{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:24:26Z","timestamp":1760955866966},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2018,6,9]],"date-time":"2018-06-09T00:00:00Z","timestamp":1528502400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s11042-018-6218-8","type":"journal-article","created":{"date-parts":[[2018,6,9]],"date-time":"2018-06-09T17:26:10Z","timestamp":1528565170000},"page":"31713-31735","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications"],"prefix":"10.1007","volume":"77","author":[{"given":"Pegah Nikbakht","family":"Bideh","sequence":"first","affiliation":[]},{"given":"Mojtaba","family":"Mahdavi","sequence":"additional","affiliation":[]},{"given":"Shahram Etemadi","family":"Borujeni","sequence":"additional","affiliation":[]},{"given":"Sima","family":"Arasteh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,9]]},"reference":[{"issue":"1","key":"6218_CR1","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1016\/j.ijleo.2013.06.082","volume":"125","author":"M Ali","year":"2014","unstructured":"Ali M, Ahn CW, Pant M (2014) A robust image watermarking technique using SVD and differential evolution in DCT domain. Optik-Int J Light Electron Optics 125(1):428\u2013434","journal-title":"Optik-Int J Light Electron Optics"},{"key":"6218_CR2","unstructured":"Baker K (2005) Singular value decomposition tutorial. The Ohio State University"},{"key":"6218_CR3","doi-asserted-by":"crossref","unstructured":"Calagna M, Guo H, Mancini LV, Jajodia S (2006) A robust watermarking system based on SVD compression. Proc 2006 ACM Sym Appl Comput, ACM: 1341\u20131347","DOI":"10.1145\/1141277.1141590"},{"key":"6218_CR4","doi-asserted-by":"crossref","unstructured":"Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography, Morgan Kaufmann","DOI":"10.1016\/B978-012372585-1.50015-2"},{"issue":"15","key":"6218_CR5","doi-asserted-by":"publisher","first-page":"1769","DOI":"10.1016\/j.patrec.2004.07.003","volume":"25","author":"F Huang","year":"2004","unstructured":"Huang F, Guan ZH (2004) A hybrid SVD-DCT watermarking method based on LPSNR. Pattern Recogn Lett 25(15):1769\u20131775","journal-title":"Pattern Recogn Lett"},{"issue":"4","key":"6218_CR6","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1016\/j.optcom.2010.10.047","volume":"284","author":"CC Lai","year":"2011","unstructured":"Lai CC (2011) An improved SVD-based watermarking scheme using human visual characteristics. Opt Commun 284(4):938\u2013944","journal-title":"Opt Commun"},{"key":"6218_CR7","first-page":"257","volume-title":"\"On the security of a hybrid SVD-DCT watermarking method based on LPSNR,\" advances in image and video technology","author":"HC Ling","year":"2011","unstructured":"Ling HC, Phan RC-W, Heng SH (2011) \"On the security of a hybrid SVD-DCT watermarking method based on LPSNR,\" advances in image and video technology. Springer, Berlin Heidelberg, pp 257\u2013266"},{"key":"6218_CR8","unstructured":"Loukhaoukha K, Refaey A, Zebbiche K, Nabti M (2015) On the security of robust image watermarking algorithm based on discrete wavelet transform, discrete cosine transform and singular value decomposition. Int J Appl Math Info Sci: 1159\u20131166"},{"issue":"2","key":"6218_CR9","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.aeue.2012.06.008","volume":"67","author":"NM Makbol","year":"2013","unstructured":"Makbol NM, Khoo BE (2013) Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU-Int J Electron Commun 67(2):102\u2013112","journal-title":"AEU-Int J Electron Commun"},{"issue":"5","key":"6218_CR10","doi-asserted-by":"publisher","first-page":"1037","DOI":"10.1109\/TMM.2009.2021793","volume":"11","author":"P Meerwald","year":"2009","unstructured":"Meerwald P, Koidl C, Uhl A (2009) Attack on \u201cwatermarking method based on significant difference of wavelet coefficient quantization\u201d. IEEE Trans Multimed 11(5):1037\u20131041","journal-title":"IEEE Trans Multimed"},{"key":"6218_CR11","doi-asserted-by":"crossref","unstructured":"Mehta R, Rajpal N (2013) A hybrid semi-blind gray scale image watermarking algorithm based on DWT-SVD using human visual system model. Contemp Comput (IC3), 2013 Sixth Int Conf. IEEE","DOI":"10.1109\/IC3.2013.6612183"},{"key":"6218_CR12","doi-asserted-by":"crossref","unstructured":"Mehta S, Nallusamy R, Marawar RV, Prabhakaran B (2013) A study of DWT and SVD based watermarking algorithms for patient privacy in medical images. Healthcare Info (ICHI), 2013 IEEE Int