{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T01:23:41Z","timestamp":1773451421790,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T00:00:00Z","timestamp":1586563200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T00:00:00Z","timestamp":1586563200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100012964","name":"Minist\u00e8re de l\u2019Enseignement Sup\u00e9rieur et de la Recherche Scientifique","doi-asserted-by":"publisher","award":["LR11ES48"],"award-info":[{"award-number":["LR11ES48"]}],"id":[{"id":"10.13039\/100012964","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s00034-020-01401-1","type":"journal-article","created":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T13:02:31Z","timestamp":1586610151000},"page":"5059-5103","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Novel and Robust Image Watermarking for Copyright Protection and Integrity Control"],"prefix":"10.1007","volume":"39","author":[{"given":"Nesrine","family":"Tarhouni","sequence":"first","affiliation":[]},{"given":"Maha","family":"Charfeddine","sequence":"additional","affiliation":[]},{"given":"Chokri","family":"Ben Amar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,11]]},"reference":[{"key":"1401_CR1","doi-asserted-by":"publisher","DOI":"10.3923\/jai.2017.32.41","author":"FW Alsaade","year":"2016","unstructured":"F.W. Alsaade, Watermarking for content integrity and ownership control of medical images. J. Artif. Intell. (2016). https:\/\/doi.org\/10.3923\/jai.2017.32.41","journal-title":"J. Artif. Intell."},{"key":"1401_CR2","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1016\/j.procs.2015.10.046","volume":"70","author":"RAAK Bhullar","year":"2015","unstructured":"R.A.A.K. Bhullar, D. Dangwal, S. Kumar, A zero-watermarking scheme using discrete wavelet transform. Procedia Comput. Sci. 70, 603\u2013609 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"1401_CR3","first-page":"406","volume":"11","author":"S Bekkouch","year":"2015","unstructured":"S. Bekkouch, K.M. Faraoun, Robust and reversible image watermarking scheme using combined DCT-DWT-SVD transforms. J. Inf. Process. Syst. 11, 406\u2013420 (2015)","journal-title":"J. Inf. Process. Syst."},{"issue":"3","key":"1401_CR4","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.cviu.2007.09.014","volume":"110","author":"H Bay","year":"2008","unstructured":"H. Bay, A. Ess, T. Tuytelaars, L. Gool, SURF: Speeded up robust features. Comput. Vis. Image Underst. (CVIU) 110(3), 346\u2013359 (2008)","journal-title":"Comput. Vis. Image Underst. (CVIU)"},{"key":"1401_CR5","first-page":"297","volume":"3","author":"MK Baby","year":"2017","unstructured":"M.K. Baby, A. Madhu, Watermarking based biomedical image integrity control with DCT lossless compression. Int. J. Adv. Sci. Technol. Eng. Manag. Sci. 3, 297\u2013303 (2017)","journal-title":"Int. J. Adv. Sci. Technol. Eng. Manag. Sci."},{"key":"1401_CR6","doi-asserted-by":"crossref","unstructured":"W.C. Chen, Y. Xiong, J. Gao, N. Gelfand, R. Grzeszczuk, Efficient extraction of robust image features on mobile devices, in 6th IEEE and ACM International Symposium on Mixed and Augmented Reality, ISMAR, pp. 287\u2013288 (2007)","DOI":"10.1109\/ISMAR.2007.4538870"},{"key":"1401_CR7","doi-asserted-by":"publisher","first-page":"1521","DOI":"10.1007\/s11042-012-1167-0","volume":"70","author":"M Charfeddine","year":"2012","unstructured":"M. Charfeddine, M. El\u2019arbi, C.B. Amar, A new DCT audio watermarking scheme based on preliminary MP3 study. Multimed. Tools Appl. 70, 1521\u20131557 (2012)","journal-title":"Multimed. Tools Appl."},{"key":"1401_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2016.45","author":"WJ Chen","year":"2016","unstructured":"W.J. Chen, R.W. Xiaolong, W.T. Meng, Affine correction based image watermarking robust to geometric attacks. Int. Conf. Parallel Distrib. Comput. Appl. Technol. (2016). https:\/\/doi.org\/10.1109\/PDCAT.2016.45","journal-title":"Int. Conf. Parallel Distrib. Comput. Appl. Technol."},{"key":"1401_CR9","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.81665","author":"L Dong","year":"2018","unstructured":"L. Dong, Y. Zhang, X. Shi, On feature-based sar image registration: appropriate feature and retrieval algorithm. Adv. Remote Sens. Technol. Coast. Environ. Disasters Infrastruct. (2018). https:\/\/doi.org\/10.5772\/intechopen.81665","journal-title":"Adv. Remote Sens. Technol. Coast. Environ. Disasters Infrastruct."