{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:07:36Z","timestamp":1774541256529,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T00:00:00Z","timestamp":1595376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T00:00:00Z","timestamp":1595376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s00371-020-01883-9","type":"journal-article","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T08:09:31Z","timestamp":1595405371000},"page":"1481-1498","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Extended visual cryptography-based copyright protection scheme for multiple images and owners using LBP\u2013SURF descriptors"],"prefix":"10.1007","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8478-6407","authenticated-orcid":false,"given":"Sonal","family":"Kukreja","sequence":"first","affiliation":[]},{"given":"Geeta","family":"Kasana","sequence":"additional","affiliation":[]},{"given":"Singara Singh","family":"Kasana","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,22]]},"reference":[{"issue":"2","key":"1883_CR1","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/TVCG.2008.101","volume":"15","author":"Y Wang","year":"2008","unstructured":"Wang, Y., Hu, S.-H.: A new watermarking method for 3d models based on integral invariants. IEEE Trans. Vis. Comput. Gr. 15(2), 285\u2013294 (2008)","journal-title":"IEEE Trans. Vis. Comput. Gr."},{"issue":"8\u201310","key":"1883_CR2","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1007\/s00371-005-0311-5","volume":"21","author":"J Wu","year":"2005","unstructured":"Wu, J., Kobbelt, L.: Efficient spectral watermarking of large meshes with orthogonal basis functions. Vis. Comput. 21(8\u201310), 848\u2013857 (2005)","journal-title":"Vis. Comput."},{"issue":"9\u201311","key":"1883_CR3","doi-asserted-by":"publisher","first-page":"845","DOI":"10.1007\/s00371-006-0069-4","volume":"22","author":"Y-M Cheng","year":"2006","unstructured":"Cheng, Y.-M., Wang, C.-M.: A high-capacity steganographic approach for 3d polygonal meshes. The Visual Computer 22(9\u201311), 845\u2013855 (2006)","journal-title":"The Visual Computer"},{"issue":"9","key":"1883_CR4","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1007\/s00371-018-1574-y","volume":"35","author":"G Li","year":"2019","unstructured":"Li, G., et al.: Double chaotic image encryption algorithm based on optimal sequence solution and fractional transform. Vis. Comput. 35(9), 1267\u20131277 (2019)","journal-title":"Vis. Comput."},{"key":"1883_CR5","doi-asserted-by":"crossref","unstructured":"Naor, M., Shamir, A.: Visual cryptography. In: Workshop on the Theory and Application of of Cryptographic Techniques, pp. 1\u201312. Springer (1994)","DOI":"10.1007\/BFb0053419"},{"key":"1883_CR6","first-page":"1","volume":"250","author":"G Ateniese","year":"1996","unstructured":"Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended schemes for visual cryptography. Theoret. Comput. Sci. 250, 1\u201316 (1996)","journal-title":"Theoret. Comput. Sci."},{"issue":"2","key":"1883_CR7","doi-asserted-by":"publisher","first-page":"820936","DOI":"10.1155\/S1110865702000525","volume":"2002","author":"IJ Cox","year":"2002","unstructured":"Cox, I.J., Miller, M.L.: The first 50 years of electronic watermarking. EURASIP J. Adv. Signal Process. 2002(2), 820936 (2002)","journal-title":"EURASIP J. Adv. Signal Process."},{"issue":"3","key":"1883_CR8","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1080\/13682199.2002.11784400","volume":"50","author":"C-C Chang","year":"2002","unstructured":"Chang, C.-C., Hsiao, J.-Y., Yeh, J.-C.: A colour image copyright protection scheme based on visual cryptography and discrete cosine transform. Imaging Sci. J. 50(3), 133\u2013140 (2002)","journal-title":"Imaging Sci. J."