{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:55:29Z","timestamp":1762005329723,"version":"3.37.3"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T00:00:00Z","timestamp":1628553600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T00:00:00Z","timestamp":1628553600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62062023"],"award-info":[{"award-number":["62062023"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Guizhou Science and Technology Plan Project","award":["ZK[2021]-YB314"],"award-info":[{"award-number":["ZK[2021]-YB314"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimedia Systems"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s00530-021-00835-0","type":"journal-article","created":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T06:02:49Z","timestamp":1628575369000},"page":"295-310","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["DwiMark: a multiscale robust deep watermarking framework for diffusion-weighted imaging images"],"prefix":"10.1007","volume":"28","author":[{"given":"Bin","family":"Fan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9813-4979","authenticated-orcid":false,"given":"Zhi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,10]]},"reference":[{"key":"835_CR1","doi-asserted-by":"crossref","unstructured":"Khoo Michael M.\u00a0Y., Tyler Philippa\u00a0A.: Asif Saifuddin, and Anwar\u00a0R. Padhani. Diffusion-weighted imaging (dwi) in musculoskeletal mri: a critical review. Skeletal Radiology, 40(6):665\u2013681, (2011)","DOI":"10.1007\/s00256-011-1106-6"},{"key":"835_CR2","doi-asserted-by":"crossref","unstructured":"Amoroso, N.: Diffusion-weighted imaging (dwi) tractography and alzheimer\u2019s disease. Diagnosis and Management in Dementia, pages 313\u2013325, (2020)","DOI":"10.1016\/B978-0-12-815854-8.00020-3"},{"key":"835_CR3","doi-asserted-by":"crossref","unstructured":"Cai, J.-S., Chen, H.-Y., Chen, J.-Y., Lu, Y.-F., Sun, J.-Z., Zhou, Y., Yu, R-.S.: Reduced field-of-view diffusion-weighted imaging (dwi) in patients with gastric cancer: comparison with conventional dwi techniques at 3.0t: a preliminary study. Medicine, 99(1), (2020)","DOI":"10.1097\/MD.0000000000018616"},{"key":"835_CR4","doi-asserted-by":"publisher","first-page":"1401","DOI":"10.1007\/s00415-020-09719-1","volume":"267","author":"MH Sch\u00f6nfeld","year":"2020","unstructured":"Sch\u00f6nfeld, M.H., Kabiri, R., Kniep, H.C., Meyer, L., Sedlacik, J.: Sub-angiographic peripheral emboli in high resolution dwi after endovascular recanalization. J Neurol 267, 1401\u20131406 (2020)","journal-title":"J Neurol"},{"key":"835_CR5","doi-asserted-by":"crossref","unstructured":"Abdel-Nabi, H., Al-Haj, A.: Reversible data hiding in adjacent zeros. Multimedia Systems, pages 1\u201317, (2021)","DOI":"10.1007\/s00530-020-00732-y"},{"key":"835_CR6","doi-asserted-by":"crossref","unstructured":"Bhatnagar, G., Wu, Q.\u00a0M.: Enhancing the transmission security of biometric images using chaotic encryption. Multimedia Systems, 20(2):203\u2013214, (2014)","DOI":"10.1007\/s00530-013-0323-3"},{"key":"835_CR7","doi-asserted-by":"publisher","first-page":"107817","DOI":"10.1016\/j.sigpro.2020.107817","volume":"178","author":"G Gao","year":"2021","unstructured":"Gao, G., Tong, S., Xia, Z., Bin, W., Liya, X., Zhao, Z.: Reversible data hiding with automatic contrast enhancement for medical images. Signal Process. 178, 107817 (2021)","journal-title":"Signal Process."},{"key":"835_CR8","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1109\/LSP.2020.2965826","volume":"27","author":"Y Yang","year":"2020","unstructured":"Yang, Y., Xiao, X., Cai, X., Zhang, W.: A secure and privacy-preserving technique based on contrast-enhancement reversible data hiding and plaintext encryption for medical images. IEEE Signal Process. Lett. 27, 256\u2013260 (2020)","journal-title":"IEEE Signal Process. Lett."