{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,25]],"date-time":"2024-04-25T05:52:54Z","timestamp":1714024374996},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,7,5]],"date-time":"2013-07-05T00:00:00Z","timestamp":1372982400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1007\/s11042-013-1577-7","type":"journal-article","created":{"date-parts":[[2013,7,4]],"date-time":"2013-07-04T04:26:25Z","timestamp":1372911985000},"page":"2653-2677","source":"Crossref","is-referenced-by-count":11,"title":["A robust logo watermarking technique in divisive normalization transform domain"],"prefix":"10.1007","volume":"72","author":[{"given":"Punit","family":"Pandey","sequence":"first","affiliation":[]},{"given":"Shishir","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Satish K.","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,5]]},"reference":[{"key":"1577_CR1","doi-asserted-by":"crossref","first-page":"1019","DOI":"10.1016\/j.patrec.2004.09.047","volume":"26","author":"RA Adhipati","year":"2005","unstructured":"Adhipati RA, Chatterji BN (2005) A new wavelet based logo-watermarking scheme. Pattern Recognit Lett 26:1019\u20131027","journal-title":"Pattern Recognit Lett"},{"issue":"1","key":"1577_CR2","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/TCSVT.2004.836745","volume":"15","author":"P Bao","year":"2005","unstructured":"Bao P, Ma X (2005) Image adaptive watermarking using wavelet domain singular value decomposition. IEEE Trans Circ Syst Video Technol 15(1):96\u2013102","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"1577_CR3","first-page":"357","volume":"66","author":"M Barni","year":"1998","unstructured":"Barni M, Bartolini F, Piva A (1998) A DCT domain system for robust image watermarking. IEEE Trans Signal Process 66:357\u2013372","journal-title":"IEEE Trans Signal Process"},{"issue":"5","key":"1577_CR4","doi-asserted-by":"crossref","first-page":"783","DOI":"10.1109\/83.918570","volume":"10","author":"M Barni","year":"2001","unstructured":"Barni M, Bartolini F, Piva A (2001) Improved wavelet based image watermarking through pixel wise masking. IEEE Trans Image Process 10(5):783\u2013791","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"1577_CR5","first-page":"9","volume":"4","author":"A Benhocine","year":"2013","unstructured":"Benhocine A, Laouamer L, Nana L, Pascu AC (2013) New images watermarking scheme based on singular value decomposition. J Inf Hiding Multimed Signal Process 4(1):9\u201318","journal-title":"J Inf Hiding Multimed Signal Process"},{"issue":"2\u20133","key":"1577_CR6","first-page":"621","volume":"52","author":"G Bhatnagar","year":"2009","unstructured":"Bhatnagar G, Raman B (2009) A new robust reference logo watermarking scheme. Multimed Tools Appl 52(2\u20133):621\u2013640","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"1577_CR7","first-page":"359","volume":"26","author":"CC Chang","year":"2002","unstructured":"Chang CC, Chuang JC, Chen TS (2002) Recognition of image authenticity using significant DCT coefficients quantization. Informatica 26(4):359\u2013366","journal-title":"Informatica"},{"key":"1577_CR8","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1016\/j.patrec.2005.01.004","volume":"26","author":"CC Chang","year":"2005","unstructured":"Chang CC, Tsai P, Lin CC (2005) SVD-based digital image watermarking scheme. Pattern Recognit Lett 26:1577\u20131586","journal-title":"Pattern Recognit Lett"},{"issue":"11","key":"1577_CR9","doi-asserted-by":"crossref","first-page":"3060","DOI":"10.1109\/TIM.2010.2066770","volume":"59","author":"L Chih-Chin","year":"2010","unstructured":"Chih-Chin L, Cheng-Chih T (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060\u20133063","journal-title":"IEEE Trans Instrum Meas"},{"issue":"12","key":"1577_CR10","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I