{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:57:26Z","timestamp":1774605446333,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T00:00:00Z","timestamp":1758672000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T00:00:00Z","timestamp":1758672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61671095"],"award-info":[{"award-number":["61671095"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62201113"],"award-info":[{"award-number":["62201113"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100017128","name":"Science Fund for Distinguished Young Scholars of Anhui Province","doi-asserted-by":"publisher","award":["Grant No.2408085QF183"],"award-info":[{"award-number":["Grant No.2408085QF183"]}],"id":[{"id":"10.13039\/100017128","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Scientific Research Initiation Fund Program of Anhui Polytechnic University","award":["S022024001"],"award-info":[{"award-number":["S022024001"]}]},{"name":"Scientific Research Initiation Fund Program of Anhui Polytechnic University","award":["S022024002"],"award-info":[{"award-number":["S022024002"]}]},{"DOI":"10.13039\/501100005230","name":"Natural Science Foundation of Chongqing","doi-asserted-by":"crossref","award":["No. CSTB2024NSCQ-MSX0949"],"award-info":[{"award-number":["No. CSTB2024NSCQ-MSX0949"]}],"id":[{"id":"10.13039\/501100005230","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Science and Technology Research Program of Chongqing Municipal Education Commission","award":["No. KJQN202300625"],"award-info":[{"award-number":["No. KJQN202300625"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s00034-025-03293-5","type":"journal-article","created":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T17:47:13Z","timestamp":1758736033000},"page":"2030-2063","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Robust Image Watermarking Scheme Using Error Correcting Codes and Linear Particle Swarm Optimization","optimization"],"prefix":"10.1007","volume":"45","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5352-9675","authenticated-orcid":false,"given":"Ying","family":"Wei","sequence":"first","affiliation":[]},{"given":"Tianqi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Debang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Linhao","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Baoze","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Zeliang","family":"An","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,24]]},"reference":[{"issue":"1","key":"3293_CR1","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1109\/TDSC.2022.3144657","volume":"20","author":"A Anand","year":"2023","unstructured":"A. Anand, A. Singh, Dual watermarking for security of covid-19 patient record. IEEE Trans. Dependable Secur. Comput. 20(1), 859\u2013866 (2023)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"7","key":"3293_CR2","doi-asserted-by":"publisher","first-page":"3051","DOI":"10.1109\/TIT.2009.2021379","volume":"55","author":"E Arikan","year":"2009","unstructured":"E. Arikan, Channel polarization: a method for constructing capacity-achieving codes for symmetric binary-input memoryless channels. IEEE Trans. Inf. Theory 55(7), 3051\u20133073 (2009)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"3293_CR3","doi-asserted-by":"crossref","unstructured":"A. Asady, H. Jaleel, and S. Hreshee: 2d cubic spline transformation with 3d binary image for a new watermarking algorithm. in 2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM), 207\u2013212 (2021)","DOI":"10.1109\/ICCITM53167.2021.9677689"},{"key":"3293_CR4","volume":"68","author":"J Artiles","year":"2022","unstructured":"J. Artiles, D. Chaves, C. Pimentel, Robust image watermarking algorithm using chaotic sequences. J. Inf. Secur. Appl. 68, 103219 (2022)","journal-title":"J. Inf. Secur. Appl."},{"issue":"1","key":"3293_CR5","first-page":"83","volume":"99","author":"A Bakirov","year":"2021","unstructured":"A. Bakirov, I. Suleimenov, On the possibility of implementing artificial intelligence systems based on error-correcting code algorithms. J. Theor. Appl. Inf. Technol. 99(1), 83\u201399 (2021)","journal-title":"J. Theor. Appl. Inf. Technol."