{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:41:49Z","timestamp":1767339709265},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,5,10]],"date-time":"2013-05-10T00:00:00Z","timestamp":1368144000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s11042-013-1483-z","type":"journal-article","created":{"date-parts":[[2013,5,9]],"date-time":"2013-05-09T05:20:49Z","timestamp":1368076849000},"page":"1933-1960","source":"Crossref","is-referenced-by-count":11,"title":["SVM correction based geometrically invariant digital watermarking algorithm"],"prefix":"10.1007","volume":"72","author":[{"given":"Xiang-yang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Chun-peng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ai-long","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hong-ying","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,10]]},"reference":[{"issue":"2","key":"1483_CR1","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1109\/LSP.2004.840872","volume":"12","author":"M Barni","year":"2005","unstructured":"Barni M (2005) Effectiveness of exhaustive search and template matching against watermark desynchronization. IEEE Signal Proc Lett 12(2):158\u2013161","journal-title":"IEEE Signal Proc Lett"},{"issue":"12","key":"1483_CR2","doi-asserted-by":"crossref","first-page":"2098","DOI":"10.1109\/TPAMI.2008.22","volume":"30","author":"A Bartoli","year":"2008","unstructured":"Bartoli A (2008) Groupwise geometric and photometric direct image registration. IEEE Trans Pattern Anal Mach Intell 30(12):2098\u20132108","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"3","key":"1483_CR3","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A, Condell J, Curran K (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90(3):727\u2013752","journal-title":"Signal Process"},{"issue":"8","key":"1483_CR4","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1016\/j.sigpro.2009.02.005","volume":"89","author":"C Deng","year":"2009","unstructured":"Deng C, Gao X, Li X, Tao D (2009) A local Tchebichef moments-based robust image watermarking. Signal Process 89(8):1531\u20131539","journal-title":"Signal Process"},{"issue":"16","key":"1483_CR5","doi-asserted-by":"crossref","first-page":"986","DOI":"10.1049\/el:20040600","volume":"40","author":"YG Fu","year":"2004","unstructured":"Fu YG, Shen R, Lu H (2004) Watermarking scheme based on support vector machine for color images. IEEE Electron Lett 40(16):986\u2013987","journal-title":"IEEE Electron Lett"},{"issue":"3","key":"1483_CR6","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1109\/TSMCC.2009.2037512","volume":"40","author":"XB Gao","year":"2010","unstructured":"Gao XB, Deng C, Li XL (2010) Geometric distortion insensitive image watermarking in affine covariant regions. IEEE Trans Syst Man Cybern Part C Appl Rev 40(3):278\u2013286","journal-title":"IEEE Trans Syst Man Cybern Part C Appl Rev"},{"issue":"2","key":"1483_CR7","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1109\/LSP.2010.2095498","volume":"18","author":"S-W Jung","year":"2011","unstructured":"Jung S-W, Ha LT, Ko S-J (2011) A new histogram modification based reversible data hiding algorithm considering the human visual system. IEEE Signal Proc Lett 18(2):95\u201398","journal-title":"IEEE Signal Proc Lett"},{"issue":"1","key":"1483_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TIFS.2009.2039604","volume":"5","author":"X Kang","year":"2010","unstructured":"Kang X, Huang J, Zeng W (2010) Efficient general print-scanning resilient data hiding based on uniform log-polar mapping. IEEE Trans Inf Forensic Secur 5(1):1\u201312","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"1483_CR9","doi-asserted-by":"crossref","unstructured":"Kaur M, Kaur P (2009) Robust watermarking into the color models based on the synchronization template. International Conference on Information and Multimedia Technology (ICIMT \u201909), Jeju, Island, pp 296\u2013300","DOI":"10.1109\/ICIMT.2009.81"},{"issue":"5","key":"1483_CR10","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1109\/34.55109","volume":"12","author":"A Khotanzad","year":"1990","unstructured":"Khotanzad A, Hong YH (1990) Invariant image recognition by Zernike moments. IEEE Trans Pattern Anal Mach Intell 12(5):489\u2013497","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"9","key":"1483_CR11","first-page":"31","volume":"12","author":"A Kumar","year":"2011","unstructured":"Kumar A, Santhi V (2011) A review on geometric invariant digital image watermarking techniques. Int J Comput Appl 12(9):31\u201336","journal-title":"Int J Comput Appl"},{"key":"1483_CR12","unstructured":"Li C, Ling H, Lu Z (2007) Semi-fragile watermarking based on SVM for image authentication. 