{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T22:50:39Z","timestamp":1775170239359,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61801131"],"award-info":[{"award-number":["61801131"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s00034-022-02099-z","type":"journal-article","created":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:02:50Z","timestamp":1658152970000},"page":"6931-6959","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["COVER: A Secure Blind Image Watermarking Scheme"],"prefix":"10.1007","volume":"41","author":[{"given":"Yuling","family":"Luo","sequence":"first","affiliation":[]},{"given":"Fangxiao","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9790-1571","authenticated-orcid":false,"given":"Junxiu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Liangjia","family":"Li","sequence":"additional","affiliation":[]},{"given":"Su","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Shunsheng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"issue":"1","key":"2099_CR1","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.eswa.2016.10.056","volume":"72","author":"AM Abdelhakim","year":"2017","unstructured":"A.M. Abdelhakim, H.I. Saleh, A.M. Nassar, A quality guaranteed robust image watermarking optimization with artificial bee colony. Expert Syst. Appl. 72(1), 317\u2013326 (2017). https:\/\/doi.org\/10.1016\/j.eswa.2016.10.056","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"2099_CR2","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1016\/j.sigpro.2013.07.024","volume":"94","author":"M Ali","year":"2014","unstructured":"M. Ali, C.W. Ahn, An optimized watermarking technique based on self-adaptive DE in DWT-SVD transform domain. Signal Process. 94(1), 545\u2013556 (2014). https:\/\/doi.org\/10.1016\/j.sigpro.2013.07.024","journal-title":"Signal Process."},{"issue":"1","key":"2099_CR3","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.patrec.2016.12.010","volume":"94","author":"IA Ansari","year":"2017","unstructured":"I.A. Ansari, M. Pant, Multipurpose image watermarking in the domain of DWT based on SVD and ABC. Pattern Recogn. Lett. 94(1), 228\u2013236 (2017). https:\/\/doi.org\/10.1016\/j.patrec.2016.12.010","journal-title":"Pattern Recogn. Lett."},{"issue":"1","key":"2099_CR4","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.engappai.2015.12.004","volume":"49","author":"IA Ansari","year":"2016","unstructured":"I.A. Ansari, M. Pant, C.W. Ahn, Robust and false positive free watermarking in IWT domain using SVD and ABC. Eng. Appl. Artif. Intell. 49(1), 114\u2013125 (2016). https:\/\/doi.org\/10.1016\/j.engappai.2015.12.004","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"1","key":"2099_CR5","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.eswa.2018.06.024","volume":"112","author":"TK Araghi","year":"2018","unstructured":"T.K. Araghi, A.A. Manaf, S.K. Araghi, A secure blind discrete wavelet transform based watermarking scheme using two-level singular value decomposition. Expert Syst. Appl. 112(1), 208\u2013228 (2018). https:\/\/doi.org\/10.1016\/j.eswa.2018.06.024","journal-title":"Expert Syst. Appl."