{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T06:47:00Z","timestamp":1775544420513,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T00:00:00Z","timestamp":1670803200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T00:00:00Z","timestamp":1670803200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s10044-022-01104-0","type":"journal-article","created":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T06:02:52Z","timestamp":1670824972000},"page":"571-590","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":51,"title":["Dual image-based reversible fragile watermarking scheme for tamper detection and localization"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4257-0688","authenticated-orcid":false,"given":"Aditya Kumar","family":"Sahu","sequence":"first","affiliation":[]},{"given":"Monalisa","family":"Sahu","sequence":"additional","affiliation":[]},{"given":"Pramoda","family":"Patro","sequence":"additional","affiliation":[]},{"given":"Gupteswar","family":"Sahu","sequence":"additional","affiliation":[]},{"given":"Soumya Ranjan","family":"Nayak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,12]]},"reference":[{"issue":"2","key":"1104_CR1","doi-asserted-by":"publisher","first-page":"110","DOI":"10.3390\/info11020110","volume":"11","author":"M Begum","year":"2020","unstructured":"Begum M, Uddin MS (2020) Digital image watermarking schemes: a review. Information 11(2):110","journal-title":"Information"},{"issue":"7","key":"1104_CR2","doi-asserted-by":"publisher","first-page":"8603","DOI":"10.1007\/s11042-018-7128-5","volume":"78","author":"N Agarwal","year":"2019","unstructured":"Agarwal N, Singh AK, Singh PK (2019) Survey of robust and imperceptible watermarking. Multimedia Tools Appl 78(7):8603\u20138633","journal-title":"Multimedia Tools Appl"},{"key":"1104_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.dsp.2017.08.009","volume":"71","author":"P Korus","year":"2017","unstructured":"Korus P (2017) Digital image integrity\u2014a survey of protection and verification schemes. Digital Signal Process 71:1\u201326","journal-title":"Digital Signal Process"},{"issue":"7","key":"1104_CR4","doi-asserted-by":"publisher","first-page":"1193","DOI":"10.1007\/s13042-017-0641-4","volume":"9","author":"K Sreenivas","year":"2018","unstructured":"Sreenivas K, Prasad VK (2018) Fragile watermarking schemes for image authentication: a survey. Int J Mach Learn Cybern 9(7):1193\u20131218","journal-title":"Int J Mach Learn Cybern"},{"key":"1104_CR5","doi-asserted-by":"publisher","first-page":"3221","DOI":"10.1007\/s12652-019-01500-1","volume":"11","author":"A Mohanarathinam","year":"2020","unstructured":"Mohanarathinam A, Kamalraj S, Venkatesan GP, Ravi RV, Manikandababu CS (2020) Digital watermarking schemes for image security: a review. J Ambient Intell Humaniz Comput 11:3221\u20133229","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"3","key":"1104_CR6","doi-asserted-by":"publisher","first-page":"3597","DOI":"10.1007\/s11042-017-5222-8","volume":"77","author":"C Kumar","year":"2018","unstructured":"Kumar C, Singh AK, Kumar P (2018) A recent survey on image watermarking schemes and its application in e-governance. Multimedia Tools Appl 77(3):3597\u20133622","journal-title":"Multimedia Tools Appl"},{"issue":"4","key":"1104_CR7","first-page":"18","volume":"20","author":"S Walton","year":"1995","unstructured":"Walton S (1995) Information authentication for a slippery new age. Dr Dobb\u2019s J 20(4):18\u201326","journal-title":"Dr Dobb\u2019s J"},{"issue":"5","key":"1104_CR8","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/j.patrec.2005.09.006","volume":"27","author":"CC Chang","year":"2006","unstructured":"Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27(5):439\u2013446","journal-title":"Pattern Recogn Lett"},{"issue":"11","key":"1104_CR9","doi-asserted-by":"publisher","first-page":"3493","DOI":"10.1016\/j.patcog.2008.05.009","volume":"41","author":"RCW Phan","year":"2008","unstructured":"Phan RCW (2008) Tampering with a watermarking-based image authentication scheme. Pattern Recogn 41(11):3493\u20133496","journal-title":"Pattern Recogn"},{"key":"1104_CR10","doi-asserted-by":"publisher","first-page":"1300","DOI":"10.1016\/j.eswa.2007.11.018","volume":"36","author":"WC Chen","year":"2009","unstructured":"Chen WC, Wang MS (2009) A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst Appl 36:1300\u20131307","journal-title":"Expert Syst Appl"},{"key":"1104_CR11","unstructured":"Wong PW (1998) A watermark for image integrity and ownership verification. In: PICS, pp 374\u2013379"},{"key":"1104_CR12","doi-asserted-by":"crossref","unstructured":"Wong PW (1998) A public key watermark for image verification and authentication. In: Proceedings 1998 international conference on image processing-ICIP98 (Cat. No. 98CB36269), vol 