},{"issue":"11","key":"3293_CR6","doi-asserted-by":"publisher","first-page":"15219","DOI":"10.1007\/s11042-022-12526-7","volume":"81","author":"M Bansal","year":"2022","unstructured":"M. Bansal, A. Mishra, A. Sharma, Multiple scaling fuzzy-pso watermarking scheme for gray-scale and colored images. Multimed. Tools Appl. 81(11), 15219\u201315248 (2022)","journal-title":"Multimed. Tools Appl."},{"key":"3293_CR7","doi-asserted-by":"publisher","first-page":"108109","DOI":"10.1016\/j.optlastec.2022.108109","volume":"152","author":"X Bai","year":"2022","unstructured":"X. Bai, L. Zhang, J. Li, Z. Yu, Z. Yang, Y. Wang, X. Chen, X. Zhou, High performance optical image hiding based on computational ghost imaging with bch error correction coding technique. Opt. Laser Technol. 152, 108109 (2022)","journal-title":"Opt. Laser Technol."},{"key":"3293_CR8","unstructured":"P. Chao, Y. Sun, E. Dobriban, H. Hassani, Watermarking language models bwith error correcting codes. arXiv:2406.10281 (2024)"},{"issue":"6","key":"3293_CR9","doi-asserted-by":"publisher","first-page":"4519","DOI":"10.1109\/TDSC.2022.3228385","volume":"20","author":"K Chen","year":"2023","unstructured":"K. Chen, Q. Guan, W. Zhang, N. Yu, Reversible data hiding in encrypted images based on binary symmetric channel model and polar code. IEEE Trans. Depend. Se-cure Comput. 20(6), 4519\u20134535 (2023)","journal-title":"IEEE Trans. Depend. Se-cure Comput."},{"issue":"7","key":"3293_CR10","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.1109\/5.771068","volume":"87","author":"IJ Cox","year":"1999","unstructured":"I.J. Cox, M.L. Miller, A.L. McKellips, Watermarking as communications with side infor-mation. Proc. IEEE 87(7), 1127\u20131141 (1999)","journal-title":"Proc. IEEE"},{"issue":"11","key":"3293_CR11","doi-asserted-by":"publisher","first-page":"113016","DOI":"10.1088\/1367-2630\/ad08ca","volume":"25","author":"Y Dong","year":"2023","unstructured":"Y. Dong, D. Mou, H. Liu, T. Zhu, Quantum color image watermarking scheme based on quantum error correction coding. New J. Phys. 25(11), 113016 (2023)","journal-title":"New J. Phys."},{"key":"3293_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118730","volume":"212","author":"E Gul","year":"2023","unstructured":"E. Gul, A. Toprak, Contourlet and discrete cosine transform based quality guaranteed robust image watermarking method using artificial bee colony algorithm. Expert Syst. Appl. 212, 118730 (2023)","journal-title":"Expert Syst. Appl."},{"key":"3293_CR13","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/TIP.2020.3036727","volume":"30","author":"R Hu","year":"2021","unstructured":"R. Hu, S. Xiang, Cover-lossless robust image watermarking against geometric deformations. IEEE Trans. Image Process. 30, 318\u2013331 (2021)","journal-title":"IEEE Trans. Image Process."},{"issue":"10","key":"3293_CR14","doi-asserted-by":"publisher","first-page":"2447","DOI":"10.1109\/TMM.2019.2907475","volume":"21","author":"Y Huang","year":"2019","unstructured":"Y. Huang, B. Niu, H. Guan, S. Zhang, Enhancing image watermarking with adaptive em-bedding parameter and PSNR guarantee. IEEE Trans. Multimed. 21(10), 2447\u20132460 (2019)","journal-title":"IEEE Trans. Multimed."},{"issue":"9","key":"3293_CR15","doi-asserted-by":"publisher","first-page":"4660","DOI":"10.1109\/TCSVT.2023.3245650","volume":"33","author":"Y Huang","year":"2023","unstructured":"Y. Huang, H. Guan, J. Liu, S. Zhang, B. Niu, G. Zhang, Robust texture-aware local adap-tive image watermarking with perceptual guarantee. IEEE Trans. Circuits Syst. Video Technol. 33(9), 4660\u20134674 (2023)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"3293_CR16","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.eswa.2016.06.015","volume":"62","author":"T Huynh-The","year":"2016","unstructured":"T. Huynh-The, O. Banos, S. Lee, Y. Yoon, T. Le-Tien, Improving digital image watermark-ing by means of optimal channel selection. Expert Syst. Appl. 62, 177\u2013189 (2016)","journal-title":"Expert Syst. Appl."},{"key":"3293_CR17","unstructured":"Images: Computer vision group university of granada (2002). https:\/\/532ccia.ugr.es\/cvg\/dbimagenes"},{"key":"3293_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120137","volume":"226","author":"S Kumar","year":"2023","unstructured":"S. Kumar, N. Sharma, N. Kumar, Wsomark: an adaptive dual-purpose color image water-marking using white shark optimizer and levenberg\u2013marquardt bpnn. Expert Syst. Appl. 226, 120137 (2023)","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"3293_CR19","first-page":"895063","volume":"2014","author":"L Li","year":"2014","unstructured":"L. Li, Q. Hou, J. Lu, Q. Xu, J. Dai, X. Mao, C. Chang, A new pixels flipping method for huge watermarking capacity of the invoice font image. Sci. World J. 2014(1), 895063 (2014)","journal-title":"Sci. World J."