{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T01:06:28Z","timestamp":1772759188501,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T00:00:00Z","timestamp":1772755200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T00:00:00Z","timestamp":1772755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61901530"],"award-info":[{"award-number":["61901530"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62061008"],"award-info":[{"award-number":["62061008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2020JJ5767"],"award-info":[{"award-number":["2020JJ5767"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hunan Provincial Department of Education outstanding youth project","award":["23B0131"],"award-info":[{"award-number":["23B0131"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s10489-026-07159-4","type":"journal-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T00:17:31Z","timestamp":1772756251000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A novel digital watermarking algorithm utilizing discrete memristor chaos and enhanced by hopfield neural networks"],"prefix":"10.1007","volume":"56","author":[{"given":"Shaobo","family":"He","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kai","family":"Hu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6360-9038","authenticated-orcid":false,"given":"Yuexi","family":"Peng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mengjiao","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhijun","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2026,3,6]]},"reference":[{"issue":"9","key":"7159_CR1","doi-asserted-by":"publisher","first-page":"2131","DOI":"10.1109\/TCSVT.2017.2712162","volume":"28","author":"Md Asikuzzaman","year":"2017","unstructured":"Asikuzzaman Md, Pickering MR (2017) An overview of digital video watermarking. IEEE Trans Circuits Syst Video Technol 28(9):2131\u20132153","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"7","key":"7159_CR2","doi-asserted-by":"publisher","first-page":"5253","DOI":"10.1007\/s10489-024-05415-z","volume":"54","author":"O Kuznetsov","year":"2024","unstructured":"Kuznetsov O, Frontoni E, Chernov K (2024) Beyond traditional steganography: enhancing security and performance with spread spectrum image steganography. Appl Intell 54(7):5253\u20135277","journal-title":"Appl Intell"},{"issue":"8","key":"7159_CR3","doi-asserted-by":"publisher","first-page":"2355","DOI":"10.1007\/s00371-020-01991-6","volume":"37","author":"D Liu","year":"2021","unstructured":"Liu D, Qingtang S, Yuan Z, Zhang X (2021) A color watermarking scheme in frequency domain based on quaternary coding. Vis Comput 37(8):2355\u20132368","journal-title":"Vis Comput"},{"issue":"9","key":"7159_CR4","doi-asserted-by":"publisher","first-page":"4227","DOI":"10.1007\/s00371-022-02587-y","volume":"39","author":"SE Naffouti","year":"2023","unstructured":"Naffouti SE, Kricha A, Sakly A (2023) A sophisticated and provably grayscale image watermarking system using dwt-svd domain. Vis Comput 39(9):4227\u20134247","journal-title":"Vis Comput"},{"issue":"20","key":"7159_CR5","doi-asserted-by":"publisher","first-page":"24056","DOI":"10.1007\/s10489-023-04797-w","volume":"53","author":"Y Huang","year":"2023","unstructured":"Huang Y, Zheng H, Xiao D (2023) Convolutional neural networks tamper detection and location based on fragile watermarking. Appl Intell 53(20):24056\u201324067","journal-title":"Appl Intell"},{"issue":"3","key":"7159_CR6","doi-asserted-by":"publisher","first-page":"276","DOI":"10.3390\/e27030276","volume":"27","author":"C Ye","year":"2025","unstructured":"Ye C, Tan S, Wang J, Shi L, Zuo Q, Feng W (2025) Social image security with encryption and watermarking in hybrid domains. Entropy 