{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:32:08Z","timestamp":1761676328169},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"21","license":[{"start":{"date-parts":[[2015,8,11]],"date-time":"2015-08-11T00:00:00Z","timestamp":1439251200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1007\/s11042-015-2831-y","type":"journal-article","created":{"date-parts":[[2015,8,10]],"date-time":"2015-08-10T01:37:48Z","timestamp":1439170668000},"page":"13451-13479","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Structure compliant local warping of images with applications to watermarking attack"],"prefix":"10.1007","volume":"75","author":[{"given":"Bin","family":"Yan","sequence":"first","affiliation":[]},{"given":"Xiao-Feng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hong-Mei","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,11]]},"reference":[{"key":"2831_CR1","doi-asserted-by":"crossref","first-page":"1291","DOI":"10.1109\/ICME.2000.871003","volume":"3","author":"M Alghoniemy","year":"2000","unstructured":"Alghoniemy M, Tewfik AH (2000) Geometric distortion correction through image normalization. IEEE International Conference on Multimedia and Expo (III) 3:1291\u20131294","journal-title":"IEEE International Conference on Multimedia and Expo (III)"},{"issue":"3","key":"2831_CR2","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G (2011) A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur 6(3):1099\u20131110","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2831_CR3","doi-asserted-by":"crossref","first-page":"4006","DOI":"10.1109\/TSP.2005.855412","volume":"53","author":"F Balado","year":"2005","unstructured":"Balado F, Whelan KM, Silvestre GCM, Hurley NJ (2005) Joint iterative decoding and estimation for side-informed data hiding. IEEE Trans Signal Process 53:4006\u20134019","journal-title":"IEEE Trans Signal Process"},{"key":"2831_CR4","doi-asserted-by":"crossref","unstructured":"Barni J, Bartolini F (2004) Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications. Marcel Dekker Inc","DOI":"10.1201\/9780203913512"},{"issue":"9","key":"2831_CR5","doi-asserted-by":"crossref","first-page":"1014","DOI":"10.1109\/TIP.2002.801587","volume":"11","author":"P Bas","year":"2002","unstructured":"Bas P, Chassery JM, Macq BM (2002) Geometrically invariant watermarking using feature points. IEEE Trans Image Process 11(9):1014\u20131028","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"2831_CR6","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.imavis.2005.09.010","volume":"24","author":"T Brox","year":"2006","unstructured":"Brox T, Weickert J, Burgeth B, Mr\u00e1zek P (2006) Nonlinear structure tensors. Image Vision Comput 24(1):41\u201355","journal-title":"Image Vision Comput"},{"key":"2831_CR7","doi-asserted-by":"crossref","unstructured":"Caldelli R, Amerini I, Ballan L, Serra G, Barni M, Costanzo A (2012) On the effectiveness of local warping against SIFT-based copy-move detection. In: Proceedings of int\u2019l symposium on communications, control and signal processing (ISCCSP). Roma, Italy","DOI":"10.1109\/ISCCSP.2012.6217846"},{"key":"2831_CR8","doi-asserted-by":"crossref","unstructured":"Caldelli R, Rosa AD, Becarelli R, Barni M (2005) Coping with local geometric attacks by means of optic-flow-based resynchronization for robust watermarking. In: Delp EJ, Wong PW (eds) Security, steganography, and watermarking of multimedia contents, Proceedings of SPIE, vol. 5681, pp 164\u2013174. SPIE","DOI":"10.1117\/12.589106"},{"issue":"10","key":"2831_CR9","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1109\/LSP.2004.835475","volume":"11","author":"M Celik","year":"2004","unstructured":"Celik M, Sharma G (2004) Tekalp, A.: Collusion-resilient fingerprinting by random pre-warping. IEEE Signal Process Lett 11(10):831\u2013835","journal-title":"IEEE Signal Process Lett"},{"key":"2831_CR10","doi-asserted-by":"crossref","unstructured":"Cover TM, Thomas JA (1991) Elements of Information Theory. Wiley-Interscience","DOI":"10.1002\/0471200611"},{"key":"2831_CR11","volume-title":"Digital Watermarking and Steganography","author":"I Cox","year":"2007","unstructured":"Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco","edition":"2nd edn"},{"key":"2831_CR12","unstructured":"D\u2019Angelo A (2009) Characterization and quality evaluation of geometric distortions in images with application to digital watermarking. Ph.D. thesis, University of Siena, Siena, Italy"},{"issue":"1","key":"2831_CR13","first-page":"1:1","volume":"2008","author":"A