},{"issue":"5","key":"2099_CR6","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1007\/s11760-013-0555-x","volume":"9","author":"M Cedillo-Hernandez","year":"2015","unstructured":"M. Cedillo-Hernandez, F. Garcia-Ugalde, M. Nakano-Miyatake, H. Perez-Meana, Robust watermarking method in DFT domain for effective management of medical imaging. SIViP 9(5), 1163\u20131178 (2015). https:\/\/doi.org\/10.1007\/s11760-013-0555-x","journal-title":"SIViP"},{"issue":"1","key":"2099_CR7","doi-asserted-by":"publisher","first-page":"97549","DOI":"10.1109\/ACCESS.2019.2926831","volume":"7","author":"L Chen","year":"2019","unstructured":"L. Chen, J. Chen, G. Zhao, S. Wang, Cryptanalysis and improvement of a chaos-based watermarking scheme. IEEE Access 7(1), 97549\u201397565 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2926831","journal-title":"IEEE Access"},{"issue":"12","key":"2099_CR8","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673\u20131687 (1997). https:\/\/doi.org\/10.1109\/83.650120","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"2099_CR9","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s00371-018-1567-x","volume":"36","author":"F Ernawan","year":"2020","unstructured":"F. Ernawan, M.N. Kabir, A block-based RDWT-SVD image watermarking method using human visual system characteristics. Vis. Comput. 36(1), 19\u201337 (2020). https:\/\/doi.org\/10.1007\/s00371-018-1567-x","journal-title":"Vis. Comput."},{"issue":"1","key":"2099_CR10","doi-asserted-by":"publisher","first-page":"71699","DOI":"10.1109\/ACCESS.2018.2882405","volume":"6","author":"M Gonzalez-Lee","year":"2018","unstructured":"M. Gonzalez-Lee, H. Vazquez-Leal, J.F. Gomez-Aguilar, L.J. Morales-Mendoza, V.M. Jimenez-Fernandez, J.R. Laguna-Camacho, C.M. Calderon-Ramon, Exploring the cross-correlation as a means for detecting digital watermarks and its reformulation into the fractional calculus Framework. IEEE Access 6(1), 71699\u201371718 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2882405","journal-title":"IEEE Access"},{"issue":"6","key":"2099_CR11","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1049\/iet-ipr.2016.0515","volume":"11","author":"Y Guo","year":"2017","unstructured":"Y. Guo, B.Z. Li, N. Goel, Optimised blind image watermarking method based on firefly algorithm in DWT-QR transform domain. IET Image Proc. 11(6), 406\u2013415 (2017). https:\/\/doi.org\/10.1049\/iet-ipr.2016.0515","journal-title":"IET Image Proc."},{"issue":"1","key":"2099_CR12","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/tmm.2020.2982042","volume":"23","author":"W He","year":"2020","unstructured":"W. He, Z. Cai, Y. Wang, High-fidelity reversible image watermarking based on effective prediction error-pairs modification. IEEE Trans. Multimed. 23(1), 52\u201363 (2020). https:\/\/doi.org\/10.1109\/tmm.2020.2982042","journal-title":"IEEE Trans. Multimed."},{"issue":"3","key":"2099_CR13","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1134\/S0361768821030051","volume":"47","author":"DI Hern\u00e1ndez Far\u00edas","year":"2021","unstructured":"D.I. Hern\u00e1ndez Far\u00edas, R.G. Cabrera, T.C. Fraga, J.Z.H. Luna, J.F. Gomez Aguilar, Modification of the marching cubes algorithm to obtain a 3D representation of a planar image. Program. Comput. Softw. 47(3), 215\u2013223 (2021). https:\/\/doi.org\/10.1134\/S0361768821030051","journal-title":"Program. Comput. Softw."},{"issue":"2","key":"2099_CR14","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"Z Hua","year":"2018","unstructured":"Z. Hua, F. Jin, X. Binxuan, H. Huang, 2D Logistic-sine-coupling map for image encryption. Signal Process. 149(2), 148\u2013161 (2018). https:\/\/doi.org\/10.1016\/j.sigpro.2018.03.010","journal-title":"Signal Process."},{"issue":"12","key":"2099_CR15","doi-asserted-by":"publisher","first-page":"2868","DOI":"10.1016\/j.ijleo.2014.01.002","volume":"125","author":"SL Jia","year":"2014","unstructured":"S.L. Jia, A novel blind color images watermarking based on SVD. Optik 125(12), 2868\u20132874 (2014). https:\/\/doi.org\/10.1016\/j.ijleo.2014.01.002","journal-title":"Optik"},{"issue":"11","key":"2099_CR16","doi-asserted-by":"publisher","first-page":"13197","DOI":"10.1007\/s11042-017-4941-1","volume":"77","author":"X Kang","year":"2018","unstructured":"X. Kang, F. Zhao, G. Lin, Y. Chen, A novel hybrid of DCT and SVD in DWT domain for robust and invisible blind image watermarking with optimal embedding strength. Multimed. Tools Appl. 77(11), 13197\u201313224 (2018). https:\/\/doi.org\/10.1007\/s11042-017-4941-1","journal-title":"Multimed. Tools Appl."