},{"key":"835_CR9","doi-asserted-by":"crossref","unstructured":"Bhardwaj, R., and Aggarwal, A.: Hiding clinical information in medical images: an enhanced encrypted reversible data hiding algorithm grounded on hierarchical absolute moment block truncation coding. Multidimensional Syst. Signal Process., 31:1051\u20131074, 7 (2020)","DOI":"10.1007\/s11045-019-00698-9"},{"key":"835_CR10","doi-asserted-by":"crossref","unstructured":"Showkat, S., Parah, S. A., Gull, S.: Embedding in medical images with contrast enhancement and tamper detection capability. Multimedia Tools Appl. (2020)","DOI":"10.1007\/s11042-020-09732-6"},{"key":"835_CR11","first-page":"10166","volume":"55","author":"K Swaraja","year":"2020","unstructured":"Swaraja, K., Meenakshi, K., Padmavathi, K.: An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomed. Signal Process. Control 55, 10166 (2020)","journal-title":"Biomed. Signal Process. Control"},{"issue":"09","key":"835_CR12","first-page":"1434","volume":"24","author":"Y Chen","year":"2019","unstructured":"Chen, Y., Li, Z., Zhang, J., Wang, G.M.: Robust watermarking algorithm for diffusion-weighted images (dwi). Chin. J. Image Graph. pages 24(09), 1434\u20131449 (2019)","journal-title":"Chin. J. Image Graph. pages"},{"key":"835_CR13","doi-asserted-by":"crossref","unstructured":"Thakur, S., Singh, A.\u00a0K., Ghrera, S.\u00a0P., and Mohan, A.: Chaotic based secure watermarking approach for medical images. Multimedia Tools Appl., 79:4263\u20134276, 2 (2020)","DOI":"10.1007\/s11042-018-6691-0"},{"key":"835_CR14","doi-asserted-by":"publisher","first-page":"76580","DOI":"10.1109\/ACCESS.2019.2921894","volume":"7","author":"X Liu","year":"2019","unstructured":"Liu, X., Lou, J., Fang, H., Chen, Y., Ouyang, P., Wang, Y., Zou, B., Wang, L.: A novel robust reversible watermarking scheme for protecting authenticity and integrity of medical images. IEEE Access 7, 76580\u201376598 (2019)","journal-title":"IEEE Access"},{"key":"835_CR15","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.comcom.2020.01.038","volume":"152","author":"Ashima Anand and Amit Kumar Singh","year":"2020","unstructured":"Ashima Anand and Amit Kumar Singh: An improved dwt-svd domain watermarking for medical information security. Comput. Commun. 152, 72\u201380 (2020)","journal-title":"Comput. Commun."},{"key":"835_CR16","doi-asserted-by":"crossref","unstructured":"Khare, P., and Srivastava, V.\u00a0K.: A secured and robust medical image watermarking approach for protecting integrity of medical images. Trans. Emerging Telecommun. Technol., (2020)","DOI":"10.1002\/ett.3918"},{"key":"835_CR17","unstructured":"Balasamy, K., Suganyadevi, S.: A fuzzy based roi selection for encryption and watermarking in medical image using dwt and svd. Multimedia Tools Appl. (2020)"},{"key":"835_CR18","doi-asserted-by":"crossref","unstructured":"Swaraja ,K.: Medical image region based watermarking for secured telemedicine. Multimedia Tools Appl., 77:28249\u201328280, 11 (2018)","DOI":"10.1007\/s11042-018-6020-7"},{"key":"835_CR19","doi-asserted-by":"crossref","unstructured":"Zhu, J., Kaplan, R., Johnson, J., and Fei-Fei, L. .: Hidden: Hiding data with deep networks. 7 (2018)","DOI":"10.1007\/978-3-030-01267-0_40"},{"key":"835_CR20","unstructured":"Goodfellow, I.\u00a0J., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., and Bengio, Y.: Generative adversarial networks. arXiv preprint arXiv:1406.2661, (2014)"},{"key":"835_CR21","doi-asserted-by":"crossref","unstructured":"Ledig, C., Theis, L., Husz\u00e1r, F., Caballero, J., Cunningham, A., Acosta, A., Aitken, A., Tejani, A., Totz, J., Wang, Z et\u00a0al.: Photo-realistic single image super-resolution using a generative adversarial network. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 4681\u20134690, (2017)","DOI":"10.1109\/CVPR.2017.19"},{"key":"835_CR22","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.neunet.2020.07.025","volume":"131","author":"Chunwei Tian","year":"2020","unstructured":"Tian, Chunwei, Fei, Lunke, Zheng, Wenxian, Yong, Xu., Zuo, Wangmeng, Lin, Chia-Wen.: Deep learning on image denoising: an overview. Neural Netw. 131, 251\u2013275 (2020)","journal-title":"Neural Netw."