{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:15:23Z","timestamp":1760955323589},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2012,1,7]],"date-time":"2012-01-07T00:00:00Z","timestamp":1325894400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s11042-011-0974-z","type":"journal-article","created":{"date-parts":[[2012,1,6]],"date-time":"2012-01-06T17:12:50Z","timestamp":1325869970000},"page":"757-776","source":"Crossref","is-referenced-by-count":18,"title":["Multi-block dependency based fragile watermarking scheme for fingerprint images protection"],"prefix":"10.1007","volume":"64","author":[{"given":"Chunlei","family":"Li","sequence":"first","affiliation":[]},{"given":"Yunhong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Zhaoxiang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,1,7]]},"reference":[{"key":"974_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1117\/1.2891312","volume":"17","author":"AF Ahmed","year":"2008","unstructured":"Ahmed AF, Selvanadin KB (2008) Fingerprint reference verification method using a phase encoding based watermarking technique. J Electron Imaging 17:1\u20139","journal-title":"J Electron Imaging"},{"issue":"3","key":"974_CR2","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1109\/TIFS.2008.926994","volume":"3","author":"TS Anthony","year":"2008","unstructured":"Anthony TS, Zhu XZ, Shen J (2008) Fragile Watermarking based on encoding of the zeroes of the Z-Transform. IEEE Trans Inf Forensics Security 3(3):567\u2013569","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"974_CR3","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1109\/TIP.2002.1014990","volume":"11","author":"M Celik","year":"2002","unstructured":"Celik M, Sharma G, Saber E (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11:585\u2013595","journal-title":"IEEE Trans Image Process"},{"key":"974_CR4","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1016\/j.patrec.2005.09.006","volume":"27","author":"CC Chang","year":"2006","unstructured":"Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27:439\u2013446","journal-title":"Pattern Recogn Lett"},{"key":"974_CR5","doi-asserted-by":"crossref","first-page":"1300","DOI":"10.1016\/j.eswa.2007.11.018","volume":"36","author":"WC Chen","year":"2009","unstructured":"Chen WC, Wang MS (2009) A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst Appl 36:1300\u20131307","journal-title":"Expert Syst Appl"},{"key":"974_CR6","doi-asserted-by":"crossref","first-page":"2133","DOI":"10.1016\/S0165-1684(03)00172-5","volume":"83","author":"F Deguillaume","year":"2003","unstructured":"Deguillaume F, Voloshynovskiy S (2003) Secure hybrid robust watermarking resistant against tampering and copy attack. Signal Process 83:2133\u20132170","journal-title":"Signal Process"},{"key":"974_CR7","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1117\/1.1459449","volume":"11","author":"J Fridrich","year":"2002","unstructured":"Fridrich J, Goljan M, Memon N (2002) Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. J Electron Imaging 11:262\u2013274","journal-title":"J Electron Imaging"},{"key":"974_CR8","first-page":"147","volume":"5284","author":"HJ He","year":"2008","unstructured":"He HJ, Zhang JS, Tai HM (2008) Digital watermarking scheme exploiting nondeterministic dependence for image authentication. IHW 5284:147\u2013160","journal-title":"IHW"},{"key":"974_CR9","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1016\/j.sigpro.2009.02.009","volume":"89","author":"HJ He","year":"2009","unstructured":"He HJ, Zhang JS, Chen F (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process 89:1557\u20131566","journal-title":"Signal Process"},{"key":"974_CR10","first-page":"132","volume":"5806","author":"HJ He","year":"2009","unstructured":"He HJ, Zhang JS, Tai HM (2009) Self-recovery fragile watermarking using block-neighborhood tampering characterization. IHW 5806:132\u2013145","journal-title":"IHW"},{"key":"974_CR11","first-page":"1","volume":"1","author":"HJ He","year":"2010","unstructured":"He HJ, Zhang JS, Tai HM (2010) A neighborhood-characteristic-based detection model for statistical fragile watermarking with localization. Multimed Tools Appl 1:1\u201318","journal-title":"Multimed Tools Appl"},{"key":"974_CR12","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1109\/83.826780","volume":"9","author":"H Holliman","year":"2000","unstructured":"Holliman H, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9:432\u2013441","journal-title":"IEEE Trans Image Process"},{"key":"974_CR13","first-page":"1","volume":"45","author":"CT