{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:24:57Z","timestamp":1765887897636,"version":"3.41.0"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319598697"},{"type":"electronic","value":"9783319598703"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59870-3_18","type":"book-chapter","created":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T02:14:17Z","timestamp":1496110457000},"page":"314-331","source":"Crossref","is-referenced-by-count":24,"title":["A QR Code Watermarking Approach Based on the DWT-DCT Technique"],"prefix":"10.1007","author":[{"given":"Yang-Wai","family":"Chow","sequence":"first","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Joseph","family":"Tonien","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Akter, A., Nur-E-Tajnina, Ullah, M.A.: Digital image watermarking based on DWT-DCT: evaluate for a new embedding algorithm. In: 2014 International Conference on Informatics, Electronics Vision (ICIEV), pp. 1\u20136, May 2014","DOI":"10.1109\/ICIEV.2014.6850699"},{"issue":"9","key":"18_CR2","doi-asserted-by":"crossref","first-page":"740","DOI":"10.3844\/jcssp.2007.740.746","volume":"3","author":"A Al-Haj","year":"2007","unstructured":"Al-Haj, A.: Combined DWT-DCT digital image watermarking. J. Comput. Sci. 3(9), 740\u2013746 (2007)","journal-title":"J. Comput. Sci."},{"issue":"2","key":"18_CR3","first-page":"42","volume":"3","author":"SK Amirgholipour","year":"2009","unstructured":"Amirgholipour, S.K., Naghsh-Nilchi, A.R.: Robust digital image watermarking based on joint DWT-DCT. JDCTA 3(2), 42\u201354 (2009)","journal-title":"JDCTA"},{"issue":"3","key":"18_CR4","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/S0165-1684(98)00015-2","volume":"66","author":"M Barni","year":"1998","unstructured":"Barni, M., Bartolini, F., Cappellini, V., Piva, A.: A DCT-domain system for robust image watermarking. Signal Process. 66(3), 357\u2013372 (1998)","journal-title":"Signal Process."},{"issue":"5","key":"18_CR5","doi-asserted-by":"crossref","first-page":"057004","DOI":"10.1117\/1.3126646","volume":"48","author":"W-Y Chen","year":"2009","unstructured":"Chen, W.-Y., Wang, J.-W.: Nested image steganography scheme using QR-barcode technique. Opt. Eng. 48(5), 057004\u2013057004 (2009)","journal-title":"Opt. Eng."},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Cho, D.: Study on method of new digital watermark generation using QR-code. In: 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications, Compiegne, France, 28\u201330 October 2013, pp. 585\u2013588. IEEE (2013)","DOI":"10.1109\/BWCCA.2013.102"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/978-3-319-49148-6_36","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"Y-W Chow","year":"2016","unstructured":"Chow, Y.-W., Susilo, W., Yang, G., Au, M.H., Wang, C.: Authentication and transaction verification using QR codes with a mobile device. In: Wang, G., Ray, I., Alcaraz Calero, J.M., Thampi, S.M. (eds.) SpaCCS 2016. LNCS, vol. 10066, pp. 437\u2013451. Springer, Cham (2016). doi: 10.1007\/978-3-319-49148-6_36"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-319-40253-6_25","volume-title":"Information Security and Privacy","author":"Y-W Chow","year":"2016","unstructured":"Chow, Y.-W., Susilo, W., Yang, G., Phillips, J.G., Pranata, I., Barmawi, A.M.: Exploiting the error correction mechanism in QR codes for secret sharing. In: Liu, J.K.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9722, pp. 409\u2013425. Springer, Cham (2016). doi: 10.1007\/978-3-319-40253-6_25"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Chung, C.-H., Chen, W.-Y., Tu, C.-M.: Image hidden technique using QR-barcode. In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH-MSP 2009, pp. 522\u2013525. IEEE (2009)","DOI":"10.1109\/IIH-MSP.2009.119"},{"key":"18_CR10","volume-title":"Digital Watermarking","author":"I Cox","year":"2002","unstructured":"Cox, I., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann Publishers Inc., San Francisco (2002)"},{"issue":"2","key":"18_CR11","doi-asserted-by":"crossref","first-page":"820936","DOI":"10.1155\/S1110865702000525","volume":"2002","author":"IJ Cox","year":"2002","unstructured":"Cox, I.J., Miller, M.L.: The first 50 years of electronic watermarking. EURASIP J. Adv. Signal Process. 2002(2), 820936 (2002)","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Deb, K., Al-Seraj, M.S., Hoque, M.M., Sarkar, M.I.H.: Combined DWT-DCT based digital image watermarking technique for copyright protection. In: 2012 7th International Conference on Electrical and Computer Engineering, pp. 458\u2013461, December 2012","DOI":"10.1109\/ICECE.2012.6471586"},{"key":"18_CR13","unstructured":"Denso Wave Incorporated. QRcode.com. http:\/\/www.qrcode.com\/en\/"},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/11848035_15","volume-title":"Multimedia Content Representation, Classification and Security","author":"S Emek","year":"2006","unstructured":"Emek, S., Pazarci, M.: Additive vs. image dependent DWT-DCT based watermarking. In: Gunsel, B., Jain, A.K., Tekalp, A.M., Sankur, B. (eds.) MRCS 2006. LNCS, vol. 4105, pp. 98\u2013105. Springer, Heidelberg (2006). doi: 10.1007\/11848035_15"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-319-07620-1_14","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"S Falkner","year":"2014","unstructured":"Falkner, S., Kieseberg, P., Simos, D.E., Traxler, C., Weippl, E.: E-voting authentication with QR-codes. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 149\u2013159. Springer, Cham (2014). doi: 10.1007\/978-3-319-07620-1_14"},{"issue":"1\u20133","key":"18_CR16","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.physleta.2005.08.006","volume":"346","author":"Z-H Guan","year":"2005","unstructured":"Guan, Z.-H., Huang, F., Guan, W.: Chaos-based image encryption algorithm. Phys. Lett. A 346(1\u20133), 153\u2013157 (2005)","journal-title":"Phys. Lett. A"},{"issue":"7","key":"18_CR17","doi-asserted-by":"crossref","first-page":"1079","DOI":"10.1109\/5.771066","volume":"87","author":"F Hartung","year":"1999","unstructured":"Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proc. IEEE 87(7), 1079\u20131107 (1999)","journal-title":"Proc. IEEE"},{"issue":"2","key":"18_CR18","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1109\/TCE.2011.5955222","volume":"57","author":"H-C Huang","year":"2011","unstructured":"Huang, H.-C., Chang, F.-C., Fang, W.-C.: Reversible data hiding with histogram-based difference expansion for QR code applications. IEEE Trans. Consum. Electron. 57(2), 779\u2013787 (2011)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"6","key":"18_CR19","doi-asserted-by":"crossref","first-page":"974","DOI":"10.1109\/76.867936","volume":"10","author":"J Huang","year":"2000","unstructured":"Huang, J., Shi, Y.Q., Shi, Y.: Embedding image watermarks in DC components. IEEE Trans. Circuits Syst. Video Technol. 10(6), 974\u2013979 (2000)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"18_CR20","unstructured":"International Organization for Standardization. Informationtechnology \u2013 automatic identification and data capture techniques \u2013 QR code 2005 bar code symbology specification. ISO\/IEC18004:2006 (2006)"},{"key":"18_CR21","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-981-10-1675-2_45","volume-title":"Proceedings of the International Conference on Data Engineering and Communication Technology","author":"AM Joshi","year":"2017","unstructured":"Joshi, A.M., Gupta, S., Girdhar, M., Agarwal, P., Sarker, R.: Combined DWT\u2013DCT-based video watermarking algorithm using Arnold transform technique. In: Satapathy, S.C., Bhateja, V., Joshi, A. (eds.) ICDECT 2016. AISC, vol. 468, pp. 455\u2013463. Springer, Singapore (2017). doi: 10.1007\/978-981-10-1675-2_45"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Kang, Q., Li, K., Yang, J.: A digital watermarking approach based on DCT domain combining QR code and chaotic theory. In: 2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN), pp. 1\u20137, September 2014","DOI":"10.1109\/WOCN.2014.6923098"},{"issue":"2","key":"18_CR23","first-page":"178","volume":"11","author":"SA Kasmani","year":"2014","unstructured":"Kasmani, S.A., Sharifi, A.M.: A pre-filtering method to improve watermark detection rate in DCT based watermarking. Int. Arab J. Inf. Technol. 11(2), 178\u2013185 (2014)","journal-title":"Int. Arab J. Inf. Technol."},{"issue":"8","key":"18_CR24","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1016\/j.image.2010.07.004","volume":"25","author":"J Kim","year":"2010","unstructured":"Kim, J., Kim, N., Lee, D., Park, S., Lee, S.: Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents. Signal Process. Image Commun. 25(8), 559\u2013576 (2010)","journal-title":"Signal Process. Image Commun."},{"issue":"11","key":"18_CR25","doi-asserted-by":"crossref","first-page":"3060","DOI":"10.1109\/TIM.2010.2066770","volume":"59","author":"CC Lai","year":"2010","unstructured":"Lai, C.C., Tsai, C.C.: Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans. Instrum. Meas. 59(11), 3060\u20133063 (2010)","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"18_CR26","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1007\/978-3-642-22786-8_61","volume-title":"Computer Networks and Intelligent Computing","author":"RH Laskar","year":"2011","unstructured":"Laskar, R.H., Choudhury, M., Chakraborty, K., Chakraborty, S.: A joint DWT-DCT based robust digital watermarking algorithm for ownership verification of digital images. In: Venugopal, K.R., Patnaik, L.M. (eds.) ICIP 2011. CCIS, vol. 157, pp. 482\u2013491. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-22786-8_61"},{"key":"18_CR27","series-title":"Advances in Intelligent Systems and Applications","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-642-35473-1_15","volume-title":"Smart Innovation, Systems and Technologies","author":"H-C Lee","year":"2013","unstructured":"Lee, H.-C., Dong, C.-R., Lin, T.-M.: Digital watermarking based on JND model and QR code features. In: Pan, J.-S., et al. (eds.) SIST. SIST, vol. 21, pp. 141\u2013148. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-35473-1_15"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Lin, S.D., Chen, C.-F.: A robust DCT-based watermarking for copyright protection. In: 2000 Digest of Technical Papers. International Conference on Consumer Electronics. Nineteenth in the Series (Cat. No.00CH37102), pp. 10\u201311, June 2000","DOI":"10.1109\/ICCE.2000.854474"},{"key":"18_CR29","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-319-13156-6_2","volume-title":"Robust Image Authentication in the Presence of Noise","author":"C Ling","year":"2015","unstructured":"Ling, C., Ur-Rehman, O.: Watermarking for image authentication. In: \u017divi\u0107, N. (ed.) Robust Image Authentication in the Presence of Noise, pp. 43\u201373. Springer, Cham (2015). doi: 10.1007\/978-3-319-13156-6_2"},{"issue":"7","key":"18_CR30","doi-asserted-by":"crossref","first-page":"674","DOI":"10.1109\/34.192463","volume":"11","author":"S Mallat","year":"1989","unstructured":"Mallat, S.: A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans. Pattern Anal. Mach. Intell. 11(7), 674\u2013693 (1989)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"18_CR31","doi-asserted-by":"crossref","first-page":"2670","DOI":"10.1109\/ACCESS.2016.2570812","volume":"4","author":"AS Panah","year":"2016","unstructured":"Panah, A.S., Schyndel, R.V., Sellis, T., Bertino, E.: On the properties of non-media digital watermarking: a review of state of the art techniques. IEEE Access 4, 2670\u20132704 (2016)","journal-title":"IEEE Access"},{"issue":"4","key":"18_CR32","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/79.939835","volume":"18","author":"CI Podilchuk","year":"2001","unstructured":"Podilchuk, C.I., Delp, E.J.: Digital watermarking: algorithms and applications. IEEE Signal Process. Mag. 18(4), 33\u201346 (2001)","journal-title":"IEEE Signal Process. Mag."},{"key":"18_CR33","volume-title":"Discrete Cosine Transform: Algorithms, Advantages","author":"KR Rao","year":"1990","unstructured":"Rao, K.R., Yip, P.: Discrete Cosine Transform: Algorithms, Advantages. Applications. Academic Press Professional Inc., San Diego (1990)"},{"issue":"7","key":"18_CR34","doi-asserted-by":"crossref","first-page":"1074","DOI":"10.1016\/j.aeue.2015.03.007","volume":"69","author":"PP Thulasidharan","year":"2015","unstructured":"Thulasidharan, P.P., Nair, M.S.: QR code based blind digital image watermarking with attack detection code. AEU Int. J. Electron. Commun. 69(7), 1074\u20131084 (2015)","journal-title":"AEU Int. J. Electron. Commun."},{"issue":"12","key":"18_CR35","doi-asserted-by":"crossref","first-page":"4835","DOI":"10.1109\/TSP.2006.881258","volume":"54","author":"XY Wang","year":"2006","unstructured":"Wang, X.Y., Zhao, H.: A novel synchronization invariant audio watermarking scheme based on DWT and DCT. IEEE Trans. Signal Process. 54(12), 4835\u20134840 (2006)","journal-title":"IEEE Trans. Signal Process."},{"key":"18_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-642-32205-1_17","volume-title":"Digital Forensics and Watermarking","author":"J Weir","year":"2012","unstructured":"Weir, J., Yan, W.Q.: Authenticating visual cryptography shares using 2D barcodes. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 196\u2013210. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-32205-1_17"},{"key":"18_CR37","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1007\/978-94-007-6996-0_63","volume-title":"Information Technology Convergence","author":"W-C Wu","year":"2013","unstructured":"Wu, W.-C., Lin, Z.-W., Wong, W.-T.: Application of QR-code steganography using data embedding technique. In: Park, J.J.J.H., Barolli, L., Xhafa, F., Jeong, H.Y. (eds.) Information Technology Convergence. LNEE, vol. 253, pp. 597\u2013605. Springer, Dordrecht (2013). doi: 10.1007\/978-94-007-6996-0_63"},{"key":"18_CR38","doi-asserted-by":"crossref","unstructured":"Zhang, W., Meng, X.: An improved digital watermarking technology based on QR code. In: 2015 4th International Conference on Computer Science and Network Technology (ICCSNT), vol. 01, pp. 1004\u20131007, December 2015","DOI":"10.1109\/ICCSNT.2015.7490906"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59870-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:01:09Z","timestamp":1750280469000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59870-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319598697","9783319598703"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59870-3_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}