{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,4]],"date-time":"2024-05-04T23:27:35Z","timestamp":1714865255546},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2014,7,19]],"date-time":"2014-07-19T00:00:00Z","timestamp":1405728000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1007\/s00500-014-1373-y","type":"journal-article","created":{"date-parts":[[2014,7,18]],"date-time":"2014-07-18T11:32:46Z","timestamp":1405683166000},"page":"1905-1919","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Fragile watermarking using Karhunen\u2013Lo\u00e8ve transform: the KLT-F approach"],"prefix":"10.1007","volume":"19","author":[{"given":"Marco","family":"Botta","sequence":"first","affiliation":[]},{"given":"Davide","family":"Cavagnino","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Pomponiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,19]]},"reference":[{"issue":"14","key":"1373_CR1","doi-asserted-by":"crossref","first-page":"2806","DOI":"10.1016\/j.optcom.2009.04.034","volume":"282","author":"V Aslantas","year":"2009","unstructured":"Aslantas V, Ozer S, Ozturk S (2009) Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms. Optics Commun 282(14):2806\u20132817","journal-title":"Optics Commun"},{"key":"1373_CR2","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1117\/1.1426383","volume":"11","author":"M Barni","year":"2002","unstructured":"Barni M, Bartolini F, De Rosa A, Piva A (2002) Color image watermarking in the Karhunen\u2013Loeve transform domain. J Electron Imaging 11:87\u201395","journal-title":"J Electron Imaging"},{"issue":"2","key":"1373_CR3","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1049\/ip-vis:20020168","volume":"148","author":"PSLM Barreto","year":"2002","unstructured":"Barreto PSLM, Kim HY, Rijmen V (2002) Toward secure publickey blockwise fragile authentication watermarking. IEE Proc Vis Image Signal Process 148(2):57\u201362","journal-title":"IEE Proc Vis Image Signal Process"},{"key":"1373_CR4","doi-asserted-by":"crossref","unstructured":"Botta M, Cavagnino D, Pomponiu V (2011) KL-F: Karhunen\u2013Lo\u00e8ve based fragile watermarking. In: NSS 2011 5th international conference on network and system security, Italy pp 65\u201372","DOI":"10.1109\/ICNSS.2011.6059961"},{"key":"1373_CR5","doi-asserted-by":"crossref","unstructured":"Botta M, Cavagnino D, Pomponiu V (2014) Protecting the content integrity of digital imagery with fidelity preservation: an improved version. ACM Trans. Multimedia Comput. Commun. Appl. 10(3):29:1\u201329:5, April 2014, ACM, New York, NY, USA, doi: 10.1145\/2568224","DOI":"10.1145\/2568224"},{"issue":"4","key":"1373_CR6","doi-asserted-by":"crossref","first-page":"728","DOI":"10.1016\/j.sigpro.2010.07.019","volume":"91","author":"S Bravo-Solorio","year":"2011","unstructured":"Bravo-Solorio S, Nandi AK (2011) Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Signal Process 91(4):728\u2013739","journal-title":"Signal Process"},{"issue":"2","key":"1373_CR7","doi-asserted-by":"crossref","first-page":"654","DOI":"10.1016\/j.patcog.2007.06.003","volume":"41","author":"C-C Chang","year":"2008","unstructured":"Chang C-C, Fan Y-H, Tai W-L (2008) Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Patt Recogn 41(2):654\u2013661","journal-title":"Patt Recogn"},{"issue":"12","key":"1373_CR8","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox IJ, Kilian J, Leighton TT, Shamoon TG (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673\u20131687","journal-title":"IEEE Trans Image Process"},{"key":"1373_CR9","volume-title":"Digital watermarking and steganography","author":"IJ Cox","year":"2008","unstructured":"Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2008) Digital watermarking and steganography, 2nd edn. Morgan Kaufmann Publisher, San Francisco","edition":"2"},{"key":"1373_CR10","doi-asserted-by":"crossref","unstructured":"Dafas P, Stathaki T (2003) Digital image watermarking using block-based Karhunen\u2013Loeve transform. In: Proceedings of the 3rd IEEE international symposium on image and signal processing and analysis, vol 2, pp 