1, IEEE, pp 455\u2013459","DOI":"10.1109\/ICIP.1998.723526"},{"issue":"9","key":"1104_CR13","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1016\/j.jss.2011.02.029","volume":"84","author":"CC Chang","year":"2011","unstructured":"Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462\u20131470","journal-title":"J Syst Softw"},{"issue":"3","key":"1104_CR14","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.image.2012.12.003","volume":"28","author":"X Tong","year":"2013","unstructured":"Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301\u2013308","journal-title":"Signal Process Image Commun"},{"issue":"3","key":"1104_CR15","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1007\/s11042-019-08144-5","volume":"79","author":"S Prasad","year":"2020","unstructured":"Prasad S, Pal AK (2020) A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimedia Tools Appl 79(3):1673\u20131705","journal-title":"Multimedia Tools Appl"},{"issue":"1","key":"1104_CR16","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s11042-012-1332-5","volume":"72","author":"F Chen","year":"2014","unstructured":"Chen F, He H, Tai HM, Wang H (2014) Chaos-based self-embedding fragile watermarking with flexible watermark payload. Multimedia Tools Appl 72(1):41\u201356","journal-title":"Multimedia Tools Appl"},{"issue":"6","key":"1104_CR17","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1007\/s13042-015-0455-1","volume":"7","author":"IA Ansari","year":"2016","unstructured":"Ansari IA, Pant M, Ahn CW (2016) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225\u20131239","journal-title":"Int J Mach Learn Cybern"},{"issue":"15","key":"1104_CR18","doi-asserted-by":"publisher","first-page":"16107","DOI":"10.1007\/s11042-016-3897-x","volume":"76","author":"M Nazari","year":"2017","unstructured":"Nazari M, Sharif A, Mollaeefar M (2017) An improved method for digital image fragile watermarking based on chaotic maps. Multimedia Tools Appl 76(15):16107\u201316123","journal-title":"Multimedia Tools Appl"},{"issue":"14","key":"1104_CR19","doi-asserted-by":"publisher","first-page":"8695","DOI":"10.1007\/s11042-015-2786-z","volume":"75","author":"O Benrhouma","year":"2016","unstructured":"Benrhouma O, Hermassi H, Abd El-Latif AA, Belghith S (2016) Chaotic watermark for blind forgery detection in images. Multimedia Tools Appl 75(14):8695\u20138718","journal-title":"Multimedia Tools Appl"},{"issue":"1","key":"1104_CR20","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.aeue.2015.10.006","volume":"70","author":"W Zhou","year":"2016","unstructured":"Zhou W, Yu L, Wang Z, Wu M, Luo T, Sun L (2016) Binocular visual characteristics based fragile watermarking scheme for tamper detection in stereoscopic images. AEU Int J Electron Commun 70(1):77\u201384","journal-title":"AEU Int J Electron Commun"},{"key":"1104_CR21","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1016\/j.procs.2018.05.009","volume":"132","author":"S Sinha","year":"2018","unstructured":"Sinha S, Singh A, Gupta R, Singh S (2018) Authentication and tamper detection in tele-medicine using zero watermarking. Procedia Comput Sci 132:557\u2013562","journal-title":"Procedia Comput Sci"},{"issue":"3","key":"1104_CR22","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.1007\/s11045-018-0597-x","volume":"30","author":"W Belferdi","year":"2019","unstructured":"Belferdi W, Behloul A, Noui L (2019) A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration. Multidimens Syst Signal Process 30(3):1093\u20131112","journal-title":"Multidimens Syst Signal Process"},{"issue":"2","key":"1104_CR23","doi-asserted-by":"publisher","first-page":"e59","DOI":"10.1002\/spy2.59","volume":"2","author":"P Pal","year":"2019","unstructured":"Pal P, Jana B, Bhaumik J (2019) Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image. Secur Privacy 2(2):e59","journal-title":"Secur Privacy"},{"key":"1104_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.0","author":"SN Bal","year":"2018","unstructured":"Bal SN, Nayak MR, Sarkar SK (2018) On the implementation of a secured watermarking mechanism based on cryptography and bit pairs matching. J King Saud Univ Comput Inf Sci. https:\/\/doi.org\/10.1016\/j.jksuci.2018.0","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"2","key":"1104_CR25","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s40998-017-0021-9","volume":"41","author":"S Trivedy","year":"2017","unstructured":"Trivedy S, Pal AK (2017) A logistic map-based fragile watermarking scheme of digital images with tamper detection. Iran J Sci Technol Trans Electr Eng 41(2):103\u2013113","journal-title":"Iran J Sci Technol Trans Electr Eng"},{"issue":"5","key":"1104_CR26","doi-asserted-by":"publisher","first-page":"1799","DOI":"10.1007\/s12652-018-1158-8","volume":"11","author":"S Gull","year":"2020","unstructured":"Gull