{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T15:22:30Z","timestamp":1758122550326},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T00:00:00Z","timestamp":1674777600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T00:00:00Z","timestamp":1674777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s00034-023-02294-6","type":"journal-article","created":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T20:32:37Z","timestamp":1674851557000},"page":"3926-3962","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Vector SENM-HMT-Based Statistical Watermark Decoder in NSST\u2013PLCT Magnitude Domain"],"prefix":"10.1007","volume":"42","author":[{"given":"Hongying","family":"Yang","sequence":"first","affiliation":[]},{"given":"Tongtong","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Yixuan","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Panpan","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Xiangyang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,27]]},"reference":[{"issue":"1","key":"2294_CR1","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/TCI.2018.2794065","volume":"4","author":"B Ahmaderaghi","year":"2018","unstructured":"B. Ahmaderaghi, F. Kurugollu, J.M.D. Rincon, A. Bouridane, Blind image watermark detection algorithm based on discrete shearlet transform using statistical decision theory. IEEE Trans. Comput. Imaging 4(1), 45\u201359 (2018)","journal-title":"IEEE Trans. Comput. Imaging"},{"issue":"2","key":"2294_CR2","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1109\/TCSVT.2016.2607299","volume":"28","author":"M Amini","year":"2018","unstructured":"M. Amini, M.O. Ahmad, M.N.S. Swamy, A robust multibit multiplicative watermark decoder using vector-based hidden Markov model in wavelet domain. IEEE Trans. Circuits Syst. Video Technol. 28(2), 402\u2013413 (2018)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"2294_CR3","doi-asserted-by":"publisher","first-page":"3731","DOI":"10.1007\/s11042-016-3975-0","volume":"76","author":"M Amini","year":"2017","unstructured":"M. Amini, M.O. Ahmad, M.N.S. Swamy, Digital watermark extraction in wavelet domain using hidden Markov model. Multimed. Tools Appl. 76(3), 3731\u20133749 (2017)","journal-title":"Multimed. Tools Appl."},{"key":"2294_CR4","doi-asserted-by":"crossref","unstructured":"M. Alghoniemy, A.H. Tewfik. Image watermarking by moment invariants, in Proceeding of the 2000 International Conference on Image Processing. Vancouver, BC, Canada (2000), pp. 73\u201376","DOI":"10.1109\/ICIP.2000.899229"},{"issue":"8","key":"2294_CR5","doi-asserted-by":"publisher","first-page":"10303","DOI":"10.1007\/s11042-018-5635-z","volume":"77","author":"P Bhinder","year":"2018","unstructured":"P. Bhinder, K. Singh, N. Jindal, Image-adaptive watermarking using maximum likelihood decoder for medical images. Multimed. Tools Appl. 77(8), 10303\u201310328 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"2294_CR6","doi-asserted-by":"crossref","unstructured":"M. Barazandeh, M. Amirmazlaghani. A new statistical detector for additive image watermarking based on dual-tree complex wavelet transform, in 2016 2nd International Conference of Signal Processing and Intelligent Systems (ICSPIS) (2016), pp. 1\u20135","DOI":"10.1109\/ICSPIS.2016.7869886"},{"issue":"3","key":"2294_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-021-00608-6","volume":"2","author":"M Begum","year":"2021","unstructured":"M. Begum, M.S. Uddin, Implementation of secured and robust DFT-based image watermark through hybridization with decomposition algorithm. SN Comput. Sci. 2(3), 1\u201313 (2021)","journal-title":"SN Comput. Sci."},{"key":"2294_CR8","doi-asserted-by":"publisher","first-page":"108088","DOI":"10.1016\/j.sigpro.2021.108088","volume":"185","author":"Y Chen","year":"2021","unstructured":"Y. Chen, Z.G. Jia, Y. Peng et al., A new structure-preserving quaternion QR decomposition method for color image blind watermarking. Signal Process. 185, 108088 (2021)","journal-title":"Signal Process."},{"key":"2294_CR9","doi-asserted-by":"publisher","first-page":"27615","DOI":"10.1007\/s11042-021-10756-9","volume":"80","author":"P Chotikawanid","year":"2021","unstructured":"P. Chotikawanid, T. Amornraksa, Color image watermarking based on reflectance component modification and guided image filtering. Multimed. Tools Appl. 80, 27615\u201327648 (2021)","journal-title":"Multimed. Tools Appl."},{"issue":"2","key":"2294_CR10","doi-asserted-by":"publisher","first-page":"1983","DOI":"10.1007\/s11042-015-3115-2","volume":"76","author":"L Dong","year":"2017","unstructured":"L. Dong, Q. Yan, Y. Lv et al., Full band watermarking in DCT domain with Weibull model. Multimed. Tools Appl. 76(2), 1983\u20132000 (2017)","journal-title":"Multimed. Tools Appl."