},{"issue":"14","key":"2099_CR17","doi-asserted-by":"publisher","first-page":"10561","DOI":"10.1007\/s00500-019-04563-6","volume":"24","author":"X Kang","year":"2019","unstructured":"X. Kang, Y. Chen, F. Zhao, G. Lin, Multi-dimensional particle swarm optimization for robust blind image watermarking using intertwining logistic map and hybrid domain. Soft Comput. 24(14), 10561\u201310584 (2019). https:\/\/doi.org\/10.1007\/s00500-019-04563-6","journal-title":"Soft Comput."},{"issue":"1","key":"2099_CR18","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ins.2019.11.005","volume":"517","author":"HJ Ko","year":"2020","unstructured":"H.J. Ko, C.T. Huang, G. Horng, S.J. Wang, Robust and blind image watermarking in DCT domain using inter-block coefficient correlation. Inf. Sci. 517(1), 128\u2013147 (2020). https:\/\/doi.org\/10.1016\/j.ins.2019.11.005","journal-title":"Inf. Sci."},{"key":"2099_CR19","doi-asserted-by":"publisher","unstructured":"L. Li, Y. Luo, J. Liu, S. Qiu, L. Li, A robust watermarking scheme with high security and low computational complexity, in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (2020), pp. 439\u2013454. https:\/\/doi.org\/10.1007\/978-3-030-63095-9_28","DOI":"10.1007\/978-3-030-63095-9_28"},{"issue":"4","key":"2099_CR20","doi-asserted-by":"publisher","first-page":"4545","DOI":"10.1007\/s11042-017-4452-0","volume":"77","author":"J Li","year":"2018","unstructured":"J. Li, C. Yu, B.B. Gupta, X. Ren, Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed. Tools Appl. 77(4), 4545\u20134561 (2018). https:\/\/doi.org\/10.1007\/s11042-017-4452-0","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"2099_CR21","doi-asserted-by":"publisher","first-page":"1329","DOI":"10.1007\/s11071-015-1946-z","volume":"80","author":"N Liu","year":"2015","unstructured":"N. Liu, H. Li, H. Dai, D. Guo, D. Chen, Robust blind image watermarking based on chaotic mixtures. Nonlinear Dyn. 80(3), 1329\u20131355 (2015). https:\/\/doi.org\/10.1007\/s11071-015-1946-z","journal-title":"Nonlinear Dyn."},{"issue":"3","key":"2099_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S021812741750033X","volume":"27","author":"Y Liu","year":"2017","unstructured":"Y. Liu, Y. Luo, S. Song, L. Cao, J. Liu, J. Harkin, Counteracting dynamical degradation of digital chaotic Chebyshev map via perturbation. Int. J. Bifurc. Chaos 27(3), 1\u201314 (2017). https:\/\/doi.org\/10.1142\/S021812741750033X","journal-title":"Int. J. Bifurc. Chaos"},{"issue":"1","key":"2099_CR23","doi-asserted-by":"publisher","first-page":"80849","DOI":"10.1109\/ACCESS.2019.2915596","volume":"7","author":"J Liu","year":"2019","unstructured":"J. Liu, J. Huang, Y. Luo, S. Lvchen Cao, D.W. Yang, R. Zhou, An optimized image watermarking method based on HD and SVD in DWT domain. IEEE Access 7(1), 80849\u201380860 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2915596","journal-title":"IEEE Access"},{"issue":"11\u201312","key":"2099_CR24","doi-asserted-by":"publisher","first-page":"7491","DOI":"10.1007\/s11042-019-08423-1","volume":"79","author":"D Liu","year":"2020","unstructured":"D. Liu, Z. Yuan, S. Qingtang, A blind color image watermarking scheme with variable steps based on Schur decomposition. Multimed. Tools Appl. 79(11\u201312), 7491\u20137513 (2020). https:\/\/doi.org\/10.1007\/s11042-019-08423-1","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"2099_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/tetc.2020.3048498","volume":"1","author":"J Liu","year":"2021","unstructured":"J. Liu, S. Zhang, Y. Luo, L. Cao, Machine learning-based similarity attacks for chaos-based cryptosystems. IEEE Trans. Emerg. Top. Comput. 