1072\u20131075","DOI":"10.1109\/ISPA.2003.1296458"},{"key":"1373_CR11","unstructured":"Fridrich J (2002) Security of fragile authentication watermarks with localization. In: Proceedings SPIE 4675, security and watermarking of multimedia contents IV, vol 691, pp 691\u2013700"},{"key":"1373_CR12","volume-title":"Digital image processing","author":"RC Gonzalez","year":"1992","unstructured":"Gonzalez RC, Woods RE (1992) Digital image processing. Addison-Wesley Publisher, Boston"},{"key":"1373_CR13","volume-title":"Genetic algorithms in search. Optimization and machine learning","author":"DE Goldberg","year":"1989","unstructured":"Goldberg DE (1989) Genetic algorithms in search. Optimization and machine learning. Addison-Wesley Longman Publishing Co., Inc., Boston"},{"issue":"5","key":"1373_CR14","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MSP.2011.71","volume":"9","author":"S Han","year":"2011","unstructured":"Han S, Chu C-H, Luo Z (2011) Tamper detection in the EPC network using digital watermarking. IEEE Secur Priv 9(5):62\u201369","journal-title":"IEEE Secur Priv"},{"key":"1373_CR15","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-540-76827-2_1","volume":"96","author":"A-E Hassanien","year":"2008","unstructured":"Hassanien A-E, Abraham A, Kacprzyk J, Peters JF (2008) Computational intelligence in multimedia processing: foundation and trends. Stud Computat Intell 96:3\u201349","journal-title":"Stud Computat Intell"},{"issue":"1","key":"1373_CR16","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1109\/TIFS.2011.2162950","volume":"7","author":"H He","year":"2012","unstructured":"He H, Chen F, Tai H-M, Kalker T, Zhang J (2012) Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Trans Info Forensics Secur 7(1):185\u2013196","journal-title":"IEEE Trans Info Forensics Secur"},{"issue":"3","key":"1373_CR17","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1109\/TIFS.2008.926994","volume":"3","author":"ATS Ho","year":"2008","unstructured":"Ho ATS, Zhu X, Shen J, Marziliano P (2008) Fragile watermarking based on encoding of the zeroes of the $$z$$ z -transform. IEEE Trans Info Forensics Secur 3(3):567\u2013569","journal-title":"IEEE Trans Info Forensics Secur"},{"issue":"1","key":"1373_CR18","first-page":"60","volume":"2","author":"A Koval","year":"2011","unstructured":"Koval A, Shih FY, Verkhovsky BS (2011) A pseudo-random pixel rearrangement algorithm based on Gaussian integers for image watermarking. J Info Hiding Multimedia Signal Process 2(1):60\u201370","journal-title":"J Info Hiding Multimedia Signal Process"},{"key":"1373_CR19","unstructured":"Lee S-K, Ho Y-S (2002) Fragile watermarking scheme using a simple genetic algorithm. In: Proceedings of the international conference on consumer electronics, pp 190\u2013191"},{"key":"1373_CR20","unstructured":"Li L-J, Wang G, Li F-F (2008) OPTIMOL: automatic object picture collecTion via incremental mOdel learning. In:Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1\u20138"},{"issue":"3","key":"1373_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2000486.2000489","volume":"7","author":"P-Y Lin","year":"2011","unstructured":"Lin P-Y, Lee J-S, Chang C-C (2011) Protecting the content integrity of digital imagery with fidelity preservation. ACM Trans Multimedia Comput Commun Appl 7(3):1\u201320 Article 15","journal-title":"ACM Trans Multimedia Comput Commun Appl"},{"key":"1373_CR22","doi-asserted-by":"crossref","unstructured":"Liu P-P, Zhu Z-L, Wang H-X, Yan T-Y (2008) A novel image fragile watermarking algorithm based on chaotic map. In: Proceedings of congress on image and signal processing, vol 5, pp 631\u2013634","DOI":"10.1109\/CISP.2008.636"},{"key":"1373_CR23","unstructured":"Oktavia V, Lee W-H (2005) A fragile watermarking technique for image authentication using singular value decomposition. In: Proceedings of advances in multimedia information processing, LNCS vol 3332, pp 42\u201349"},{"key":"1373_CR24","doi-asserted-by":"crossref","unstructured":"Pan J-S, Abraham A (2009) Guest editorial: bio-inspired information hiding. Soft Comput 