},{"key":"835_CR23","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.inffus.2020.10.015","volume":"67","author":"Chengjia Wang","year":"2021","unstructured":"Wang, Chengjia, Yang, Guang, Papanastasiou, Giorgos, Tsaftaris, Sotirios A., Newby, David E., Gray, Calum, Macnaught, Gillian, MacGillivray, Tom J.: Dicyc: Gan-based deformation invariant cross-domain information fusion for medical image synthesis. Inform. Fus. 67, 147\u2013160 (2021)","journal-title":"Inform. Fus."},{"key":"835_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00138-020-01119-9","volume":"32","author":"Shuaizhen Yao","year":"2021","unstructured":"Yao, Shuaizhen, Tan, Jianhua, Chen, Yi., Yanhui, Gu.: A weighted feature transfer gan for medical image synthesis. Mach. Vis. Appl. 32, 1\u201311 (2021)","journal-title":"Mach. Vis. Appl."},{"key":"835_CR25","doi-asserted-by":"crossref","unstructured":"Kazeminia, S., Baur, C., Kuijper, A., van Ginneken, B., Navab, N., Albarqouni, S., and Mukhopadhyay, A.: Gans for medical image analysis. Artificial Intell. Med., page 101938, (2020)","DOI":"10.1016\/j.artmed.2020.101938"},{"key":"835_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, P., Wang, F., Xu, W., and Li, Y.: Multi-channel generative adversarial network for parallel magnetic resonance image reconstruction in k-space. In Alejandro\u00a0F. Frangi, Julia\u00a0A. Schnabel, Christos Davatzikos, Carlos Alberola-L\u00f3pez, and Gabor Fichtinger, editors, Medical Image Computing and Computer Assisted Intervention \u2013 MICCAI 2018, pages 180\u2013188, Cham, (2018). Springer International Publishing","DOI":"10.1007\/978-3-030-00928-1_21"},{"key":"835_CR27","doi-asserted-by":"crossref","unstructured":"Han, C., Hayashi, H., Rundo, L., Araki, R., Shimoda, W., Muramatsu, S., Furukawa, Y., Mauri, G., and Nakayama, H.: Gan-based synthetic brain mr image generation. In 2018 IEEE 15th international symposium on biomedical imaging (ISBI 2018), pages 734\u2013738, (2018)","DOI":"10.1109\/ISBI.2018.8363678"},{"key":"835_CR28","unstructured":"Radford, A., Metz, L., and Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. Computer ence, (2015)"},{"key":"835_CR29","unstructured":"Arjovsky, M., Chintala, S., and Bottou, L.: Wasserstein gan. (2017)"},{"key":"835_CR30","doi-asserted-by":"crossref","unstructured":"Mao, X., Li, Q., Xie, H., Lau, Ryk., and Smolley, S.\u00a0P.: Least squares generative adversarial networks. In 2017 IEEE international conference on computer vision (ICCV), (2017)","DOI":"10.1109\/ICCV.2017.304"},{"key":"835_CR31","unstructured":"Berthelot, D., Schumm, T., and Metz, L.: Began: boundary equilibrium generative adversarial networks. 3 (2017)"},{"key":"835_CR32","unstructured":"Kodali, N., Abernethy, J., Hays, J., and Kira, Z.: On convergence and stability of gans. (2017)"},{"key":"835_CR33","doi-asserted-by":"crossref","unstructured":"Choi, Y., Uh, Y., Yoo, J., and Ha, J.\u00a0W.: Stargan v2: Diverse image synthesis for multiple domains. In 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), (2020)","DOI":"10.1109\/CVPR42600.2020.00821"},{"key":"835_CR34","unstructured":"Metz, L., Poole, B., Pfau, D., and Sohl-Dickstein, J.: Unrolled generative adversarial networks. (2016)"},{"key":"835_CR35","doi-asserted-by":"crossref","unstructured":"Liu, Y., Guo, M., Zhang, J., Zhu, Y., and Xie, X.: A novel two-stage separable deep learning framework for practical blind watermarking. In Proceedings of the 27th ACM International Conference on Multimedia, pages 1509\u20131517, (2019)","DOI":"10.1145\/3343031.3351025"},{"key":"835_CR36","doi-asserted-by":"crossref","unstructured":"Ahmadi, M, Norouzi, A, Karimi, N, Samavi, S, Emami, A: Redmark: framework for residual diffusion watermarking based on deep networks. Expert Systems with Applications 146, 113157 (2020)","DOI":"10.1016\/j.eswa.2019.113157"},{"key":"835_CR37","unstructured":"Xiyang, L., Ruohan, Z., Huiwen, C., Feng, Y., and Peyman, M. Distortion agnostic deep watermarking. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR), June 2020"},{"key":"835_CR38","unstructured":"Mun, S-M., Nam, S-H., Jang, H-U., Kim, D., and Lee, H-K.: A robust blind watermarking using convolutional neural network. arXiv preprint arXiv:1704.03248, (2017)"},{"key":"835_CR39","unstructured":"Zhang, K.