Conf. IEEE","DOI":"10.1109\/ICHI.2013.41"},{"issue":"1","key":"6218_CR13","doi-asserted-by":"publisher","first-page":"7","DOI":"10.4304\/jmm.3.1.7-15","volume":"3","author":"BC Mohan","year":"2008","unstructured":"Mohan BC, Kumar S (2008) A robust image watermarking scheme using singular value decomposition. J Multimed 3(1):7\u201315","journal-title":"J Multimed"},{"key":"6218_CR14","doi-asserted-by":"crossref","unstructured":"Nikbakht P, Mahdavi M (2015) Targeted watermark removal of a SVD-based image. IKT2015 7th Int Conf Info Knowledge Technol, IEEE","DOI":"10.1109\/IKT.2015.7288669"},{"key":"6218_CR15","doi-asserted-by":"crossref","unstructured":"Nikbakht P, Mahdavi M (2015) Targeted dewatermarking of two non-blind SVD-based image watermarking schemes. Comput Knowledge Eng (ICCKE), 2015 5th Int Conf. IEEE","DOI":"10.1109\/ICCKE.2015.7365855"},{"issue":"2","key":"6218_CR16","first-page":"120","volume":"2","author":"V Pomponiu","year":"2011","unstructured":"Pomponiu V, Cavagnino D (2011) Security analysis of SVD-based watermarking techniques. Int J Multimed Intell Sec 2(2):120\u2013145","journal-title":"Int J Multimed Intell Sec"},{"key":"6218_CR17","doi-asserted-by":"crossref","unstructured":"Rey C, Do\u00ebrr G, Csurka G, Dugelay JL (2002) Toward generic image dewatermarking. Image Process. 2002. Proc. 2002 Int Conf IEEE 3","DOI":"10.1155\/S1110865702204047"},{"key":"6218_CR18","unstructured":"Rezazadeh S, Yazdi M (2006) A nonoblivious image watermarking system based on singular value decomposition and texture segmentation. Proc World Acad Sci, Eng Technol 13"},{"key":"6218_CR19","unstructured":"Sadicoff M, Petrie MML (2004) .Digital watermark survey and classification. Sec LACCEI Int Latin Am Caribbean Conf Eng Technol"},{"key":"6218_CR20","doi-asserted-by":"crossref","unstructured":"C. Song, S. Sudirman, M. Merabti and D. Llewellyn-Jones, (2010) Analysis of digital image watermark attacks. Consum Commun Netw Conf (CCNC), 2010 7th IEEE. IEEE","DOI":"10.1109\/CCNC.2010.5421631"},{"key":"6218_CR21","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/s11771-011-0668-8","volume":"18","author":"W Song","year":"2011","unstructured":"Song W, Hou JJ, Li ZH, Huang L (2011) Chaotic system and QR factorization based robust digital image watermarking algorithm. J Cent S Univ Technol 18:116\u2013124","journal-title":"J Cent S Univ Technol"},{"issue":"16","key":"6218_CR22","doi-asserted-by":"crossref","first-page":"8455","DOI":"10.1016\/j.amc.2013.03.013","volume":"219","author":"Q Su","year":"2013","unstructured":"Su Q, Niu Y, Zou H, Liu X (2013) A blind dual color images watermarking based on singular value decomposition. Appl Math Comput 219(16):8455\u20138466","journal-title":"Appl Math Comput"},{"key":"6218_CR23","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.sigpro.2013.06.025","volume":"94","author":"Q Su","year":"2014","unstructured":"Su Q, Niu Y, Wang G, Jia S, Yue J (2014) Color image blind watermarking scheme based on QR decomposition. Signal Process 94:219\u2013235","journal-title":"Signal Process"},{"key":"6218_CR24","unstructured":"Sun S, Song W, Cong W (2009) DPCC and QR factorization-based color medical image authentication algorithm. Image Anal Signal Process, 2009. IASP 2009. Int Conf. IEEE"},{"issue":"8","key":"6218_CR25","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/35.940053","volume":"39","author":"S Voloshynovskiy","year":"2001","unstructured":"Voloshynovskiy S, Pereira S, Pun T, Eggers JJ, Su JK (2001) Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. Commun Mag, IEEE 39(8):118\u2013126","journal-title":"Commun Mag, IEEE"},{"key":"6218_CR26","unstructured":"Zhou X, Ma J, Du W (2013) SoW: a hybrid DWT-SVD based secured image watermarking. Sensor Netw Sec Technol Privacy Commun Syst (SNS & PCS), 2013 Int Conf. IEEE"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6218-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6218-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6218-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T08:33:09Z","timestamp":1604392389000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6218-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,9]]},"references-count":26,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["6218"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6218-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,9]]},"assertion":[{"value":"29 August 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 May 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}