Cox","year":"1997","unstructured":"Cox I, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673\u20131687","journal-title":"IEEE Trans Image Process"},{"key":"1577_CR11","doi-asserted-by":"crossref","unstructured":"Cox I, Miller ML, Bloom JA (2001) Digital watermarking. Morgan Kaufmann","DOI":"10.1016\/B978-155860714-9\/50009-2"},{"key":"1577_CR12","doi-asserted-by":"crossref","unstructured":"Ganic E, Eskicioglu AM (2004) Robust DWT-SVD domain image watermarking: embedding data in all frequencies. In: Proceedings of the ACM Multimedia and Security workshop, Magdeburg, Germany, pp. 166\u2013174","DOI":"10.1145\/1022431.1022461"},{"issue":"4","key":"1577_CR13","doi-asserted-by":"crossref","first-page":"043004","DOI":"10.1117\/1.2137650","volume":"14","author":"E Ganic","year":"2005","unstructured":"Ganic E, Eskicioglu AM (2005) Robust embedding of visual watermarks using DWT-SVD. J Electron Imaging 14(4):043004","journal-title":"J Electron Imaging"},{"issue":"5","key":"1577_CR14","doi-asserted-by":"crossref","first-page":"1002","DOI":"10.1016\/j.csi.2008.09.031","volume":"31","author":"B Gaurav","year":"2009","unstructured":"Gaurav B, Raman B (2009) A new robust reference watermarking scheme based on DWT-SVD. Comput Stand Interfaces 31(5):1002\u20131013","journal-title":"Comput Stand Interfaces"},{"key":"1577_CR15","author":"B Gaurav","year":"2011","unstructured":"Gaurav B, Wu QMJ, Raman B (2011) A new aspect in robust digital watermarking. Multimed Tools Appl. doi: 10.1007\/s11042-011-0788-z","journal-title":"Multimed Tools Appl"},{"key":"1577_CR16","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.cose.2011.11.003","volume":"31","author":"B Gaurav","year":"2012","unstructured":"Gaurav B, Wu QMJ, Raman B (2012) A new robust adjustable logo watermarking scheme. Comput Secur 31:40\u201358","journal-title":"Comput Secur"},{"issue":"6","key":"1577_CR17","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1049\/el:19990327","volume":"35","author":"WS Kim","year":"1999","unstructured":"Kim WS, Hyung OH, Park RH (1999) Wavelet based watermarking method for digital images using human visual system. Electron Lett 35(6):466\u2013468","journal-title":"Electron Lett"},{"key":"1577_CR18","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1109\/TMM.2003.819747","volume":"6","author":"D Kundur","year":"2004","unstructured":"Kundur D, Hatzinakos D (2004) Towards robust logo watermarking using multi resolution image fusion. IEEE Trans Multimed 6:185\u2013197","journal-title":"IEEE Trans Multimed"},{"issue":"2","key":"1577_CR19","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1109\/JSTSP.2009.2014497","volume":"3","author":"Q Li","year":"2009","unstructured":"Li Q, Wang Z (2009) Reduced-reference image quality assessment using divisive normalization-based image representation. IEEE J Sel Top Signal Process 3(2):202\u2013211","journal-title":"IEEE J Sel Top Signal Process"},{"issue":"5","key":"1577_CR20","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TMM.2008.922795","volume":"10","author":"WH Lin","year":"2008","unstructured":"Lin WH, Horng SJ, Kao T, Fan WP, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed (SCI 12\/86, 2288) 10(5):746\u2013757","journal-title":"IEEE Trans Multimed (SCI 12\/86, 2.288)"},{"issue":"6","key":"1577_CR21","doi-asserted-by":"crossref","first-page":"9869","DOI":"10.1016\/j.eswa.2009.02.036","volume":"36","author":"W-H Lin","year":"2009","unstructured":"Lin W-H, Wang Y-R, Horng S-J (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl (SCI 1\/64, 2596) 36(6):9869\u20139878","journal-title":"Expert Syst Appl (SCI 1\/64, 2.596)"},{"issue":"9","key":"1577_CR22","doi-asserted-by":"crossref","first-page":"11509","DOI":"10.1016\/j.eswa.2009.03.060","volume":"36","author":"W-H Lin","year":"2009","unstructured":"Lin