{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:55:20Z","timestamp":1760597720535},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,9,19]],"date-time":"2016-09-19T00:00:00Z","timestamp":1474243200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s11042-016-3935-8","type":"journal-article","created":{"date-parts":[[2016,9,19]],"date-time":"2016-09-19T08:44:22Z","timestamp":1474274662000},"page":"3403-3433","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["A robust color image watermarking using local invariant significant bitplane histogram"],"prefix":"10.1007","volume":"76","author":[{"given":"Niu","family":"Pan-Pan","sequence":"first","affiliation":[]},{"given":"Wang","family":"Xiang-Yang","sequence":"additional","affiliation":[]},{"given":"Liu","family":"Yu-Nan","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Hong-Ying","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,19]]},"reference":[{"issue":"2","key":"3935_CR1","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1109\/LSP.2004.840872","volume":"12","author":"M Barni","year":"2005","unstructured":"Barni M (2005) Effectiveness of exhaustive search and template matching against watermark desynchronization. IEEE Signal Process Lett 12(2):158\u2013161","journal-title":"IEEE Signal Process Lett"},{"issue":"3","key":"3935_CR2","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.cviu.2007.09.014","volume":"110","author":"H Bay","year":"2008","unstructured":"Bay H, Ess A, Tuytelaars T, Gool LV (2008) Speeded up robust features (SURF. Comput Vis Image Underst 110(3):346\u2013259","journal-title":"Comput Vis Image Underst"},{"issue":"1","key":"3935_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2542205.2542207","volume":"10","author":"G Bhatnagar","year":"2013","unstructured":"Bhatnagar G, Wu QM, Atrey PK (2013) Secure randomized image watermarking based on singular value decomposition. ACM Trans Multimed Comput Commun Appl 10(1):1\u201315","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"issue":"3","key":"3935_CR4","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A, Condell J, Curran K (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90(3):727\u2013752","journal-title":"Signal Process"},{"issue":"3","key":"3935_CR5","doi-asserted-by":"crossref","first-page":"1134","DOI":"10.1016\/j.ijleo.2013.07.126","volume":"125","author":"CH Chen","year":"2014","unstructured":"Chen CH, Tang YL, Wang CP (2014) A robust watermarking algorithm based on salient image features. Optik-Int J Light Electron Optics 125(3):1134\u20131140","journal-title":"Optik-Int J Light Electron Optics"},{"issue":"8","key":"3935_CR6","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1016\/j.sigpro.2009.02.005","volume":"89","author":"C Deng","year":"2009","unstructured":"Deng C, Gao XB, Li XL, Tao DC (2009) A local Tchebichef moments-based robust image watermarking. Signal Process 89(8):1531\u20131539","journal-title":"Signal Process"},{"issue":"2","key":"3935_CR7","doi-asserted-by":"crossref","first-page":"221","DOI":"10.3724\/SP.J.1004.2010.00221","volume":"26","author":"C Deng","year":"2010","unstructured":"Deng C, Li J, Gao X (2010) Geometric attacks resistant image watermarking in affine covariant regions. Acta Automat Sin 26(2):221\u2013228","journal-title":"Acta Automat Sin"},{"issue":"3","key":"3935_CR8","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/s11263-011-0431-5","volume":"94","author":"S Gauglitz","year":"2011","unstructured":"Gauglitz S, H\u00f6llerer T, Turk M (2011) Evaluation of interest point detectors and feature descriptors for visual tracking. Int J Comput Vis 94(3):335\u2013360","journal-title":"Int J Comput Vis"},{"issue":"12","key":"3935_CR9","first-page":"1338","volume":"23","author":"JM Geusebroek","year":"2001","unstructured":"Geusebroek JM, Boomgaard RV, Smeulders AWM, Geerts H (2001) Color invariance. IEEE trans. On pattern analysis and machine. Intelligence 23(12):1338\u20131350","journal-title":"Intelligence"},{"issue":"15","key":"3935_CR10","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.neucom.2012.09.032","volume":"106","author":"F