{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T04:14:35Z","timestamp":1747282475115,"version":"3.40.5"},"publisher-location":"New Delhi","reference-count":21,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132222194"},{"type":"electronic","value":"9788132222200"}],"license":[{"start":{"date-parts":[[2014,12,24]],"date-time":"2014-12-24T00:00:00Z","timestamp":1419379200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,12,24]],"date-time":"2014-12-24T00:00:00Z","timestamp":1419379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-81-322-2220-0_17","type":"book-chapter","created":{"date-parts":[[2014,12,23]],"date-time":"2014-12-23T08:00:18Z","timestamp":1419321618000},"page":"209-218","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["SVD Watermarking: Particle Swarm Optimization of Scaling Factors to Increase the Quality of Watermark"],"prefix":"10.1007","author":[{"given":"Irshad Ahmad","family":"Ansari","sequence":"first","affiliation":[]},{"given":"Millie","family":"Pant","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,24]]},"reference":[{"key":"17_CR1","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/S0165-1684(98)00015-2","volume":"66","author":"M Barni","year":"1998","unstructured":"Barni, M., Bartolini, F., Cappellini, V., Piva, A.: A DCT-domain system for robust image watermarking. J. Signal Process. 66, 357\u2013372 (1998)","journal-title":"J. Signal Process."},{"issue":"2","key":"17_CR2","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1109\/30.846673","volume":"46","author":"X Niu","year":"2000","unstructured":"Niu, X., Sun, S., Xiang, W.: Watermarking for video based on gray-level digital watermark. IEEE Trans. Consum. Electron. 46(2), 375\u2013384 (2000)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"7","key":"17_CR3","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/5.771066","volume":"87","author":"F Hartung","year":"1999","unstructured":"Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proc. IEEE 87(7), 1079\u20131107 (1999)","journal-title":"Proc. IEEE"},{"doi-asserted-by":"crossref","unstructured":"Yusof, Y., Khalif, O.O.: Imperceptibility and robustness analysis of DWT-based digital image watermarking. In: The Proceedings of International Conference on Computer and Communication Engineering (ICCCE), vol. 12, pp. 1325\u20131330 (2008)","key":"17_CR4","DOI":"10.1109\/ICCCE.2008.4580820"},{"issue":"7","key":"17_CR5","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1016\/j.patrec.2004.09.047","volume":"26","author":"AA Reddy","year":"2005","unstructured":"Reddy, A.A., Chatterji, B.N.: A new wavelet based logo-watermarking scheme. Pattern Recogn. Lett. 26(7), 1019\u20131027 (2005)","journal-title":"Pattern Recogn. Lett."},{"doi-asserted-by":"crossref","unstructured":"Ker, A.D.: Improved detection of LSB steganography in grayscale images. In: Information Hiding, vol. 9, pp. 97\u2013115. Springer, Berlin (2005)","key":"17_CR6","DOI":"10.1007\/978-3-540-30114-1_8"},{"issue":"10","key":"17_CR7","doi-asserted-by":"publisher","first-page":"3976","DOI":"10.1109\/TSP.2005.855418","volume":"53","author":"F Cayre","year":"2005","unstructured":"Cayre, F., Fontaine, C., Furon, T.: Watermarking security: theory and practice. IEEE Trans. Signal Process. 53(10), 3976\u20133987 (2005)","journal-title":"IEEE Trans. Signal Process."},{"doi-asserted-by":"crossref","unstructured":"Kalker, T.: Considerations on watermarking security. In: IEEE Fourth Workshop on Multimedia Signal Processing, vol. 5, pp. 201\u2013206 (2001)","key":"17_CR8","DOI":"10.1109\/MMSP.2001.962734"},{"issue":"3","key":"17_CR9","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1109\/30.883387","volume":"46","author":"SD Lin","year":"2000","unstructured":"Lin, S.D., Chen, C.-F.: A robust DCT-based watermarking for copyright protection. IEEE Trans. Consum. Electron. 46(3), 415\u2013421 (2000)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"1","key":"17_CR10","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/83.817598","volume":"9","author":"JR Hernandez","year":"2000","unstructured":"Hernandez, J.R., Amado, M., Perez-Gonzalez, F.: DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Trans. Image Process. 