D\u2019Angelo","year":"2008","unstructured":"D\u2019Angelo A, Barni M, Merhav N (2008) Stochastic image warping for improved watermark desynchronization. EURASIP J Inf Secur 2008(1):1:1\u20131:14","journal-title":"EURASIP J Inf Secur"},{"issue":"4","key":"2831_CR14","doi-asserted-by":"crossref","first-page":"867","DOI":"10.1109\/TIP.2009.2035869","volume":"19","author":"A D\u2019Angelo","year":"2010","unstructured":"D\u2019Angelo A, Li ZP, Barni M (2010) A full-reference quality metric for geometrically distorted images. IEEE Trans Image Process 19(4):867\u2013881","journal-title":"IEEE Trans Image Process"},{"issue":"10","key":"2831_CR15","doi-asserted-by":"crossref","first-page":"1358","DOI":"10.1109\/TIP.2004.834659","volume":"13","author":"SC Dass","year":"2004","unstructured":"Dass SC (2004) Markov random field models for directional field and singularity extraction in fingerprint images. IEEE Trans Image Process 13(10):1358\u20131367","journal-title":"IEEE Trans Image Process"},{"key":"2831_CR16","unstructured":"Deguillaume F, Voloshynovskiy S, Pun T (2001) Multibit digital watermarking robust against local nonlinear geometrical distortions. In: ICIP (3), pp 999\u20131002"},{"key":"2831_CR17","doi-asserted-by":"crossref","unstructured":"Deguillaume F, Voloshynovskiy SV, Pun T (2002) Method for the estimation and recovering from general affine transforms in digital watermarking applications","DOI":"10.1117\/12.465289"},{"key":"2831_CR18","doi-asserted-by":"crossref","first-page":"2140","DOI":"10.1109\/TIP.2005.857263","volume":"14","author":"P Dong","year":"2005","unstructured":"Dong P, Brankov JG, Galatsanos NP, Yang Y, Davoine F (2005) Digital watermarking robust to geometric distortions. IEEE Trans Image Process 14:2140\u20132150","journal-title":"IEEE Trans Image Process"},{"issue":"9","key":"2831_CR19","doi-asserted-by":"crossref","first-page":"2831","DOI":"10.1109\/TIP.2006.877311","volume":"15","author":"J Dugelay","year":"2006","unstructured":"Dugelay J, Roche S, Rey C, Doerr G (2006) Still-image watermarking robust to local geometric distortions. IEEE Transactions on Image Processing 15(9):2831\u20132842","journal-title":"IEEE Transactions on Image Processing"},{"key":"2831_CR20","unstructured":"Feng X, Milanfar P (2002) Multiscale principal components analysis for image local orientation estimation. In: Proceedings of the 36th Asilomar conference on signals, systems and computers, pp 478\u2013482"},{"issue":"3","key":"2831_CR21","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1109\/TMI.2005.862743","volume":"25","author":"V Grau","year":"2006","unstructured":"Grau V, Downs JC, Burgoyne C (2006) Segmentation of trabeculated structures using an anisotropic markov random field: application to the study of the optic nerve head in glaucoma. IEEE Trans Med Imaging 25(3):245\u2013255","journal-title":"IEEE Trans Med Imaging"},{"key":"2831_CR22","volume-title":"Digital Image Processing 6th Edition","author":"B J\u00e4hne","year":"2005","unstructured":"J\u00e4hne B (2005) Digital Image Processing 6th Edition. Springer, Berlin"},{"issue":"1","key":"2831_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TIFS.2009.2039604","volume":"5","author":"X Kang","year":"2010","unstructured":"Kang X, Huang J, Zeng W (2010) Efficient general print-scanning resilient data hiding based on uniform log-polar mapping. IEEE Trans Inf Forensics Secur 5(1):1\u201312","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2831_CR24","doi-asserted-by":"crossref","unstructured":"Kato Z, Berthod M, Zerubia J (1993) Parallel image classification using multiscale markov random fields. In: Proceedings of the 1993 IEEE international conference on Acoustics, speech, and signal processing: image and multidimensional signal processing - Volume V, ICASSP\u201993, pp 137\u2013140, IEEE Computer Society, Washington, DC, USA","DOI":"10.1109\/ICASSP.1993.319766"},{"key":"2831_CR25","unstructured":"Kutter M (1998) Watermarking resisting to translation, rotation, and scaling. In: Storage and retrieval for image and video databases, pp 423\u2013431"},{"issue":"7","key":"2831_CR26","doi-asserted-by":"crossref","first-page":"1955","DOI":"10.1111\/j.1467-8659.2009.01574.x","volume":"28","author":"JE Kyprianidis","year":"2009","unstructured":"Kyprianidis JE, Kang H, D\u00f6llner J (2009) Image and video abstraction by anisotropic Kuwahara filtering. Comput Graph Forum 28(7):1955\u20131963","journal-title":"Comput Graph Forum"},{"key":"2831_CR27","volume-title":"Markov