{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:45:34Z","timestamp":1761648334806,"version":"3.41.0"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662490136"},{"type":"electronic","value":"9783662490143"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-49014-3_1","type":"book-chapter","created":{"date-parts":[[2015,12,23]],"date-time":"2015-12-23T14:41:36Z","timestamp":1450881696000},"page":"1-17","source":"Crossref","is-referenced-by-count":3,"title":["PSO Optimized Multipurpose Image Watermarking Using SVD and Chaotic Sequence"],"prefix":"10.1007","author":[{"given":"Irshad Ahmad","family":"Ansari","sequence":"first","affiliation":[]},{"given":"Millie","family":"Pant","sequence":"additional","affiliation":[]},{"given":"Chang Wook","family":"Ahn","sequence":"additional","affiliation":[]},{"given":"Jaehun","family":"Jeong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,24]]},"reference":[{"issue":"4","key":"1_CR1","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1109\/30.267415","volume":"39","author":"GL Friedman","year":"1993","unstructured":"Friedman, G.L.: The trustworthy digital camera: restoring credibility to the photographic image. IEEE Trans. Consum. Electron. 39(4), 905\u2013910 (1993)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"1","key":"1_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-007-0154-3","volume":"39","author":"A Haouzia","year":"2008","unstructured":"Haouzia, A., Noumeir, R.: Methods for image authentication: a survey. Multimedia Tools Appl. 39(1), 1\u201346 (2008)","journal-title":"Multimedia Tools Appl."},{"issue":"1","key":"1_CR3","first-page":"67","volume":"87","author":"T Matsuo","year":"2004","unstructured":"Matsuo, T., Kurosawa, K.: On parallel hash functions based on block-ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87(1), 67\u201374 (2004)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Ansari, I.A., Pant, M., Neri, F.: Analysis of gray scale watermark in RGB host using SVD and PSO. In: IEEE Symposium on Computational Intelligence for Multimedia, Signal and Vision Processing (CIMSIVP), pp. 1\u20137 (2014)","DOI":"10.1109\/CIMSIVP.2014.7013282"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Ansari, I.A., Pant, M.: SVD watermarking: particle swarm optimization of scaling factors to increase the quality of watermark. In: Proceedings of Fourth International Conference on Soft Computing for Problem Solving, pp. 205\u2013214. Springer, India (2015)","DOI":"10.1007\/978-81-322-2220-0_17"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Kang, Q., Li, K., Chen, H.: An SVD-based fragile watermarking scheme with grouped blocks. In: IEEE 2nd International Conference on Information Technology and Electronic Commerce (ICITEC), pp. 172\u2013179 (2014)","DOI":"10.1109\/ICITEC.2014.7105595"},{"issue":"2","key":"1_CR7","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.jvcir.2010.12.005","volume":"22","author":"X Qi","year":"2011","unstructured":"Qi, X., Xin, X.: A quantization-based semi-fragile watermarking scheme for image content authentication. J. Vis. Commun. Image Represent. 22(2), 187\u2013200 (2011)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"1_CR8","unstructured":"Chemak, C., Bouhlel, M.S., Lapayre, J.C.: A new scheme of robust image watermarking: the double watermarking algorithm. In: Proceedings of the Summer Computer Simulation Conference, pp. 1201\u20131208 (2007)"},{"issue":"4","key":"1_CR9","first-page":"6","volume":"46","author":"SZ Niu","year":"2009","unstructured":"Niu, S.Z., Shu, N.F.: A digital image double watermarking algorithm based on DCT domain. J. Comput. Res. Dev. 46(4), 6\u201310 (2009)","journal-title":"J. Comput. Res. Dev."},{"key":"1_CR10","unstructured":"Sharkas, M., ElShafie, D., Hamdy, N.: A dual digital-image watermarking technique. In: Proceedings of International Conference on World Academy of Science, Engineering and Technology, pp. 136\u2013139 (2005)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Wu, K., Yan, W., Du, J.: A robust dual digital-image watermarking technique. In: IEEE International Conference on Computational Intelligence and Security Workshops, pp. 668\u2013671 (2007)","DOI":"10.1109\/CISW.2007.4425584"},{"issue":"1","key":"1_CR12","doi-asserted-by":"publisher","first-page":"154","DOI":"10.3724\/SP.J.1016.2012.00154","volume":"35","author":"F Chen","year":"2012","unstructured":"Chen, F., He, H.J., Wang, H.X.: Variable-payload self-recovery watermarking scheme for digital image authentication. Chin. J. Comput. 35(1), 154\u2013162 (2012)","journal-title":"Chin. J. Comput."},{"issue":"11","key":"1_CR13","doi-asserted-by":"publisher","first-page":"3497","DOI":"10.1016\/j.patcog.2008.05.003","volume":"41","author":"TY Lee","year":"2008","unstructured":"Lee, T.Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497\u2013C3506 (2008)","journal-title":"Pattern Recogn."},{"issue":"3","key":"1_CR14","doi-asserted-by":"publisher","first-page":"578C","DOI":"10.1016\/j.compeleceng.2009.12.003","volume":"36","author":"R Chamlawi","year":"2010","unstructured":"Chamlawi, R., Khan, A., Usman, I.: Authentication and recovery of images using multiple watermarks. Comput. Electr. Eng. 36(3), 578C\u2013584 (2010)","journal-title":"Comput. Electr. Eng."