Ji","year":"2013","unstructured":"Ji F, Deng C, An LL, Huang DY (2013) Desynchronization attacks resilient image watermarking scheme based on global restoration and local embedding. Neurocomputing 106(15):42\u201350","journal-title":"Neurocomputing"},{"key":"3935_CR11","doi-asserted-by":"crossref","unstructured":"Kaur M (2009) Robust watermarking into the color models based on the synchronization template. Int Conf Inf Multimedia Technol (ICIMT\u201909), Jeju Island, pp 296\u2013300","DOI":"10.1109\/ICIMT.2009.81"},{"issue":"10","key":"3935_CR12","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.3724\/SP.J.1004.2012.01646","volume":"38","author":"Q Ke","year":"2012","unstructured":"Ke Q, Xie D-Q (2012) Watermarking scheme against geometrical attacks based on second generation Bandelet. Acta Automat Sin 38(10):1646\u20131653","journal-title":"Acta Automat Sin"},{"issue":"7","key":"3935_CR13","doi-asserted-by":"crossref","first-page":"1201","DOI":"10.1109\/TIFS.2013.2264462","volume":"8","author":"M Li","year":"2013","unstructured":"Li M, Michel KK, Dimitris AP (2013) Extracting spread-spectrum hidden data from digital media. IEEE Trans Inf Forensics Secur 8(7):1201\u20131209","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"3935_CR14","doi-asserted-by":"crossref","first-page":"632","DOI":"10.1109\/TIP.2014.2372473","volume":"24","author":"X Li","year":"2015","unstructured":"Li X, Sun X, Liu Q (2015a) Image integrity authentication scheme based on fixed point theory. IEEE Trans Image Process 24(2):632\u2013645","journal-title":"IEEE Trans Image Process"},{"key":"3935_CR15","doi-asserted-by":"crossref","first-page":"736","DOI":"10.1016\/j.neucom.2014.08.003","volume":"149","author":"Y Li","year":"2015","unstructured":"Li Y, Wang S, Tian Q (2015b) A survey of recent advances in visual feature detection. Neurocomputing 149:736\u2013751","journal-title":"Neurocomputing"},{"issue":"1","key":"3935_CR16","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.jss.2012.06.057","volume":"86","author":"SP Maity","year":"2013","unstructured":"Maity SP, Maity S (2013) Collusion resilient spread spectrum watermarking in M-band wavelets using GA-fuzzy hybridization. J Syst Softw 86(1):47\u201359","journal-title":"J Syst Softw"},{"issue":"4","key":"3935_CR17","doi-asserted-by":"crossref","first-page":"1694","DOI":"10.1109\/TIP.2014.2305873","volume":"23","author":"B Mathon","year":"2014","unstructured":"Mathon B, Cayre F, Bas P, Macq B (2014) Optimal transport for secure spread-spectrum watermarking of still images. IEEE Trans Image Process 23(4):1694\u20131705","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"3935_CR18","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1016\/j.amc.2013.10.028","volume":"226","author":"T Minamoto","year":"2014","unstructured":"Minamoto T, Ohura R (2014) A blind digital image watermarking method based on the dyadic wavelet transform and interval arithmetic. Appl Math Comput 226(1):306\u2013319","journal-title":"Appl Math Comput"},{"issue":"1\u20133","key":"3935_CR19","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.forsciint.2013.09.005","volume":"233","author":"ME Moghaddam","year":"2013","unstructured":"Moghaddam ME, Nemati N (2013) A robust color image watermarking technique using modified imperialist competitive algorithm. Forensic Sci Int 233(1\u20133):193\u2013200","journal-title":"Forensic Sci Int"},{"issue":"3","key":"3935_CR20","doi-asserted-by":"crossref","first-page":"851","DOI":"10.1007\/s11042-011-0772-7","volume":"59","author":"AA Mohammad","year":"2012","unstructured":"Mohammad AA (2012) A new digital image watermarking scheme based on Schur decomposition. Multimedia Tools Appl 59(3):851\u2013883","journal-title":"Multimedia Tools Appl"},{"issue":"2","key":"3935_CR21","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1049\/iet-ipr.2012.0232","volume":"7","author":"R Naskar","year":"2013","unstructured":"Naskar R, Chakraborty RS (2013) Histogram-bin-shifting-based