{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:16:29Z","timestamp":1766578589653,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T00:00:00Z","timestamp":1552089600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s00500-019-03838-2","type":"journal-article","created":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T11:28:30Z","timestamp":1552130910000},"page":"9821-9829","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Highly robust hybrid image watermarking approach using Tchebichef transform with secured PCA and CAT encryption"],"prefix":"10.1007","volume":"23","author":[{"given":"Rabeah","family":"Noor","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4895-7544","authenticated-orcid":false,"given":"Ahmed","family":"Khan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aaliya","family":"Sarfaraz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zahid","family":"Mehmood","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Adnan Mustafa","family":"Cheema","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,3,9]]},"reference":[{"issue":"9","key":"3838_CR1","doi-asserted-by":"publisher","first-page":"8002","DOI":"10.1109\/ACCESS.2016.2627241","volume":"4","author":"D Bhowmik","year":"2016","unstructured":"Bhowmik D, Oakes M, Abhayaratne C (2016) Visual attention-based image watermarking. IEEE Access 4(9):8002\u20138018","journal-title":"IEEE Access"},{"key":"3838_CR2","doi-asserted-by":"crossref","unstructured":"Gao G, Cui Z, Zhou C (2018) Blind reversible authentication based on PEE and CS reconstruction. IEEE Signal Process Lett","DOI":"10.1109\/LSP.2018.2844562"},{"key":"3838_CR3","doi-asserted-by":"crossref","unstructured":"Guo Y, Cao X, Zhang W, Wang R (2018) Fake colorized image detection. arXiv preprint \n                    arXiv:1801.02768","DOI":"10.1109\/TIFS.2018.2806926"},{"issue":"4","key":"3838_CR4","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1049\/iet-bmt.2017.0145","volume":"7","author":"O Juarez-Sandoval","year":"2018","unstructured":"Juarez-Sandoval O, Fragoso-Navarro E, Cedillo-Hernandez M, Cedillo-Hernandez A, Nakano M, Perez-Meana H (2018) Improved imperceptible visible watermarking algorithm for auxiliary information delivery. IET Biom 7(4):305\u2013313","journal-title":"IET Biom"},{"issue":"4","key":"3838_CR5","first-page":"525","volume":"3","author":"A Khan","year":"2014","unstructured":"Khan A (2014) Joint ownership verification for digital text. Adv Comput Sci Appl 3(4):525\u2013531","journal-title":"Adv Comput Sci Appl"},{"issue":"6","key":"3838_CR6","first-page":"6091","volume":"27","author":"A Khan","year":"2015","unstructured":"Khan A (2015a) Comparative analysis of watermarking techniques. Sci Int 27(6):6091\u20136096","journal-title":"Sci Int"},{"issue":"4","key":"3838_CR7","first-page":"426","volume":"4","author":"A Khan","year":"2015","unstructured":"Khan A (2015b) Robust textual steganography. J Sci 4(4):426\u2013434","journal-title":"J Sci"},{"issue":"2","key":"3838_CR8","first-page":"361","volume":"29","author":"A Khan","year":"2017","unstructured":"Khan A, Sarfaraz A (2017) Vetting the security of mobile applications. Sci Int 29(2):361\u2013365","journal-title":"Sci Int"},{"issue":"3","key":"3838_CR9","first-page":"19","volume":"12","author":"A Khan","year":"2018","unstructured":"Khan A, Sarfaraz A (2018a) Practical guidelines for securing wireless local area networks (WLANs). Int J Secur Appl 12(3):19\u201328","journal-title":"Int J Secur Appl"},{"key":"3838_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-018-3441-1","author":"A Khan","year":"2018","unstructured":"Khan A, Sarfaraz A (2018b) Novel high-capacity robust and imperceptible image steganography scheme using multi flipped permutations and frequency entropy matching method. Soft Comput. \n                    https:\/\/doi.org\/10.1007\/s00500-018-3441-1","journal-title":"Soft Comput"},{"issue":"5","key":"3838_CR11","first-page":"4451","volume":"28","author":"A Khan","year":"2016","unstructured":"Khan A, Sohaib M, Amjad FM (2016) High-capacity multi-layer framework for highly robust textual steganography. Sci Int 28(5):4451\u20134457","journal-title":"Sci Int"},{"issue":"9","key":"3838_CR12","doi-asserted-by":"publisher","first-page":"2372","DOI":"10.1109\/TIFS.2018.2819122","volume":"13","author":"ZX Lin","year":"2018","unstructured":"Lin ZX, Peng F, Long M (2018) A low-distortion reversible watermarking for 2D engineering graphics based on region nesting. IEEE Trans Inf Forensics Secur 13(9):2372\u20132382","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"10","key":"3838_CR13","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1049\/iet-ipr.2016.0862","volume":"11","author":"S Liu","year":"2017","unstructured":"Liu S, Pan Z, Song H (2017) Digital image watermarking method based on DCT and fractal encoding. IET Image Proc 11(10):815\u2013821","journal-title":"IET Image Proc"},{"key":"3838_CR14","doi-asserted-by":"publisher","first-page":"19876","DOI":"10.1109\/ACCESS.2018.2808172","volume":"6","author":"NA Loan","year":"2018","unstructured":"Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6:19876\u201319897","journal-title":"IEEE Access"},{"key":"3838_CR15","doi-asserted-by":"publisher","first-page":"29715","DOI":"10.1109\/ACCESS.2018.2841020","volume":"6","author":"S Mart\u00ednez","year":"2018","unstructured":"Mart\u00ednez S, G\u00e9rard S, Cabot J (2018) On watermarking for collaborative model-driven