},{"key":"1_CR15","doi-asserted-by":"publisher","first-page":"1310C","DOI":"10.1016\/j.compeleceng.2011.11.012","volume":"38","author":"H Shen","year":"2012","unstructured":"Shen, H., Chen, B.: From single watermark to dual watermark: a new approach for image watermarking. Comput. Electr. Eng. 38, 1310C\u20131324 (2012)","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"1_CR16","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1016\/j.jvcir.2012.01.017","volume":"23","author":"CL Song","year":"2012","unstructured":"Song, C.L., Sudirman, S., Merabti, M.: A robust region-adaptive dual image watermarking technique. J. Vis. Commun. Image Represent. 23(3), 549\u2013568 (2012)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"4","key":"1_CR17","doi-asserted-by":"publisher","first-page":"367C","DOI":"10.1016\/j.csi.2012.01.003","volume":"34","author":"C Li","year":"2012","unstructured":"Li, C., Wang, Y., Ma, B., et al.: Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme. Comput. Stand. Interfaces. 34(4), 367C\u2013379 (2012)","journal-title":"Comput. Stand. Interfaces."},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Habib, M., Sarhan, S., Rajab, L.: A robust-fragile dual watermarking system in the DCT domain. In: Proceedings of the 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, pp. 548\u2013553 (2005)","DOI":"10.1007\/11552451_74"},{"issue":"3","key":"1_CR19","doi-asserted-by":"publisher","first-page":"454C","DOI":"10.1016\/j.jvcir.2012.01.005","volume":"23","author":"A Phadikar","year":"2012","unstructured":"Phadikar, A., Maity, S.P., Mandal, M.: Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images. J. Vis. Commun. Image Represent. 23(3), 454C\u2013466 (2012)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"1_CR20","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.aeue.2011.01.016","volume":"65","author":"S Rawat","year":"2011","unstructured":"Rawat, S., Raman, B.: A chaotic system based fragile watermarking scheme for image tamper detection. AEU Int. J. Electron. Commun. 65, 840\u2013847 (2011)","journal-title":"AEU Int. J. Electron. Commun."},{"key":"1_CR21","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1016\/j.chaos.2009.01.025","volume":"42","author":"A Mooney","year":"2009","unstructured":"Mooney, A., Keating, J.G., Heffernan, D.M.: Performance analysis of chaotic and white watermarks in the presence of common watermark attacks. Chaos Solutions Fractals. 42, 560\u2013570 (2009)","journal-title":"Chaos Solutions Fractals."},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Wu, L., Zhang, J., Deng, W., He, D.: Arnold transformation algorithm and anti-arnold transformation algorithm. In: 1st IEEE International Conference on Information Science and Engineering, pp. 1164\u20131167 (2009)","DOI":"10.1109\/ICISE.2009.347"},{"issue":"2","key":"1_CR23","doi-asserted-by":"publisher","first-page":"338","DOI":"10.15181\/csat.v2i2.1059","volume":"2","author":"IA Ansari","year":"2015","unstructured":"Ansari, I.A., Singla, R., Singh, M.: SSVEP and ANN based optimal speller design for brain computer interface. Comput. Sci. Tech. 2(2), 338\u2013349 (2015)","journal-title":"Comput. Sci. Tech."},{"key":"1_CR24","doi-asserted-by":"publisher","unstructured":"Kant, S., Ansari, I.A.: An improved K means clustering with Atkinson index to classify liver patient dataset. Int. J. Syst. Assur. Eng. Manag. 1\u20137 (2015). doi: 10.1007\/s13198-015-0365-3","DOI":"10.1007\/s13198-015-0365-3"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Eberhart, R., Kennedy, J.: A new optimizer using particle swarm theory. In: Proceedings of the Sixth International Symposium on Micro Machine and Human Science, pp. 39\u201343 (1995)","DOI":"10.1109\/MHS.1995.494215"},{"issue":"2","key":"1_CR26","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1109\/TSMCB.2009.2015054","volume":"40","author":"S Kiranyaz","year":"2010","unstructured":"Kiranyaz, S., Ince, T., Yildirim, A., Gabbouj, M.: Fractional particle swarm optimization in multidimensional search space. IEEE Trans. Syst. Man Cybern. Part B Cybern. 40(2), 298\u2013319 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern. Part B Cybern."},{"issue":"3","key":"1_CR27","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/TEVC.2004.826070","volume":"8","author":"L Messerschmidt","year":"2004","unstructured":"Messerschmidt, L., Engelbrecht, A.P.: Learning to play games using a PSO-based competitive learning approach. IEEE Trans. Evol. Comput. 8(3), 280\u2013288 (2004)","journal-title":"IEEE Trans. Evol. Comput."}],"container-title":["Communications in Computer and Information Science","Bio-Inspired Computing -- Theories and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-49014-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T22:39:24Z","timestamp":1748731164000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-49014-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662490136","9783662490143"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-49014-3_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]}}}