random field modeling in image analysis","author":"SZ Li","year":"2001","unstructured":"Li SZ (2001) Markov random field modeling in image analysis. Springer, New York. Inc., Secaucus"},{"issue":"3","key":"2831_CR28","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MMUL.2005.46","volume":"12","author":"V Licks","year":"2005","unstructured":"Licks V, Jordan R (2005) Geometric attacks on image watermarking systems. IEEE Multimedia 12(3):68\u201378","journal-title":"IEEE Multimedia"},{"key":"2831_CR29","first-page":"91","volume":"20","author":"D Lowe","year":"2003","unstructured":"Lowe D (2003) Distinctive image features from scale-invariant keypoints. Int J Comput Vision 20:91\u2013110","journal-title":"Int J Comput Vision"},{"issue":"4","key":"2831_CR30","doi-asserted-by":"crossref","first-page":"668","DOI":"10.1109\/TMM.2006.876300","volume":"8","author":"CS Lu","year":"2006","unstructured":"Lu CS, Sun SW, Hsu CY, Chang PC (2006) Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection. IEEE Trans Multimedia 8(4):668\u2013685","journal-title":"IEEE Trans Multimedia"},{"key":"2831_CR31","volume-title":"Digital Communication Receivers: Synchronization, Channel Estimation, and Signal Processing","author":"H Meyr","year":"1997","unstructured":"Meyr H, Moeneclaey M, Fechtel S (1997) Digital Communication Receivers: Synchronization, Channel Estimation, and Signal Processing. Wiley, New York"},{"key":"2831_CR32","doi-asserted-by":"crossref","unstructured":"Petitcolas FAP, Anderson RJ, Kuhn MG (1998) Attacks on copyright marking systems. In: Proceedings of the second international workshop on information hiding. Springer, London, pp 218\u2013238","DOI":"10.1007\/3-540-49380-8_16"},{"key":"2831_CR33","doi-asserted-by":"crossref","unstructured":"Roth S, Black M (2007) Steerable random fields. In: IEEE 11th international conference on computer vision, ICCV 2007, pp 1\u20138","DOI":"10.1109\/ICCV.2007.4408981"},{"key":"2831_CR34","doi-asserted-by":"crossref","unstructured":"Ruanaidh JJK\u00d3, Pun T (1997) Rotation, scale and translation invariant digital image watermarking. In: IEEE international Conference on image processing ICIP1997, pp 536\u2013539","DOI":"10.1109\/ICIP.1997.647968"},{"issue":"2","key":"2831_CR35","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1109\/TIP.2006.888330","volume":"16","author":"H Takeda","year":"2007","unstructured":"Takeda H, Farsiu S, Milanfar P (2007) Kernel regression for image processing and reconstruction. IEEE Trans Image Process 16(2):349\u2013366","journal-title":"IEEE Trans Image Process"},{"key":"2831_CR36","unstructured":"V\u00e1zquez-Pad\u00edn D, P\u00e9rez-Gonz\u00e1lez F (2011) Exposing original and duplicated regions using sift features and resampling traces. In: Shi YQ, Kim HJ, Prez-Gonzlez F (eds) IWDW. Lecture Notes in Computer Science, vol 7128. Springer, pp 306\u2013320"},{"issue":"3\u20134","key":"2831_CR37","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/S0262-8856(98)00102-4","volume":"17","author":"J Weickert","year":"1999","unstructured":"Weickert J (1999) Coherence-enhancing diffusion of colour images. Image Vision Comput 17(3\u20134):201\u2013212","journal-title":"Image Vision Comput"},{"key":"2831_CR38","doi-asserted-by":"crossref","unstructured":"Willsky AS (2002) Multiresolution markov models for signal and image processing. In: Proceedings of the IEEE, pp 1396\u20131458. IEEE","DOI":"10.1109\/JPROC.2002.800717"},{"key":"2831_CR39","unstructured":"Wolberg G (1990) Digital image warping. IEEE"},{"key":"2831_CR40","doi-asserted-by":"crossref","unstructured":"Yan B, Saleh AD (2010) Structure enhancing bilateral filtering of images. In: Proceeding of the international conference on pervasive computing, signal porcessing and applications(PCSPA), pp 614\u2013617","DOI":"10.1109\/PCSPA.2010.154"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2831-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-015-2831-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2831-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-015-2831-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T01:40:05Z","timestamp":1567042805000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-015-2831-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,11]]},"references-count":40,"journal-issue":{"issue":"21","published-print":{"date-parts":[[2016,11]]}},"alternative-id":["2831"],"URL":"https:\/\/doi.org\/10.1007\/s11042-015-2831-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,11]]}}}