},{"key":"1401_CR10","doi-asserted-by":"publisher","first-page":"17701","DOI":"10.1007\/s11042-018-7084-0","volume":"78","author":"G Ertugrul","year":"2019","unstructured":"G. Ertugrul, S. Ozturk, A novel hash function based fragile watermarking method for image integrity. Multimed. Tools Appl. 78, 17701\u201317718 (2019)","journal-title":"Multimed. Tools Appl."},{"key":"1401_CR11","first-page":"0975","volume":"125","author":"WK ElSaid","year":"2015","unstructured":"W.K. ElSaid, Watermarking digital artworks. Int. J. Comput. Appl. 125, 0975\u20138887 (2015)","journal-title":"Int. J. Comput. Appl."},{"key":"1401_CR12","doi-asserted-by":"publisher","first-page":"240","DOI":"10.13164\/re.2015.0240","volume":"24","author":"MC Hernandez","year":"2015","unstructured":"M.C. Hernandez, A.C.H. Garcia-Ugalde, M.N. Miyatake, H.P. Meana, Copyright protection of color imaging using robust-encoded watermarking. Radioengineering 24, 240\u2013251 (2015)","journal-title":"Radioengineering"},{"key":"1401_CR13","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.jvcir.2015.02.009","volume":"24","author":"G Jianting","year":"2015","unstructured":"G. Jianting, P. Zheng, J. Huang, Secure watermarking scheme against watermark attacks in the encrypted domain. J. Vis. Commun. Image Represent. 24, 125\u2013135 (2015)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"1401_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/NOORIC.2013.18","author":"F Kurniawan","year":"2013","unstructured":"F. Kurniawan, M.S. Khalil, M.K. Khan, Y.M. Alginahi, Exploiting digital watermarking to preserve integrity of the digital Holy Quran images. Int. Conf. Adv. Inf. Technol. Holy Quran Sci. (2013). https:\/\/doi.org\/10.1109\/NOORIC.2013.18","journal-title":"Int. Conf. Adv. Inf. Technol. Holy Quran Sci."},{"key":"1401_CR15","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1117\/12.344672","volume":"33657","author":"M Kutter","year":"1999","unstructured":"M. Kutter, F. Petitcolas, A fair benchmark for image watermarking systems. SPIE Conf. Secur. Watermarking Multimed. Contents 33657, 226\u2013239 (1999)","journal-title":"SPIE Conf. Secur. Watermarking Multimed. Contents"},{"key":"1401_CR16","doi-asserted-by":"publisher","unstructured":"S. Kamble, S. Agarwal, V.K. Shrivastava, V. Maheshkar, DCT based texture watermarking using GLCM. Int. Adv. Comput. Conf. (2010). https:\/\/doi.org\/10.1109\/IADCC.2010.5423014","DOI":"10.1109\/IADCC.2010.5423014"},{"key":"1401_CR17","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-319-13156-6_2","volume-title":"Watermarking for Image Authentication","author":"C Ling","year":"2015","unstructured":"C. Ling, O.U. Rehman, Watermarking for Image Authentication (Springer, Basel, 2015), pp. 43\u201373. https:\/\/doi.org\/10.1007\/978-3-319-13156-6_2"},{"key":"1401_CR18","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1007\/s13369-015-1596-y","volume":"40","author":"L Laouamer","year":"2015","unstructured":"L. Laouamer, O. Tayan, A Semi-blind robust DCT watermarking approach for sensitive text images. Arab. J. Sci. Eng. 40, 1097\u20131109 (2015)","journal-title":"Arab. J. Sci. Eng."},{"key":"1401_CR19","unstructured":"LIGM, Laboratoire d\u2019Informatique Gaspard -Monge. http:\/\/igm.univmlv.fr\/~incerti\/IMAGES\/PPM.htm. Accessed April 2018"},{"key":"1401_CR20","doi-asserted-by":"crossref","unstructured":"M. Moosazadeh, G. Ekbatanifard, Robust image watermarking algorithm using DCT coefficients relation in YCoCg-R color space, in Eighth International Conference on Information and Knowledge Technology (IKT) (Hamedan, Iran, 2016), pp. 263\u2013267","DOI":"10.1109\/IKT.2016.7777788"},{"key":"1401_CR21","first-page":"102","volume":"37","author":"M Nasrin","year":"2013","unstructured":"M. Nasrin, B.E. Khoo, Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU Int. J. Electron. Commun. 37, 102\u2013112 (2013)","journal-title":"AEU Int. J. Electron. Commun."},{"key":"1401_CR22","first-page":"227-231231","volume":"2","author":"AM Osman","year":"2012","unstructured":"A.M. Osman, E.A.A. Osman, R. Row, Invisible digital image watermarking in spatial domain with random localization. Int. J. Eng. Innov. Technol. (IJEIT) 2, 227-231231 (2012)","journal-title":"Int. J. Eng. Innov. Technol. (IJEIT)"},{"key":"1401_CR23","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.jvcir.2016.10.004","volume":"41","author":"WC Peng","year":"2016","unstructured":"W.C. Peng, X. Wang, Z.Q. Xia, C. Zhang, X.J. Chen, Geometrically resilient color image zero-watermarking algorithm based on quaternion exponent moments. J. Vis. Commun. Image Represent. 