{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T14:37:59Z","timestamp":1770907079011,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T00:00:00Z","timestamp":1679443200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T00:00:00Z","timestamp":1679443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s00034-023-02344-z","type":"journal-article","created":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T14:06:14Z","timestamp":1679493974000},"page":"4953-4984","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Hessenberg Decomposition-Based Medical Image Watermarking with Its Performance Comparison by Particle Swarm and JAYA Optimization Algorithms for Different Wavelets and Its Authentication Using AES"],"prefix":"10.1007","volume":"42","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1764-772X","authenticated-orcid":false,"given":"Divyanshu","family":"Awasthi","sequence":"first","affiliation":[]},{"given":"Vinay Kumar","family":"Srivastava","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,22]]},"reference":[{"key":"2344_CR1","doi-asserted-by":"crossref","unstructured":"V. Aslantas, A.L. Dogan, S. Ozturk, DWT-SVD based image watermarking using particle swarm optimizer. in 2008 IEEE International Conference on Multimedia and Expo. (IEEE, 2008), pp. 241\u2013244.","DOI":"10.1109\/ICME.2008.4607416"},{"key":"2344_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12456-4","author":"D Awasthi","year":"2022","unstructured":"D. Awasthi, V.K. Srivastava, LWT-DCT-SVD and DWT-DCT-SVD based watermarking schemes with their performance enhancement using Jaya and Particle swarm optimization and comparison of results under various attacks. Multimed. Tools Appl. (2022). https:\/\/doi.org\/10.1007\/s11042-022-12456-4","journal-title":"Multimed. Tools Appl."},{"key":"2344_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-14002-8","author":"D Awasthi","year":"2022","unstructured":"D. Awasthi, V.K. Srivastava, Robust, imperceptible and optimized watermarking of DICOM image using Schur decomposition, LWT-DCT-SVD and its authentication using SURF. Multimed. Tools Appl. (2022). https:\/\/doi.org\/10.1007\/s11042-022-14002-8","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"2344_CR4","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/S0165-1684(98)00015-2","volume":"66","author":"M Barni","year":"1998","unstructured":"M. Barni, F. Bartolini, V. Cappellini, A. Piva, A DCT-domain system for robust image watermarking. Signal Process. 66(3), 357\u2013372 (1998)","journal-title":"Signal Process."},{"issue":"7","key":"2344_CR5","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1002\/cpa.3160410705","volume":"41","author":"I Daubechies","year":"1988","unstructured":"I. Daubechies, Orthonormal bases of compactly supported wavelets. Commun. Pure Appl. Math. 41(7), 909\u2013996 (1988)","journal-title":"Commun. Pure Appl. Math."},{"key":"2344_CR6","doi-asserted-by":"publisher","first-page":"20464","DOI":"10.1109\/ACCESS.2018.2819424","volume":"6","author":"F Ernawan","year":"2018","unstructured":"F. Ernawan, M.N. Kabir, A robust image watermarking technique with an optimal DCT-psychovisual threshold. IEEE Access 6, 20464\u201320480 (2018)","journal-title":"IEEE Access"},{"key":"2344_CR7","doi-asserted-by":"crossref","unstructured":"Furqan A, Kumar M (2015). Study and analysis of robust DWT-SVD domain-based digital image watermarking technique using MATLAB. in IEEE International Conference on Computational Intelligence & Communication Technology","DOI":"10.1109\/CICT.2015.74"},{"issue":"6","key":"2344_CR8","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1049\/iet-ipr.2016.0515","volume":"11","author":"Y Guo","year":"2017","unstructured":"Y. Guo, B.Z. Li, N. Goel, Optimised blind image watermarking method based on firefly algorithm in DWT-QR transform domain. IET Image Proc. 11(6), 406\u2013415 (2017)","journal-title":"IET Image Proc."},{"key":"2344_CR9","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.neucom.2016.09.027","volume":"221","author":"R Hu","year":"2017","unstructured":"R. Hu, S. Wen, Z. Zeng, T. Huang, A short-term power load forecasting model based on the generalized regression neural network with decreasing step fruit fly optimization algorithm. Neurocomputing 221, 24\u201331 (2017)","journal-title":"Neurocomputing"},{"issue":"4","key":"2344_CR10","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1016\/s1665-6423(14)70091-4","volume":"12","author":"O Jane","year":"2014","unstructured":"O. Jane, E. Elba\u015fi, H.G. \u0130lk, Hybrid non-blind watermarking based on DWT and SVD. J. Appl. Res. Technol. 12(4), 750\u2013761 (2014). https:\/\/doi.org\/10.1016\/s1665-6423(14)70091-4","journal-title":"J. Appl. Res. Technol."