S, Loan NA, Parah SA, Sheikh JA, Bhat GM (2020) An efficient watermarking scheme for tamper detection and localization of medical images. J Ambient Intell Humaniz Comput 11(5):1799\u20131808","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1104_CR27","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.neucom.2021.07.051","volume":"461","author":"Y Li","year":"2021","unstructured":"Li Y, Wang H, Barni M (2021) A survey of deep neural network watermarking techniques. Neurocomputing 461:171\u2013193","journal-title":"Neurocomputing"},{"key":"1104_CR28","doi-asserted-by":"publisher","first-page":"113157","DOI":"10.1016\/j.eswa.2019.113157","volume":"146","author":"M Ahmadi","year":"2020","unstructured":"Ahmadi M, Norouzi A, Karimi N, Samavi S, Emami A (2020) ReDMark: framework for residual diffusion watermarking based on deep networks. Expert Syst Appl 146:113157","journal-title":"Expert Syst Appl"},{"key":"1104_CR29","doi-asserted-by":"publisher","unstructured":"Uchida Y, Nagai Y, Sakazawa S, Satoh SI (2017) Embedding watermarks into deep neural networks. In: Proceedings of the 2017 ACM on international conference on multimedia retrieval, pp 269\u2013277. https:\/\/doi.org\/10.1145\/3078971.3078974","DOI":"10.1145\/3078971.3078974"},{"issue":"2","key":"1104_CR30","doi-asserted-by":"publisher","first-page":"277","DOI":"10.18178\/ijmlc.2020.10.2.932","volume":"10","author":"F Deeba","year":"2020","unstructured":"Deeba F, Kun S, Dharejo FA, Langah H, Memon H (2020) Digital watermarking using deep neural network. Int J Mach Learn Comput 10(2):277\u2013282","journal-title":"Int J Mach Learn Comput"},{"issue":"19","key":"1104_CR31","doi-asserted-by":"publisher","first-page":"6854","DOI":"10.3390\/app10196854","volume":"10","author":"JE Lee","year":"2020","unstructured":"Lee JE, Seo YH, Kim DW (2020) Convolutional neural network-based digital image watermarking adaptive to the resolution of image and watermark. Appl Sci 10(19):6854","journal-title":"Appl Sci"},{"issue":"8","key":"1104_CR32","doi-asserted-by":"publisher","first-page":"932","DOI":"10.3390\/electronics10080932","volume":"10","author":"YP Chen","year":"2021","unstructured":"Chen YP, Fan TY, Chao HC (2021) WMNet: a lossless watermarking technique using deep learning for medical image authentication. Electronics 10(8):932","journal-title":"Electronics"},{"issue":"4","key":"1104_CR33","first-page":"22","volume":"2020","author":"J Wang","year":"2020","unstructured":"Wang J, Wu H, Zhang X, Yao Y (2020) Watermarking in deep neural networks via error back-propagation. Electron Imaging 2020(4):22\u201331","journal-title":"Electron Imaging"},{"key":"1104_CR34","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.cose.2016.11.016","volume":"65","author":"H Kandi","year":"2017","unstructured":"Kandi H, Mishra D, Gorthi SRS (2017) Exploring the learning capabilities of convolutional neural networks for robust image watermarking. Comput Secur 65:247\u2013268","journal-title":"Comput Secur"},{"issue":"1","key":"1104_CR35","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s13735-018-0147-1","volume":"7","author":"Y Nagai","year":"2018","unstructured":"Nagai Y, Uchida Y, Sakazawa S, Satoh SI (2018) Digital watermarking for deep neural networks. Int J Multimedia Inf Retr 7(1):3\u201316","journal-title":"Int J Multimedia Inf Retr"},{"key":"1104_CR36","doi-asserted-by":"publisher","first-page":"1951","DOI":"10.1109\/TMM.2020.3006415","volume":"23","author":"X Zhong","year":"2020","unstructured":"Zhong X, Huang PC, Mastorakis S, Shih FY (2020) An automated and robust image watermarking scheme based on deep neural networks. IEEE Trans Multimedia 23:1951\u20131961","journal-title":"IEEE Trans Multimedia"},{"key":"1104_CR37","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03365-9","author":"AK Sahu","year":"2021","unstructured":"Sahu AK (2021) A logistic map based blind and fragile watermarking for tamper detection and localization in images. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-021-03365-9","journal-title":"J Ambient Intell Humaniz Comput"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-022-01104-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10044-022-01104-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-022-01104-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,15]],"date-time":"2023-04-15T04:37:29Z","timestamp":1681533449000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10044-022-01104-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,12]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["1104"],"URL":"https:\/\/doi.org\/10.1007\/s10044-022-01104-0","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,12]]},"assertion":[{"value":"9 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is\u00a0no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}