks. In: Proceedings of the 9th International Conference on Neural Information Processing (ICONIP 2002) (2002)","key":"61_CR13"},{"doi-asserted-by":"crossref","unstructured":"Li, Q., Yuan, C., Zhong, Y.-Z.: Adaptive DWT-SVD domain image watermarking using human visual model. In: 9th International Conference on Advanced Communication Technology (2007)","key":"61_CR14","DOI":"10.1109\/ICACT.2007.358752"},{"doi-asserted-by":"crossref","unstructured":"Mishra, A., Goel, A., Singh, R., Chetty, G., Singh, L.: A novel image watermarking scheme using extreme learning machine. In: 2012 International Joint Conference on Neural Networks (IJCNN) (2012)","key":"61_CR15","DOI":"10.1109\/IJCNN.2012.6252363"},{"doi-asserted-by":"crossref","unstructured":"Motwani, M. C., Motwani, R.C., Harris, F.C.: Wavelet based fuzzy perceptual mask for images. In: 2009 16th IEEE International Conference on Image Processing (ICIP) (2009)","key":"61_CR16","DOI":"10.1109\/ICIP.2009.5413682"},{"doi-asserted-by":"crossref","unstructured":"Agarwal, C., Mishra, A., Sharma, A.: Digital image watermarking in DCT domain using fuzzy inference system. In: 2011 24th Canadian Conference on Electrical and Computer Engineering (CCECE) (2011)","key":"61_CR17","DOI":"10.1109\/CCECE.2011.6030570"},{"issue":"4","key":"61_CR18","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1016\/j.dsp.2013.02.005","volume":"23","author":"CC Lai","year":"2013","unstructured":"Lai, C.C.: Corrigendum to \u2018A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm\u2019. Digit. Signal Process. 23(4), 1333 (2013)","journal-title":"Digit. Signal Process."},{"doi-asserted-by":"crossref","unstructured":"Mishra, A., Agarwal, C.: Toward optimal watermarking of grayscale images using the multiple scaling factor based cuckoo search technique. In: Bio-Inspired Computation and Applications in Image Processing, pp. 131\u2013155. Elsevier (2016)","key":"61_CR19","DOI":"10.1016\/B978-0-12-804536-7.00007-7"},{"issue":"17","key":"61_CR20","doi-asserted-by":"publisher","first-page":"7858","DOI":"10.1016\/j.eswa.2014.06.011","volume":"41","author":"A Mishra","year":"2014","unstructured":"Mishra, A., Agarwal, C., Sharma, A., Bedi, P.: Optimized gray-scale image watermarking using DWT SVD and firefly algorithm. Exp. Syst. Appl. 41(17), 7858\u20137867 (2014)","journal-title":"Exp. Syst. Appl."},{"key":"61_CR21","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1016\/j.proeng.2012.06.061","volume":"38","author":"K Kuppusamy","year":"2012","unstructured":"Kuppusamy, K., Thamodaran, K.: Optimized image watermarking scheme based on PSO. Proc. Eng. 38, 493\u2013503 (2012)","journal-title":"Proc. Eng."},{"issue":"1","key":"61_CR22","doi-asserted-by":"publisher","first-page":"45","DOI":"10.2478\/s11772-014-0177-z","volume":"22","author":"K Loukhaoukha","year":"2014","unstructured":"Loukhaoukha, K., Nabti, M., Zebbiche, K.: A robust SVD-based image watermarking using a multi-objective particle swarm optimization. Opto-Electron. Rev. 22(1), 45\u201354 (2014). https:\/\/doi.org\/10.2478\/s11772-014-0177-z","journal-title":"Opto-Electron. Rev."},{"issue":"15","key":"61_CR23","doi-asserted-by":"publisher","first-page":"1769","DOI":"10.1016\/j.patrec.2004.07.003","volume":"25","author":"F Huang","year":"2004","unstructured":"Huang, F., Guan, Z.-H.: A hybrid SVD-DCT watermarking method based on LPSNR. Pattern Recogn. Lett. 25(15), 1769\u20131775 (2004)","journal-title":"Pattern Recogn. Lett."},{"issue":"1","key":"61_CR24","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.eij.2015.01.002","volume":"16","author":"C Agarwal","year":"2015","unstructured":"Agarwal, C., Mishra, A., Sharma, A.: A novel gray-scale image watermarking using hybrid Fuzzy-BPN architecture. Egypt. Inform. J. 16(1), 83\u2013102 (2015)","journal-title":"Egypt. Inform. J."