27(3):276","journal-title":"Entropy"},{"issue":"10","key":"7159_CR7","doi-asserted-by":"publisher","first-page":"13113","DOI":"10.1007\/s12652-022-03771-7","volume":"14","author":"E Farri","year":"2023","unstructured":"Farri E, Ayubi P (2023) A robust digital video watermarking based on ct-svd domain and chaotic dna sequences for copyright protection. J Ambient Intell Humaniz Comput 14(10):13113\u201313137","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"24","key":"7159_CR8","doi-asserted-by":"publisher","first-page":"37479","DOI":"10.1007\/s11042-023-15001-z","volume":"82","author":"M Sajeer","year":"2023","unstructured":"Sajeer M, Mishra A (2023) A robust and secured fusion based hybrid medical image watermarking approach using rdwt-dwt-msvd with hyperchaotic system-fibonacci q matrix encryption. Multimed Tools Appl 82(24):37479\u201337501","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"7159_CR9","doi-asserted-by":"publisher","first-page":"e2293","DOI":"10.1002\/cav.2293","volume":"35","author":"Z Xiao","year":"2024","unstructured":"Xiao Z, Chen Y, Zhou X, He M, Liu L, Feng Yu, Jiang M (2024) Human action recognition in immersive virtual reality based on multi-scale spatio-temporal attention network. Comput Anim Virt Worlds 35(5):e2293","journal-title":"Comput Anim Virt Worlds"},{"key":"7159_CR10","doi-asserted-by":"crossref","unstructured":"Ali R, Sheng B, Li P, Chen Y, Li H, Yang P, Jung Y, Kim J, Philip Chen CL (2020) Optic disk and cup segmentation through fuzzy broad learning system for glaucoma screening. IEEE Trans Industr Inf 17(4):2476\u20132487","DOI":"10.1109\/TII.2020.3000204"},{"issue":"1","key":"7159_CR11","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.media.2015.09.002","volume":"26","author":"B Yin","year":"2015","unstructured":"Yin B, Li H, Sheng B, Hou X, Chen Y, Wen W, Li P, Shen R, Bao Y, Jia W (2015) Vessel extraction from non-fluorescein fundus images using orientation-aware detector. Med Image Anal 26(1):232\u2013242","journal-title":"Med Image Anal"},{"key":"7159_CR12","doi-asserted-by":"publisher","first-page":"1701","DOI":"10.1007\/s10489-020-01903-0","volume":"51","author":"SBB Ahmadi","year":"2021","unstructured":"Ahmadi SBB, Zhang G, Rabbani M, Boukela L, Jelodar H (2021) An intelligent and blind dual color image watermarking for authentication and copyright protection. Appl Intell 51:1701\u20131732","journal-title":"Appl Intell"},{"key":"7159_CR13","doi-asserted-by":"publisher","first-page":"101654","DOI":"10.1016\/j.media.2020.101654","volume":"61","author":"Y Shen","year":"2020","unstructured":"Shen Y, Sheng B, Fang R, Li H, Dai L, Stolte S, Qin J, Jia W, Shen D (2020) Domain-invariant interpretable fundus image quality assessment. Med Image Anal 61:101654","journal-title":"Med Image Anal"},{"key":"7159_CR14","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.patrec.2021.08.015","volume":"151","author":"S Mellimi","year":"2021","unstructured":"Mellimi S, Rajput V, Ansari IA, Ahn CW (2021) A fast and efficient image watermarking scheme based on deep neural network. Pattern Recogn Lett 151:222\u2013228","journal-title":"Pattern Recogn Lett"},{"issue":"19","key":"7159_CR15","doi-asserted-by":"publisher","first-page":"6854","DOI":"10.3390\/app10196854","volume":"10","author":"J-E Lee","year":"2020","unstructured":"Lee J-E, Seo Y-H, Kim D-W (2020) Convolutional neural network-based digital image watermarking adaptive to the resolution of image and watermark. Appl Sci 10(19):6854","journal-title":"Appl Sci"},{"issue":"4","key":"7159_CR16","doi-asserted-by":"publisher","first-page":"e2234","DOI":"10.1002\/cav.2234","volume":"35","author":"Y Zhang","year":"2024","unstructured":"Zhang Y, Zhang Y, Chen L, Yin B, Sun Y (2024) Frontal person image generation based on arbitrary-view human images. Comput Anim Virt Worlds 35(4):e2234","journal-title":"Comput Anim Virt