},{"key":"3293_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2021.116292","volume":"95","author":"D Liu","year":"2021","unstructured":"D. Liu, Q. Su, Z. Yuan, X. Zhang, A blind color digital image watermarking method based on image correction and eigenvalue decomposition. Signal Process. Image Commun. 95, 116292 (2021)","journal-title":"Signal Process. Image Commun."},{"key":"3293_CR21","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s11760-024-03803-z","volume":"19","author":"Y Liu","year":"2025","unstructured":"Y. Liu, C. Shi, X. Hu, C. Qi, X. Niu, Robust and secure image watermarking algorithm resisting jpeg compression and cropping based on reed solomon (rs) codes. Signal Image Video Process. 19, 253 (2025)","journal-title":"Signal Image Video Process."},{"issue":"3","key":"3293_CR22","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/S0165-1684(98)00017-6","volume":"66","author":"N Nikolaidis","year":"1998","unstructured":"N. Nikolaidis, I. Pitas, Robust image watermarking in the spatial domain. Signal Process. 66(3), 385\u2013403 (1998)","journal-title":"Signal Process."},{"issue":"3","key":"3293_CR23","doi-asserted-by":"publisher","first-page":"184","DOI":"10.30526\/32.3.2295","volume":"32","author":"HD Najeeb","year":"2019","unstructured":"H.D. Najeeb, New techniques of watermark images using bit plane slicing and cubic-spline interpolation. Ibn AL-Haitham J. Pure Appl. Sci. 32(3), 184\u2013192 (2019)","journal-title":"Ibn AL-Haitham J. Pure Appl. Sci."},{"key":"3293_CR24","doi-asserted-by":"publisher","first-page":"118154","DOI":"10.1109\/ACCESS.2024.3446489","volume":"12","author":"E Oleg","year":"2024","unstructured":"E. Oleg, I. Fedor, D. Kristina, Watermarking for social networks images with improved robustness through polar codes. IEEE Access 12, 118154\u2013118168 (2024)","journal-title":"IEEE Access"},{"key":"3293_CR25","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1007\/s11277-021-08666-y","volume":"121","author":"JBP Pal","year":"2021","unstructured":"J.B.P. Pal, J. Bhaumik, An image authentication and tampered detection scheme exploiting local binary pattern along with hamming error correcting code. Wirel. Pers. Commun. 121, 939\u2013961 (2021)","journal-title":"Wirel. Pers. Commun."},{"issue":"1","key":"3293_CR26","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/s00034-021-01773-y","volume":"41","author":"P Sivananthamaitrey","year":"2022","unstructured":"P. Sivananthamaitrey, P. Kumar, Optimal dual watermarking of color images with swt and svd through genetic algorithm. Circuits Syst. Signal Process. 41(1), 224\u2013248 (2022)","journal-title":"Circuits Syst. Signal Process."},{"key":"3293_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03408-1","author":"S Sharma","year":"2022","unstructured":"S. Sharma, H. Sharma, J. Sharma, A new optimization based color image watermarking using non-negative matrix factorization in discrete cosine transform domain. J. Ambient. Intell. Humaniz. Comput. (2022). https:\/\/doi.org\/10.1007\/s12652-021-03408-1","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"issue":"6","key":"3293_CR28","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1109\/TCSI.2002.1010033","volume":"49","author":"YQ Shi","year":"2002","unstructured":"Y.Q. Shi, X.M. Zhang, A new two-dimensional interleaving technique using successive packing. IEEE Trans. Circuits Syst. I Fundam. Theory Appl. 49(6), 779\u2013789 (2002)","journal-title":"IEEE Trans. Circuits Syst. I Fundam. Theory Appl."},{"key":"3293_CR29","doi-asserted-by":"publisher","first-page":"3485","DOI":"10.1007\/s11042-016-3734-2","volume":"76","author":"S Soleymani","year":"2017","unstructured":"S. Soleymani, A. Taherinia, Double expanding robust image watermarking based on spread spectrum technique and BCH coding. Multimed. Tools Appl. 76, 3485\u20133503 (2017)","journal-title":"Multimed. Tools Appl."},{"key":"3293_CR30","doi-asserted-by":"publisher","first-page":"23457","DOI":"10.1007\/s11042-020-10251-7","volume":"80","author":"S\u00b8 Altay","year":"2021","unstructured":"S.