{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T02:35:59Z","timestamp":1772505359254,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":72,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642226021","type":"print"},{"value":"9783642226038","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22603-8_34","type":"book-chapter","created":{"date-parts":[[2011,8,9]],"date-time":"2011-08-09T12:35:07Z","timestamp":1312893307000},"page":"372-386","source":"Crossref","is-referenced-by-count":10,"title":["SVM-SS Watermarking Model for Medical Images"],"prefix":"10.1007","author":[{"given":"Saliza","family":"Ramly","sequence":"first","affiliation":[]},{"given":"Syed Ahmad","family":"Aljunid","sequence":"additional","affiliation":[]},{"given":"Hanizan","family":"Shaker Hussain","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","unstructured":"Zain, J.M., Clarke, M.: Security in Telemedicine: Issues in watermarking medical images. In: 3rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications, TUNISIA (2005)"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Potdar, V.M., Han, S., Chang, E.: A Survey of Digital Image Watermarking Techniques. In: International Conference on Industrial Informatics INDIN (2005)","DOI":"10.1109\/INDIN.2005.1560462"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Zain, J.M., Clarke, M.: Reversible Watermarking Surviving JPEG Compression. In: EMBS 2005, pp. 3759\u20133762 (2006)","DOI":"10.1109\/IEMBS.2005.1617302"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Planitz, B.M., Maeder, A.J.: A Study of Block-Based Medical Image Watermarking Using a Perceptual Similarity Metric. In: Proceedings in DICTA 2005, p. 70 (2005)","DOI":"10.1109\/DICTA.2005.7"},{"key":"34_CR5","volume-title":"Proceedings in: 17th International Conference on Electronics, Communications and Computers (CONIELECOMP 2007)","author":"R.-C. Raul","year":"2007","unstructured":"Raul, R.-C., Feregrino, -U.C., de Gershom, J.T.-B.: Data Hiding Scheme for Medical Images. In: Proceedings in: 17th International Conference on Electronics, Communications and Computers (CONIELECOMP 2007), IEEE Computer Society, USA (2007)"},{"issue":"4","key":"34_CR6","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1109\/TITB.2006.875655","volume":"10","author":"A. Giakoumaki","year":"2006","unstructured":"Giakoumaki, A., Pavlopoulos, S., Koutsouris, D.: Multiple Image Watermarking Applied to Health Information Management. IEEE Transactions on Information Technology in Biomedicine\u00a010(4), 722\u2013732 (2006)","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Memon, N.A., Gilani, S.A.M., Ali, A.: Watermarking of chest CT scan medical images for content authentication. In: ICICT 2009, pp. 175\u2013180 (2009)","DOI":"10.1109\/ICICT.2009.5268167"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Memon, N.A., Gilani, S.A.M., Qayoom, S.: Multiple watermarking of medical images for content authentication and recovery. In: IEEE:13th International, INMIC 2009. pp. 1\u20136 14\u201315 (2009)","DOI":"10.1109\/INMIC.2009.5383112"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Hyung-Kyo, L., Hee-Jung, K., Ki-Ryong, K., Jong-Keuk, L.: ROI Medical Image Watermarking Using DWT and Bit-plane. In: Asia-Pacific Conference, Communications, pp. 512\u2013515, 5-5 (2005)","DOI":"10.1109\/APCC.2005.1554112"},{"key":"34_CR10","doi-asserted-by":"crossref","unstructured":"Siau-Chuin, L., Zain, J.M.: Reversible medical image watermarking for tamper detection and recovery. In: ICCSIT 2010: 3rd IEEE International Conference, vol.