Worlds"},{"key":"7159_CR17","doi-asserted-by":"crossref","unstructured":"Zhu J (2018) Hidden: hiding data with deep networks. arXiv preprint arXiv:1807.09937","DOI":"10.1007\/978-3-030-01267-0_40"},{"issue":"8","key":"7159_CR18","doi-asserted-by":"publisher","first-page":"2554","DOI":"10.1073\/pnas.79.8.2554","volume":"79","author":"JJ Hopfield","year":"1982","unstructured":"Hopfield JJ (1982) Neural networks and physical systems with emergent collective computational abilities. Proc Natl Acad Sci 79(8):2554\u20132558","journal-title":"Proc Natl Acad Sci"},{"key":"7159_CR19","doi-asserted-by":"crossref","unstructured":"Kamgar-Parsi B, Kamgar-Parsi B (1992) Hopfield model and optimization problems. In: Neural networks for perception, pp 94\u2013110. Elsevier","DOI":"10.1016\/B978-0-12-741252-8.50011-X"},{"issue":"2","key":"7159_CR20","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1134\/S1064230724700254","volume":"63","author":"OV Darintsev","year":"2024","unstructured":"Darintsev OV, Migranov AB (2024) Modification of the hopfield neural network model for solving the problem of optimal task allocation in a group of mobile robots. J Comput Syst Sci Int 63(2):371\u2013383","journal-title":"J Comput Syst Sci Int"},{"key":"7159_CR21","doi-asserted-by":"publisher","first-page":"114440","DOI":"10.1016\/j.chaos.2023.114440","volume":"179","author":"Yu Fei","year":"2024","unstructured":"Fei Yu, Kong X, Yao W, Zhang J, Cai S, Lin H, Jin J (2024) Dynamics analysis, synchronization and fpga implementation of multiscroll hopfield neural networks with non-polynomial memristor. Chaos Solit Fract 179:114440","journal-title":"Chaos Solit Fract"},{"issue":"12","key":"7159_CR22","doi-asserted-by":"publisher","first-page":"901","DOI":"10.3390\/axioms14120901","volume":"14","author":"W Feng","year":"2025","unstructured":"Feng W, Tang Z, Zhao X, Qin Z, Chen Y, Cai B, Zhu Z, Qian K, Wen H (2025) Two-dimensional coupling-enhanced cubic hyperchaotic map with exponential parameters: Construction, analysis, and application in hierarchical significance-aware multi-image encryption. Axioms 14(12):901","journal-title":"Axioms"},{"key":"7159_CR23","unstructured":"Ramya C, Kavitha G, Shreedhara DKS (2011) Recalling of images using hopfield neural network model. arXiv preprint arXiv:1105.0332"},{"key":"7159_CR24","doi-asserted-by":"crossref","unstructured":"Peng Y, Huang Z, Li Z, He S, Zou J (2026) An effective visually meaningful image encryption based on compressive sensing and multi-objective optimization algorithm. IEEE Internet Things J 13(3):4076\u20134087","DOI":"10.1109\/JIOT.2025.3593235"},{"key":"7159_CR25","doi-asserted-by":"publisher","first-page":"123190","DOI":"10.1016\/j.eswa.2024.123190","volume":"246","author":"W Feng","year":"2024","unstructured":"Feng W, Zhang J, Chen Y, Qin Z, Zhang Y, Ahmad M, Wo\u017aniak M (2024) Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Syst Appl 246:123190","journal-title":"Expert Syst Appl"},{"key":"7159_CR26","doi-asserted-by":"crossref","unstructured":"Sonam, Sehra K, Singh RP, Singh S, Wadhera S, Kasturi P, Saxena GJ, Saxena M (2023) Secure digital image watermarking using memristor-based hyperchaotic circuit. Vis Comput 39(10):4459\u20134485","DOI":"10.1007\/s00371-022-02601-3"},{"key":"7159_CR27","doi-asserted-by":"crossref","unstructured":"Yu F, He S, Yao W, Cai S, Xu Q (2025) Bursting firings in memristive hopffeld neural network with image encryption and hardware implementation. IEEE Trans Comput-Aided Design Integr Circ Syst","DOI":"10.1109\/TCAD.2025.3567878"},{"key":"7159_CR28","doi-asserted-by":"publisher","first-page":"107213","DOI":"10.1016\/j.neunet.2025.107213","volume":"185","author":"Y Peng","year":"2025","unstructured":"Peng Y, Li M, Li Z, Ma M, Wang M, He S (2025) What is the impact of discrete memristor on the performance of neural