41, 247\u2013259 (2016)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"1401_CR24","doi-asserted-by":"publisher","unstructured":"S .R. Priyanka, S. Maheshkar, Robust multiple composite watermarking using LSB technique, in Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, Advances in Intelligent Systems and Computing, pp. 209\u2013217 (2017). https:\/\/doi.org\/10.1007\/978-981-10-3153-3_21","DOI":"10.1007\/978-981-10-3153-3_21"},{"key":"1401_CR25","doi-asserted-by":"publisher","unstructured":"A. Roy, A.K. Maiti, K. Ghosh, A perception based color image adaptive watermarking scheme in YCbCr space. Int. Conf. Signal Process. Integr. Netw. (2015). https:\/\/doi.org\/10.1109\/SPIN.2015.7095399","DOI":"10.1109\/SPIN.2015.7095399"},{"key":"1401_CR26","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.170326","author":"S Roy","year":"2017","unstructured":"S. Roy, A.K. Pal, An indirect watermark hiding in discrete cosine transform-singular value decomposition domain for copyright protection. R. Soc. Open Sci. (2017). https:\/\/doi.org\/10.1098\/rsos.170326","journal-title":"R. Soc. Open Sci."},{"key":"1401_CR27","unstructured":"Reading Al Quran. http:\/\/readingalquran.com\/alquran.php?part=30, Accessed April 2018"},{"key":"1401_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/ICMETE.2016.103","author":"A Singh","year":"2016","unstructured":"A. Singh, J. Nigam, R. Thakur, R. Gupta, A. Kumar, Wavelet based robust watermarking technique for integrity control in medical images. Int. Conf. Micro-Electron. Telecommun. Eng. (2016). https:\/\/doi.org\/10.1109\/ICMETE.2016.103","journal-title":"Int. Conf. Micro-Electron. Telecommun. Eng."},{"key":"1401_CR29","unstructured":"S.H. Soleymani, A.H. Taherinia, A.H. Mohajerzadeh, A blind robust watermarking method based on Arnold Cat map and amplified pseudo-noise strings with weak correlation. J. Vis. Commun. Image Represent. (2018). arXiv:1804.11240v1. Accessed 19 Jan 2020"},{"key":"1401_CR30","doi-asserted-by":"publisher","unstructured":"N. Tarhouni, M. Charfddine, C.B. Amar, A New Robust and Blind Image Watermarking Scheme In Frequency Domain Based On Optimal Blocks Selection, Int. Conf. Cent. Eur. Comput. Graph. Vis. Comput. Vis. (2018). https:\/\/doi.org\/10.24132\/CSRN.2018.2802.11","DOI":"10.24132\/CSRN.2018.2802.11"},{"key":"1401_CR31","first-page":"184","volume":"17","author":"N Tiwari","year":"2017","unstructured":"N. Tiwari, Sharmilaand, Digital watermarking applications, parameter measures and techniques. Int. J. Comput. Sci. Netw. Secur. 17, 184\u2013194 (2017)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"1401_CR32","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2013.2245415","author":"H Tian","year":"2013","unstructured":"H. Tian, Y. Zhao, R. Ni, L. Qin, X. Li, LDFT-based watermarking resilient to local desynchronization attacks. IEEE Trans. Cybern. (2013). https:\/\/doi.org\/10.1109\/TCYB.2013.2245415","journal-title":"IEEE Trans. Cybern."},{"key":"1401_CR33","doi-asserted-by":"publisher","DOI":"10.3390\/app8030410","author":"C Wang","year":"2018","unstructured":"C. Wang, Y. Zhang, X. Zhou, Robust image watermarking algorithm based on ASIFT against geometric attacks. Appl. Sci. (2018). https:\/\/doi.org\/10.3390\/app8030410","journal-title":"Appl. Sci."},{"key":"1401_CR34","doi-asserted-by":"publisher","DOI":"10.3390\/a10010027","author":"H Zhang","year":"2017","unstructured":"H. Zhang, C. Wang, X. Zhou, Fragile watermarking for image authentication using the characteristic of SVD. Algorithms (2017). https:\/\/doi.org\/10.3390\/a10010027","journal-title":"Algorithms"},{"key":"1401_CR35","doi-asserted-by":"publisher","DOI":"10.3390\/a10020041","author":"Y Zhang","year":"2017","unstructured":"Y. Zhang, C. Wang, X. Zhou, RST resilient watermarking scheme based on DWT-SVD and scale-invariant feature transform. Algorithms (2017). https:\/\/doi.org\/10.3390\/a10020041","journal-title":"Algorithms"}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-020-01401-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-020-01401-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-020-01401-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T23:30:48Z","timestamp":1618097448000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-020-01401-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,11]]},"references-count":35,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["1401"],"URL":"https:\/\/doi.org\/10.1007\/s00034-020-01401-1","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,11]]},"assertion":[{"value":"4 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}