{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:46:29Z","timestamp":1742913989118,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642252426"},{"type":"electronic","value":"9783642252433"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25243-3_13","type":"book-chapter","created":{"date-parts":[[2011,11,2]],"date-time":"2011-11-02T06:18:58Z","timestamp":1320214738000},"page":"158-172","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Pyramidal Dual-Tree Directional Filter Bank Domain Color Image Watermarking Algorithm"],"prefix":"10.1007","author":[{"given":"Panpan","family":"Niu","sequence":"first","affiliation":[]},{"given":"Xiangyang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mingyu","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","first-page":"3","volume":"33","author":"S. Lian","year":"2009","unstructured":"Lian, S., Kanellopoulos, D., Ruffo, G.: Recent advances in multimedia information system security. Informatica\u00a033, 3\u201324 (2009)","journal-title":"Informatica"},{"key":"13_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1242471.1242473","volume":"39","author":"D. Zheng","year":"2007","unstructured":"Zheng, D., Liu, Y., Zhao, J.Y., Saddik, A.E.: A survey of RST invariant image watermarking algorithms. ACM Computing Surveys\u00a039, 1\u201391 (2007)","journal-title":"ACM Computing Surveys"},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1109\/TIP.2009.2014807","volume":"18","author":"D. Zheng","year":"2009","unstructured":"Zheng, D., Wang, S., Zhao, J.Y.: RST invariant image watermarking algorithm with mathematical modeling and analysis of the watermarking processes. IEEE Trans. on Image Processing\u00a018, 1055\u20131068 (2009)","journal-title":"IEEE Trans. on Image Processing"},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.csi.2009.06.004","volume":"32","author":"S.D. Lin","year":"2010","unstructured":"Lin, S.D., Shie, S.C., Guo, J.Y.: Improving the robustness of DCT-based image watermarking against JPEG compression. Computer Standards & Interfaces\u00a032, 54\u201360 (2010)","journal-title":"Computer Standards & Interfaces"},{"key":"13_CR5","first-page":"62","volume":"19","author":"Y. Xing","year":"2010","unstructured":"Xing, Y., Tan, J.: A color image watermarking scheme resistant against geometrical attacks. Radio Engineering\u00a019, 62\u201367 (2010)","journal-title":"Radio Engineering"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TIFS.2007.916275","volume":"3","author":"T.T. Kin","year":"2008","unstructured":"Kin, T.T., Zhang, X.P., Androutsos, D.: Color Image Watermarking Using Multidimensional Fourier Transforms. IEEE Trans. on Information Forensics and Security\u00a03, 16\u201328 (2008)","journal-title":"IEEE Trans. on Information Forensics and Security"},{"key":"13_CR7","first-page":"1773","volume":"37","author":"S.H. Jiang","year":"2009","unstructured":"Jiang, S.H., Zhang, J.Q., Hu, B.: An adaptive watermarking algorithm in the hypercomplex space of a color image. Acta Electronica Sinica\u00a037, 1773\u20131778 (2009)","journal-title":"Acta Electronica Sinica"},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.csi.2007.08.013","volume":"30","author":"Y.G. Fu","year":"2008","unstructured":"Fu, Y.G., Shen, R.M.: Color image watermarking scheme based on linear discriminant analysis. Computer Standard & Interfaces\u00a030, 115\u2013120 (2008)","journal-title":"Computer Standard & Interfaces"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/978-3-642-04438-0_35","volume-title":"Digital Watermarking","author":"J.B. Zheng","year":"2009","unstructured":"Zheng, J.B., Feng, S.: A Color Image Watermarking Scheme in the Associated Domain of DWT and DCT Domains Based on Multi-channel Watermarking Framework. In: Kim, H.-J., Katzenbeisser, S., Ho, A.T.S. (eds.) IWDW 2008. LNCS, vol.\u00a05450, pp. 419\u2013432. Springer, Heidelberg (2009)"},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.aeue.2008.11.006","volume":"64","author":"K.C. Liu","year":"2010","unstructured":"Liu, K.C.: Wavelet-based watermarking for color images through visual masking. AEU - International Journal of Electronics and Communications\u00a064, 112\u2013124 (2010)","journal-title":"AEU - International Journal of Electronics and Communications"},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"1605","DOI":"10.1007\/s11432-009-0125-6","volume":"52","author":"X.Y. Wang","year":"2009","unstructured":"Wang, X.Y., Meng, L., Yang, H.Y.: Geometrically invariant color image watermarking scheme using feature points. Science in China Series F-Information Sciences\u00a052, 1605\u20131616 (2009)","journal-title":"Science in China Series F-Information Sciences"},{"key":"13_CR12","doi-asserted-by":"publisher","first-page":"9056","DOI":"10.1016\/j.eswa.2008.12.040","volume":"36","author":"X.Y. Wang","year":"2009","unstructured":"Wang, X.Y., Xu, Z.H., Yang, H.Y.: A robust image watermarking algorithm using SVR detection. Expert Systems with Applications\u00a036, 9056\u20139064 (2009)","journal-title":"Expert Systems with Applications"},{"key":"13_CR13","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1016\/j.ins.2006.05.002","volume":"177","author":"H.H. Tsai","year":"2007","unstructured":"Tsai, H.H., Sun, D.W.: Color image watermark extraction based on support vector machines. Information Sciences\u00a0177, 550\u2013569 (2007)","journal-title":"Information Sciences"},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"2081","DOI":"10.1016\/j.eswa.2010.07.147","volume":"38","author":"P.P. Niu","year":"2011","unstructured":"Niu, P.P., Wang, X.Y., Yang, Y.P., Lu, M.Y.: A novel color image watermarking scheme in nonsampled contourlet-domain. Expert Systems with Applications\u00a038, 2081\u20132098 (2011)","journal-title":"Expert Systems with Applications"},{"key":"13_CR15","doi-asserted-by":"publisher","first-page":"4651","DOI":"10.1109\/TSP.2007.912897","volume":"56","author":"T.T. Nguyen","year":"2008","unstructured":"Nguyen, T.T., Oraintara, S.: The shiftable complex directional pyramid-part I: theoretical aspects. IEEE Trans. on Signal Processing\u00a056, 4651\u20134660 (2008)","journal-title":"IEEE Trans. on Signal Processing"},{"key":"13_CR16","unstructured":"Chaabane, S.B., Sayadi, M., Fnaiech, F.: Colour image segmentation using homogeneity method and data fusion techniques. EURASIP Journal on Advances in Signal Processing, 1\u201311 (2010)"},{"key":"13_CR17","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.sigpro.2007.07.020","volume":"88","author":"H.Y. Qi","year":"2008","unstructured":"Qi, H.Y., Zheng, D., Zhao, J.Y.: Human visual system based adaptive digital image watermarking. Signal Processing\u00a088, 174\u2013188 (2008)","journal-title":"Signal Processing"},{"key":"13_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The nature of statistical learning theory","author":"V. Vapnik","year":"1995","unstructured":"Vapnik, V.: The nature of statistical learning theory. Springer, New York (1995)"},{"key":"13_CR19","doi-asserted-by":"publisher","first-page":"1470","DOI":"10.1016\/j.jss.2010.03.006","volume":"83","author":"H. Peng","year":"2010","unstructured":"Peng, H., Wang, J., Wang, W.X.: Image watermarking method in multiwavelet domain based on support vector machines. Journal of Systems and Software\u00a083, 1470\u20131477 (2010)","journal-title":"Journal of Systems and Software"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25243-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:19:37Z","timestamp":1566764377000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25243-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642252426","9783642252433"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25243-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}