{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:32:08Z","timestamp":1742913128956,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811666155"},{"type":"electronic","value":"9789811666162"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6616-2_8","type":"book-chapter","created":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T12:03:01Z","timestamp":1650715381000},"page":"77-87","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Multiblock Region-Based Arnold Transformation for Image Watermarking Combined with DWT-PSO Technique"],"prefix":"10.1007","author":[{"given":"Kumari","family":"Rinki","sequence":"first","affiliation":[]},{"given":"Pushpneel","family":"Verma","sequence":"additional","affiliation":[]},{"given":"Ranjeet Kumar","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,24]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Rinki, K., Verma, P., Singh, R.K.: A novel matrix multiplication based LSB substitution mechanism for data security and authentication. J. King Saud Univ. Comput. Inf. Sci. (2021)","DOI":"10.1016\/j.jksuci.2021.01.013"},{"issue":"7","key":"8_CR2","doi-asserted-by":"publisher","first-page":"8603","DOI":"10.1007\/s11042-018-7128-5","volume":"78","author":"N Agarwal","year":"2019","unstructured":"Agarwal, N., Singh, A.K., Singh, P.K.: Survey of robust and imperceptible watermarking. Multimedia Tools Appl. 78(7), 8603\u20138633 (2019)","journal-title":"Multimedia Tools Appl."},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Elayan, M.A., Ahmad, M.O.: Digital watermarking scheme based on Arnold and anti-Arnold transforms. In: International Conference on Image and Signal Processing, pp. 317\u2013327. Springer, Cham (2016)","DOI":"10.1007\/978-3-319-33618-3_32"},{"key":"8_CR4","first-page":"677","volume":"9","author":"S Kaur","year":"2017","unstructured":"Kaur, S., Talwar, R.: Arnold transforms-based security enhancement using digital image watermarking with complex wavelet transform. Int. J. Electron. Eng. Res. 9, 677\u2013693 (2017)","journal-title":"Int. J. Electron. Eng. Res."},{"issue":"10","key":"8_CR5","doi-asserted-by":"publisher","first-page":"2052","DOI":"10.1049\/iet-ipr.2019.1059","volume":"14","author":"R Singh","year":"2020","unstructured":"Singh, R., Ashok, A., Saraswat, M.: Optimized robust watermarking technique using CKGSA in DCT-SVD domain. IET Image Proc. 14(10), 2052\u20132063 (2020)","journal-title":"IET Image Proc."},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Aslantas, V., Dogan, A.L., Ozturk, S.: DWT-SVD based image watermarking using particle swarm optimizer. In: 2008 IEEE International Conference on Multimedia and Expo, pp. 241\u2013244. IEEE (2008)","DOI":"10.1109\/ICME.2008.4607416"},{"key":"8_CR7","unstructured":"Tao, H., Zain, J.M., Ahmed, M.M., Abdalla, A.N., Jing, W.: A Wavelet-Based Particle Swarm Optimization Algorithm Applied to Digital Image Watermarking."},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Lavanya, A., Natarajan, V.: Analyzing the performance of watermarking based on swarm optimization methods. In: Advances in Computing and Information Technology, pp. 167\u2013176. Springer, Berlin, Heidelberg (2013)","DOI":"10.1007\/978-3-642-31600-5_17"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Wang, Z., Sun, X., Zhang, D.: A novel watermarking scheme based on PSO algorithm. In: International Conference on Life System Modeling and Simulation, pp. 307\u2013314. Springer, Berlin, Heidelberg (2007)","DOI":"10.1007\/978-3-540-74769-7_34"},{"issue":"12","key":"8_CR10","first-page":"103","volume":"14","author":"A Saxena","year":"2016","unstructured":"Saxena, A., Badal, N.: A deterministic digital watermarking approach based on bird swarm optimization. Int. J. Comput. Sci. Inf. Secur. 14(12), 103 (2016)","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Rengarajan, A.: Data hiding in encrypted images using Arnold transform.\u00a0ICTACT J. Image Video Process. 7(1) (2016)","DOI":"10.21917\/ijivp.2016.0194"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Singh, R., Ashok, A.: An optimized robust watermarking technique using CKGSA in frequency domain. J. Inf. Secur. Appl. 58, 102734 (2021)","DOI":"10.1016\/j.jisa.2020.102734"},{"issue":"1","key":"8_CR13","first-page":"101","volume":"5","author":"S Kamble","year":"2012","unstructured":"Kamble, S., Maheshkar, V., Agarwal, S., Srivastava, V.K.: DWT-SVD based robust image watermarking using Arnold map. Int. J. Inf. Technol. Knowl. Manage. 5(1), 101\u2013105 (2012)","journal-title":"Int. J. Inf. Technol. Knowl. Manage."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Wu, M., Liu, B.: Watermarking for image authentication. In: Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No. 98CB36269), Vol. 2, pp. 437\u2013441. IEEE (1998","DOI":"10.1109\/ICIP.1998.723413"}],"container-title":["Smart Innovation, Systems and Technologies","Evolution in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6616-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,22]],"date-time":"2024-09-22T20:44:29Z","timestamp":1727037869000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6616-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811666155","9789811666162"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6616-2_8","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}