{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T03:37:42Z","timestamp":1764905862063},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,6,22]],"date-time":"2019-06-22T00:00:00Z","timestamp":1561161600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,22]],"date-time":"2019-06-22T00:00:00Z","timestamp":1561161600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s10044-019-00828-w","type":"journal-article","created":{"date-parts":[[2019,6,22]],"date-time":"2019-06-22T13:02:28Z","timestamp":1561208548000},"page":"933-951","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Synchronization correction-based robust digital image watermarking approach using Bessel K-form PDF"],"prefix":"10.1007","volume":"23","author":[{"given":"Xiang-yang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Si-yu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Tao-tao","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Huan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Hong-ying","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,22]]},"reference":[{"issue":"1","key":"828_CR1","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/2545883","volume":"47","author":"T Winkler","year":"2014","unstructured":"Winkler T, Rinner B (2014) Security and privacy protection in visual sensor networks: a survey. ACM Comput Surv 47(1):2","journal-title":"ACM Comput Surv"},{"issue":"1","key":"828_CR2","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TIFS.2016.2601065","volume":"12","author":"Z Zhou","year":"2017","unstructured":"Zhou Z, Wang Y, Wu QMJ, Yang C-N, Sun X (2017) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forensics Secur 12(1):48\u201363","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"828_CR3","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1080\/02564602.2015.1042927","volume":"32","author":"VS Verma","year":"2015","unstructured":"Verma VS, Jha RK (2015) An overview of robust digital image watermarking. IETE Tech Rev 32(6):479\u2013496","journal-title":"IETE Tech Rev"},{"key":"828_CR4","unstructured":"CaoJ, Li H, Luo W (2016) A secure watermarking technique without loss of robustness. In: 2016 IEEE international conference on image processing (ICIP). Phoenix, pp 2723\u20132726"},{"issue":"4","key":"828_CR5","doi-asserted-by":"publisher","first-page":"1947","DOI":"10.1007\/s11042-014-2381-8","volume":"75","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75(4):1947\u20131962","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"828_CR6","doi-asserted-by":"publisher","first-page":"2081","DOI":"10.1016\/j.eswa.2010.07.147","volume":"38","author":"P-P Niu","year":"2011","unstructured":"Niu P-P, Wang X-Y, Yang Y-P, Ming-Yu L (2011) A novel color image watermarking scheme in nonsampled contourlet-domain. Expert Syst Appl 38(3):2081\u20132098","journal-title":"Expert Syst Appl"},{"issue":"2","key":"828_CR7","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/LSP.2004.840872","volume":"12","author":"M Barni","year":"2005","unstructured":"Barni M (2005) Effectiveness of exhaustive search and template matching against watermark desynchronization. IEEE Signal Process Lett 12(2):158\u2013161","journal-title":"IEEE Signal Process Lett"},{"issue":"7","key":"828_CR8","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.1109\/TIFS.2014.2322497","volume":"9","author":"M Urvoy","year":"2014","unstructured":"Urvoy M, Goudia D, Autrusseau F (2014) Perceptual DFT watermarking with improved detection and robustness to geometrical distortions. IEEE Trans Inf Forensics Secur 9(7):1108\u20131119","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"828_CR9","doi-asserted-by":"crossref","unstructured":"Kaur M, Kaur P (2009) Robust watermarking into the color models based on the synchronization template. In: International conference on information and multimedia technology (ICIMT \u201809). Jeju, Island, pp 296-300","DOI":"10.1109\/ICIMT.2009.81"},{"issue":"3","key":"828_CR10","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1007\/s11432-011-4470-x","volume":"55","author":"Y Zhao","year":"2012","unstructured":"Zhao Y, Ni R, Zhu Z (2012) RST transforms resistant image watermarking based on centroid and sector-shaped partition. Sci China Inf Sci 55(3):650\u2013662","journal-title":"Sci China Inf Sci"},{"issue":"8","key":"828_CR11","doi-asserted-by":"publisher","first-page":"2189","DOI":"10.1109\/TIP.2011.2118216","volume":"20","author":"H Zhang","year":"2011","unstructured":"Zhang H, Shu H, Coatrieux G (2011) Affine Legendre moment invariants for image watermarking robust to geometric distortions. IEEE Trans Image Process 20(8):2189\u20132199","journal-title":"IEEE Trans Image Process"},{"key":"828_CR12","doi-asserted-by":"crossref","unstructured":"Liu Z, Zhu YS, Fan Y (2016) A SIFT-based robust watermarking scheme in DWT-SVD domain using majority voting mechanism. In: The eighth international conference on digital image processing (ICDIP 2016), pp 100332U\u2013100332U-6","DOI":"10.1117\/12.2243606"},{"key":"828_CR13","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/j.compeleceng.2015.03.004","volume":"46","author":"J Ouyang","year":"2015","unstructured":"Ouyang J, Coatrieux G, Chen B (2015) Color image watermarking based on quaternion Fourier transform and improved uniform log-polar mapping. Comput Electr Eng 46:419\u2013432","journal-title":"Comput Electr Eng"},{"key":"828_CR14","doi-asserted-by":"crossref","unstructured":"Li J, Zhang J (2014) A robust image watermarking scheme with kinoform in hybrid NSCT and SVD domain. In: 2014 IEEE 7th joint international information technology and artificial intelligence conference (ITAIC), pp 48\u201352","DOI":"10.1109\/ITAIC.2014.7065003"},{"key":"828_CR15","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1016\/j.neucom.2015.09.082","volume":"174","author":"X Wang","year":"2016","unstructured":"Wang X, Liu Y, Li S (2016) Robust image watermarking approach using polar harmonic transforms based geometric correction. Neurocomputing 