\u00a0A., Xu, L., Cuesta-Infante, A., and Veeramachaneni, K.: Robust invisible video watermarking with attention. arXiv preprint arXiv:1909.01285, (2019)"},{"key":"835_CR40","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1103\/PhysRev.77.297.2","volume":"77","author":"EL Hahn","year":"1950","unstructured":"Hahn, E.L.: Nuclear induction due to free larmor precession. Phys. Rev. 77, 297\u2013298 (1950)","journal-title":"Phys. Rev."},{"key":"835_CR41","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1063\/1.1695690","volume":"42","author":"EO Stejskal","year":"1965","unstructured":"Stejskal, E.O., Tanner, J.E.: Spin diffusion measurements: spin echoes in the presence of a time-dependent field gradient. J. Chem. Phys. 42, 288\u2013292 (1965)","journal-title":"J. Chem. Phys."},{"key":"835_CR42","unstructured":"Le Bihan, Denis, Mangin, Jean-Fran\u00e7ois., Poupon, Cyril: Chris A Clark, Sabina Pappata, Nicolas Molko, and Hughes Chabriat. Concepts and applications, Diffusion tensor imaging (2001)"},{"key":"835_CR43","doi-asserted-by":"crossref","unstructured":"Yan, C., Li, Z., Zhang, Y., Liu, Y., Ji, X., and Zhang, Y.: Depth image denoising using nuclear norm and learning graph model. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), 16(4):1\u201317, (2020)","DOI":"10.1145\/3404374"},{"key":"835_CR44","unstructured":"Han, Y., Yoo, J.\u00a0J., and Ye, J.\u00a0C.: Deep residual learning for compressed sensing CT reconstruction via persistent homology analysis. CoRR, abs\/1611.06391, (2016)"},{"issue":"9","key":"835_CR45","doi-asserted-by":"publisher","first-page":"4509","DOI":"10.1109\/TIP.2017.2713099","volume":"26","author":"KH Jin","year":"2017","unstructured":"Jin, K.H., McCann, M.T., Froustey, E., Unser, M.: Deep convolutional neural network for inverse problems in imaging. IEEE Trans. Image Process. 26(9), 4509\u20134522 (2017)","journal-title":"IEEE Trans. Image Process."},{"key":"835_CR46","doi-asserted-by":"crossref","unstructured":"Kumar, K., Shrimankar, D.\u00a0D., and Singh, N.: Eratosthenes sieve based key-frame extraction technique for event summarization in videos. Multimedia Tools Appl, (2017)","DOI":"10.1007\/s11042-017-4642-9"},{"key":"835_CR47","doi-asserted-by":"crossref","unstructured":"Vijayvergia, A., and Kumar, K.: Star: rating of reviews by exploiting variation in emotions using transfer learning framework. In 2018 conference on information and communication technology (CICT), (2018)","DOI":"10.1109\/INFOCOMTECH.2018.8722356"},{"key":"835_CR48","unstructured":"Solanki, A., Bamrara, R., Kumar, K., and Singh, N.: Vedl: a novel video event searching technique using deep learning. perspective, 2(4):6\u20138"},{"key":"835_CR49","doi-asserted-by":"crossref","unstructured":"Yan, .C, Gong, B., Wei, Y., Gao, Y.: Deep multi-view enhancement hashing for image retrieval. IEEE Trans. Pattern Anal. Mach. Intell. (2020)","DOI":"10.1109\/TPAMI.2020.2975798"},{"key":"835_CR50","doi-asserted-by":"crossref","unstructured":"Kumar, Krishan., and Shrimankar, Deepti\u00a0D.: F-des: Fast and deep event summarization. IEEE Transactions on Multimedia, 20(2):323\u2013334, (2017)","DOI":"10.1109\/TMM.2017.2741423"},{"issue":"3","key":"835_CR51","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379\u2013423 (1948)","journal-title":"Bell Syst. Tech. J."},{"key":"835_CR52","doi-asserted-by":"crossref","unstructured":"Liu, J.-J., Hou, Q., Cheng, M.-M., Feng, J., and Jiang, J.: A simple pooling-based design for real-time salient object detection. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR), June (2019)","DOI":"10.1109\/CVPR.2019.00404"},{"key":"835_CR53","doi-asserted-by":"crossref","unstructured":"Huang, N., He, J., and Zhu, N.: A novel method for detecting image forgery based on convolutional neural network. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE), pages 1702\u20131705, (2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00255"},{"key":"835_CR54","doi-asserted-by":"crossref","unstructured":"Ghodrati, V., Shao, J., Bydder, M., Zhou, Z., Yin, W., Nguyen, K. L. Yang, Y., Hu, P. Mr image reconstruction using deep learning. Quantitative Imaging Med. Surg. 9, 1516\u20131527 (2019)","DOI":"10.21037\/qims.2019.08.10"},{"key":"835_CR55","unstructured":"Simonyan, K., and Zisserman, A.: Very deep convolutional networks for large-scale image recognition. 9 (2014)"},{"key":"835_CR56","unstructured":"Yu, F., and Koltun, V.: Multi-Scale Context Aggregation by Dilated Convolutions. arXiv e-prints, page arXiv:1511.07122, November (2015)"},{"key":"835_CR57","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1109\/TMM.2020.2999182","volume":"23","author":"Chunwei Tian","year":"2021","unstructured":"Tian, Chunwei, Yong, Xu., Zuo, Wangmeng, Zhang, Bob, Fei, Lunke, Lin, Chia-Wen.: Coarse-to-fine cnn for image super-resolution. IEEE Trans. Multimedia 23, 1489\u20131502 (2021)","journal-title":"IEEE Trans. Multimedia"},{"key":"835_CR58","doi-asserted-by":"crossref","unstructured":"Tian, C, Zhuge, R., Zhihao, W., Yong, X., Zuo, W., Chen, C., Lin, C.-W.: Lightweight image super-resolution with enhanced cnn. Knowl.-Based Syst. 205, 106235 (2020)","DOI":"10.1016\/j.knosys.2020.106235"},{"issue":"1","key":"835_CR59","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1038\/s41597-020-0493-8","volume":"7","author":"Qiqi Tong","year":"2020","unstructured":"Tong, Qiqi, He, Hongjian, Gong, Ting, Li, Chen, Liang, Peipeng, Qian, Tianyi, Sun, Yi., Ding, Qiuping, Li, Kuncheng, Zhong, Jianhui: Multicenter dataset of multi-shell diffusion mri in healthy traveling adults with identical settings. Sci. Data 7(1), 157 (2020)","journal-title":"Sci. Data"},{"key":"835_CR60","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., and Sun, J.: Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2016","DOI":"10.1109\/CVPR.2016.90"},{"key":"835_CR61","doi-asserted-by":"crossref","unstructured":"Kumar, K., Kumar, A., and Bahuguna, A.: D-cad: Deep and crowded anomaly detection. In Proceedings of the 7th International Conference on Computer and Communication Technology, pages 100\u2013105, (2017)","DOI":"10.1145\/3154979.3154998"},{"key":"835_CR62","doi-asserted-by":"crossref","unstructured":"Negi, A., Chauhan, P., Kumar, K., and Rajput, R. S.: Face mask detection classifier and model pruning with keras-surgeon. In 2020 5th IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE), pages 1\u20136. IEEE, (2020)","DOI":"10.1109\/ICRAIE51050.2020.9358337"},{"issue":"11","key":"835_CR63","doi-asserted-by":"publisher","first-page":"3014","DOI":"10.1109\/TMM.2020.2967645","volume":"22","author":"Chenggang Yan","year":"2020","unstructured":"Yan, Chenggang, Shao, Biyao, Zhao, Hao, Ning, Ruixin, Zhang, Yongdong, Feng, Xu.: 3d room layout estimation from a single rgb image. IEEE Trans. Multimedia 22(11), 3014\u20133024 (2020)","journal-title":"IEEE Trans. Multimedia"},{"key":"835_CR64","doi-asserted-by":"crossref","unstructured":"Koppanati, R.\u00a0K., Qamar, S., and Kumar, K.: Small: Secure multimedia technique using logistic and lfsr. In 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), pages 1820\u20131825. IEEE, (2018)","DOI":"10.1109\/ICCONS.2018.8662840"}],"container-title":["Multimedia Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-021-00835-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00530-021-00835-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00530-021-00835-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T06:12:18Z","timestamp":1643350338000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00530-021-00835-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,10]]},"references-count":64,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["835"],"URL":"https:\/\/doi.org\/10.1007\/s00530-021-00835-0","relation":{},"ISSN":["0942-4962","1432-1882"],"issn-type":[{"type":"print","value":"0942-4962"},{"type":"electronic","value":"1432-1882"}],"subject":[],"published":{"date-parts":[[2021,8,10]]},"assertion":[{"value":"29 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}