{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T22:28:25Z","timestamp":1767997705619,"version":"3.49.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2015,7,12]],"date-time":"2015-07-12T00:00:00Z","timestamp":1436659200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1007\/s11042-015-2786-z","type":"journal-article","created":{"date-parts":[[2015,7,11]],"date-time":"2015-07-11T02:36:14Z","timestamp":1436582174000},"page":"8695-8718","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":63,"title":["Chaotic watermark for blind forgery detection in images"],"prefix":"10.1007","volume":"75","author":[{"given":"Oussama","family":"Benrhouma","sequence":"first","affiliation":[]},{"given":"Houcemeddine","family":"Hermassi","sequence":"additional","affiliation":[]},{"given":"Ahmed A.","family":"Abd El-Latif","sequence":"additional","affiliation":[]},{"given":"Safya","family":"Belghith","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,12]]},"reference":[{"key":"2786_CR1","doi-asserted-by":"crossref","first-page":"1365","DOI":"10.1007\/s11071-012-0539-3","volume":"70","author":"J Bao","year":"2012","unstructured":"Bao J, Yang Q (2012) Period of the discrete arnold cat map and general cat map. Nonlinear Dyn 70:1365\u20131375","journal-title":"Nonlinear Dyn"},{"key":"2786_CR2","doi-asserted-by":"publisher","unstructured":"Benrhouma O, Hermassi H, Belghith S (2014) Tamper detection and self-recovery scheme by dwt watermarking. Nonlinear Dyn. doi: 10.1007\/s11071-014-1777-3","DOI":"10.1007\/s11071-014-1777-3"},{"key":"2786_CR3","unstructured":"Bittman J, Steinmetz A, Steinmetz R (1999) Content-based digital signature for motion pictures authentication and content-fragile watermarking. In: Proceeding of IEEE international conference on miltimedia computing systems, pp 209\u2013213"},{"key":"2786_CR4","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/76.905982","volume":"11","author":"SF Chang","year":"2001","unstructured":"Chang SF, Lin CY (2001) A robust image authentication method distinguishing jpeg compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol 11:153\u2013168","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"2786_CR5","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1016\/j.patrec.2005.09.006","volume":"27","author":"CC Chang","year":"2006","unstructured":"Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27:439\u2013446","journal-title":"Pattern Recogn Lett"},{"key":"2786_CR6","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.ins.2012.01.014","volume":"195","author":"F Di Martino","year":"2012","unstructured":"Di Martino F., Sessa S. (2012) Fragile watermarking tamper detection with images compressed by fuzzy transform. Inf Sci 195:62\u201390","journal-title":"Inf Sci"},{"key":"2786_CR7","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1117\/12.465330","volume":"4675","author":"J Fridrich","year":"2002","unstructured":"Fridrich J (2002) Security of fragile authentication watermaks with localization. Proc SPIE Sec Watermarking Multimedia Contents 4675:691\u2013700","journal-title":"Proc SPIE Sec Watermarking Multimedia Contents"},{"key":"2786_CR8","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1109\/ICIP.2000.900991","volume":"1","author":"M Goljan","year":"2000","unstructured":"Goljan M, Baldoza AC, Fridrich J (2000) New fragile authentication watermarks for image. Proc IEEE Int Conf Image Process 1:446\u2013449","journal-title":"Proc IEEE Int Conf Image Process"},{"key":"2786_CR9","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/j.physleta.2007.01.034","volume":"365","author":"ZH Guan","year":"2007","unstructured":"Guan ZH, Wu XY (2007) A novel digital watermark algorithm based