{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:59:49Z","timestamp":1743076789178,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811580604"},{"type":"electronic","value":"9789811580611"}],"license":[{"start":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:00:00Z","timestamp":1607644800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:00:00Z","timestamp":1607644800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-8061-1_4","type":"book-chapter","created":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T20:08:45Z","timestamp":1607630925000},"page":"43-54","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Robust Watermarking Scheme for Compressed Image Through DCT Exploiting Superpixel and Arnold Transform"],"prefix":"10.1007","author":[{"given":"Prabhash Kumar","family":"Singh","sequence":"first","affiliation":[]},{"given":"Biswapati","family":"Jana","sequence":"additional","affiliation":[]},{"given":"Kakali","family":"Datta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,11]]},"reference":[{"issue":"5","key":"4_CR1","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1109\/TITB.2012.2207730","volume":"16","author":"D Bouslimi","year":"2012","unstructured":"Bouslimi D, Coatrieux G, Cozic M, Roux C (2012) A joint encryptionwatermarking system for verifying the reliability of medical images. IEEE Trans Inf Technol Biomed 16(5):891\u2013899","journal-title":"IEEE Trans Inf Technol Biomed"},{"unstructured":"Singh PK, Jana B, Halder S (2018) Copy move forgery detection through graph neighborhood degree. Int J Appl Eng Res 13(18):13421\u201313427","key":"4_CR2"},{"issue":"5","key":"4_CR3","doi-asserted-by":"publisher","first-page":"5149","DOI":"10.1007\/s11042-017-4388-4","volume":"77","author":"F Li","year":"2018","unstructured":"Li F, Mao Q, Chang CC (2018) Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method. Multimed Tools Appl 77(5):5149\u20135168","journal-title":"Multimed Tools Appl"},{"unstructured":"Tirkel AZ, van Schyndel RG, Osborne CF (1995). A two-dimensional digital watermark. Dicta 95(7):5\u20138","key":"4_CR4"},{"unstructured":"Soleimani M, Nezhad FS, Mahdipour H, Khademi M (2012) A robust digital blind image watermarking based on spread spectrum in DCT domain. Sci Acad Trans Comput Commun Netw (SATCCN) 2(2)","key":"4_CR5"},{"issue":"3","key":"4_CR6","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.aeue.2013.08.018","volume":"68","author":"C Das","year":"2014","unstructured":"Das C, Panigrahi S, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU-Int J Electron Commun 68(3):244\u2013253","journal-title":"AEU-Int J Electron Commun"},{"doi-asserted-by":"crossref","unstructured":"Cedillo-Hernandez M, Garcia-Ugalde FJ, Nakano-Miyatake M, Perez-Meana HM (2012) DFT-based watermarking method for medical images. In: 2012 IEEE ninth electronics, robotics and automotive mechanics conference. IEEE, pp 21\u201324","key":"4_CR7","DOI":"10.1109\/CERMA.2012.11"},{"doi-asserted-by":"crossref","unstructured":"Pun CM (2006) A novel DFT-based digital watermarking system for images. In: 2006 8th international conference on signal processing, vol 2. IEEE","key":"4_CR8","DOI":"10.1109\/ICOSP.2006.345581"},{"issue":"2","key":"4_CR9","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.aeue.2015.11.003","volume":"70","author":"HT Hu","year":"2016","unstructured":"Hu HT, Hsu LY (2016) A mixed modulation scheme for blind image watermarking. AEU-Int J Electron Commun 70(2):172\u2013178","journal-title":"AEU-Int J Electron Commun"},{"issue":"23","key":"4_CR10","doi-asserted-by":"publisher","first-page":"4367","DOI":"10.1016\/j.ijleo.2015.08.042","volume":"126","author":"M Khalili","year":"2015","unstructured":"Khalili M (2015) DCT-Arnold chaotic based watermarking using JPEG-YCbCr. Optik 126(23):4367\u20134371","journal-title":"Optik"},{"doi-asserted-by":"crossref","unstructured":"Al-Haj A, Hussein N, Abandah G (2016) Combining cryptography and digital watermarking for secured transmission of medical images. In: 2016 2nd international conference on information management (ICIM). IEEE, pp 40\u201346","key":"4_CR11","DOI":"10.1109\/INFOMAN.2016.7477531"},{"issue":"1","key":"4_CR12","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s00500-017-2489-7","volume":"22","author":"Q Su","year":"2018","unstructured":"Su Q, Chen B (2018) Robust color image watermarking technique in the spatial domain. Soft Comput 22(1):91\u2013106","journal-title":"Soft Comput"},{"doi-asserted-by":"crossref","unstructured":"Pal P, Chowdhuri P, Jana B (2017) Reversible watermarking scheme using PVD-DE. In: International