},{"key":"2294_CR11","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.patcog.2017.12.006","volume":"77","author":"S Etemad","year":"2018","unstructured":"S. Etemad, M. Amirmazlaghani, A new multiplicative watermark detector in the contourlet domain using t location-scale distribution. Pattern Recognit. 77, 99\u2013112 (2018)","journal-title":"Pattern Recognit."},{"key":"2294_CR12","doi-asserted-by":"crossref","unstructured":"M.N. Favorskaya, L.C. Jain, E.I. Savchina. Perceptually tuned watermarking using non-subsampled Shearlet transform, in Computer Vision in Control Systems, vol. 4 (Springer, Cham, 2018), pp. 41\u201369","DOI":"10.1007\/978-3-319-67994-5_3"},{"issue":"4","key":"2294_CR13","doi-asserted-by":"publisher","first-page":"1436","DOI":"10.1109\/TCSVT.2020.3009349","volume":"31","author":"H Fang","year":"2021","unstructured":"H. Fang, D. Chen, Q. Huang, J. Zhang, Z. Ma, Deep template-based watermarking. IEEE Trans. Circuits Syst. Video Technol. 31(4), 1436\u20131451 (2021)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"3","key":"2294_CR14","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1198\/000313001317098248","volume":"55","author":"NI Fisher","year":"2001","unstructured":"N.I. Fisher, P. Switzer, Graphical assessment of dependence: is a picture worth 100 tests? Am. Stat. 55(3), 233\u2013239 (2001)","journal-title":"Am. Stat."},{"issue":"10","key":"2294_CR15","doi-asserted-by":"publisher","first-page":"166954","DOI":"10.1016\/j.ijleo.2021.166954","volume":"242","author":"H Gao","year":"2021","unstructured":"H. Gao, Q. Chen, A robust and secure image watermarking scheme using SURF and improved artificial bee colony algorithm in DWT domain. Optik 242(10), 166954 (2021)","journal-title":"Optik"},{"key":"2294_CR16","doi-asserted-by":"publisher","first-page":"116019","DOI":"10.1016\/j.image.2020.116019","volume":"90","author":"MW Hatoum","year":"2021","unstructured":"M.W. Hatoum, J.F. Couchot, R. Couturier, Using deep learning for image watermarking attack. Signal Process. Image Commun. 90, 116019 (2021)","journal-title":"Signal Process. Image Commun."},{"key":"2294_CR17","unstructured":"http:\/\/decsai.ugr.es\/cvg\/dbimagenes\/index.php"},{"key":"2294_CR18","doi-asserted-by":"crossref","unstructured":"J. Liu. An image watermarking algorithm based on energy scheme in the wavelet transform domain, in 2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC) (2018), pp. 668\u2013672","DOI":"10.1109\/ICIVC.2018.8492868"},{"issue":"6","key":"2294_CR19","doi-asserted-by":"publisher","first-page":"1323","DOI":"10.1109\/TPAMI.2018.2845371","volume":"41","author":"Y Lei","year":"2019","unstructured":"Y. Lei, T. Yang, A.B. Chan, Density-preserving hierarchical EM algorithm: simplifying Gaussian mixture models for approximate Inference. IEEE Trans. Pattern Anal. Mach. Intell. 41(6), 1323\u20131337 (2019)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"4","key":"2294_CR20","doi-asserted-by":"publisher","first-page":"2535","DOI":"10.1016\/j.jfranklin.2021.01.011","volume":"358","author":"A My","year":"2021","unstructured":"A. My, A. Hk, B. Ms et al., Image watermarking using separable fractional moments of Charlier-Meixner. J. Frankl. Inst. 358(4), 2535\u20132560 (2021)","journal-title":"J. Frankl. Inst."},{"key":"2294_CR21","doi-asserted-by":"crossref","unstructured":"A. Mairgiotis, L.P. Kondi, Y. Yang. DCT\/DWT blind multiplicative watermarking through student-t distribution, in 2017 IEEE International Conference on Image Processing (ICIP) (2017), pp. 520\u2013524","DOI":"10.1109\/ICIP.2017.8296335"},{"key":"2294_CR22","doi-asserted-by":"publisher","first-page":"1525","DOI":"10.1002\/bimj.201900248","volume":"62","author":"A Punzo","year":"2020","unstructured":"A. Punzo, L. Bagnato, Allometric analysis using the multivariate shifted exponential normal distribution. Biom. J. 62, 1525\u20131543 (2020)","journal-title":"Biom. J."},{"key":"2294_CR23","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.jvcir.2015.12.010","volume":"35","author":"M Qi","year":"2016","unstructured":"M. Qi, B. Li, H. Sun, Image representation by harmonic transforms with parameters in SL (2, R). J. Vis. Commun. Image Represent. 35, 184\u2013192 (2016)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"6","key":"2294_CR24","doi-asserted-by":"publisher","first-page":"8881","DOI":"10.1007\/s11042-016-3514-z","volume":"76","author":"AK Singh","year":"2017","unstructured":"A.K. Singh, Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed. Tools Appl. 76(6), 8881\u20138900 (2017)","journal-title":"Multimed. Tools Appl."