on chaotic maps. Phys Lett A 365:403\u2013406","journal-title":"Phys Lett A"},{"key":"2786_CR10","doi-asserted-by":"crossref","first-page":"950","DOI":"10.1109\/TSP.2003.809367","volume":"51","author":"HM Hang","year":"2003","unstructured":"Hang HM, Tang CW (2003) A feature-based robust digital image watermaking shceme. IEEE Trans Signal Process 51:950\u2013958","journal-title":"IEEE Trans Signal Process"},{"key":"2786_CR11","doi-asserted-by":"crossref","first-page":"2469","DOI":"10.1007\/s11042-013-1561-2","volume":"72","author":"S-J Horng","year":"2014","unstructured":"Horng S-J, Farfoura ME, Fan P, Wang X, Li T, Guo J-M (2014) A low cost fragile watermarking scheme in h.264\/avc compressed domain. Multimedia Tools Appl 72:2469\u20132495","journal-title":"Multimedia Tools Appl"},{"key":"2786_CR12","doi-asserted-by":"crossref","first-page":"3085","DOI":"10.1007\/s11042-013-1579-5","volume":"72","author":"S-J Horng","year":"2014","unstructured":"Horng S-J, Rosiyadi D, Fan P, Wang X, Khan MK (2014) An adaptive watermarking scheme for e-government document images. Multimedia Tools Appl 72:3085\u20133103","journal-title":"Multimedia Tools Appl"},{"key":"2786_CR13","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1016\/j.jvcir.2013.07.008","volume":"24","author":"S-J Horng","year":"2013","unstructured":"Horng S-J, Rosiyadi D, Li T, Takao T, Guo M, Khan MK (2013) A blind image copyright protection scheme for e-government. J Vis Commun Image Represent 24:1099\u20131105","journal-title":"J Vis Commun Image Represent"},{"key":"2786_CR14","doi-asserted-by":"crossref","first-page":"1737","DOI":"10.1016\/j.optcom.2009.12.073","volume":"283","author":"C-S Hsu","year":"2010","unstructured":"Hsu C-S, Tu S-F (2010) Probability-based tampering detection scheme for digital images. Opt Commun 283:1737\u20131743","journal-title":"Opt Commun"},{"key":"2786_CR15","doi-asserted-by":"publisher","unstructured":"Huo Y, He H, Chen F (2013) A semi-fragile image watermarking algorithm with two-stage detection. Multimed Tools Appl. doi: 10.1007\/s11042-012-1317-4","DOI":"10.1007\/s11042-012-1317-4"},{"key":"2786_CR16","first-page":"121","volume":"2","author":"MS Kankanhalli","year":"2003","unstructured":"Kankanhalli MS, Guan X, Huang ZY, Wu YH, Chang EC (2003) Robust image authentication using content based compression. ACM Multimedia Syst J 2:121\u2013130","journal-title":"ACM Multimedia Syst J"},{"key":"2786_CR17","doi-asserted-by":"crossref","first-page":"732","DOI":"10.1109\/TCSVT.2003.815947","volume":"13","author":"DE Koutsonanos","year":"2003","unstructured":"Koutsonanos DE, Strintzis MG, Simitopoulos D (2003) Robust image watermarking based on generalized radon transformations. IEEE Trans Circuits Syst Video Technol 13:732\u2013745","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"2786_CR18","doi-asserted-by":"crossref","first-page":"3497","DOI":"10.1016\/j.patcog.2008.05.003","volume":"41","author":"T-Y Lee","year":"2008","unstructured":"Lee T-Y, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recog 41:3497\u20133506","journal-title":"Pattern Recog"},{"key":"2786_CR19","volume-title":"Sari: Self-authentication-and-recovery image watermarking system","author":"C-Y Lin","year":"2001","unstructured":"Lin C-Y, Chang S-F (2001) Sari: Self-authentication-and-recovery image watermarking system. ACM Multimedia, Ottawa"},{"key":"2786_CR20","unstructured":"Lin CY, Chang SF (1998) A robust image authentication method surving jpeg lossy compression. In: Proceeding of SPIE international conference on storage and retrieval of image\/video database, vol 3312, pp 296\u2013307"},{"key":"2786_CR21","doi-asserted-by":"crossref","first-page":"2519","DOI":"10.1016\/j.patcog.2005.02.007","volume":"38","author":"PL