},{"unstructured":"Ohnishi, J., Matsui, K.: Embedding a seal in to a picture under orthogonal wavelet transform. In: IEEE International Conference on Multimedia and Computing System, Hiroshima, Japan, pp. 514\u2013521 (1996)","key":"61_CR25"},{"doi-asserted-by":"crossref","unstructured":"Bors, A.G., Pitas, I.: Image watermarking using DCT domain constraints. In: IEEE International Conference on Image Processing, pp. 231\u2013234 (1996)","key":"61_CR26","DOI":"10.1109\/ICIP.1996.560426"},{"key":"61_CR27","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1016\/j.future.2019.07.064","volume":"101","author":"TK Araghi","year":"2019","unstructured":"Araghi, T.K., Manaf, A.A.: An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD. Future Gener. Comput. Syst. 101, 1223\u20131246 (2019)","journal-title":"Future Gener. Comput. Syst."},{"doi-asserted-by":"crossref","unstructured":"Kennedy, J., Eberhart, R.: Particle swarm optimization. In: 1995 IEEE International Conference on Neural Networks, Perth, Australia, pp. 1942\u20131948. IEEE Service Center, Piscataway (1995)","key":"61_CR28","DOI":"10.1109\/ICNN.1995.488968"},{"unstructured":"Xianghong, T., Lu, L., Lianjie, Y., Yamei, N.: A digital watermarking scheme based on DWT and vector transform. In: Proceeding of International Symposium on Intelligent Multimedia, Video and Speech Processing, pp. 635\u2013638 (2004)","key":"61_CR29"},{"issue":"4","key":"61_CR30","first-page":"303","volume":"2","author":"K Loukhaoukha","year":"2011","unstructured":"Loukhaoukha, K., Chouinard, J.Y., Taieb, M.H.: Optimal image watermarking algorithm based on LWT\u2013SVD via multi-objective ant colony optimization. J. Inf. Hiding Multimed. Signal Process. 2(4), 303\u2013319 (2011)","journal-title":"J. Inf. Hiding Multimed. Signal Process."},{"key":"61_CR31","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.eswa.2018.02.002","volume":"100","author":"AM Abdelhakim","year":"2018","unstructured":"Abdelhakim, A.M., Abdelhakim, M.: A time-efficient optimization for robust image watermarking using machine learning. Exp. Syst. Appl. 100, 197\u2013210 (2018)","journal-title":"Exp. Syst. Appl."},{"issue":"5","key":"61_CR32","first-page":"1","volume":"4","author":"M Ishtiaq","year":"2010","unstructured":"Ishtiaq, M., Sikandar, B., Jaffar, A., Khan, A.: Adaptive watermark strength selection using particle swarm optimization. ICIC Express Lett. 4(5), 1\u20136 (2010)","journal-title":"ICIC Express Lett."},{"issue":"3","key":"61_CR33","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/j.jesit.2016.12.011","volume":"4","author":"K Loukhaoukha","year":"2017","unstructured":"Loukhaoukha, K., Refaey, A., Zebbiche, K.: Ambiguity attacks on robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. J. Electr. Syst. Inf. Technol. 4(3), 359\u2013368 (2017)","journal-title":"J. Electr. Syst. Inf. Technol."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58817-5_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T03:04:40Z","timestamp":1723691080000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58817-5_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030588168","9783030588175"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58817-5_61","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"30 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cagliari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Cyber chair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1450","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"466","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conference was held virtually due to COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}