},{"key":"2294_CR25","doi-asserted-by":"crossref","unstructured":"V. Sedighi, J. Fridrich, R. Cogranne. Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model, in Proceedings SPIE, Media Watermarking, Security, and Forensics, vol. 9409H (2015), pp. 1\u201313","DOI":"10.1117\/12.2080272"},{"issue":"1","key":"2294_CR26","first-page":"151","volume":"66","author":"H Sadreazami","year":"2018","unstructured":"H. Sadreazami, M. Amini, A robust image watermarking scheme using local statistical distribution in the contourlet domain. IEEE Trans. Circuits Syst. II Express Briefs 66(1), 151\u2013155 (2018)","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"issue":"2","key":"2294_CR27","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1109\/TMM.2015.2508147","volume":"18","author":"H Sadreazami","year":"2016","unstructured":"H. Sadreazami, M.O. Ahmad, M.N.S. Swamy, Multiplicative watermark decoder in contourlet domain using the normal inverse Gaussian distribution. IEEE Trans. Multimed. 18(2), 196\u2013207 (2016)","journal-title":"IEEE Trans. Multimed."},{"key":"2294_CR28","doi-asserted-by":"publisher","first-page":"27593","DOI":"10.1007\/s11042-021-11064-y","volume":"80","author":"R Thanki","year":"2021","unstructured":"R. Thanki, A. Kothari, S. Borra, Hybrid, blind and robust image watermarking: RDWT-NSCT based secure approach for telemedicine applications. Multimed. Tools Appl. 80, 27593\u201327613 (2021)","journal-title":"Multimed. Tools Appl."},{"key":"2294_CR29","doi-asserted-by":"publisher","first-page":"103123","DOI":"10.1016\/j.jvcir.2021.103123","volume":"77","author":"XY Wang","year":"2021","unstructured":"X.Y. Wang, J. Tian, J.L. Tian, P.P. Niu, H.Y. Yang, Statistical image watermarking using local RHFMs magnitudes and Beta exponential distribution. J. Visual Commun. Image Represent. 77, 103123 (2021)","journal-title":"J. Visual Commun. Image Represent."},{"key":"2294_CR30","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.jvcir.2019.05.012","volume":"62","author":"XY Wang","year":"2019","unstructured":"X.Y. Wang, S.Y. Zhang, L. Wang et al., Locally optimum image watermark decoder by modeling NSCT domain difference coefficients with vector based Cauchy distribution. J. Vis. Commun. Image Represent. 62, 309\u2013329 (2019)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"2294_CR31","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.ins.2020.05.034","volume":"535","author":"XY Wang","year":"2020","unstructured":"X.Y. Wang, T.T. Wen, X. Shen et al., A new watermark decoder in DNST domain using singular values and Gaussian-Cauchy mixture-based vector HMT. Inf. Sci. 535, 81\u2013106 (2020)","journal-title":"Inf. Sci."},{"issue":"1","key":"2294_CR32","first-page":"102820","volume":"59","author":"X Wang","year":"2021","unstructured":"X. Wang, D. Ma, K. Hu et al., Mapping based residual convolution neural network for non-embedding and blind image watermarking. J. Inf. Secur. Appl. 59(1), 102820 (2021)","journal-title":"J. Inf. Secur. Appl."},{"key":"2294_CR33","doi-asserted-by":"publisher","first-page":"1951","DOI":"10.1109\/TMM.2020.3006415","volume":"23","author":"X Zhong","year":"2021","unstructured":"X. Zhong, P.C. Huang, S. Mastorakis, Y.S. Frank, An automated and robust image watermarking scheme based on deep neural networks. IEEE Trans. Multimed. 23, 1951\u20131961 (2021)","journal-title":"IEEE Trans. Multimed."},{"issue":"16","key":"2294_CR34","doi-asserted-by":"publisher","first-page":"21281","DOI":"10.1007\/s11042-017-5451-x","volume":"77","author":"K Zebbiche","year":"2018","unstructured":"K. Zebbiche, F. Khelifi, K. Loukhaoukha, Robust additive watermarking in the DTCWT domain based on perceptual masking. Multimed. Tools Appl. 77(16), 21281\u201321304 (2018)","journal-title":"Multimed. Tools Appl."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-023-02294-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-023-02294-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-023-02294-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,21]],"date-time":"2023-06-21T05:04:20Z","timestamp":1687323860000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-023-02294-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,27]]},"references-count":34,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["2294"],"URL":"https:\/\/doi.org\/10.1007\/s00034-023-02294-6","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,27]]},"assertion":[{"value":"18 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and\/or national research committee and with the 1964 Helsinki Declaration and its later amendments or comparable ethical standards.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Standard"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}]}}