2007 IEEE International Conference on Multimedia and Expo, Beijing, China, pp 1255\u20131258"},{"issue":"1","key":"1483_CR13","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s11042-006-0072-9","volume":"34","author":"Y Liu","year":"2007","unstructured":"Liu Y, Zheng D, Zhao J (2007) An image rectification scheme and its applications in RST invariant digital image watermarking. Multimedia Tools Appl 34(1):57\u201384","journal-title":"Multimedia Tools Appl"},{"issue":"2\u20133","key":"1483_CR14","first-page":"257","volume":"52","author":"KK Muhammad","year":"2011","unstructured":"Muhammad KK (2011) Research advances in data hiding for multimedia security. Multimedia Tools Appl 52(2\u20133):257\u2013261","journal-title":"Multimedia Tools Appl"},{"issue":"8","key":"1483_CR15","doi-asserted-by":"crossref","first-page":"1470","DOI":"10.1016\/j.jss.2010.03.006","volume":"83","author":"H Peng","year":"2010","unstructured":"Peng H, Wang J, Wang WW (2010) Image watermarking method in multiwavelet domain based on support vector machines. J Syst Softw 83(8):1470\u20131477","journal-title":"J Syst Softw"},{"issue":"1","key":"1483_CR16","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1016\/j.sigpro.2007.07.020","volume":"88","author":"HY Qi","year":"2008","unstructured":"Qi HY, Zheng D, Zhao JY (2008) Human visual system based adaptive digital image watermarking. Signal Process 88(1):174\u2013188","journal-title":"Signal Process"},{"issue":"4","key":"1483_CR17","doi-asserted-by":"crossref","first-page":"1537","DOI":"10.1109\/TSP.2006.870581","volume":"54","author":"JS Seo","year":"2006","unstructured":"Seo JS, Yoo CD (2006) Image watermarking based on invariant regions of scale-space representation. IEEE Trans Sign Process 54(4):1537\u20131549","journal-title":"IEEE Trans Sign Process"},{"issue":"2","key":"1483_CR18","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1016\/j.ins.2006.05.002","volume":"177","author":"HH Tsai","year":"2007","unstructured":"Tsai HH, Sun DW (2007) Color image watermark extraction based on support vector machines. Inform Sci 177(2):550\u2013569","journal-title":"Inform Sci"},{"key":"1483_CR19","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The nature of statistical learning theory","author":"V Vapnik","year":"1995","unstructured":"Vapnik V (1995) The nature of statistical learning theory. Springer, New York"},{"issue":"2","key":"1483_CR20","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/s11045-009-0096-1","volume":"21","author":"X-Y Wang","year":"2010","unstructured":"Wang X-Y, Hou L-M (2010) A new robust digital image watermarking based on pseudo-Zernike moments. Multidim Syst Sign Process 21(2):179\u2013196","journal-title":"Multidim Syst Sign Process"},{"issue":"4","key":"1483_CR21","doi-asserted-by":"crossref","first-page":"655","DOI":"10.1109\/TIFS.2007.908233","volume":"2","author":"X Wang","year":"2007","unstructured":"Wang X, Wu J, Niu P (2007) A new digital image watermarking algorithm resilient to desynchronization attacks. IEEE Trans Inf Forensic Secur 2(4):655\u2013663","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"5","key":"1483_CR22","doi-asserted-by":"crossref","first-page":"9056","DOI":"10.1016\/j.eswa.2008.12.040","volume":"36","author":"X-Y Wang","year":"2009","unstructured":"Wang X-Y, Xu Z-H, Yang H-Y (2009) A robust image watermarking algorithm using SVR detection. Expert Syst Appl 36(5):9056\u20139064","journal-title":"Expert Syst Appl"},{"key":"1483_CR23","doi-asserted-by":"crossref","unstructured":"Wu J (2009) A RST invariant watermarking scheme utilizing support vector machine and image moments for synchronization. 2009 Fifth International Conference on Information Assurance and Security, Xi\u2019 An, China, pp 572\u2013574","DOI":"10.1109\/IAS.2009.176"},{"issue":"2","key":"1483_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1242471.1242473","volume":"39","author":"D Zheng","year":"2007","unstructured":"Zheng D, Liu Y, Zhao J (2007) A survey of RST invariant image watermarking algorithms. ACM Comput Surv 39(2):1\u201391","journal-title":"ACM Comput Surv"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1483-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-013-1483-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1483-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T15:34:55Z","timestamp":1563032095000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-013-1483-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,10]]},"references-count":24,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["1483"],"URL":"https:\/\/doi.org\/10.1007\/s11042-013-1483-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,10]]}}}