},{"issue":"7","key":"1883_CR9","doi-asserted-by":"publisher","first-page":"077003","DOI":"10.1117\/1.1951647","volume":"44","author":"C-S Hsu","year":"2005","unstructured":"Hsu, C.-S., Hou, Y.-C.: Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt. Eng. 44(7), 077003 (2005)","journal-title":"Opt. Eng."},{"key":"1883_CR10","unstructured":"Wang, C.-C., Tai, S.-C., Yu, C-.S.: Repeating image watermarking technique by the visual cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 83(8), 1589\u20131598 (2000)"},{"key":"1883_CR11","doi-asserted-by":"crossref","unstructured":"Hsieh, S.-L., Hsu, L.-Y., Tsai, I.-J.: A copyright protection scheme for color images using secret sharing and wavelet transform. In: Proceedings of World Academy of Science, Engineering and Technology, volume\u00a010 (2005)","DOI":"10.1109\/ICSMC.2006.384433"},{"key":"1883_CR12","doi-asserted-by":"crossref","unstructured":"Chen, T.-H., Chang, C.-C., Wu, C.-Sn., Lou, D.-C.: On the security of a copyright protection scheme based on visual cryptography. Computer Standards & Interfaces 31(1), 1\u20135 (2009)","DOI":"10.1016\/j.csi.2007.09.001"},{"issue":"1","key":"1883_CR13","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.csi.2006.02.003","volume":"29","author":"D-C Lou","year":"2007","unstructured":"Lou, D.-C., Tso, H.-K., Liu, J.-L.: A copyright protection scheme for digital images using visual cryptography technique. Comput. Standards Interfaces 29(1), 125\u2013131 (2007)","journal-title":"Comput. Standards Interfaces"},{"issue":"2","key":"1883_CR14","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1049\/iet-ifs.2009.0183","volume":"5","author":"F Liu","year":"2011","unstructured":"Liu, F., Wu, C.-K.: Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners. IET Inf. Secur. 5(2), 121\u2013128 (2011)","journal-title":"IET Inf. Secur."},{"issue":"4","key":"1883_CR15","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1016\/j.csi.2008.09.003","volume":"31","author":"M-S Wang","year":"2009","unstructured":"Wang, M.-S., Chen, W.-C.: A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Comput. Standards Interfaces 31(4), 757\u2013762 (2009)","journal-title":"Comput. Standards Interfaces"},{"issue":"11","key":"1883_CR16","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1016\/j.aeue.2012.04.004","volume":"66","author":"S Rawat","year":"2012","unstructured":"Rawat, S., Raman, B.: A publicly verifiable lossless watermarking scheme for copyright protection and ownership assertion. AEU-Int. J. Electron. Commun. 66(11), 955\u2013962 (2012)","journal-title":"AEU-Int. J. Electron. Commun."},{"issue":"14","key":"1883_CR17","doi-asserted-by":"publisher","first-page":"8527","DOI":"10.1007\/s11042-015-2770-7","volume":"75","author":"T Amiri","year":"2016","unstructured":"Amiri, T., Moghaddam, M.E.: A new visual cryptography based watermarking scheme using dwt and sift for multiple cover images. Multimed. Tools Appl. 75(14), 8527\u20138543 (2016)","journal-title":"Multimed. Tools Appl."},{"key":"1883_CR18","doi-asserted-by":"crossref","unstructured":"Hou, Y.-C., Chen, P.-M.: An asymmetric watermarking scheme based on visual cryptography. In Signal Processing Proceedings, 2000. WCCC-ICSP 2000. 5th International Conference on, volume\u00a02, pages 992\u2013995. IEEE (2000)","DOI":"10.1109\/ICOSP.2000.891692"},{"key":"1883_CR19","doi-asserted-by":"crossref","unstructured":"Hou, Y.-C., Tseng, A,-Y., Quan, Z.-Y., Liu, H.-J.: An ipr protection scheme based on wavelet transformation and visual cryptography. Turk. J. Electr. Eng. Compu. Sci. 24(5), 4063\u20134082 (2016)","DOI":"10.3906\/elk-1405-180"},{"issue":"2","key":"1883_CR20","first-page":"97","volume":"3","author":"R-J Hwang","year":"2000","unstructured":"Hwang, R.