conference on computational intelligence, communications, and business analytics. Springer, Singapore, pp 511\u2013524","key":"4_CR13","DOI":"10.1007\/978-981-10-6427-2_41"},{"issue":"18","key":"4_CR14","doi-asserted-by":"publisher","first-page":"23073","DOI":"10.1007\/s11042-017-5568-y","volume":"77","author":"P Pal","year":"2018","unstructured":"Pal P, Chowdhuri P, Jana B (2018) Weighted matrix based reversible watermarking scheme using color image. Multimed Tools Appl 77(18):23073\u201323098","journal-title":"Multimed Tools Appl"},{"doi-asserted-by":"crossref","unstructured":"Pal P, Jana B, Bhaumik J (2019) Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image. Secur Privacy 2(2):e59","key":"4_CR15","DOI":"10.1002\/spy2.59"},{"issue":"12","key":"4_CR16","doi-asserted-by":"publisher","first-page":"2116","DOI":"10.1049\/iet-ipr.2018.6638","volume":"13","author":"P Pal","year":"2019","unstructured":"Pal P, Jana B, Bhaumik J (2019) Robust watermarking scheme for tamper detection and authentication exploiting CA. IET Image Process 13(12):2116\u20132129","journal-title":"IET Image Process"},{"doi-asserted-by":"crossref","unstructured":"Sultan K, Aldhafferi N, Alqahtani A, Mahmud M (2018) Reversible and fragile watermarking for medical images. Comput Math Methods Med","key":"4_CR17","DOI":"10.1155\/2018\/3461382"},{"doi-asserted-by":"crossref","unstructured":"Ren X, Malik J (2003) Learning a classification model for segmentation. In: Null. IEEE, p 10","key":"4_CR18","DOI":"10.1109\/ICCV.2003.1238308"},{"issue":"11","key":"4_CR19","doi-asserted-by":"publisher","first-page":"2274","DOI":"10.1109\/TPAMI.2012.120","volume":"34","author":"R Achanta","year":"2012","unstructured":"Achanta R, Shaji A, Smith K, Lucchi A, Fua P, Susstrunk S (2012) SLIC superpixels compared to state-of-the-art superpixel methods. IEEE Trans Pattern Anal Mach Intell 34(11):2274\u20132282","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"1\u20132","key":"4_CR20","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/S0020-0255(01)00194-3","volume":"141","author":"CC Chang","year":"2002","unstructured":"Chang CC, Chen TS, Chung LZ (2002) A steganographic method based upon JPEG and quantization table modification. Inf Sci 141(1\u20132):123\u2013138","journal-title":"Inf Sci"},{"issue":"13","key":"4_CR21","doi-asserted-by":"publisher","first-page":"2768","DOI":"10.1016\/j.ins.2007.02.019","volume":"177","author":"CC Chang","year":"2007","unstructured":"Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177(13):2768\u20132786","journal-title":"Inf Sci"},{"issue":"8","key":"4_CR22","doi-asserted-by":"publisher","first-page":"1782","DOI":"10.1109\/TIP.2009.2021313","volume":"18","author":"SM Rahman","year":"2009","unstructured":"Rahman SM, Ahmad MO, Swamy MNS (2009) A new statistical detector for DWT-based additive image watermarking using the Gauss-Hermite expansion. IEEE Trans Image Process 18(8):1782\u20131796","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"4_CR23","first-page":"220","volume":"1","author":"CC Lin","year":"2010","unstructured":"Lin CC, Shiu PF (2010) High capacity data hiding scheme for DCT-based images. J Inf Hiding Multimed Signal Process 1(3):220\u2013240","journal-title":"J Inf Hiding Multimed Signal Process"},{"issue":"2","key":"4_CR24","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s11760-011-0238-4","volume":"7","author":"W Sun","year":"2013","unstructured":"Sun W, Lu ZM, Wen YC, Yu FX, Shen RJ (2013) High performance reversible data hiding for block truncation coding compressed images. Signal, Image Video Process 7(2):297\u2013306","journal-title":"Signal, Image Video Process"},{"issue":"11","key":"4_CR25","doi-asserted-by":"publisher","first-page":"13493","DOI":"10.1007\/s11042-016-3722-6","volume":"76","author":"M Saidi","year":"2017","unstructured":"Saidi M, Hermassi H, Rhouma R, Belghith S (2017) A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl 76(11):13493\u201313510","journal-title":"Multimed Tools Appl"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Sixth International Conference on Mathematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-8061-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T20:11:09Z","timestamp":1607631069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-8061-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,11]]},"ISBN":["9789811580604","9789811580611"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-8061-1_4","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,12,11]]},"assertion":[{"value":"11 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}