\u00b8 Altay, G. Uluta, Self-adaptive step firefly algorithm based robust watermarking method in dwt-svd domain. Multimed. Tools Appl. 80, 23457\u201323484 (2021)","journal-title":"Multimed. Tools Appl."},{"issue":"4","key":"3293_CR31","doi-asserted-by":"publisher","first-page":"1593","DOI":"10.1109\/TCSVT.2022.3216849","volume":"33","author":"Y Tang","year":"2023","unstructured":"Y. Tang, S. Wang, C. Wang, S. Xiang, Y.-M. Cheung, A highly robust reversible water-marking scheme using embedding optimization and rounded error compensation. IEEE Trans. Circuits Syst. Video Technol. 33(4), 1593\u20131609 (2023)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"3293_CR32","doi-asserted-by":"publisher","first-page":"4114","DOI":"10.1109\/TIFS.2024.3372811","volume":"19","author":"Y Tang","year":"2024","unstructured":"Y. Tang, C. Wang, S. Xiang, Y. Cheung, A robust reversible watermarking scheme using attack-simulation-based adaptive normalization and embedding. IEEE Trans. Inform. Forensics Secur. 19, 4114\u20134129 (2024)","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"key":"3293_CR33","volume":"76","author":"Z Tang","year":"2023","unstructured":"Z. Tang, X. Chai, Y. Lu, B. Wang, Y. Tan, An end-to-end screen shooting resilient blind watermarking scheme for medical images. J. Inf. Secur. Appl. 76, 103547 (2023)","journal-title":"J. Inf. Secur. Appl."},{"issue":"1","key":"3293_CR34","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1016\/j.asoc.2009.08.004","volume":"10","author":"I Usman","year":"2010","unstructured":"I. Usman, A. Khan, Bch coding and intelligent watermark embedding: employing both frequency and strength selection. Appl. Soft Comput. 10(1), 332\u2013343 (2010)","journal-title":"Appl. Soft Comput."},{"issue":"11","key":"3293_CR35","doi-asserted-by":"publisher","first-page":"6260","DOI":"10.1109\/TCSVT.2023.3265970","volume":"33","author":"B Wang","year":"2023","unstructured":"B. Wang, Y. Wu, G. Wang, Adaptor: improving the robustness and imperceptibility of watermarking by the adaptive strength factor. IEEE Trans. Circuits Syst. Video Technol. 33(11), 6260\u20136272 (2023)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"8","key":"3293_CR36","doi-asserted-by":"publisher","first-page":"2406","DOI":"10.1109\/TCSVT.2019.2915116","volume":"30","author":"X Wang","year":"2020","unstructured":"X. Wang, X. Li, Q. Pei, Independent embedding domain based two-stage robust reversible watermarking. IEEE Trans. Circuits Syst. Video Technol. 30(8), 2406\u20132417 (2020)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"3293_CR37","doi-asserted-by":"crossref","unstructured":"J. Wassermann, M. Windisch, Convolutional neural network decoder for enhanced hada-mard error correcting code and its application in video watermarking. in International Conference on Multimedia Communications, Services and Security, pp. 196\u2013208 (2020).","DOI":"10.1007\/978-3-030-59000-0_15"},{"issue":"12","key":"3293_CR38","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1364\/OE.3.000497","volume":"3","author":"X Xia","year":"1998","unstructured":"X. Xia, C. Boncelet, G, arce: wavelet transform based watermark for digital images. Opt. Express 3(12), 497\u2013511 (1998)","journal-title":"Opt. Express"},{"issue":"10","key":"3293_CR39","doi-asserted-by":"publisher","first-page":"3062","DOI":"10.3390\/s24103062","volume":"24","author":"M Windisch","year":"2024","unstructured":"M. Windisch, J. Wassermann, M. Leba, O. Stoicuta, Hadamard error-correcting codes and their application in digital watermarking. Sensors 24(10), 3062 (2024)","journal-title":"Sensors"}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-025-03293-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-025-03293-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-025-03293-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:14:27Z","timestamp":1774602867000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-025-03293-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,24]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["3293"],"URL":"https:\/\/doi.org\/10.1007\/s00034-025-03293-5","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,24]]},"assertion":[{"value":"16 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}