network: A research on discrete memristor-based bp neural network. Neural Netw 185:107213","journal-title":"Neural Netw"},{"key":"7159_CR29","doi-asserted-by":"publisher","first-page":"113024","DOI":"10.1016\/j.chaos.2022.113024","volume":"167","author":"L Ren","year":"2023","unstructured":"Ren L, Mou J, Banerjee S, Zhang Y (2023) A hyperchaotic map with a new discrete memristor model: Design, dynamical analysis, implementation and application. Chaos Solit Fract 167:113024","journal-title":"Chaos Solit Fract"},{"issue":"12","key":"7159_CR30","doi-asserted-by":"publisher","first-page":"792","DOI":"10.3390\/fractalfract9120792","volume":"9","author":"W Feng","year":"2025","unstructured":"Feng W, Tang Z, Zhao X, Qin Z, Chen Y, Cai B, Zhu Z, Wen H, Ye C (2025) State-dependent variable fractional-order hyperchaotic dynamics in a coupled quadratic map: A novel system for high-performance image protection. Fractal Fraction 9(12):792","journal-title":"Fractal Fraction"},{"key":"7159_CR31","doi-asserted-by":"crossref","unstructured":"He S, Sun K, Peng Y, Wang L (2020) Modeling of discrete fracmemristor and its application. AIP Advances 10(1)","DOI":"10.1063\/1.5134981"},{"issue":"11","key":"7159_CR32","doi-asserted-by":"publisher","first-page":"4534","DOI":"10.1109\/TCSI.2021.3082895","volume":"68","author":"H Bao","year":"2021","unstructured":"Bao H, Hua Z, Li H, Chen M, Bao B (2021) Discrete memristor hyperchaotic maps. IEEE Trans Circuits Syst I Regul Pap 68(11):4534\u20134544","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"key":"7159_CR33","doi-asserted-by":"crossref","unstructured":"Asmara RA, Agustina R et al (2017) Comparison of discrete cosine transforms (dct), discrete fourier transforms (dft), and discrete wavelet transforms (dwt) in digital image watermarking. Int J Adv Comput Sci Appl 8(2)","DOI":"10.14569\/IJACSA.2017.080232"},{"issue":"4","key":"7159_CR34","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1109\/78.827550","volume":"48","author":"G Bi","year":"2000","unstructured":"Bi G, Li G, Ma K-K, Tan TC (2000) On the computation of two-dimensional dct. IEEE Trans Signal Process 48(4):1171\u20131183","journal-title":"IEEE Trans Signal Process"},{"issue":"5","key":"7159_CR35","doi-asserted-by":"publisher","first-page":"1977","DOI":"10.4249\/scholarpedia.1977","volume":"2","author":"JJ Hopfield","year":"2007","unstructured":"Hopfield JJ (2007) Hopfield Netw Scholarpedia 2(5):1977","journal-title":"Hopfield Netw Scholarpedia"},{"issue":"5","key":"7159_CR36","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/TNN.2006.875978","volume":"17","author":"G Pajares","year":"2006","unstructured":"Pajares G (2006) A hopfield neural network for image change detection. IEEE Trans Neural Networks 17(5):1250\u20131264","journal-title":"IEEE Trans Neural Networks"},{"issue":"9","key":"7159_CR37","first-page":"165","volume":"2","author":"P Singh","year":"2013","unstructured":"Singh P, Chadha RS (2013) A survey of digital watermarking techniques, applications and attacks. Intern J Eng Innov Technol (IJEIT) 2(9):165\u2013175","journal-title":"Intern J Eng Innov Technol (IJEIT)"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-026-07159-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-026-07159-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-026-07159-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T00:17:34Z","timestamp":1772756254000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-026-07159-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,6]]},"references-count":37,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["7159"],"URL":"https:\/\/doi.org\/10.1007\/s10489-026-07159-4","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,6]]},"assertion":[{"value":"17 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"129"}}