W-H, Wang Y-R, Horng S-J, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl (SCI 1\/64, 2596) 36(9):11509\u201311516","journal-title":"Expert Syst Appl (SCI 1\/64, 2.596)"},{"issue":"1","key":"1577_CR23","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1109\/6046.985560","volume":"4","author":"R Liu","year":"2002","unstructured":"Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimed 4(1):121\u2013128","journal-title":"IEEE Trans Multimed"},{"issue":"2","key":"1577_CR24","first-page":"135","volume":"3","author":"K Loukhaoukha","year":"2012","unstructured":"Loukhaoukha K (2012) On the security of digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. J Inf Hiding Multimed Signal Process 3(2):135\u2013141","journal-title":"J Inf Hiding Multimed Signal Process"},{"key":"1577_CR25","doi-asserted-by":"crossref","unstructured":"Lyu S, Simoncelli EP (2007) Statistically and perceptually motivated nonlinear image representation. In: Proceeding of SPIE Conference on Human Vision and Electronic Imaging XII, vol. 6492, San Jose, CA, Jan","DOI":"10.1117\/12.720848"},{"key":"1577_CR26","unstructured":"Lyu S, Simoncelli EP (2008) Nonlinear image representation using divisive normalization. IEEE Conference on Computer Vision and Pattern Recognition, Anchorage, Alaska, June 24\u201326"},{"issue":"1","key":"1577_CR27","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/TIP.2005.860325","volume":"15","author":"J Malo","year":"2006","unstructured":"Malo J, Epifanio I, Navarro R, Simoncelli EP (2006) Nonlinear image representation for efficient perceptual coding. IEEE Trans Image Process 15(1):68\u201380","journal-title":"IEEE Trans Image Process"},{"key":"1577_CR28","doi-asserted-by":"crossref","first-page":"2158","DOI":"10.1016\/j.sigpro.2008.02.015","volume":"88","author":"AA Mohammad","year":"2008","unstructured":"Mohammad AA, Alhaj A, Shaltaf S (2008) An improved SVD-based watermarking scheme for protecting rightful ownership. Signal Process 88:2158\u20132180","journal-title":"Signal Process"},{"key":"1577_CR29","unstructured":"Pandey, P, Kumar S, Singh SK (2013) Rightful ownership through image adaptive DWT-SVD watermarking algorithm and perceptual tweaking. Multimed Tools Appl 1\u201326. http:\/\/link.springer.com\/article\/10.1007\/s11042-013-1375-2"},{"key":"1577_CR30","doi-asserted-by":"crossref","unstructured":"Podilchuk CI, Delp EJ (2001) Digital watermarking: algorithms and applications. IEEE Signal Proc Mag pp. 33\u201346, July","DOI":"10.1109\/79.939835"},{"issue":"3","key":"1577_CR31","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MMUL.2011.41","volume":"19","author":"D Rosiyadi","year":"2012","unstructured":"Rosiyadi D, Horng S-J, Fan P, Wang X, Khan MK, Yi P (2012) An efficient copyright protection scheme for e-government document images. IEEE Multimed 19(3):62\u201373","journal-title":"IEEE Multimed"},{"issue":"1","key":"1577_CR32","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1016\/j.eswa.2011.07.059","volume":"39","author":"R-S Run","year":"2012","unstructured":"Run R-S, Horng S-J, Lai J-L, Kao T-W, Chen R-J (2012) An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl 39(1):673\u2013689","journal-title":"Expert Syst Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1577-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-013-1577-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-013-1577-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,16]],"date-time":"2019-07-16T23:28:22Z","timestamp":1563319702000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-013-1577-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,5]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["1577"],"URL":"https:\/\/doi.org\/10.1007\/s11042-013-1577-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,5]]}}}