1(1), 1\u201314 (2021). https:\/\/doi.org\/10.1109\/tetc.2020.3048498","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"2","key":"2099_CR26","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/j.cnsns.2014.05.022","volume":"20","author":"Y Luo","year":"2015","unstructured":"Y. Luo, D. Minghui, J. Liu, A symmetrical image encryption scheme in wavelet and time domain. Commun. Nonlinear Sci. Numer. Simul. 20(2), 447\u2013460 (2015). https:\/\/doi.org\/10.1016\/j.cnsns.2014.05.022","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"issue":"9","key":"2099_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0218127418501146","volume":"28","author":"Y Luo","year":"2018","unstructured":"Y. Luo, D. Zhang, J. Liu, Y. Liu, Y. Cao, X. Ding, Cryptanalysis of chaos-based cryptosystem from the hardware perspective. Int. J. Bifurc. Chaos 28(9), 1\u201314 (2018). https:\/\/doi.org\/10.1142\/S0218127418501146","journal-title":"Int. J. Bifurc. Chaos"},{"issue":"3","key":"2099_CR28","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1007\/s11071-018-4251-9","volume":"93","author":"Y Luo","year":"2018","unstructured":"Y. Luo, R. Zhou, J. Liu, Y. Cao, X. Ding, A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map. Nonlinear Dyn. 93(3), 1165\u20131181 (2018). https:\/\/doi.org\/10.1007\/s11071-018-4251-9","journal-title":"Nonlinear Dyn."},{"issue":"1","key":"2099_CR29","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.sigpro.2019.03.022","volume":"161","author":"Y Luo","year":"2019","unstructured":"Y. Luo, J. Lin, J. Liu, D. Wei, L. Cao, R. Zhou, Y. Cao, X. Ding, A robust image encryption algorithm based on Chua\u2019s circuit and compressive sensing. Signal Process. 161(1), 227\u2013247 (2019). https:\/\/doi.org\/10.1016\/j.sigpro.2019.03.022","journal-title":"Signal Process."},{"issue":"1","key":"2099_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2020.114272","volume":"168","author":"Y Luo","year":"2020","unstructured":"Y. Luo, L. Li, J. Liu, S. Tang, L. Cao, S. Zhang, S. Qiu, Y. Cao, A multi-scale image watermarking based on integer wavelet transform and singular value decomposition. Expert Syst. Appl. 168(1), 1\u201330 (2020). https:\/\/doi.org\/10.1016\/j.eswa.2020.114272","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"2099_CR31","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.ins.2020.12.065","volume":"556","author":"Y Luo","year":"2020","unstructured":"Y. Luo, Y. Liu, J. Liu, S. Tang, J. Harkin, Y. Cao, Counteracting dynamical degradation of a class of digital chaotic systems via unscented Kalman filter and perturbation. Inf. Sci. 556(1), 49\u201366 (2020). https:\/\/doi.org\/10.1016\/j.ins.2020.12.065","journal-title":"Inf. Sci."},{"issue":"2","key":"2099_CR32","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.aeue.2012.06.008","volume":"67","author":"NM Makbol","year":"2013","unstructured":"N.M. Makbol, B.E. Khoo, Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU Int. J. Electron. Commun. 67(2), 102\u2013112 (2013). https:\/\/doi.org\/10.1016\/j.aeue.2012.06.008","journal-title":"AEU Int. J. Electron. Commun."