},{"key":"2344_CR11","doi-asserted-by":"publisher","unstructured":"J. Kaur, N. Singh, C. Jain, An improved image watermarking technique implementing 2-DWT and SVD. in IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). (Bangalore, 2016), pp. 1855\u20131859. https:\/\/doi.org\/10.1109\/RTEICT.2016.7808156","DOI":"10.1109\/RTEICT.2016.7808156"},{"key":"2344_CR12","doi-asserted-by":"publisher","first-page":"20149","DOI":"10.1007\/s11042-020-08881-y","volume":"79","author":"S Kumar","year":"2020","unstructured":"S. Kumar, B.K. Singh, M. Yadav, A recent survey on multimedia and database watermarking. Multimed. Tools Appl. 79, 20149\u201320197 (2020). https:\/\/doi.org\/10.1007\/s11042-020-08881-y","journal-title":"Multimed. Tools Appl."},{"key":"2344_CR13","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1016\/j.ins.2016.07.030","volume":"367","author":"T Li","year":"2016","unstructured":"T. Li, L. Gao, P. Li, Q. Pan, An ensemble fruit fly optimization algorithm for solving range image registration to improve quality inspection of free-form surface parts. Inf. Sci. 367, 953\u2013974 (2016)","journal-title":"Inf. Sci."},{"key":"2344_CR14","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.optcom.2015.07.073","volume":"356","author":"X Li","year":"2015","unstructured":"X. Li, S.T. Kim, I.K. Lee, Robustness enhancement for image hiding algorithm in cellular automata domain. Opt. Commun. 356, 186\u2013194 (2015)","journal-title":"Opt. Commun."},{"issue":"3","key":"2344_CR15","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1109\/30.883387","volume":"46","author":"SD Lin","year":"2000","unstructured":"S.D. Lin, C.F. Chen, A robust DCT-based watermarking for copyright protection. IEEE Trans. Consum. Electron. 46(3), 415\u2013421 (2000)","journal-title":"IEEE Trans. Consum. Electron."},{"key":"2344_CR16","doi-asserted-by":"publisher","first-page":"80849","DOI":"10.1109\/ACCESS.2019.2915596","volume":"7","author":"J Liu","year":"2019","unstructured":"J. Liu, J. Huang, Y. Luo, L. Cao, S. Yang, D. Wei, R. Zhou, An optimized image watermarking method based on HD and SVD in DWT domain. IEEE Access 7, 80849\u201380860 (2019)","journal-title":"IEEE Access"},{"key":"2344_CR17","doi-asserted-by":"crossref","unstructured":"S. Luo, K. Sarabandi, L. Tong, L. Pierce, A LS-SVM-based classifier with fruit fly optimization algorithm for polarimetric SAR images. In 2016 IEEE International Geoscience and Remote Sensing Symposium (IGARSS). (IEEE, 2016), pp. 1859\u20131862","DOI":"10.1109\/IGARSS.2016.7729477"},{"key":"2344_CR18","doi-asserted-by":"publisher","DOI":"10.1109\/cine.2015.36","author":"A Maity","year":"2015","unstructured":"A. Maity, A. Pattanaik, S. Sagnika, S. Pani, A comparative study on approaches to speckle noise reduction in images. Int. Conf. Comput. Intell. Netw. (2015). https:\/\/doi.org\/10.1109\/cine.2015.36","journal-title":"Int. Conf. Comput. Intell. Netw."},{"issue":"17","key":"2344_CR19","doi-asserted-by":"publisher","first-page":"7858","DOI":"10.1016\/j.eswa.2014.06.011","volume":"41","author":"A Mishra","year":"2014","unstructured":"A. Mishra, C. Agarwal, A. Sharma, P. Bedi, Optimized gray-scale image watermarking using DWT\u2013SVD and firefly algorithm. Exp. Syst. Appl. 41(17), 7858\u20137867 (2014)","journal-title":"Exp. Syst. Appl."},{"key":"2344_CR20","first-page":"69","volume-title":"Artificial intelligence and evolutionary computations in engineering systems, advances in intelligent systems and computing","author":"S Nandi","year":"2016","unstructured":"S. Nandi, V. Santhi, DWT\u2013SVD-based watermarking scheme using optimization technique, in Artificial intelligence and evolutionary computations in engineering systems, advances in intelligent systems and computing, vol. 394, ed. by S. Dash, M. Bhaskar, B. Panigrahi, S. Das (Springer, New Delhi, 2016), pp.69\u201377"},{"issue":"3","key":"2344_CR21","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1007\/s11071-015-2252-5","volume":"82","author":"N Nedic","year":"2015","unstructured":"N. Nedic, V. Stojanovic, V. Djordjevic, Optimal control of hydraulically driven parallel robot platform based on firefly algorithm. Nonlinear Dyn. 82(3), 1457\u20131473 (2015)","journal-title":"Nonlinear Dyn."},{"key":"2344_CR22","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.knosys.2011.07.001","volume":"26","author":"WT Pan","year":"2012","unstructured":"W.T. Pan, A new fruit fly optimization algorithm: taking the financial distress model as an example. Knowl. Based Syst. 26, 69\u201374 (2012)","journal-title":"Knowl. Based Syst."},{"issue":"6","key":"2344_CR23","doi-asserted-by":"publisher","first-page":"1597","DOI":"10.1016\/j.dsp.2010.03.010","volume":"20","author":"JC Patra","year":"2010","unstructured":"J.C. Patra, J.E. Phua, C. Bornand, A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digit. Signal Process. 