Li","year":"2006","unstructured":"Li CT, Yuan Y (2006) Block-chain based fragile watermarking scheme with superior localization. Opt Eng 45:1\u20136","journal-title":"Opt Eng"},{"key":"974_CR14","doi-asserted-by":"crossref","first-page":"869","DOI":"10.1016\/j.amc.2006.07.036","volume":"185","author":"SH Liu","year":"2007","unstructured":"Liu SH, Yao HX, Gao W, Liu YL (2007) An image fragile watermark scheme based on chaotic image pattern and pixel-pairs. Appl Math Comput 185:869\u2013882","journal-title":"Appl Math Comput"},{"key":"974_CR15","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1016\/j.forsciint.2006.08.019","volume":"169","author":"A Noore","year":"2007","unstructured":"Noore A, Singh R, Vatsa M, Houck M (2007) Enhancing security of fingerprints through contextual biometric watermarking. Forensic Sci Int 169:188\u2013194","journal-title":"Forensic Sci Int"},{"key":"974_CR16","doi-asserted-by":"crossref","unstructured":"Ohkita K, Yoshida M, Kitamura I, Fujiwara T (2009) Improving capability of locating tampered pixels of statistical fragile watermarking. In: Proceedings of the 8th international workshop on digital watermarking, vol 5703, pp 279\u2013293","DOI":"10.1007\/978-3-642-03688-0_25"},{"key":"974_CR17","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/978-3-540-25976-3_19","volume":"3087","author":"NK Ratha","year":"2004","unstructured":"Ratha NK, Villanueva MAF, Connell JH, Bolle RM (2004) A secure protocol for data hiding in compressed fingerprint images. Lect Notes Comput Sci 3087:205\u2013216","journal-title":"Lect Notes Comput Sci"},{"key":"974_CR18","doi-asserted-by":"crossref","first-page":"1893","DOI":"10.1016\/j.patrec.2004.08.017","volume":"25","author":"S Suthaharan","year":"2004","unstructured":"Suthaharan S (2004) Fragile image watermarking using a gradient image for improved localization and security. Pattern Recogn Lett 25:1893\u20131903","journal-title":"Pattern Recogn Lett"},{"key":"974_CR19","doi-asserted-by":"crossref","first-page":"1672","DOI":"10.1016\/j.patcog.2005.03.016","volume":"38","author":"YJ Tsai","year":"2005","unstructured":"Tsai YJ, Venu GJ (2005) A minutia-based partial fingerprint recognition system. Pattern Recogn 38:1672\u20131684","journal-title":"Pattern Recogn"},{"key":"974_CR20","unstructured":"Wong P (1998) A public key watermark for image verification and authentication. In: Proc Int Conf Image Processing 1:455\u2013459"},{"key":"974_CR21","unstructured":"Wu JH, Bin B, Zhu BB, Li SP, Lin FZ (2004) Efficient oracle attacks on Yeung\u2013Mintzer and variant authentication schemes. In: IEEE international conference on multimedia & Expo (ICME), pp 931\u2013934"},{"key":"974_CR22","unstructured":"Yeung MM, Pankanti S (1999) Verification watermarks on fingerprint recognition and retrieval. In: Proc. of SPIE conference on security and watermarking of multimedia contents, San Jose, pp 66\u201378"},{"key":"974_CR23","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1007\/s11432-007-0024-7","volume":"50","author":"M Yu","year":"2007","unstructured":"Yu M, He HJ, Zhang JS (2007) A digital authentication watermarking scheme for JPEG images with superior localization and security. Sci China F Inf Sci 50:491\u2013509","journal-title":"Sci China F Inf Sci"},{"key":"974_CR24","doi-asserted-by":"crossref","unstructured":"Zebbiche AK, Khelifi F, Bouridane A (2008) An efficient watermarking technique for the protection of fingerprint images. In: EURASIP journal on information security, pp 1\u201320","DOI":"10.1155\/2008\/918601"},{"key":"974_CR25","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1109\/LSP.2007.896436","volume":"14","author":"XP Zhang","year":"2007","unstructured":"Zhang XP, Wang SZ (2007) Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process Lett 14:727\u2013730","journal-title":"IEEE Signal Process Lett"},{"key":"974_CR26","unstructured":"Zhang J, Tian L, Tai HM (2004) A new watermarking method based on chaotic maps. In: Proc. IEEE ICME\u201904, vol 89, pp 157\u2013163"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-011-0974-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-011-0974-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-011-0974-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,22]],"date-time":"2019-06-22T05:23:36Z","timestamp":1561181016000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-011-0974-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1,7]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["974"],"URL":"https:\/\/doi.org\/10.1007\/s11042-011-0974-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,1,7]]}}}