reversible watermarking for colour images. IET Image Process 7(2):99\u2013110","journal-title":"IET Image Process"},{"key":"3935_CR22","doi-asserted-by":"crossref","unstructured":"Nian G, Tang X, Wang D (2010) Geometric distortions correction scheme based on hausdorff distance for digital watermarking image. In: 2010 second international conference on multiMedia and information technology, Kaifeng, pp 43\u201346","DOI":"10.1109\/MMIT.2010.93"},{"issue":"8","key":"3935_CR23","doi-asserted-by":"crossref","first-page":"1864","DOI":"10.1016\/j.jss.2012.02.045","volume":"85","author":"GA Papakostas","year":"2012","unstructured":"Papakostas GA, Koulouriotis DE, Tourassis VD (2012) Performance evaluation of moment-based watermarking methods: a review. J Syst Softw 85(8):1864\u20131884","journal-title":"J Syst Softw"},{"issue":"1","key":"3935_CR24","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1016\/j.eswa.2011.07.059","volume":"39","author":"R Run","year":"2012","unstructured":"Run R, Horng S, Lai J, Kao T, Chen R (2012) An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl 39(1):673\u2013689","journal-title":"Expert Syst Appl"},{"issue":"10","key":"3935_CR25","first-page":"94","volume":"269","author":"G Sasan","year":"2014","unstructured":"Sasan G, Mohammad SH, Habibollah D, Mehri O (2014) Robust watermarking against geometric attacks using partial calculation of radial moments and interval phase modulation. Inf Sci 269(10):94\u2013105","journal-title":"Inf Sci"},{"issue":"4","key":"3935_CR26","first-page":"1537","volume":"54","author":"JS Seo","year":"2006","unstructured":"Seo JS, Yoo CD (2006) Image watermarking based on invariant regions of scale-space representation. IEEE trans. On. Signal Process 54(4):1537\u20131549","journal-title":"Signal Process"},{"issue":"8","key":"3935_CR27","first-page":"1897","volume":"12","author":"PC Su","year":"2013","unstructured":"Su PC, Chang YC, Wu CY (2013) Geometrically resilient digital image watermarking by using interest point extraction and extended pilot signals. IEEE Trans Inf Forensic Secur 12(8):1897\u20131908","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"3935_CR28","unstructured":"Sun D (2009) Research on density based image processing algorithms and application. Harbin: Harbin Institute of Technology"},{"issue":"4","key":"3935_CR29","first-page":"950","volume":"51","author":"CW Tang","year":"2003","unstructured":"Tang CW, Hang HM (2003) A feature-based robust digital image watermarking scheme. IEEE trans. On. Signal Process 51(4):950\u2013958","journal-title":"Signal Process"},{"issue":"3","key":"3935_CR30","doi-asserted-by":"crossref","first-page":"735","DOI":"10.1109\/TIP.2010.2073475","volume":"20","author":"JS Tsai","year":"2011","unstructured":"Tsai JS, Huang WB, Kuo YH (2011) On the selection of optimal feature region set for robust digital image watermarking. IEEE Trans Image Process 20(3):735\u2013743","journal-title":"IEEE Trans Image Process"},{"issue":"6","key":"3935_CR31","doi-asserted-by":"crossref","first-page":"1431","DOI":"10.1016\/j.sigpro.2011.11.033","volume":"92","author":"J Tsai","year":"2012","unstructured":"Tsai J, Huang W, Kuo Y, Horng M (2012) Joint robustness and security enhancement for feature-based image watermarking using invariant feature regions. Signal Process 92(6):1431\u20131445","journal-title":"Signal Process"},{"issue":"14","key":"3935_CR32","doi-asserted-by":"crossref","first-page":"6408","DOI":"10.1016\/j.eswa.2014.04.021","volume":"41","author":"ED Tsougenis","year":"2014","unstructured":"Tsougenis ED, Papakostas GA, Koulouriotis DE, Karakasis EG (2014) Adaptive color image watermarking by the use of quaternion image moments. Expert Syst Appl 41(14):6408\u20136418","journal-title":"Expert Syst Appl"},{"issue":"3","key":"3935_CR33","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1561\/0600000017","volume":"3","author":"T Tuytelaars","year":"2008","unstructured":"Tuytelaars T, Mikolajczyk K (2008) Local invariant feature detectors: A survey. Found Trends Comput Graph Vis 