{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T02:09:57Z","timestamp":1777428597872,"version":"3.51.4"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T00:00:00Z","timestamp":1567814400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T00:00:00Z","timestamp":1567814400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s00500-019-04318-3","type":"journal-article","created":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T05:53:52Z","timestamp":1567835632000},"page":"5755-5772","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A watermarking scheme based on rotating vector for image content authentication"],"prefix":"10.1007","volume":"24","author":[{"given":"Jianjing","family":"Fu","sequence":"first","affiliation":[]},{"given":"Jiafa","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Dawen","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Deren","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,7]]},"reference":[{"key":"4318_CR1","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/s10278-014-9709-9","volume":"27","author":"A Al-Haj","year":"2014","unstructured":"Al-Haj A, Amer A (2014) Secured telemedicine using region-based watermarking with tamper localization. J Digit Imaging 27:737\u2013750","journal-title":"J Digit Imaging"},{"issue":"3","key":"4318_CR2","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1007\/s13198-014-0288-4","volume":"9","author":"M Ali","year":"2018","unstructured":"Ali M, Ahn CW (2018) An optimal image watermarking approach through cuckoo search algorithm in wavelet domain. Int J Syst Assur Eng Manag 9(3):602\u2013611","journal-title":"Int J Syst Assur Eng Manag"},{"key":"4318_CR3","doi-asserted-by":"publisher","first-page":"5493","DOI":"10.1007\/s11042-015-2522-8","volume":"75","author":"ST Chen","year":"2016","unstructured":"Chen ST, Huang HN, Kung WM, Hsu CY (2016) Optimization-based image watermarking with integrated quantization embedding in the wavelet domain. Multimed Tools Appl 75:5493\u20135511","journal-title":"Multimed Tools Appl"},{"key":"4318_CR4","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.aeue.2013.08.018","volume":"68","author":"C Das","year":"2014","unstructured":"Das C, Panigrahi S, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU Int J Electron Commun 68:244\u2013253","journal-title":"AEU Int J Electron Commun"},{"issue":"2","key":"4318_CR5","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1117\/1.1459449","volume":"11","author":"J Fridrich","year":"2002","unstructured":"Fridrich J, Goljan M, Memon N (2002) Cryptanalysis of the Yeung\u2013Mintzer fragile watermarking technique. J Electron Imaging 11(2):262\u2013274","journal-title":"J Electron Imaging"},{"issue":"2","key":"4318_CR6","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1504\/IJHPCN.2019.097508","volume":"13","author":"N Gol\u00e9a","year":"2019","unstructured":"Gol\u00e9a N, Kamal EM (2019) ROI-based fragile watermarking for medical image tamper detection. IJHPCN 13(2):199\u2013210","journal-title":"IJHPCN"},{"key":"4318_CR7","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.jvcir.2015.03.009","volume":"30","author":"J Guo","year":"2015","unstructured":"Guo J, Zheng P, Huang J (2015) Secure watermarking scheme against watermark attacks in the encrypted domain. J Vis Commun Image Represent 30:125\u2013135","journal-title":"J Vis Commun Image Represent"},{"issue":"3","key":"4318_CR8","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/83.826780","volume":"9","author":"M Holliman","year":"2000","unstructured":"Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432\u2013441","journal-title":"IEEE Trans Image Process"},{"key":"4318_CR9","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.jvcir.2017.03.009","volume":"46","author":"LY Hsu","year":"2017","unstructured":"Hsu LY, Hu HT (2017) Robust blind image watermarking using crisscross inter-block prediction in the DCT domain. J Vis Commun Image Represent 46:33\u201347","journal-title":"J Vis Commun Image Represent"},{"issue":"1","key":"4318_CR10","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1504\/IJHPCN.2018.093846","volume":"12","author":"H Huang","year":"2018","unstructured":"Huang H, Xie DQ, Qi K (2018) A watermarking-based authentication and image restoration in multimedia sensor networks. Int J High Perform Comput Netw 12(1):65\u201373","journal-title":"Int J High Perform Comput Netw"},{"key":"4318_CR11","unstructured":"ILSVRC dataset <\nhttp:\/\/image-net.org\/challenges\/LSVRC\/2016\/download-images-8r28.php>"},{"key":"4318_CR12","unstructured":"Imran S, Kumar DP, S. Tetsuya (2017) A semi-fragile watermarking method using slant transform and LU decomposition for image authentication. In: ECCE 2017\u2014international conference on electrical, computer and communication engineering. Cox\u2019s Bazar, Bangladesh, pp 881\u2013885"},{"issue":"1","key":"4318_CR13","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/TMM.2005.861293","volume":"8","author":"K Maeno","year":"2006","unstructured":"Maeno