\u00a05, pp. 417\u2013420 (2010)","DOI":"10.1109\/ICCSIT.2010.5564078"},{"key":"34_CR11","unstructured":"Maeder, A.J., Planitz, B.M.: Medical image watermarking for multiple modalities. In: Proceeding in Applied Imagery and Pattern Recognition Workshop, pp. 6\u2013165 (2005)"},{"key":"34_CR12","first-page":"4185","volume-title":"Proceeding in: 16th IEEE (ICIP 2009)","author":"M. Fallahpour","year":"2009","unstructured":"Fallahpour, M., Megias, D., Ghanbari, M.: High capacity, reversible data hiding in medical images. In: Bayoumi, M. (ed.) Proceeding in: 16th IEEE (ICIP 2009), pp. 4185\u20134188. IEEE Press, Piscataway (2009)"},{"issue":"19,9","key":"34_CR13","first-page":"3349","volume":"179","author":"L. Tzu-Chao","year":"2009","unstructured":"Tzu-Chao, L., Chao-Ming, L.: Wavelet-based copyright-protection scheme for digital images based on local features. Information Sciences\u00a0179(19,9), 3349\u20133358 (2009)","journal-title":"Information Sciences"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"Sung, J.L., Hae, M.M., Seung-Hoon, C., Sung, B.P., Yongwha, C., Min, H.C.: Dual Watermarking Method for Integrity of Medical Images. In: FGCN 2008, vol.\u00a02, pp. 70\u201373 (2008)","DOI":"10.1109\/FGCN.2008.213"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Megalingam, R.K., Nair, M.M., Srikumar, R., Balasubramanian, V.K., Venugopala, V.S.: Performance Comparison of Novel, Robust Spatial Domain Digital Image Watermarking with the Conventional Frequency Domain Watermarking Techniques. In: Signal Acquisition and Processing, pp. 349\u2013353 (2010)","DOI":"10.1109\/ICSAP.2010.79"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Huang, S., Zhang, W.: Digital Watermarking Based on Neural Network and Image Features. In: ICIC 2009, vol.\u00a02, pp. 238\u2013240 (2009)","DOI":"10.1109\/ICIC.2009.170"},{"issue":"8","key":"34_CR17","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1016\/j.ins.2008.10.020","volume":"179","author":"X.B. Cao","year":"2009","unstructured":"Cao, X.B., Xu, Y.W., Chen, D., Qiao, H.: Associated evolution of a support vector machine-based classifier for pedestrian detection. Information Sciences\u00a0179(8), 1070\u20131077 (2009)","journal-title":"Information Sciences"},{"issue":"2","key":"34_CR18","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1016\/j.ins.2006.05.002","volume":"177","author":"H.-H. Tsai","year":"2007","unstructured":"Tsai, H.-H., Sun, D.-W.: Color image watermark extraction based on support vector machines. Information Sciences\u00a0177(2), 550\u2013569 (2007)","journal-title":"Information Sciences"},{"key":"34_CR19","unstructured":"Shao, Y., Chen, W., Liu, C.: Multiwavelet-based Digital Watermarking with Support Vector Machine Technique. In: CCDC 2008 (2008)"},{"issue":"12","key":"34_CR20","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing\u00a06(12), 1673\u20131687 (1997)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"4","key":"34_CR21","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1109\/TSP.2003.809385","volume":"51","author":"H.S. Malvar","year":"2003","unstructured":"Malvar, H.S., Florencio, D.A.F.