Lin","year":"2005","unstructured":"Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38:2519\u20132529","journal-title":"Pattern Recogn"},{"key":"2786_CR22","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TMM.2008.922795","volume":"10","author":"W-H Lin","year":"2008","unstructured":"Lin W-H, Horng S-J, Kao T-W, Fan P, Lee C-L, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimedia 10:746\u2013757","journal-title":"IEEE Trans Multimedia"},{"key":"2786_CR23","doi-asserted-by":"crossref","first-page":"9869","DOI":"10.1016\/j.eswa.2009.02.036","volume":"36","author":"W-H Lin","year":"2009","unstructured":"Lin W-H, Wang Y-R, Horng S-J (2009) A wavelet-tree-based watermarking method using distance vector of binary cluster. Expert Syst Appl 36:9869\u20139878","journal-title":"Expert Syst Appl"},{"key":"2786_CR24","doi-asserted-by":"crossref","first-page":"11509","DOI":"10.1016\/j.eswa.2009.03.060","volume":"36","author":"W-H Lin","year":"2009","unstructured":"Lin W-H, Wang Y-R, Horng S-J, Kao T-W, Pan Y (2009) A blind watermarking method using maximum wavelet coefficient quantization. Expert Syst Appl 36:11509\u201311516","journal-title":"Expert Syst Appl"},{"key":"2786_CR25","doi-asserted-by":"crossref","first-page":"11888","DOI":"10.1016\/j.eswa.2009.04.026","volume":"36","author":"W-H Lin","year":"2009","unstructured":"Lin W-H, Horng S-J, Kao T-W, Chen R-J, Chen Y-H, Lee C-L, Terano T (2009) Image copyright protection with forward error correction. Expert Syst Appl 36:11888\u201311894","journal-title":"Expert Syst Appl"},{"key":"2786_CR26","doi-asserted-by":"crossref","unstructured":"Lu CS, Liao HYM, Sze CJ (2000) Structural digital signature for image authentication : an incidental distortion resistant scheme. In: Proceeding of the miltimedia security workshop 8th ACM international conference on multimedia, pp 115\u2013128","DOI":"10.1145\/357744.357893"},{"key":"2786_CR27","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1016\/j.patrec.2005.09.006","volume":"27","author":"TC Lu","year":"2006","unstructured":"Lu TC, Chang CC, Hu YS (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27:439\u2013446","journal-title":"Pattern Recogn Lett"},{"key":"2786_CR28","doi-asserted-by":"crossref","first-page":"886","DOI":"10.1016\/j.amc.2006.02.012","volume":"181","author":"H Lu","year":"2006","unstructured":"Lu H, Chung FL, Lu W (2006) Robust digitalimage watermarking based on sub-sampling. Appl Math Comput 181:886\u2013893","journal-title":"Appl Math Comput"},{"key":"2786_CR29","doi-asserted-by":"publisher","unstructured":"Luo T, Jiang G, Wang X, Yu M, Shao F, Peng Z (2013) Stereo image watermarking scheme for authentication with self-recovery capability using inter-view reference sharing. Multimed Tools Appl. doi: 10.1007\/s11042-013-1435-7","DOI":"10.1007\/s11042-013-1435-7"},{"key":"2786_CR30","doi-asserted-by":"crossref","unstructured":"Mannai O, Ben Jemaa Z, Belghith S (2014) Correlation propernes of sequences generated by a first order scalar time-dely chaotic system. WSCAR","DOI":"10.1109\/WSCAR.2014.6916822"},{"key":"2786_CR31","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1117\/12.384996","volume":"3971","author":"N Memon","year":"2000","unstructured":"Memon N, Wong P (2000) Secret and public key authentication watermarking that resist vector quantization attack. Proc SPIE Sec Watermarking Multimedia Contents 3971:417\u2013427","journal-title":"Proc SPIE Sec Watermarking Multimedia Contents"},{"key":"2786_CR32","first-page":"680","volume":"2","author":"F Mintzer","year":"1997","unstructured":"Mintzer F, Yeung M (1997) An invisible watermarking technique for image verification. Proc