{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T03:04:37Z","timestamp":1769742277487,"version":"3.49.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T00:00:00Z","timestamp":1733529600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T00:00:00Z","timestamp":1733529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100014718","name":"Innovative Research Group Project of the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 42271409"],"award-info":[{"award-number":["No. 42271409"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Research Foundation of the Education Department of Heilongjiang Province","award":["No. 145209313"],"award-info":[{"award-number":["No. 145209313"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1007\/s00034-024-02930-9","type":"journal-article","created":{"date-parts":[[2024,12,7]],"date-time":"2024-12-07T06:51:49Z","timestamp":1733554309000},"page":"2681-2705","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Robust Image Watermarking in Wavelet Domain using RDWT-HD-SVD and Whale Optimization Algorithm"],"prefix":"10.1007","volume":"44","author":[{"given":"Guang-Da","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Ze-Xin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jing-You","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Xiao-Tian","family":"Xi","sequence":"additional","affiliation":[]},{"given":"Rong-Le","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Hai-Chuan","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yi-Chen","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,7]]},"reference":[{"key":"2930_CR1","doi-asserted-by":"publisher","first-page":"27895","DOI":"10.1007\/s11042-018-6014-5","volume":"77","author":"AM Abdelhakim","year":"2018","unstructured":"A.M. Abdelhakim, M.H. Saad, M. Sayed, H.I. Saleh, Optimized SVD-based robust watermarking in the fractional Fourier domain. Multimed. Tools Appl. 77, 27895\u201327917 (2018)","journal-title":"Multimed. Tools Appl."},{"issue":"14","key":"2930_CR2","doi-asserted-by":"publisher","first-page":"19751","DOI":"10.1007\/s11042-021-11337-6","volume":"81","author":"N Agarwal","year":"2022","unstructured":"N. Agarwal, P.K. Singh, Discrete cosine transforms and genetic algorithm based watermarking method for robustness and imperceptibility of color images for intelligent multimedia applications. Multimed. Tools Appl. 81(14), 19751\u201319777 (2022)","journal-title":"Multimed. Tools Appl."},{"key":"2930_CR3","doi-asserted-by":"crossref","unstructured":"A. Anand, A.K. Singh, RDWT-SVD-firefly-based dual watermarking technique for medical images (workshop paper). In 2020 IEEE Sixth International Conference on Multimedia Big Data (BigMM).pp. 366\u2013372. IEEE(2020)","DOI":"10.1109\/BigMM50055.2020.00063"},{"key":"2930_CR4","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.engappai.2015.12.004","volume":"49","author":"IA Ansari","year":"2016","unstructured":"I.A. Ansari, M. Pant, C.W. Ahn, Robust and false positive free watermarking in IWT domain using SVD and ABC. Eng. Appl. Artif. Intell. 49, 114\u2013125 (2016)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"2930_CR5","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/s10278-015-9822-4","volume":"29","author":"G Badshah","year":"2016","unstructured":"G. Badshah et al., Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique. J. Digit. Imag. 29, 216\u2013225 (2016)","journal-title":"J. Digit. Imag."},{"key":"2930_CR6","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1007\/s12559-019-09700-9","volume":"12","author":"B Bolourian Haghighi","year":"2020","unstructured":"B. Bolourian Haghighi, A.H. Taherinia, R. Monsefi, An effective semi-fragile watermarking method for image authentication based on lifting wavelet transform and feed-forward neural network. Cognit. Comput. 