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Transactions on Signal Processing\u00a051(4), 898\u2013905 (2003)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"34_CR22","doi-asserted-by":"crossref","unstructured":"Abdallah, H.A., Hadhoud, M.M., Shaalan, A.A.: A blind spread spectrum wavelet based image watermarking algorithm. In: ICCES 2009, pp. 251\u2013256 (2009)","DOI":"10.1109\/ICCES.2009.5383274"},{"issue":"2","key":"34_CR23","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1109\/TIP.2008.2008222","volume":"18","author":"H.O. Altun","year":"2009","unstructured":"Altun, H.O., Orsdemir, A., Sharma, G., Bocko, M.F.: Optimal Spread Spectrum Watermark Embedding via a Multistep Feasibility Formulation. IEEE Transactions on Image Processing\u00a018(2), 371\u2013387 (2009)","journal-title":"IEEE Transactions on Image Processing"},{"key":"34_CR24","doi-asserted-by":"crossref","unstructured":"Tian, H., Zhao, Y., Ni, R., Pan, J.-S.: Spread Spectrum-Based Image Watermarking Resistant to Rotation and Scaling Using Radon Transform. In (IIH-MSP) 2010, pp. 442\u2013445, 15\u201317 (2010)","DOI":"10.1109\/IIHMSP.2010.113"},{"key":"34_CR25","volume-title":"Proceeding in CompSysTech 2004","author":"T. Todorov","year":"2004","unstructured":"Todorov, T.: Spread spectrum watermarking technique for information system securing. In: Proceeding in CompSysTech 2004. ACM, New York (2004)"},{"key":"34_CR26","unstructured":"Yi, Q., Wang, K.: An Improved Watermarking Method Based on Neural Network for Color Image. In: Proceedings ofthe 2009 IEEE, International Conference on Mechatronics and Automation, Changchun, China (2009)"},{"key":"34_CR27","unstructured":"Seetha, M., MuraliKrishna, I.V., Deekshatulu. B.L.: Comparison of Advanced techniques of Image classification. Map World Forum (2007)"},{"key":"34_CR28","doi-asserted-by":"crossref","unstructured":"Lai, C.-.C., Hsiang-Cheh, H., Cheng-Chih, T.: Image Watermarking Scheme Using Singular Value Decomposition and Micro-genetic Algorithm. In: IIHMSP 2008, pp. 469\u2013472, 15\u201317 (2008)","DOI":"10.1109\/IIH-MSP.2008.168"},{"key":"34_CR29","volume-title":"A Bradford Book","author":"V. Kecman","year":"2001","unstructured":"Kecman, V.: Learning and soft computing: support vector machines, neural networks, and fuzzy logic models. A Bradford Book. MIT Press, England (2001)"},{"issue":"8","key":"34_CR30","doi-asserted-by":"publisher","first-page":"2594","DOI":"10.1016\/j.patcog.2008.01.007","volume":"41","author":"A. Khan","year":"2008","unstructured":"Khan, A., Tahir, S.F., Majid, A., Choi, T.: Machine learning based adaptive watermark decoding in view of anticipated attack. Pattern Recogn.\u00a041(8), 2594\u20132610 (2008)","journal-title":"Pattern Recogn."},{"key":"34_CR31","unstructured":"Shao, Y., Wei, C., Chan, L.: Multiwavelet-based Digital Watermarking with Support Vector Machine Technique. In: CCDC 2008, Beijing, China (2008)"},{"key":"34_CR32","doi-asserted-by":"crossref","unstructured":"Huang, S., Zhang, W.: Digital Watermarking Based on Neural Network and Image Features. In: ICIC 2009, vol.\u00a02, pp. 238\u2013240 (2009)","DOI":"10.1109\/ICIC.2009.170"},{"key":"34_CR33","doi-asserted-by":"crossref","unstructured":"Liu, Q., Jiang, X.: Design and Realization of a Meaningful Digital Watermarking Algorithm Based on RBF Neural Network. In: WCICA 2006, vol.\u00a01, pp. 2878\u20132881 (2006)","DOI":"10.1109\/WCICA.2006.1712891"},{"key":"34_CR34","doi-asserted-by":"crossref","unstructured":"Jing, L., Liu, F.: Applying General Regression Neural Network in Digital Image Watermarking. In: ICNC 2008, vol.