9(1), 55\u201368 (2000)","journal-title":"IEEE Trans. Image Process."},{"doi-asserted-by":"crossref","unstructured":"Xia, X.-G., Boncelet, C.G., Arce, G.R.: A multiresolution watermark for digital images. In: Proceedings of IEEE International Conference on Image Processing, vol. 1, pp. 548\u2013551 (1997)","key":"17_CR11","DOI":"10.1109\/ICIP.1997.647971"},{"doi-asserted-by":"crossref","unstructured":"Nikolaidis, A., Pitas, I.: Asymptotically optimal detection for additive watermarking in the DCT and DWT domains. IEEE Trans. Image Process. 12(5), 563\u2013571 (2003)","key":"17_CR12","DOI":"10.1109\/TIP.2003.810586"},{"doi-asserted-by":"crossref","unstructured":"Liu, R., Tan, T.: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimedia 4(1), 121\u2013128 (2002)","key":"17_CR13","DOI":"10.1109\/6046.985560"},{"doi-asserted-by":"crossref","unstructured":"Chang, C.-C., Tsai, P., Lin, C.-C.: SVD-based digital image watermarking scheme. Pattern Recogn. Lett. 26(10), 1577\u20131586 (2005)","key":"17_CR14","DOI":"10.1016\/j.patrec.2005.01.004"},{"unstructured":"Gorodetski, V.I., Popyack, L.J., Samoilov, V., Skormin, V.A.: SVD-based approach to transparent embedding data into digital images. In: International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS), vol. 2, pp. 21\u201323 (2001)","key":"17_CR15"},{"doi-asserted-by":"crossref","unstructured":"Lin, C.-Y., Wu, M., Bloom, J.A., Cox, I.J., Miller, M.L., Lui, Y.M.: Rotation, scale, and translation resilient watermarking for images. IEEE Trans. Image Process. 10(5), 767\u2013782 (2001)","key":"17_CR16","DOI":"10.1109\/83.918569"},{"doi-asserted-by":"crossref","unstructured":"Chen, P.-M.: A visible watermarking mechanism using a statistic approach. In: Proceedings of 5th IEEE International Conference on Signal Processing (WCCC-ICSP), vol. 2, pp. 910\u2013913 (2000)","key":"17_CR17","DOI":"10.1109\/ICOSP.2000.891668"},{"doi-asserted-by":"crossref","unstructured":"Piva, A., Bartonlini, F., Cappellini, V., Barnni, M.: Exploiting the cross-correlation of RGB-channels for robust watermarking of color image. In: Proceedings of the IEEE International Conference on Image Processing, vol. 1, pp. 306\u2013310 (1999)","key":"17_CR18","DOI":"10.1109\/ICIP.1999.821619"},{"doi-asserted-by":"crossref","unstructured":"Eberhart, R.C., Kennedy, J.: A new optimizer using particle swarm theory. In: Proceedings of the Sixth International Symposium on Micro Machine and Human Science, vol. 1, pp. 39\u201343 (1995)","key":"17_CR19","DOI":"10.1109\/MHS.1995.494215"},{"issue":"2","key":"17_CR20","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1109\/TSMCB.2009.2015054","volume":"40","author":"S Kiranyaz","year":"2010","unstructured":"Kiranyaz, S., Ince, T., Yildirim, A., Gabbouj, M.: Fractional particle swarm optimization in multidimensional search space. IEEE Trans. Syst. Man Cybern. B Cybern. 40(2), 298\u2013319 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern. B Cybern."},{"issue":"3","key":"17_CR21","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/TEVC.2004.826070","volume":"8","author":"L Messerschmidt","year":"2004","unstructured":"Messerschmidt, L., Engelbrecht, A.P.: Learning to play games using a PSO-based competitive learning approach. IEEE Trans. Evol. Comput. 8(3), 280\u2013288 (2004)","journal-title":"IEEE Trans. Evol. Comput."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of Fourth International Conference on Soft Computing for Problem Solving"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2220-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T20:01:20Z","timestamp":1747252880000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-2220-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,24]]},"ISBN":["9788132222194","9788132222200"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2220-0_17","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014,12,24]]},"assertion":[{"value":"24 December 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}