13(4):319\u2013320","DOI":"10.1007\/s00500-008-0325-9"},{"key":"1373_CR25","doi-asserted-by":"crossref","first-page":"254","DOI":"10.4018\/978-1-61520-903-3.ch011","volume-title":"Advanced techniques in multimedia watermarking: image. Video and audio applications","author":"V Pomponiu","year":"2010","unstructured":"Pomponiu V, Cavagnino D, Basso A, Vernone A (2010) Data hiding schemes based on singular value decomposition. In: Al-Haj AM (ed) Advanced techniques in multimedia watermarking: image. Video and audio applications. IGI Global, Pennsylvania, pp 254\u2013288"},{"key":"1373_CR26","doi-asserted-by":"crossref","unstructured":"Premaratne P, Ko C-C (1999) A novel watermark embedding and detection scheme for images in DFT domain. In: Proceedings of 7th international conference on image processing and its applications, vol 2. pp 780\u2013783","DOI":"10.1049\/cp:19990430"},{"key":"1373_CR27","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1016\/j.aeue.2011.01.016","volume":"65","author":"S Rawat","year":"2011","unstructured":"Rawat S, Raman B (2011) A chaotic system based fragile watermarking scheme for image tamper detection. AEU-Intern J Electron Commun 65:840\u2013847","journal-title":"AEU-Intern J Electron Commun"},{"issue":"2","key":"1373_CR28","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.jvcir.2004.05.002","volume":"16","author":"FY Shih","year":"2005","unstructured":"Shih FY, Wu Y-T (2005) Enhancement of image watermark retrieval based on genetic algorithms. J Vis Commun Image Represent 16(2):115\u2013133","journal-title":"J Vis Commun Image Represent"},{"issue":"3","key":"1373_CR29","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.ins.2005.01.013","volume":"175","author":"FY Shih","year":"2005","unstructured":"Shih FY, Wu Y-T (2005) Robust watermarking and compression for medical images based on genetic algorithms. Info Sci 175(3):200\u2013216","journal-title":"Info Sci"},{"key":"1373_CR30","doi-asserted-by":"crossref","unstructured":"Stanescu D, Stratulat M, Ciubotaru B, Chiciudean D, Cioarga R-D, Borca D (2007) Digital watermarking using Karhunen\u2013Loeve transform. In: Proceedings of 4th international symposium on applied computational intelligence and informatics, pp 187\u2013190","DOI":"10.1109\/SACI.2007.375507"},{"issue":"1","key":"1373_CR31","first-page":"37","volume":"4","author":"I Usman","year":"2007","unstructured":"Usman I, Khan A, Chamlawi R, Majid A (2007) Image authenticity and perceptual optimization via genetic algorithm and a dependence neighborhood. Intern J Appl Math Comput Sci 4(1):37\u201342","journal-title":"Intern J Appl Math Comput Sci"},{"issue":"1","key":"1373_CR32","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/MSP.2008.930649","volume":"26","author":"Z Wang","year":"2009","unstructured":"Wang Z, Bovik AC (2009) Mean squared error: love it or leave it? A new look at signal fidelity measures. IEEE Signal Process Mag 26(1):98\u2013117","journal-title":"IEEE Signal Process Mag"},{"issue":"10","key":"1373_CR33","doi-asserted-by":"crossref","first-page":"1593","DOI":"10.1109\/83.951543","volume":"10","author":"PW Wong","year":"2001","unstructured":"Wong PW, Memon ND (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593\u20131601","journal-title":"IEEE Trans Image Process"},{"key":"1373_CR34","doi-asserted-by":"crossref","unstructured":"Yeung MM, Mintzer F (1997) An invisible watermarking technique for image verification. In: Proceedings of international conference on image processing, vol 2, pp 680\u2013683","DOI":"10.1109\/ICIP.1997.638587"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-014-1373-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-014-1373-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-014-1373-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T01:43:40Z","timestamp":1559094220000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-014-1373-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,19]]},"references-count":34,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2015,7]]}},"alternative-id":["1373"],"URL":"https:\/\/doi.org\/10.1007\/s00500-014-1373-y","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,19]]}}}