engineering. IEEE Access 6:29715\u201329728","journal-title":"IEEE Access"},{"issue":"11","key":"3838_CR16","doi-asserted-by":"publisher","first-page":"13133","DOI":"10.1007\/s11042-017-4935-z","volume":"77","author":"A Miri","year":"2018","unstructured":"Miri A, Faez K (2018) An image steganography method based on integer wavelet transform. Multimed Tools Appl 77(11):13133\u201313144","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"3838_CR17","doi-asserted-by":"publisher","first-page":"1509","DOI":"10.1109\/TIFS.2018.2790953","volume":"13","author":"X Nie","year":"2018","unstructured":"Nie X, Li X, Chai Y, Cui C, Xi X, Yin Y (2018) Robust image fingerprinting based on feature point relationship mining. IEEE Trans Inf Forensics Secur 13(6):1509\u20131523","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3838_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-6097-3","author":"R Noor","year":"2018","unstructured":"Noor R, Khan A, Sarfaraz A (2018) High performance and energy efficient image watermarking for video using a mobile device. Wirel Pers Commun. \n                    https:\/\/doi.org\/10.1007\/s11277-018-6097-3","journal-title":"Wirel Pers Commun"},{"issue":"2","key":"3838_CR19","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MCC.2018.022171667","volume":"5","author":"Z Qin","year":"2018","unstructured":"Qin Z, Weng J, Cui Y, Ren K (2018) Privacy-preserving image processing in the cloud. IEEE Cloud Comput 5(2):48\u201357","journal-title":"IEEE Cloud Comput"},{"issue":"11","key":"3838_CR20","doi-asserted-by":"publisher","first-page":"13493","DOI":"10.1007\/s11042-016-3722-6","volume":"76","author":"M Saidi","year":"2017","unstructured":"Saidi M, Hermassi H, Rhouma R, Belghith S (2017) A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl 76(11):13493\u201313510","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"3838_CR21","doi-asserted-by":"publisher","first-page":"2995","DOI":"10.1007\/s11277-018-5989-6","volume":"103","author":"A Sarfaraz","year":"2018","unstructured":"Sarfaraz A, Khan A (2018) Feature selection based correlation attack on HTTPS secure searching. Wireless Pers Commun 103(4):2995\u20133008","journal-title":"Wireless Pers Commun"},{"issue":"11","key":"3838_CR22","first-page":"1917","volume":"23","author":"S Sarreshtedari","year":"2015","unstructured":"Sarreshtedari S, Akhaee MA, Abbasfar A (2015) A watermarking method for digital speech self-recovery. IEEE Trans Audio Speech Lang Process 23(11):1917\u20131925","journal-title":"IEEE Trans Audio Speech Lang Process"},{"issue":"5","key":"3838_CR23","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1049\/iet-ipr.2017.0898","volume":"12","author":"HR Shahdoosti","year":"2017","unstructured":"Shahdoosti HR, Salehi M (2017) Transform-based watermarking algorithm maintaining perceptual transparency. IET Image Proc 12(5):751\u2013759","journal-title":"IET Image Proc"},{"key":"3838_CR24","doi-asserted-by":"crossref","unstructured":"Shuguo Y, Qingliang L (2017) Image watermarking algorithm based on wavelet transform. In: 2017 IEEE 2nd international conference on signal and image processing, pp 116\u2013121","DOI":"10.1109\/SIPROCESS.2017.8124517"},{"key":"3838_CR25","unstructured":"Sutojo T, Rachmawanto EH, Sari CA (2017) Fast and efficient image watermarking algorithm using discrete tchebichef transform. In: 2017 5th IEEE international conference on cyber and IT service management, pp 1\u20135"},{"issue":"10","key":"3838_CR26","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1049\/iet-ipr.2016.0927","volume":"11","author":"Y Wang","year":"2017","unstructured":"Wang Y, Liu J, Yang Y, Ma D, Liu R (2017) 3D model watermarking algorithm robust to geometric attacks. IET Image Proc 11(10):822\u2013832","journal-title":"IET Image Proc"},{"issue":"4","key":"3838_CR27","doi-asserted-by":"publisher","first-page":"2063","DOI":"10.1109\/TIP.2018.2795745","volume":"27","author":"YG Wang","year":"2018","unstructured":"Wang YG, Zhu G, Shi YQ (2018) Transportation spherical watermarking. IEEE Trans Image Process 27(4):2063\u20132077","journal-title":"IEEE Trans Image Process"},{"issue":"8","key":"3838_CR28","doi-asserted-by":"publisher","first-page":"1620","DOI":"10.1109\/TCSVT.2016.2556585","volume":"27","author":"HZ Wu","year":"2017","unstructured":"Wu HZ, Shi YQ, Wang HX, Zhou LN (2017) Separable reversible data hiding for encrypted palette images with color partitioning and flipping verification. IEEE Trans Circuits Syst Video Technol 27(8):1620\u20131631","journal-title":"IEEE Trans Circuits Syst Video Technol"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-03838-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-019-03838-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-03838-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,8]],"date-time":"2020-03-08T00:09:34Z","timestamp":1583626174000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-019-03838-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,9]]},"references-count":28,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["3838"],"URL":"https:\/\/doi.org\/10.1007\/s00500-019-03838-2","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2019,3,9]]},"assertion":[{"value":"9 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"Mentioned authors have no conflict of interest upon this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='SmallCaps' removed-->Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}