12, 863\u2013890 (2020)","journal-title":"Cognit. Comput."},{"key":"2930_CR7","doi-asserted-by":"publisher","first-page":"100706","DOI":"10.1109\/ACCESS.2019.2931039","volume":"7","author":"SW Byun","year":"2019","unstructured":"S.W. Byun, H.S. Son, S.P. Lee, Fast and robust watermarking method based on DCT specific location. IEEE Access 7, 100706\u2013100718 (2019)","journal-title":"IEEE Access"},{"key":"2930_CR8","doi-asserted-by":"crossref","unstructured":"H. Cao et al. Robust and reversible color image watermarking based on DFT in the spatial domain. Optik, 262, 169319 (2022)","DOI":"10.1016\/j.ijleo.2022.169319"},{"issue":"1","key":"2930_CR9","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/s11063-021-10633-4","volume":"54","author":"A Chandrasekar","year":"2022","unstructured":"A. Chandrasekar, T. Radhika, Q. Zhu, State estimation for genetic regulatory networks with two delay components by using second-order reciprocally convex approach. Neural. Process. Lett. 54(1), 327\u2013345 (2022)","journal-title":"Neural. Process. Lett."},{"key":"2930_CR10","unstructured":"CVG-UGR, Image Database. http:\/\/decsai.ugr.es\/cvg\/dbimagenes\/c512.php (2012)"},{"key":"2930_CR11","doi-asserted-by":"publisher","first-page":"45474","DOI":"10.1109\/ACCESS.2021.3067245","volume":"9","author":"F Ernawan","year":"2021","unstructured":"F. Ernawan, D. Ariatmanto, A. Firdaus, An improved image watermarking by modifying selected DWT-DCT coefficients. IEEE Access. 9, 45474\u201345485 (2021)","journal-title":"IEEE Access."},{"key":"2930_CR12","doi-asserted-by":"publisher","first-page":"13113","DOI":"10.1007\/s12652-022-03771-7","volume":"14","author":"E Farri","year":"2023","unstructured":"E. Farri, P. Ayubi, A robust digital video watermarking based on CT-SVD domain and chaotic DNA sequences for copyright protection. J. Ambient Intell. Human. Comput. 14, 13113\u201313137 (2023)","journal-title":"J. Ambient Intell. Human. Comput."},{"key":"2930_CR13","first-page":"440","volume":"31","author":"MT Gaata","year":"2022","unstructured":"M.T. Gaata et al., Hessenberg factorization and firework algorithms for optimized data hiding in digital images. J. Intell. Syst. 31, 440\u2013453 (2022)","journal-title":"J. Intell. Syst."},{"issue":"10","key":"2930_CR14","doi-asserted-by":"publisher","first-page":"4839","DOI":"10.1007\/s00371-022-02631-x","volume":"39","author":"P Garg","year":"2023","unstructured":"P. Garg, R. Rama Kishore, A robust and secured adaptive image watermarking using social group optimization. The Visual Comput. 39(10), 4839\u20134854 (2023)","journal-title":"The Visual Comput."},{"key":"2930_CR15","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/s11042-020-09677-w","volume":"80","author":"LH Gong","year":"2021","unstructured":"L.H. Gong, C. Tian, W.P. Zou, N.R. Zhou, Robust and imperceptible watermarking scheme based on Canny edge detection and SVD in the contourlet domain. Multimed. Tools Appl. 80, 439\u2013461 (2021)","journal-title":"Multimed. Tools Appl."},{"key":"2930_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118730","volume":"212","author":"E Gul","year":"2023","unstructured":"E. Gul, A.N. Toprak, Contourlet and discrete cosine transform-based quality guaranteed robust image watermarking method using artificial bee colony algorithm. Expert Syst. Appl. 212, 118730 (2023)","journal-title":"Expert Syst. Appl."