\u00a05, pp. 452\u2013456 (2008)","DOI":"10.1109\/ICNC.2008.175"},{"key":"34_CR35","unstructured":"Ahmad, R., Naghsh, N., Ayoub, T.: New Robust Digital Image Watermarking Technique based on the Discrete Cosine Transform and Neural Network. Engineering Department of Isfahan University of Iran. IEEE, Los Alamitos (2008)"},{"key":"34_CR36","volume-title":"International Conference on Mechatronics and Automation","author":"Q. Yi","year":"2009","unstructured":"Yi, Q., Wang, K.: An Improved Watermarking Method Based on Neural Network for Color Image. In: International Conference on Mechatronics and Automation. IEEE, China (2009)"},{"key":"34_CR37","doi-asserted-by":"crossref","unstructured":"Huang, S., Zhang, W., Feng, W., Yang, H.: Blind Watermarking Scheme Based on Neural Network. In: Proceedings of the 7th, World Congress on Intelligent Control and Automation, China (2008)","DOI":"10.1109\/WCICA.2008.4594557"},{"key":"34_CR38","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2005.1461331","volume-title":"The Application of a Full Counterpropagation Neural Network to Image Watermarking","author":"C.-Y. Chang","year":"2005","unstructured":"Chang, C.-Y.: The Application of a Full Counterpropagation Neural Network to Image Watermarking. IEEE, Los Alamitos (2005)"},{"key":"34_CR39","doi-asserted-by":"publisher","first-page":"2482","DOI":"10.1109\/ICSMC.2005.1571521","volume":"3","author":"C.-Y. Chang","year":"2005","unstructured":"Chang, C.-Y., Su, S.-J.: A neural-network-based robust watermarking scheme. Systems, Man and Cybernetics\u00a03, 2482\u20132487 (2005)","journal-title":"Systems, Man and Cybernetics"},{"key":"34_CR40","doi-asserted-by":"crossref","unstructured":"Liu, Q., Jiang, X.: Design and Realization of a Meaningful Digital Watermarking Algorithm Based on RBF Neural Network. In: ICNN&B 2005, vol.\u00a01, pp. 214\u2013218 (2005)","DOI":"10.1109\/ICNNB.2005.1614600"},{"key":"34_CR41","doi-asserted-by":"crossref","unstructured":"Lai, C.-C., Huang, H.-C., Tsai, C.-C.: Image Watermarking Scheme Using Singular Value Decomposition and Micro-genetic Algorithm. In: IIHMSP 2008, pp. 469\u2013472 (2008)","DOI":"10.1109\/IIH-MSP.2008.168"},{"issue":"1","key":"34_CR42","first-page":"23","volume":"1","author":"S. Kumar","year":"2009","unstructured":"Kumar, S., Raman, B., Thakur, M.: Real Coded Genetic Algorithm Based Stereo image Watermarking. IJSDIA\u00a01(1), 23\u201333 (2009)","journal-title":"IJSDIA"},{"key":"34_CR43","doi-asserted-by":"crossref","unstructured":"Jagadeesh, B., Kumar, S.S., Rajeswari, K.R.: A Genetic Algorithm Based Oblivious Image Watermarking Scheme Using Singular Value Decomposition (SVD). In: NETCOM 2009, pp. 224\u2013229 (2009)","DOI":"10.1109\/NetCoM.2009.66"},{"key":"34_CR44","doi-asserted-by":"crossref","unstructured":"Promcharoen, S., Rangsanseri, Y.: Genetic Watermarking with Block-Based DCT Clustering. In: ISCIT 2008, pp. 346\u2013351 (2008)","DOI":"10.1109\/ISCIT.2008.4700211"},{"key":"34_CR45","doi-asserted-by":"crossref","unstructured":"Lai, C.-C., Tsai, C.-C., Pan, S.-T.: An SVD-Based Watermarking Scheme Using Improved Micro-Genetic Algorithm. Fuzzy-IEEE (2009)","DOI":"10.1109\/FUZZY.2009.5277391"},{"key":"34_CR46","first-page":"586","volume-title":"Enhanced SVD Based Watermarking with Genetic Algorithm","author":"H. Jung","year":"2009","unstructured":"Jung, H., Jeon, M.: Enhanced SVD Based Watermarking with Genetic Algorithm, vol.\u00a056, pp. 586\u2013593. Springer, Heidelberg (2009)"},{"key":"34_CR47","doi-asserted-by":"crossref","unstructured":"Sikander, B., Ishtiaq, M., Jaffar, M.A., Tariq, M., Mirza, A.M.: Adaptive Digital Watermarking of Images Using Genetic Algorithm. In: ICISA 2010, pp. 1\u20138 (2010)","DOI":"10.1109\/ICISA.2010.5480367"},{"key":"34_CR48","doi-asserted-by":"crossref","unstructured":"Chang, C.