20(6), 1597\u20131611 (2010)","journal-title":"Digit. Signal Process."},{"issue":"1","key":"2344_CR24","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1016\/j.eswa.2011.07.059","volume":"39","author":"RS Run","year":"2012","unstructured":"R.S. Run, S.J. Horng, J.L. Lai, T.W. Kao, R.J. Chen, An improved SVD-based watermarking technique for copyright protection. Exp. Syst. Appl. 39(1), 673\u2013689 (2012)","journal-title":"Exp. Syst. Appl."},{"key":"2344_CR25","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.future.2016.11.023","volume":"86","author":"AK Singh","year":"2018","unstructured":"A.K. Singh, B. Kumar, S.K. Singh, S.P. Ghrera, A. Mohan, Multiple watermarking technique for securing online social network contents using back propagation neural network. Futur. Gener. Comput. Syst. 86, 926\u2013939 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"2344_CR26","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.proeng.2011.12.708","volume":"29","author":"J Song","year":"2012","unstructured":"J. Song, J. Song, Y. Bao, A blind digital watermark method based on SVD and chaos. Procedia Eng. 29, 285\u2013289 (2012)","journal-title":"Procedia Eng."},{"issue":"2","key":"2344_CR27","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1016\/j.jfranklin.2015.12.007","volume":"353","author":"V Stojanovic","year":"2016","unstructured":"V. Stojanovic, N. Nedic, Robust identification of OE model with constrained output using optimal input design. J. Franklin Inst. 353(2), 576\u2013593 (2016)","journal-title":"J. Franklin Inst."},{"key":"2344_CR28","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1007\/s11042-013-1653-z","volume":"72","author":"Q Su","year":"2014","unstructured":"Q. Su, Y. Niu, H. Zou, Y. Zhao, T. Yao, A blind double color image watermarking algorithm based on QR decomposition. Multimed. Tools Appl 72, 987\u20131009 (2014)","journal-title":"Multimed. Tools Appl"},{"issue":"11","key":"2344_CR29","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6501\/ac8368","volume":"33","author":"H Tao","year":"2022","unstructured":"H. Tao, L. Cheng, J. Qiu, V. Stojanovic, Few shot cross equipment fault diagnosis method based on parameter optimization and feature mertic. Meas. Sci. Technol. 33(11), 115005 (2022)","journal-title":"Meas. Sci. Technol."},{"key":"2344_CR30","doi-asserted-by":"publisher","first-page":"3273","DOI":"10.3906\/elk-1603-17","volume":"25","author":"F Thakkar","year":"2017","unstructured":"F. Thakkar, V. Srivastava, A particle swarm optimization and block-SVD-based watermarking for digital images. Turk. J. Electr. Eng. Comput. Sci. 25, 3273\u20133288 (2017). https:\/\/doi.org\/10.3906\/elk-1603-17","journal-title":"Turk. J. Electr. Eng. Comput. Sci."},{"issue":"9","key":"2344_CR31","first-page":"2527","volume":"35","author":"Z Xiao","year":"2015","unstructured":"Z. Xiao, J. Sun, Y. Wang, Z. Jiang, Wavelet domain digital watermarking method based on fruit fly optimization algorithm. J. Comput. Appl. 35(9), 2527 (2015)","journal-title":"J. Comput. Appl."},{"issue":"4","key":"2344_CR32","doi-asserted-by":"publisher","first-page":"3015","DOI":"10.1007\/s10586-017-0966-5","volume":"20","author":"M Yang","year":"2017","unstructured":"M. Yang, N.B. Liu, W. Liu, Image 1D OMP sparse decomposition with modified fruit-fly optimization algorithm. Clust. Comput. 20(4), 3015\u20133022 (2017)","journal-title":"Clust. Comput."},{"key":"2344_CR33","doi-asserted-by":"crossref","unstructured":"X.S. Yang, S. Deb, Cuckoo Search via L\u00b4evy Flights Proceedings of the 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC) December 2009Coimbatore. India210\u2013214","DOI":"10.1109\/NABIC.2009.5393690"},{"key":"2344_CR34","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1007\/s11042-016-3862-8","volume":"77","author":"A Zear","year":"2018","unstructured":"A. Zear, A.K. Singh, P. Kumar, A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed. Tools Appl 77, 4863\u20134882 (2018)","journal-title":"Multimed. Tools Appl"}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-023-02344-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-023-02344-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-023-02344-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T05:07:44Z","timestamp":1688965664000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-023-02344-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,22]]},"references-count":34,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["2344"],"URL":"https:\/\/doi.org\/10.1007\/s00034-023-02344-z","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,22]]},"assertion":[{"value":"15 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}