{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T01:44:38Z","timestamp":1649123078294},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2014,4,25]],"date-time":"2014-04-25T00:00:00Z","timestamp":1398384000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s11042-014-1930-5","type":"journal-article","created":{"date-parts":[[2014,4,24]],"date-time":"2014-04-24T06:10:02Z","timestamp":1398319802000},"page":"6797-6826","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Stable watermarking technique based on XNOR operation and scale relationship"],"prefix":"10.1007","volume":"74","author":[{"given":"Jung-San","family":"Lee","sequence":"first","affiliation":[]},{"given":"Hsiao-Shan","family":"Wong","sequence":"additional","affiliation":[]},{"given":"You-Ren","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yi-Hua","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,25]]},"reference":[{"issue":"14","key":"1930_CR1","doi-asserted-by":"crossref","first-page":"2806","DOI":"10.1016\/j.optcom.2009.04.034","volume":"282","author":"V Aslantas","year":"2009","unstructured":"Aslantas V, Ozer S, Ozturk S (2009) Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms. Opt Commun 282(14):2806\u20132817","journal-title":"Opt Commun"},{"key":"1930_CR2","unstructured":"Athanasios N (2012) \u201cLocal distortion resistant image watermarking relying on salient feature extraction\u201d. EURASIP J Adv Sig Proc:1\u201317"},{"issue":"1","key":"1930_CR3","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/TCSVT.2004.836745","volume":"15","author":"P Bao","year":"2005","unstructured":"Bao P, Ma X (2005) Image adaptive watermarking using wavelet domain singular value decomposition. IEEE Trans Circuits Syst Video Technol 15(1):96\u2013102","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"5","key":"1930_CR4","doi-asserted-by":"crossref","first-page":"783","DOI":"10.1109\/83.918570","volume":"10","author":"M Barni","year":"2001","unstructured":"Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783\u2013791","journal-title":"IEEE Trans Image Process"},{"issue":"13","key":"1930_CR5","doi-asserted-by":"crossref","first-page":"2768","DOI":"10.1016\/j.ins.2007.02.019","volume":"177","author":"CC Chang","year":"2007","unstructured":"Chang CC, Lin CC, Tseng CS, Tai WL (2007) Reversible hiding in DCT-based compressed images. Inf Sci 177(13):2768\u20132786","journal-title":"Inf Sci"},{"issue":"8","key":"1930_CR6","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1016\/j.sigpro.2009.02.005","volume":"89","author":"C Deng","year":"2009","unstructured":"Deng C, Gao X, Li X, Tao D (2009) A local Techebichef moments-based robust image watermarking. Signal Process 89(8):1531\u20131539","journal-title":"Signal Process"},{"issue":"3","key":"1930_CR7","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1109\/TSMCC.2009.2037512","volume":"40","author":"X Gao","year":"2010","unstructured":"Gao X, Deng C, Li X, Tao D (2010) Geometric distortion insensitive image watermarking in affine covariant regions. IEEE Syst Man Cybern Soc 40(3):278\u2013286","journal-title":"IEEE Syst Man Cybern Soc"},{"key":"1930_CR8","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/83.817598","volume":"9","author":"JR Hernandez","year":"2000","unstructured":"Hernandez JR, Amado M, Perez-Gonzalez F (2000) DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Trans Image Process 9:55\u201368","journal-title":"IEEE Trans Image Process"},{"key":"1930_CR9","first-page":"226","volume":"2","author":"JR Kim","year":"1999","unstructured":"Kim JR, Moon YS (1999) A robust wavelet-based digital watermarking using level-adaptive thresholding. Int Conf Image Process 2:226\u2013230","journal-title":"Int Conf Image Process"},{"key":"1930_CR10","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1016\/j.optcom.2010.10.047","volume":"284","author":"CC Lai","year":"2011","unstructured":"Lai CC (2011) An improved SVD-based watermarking scheme using human visual characteristics. Opt Commun 284:938\u2013944","journal-title":"Opt Commun"},{"issue":"5","key":"1930_CR11","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/79.879337","volume":"17","author":"GC Langelaar","year":"2000","unstructured":"Langelaar GC, Setyawan I, Lagendijk RL (2000) Watermarking digital image and video data. IEEE Signal Process Mag 17(5):20\u201346","journal-title":"IEEE Signal Process Mag"},{"key":"1930_CR12","doi-asserted-by":"crossref","unstructured":"Leng X, Xiao J, Wang Y (2012) A robust image zero-watermarking algorithm based on DWT and PCA. In: Proceedings of International Conference on Communications and Information Processing (ICCIP). Springer, Berlin Heidelberg, pp 484\u2013492","DOI":"10.1007\/978-3-642-31968-6_58"},{"key":"1930_CR13","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.csi.2009.06.004","volume":"32","author":"SD Lin","year":"2010","unstructured":"Lin SD, Shie SC, Guo JY (2010) Improving the robustness of DCT-based image watermarking against JPEG compression. Comp Stand Inter 32:54\u201360","journal-title":"Comp Stand Inter"},{"issue":"1","key":"1930_CR14","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.compeleceng.2008.09.004","volume":"35","author":"W Lu","year":"2008","unstructured":"Lu W, Sun W, Lu H (2008) Robust watermarking based on DWT and nonnegative matrix factorization. Comput Electr Eng 35(1):183\u2013188","journal-title":"Comput Electr Eng"},{"key":"1930_CR15","doi-asserted-by":"crossref","first-page":"1597","DOI":"10.1016\/j.dsp.2010.03.010","volume":"20","author":"JC Patra","year":"2010","unstructured":"Patra JC, Phua JE, Bornand C (2010) A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digit Signal Process 20:1597\u20131611","journal-title":"Digit Signal Process"},{"issue":"12","key":"1930_CR16","doi-asserted-by":"crossref","first-page":"14357","DOI":"10.1016\/j.eswa.2011.03.024","volume":"38","author":"RS Run","year":"2011","unstructured":"Run RS, Horng SJ, Lin WH, Kao TW, Fan P, Khan MK (2011) An efficient wavelet-tree-based watermarking method. Expert Syst Appl 38(12):14357\u201314366","journal-title":"Expert Syst Appl"},{"issue":"6","key":"1930_CR17","doi-asserted-by":"crossref","first-page":"1064","DOI":"10.1109\/5.687830","volume":"86","author":"MD Swanson","year":"1998","unstructured":"Swanson MD, Kobayashi M, Tewfik AH (1998) Multimedia data-embedding and watermarking technologies. Proc IEEE 86(6):1064\u20131087","journal-title":"Proc IEEE"},{"issue":"4","key":"1930_CR18","doi-asserted-by":"crossref","first-page":"913","DOI":"10.1016\/j.sigpro.2012.11.003","volume":"93","author":"W Xinkai","year":"2013","unstructured":"Xinkai W, Wang P, Zhang P, Xu S, Yang H (2013) A norm-space, adaptive, and blind audio watermarking algorithm by discrete wavelet transform. Signal Process 93(4):913\u2013922","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-1930-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-014-1930-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-1930-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:32:01Z","timestamp":1559359921000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-014-1930-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,25]]},"references-count":18,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["1930"],"URL":"https:\/\/doi.org\/10.1007\/s11042-014-1930-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,25]]}}}