K, Sun Q, Chang S, Suto M (2006) New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization. IEEE Trans Multimed 8(1):32\u201345","journal-title":"IEEE Trans Multimed"},{"key":"4318_CR14","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/s13042-015-0331-z","volume":"8","author":"R Mehta","year":"2017","unstructured":"Mehta R, Rajpal N, Vishwakarma VP (2017) Robust and efficient image watermarking scheme based on Lagrangian SVR and lifting wavelet transform. Int J Mach Learn Cybernet 8:379\u2013395","journal-title":"Int J Mach Learn Cybernet"},{"key":"4318_CR15","doi-asserted-by":"crossref","unstructured":"Ourique F, Licks V, Jordan R, Perez G (2005) Angle QIM: a novel watermark embedding scheme robust against amplitude scaling distortions. In: Proceedings of 30th IEEE international conference on acoustics, speech, and signal processing, Philadelphia, vol 1\u20135, pp 797\u2013800","DOI":"10.1109\/ICASSP.2005.1415525"},{"key":"4318_CR16","doi-asserted-by":"publisher","first-page":"1597","DOI":"10.1016\/j.dsp.2010.03.010","volume":"20","author":"JC Patra","year":"2010","unstructured":"Patra JC, Phua JE, Bornand C (2010) A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Dig Sig Process 20:1597\u20131611","journal-title":"Dig Sig Process"},{"key":"4318_CR17","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.measurement.2012.07.010","volume":"46","author":"RO Preda","year":"2013","unstructured":"Preda RO (2013) Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 46:367\u2013373","journal-title":"Measurement"},{"key":"4318_CR18","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.jvcir.2015.05.006","volume":"30","author":"XJ Qi","year":"2015","unstructured":"Qi XJ, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 30:312\u2013327","journal-title":"J Vis Commun Image Represent"},{"key":"4318_CR19","doi-asserted-by":"publisher","first-page":"1095","DOI":"10.1007\/s11045-017-0490-z","volume":"29","author":"A Shabir","year":"2018","unstructured":"Shabir A et al (2018) Utilizing neighborhood coefficient correlation: a new image watermarking technique robust to singular and hybrid attacks. Multidimed Syst Sign Process 29:1095\u20131117","journal-title":"Multidimed Syst Sign Process"},{"key":"4318_CR20","unstructured":"SIPI Image Database <\nhttp:\/\/sipi.usc.edu\/database\/\n\n>"},{"key":"4318_CR21","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.jvcir.2015.06.001","volume":"31","author":"VS Verma","year":"2015","unstructured":"Verma VS, Jha RK, Ojha A (2015) Digital watermark extraction using support vector machine with principal component analysis based feature reduction. J Vis Commun Image Represent 31:75\u201385","journal-title":"J Vis Commun Image Represent"},{"key":"4318_CR22","doi-asserted-by":"publisher","first-page":"1681","DOI":"10.1016\/j.patrec.2004.06.012","volume":"25","author":"Y Wang","year":"2004","unstructured":"Wang Y, Pearmain A (2004) Blind image data hiding based on self reference. Pattern Recognit Lett 25:1681\u20131689","journal-title":"Pattern Recognit Lett"},{"issue":"4","key":"4318_CR23","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncell EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"issue":"1-2","key":"4318_CR24","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1504\/IJHPCN.2016.074660","volume":"9","author":"X Wang","year":"2016","unstructured":"Wang X, Cao J, Wang J (2016) A dynamic cloud service selection strategy using adaptive learning agents. Int J High Perform Comput Netw 9(1-2):70\u201381","journal-title":"Int J High Perform Comput Netw"},{"key":"4318_CR25","doi-asserted-by":"crossref","unstructured":"Zhang X, Cui L, Shao L (2012) A fast semi-fragile watermarking scheme based on quantizing the weighted mean of integer Haar wavelet coefficients. In: Proceedings of symposium on photonics and optoelectronics, pp 1\u20134","DOI":"10.1109\/SOPO.2012.6270467"},{"issue":"1-2","key":"4318_CR26","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1504\/IJHPCN.2016.074662","volume":"9","author":"M Zhang","year":"2016","unstructured":"Zhang M, Duan Z, Li Q, Chu H (2016) Transformation from business process models to BPEL with overlapped patterns involved. Int J High Perform Comput Netw 9(1-2):82\u201392","journal-title":"Int J High Perform Comput Netw"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-04318-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-019-04318-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-04318-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,5]],"date-time":"2020-09-05T23:08:25Z","timestamp":1599347305000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-019-04318-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,7]]},"references-count":26,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["4318"],"URL":"https:\/\/doi.org\/10.1007\/s00500-019-04318-3","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,7]]},"assertion":[{"value":"7 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}