-H., Ye, Z., Zhang, M.: Fuzzy-ART Based Adaptive Digital Watermarking Scheme. IEEE Transactions on Circuits and Systems for Video Technology\u00a015(1) (2005)","DOI":"10.1109\/TCSVT.2004.839992"},{"key":"34_CR49","doi-asserted-by":"crossref","unstructured":"Deng, C., Gao, X.-B., Tao, D.-C., Li, X.-L.: Digital Watermarking in Image Affine Co-Variant Regions. In: Proceedings of the Sixth International Conference on Machine Learning and Cybernetics, Hong Kong (2007)","DOI":"10.1109\/ICMLC.2007.4370495"},{"key":"34_CR50","unstructured":"Lande, P.U., Sanjay, N., Talbar, G.N., Shinde: A Fuzzy Logic Approach To Encrypted Watermarking For Still Images In Wavelet Domain on FPGA. International Journal of Signal Processing, Image Processing and Pattern Recognition\u00a03(2) (2010)"},{"key":"34_CR51","unstructured":"Lande, P.U., Sanjay, N., Talbar, G.N., Shinde: Robust Image Adaptive Watermarking Using Fuzzy Logic An FPGA Approach. International Journal of Signal Processing, Image Processing and Pattern Recognition\u00a03(3) (2010)"},{"key":"34_CR52","unstructured":"Coumou, D., Mathew, A.: A Fuzzy Logic Approach To Digital Image Watermarking. In: The International Workshop On Discrete-Event System Design, DESDes 2001, pp. 201\u2013209 (2001)"},{"key":"34_CR53","doi-asserted-by":"crossref","unstructured":"Oueslati, S., Cherif, A., Solaiman, B.: Mimizing Strength of Digital Watermarks using Fuzzy Logic. SIPIJ\u00a01(2) (2010)","DOI":"10.5121\/sipij.2010.1210"},{"issue":"2","key":"34_CR54","doi-asserted-by":"publisher","first-page":"1300","DOI":"10.1016\/j.eswa.2007.11.018","volume":"36","author":"W.-C. Chen","year":"2009","unstructured":"Chen, W.-C., Wang, M.-S.: A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Systems with Applications \u00a036(2), Part 1, 1300\u20131307 (2009), doi:10.1016\/j.eswa.2007.11.018, ISSN 0957-4174","journal-title":"Expert Systems with Applications Part 1"},{"key":"34_CR55","doi-asserted-by":"crossref","unstructured":"Promcharoen, S., Rangsanseri, Y.: Genetic Watermarking with Block-Based DCT Clustering. In: ISCIT 2008, pp. 346\u2013351, 21\u201323 (2008)","DOI":"10.1109\/ISCIT.2008.4700211"},{"key":"34_CR56","doi-asserted-by":"crossref","unstructured":"Kiani, S., Moghaddam, M.E.: A Fractal Based Image Watermarking for Authentication and Verification. In: CISP 2009, pp. 1\u20135 (2009)","DOI":"10.1109\/CISP.2009.5303946"},{"issue":"2","key":"34_CR57","first-page":"1","volume":"36","author":"W.-C. Chen","year":"2009","unstructured":"Chen, W.-C., Wang, M.-S.: A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Systems with Applications\u00a036(2), Part 1 (2009)","journal-title":"Expert Systems with Applications"},{"key":"34_CR58","doi-asserted-by":"crossref","unstructured":"Peng, H., Wang, J., Wang, W.: Image watermarking method in multiwavelet domain based on support vector machines. Journal of Systems and Software (2010) (in press)","DOI":"10.1016\/j.jss.2010.03.006"},{"key":"34_CR59","doi-asserted-by":"crossref","unstructured":"Wang, X.-Y., Xu, Z.-H., Yang, H.-Y.: A robust image watermarking algorithm using SVR detection. Expert Systems with Applications\u00a036(5) (2009)","DOI":"10.1016\/j.eswa.2008.12.040"},{"key":"34_CR60","unstructured":"Shao, Y., Chen, W., Liu, C.: Multiwavelet-based Digital Watermarking with Support Vector Machine Technique. In: CCDC 2008, Beijing, China (2008)"},{"issue":"2","key":"34_CR61","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1016\/j.ins.2006.05.002","volume":"177","author":"H.-H. Tsai","year":"2007","unstructured":"Tsai, H.