-J.: A digital image copyright protection scheme based on visual cryptography. Tamkang J. Sci. Eng. 3(2), 97\u2013106 (2000)","journal-title":"Tamkang J. Sci. Eng."},{"issue":"6","key":"1883_CR21","doi-asserted-by":"publisher","first-page":"067006","DOI":"10.1117\/1.2746906","volume":"46","author":"M-S Wang","year":"2007","unstructured":"Wang, M.-S., Chen, W.-C.: Digital image copyright protection scheme based on visual cryptography and singular value decomposition. Opt. Eng. 46(6), 067006 (2007)","journal-title":"Opt. Eng."},{"issue":"1","key":"1883_CR22","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1186\/s40064-016-2733-0","volume":"5","author":"B Pushpa Devi","year":"2016","unstructured":"Pushpa Devi, B., Manglem Singh, K., Roy, S.: A copyright protection scheme for digital images based on shuffled singular value decomposition and visual cryptography. SpringerPlus 5(1), 1091 (2016)","journal-title":"SpringerPlus"},{"key":"1883_CR23","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.image.2016.09.001","volume":"48","author":"Z Shao","year":"2016","unstructured":"Shao, Z., Shang, Y., Zeng, R., Shu, H., Coatrieux, G., Jiasong, W.: Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography. Sig. Process. Image Commun. 48, 12\u201321 (2016)","journal-title":"Sig. Process. Image Commun."},{"key":"1883_CR24","doi-asserted-by":"crossref","unstructured":"Xue, M., Yuan, C. Liu, Z., Wang, J.: SSL: A novel image hashing technique using sift keypoints with saliency detection and lbp feature extraction against combinatorial manipulations. Security and Communication Networks (2019)","DOI":"10.1155\/2019\/9795621"},{"key":"1883_CR25","first-page":"71","volume":"45","author":"A Fatahbeygi","year":"2019","unstructured":"Fatahbeygi, A., Akhlaghian Tab, F.: A highly robust and secure image watermarking based on classification and visual cryptography. J. inf. Secur Appl. 45, 71\u201378 (2019)","journal-title":"J. inf. Secur Appl."},{"issue":"3","key":"1883_CR26","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.cviu.2007.09.014","volume":"110","author":"H Bay","year":"2008","unstructured":"Bay, H., Ess, A., Tuytelaars, T., Van Gool, L.: Speeded-up robust features (SURF). Comput. Vis. Image Underst. 110(3), 346\u2013359 (2008)","journal-title":"Comput. Vis. Image Underst."},{"key":"1883_CR27","unstructured":"Karami, E., Prasad, S., Shehata, M.: Image matching using sift, surf, brief and orb: performance comparison for distorted images. arXiv preprint arXiv:1710.02726 (2017)"},{"issue":"7","key":"1883_CR28","doi-asserted-by":"publisher","first-page":"1949","DOI":"10.1016\/j.patcog.2013.01.003","volume":"46","author":"C Zhu","year":"2013","unstructured":"Zhu, C., Bichot, C.-E., Chen, L.: Image region description using orthogonal combination of local binary patterns enhanced with color information. Pattern Recogn. 46(7), 1949\u20131963 (2013)","journal-title":"Pattern Recogn."},{"issue":"1","key":"1883_CR29","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/0031-3203(95)00067-4","volume":"29","author":"T Ojala","year":"1996","unstructured":"Ojala, T., Pietik\u00e4inen, M., Harwood, D.: A comparative study of texture measures with classification based on featured distributions. Pattern Recognit. 29(1), 51\u201359 (1996)","journal-title":"Pattern Recognit."},{"key":"1883_CR30","doi-asserted-by":"crossref","unstructured":"Prabhakar, C.J., Praveen Kumar, P.U.: LBP\u2013SURF descriptor with color invariant and texture based features for underwater images. In: Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing, ICVGIP \u201912, New York, NY, USA (2012). Association for Computing Machinery","DOI":"10.1145\/2425333.2425356"},{"key":"1883_CR31","unstructured":"Jiang, P., Zhao, S., Cheng, S.: Rotational invariant lbp-surf for fast and robust image matching. In: 2015 9th International Conference on Signal Processing and Communication Systems (ICSPCS), pages 1\u20137 (2015)"},{"key":"1883_CR32","unstructured":"USC-SIPI\u00a0Image Database. http:\/\/sipi.usc.edu\/database\/database.php?volume=misc"},{"key":"1883_CR33","doi-asserted-by":"crossref","unstructured":"Lee, J.