{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T20:18:50Z","timestamp":1767212330909,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T00:00:00Z","timestamp":1537574400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s00500-018-3535-9","type":"journal-article","created":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T11:41:22Z","timestamp":1537616482000},"page":"9685-9699","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Selecting optimal blocks for image watermarking using entropy and distinct discrete firefly algorithm"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5577-9339","authenticated-orcid":false,"given":"Elham","family":"Moeinaddini","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,9,22]]},"reference":[{"key":"3535_CR1","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.ins.2014.12.042","volume":"301","author":"M Ali","year":"2015","unstructured":"Ali M, Ahn CW, Pant M, Siarry P (2015) An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony. Inf Sci 301:44\u201360. \n                    https:\/\/doi.org\/10.1016\/j.ins.2014.12.042","journal-title":"Inf Sci"},{"key":"3535_CR2","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s11265-010-0492-7","volume":"64","author":"A Aung","year":"2011","unstructured":"Aung A, Ng BP, Rahardja S (2011) A robust watermarking scheme using sequency-ordered complex hadamard transform. J Signal Process Syst 64:319\u2013333. \n                    https:\/\/doi.org\/10.1007\/s11265-010-0492-7","journal-title":"J Signal Process Syst"},{"key":"3535_CR3","doi-asserted-by":"publisher","unstructured":"Dong H, He M, Qiu M (2015) Optimized gray-scale image watermarking algorithm based on DWT-DCT-SVD and chaotic firefly algorithm. In: International conference on cyber-enabled distributed computing and knowledge discovery (CyberC), 17\u201319 Sept 2015, pp 310\u2013313. \n                    https:\/\/doi.org\/10.1109\/cyberc.2015.15","DOI":"10.1109\/cyberc.2015.15"},{"key":"3535_CR4","first-page":"14","volume":"12","author":"RV Franklin","year":"2011","unstructured":"Franklin RV, Manekandan GRS, Santhi V (2011) Entropy based robust watermarking scheme using Hadamard transformation technique. Int J Comput Appl 12:14\u201321","journal-title":"Int J Comput Appl"},{"key":"3535_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3144\/expresspolymlett.2010.1","volume":"4","author":"M Ishtiaq","year":"2010","unstructured":"Ishtiaq M, Sikandar B, Jaffar MA, Khan A (2010) Adaptive watermark strength selection using particle swarm optimization. ICIC Express Lett 4:1\u20136","journal-title":"ICIC Express Lett"},{"key":"3535_CR6","doi-asserted-by":"publisher","first-page":"20499","DOI":"10.1007\/s11042-016-3962-5","volume":"76","author":"B Kazemivash","year":"2016","unstructured":"Kazemivash B, Moghaddam ME (2016) A robust digital image watermarking technique using lifting wavelet transform and firefly algorithm. Multimed Tools Appl 76:20499\u201320524","journal-title":"Multimed Tools Appl"},{"key":"3535_CR7","doi-asserted-by":"publisher","first-page":"4083","DOI":"10.1007\/s00500-017-2617-4","volume":"22","author":"B Kazemivash","year":"2017","unstructured":"Kazemivash B, Moghaddam ME (2017) A predictive model-based image watermarking scheme using Regression Tree and Firefly algorithm. Soft Comput 22:4083\u20134098","journal-title":"Soft Comput"},{"key":"3535_CR8","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1016\/j.optcom.2010.10.047","volume":"284","author":"C-C Lai","year":"2011","unstructured":"Lai C-C (2011) An improved SVD-based watermarking scheme using human visual characteristics. Opt Commun 284:938\u2013944","journal-title":"Opt Commun"},{"key":"3535_CR9","first-page":"120","volume":"1","author":"J Lewis","year":"1995","unstructured":"Lewis J (1995) Fast normalized cross-correlation. Vis Interface 1:120\u2013123","journal-title":"Vis Interface"},{"key":"3535_CR10","first-page":"303","volume":"2","author":"K Loukhaoukha","year":"2011","unstructured":"Loukhaoukha K, Chouinard J-Y, Taieb MH (2011) Optimal image watermarking algorithm based on LWT-SVD via multi-objective ant colony optimization. J Inf Hiding Multimed Signal Process 2:303\u2013319","journal-title":"J Inf Hiding Multimed Signal Process"},{"key":"3535_CR11","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/j.aeue.2008.10.004","volume":"64","author":"SP