3(3):177\u2013280","journal-title":"Found Trends Comput Graph Vis"},{"issue":"2","key":"3935_CR34","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1109\/TIFS.2010.2103061","volume":"6","author":"A Valizadeh","year":"2011","unstructured":"Valizadeh A, Wang ZJ (2011) Correlation-and-bit-aware spread spectrum embedding for data hiding. IEEE Trans Inf Forensic Secur 6(2):267\u2013282","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"2","key":"3935_CR35","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1016\/j.asoc.2011.10.003","volume":"12","author":"XY Wang","year":"2012","unstructured":"Wang XY, Miao EN, Yang HY (2012a) A new SVM-based image watermarking using Gaussian-Hermite moments. Appl Soft Comput 12(2):887\u2013903","journal-title":"Appl Soft Comput"},{"issue":"6","key":"3935_CR36","doi-asserted-by":"crossref","first-page":"892","DOI":"10.1016\/j.jvcir.2012.05.008","volume":"23","author":"XY Wang","year":"2012","unstructured":"Wang XY, Niu PP, Yang HY, Chen LL (2012b) Affine invariant image watermarking using intensity probability density-based Harris Laplace detector. J Vis Commun Image Represent 23(6):892\u2013907","journal-title":"J Vis Commun Image Represent"},{"issue":"2","key":"3935_CR37","first-page":"331","volume":"16","author":"S Wang","year":"2014","unstructured":"Wang S, Zheng D, Zhao J (2014) Adaptive watermarking and tree structure based image quality estimation. IEEE Trans on Multimedia 16(2):331\u2013324","journal-title":"IEEE Trans on Multimedia"},{"key":"3935_CR38","doi-asserted-by":"crossref","unstructured":"Winkler T, Rinner B (2014) Security and privacy protection in visual sensor networks: a survey. ACM Comput Surv 47(1)","DOI":"10.1145\/2545883"},{"key":"3935_CR39","doi-asserted-by":"crossref","unstructured":"Yang SL (2011) Research on digital image watermarking algorithms resistant to geometric attacks. Anhui: Hefei University of Technology","DOI":"10.3724\/SP.J.1146.2006.01701"},{"issue":"1","key":"3935_CR40","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1109\/TIP.2011.2160271","volume":"21","author":"Y Yu","year":"2012","unstructured":"Yu Y, Huang K, Chen W, Tan T (2012) A novel algorithm for view and illumination invariant image matching. IEEE Trans Image Process 21(1):229\u2013240","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"3935_CR41","doi-asserted-by":"crossref","first-page":"255","DOI":"10.4156\/jdcta.vol5.issue3.26","volume":"5","author":"ZY Zhang","year":"2011","unstructured":"Zhang ZY (2011) Digital rights management ecosystem and its usage controls: a survey. Int J Digit Content Technol Its Appl 5(3):255\u2013272","journal-title":"Int J Digit Content Technol Its Appl"},{"issue":"9","key":"3935_CR42","doi-asserted-by":"crossref","first-page":"245","DOI":"10.4156\/jdcta.vol6.issue9.31","volume":"6","author":"ZY Zhang","year":"2012","unstructured":"Zhang ZY (2012) Frontier and methodologies on digital rights management for multimedia social networks. Int J Digit Content Technol Its Appl 6(9):245\u2013249","journal-title":"Int J Digit Content Technol Its Appl"},{"issue":"8","key":"3935_CR43","doi-asserted-by":"crossref","first-page":"2189","DOI":"10.1109\/TIP.2011.2118216","volume":"20","author":"H Zhang","year":"2011","unstructured":"Zhang H, Shu H, Coatrieux G (2011) Affine Legendre moment invariants for image watermarking robust to geometric distortions. IEEE Trans Image Process 20(8):2189\u20132199","journal-title":"IEEE Trans Image Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3935-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3935-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3935-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,8]],"date-time":"2022-07-08T19:37:36Z","timestamp":1657309056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3935-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,19]]},"references-count":43,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["3935"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3935-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,19]]}}}