},{"issue":"1","key":"2099_CR33","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1049\/iet-ipr.2014.0965","volume":"10","author":"NM Makbol","year":"2016","unstructured":"N.M. Makbol, B.E. Khoo, T.H. Rassem, Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Proc. 10(1), 34\u201352 (2016). https:\/\/doi.org\/10.1049\/iet-ipr.2014.0965","journal-title":"IET Image Proc."},{"issue":"1","key":"2099_CR34","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.ins.2017.07.026","volume":"417","author":"NM Makbol","year":"2017","unstructured":"N.M. Makbol, B.E. Khoo, T.H. Rassem, K. Loukhaoukha, A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection. Inf. Sci. 417(1), 381\u2013400 (2017). https:\/\/doi.org\/10.1016\/j.ins.2017.07.026","journal-title":"Inf. Sci."},{"issue":"19","key":"2099_CR35","doi-asserted-by":"publisher","first-page":"9685","DOI":"10.1007\/s00500-018-3535-9","volume":"23","author":"E Moeinaddini","year":"2019","unstructured":"E. Moeinaddini, Selecting optimal blocks for image watermarking using entropy and distinct discrete firefly algorithm. Soft Comput. 23(19), 9685\u20139699 (2019). https:\/\/doi.org\/10.1007\/s00500-018-3535-9","journal-title":"Soft Comput."},{"issue":"1","key":"2099_CR36","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.dsp.2016.02.005","volume":"53","author":"SA Parah","year":"2016","unstructured":"S.A. Parah, J.A. Sheikh, N.A. Loan, G.M. Bhat, Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digital Signal Process. Rev. J. 53(1), 11\u201324 (2016). https:\/\/doi.org\/10.1016\/j.dsp.2016.02.005","journal-title":"Digital Signal Process. Rev. J."},{"issue":"4","key":"2099_CR37","doi-asserted-by":"publisher","first-page":"1933","DOI":"10.1007\/s11071-018-4299-6","volume":"93","author":"SA Parah","year":"2018","unstructured":"S.A. Parah, N.A. Loan, A.A. Shah, J.A. Sheikh, G.M. Bhat, A new secure and robust watermarking technique based on logistic map and modification of DC coefficient. Nonlinear Dyn. 93(4), 1933\u20131951 (2018). https:\/\/doi.org\/10.1007\/s11071-018-4299-6","journal-title":"Nonlinear Dyn."},{"issue":"22","key":"2099_CR38","doi-asserted-by":"publisher","first-page":"24221","DOI":"10.1007\/s11042-016-4164-x","volume":"76","author":"S Qingtang","year":"2017","unstructured":"S. Qingtang, B. Chen, An improved color image watermarking scheme based on Schur decomposition. Multimed. Tools Appl. 76(22), 24221\u201324249 (2017). https:\/\/doi.org\/10.1007\/s11042-016-4164-x","journal-title":"Multimed. Tools Appl."},{"issue":"6","key":"2099_CR39","doi-asserted-by":"publisher","first-page":"8781","DOI":"10.1007\/s11042-016-3522-z","volume":"76","author":"S Qingtang","year":"2017","unstructured":"S. Qingtang, G. Wang, G. Lv, X. Zhang, G. Deng, B. Chen, A novel blind color image watermarking based on Contourlet transform and Hessenberg decomposition. Multimed. Tools Appl. 76(6), 8781\u20138801 (2017). https:\/\/doi.org\/10.1007\/s11042-016-3522-z","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"2099_CR40","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1007\/s11045-017-0487-7","volume":"29","author":"S Qingtang","year":"2018","unstructured":"S. Qingtang, G. Wang, X. Zhang, G. Lv, B. Chen, A new algorithm of blind color image watermarking based on LU decomposition. Multidimens. Syst. Signal Process. 29(3), 1055\u20131074 (2018). https:\/\/doi.org\/10.1007\/s11045-017-0487-7","journal-title":"Multidimens. Syst. Signal Process."