-H., Sun, D.-W.: Color image watermark extraction based on support vector machines. Information Sciences\u00a0177(2), 550\u2013569 (2007)","journal-title":"Information Sciences"},{"key":"34_CR62","doi-asserted-by":"crossref","unstructured":"Tsai, H.-H., Tseng, H.-C., Lai, Y.-S.: Robust lossless image watermarking based on alpha-trimmed mean algorithm and support vector machine. Journal of Systems and Software (2009)","DOI":"10.1016\/j.jss.2009.12.026"},{"key":"34_CR63","doi-asserted-by":"crossref","unstructured":"Hussain, H.S., Aljunid, S.A., Yahya, S., Ali, F.H.M.: A Novel Hybrid Fuzzy-SVM Image Steganographic Model. In: Proceeding of\u00a0 the\u00a0 4th International Symposium on Information Technology (ITSim 2010), vol.\u00a01, pp. 215\u2013221 (2010)","DOI":"10.1109\/ITSIM.2010.5561300"},{"key":"34_CR64","volume-title":"Proceeding in CompSysTech 2004","author":"T. Todorov","year":"2004","unstructured":"Todorov, T.: Spread spectrum watermarking technique for information system securing. In: Proceeding in CompSysTech 2004. ACM, New York (2004)"},{"key":"34_CR65","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing (1997)","DOI":"10.1109\/83.650120"},{"key":"34_CR66","unstructured":"Cabeen, K., Gen, P.: Image Compression and the Discreet Cosine Transform. Student Project in Linear Algebra. College of the Redwoods (1998)"},{"key":"34_CR67","first-page":"6","volume-title":"Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India (A2CWiC 2010)","author":"S.S. Sujatha","year":"2010","unstructured":"Sujatha, S.S., Sathik, M.: A novel pixel based blind watermarking algorithm by applying Fibonacci transform. In: Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India (A2CWiC 2010), vol.\u00a039, p. 6. ACM, NY (2010)"},{"key":"34_CR68","doi-asserted-by":"crossref","unstructured":"Ganesan, K., Guptha, T.K.: Multiple Binary Images Watermarking in Spatial and Frequency Domains. Signal & Image Processing: An International Journal (SIPIJ)\u00a01(2) (2010)","DOI":"10.5121\/sipij.2010.1213"},{"key":"34_CR69","unstructured":"Aggarwal, E.D., Kaur, S., Anantdeep, E.: An Efficient Watermarking Algorithm to Improve Payload and Robustness without Affecting Image Perceptual Quality. Computer Science - Computer Vision and Pattern Recognition (2010)"},{"key":"34_CR70","unstructured":"Sathik, M.M., Sujatha, S.S.: An Improved Invisible Watermarking Technique for Image Authentication. International Journal of Advanced Science and Technology (IJAST)\u00a024 (2010)"},{"key":"34_CR71","unstructured":"Sathik, M.M., Sujatha, S.S.: Wavelet Based Blind Technique by Espousing Hankel Matrix for Robust Watermarking. International Journal of Advanced Science and Technology (IJAST)\u00a026 (2011)"},{"key":"34_CR72","doi-asserted-by":"crossref","unstructured":"Kusyk, J., Eskicioglu, A.M.: A semi-blind logo watermarking scheme for color images by comparison and modification of dft coefficients. ACM Multimedia and Security Workshop (2005)","DOI":"10.1117\/12.631934"}],"container-title":["Communications in Computer and Information Science","Digital Enterprise and Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22603-8_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T12:02:39Z","timestamp":1741435359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22603-8_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642226021","9783642226038"],"references-count":72,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22603-8_34","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}