},{"key":"2930_CR17","unstructured":"M. Jiansheng,  L. Sukang, T. Xiaomei. A digital watermarking algorithm based on DCT and DWT. In Proceedings. The 2009 International Symposium on Web Information Systems and Applications (WISA 2009), p. 104. Academy publisher (2009)"},{"key":"2930_CR18","doi-asserted-by":"publisher","first-page":"10561","DOI":"10.1007\/s00500-019-04563-6","volume":"24","author":"X Kang","year":"2020","unstructured":"X. Kang et al., Multi-dimensional particle swarm optimization for robust blind image watermarking using intertwining logistic map and hybrid domain. Soft. Comput. 24, 10561\u201310584 (2020)","journal-title":"Soft. Comput."},{"key":"2930_CR19","doi-asserted-by":"crossref","unstructured":"B.P. Kulkarni  et al. Performance analysis of optimization algorithms GA, PSO, and ABC based on DWT-SVD watermarking in OpenCV Python Environment (2020)","DOI":"10.1109\/INCET49848.2020.9154134"},{"key":"2930_CR20","doi-asserted-by":"publisher","first-page":"31911","DOI":"10.1007\/s11042-023-16903-8","volume":"83","author":"C Kumar","year":"2024","unstructured":"C. Kumar, Hybrid optimization for secure and robust digital image watermarking with DWT, DCT and SPIHT. Multimed. Tools Appl. 83, 31911\u201331932 (2024)","journal-title":"Multimed. Tools Appl."},{"key":"2930_CR21","doi-asserted-by":"publisher","first-page":"22001","DOI":"10.1007\/s11042-021-11246-8","volume":"81","author":"PKS Laxmanika","year":"2022","unstructured":"P.K. Singh, Laxmanika, Robust and imperceptible image watermarking technique based on SVD, DCT, BEMD, and PSO in wavelet domain. Multimed. Tools Appl. 81, 22001\u201322026 (2022)","journal-title":"Multimed. Tools Appl."},{"key":"2930_CR22","doi-asserted-by":"publisher","first-page":"30007","DOI":"10.1007\/s11042-020-09389-1","volume":"79","author":"JY Li","year":"2020","unstructured":"J.Y. Li, C.Z. Zhang, Blind watermarking scheme based on Schur decomposition and non-subsampled contourlet transform. Multimed. Tools Appl. 79, 30007\u201330021 (2020)","journal-title":"Multimed. Tools Appl."},{"key":"2930_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11042-019-7523-6","volume":"79","author":"JY Li","year":"2020","unstructured":"J.Y. Li, C.Z. Zhang, Blind and robust watermarking scheme combining bimodal distribution structure with iterative selection method. Multimed. Tools Appl. 79, 1\u201335 (2020)","journal-title":"Multimed. Tools Appl."},{"key":"2930_CR24","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.neucom.2021.07.051","volume":"461","author":"Y Li","year":"2021","unstructured":"Y. Li, H. Wang, M. Barni, A survey of deep neural network watermarking techniques. Neurocomputing 461, 171\u2013193 (2021)","journal-title":"Neurocomputing"},{"key":"2930_CR25","doi-asserted-by":"crossref","unstructured":"Z. Li et al., How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN (2019)","DOI":"10.1145\/3359789.3359801"},{"issue":"9","key":"2930_CR26","doi-asserted-by":"publisher","first-page":"795","DOI":"10.1049\/iet-ipr.2014.0395","volume":"9","author":"N Muhammad","year":"2015","unstructured":"N. Muhammad, N. Bibi, Digital image watermarking using partial pivoting lower and upper triangular decomposition into the wavelet domain. IET Image Proc. 9(9), 795\u2013803 (2015)","journal-title":"IET Image Proc."},{"key":"2930_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6617944","volume":"2021","author":"H Nazir","year":"2021","unstructured":"H. Nazir, I.S. Bajwa, M. Samiullah, W. Anwar, M. Moosa, Robust secure color image watermarking using a 4D hyperchaotic system, DWT, HbD, and SVD based on an improved FOA algorithm. Sec. Commun. Netw. 2021, 1\u201317 (2021)","journal-title":"Sec. Commun. Netw."},{"key":"2930_CR28","doi-asserted-by":"publisher","first-page":"11055","DOI":"10.1007\/s11063-023-11364-4","volume":"55","author":"T Radhika","year":"2023","unstructured":"T. Radhika, A. Chandrasekar, V.Q. Zhu, Analysis of Markovian jump stochastic Cohen-Grossberg BAM neural networks with time delays for exponential input-to-state stability. Neural. Process. Lett. 55, 11055\u201311072 (2023)","journal-title":"Neural. Process. Lett."