{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:42:32Z","timestamp":1759963352698},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2018,4,12]],"date-time":"2018-04-12T00:00:00Z","timestamp":1523491200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s11042-018-5838-3","type":"journal-article","created":{"date-parts":[[2018,4,11]],"date-time":"2018-04-11T19:29:16Z","timestamp":1523474956000},"page":"26083-26105","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Robust watermarking in DWT domain using SVD and opposition and dimensional based modified firefly algorithm"],"prefix":"10.1007","volume":"77","author":[{"given":"Elham","family":"Moeinaddini","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fatemeh","family":"Afsari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,4,12]]},"reference":[{"key":"5838_CR1","unstructured":"(2014) http:\/\/sipi.usc.edu\/database\/database.php"},{"key":"5838_CR2","doi-asserted-by":"crossref","unstructured":"Ali M, Ahn CW, Pant M, Siarry P (2015) An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony. Inf Sci 301:44\u201360","DOI":"10.1016\/j.ins.2014.12.042"},{"key":"5838_CR3","doi-asserted-by":"crossref","unstructured":"Das C, Panigrahi S, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU-Int J Electron C 68(3):244\u2013253","DOI":"10.1016\/j.aeue.2013.08.018"},{"key":"5838_CR4","doi-asserted-by":"crossref","unstructured":"Dong H, He M,Qiu M (2015) Optimized Gray-Scale Image Watermarking Algorithm Based on DWT-DCT-SVD and Chaotic Firefly Algorithm. In: International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), p 310\u2013313","DOI":"10.1109\/CyberC.2015.15"},{"key":"5838_CR5","doi-asserted-by":"crossref","unstructured":"Elshazly EH, Faragallah OS, Abbas AM, Ashour MA, El-Rabaie ESM, Kazemian H, ..., Elsayed HS (2015) Robust and secure fractional wavelet image watermarking. Signal, Image and Video Processing 9(1):89\u201398","DOI":"10.1007\/s11760-014-0684-x"},{"key":"5838_CR6","doi-asserted-by":"crossref","unstructured":"Fan MQ, Wang HX, Li SK (2008) Restudy on SVD-based watermarking scheme. Appl Math Comput 203(2):926\u2013930","DOI":"10.1016\/j.amc.2008.05.003"},{"key":"5838_CR7","doi-asserted-by":"crossref","unstructured":"Horng M-H, Jiang T-W (2010) Multilevel image thresholding selection based on the firefly algorithm. In: Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing (UIC\/ATC), 2010 7th International Conference on, p 58\u201363","DOI":"10.1109\/UIC-ATC.2010.47"},{"key":"5838_CR8","unstructured":"Ishtiaq M, Sikandar B, Jaffar MA, Khan A (2010) Adaptive watermark strength selection using particle swarm optimization. ICIC Express Letters 4(5):1\u20136"},{"key":"5838_CR9","doi-asserted-by":"crossref","unstructured":"Kazemivash B, Moghaddam ME (2017) A robust digital image watermarking technique using lifting wavelet transform and firefly algorithm. Multimed Tools Appl 76(20):20499\u201320524","DOI":"10.1007\/s11042-016-3962-5"},{"key":"5838_CR10","unstructured":"Kazemivash B, Moghaddam ME (2017) A predictive model-based image watermarking scheme using Regression Tree and Firefly algorithm. Springer, Berlin, Heidelberg, pp 1\u201316"},{"key":"5838_CR11","doi-asserted-by":"crossref","unstructured":"Lai CC (2011) An improved SVD-based watermarking scheme using human visual characteristics. Opt Commun 284(4):938\u2013944","DOI":"10.1016\/j.optcom.2010.10.047"},{"key":"5838_CR12","doi-asserted-by":"crossref","unstructured":"Lai CC (2011) A digital watermarking scheme based on singular value decomposition and tiny genetic algorithm. Digital Signal Processing 21(4):522\u2013527","DOI":"10.1016\/j.dsp.2011.01.017"},{"key":"5838_CR13","doi-asserted-by":"crossref","unstructured":"Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060\u20133063","DOI":"10.1109\/TIM.2010.2066770"},{"key":"5838_CR14","unstructured":"Lewis J (1995) Fast normalized cross-correlation. In: Vision interface, p 120\u2013123"},{"key":"5838_CR15","doi-asserted-by":"crossref","unstructured":"Li Q, Yuan C, Zhong YZ (2007) Adaptive DWT-SVD Domain Image Watermarking Using Human Visual Model. In: The 9th International Conference on Advanced Communication Technology, p 1947\u20131951","DOI":"10.1109\/ICACT.2007.358752"},{"key":"5838_CR16","doi-asserted-by":"crossref","unstructured":"Lin TC, Lin CM (2009) Wavelet-based