174:627\u2013642","journal-title":"Neurocomputing"},{"key":"828_CR16","doi-asserted-by":"crossref","unstructured":"Ahmed T, Roy R, Changder S (2014) Cropping and rotation invariant watermarking scheme in the spatial domain. In: Proceedings of the 48th annual convention of computer society of India-volume II, advances in intelligent systems and computing, pp 281\u2013292","DOI":"10.1007\/978-3-319-03095-1_31"},{"issue":"3","key":"828_CR17","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1016\/j.compeleceng.2012.07.009","volume":"39","author":"H-Y Yang","year":"2013","unstructured":"Yang H-Y, Wang X-Y, Wang C-P (2013) A robust digital watermarking algorithm in undecimated discrete wavelet transform domain. Comput Electr Eng 39(3):893\u2013906","journal-title":"Comput Electr Eng"},{"issue":"2","key":"828_CR18","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.ijleo.2015.09.205","volume":"127","author":"S Fazli","year":"2016","unstructured":"Fazli S, Moeini M (2016) A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks. Optik-Int J Light Electron Opt 127(2):964\u2013972","journal-title":"Optik-Int J Light Electron Opt"},{"key":"828_CR19","unstructured":"Xie Y, Li J, Wang J (2014) A geometric distortion correction method for lithographic watermarked authentication images. In: The fifth international conference on graphic and image processing, pp 906908\u2013906908-5"},{"key":"828_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2320-x","author":"J Li","year":"2016","unstructured":"Li J, Lin Q, Yu C (2016) A QDCT-and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram. Soft Comput. \nhttps:\/\/doi.org\/10.1007\/s00500-016-2320-x","journal-title":"Soft Comput"},{"issue":"5","key":"828_CR21","doi-asserted-by":"publisher","first-page":"1166","DOI":"10.1109\/TIP.2010.2041410","volume":"19","author":"WQ Lim","year":"2010","unstructured":"Lim WQ (2010) The discrete shearlet transform: a new directional transform and compactly supported shearlet frames. IEEE Trans Image Process 19(5):1166\u20131180","journal-title":"IEEE Trans Image Process"},{"key":"828_CR22","unstructured":"Easley GR, Labate D (2012) Image processing using shearlets. In: Shearlets. Birkh\u00e4user, Boston, pp 283\u2013325"},{"issue":"3","key":"828_CR23","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1109\/JSTARS.2012.2196680","volume":"5","author":"B Hou","year":"2012","unstructured":"Hou B, Zhang X, Xiaoming B, Feng H (2012) SAR image despeckling based on nonsubsampled shearlet transform. IEEE J Sel Top Appl Earth Obs Remote Sens 5(3):809\u2013823","journal-title":"IEEE J Sel Top Appl Earth Obs Remote Sens"},{"issue":"4","key":"828_CR24","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1109\/34.917579","volume":"23","author":"U Grenander","year":"2001","unstructured":"Grenander U, Srivastava A (2001) Probability models for clutter in natural images. IEEE Trans Pattern Anal Mach Intell 23(4):424\u2013429","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"2","key":"828_CR25","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1109\/TIP.2004.840704","volume":"14","author":"FM Jalal","year":"2005","unstructured":"Jalal FM, Larbi B (2005) Analytical form for a Bayesian wavelet estimator of images using the Bessel K form densities. IEEE Trans Image Process 14(2):231\u2013240","journal-title":"IEEE Trans Image Process"},{"key":"828_CR26","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1016\/j.ins.2016.08.076","volume":"372","author":"W Xiang-yang","year":"2016","unstructured":"Xiang-yang W, Yu-nan L, Huan X, Ai-long W, Hong-ying Y (2016) Blind optimum detector for robust image watermarking in nonsubsampled shearlet domain. Inf Sci 372:634\u2013654","journal-title":"Inf Sci"},{"issue":"3","key":"828_CR27","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1109\/TCYB.2014.2326059","volume":"45","author":"Y Dong","year":"2015","unstructured":"Dong Y, Tao D, Li X, Ma J, Pu J (2015) Texture classification and retrieval using shearlets and linear regression. IEEE Trans Cybern 45(3):358\u2013369","journal-title":"IEEE Trans Cybern"},{"issue":"5","key":"828_CR28","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1109\/LSP.2017.2670026","volume":"24","author":"Y Dong","year":"2017","unstructured":"Dong Y, Feng J, Liang L, Zheng L (2017) Multiscale sampling based texture image classification. IEEE Signal Process Lett 24(5):614\u2013618","journal-title":"IEEE Signal Process Lett"},{"issue":"1","key":"828_CR29","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/2738050","volume":"7","author":"Y Dong","year":"2015","unstructured":"Dong Y, Tao D, Li X (2015) Nonnegative multiresolution representation based texture image classification. ACM Trans Intell Syst Technol 7(1):4","journal-title":"ACM Trans Intell Syst Technol"},{"key":"828_CR30","unstructured":"Ngo NM, Unoki M (2015) Robust and reliable audio watermarking based on phase coding. In: 2015 IEEE international conference on acoustics, speech and signal processing (ICASSP). Brisbane, pp 345\u2013349"},{"key":"828_CR31","doi-asserted-by":"publisher","DOI":"10.1142\/5089","volume-title":"Least-squares support vector machines","author":"JAK Suykens","year":"2002","unstructured":"Suykens JAK, van Gestel T, de Brabanter J, de Moora B, Vandewalle J (2002) Least-squares support vector machines. World Scientifics, Singapore"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-019-00828-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10044-019-00828-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-019-00828-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,20]],"date-time":"2020-06-20T23:17:34Z","timestamp":1592695054000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10044-019-00828-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,22]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["828"],"URL":"https:\/\/doi.org\/10.1007\/s10044-019-00828-w","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,22]]},"assertion":[{"value":"13 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 June 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}