IEEE Int Conf Image Process 2:680\u2013683","journal-title":"Proc IEEE Int Conf Image Process"},{"key":"2786_CR33","doi-asserted-by":"crossref","first-page":"2806","DOI":"10.1016\/j.optcom.2009.04.034","volume":"282","author":"S Ozturk","year":"2009","unstructured":"Ozturk S, Aslantas V, Ozer S (2009) Improving the performance of dct-based fragile watermarking using intelligent optimization algorithms. Opt Commun 282:2806\u20132817","journal-title":"Opt Commun"},{"key":"2786_CR34","doi-asserted-by":"publisher","unstructured":"Poonkuntran S, Rajesh RS (2012) Chaotic model based semi fragile watermarking using integer transforms for digital fundus image authentication. Multimed Tools Appl. doi: 10.1007\/s11042-012-1227-5","DOI":"10.1007\/s11042-012-1227-5"},{"key":"2786_CR35","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1007\/s11042-009-0433-2","volume":"52","author":"B Raman","year":"2011","unstructured":"Raman B, Bhatnagar G (2011) A new robust reference logo watermarking scheme. Multimedia Tools Appl 52:621\u2013640","journal-title":"Multimedia Tools Appl"},{"key":"2786_CR36","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1016\/j.aeue.2011.01.016","volume":"65","author":"B Raman","year":"2011","unstructured":"Raman B, Rawat S (2011) A chaotic system based fragile watermarking scheme for image tamper detection. Int J Electron Commun 65:840\u2013847","journal-title":"Int J Electron Commun"},{"key":"2786_CR37","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MMUL.2011.41","volume":"19","author":"D Rosiyadi","year":"2012","unstructured":"Rosiyadi D, Horng S-J, Fan P, Wang X, Khan MK, Pan Y (2012) Copyright protection for e-government document images. IEEE MultiMedia 19:62\u201373","journal-title":"IEEE MultiMedia"},{"key":"2786_CR38","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1109\/TIP.2002.1014990","volume":"11","author":"G Sharmar","year":"2002","unstructured":"Sharmar G, Tekalp AM, Celik MU (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11:585\u2013594","journal-title":"IEEE Trans Image Process"},{"key":"2786_CR39","first-page":"2117","volume":"183","author":"RK Ward","year":"2003","unstructured":"Ward RK, Pitas I, Paquet AH (2003) Wavelet packets-based digital watermaking for image verification and authentication. Signal Process 183:2117\u20132132","journal-title":"Signal Process"},{"key":"2786_CR40","doi-asserted-by":"crossref","first-page":"540","DOI":"10.1016\/j.aeue.2012.12.001","volume":"67","author":"X Wang","year":"2013","unstructured":"Wang X, Teng L, Wang X (2013) Cryptanalysis and improvement of chaotic system based fragile watermarking scheme. Int J Electron Commun 67:540\u2013547","journal-title":"Int J Electron Commun"},{"key":"2786_CR41","doi-asserted-by":"crossref","first-page":"2081","DOI":"10.1016\/j.eswa.2010.07.147","volume":"38","author":"YP Yang","year":"2011","unstructured":"Yang YP, Lu MY, Niu PP, Wang XY (2011) A novel color image watermarking scheme in nonsampled contourlet-domain. Expert Syst Appl 38:2081\u20132098","journal-title":"Expert Syst Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2786-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-015-2786-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2786-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,28]],"date-time":"2019-08-28T04:39:18Z","timestamp":1566967158000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-015-2786-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,12]]},"references-count":41,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2016,7]]}},"alternative-id":["2786"],"URL":"https:\/\/doi.org\/10.1007\/s11042-015-2786-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,12]]}}}