copyright-protection scheme for digital images based on local features. Information Sciences 179(19):3349\u20133358","DOI":"10.1016\/j.ins.2009.05.022"},{"key":"5838_CR17","unstructured":"Loukhaoukha K, Chouinard JY, Taieb MH (2011) Optimal image watermarking algorithm based on LWT-SVD via multi-objective ant colony optimization. J Inf Hiding Multimed Signal Process 2(4):303\u2013319"},{"key":"5838_CR18","doi-asserted-by":"crossref","unstructured":"Maity SP, Maity S (2009) Multistage spread spectrum watermark detection technique using fuzzy logic. IEEE signal processing letters 16(4):245\u2013248","DOI":"10.1109\/LSP.2009.2014097"},{"key":"5838_CR19","doi-asserted-by":"crossref","unstructured":"O'Ruanaidh JJ, Pun T (1997) Rotation, scale and translation invariant digital image watermarking. In Proceedings International Conference on Image Proceesing 1:536\u2013539","DOI":"10.1109\/ICIP.1997.647968"},{"key":"5838_CR20","doi-asserted-by":"crossref","unstructured":"O'Ruanaidh J, Pun T (1997) Rotation, translation and scale invariant digital image watermarking. In: International Conference on Image Processing. Santa Barbara, p 536\u2013536","DOI":"10.1109\/ICIP.1997.647968"},{"key":"5838_CR21","doi-asserted-by":"crossref","unstructured":"Pal NR, Pal SK (1989) Object-background segmentation using new definitions of entropy. IEE Proceedings E (Computers and Digital Techniques) 136(4):284\u2013295","DOI":"10.1049\/ip-e.1989.0039"},{"key":"5838_CR22","unstructured":"Ramkumar M, Akansu N, Alatan A (1999) A Robust Data Hiding Scheme forImages using DFT. In: International Conference on ImageProcessing. Japan, p 211\u2013215"},{"key":"5838_CR23","doi-asserted-by":"crossref","unstructured":"Rivest RL (1992) The MD5 message-digest algorithm. Request for comments (RFC) 1321. Available: https:\/\/www.ietf.org\/rfc\/rfc1321.txt","DOI":"10.17487\/rfc1321"},{"key":"5838_CR24","doi-asserted-by":"crossref","unstructured":"Santhi V, Thangavelu A (2009) DWT-SVD combined full band robust watermarking technique for color images in YUV color space. Int J Comput Theory Eng 1(4):424","DOI":"10.7763\/IJCTE.2009.V1.68"},{"key":"5838_CR25","doi-asserted-by":"crossref","unstructured":"Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379\u2013423","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"5838_CR26","doi-asserted-by":"crossref","unstructured":"Verma OP, Aggarwal D, Patodi T (2016) Opposition and dimensional based modified firefly algorithm. Expert Syst Appl 44:168\u20131","DOI":"10.1016\/j.eswa.2015.08.054"},{"key":"5838_CR27","doi-asserted-by":"crossref","unstructured":"Wang YR, Lin WH, Yang L (2011) An intelligent watermarking method based on particle swarm optimization. Expert Syst Appl 38(7):8024\u20138029","DOI":"10.1016\/j.eswa.2010.12.129"},{"key":"5838_CR28","doi-asserted-by":"crossref","unstructured":"Wu HT, Huang J (2012) Reversible image watermarking on prediction errors by efficient histogram modification. Signal Process 92(12):3000\u20133009","DOI":"10.1016\/j.sigpro.2012.05.034"},{"key":"5838_CR29","unstructured":"Yang X-S (2008) Nature-inspired metaheuristic algorithms. Luniver Press, Beckington, pp 242\u2013246"},{"key":"5838_CR30","doi-asserted-by":"crossref","unstructured":"Yang XS (2010) Firefly algorithm, stochastic test functions and design optimisation. Int J Bio Inspir Com 2(2):78\u201384","DOI":"10.1504\/IJBIC.2010.032124"},{"key":"5838_CR31","unstructured":"Zhang Y, Wu L (2012) A novel method for rigid image registration based on firefly algorithm. International Journal of Research and Reviews in Soft and Intelligent Computing (IJRRSIC) 2(2):141\u2013146"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-5838-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5838-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-5838-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,15]],"date-time":"2019-10-15T01:20:28Z","timestamp":1571102428000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-5838-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,12]]},"references-count":31,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["5838"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-5838-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,12]]},"assertion":[{"value":"24 June 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}