-S., Wong, H.-S., Wang, Y.-H., Variation-free watermarking technique based on scale relationship. Computer science and information technology (CS & IT), 225239, (2014)","DOI":"10.5121\/csit.2014.4121"},{"issue":"8","key":"1883_CR34","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/35.940053","volume":"39","author":"S Voloshynovskiy","year":"2001","unstructured":"Voloshynovskiy, S., Pereira, S., Pun, T., Eggers, J.J., Su, J.K.: Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE Commun. Mag. 39(8), 118\u2013126 (2001)","journal-title":"IEEE Commun. Mag."},{"key":"1883_CR35","doi-asserted-by":"crossref","unstructured":"Kutter, M., Petitcolas, F.A.P.: Fair benchmark for image watermarking systems. In: Security and Watermarking of Multimedia Contents, volume 3657, pp. 226\u2013239. International Society for Optics and Photonics (1999)","DOI":"10.1117\/12.344672"},{"issue":"3","key":"1883_CR36","doi-asserted-by":"publisher","first-page":"3577","DOI":"10.1007\/s11042-016-3902-4","volume":"76","author":"S Roy","year":"2017","unstructured":"Roy, S., Pal, A.K.: A robust blind hybrid image watermarking scheme in rdwt-dct domain using arnold scrambling. Multimedia Tools Appl. 76(3), 3577\u20133616 (2017)","journal-title":"Multimedia Tools Appl."},{"key":"1883_CR37","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.ijleo.2018.04.050","volume":"170","author":"P Murali","year":"2018","unstructured":"Murali, P., Sankaradass, V.: An efficient roi based copyright protection scheme for digital images with svd and orthogonal polynomials transformation. Optik 170, 242\u2013264 (2018)","journal-title":"Optik"},{"key":"1883_CR38","doi-asserted-by":"crossref","unstructured":"Ernawan, F., Kabir, M.N.: A block-based rdwt-svd image watermarking method using human visual system characteristics. Vis. Comput. pp. 1\u201319 (2018)","DOI":"10.1007\/s00371-018-1567-x"},{"key":"1883_CR39","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1016\/j.future.2018.12.036","volume":"94","author":"NN Hurrah","year":"2019","unstructured":"Hurrah, N.N., Parah, S.A., Loan, N.A., Sheikh, J.A., Elhoseny, M., Muhammad, K.: Dual watermarking framework for privacy protection and content authentication of multimedia. Future Gen. Comput. Syst. 94, 654\u2013673 (2019)","journal-title":"Future Gen. Comput. Syst."},{"key":"1883_CR40","first-page":"231","volume":"46","author":"R Thanki","year":"2019","unstructured":"Thanki, R., Kothari, A., Trivedi, D.: Hybrid and blind watermarking scheme in DCuT-RDWT domain. J. Inf. Secur. Appl. 46, 231\u2013249 (2019)","journal-title":"J. Inf. Secur. Appl."}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-020-01883-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-020-01883-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-020-01883-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,10]],"date-time":"2024-08-10T14:36:20Z","timestamp":1723300580000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-020-01883-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,22]]},"references-count":40,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["1883"],"URL":"https:\/\/doi.org\/10.1007\/s00371-020-01883-9","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,22]]},"assertion":[{"value":"22 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"None.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Funding"}},{"value":"The authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}