Maity","year":"2010","unstructured":"Maity SP, Kundu MK (2010) DHT domain digital watermarking with low loss in image informations Aeu. Int J Electron Commun 64:243\u2013257","journal-title":"Int J Electron Commun"},{"key":"3535_CR12","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1016\/j.ins.2010.09.029","volume":"181","author":"SP Maity","year":"2011","unstructured":"Maity SP, Kundu MK (2011) Perceptually adaptive spread transform image watermarking scheme using Hadamard transform. Inf Sci 181:450\u2013465","journal-title":"Inf Sci"},{"key":"3535_CR13","doi-asserted-by":"publisher","first-page":"7858","DOI":"10.1016\/j.eswa.2014.06.011","volume":"41","author":"A Mishra","year":"2014","unstructured":"Mishra A, Agarwal C, Sharma A, Bedi P (2014) Optimized gray-scale image watermarking using DWT-SVD and Firefly Algorithm. Expert Syst Appl 41:7858\u20137867","journal-title":"Expert Syst Appl"},{"key":"3535_CR14","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1049\/ip-e.1989.0039","volume":"136","author":"NR Pal","year":"1989","unstructured":"Pal NR, Pal SK (1989) Object-background segmentation using new definitions of entropy. IEE Proc E Comput Digital Tech 136:284\u2013295","journal-title":"IEE Proc E Comput Digital Tech"},{"key":"3535_CR15","doi-asserted-by":"crossref","unstructured":"Raihan HK, Gogoi M (2017) A variance based approach (VBA) digital watermarking in frequency domain and comparative analysis using Walsh and Hadamard transform. Int J Comput Appl 163(9)","DOI":"10.5120\/ijca2017913725"},{"key":"3535_CR16","first-page":"298","volume":"3","author":"MIH Sarker","year":"2013","unstructured":"Sarker MIH, Khan MI (2013) An efficient image watermarking scheme using BFS technique based on hadamard transform. SmartCR 3:298\u2013308","journal-title":"SmartCR"},{"key":"3535_CR17","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:379\u2013423","journal-title":"Bell Syst Tech J"},{"key":"3535_CR18","unstructured":"USC, SIPI (2016) The usc-sipi image database. \n                    http:\/\/sipi.usc.edu\/services\/database\/database.html"},{"key":"3535_CR19","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.dsp.2011.08.006","volume":"22","author":"E Vahedi","year":"2012","unstructured":"Vahedi E, Zoroofi RA, Shiva M (2012) Toward a new wavelet-based watermarking approach for color images using bio-inspired optimization principles. Digit Signal Proc 22:153\u2013162","journal-title":"Digit Signal Proc"},{"key":"3535_CR20","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Proc 13:600\u2013612","journal-title":"IEEE Trans Image Proc"},{"key":"3535_CR21","doi-asserted-by":"publisher","first-page":"2378","DOI":"10.1109\/TIP.2011.2109730","volume":"20","author":"L Zhang","year":"2011","unstructured":"Zhang L, Zhang L, Mou X, Zhang D (2011) FSIM: a feature similarity index for image quality assessment. IEEE Trans Image Process 20:2378\u20132386","journal-title":"IEEE Trans Image Process"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3535-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-018-3535-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3535-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T19:04:49Z","timestamp":1569092689000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-018-3535-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,22]]},"references-count":21,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["3535"],"URL":"https:\/\/doi.org\/10.1007\/s00500-018-3535-9","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2018,9,22]]},"assertion":[{"value":"22 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"I wish to confirm that there are no known conflicts of interest associated with this article, and there has been no significant financial support for this work that could have influenced its outcome.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"I confirm that I am the only author and there are no other persons who satisfied the criteria for authorship but are not listed. I confirm that I have given due consideration to the protection of intellectual property associated with this work and that there are no impediments to publication, including the timing of publication, with respect to intellectual property. In so doing I confirm that I have followed the regulations of my institutions concerning intellectual property.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}