},{"issue":"1","key":"2099_CR41","doi-asserted-by":"publisher","first-page":"4358","DOI":"10.1109\/ACCESS.2018.2888857","volume":"7","author":"S Qingtang","year":"2019","unstructured":"S. Qingtang, Z. Yuan, D. Liu, An approximate Schur decomposition-based spatial domain color image watermarking method. IEEE Access 7(1), 4358\u20134370 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2018.2888857","journal-title":"IEEE Access"},{"issue":"1","key":"2099_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.sigpro.2020.107556","volume":"172","author":"D Rajani","year":"2018","unstructured":"D. Rajani, P. Rajesh Kumar, An optimized blind watermarking scheme based on principal component analysis in redundant discrete wavelet domain. Signal Process. 172(1), 1\u201313 (2018). https:\/\/doi.org\/10.1016\/j.sigpro.2020.107556","journal-title":"Signal Process."},{"issue":"4","key":"2099_CR43","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.aeue.2016.12.003","volume":"72","author":"S Roy","year":"2017","unstructured":"S. Roy, A.K. Pal, A blind DCT based color watermarking algorithm for embedding multiple watermarks. AEU Int. J. Electron. Commun. 72(4), 149\u2013161 (2017). https:\/\/doi.org\/10.1016\/j.aeue.2016.12.003","journal-title":"AEU Int. J. Electron. Commun."},{"issue":"7","key":"2099_CR44","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1016\/j.optcom.2011.11.117","volume":"285","author":"Q Su","year":"2012","unstructured":"Q. Su, Y. Niu, X. Liu, Y. Zhu, A blind dual color images watermarking based on IWT and state coding. Opt. Commun. 285(7), 1717\u20131724 (2012). https:\/\/doi.org\/10.1016\/j.optcom.2011.11.117","journal-title":"Opt. Commun."},{"issue":"7","key":"2099_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIFS.2014.2322497","volume":"9","author":"M Urvoy","year":"2014","unstructured":"M. Urvoy, D. Goudia, F. Autrusseau, Perceptual DFT watermarking with improved detection and robustness to geometrical distortions. IEEE Trans. Inf. Forensics Secur. 9(7), 1\u201312 (2014). https:\/\/doi.org\/10.1109\/TIFS.2014.2322497","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"2099_CR46","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/83.982816","volume":"11","author":"Y Wang","year":"2002","unstructured":"Y. Wang, J.F. Doherty, R.E. Van Dyck, A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans. Image Process. 11(2), 77\u201388 (2002). https:\/\/doi.org\/10.1109\/83.982816","journal-title":"IEEE Trans. Image Process."},{"issue":"4","key":"2099_CR47","doi-asserted-by":"publisher","first-page":"765","DOI":"10.3745\/JIPS.03.0055","volume":"12","author":"D Wang","year":"2016","unstructured":"D. Wang, F. Yang, H. Zhang, Blind color image watermarking based on DWT and LU decomposition. J. Inf. Process. Syst. 12(4), 765\u2013778 (2016). https:\/\/doi.org\/10.3745\/JIPS.03.0055","journal-title":"J. Inf. Process. Syst."},{"issue":"5","key":"2099_CR48","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1109\/TBCAS.2020.2995869","volume":"14","author":"S Xiao","year":"2020","unstructured":"S. Xiao, W. Liu, Y. Guo, Z. Yu, Low-cost adaptive exponential integrate-and-fire neuron using stochastic computing. IEEE Trans. Biomed. Circuits Syst. 14(5), 942\u2013950 (2020). https:\/\/doi.org\/10.1109\/TBCAS.2020.2995869","journal-title":"IEEE Trans. Biomed. Circuits Syst."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-022-02099-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-022-02099-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-022-02099-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T18:10:18Z","timestamp":1666289418000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-022-02099-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":48,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["2099"],"URL":"https:\/\/doi.org\/10.1007\/s00034-022-02099-z","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,18]]},"assertion":[{"value":"3 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}