},{"key":"2930_CR29","first-page":"4","volume":"9","author":"A Ray","year":"2020","unstructured":"A. Ray, S. Roy, Recent trends in image watermarking techniques for copyright protection: a survey. Int. J. Multimed. Inform. Retriev. 9, 4 (2020)","journal-title":"Int. J. Multimed. Inform. Retriev."},{"key":"2930_CR30","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4250247","author":"AA Saleh","year":"2022","unstructured":"A.A. Saleh et al., Unsupervised video frame clustering approach for video watermarking using sift features and contourlet transform. SSRN Electron. J. (2022). https:\/\/doi.org\/10.2139\/ssrn.4250247","journal-title":"SSRN Electron. J."},{"key":"2930_CR31","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12041065","author":"A Senol","year":"2023","unstructured":"A. Senol et al., A semi-fragile, inner-outer block-based watermarking method using scrambling and frequency domain algorithms. Electronics (2023). https:\/\/doi.org\/10.3390\/electronics12041065","journal-title":"Electronics"},{"key":"2930_CR32","doi-asserted-by":"publisher","first-page":"105696","DOI":"10.1016\/j.asoc.2019.105696","volume":"84","author":"S Sharma","year":"2019","unstructured":"S. Sharma, H. Sharma, J.B. Sharma, An adaptive color image watermarking using RDWT-SVD and artificial bee colony-based quality metric strength factor optimization. Appl. Soft Comput. 84, 105696 (2019)","journal-title":"Appl. Soft Comput."},{"issue":"11","key":"2930_CR33","doi-asserted-by":"publisher","first-page":"6370","DOI":"10.1007\/s00034-022-02090-8","volume":"41","author":"R Sinhal","year":"2022","unstructured":"R. Sinhal, I.A. Ansari, Tunable Q-factor wavelet transform-based robust image watermarking scheme using logistic mapping and antlion optimization. Circ. Syst. Signal Process. 41(11), 6370\u20136410 (2022)","journal-title":"Circ. Syst. Signal Process."},{"key":"2930_CR34","doi-asserted-by":"publisher","first-page":"102688","DOI":"10.1016\/j.bspc.2021.102688","volume":"68","author":"K Swaraja","year":"2021","unstructured":"K. Swaraja, K. Meenakshi, P. Kora, Hierarchical multilevel framework using RDWT-QR optimized watermarking in telemedicine. Biomed. Signal Process. Control 68, 102688 (2021)","journal-title":"Biomed. Signal Process. Control"},{"key":"2930_CR35","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/s10462-017-9568-0","volume":"51","author":"SL Tilahun","year":"2019","unstructured":"S.L. Tilahun, J.M.T. Ngnotchouye, N.N. Hamadneh, Continuous versions of firefly algorithm: a review. Artif. Intell. Rev. 51, 445\u2013492 (2019)","journal-title":"Artif. Intell. Rev."},{"key":"2930_CR36","doi-asserted-by":"publisher","first-page":"28003","DOI":"10.1007\/s11042-019-07902-9","volume":"78","author":"L Zhang","year":"2019","unstructured":"L. Zhang, D. Wei, Dual DCT-DWT-SVD digital watermarking algorithm based on particle swarm optimization. Multimed. Tools Appl. 78, 28003\u201328023 (2019)","journal-title":"Multimed. Tools Appl."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-024-02930-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-024-02930-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-024-02930-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T16:20:22Z","timestamp":1742314822000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-024-02930-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,7]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["2930"],"URL":"https:\/\/doi.org\/10.1007\/s00034-024-02930-9","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,7]]},"assertion":[{"value":"4 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}