{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T23:52:42Z","timestamp":1773964362067,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,8,17]],"date-time":"2018-08-17T00:00:00Z","timestamp":1534464000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11042-018-6505-4","type":"journal-article","created":{"date-parts":[[2018,8,17]],"date-time":"2018-08-17T20:39:11Z","timestamp":1534538351000},"page":"9169-9191","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A robust DCT-2DLDA watermark for color images"],"prefix":"10.1007","volume":"78","author":[{"given":"Te-Jen","family":"Chang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"I-Hui","family":"Pan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ping-Sheng","family":"Huang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chen-Hao","family":"Hu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,8,17]]},"reference":[{"issue":"3","key":"6505_CR1","first-page":"196","volume":"1","author":"W Abu-Marie","year":"2010","unstructured":"Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate Array on RGB Indicator. International Journal of Signal and Image Processing (IJSIP) 1(3):196\u2013204","journal-title":"International Journal of Signal and Image Processing (IJSIP)"},{"issue":"17","key":"6505_CR2","doi-asserted-by":"publisher","first-page":"6897","DOI":"10.1007\/s11042-014-1934-1","volume":"74","author":"H Agarwal","year":"2015","unstructured":"Agarwal H, Raman B, Venkat I (2015) Blind reliable invisible watermarking method in wavelet domain for face image watermark. Multimedia Tools and Applications 74(17):6897\u20136935","journal-title":"Multimedia Tools and Applications"},{"issue":"23","key":"6505_CR3","doi-asserted-by":"publisher","first-page":"10883","DOI":"10.1007\/s11042-014-2212-y","volume":"74","author":"H Agarwal","year":"2015","unstructured":"Agarwal H, Atrey PK, Raman B (2015) Image watermarking in real oriented wavelet transform domain. Multimedia Tools and Applications 74(23):10883\u201310921","journal-title":"Multimedia Tools and Applications"},{"key":"6505_CR4","doi-asserted-by":"publisher","first-page":"14572","DOI":"10.1109\/ACCESS.2017.2731118","volume":"5","author":"FM Algashaam","year":"2017","unstructured":"Algashaam FM, Nguyen K, Alkanhal M, Chandran V, Boles W, Banks J (2017) Multispectral periocular classification with multimodal compact multi-linear pooling. IEEE Access 5:14572\u201314578","journal-title":"IEEE Access"},{"key":"6505_CR5","doi-asserted-by":"crossref","unstructured":"Al-Otaibi NA and Gutub AA (2014) 2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers. In: The 3rd International Conference on Advancements in Information Technology (ICAIT 2014) pp. 73\u201379","DOI":"10.12720\/lnit.2.2.151-157"},{"issue":"6","key":"6505_CR6","first-page":"2145","volume":"17","author":"TJ Chang","year":"2014","unstructured":"Chang TJ, Huang PS, Pan IH (2014) Watermarking with two-dimensional principal component analysis for quick response application. Information 17(6):2145\u20132154","journal-title":"Information"},{"issue":"1","key":"6505_CR7","first-page":"56","volume":"2","author":"AAA Gutub","year":"2010","unstructured":"Gutub AAA (2010) Pixel Indicator technique for RGB image steganography. Journal of Emerging Technologies in Web Intelligence (JETWI) 2(1):56\u201364","journal-title":"Journal of Emerging Technologies in Web Intelligence (JETWI)"},{"issue":"5","key":"6505_CR8","doi-asserted-by":"publisher","first-page":"5591","DOI":"10.1007\/s11042-017-5293-6","volume":"78","author":"Adnan Gutub","year":"2017","unstructured":"Gutub A, Al-Juaid N, Khan E (2017) Counting-based secret sharing technique for multimedia applications. Multimedia Tools and Applications. https:\/\/doi.org\/10.1007\/s11042-017-5293-6","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"6505_CR9","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s11801-018-7212-0","volume":"14","author":"SC Han","year":"2018","unstructured":"Han SC, Yang JF, Wang R, Jia GM (2018) A robust color image watermarking algorithm against rotation attacks. Optoelectron Lett 14(1):61\u201366","journal-title":"Optoelectron Lett"},{"issue":"2","key":"6505_CR10","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/TCSVT.2018.2803303","volume":"29","author":"Dongdong Hou","year":"2019","unstructured":"Hou D, Zhang W, Chen K, Lin SJ, Yu N (2018) Reversible data hiding in color image with grayscale invariance. IEEE Transactions on Circuits and Systems for Video Technology. https:\/\/doi.org\/10.1109\/TCSVT.2018.2803303","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"2","key":"6505_CR11","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/TMM.2014.2368696","volume":"17","author":"P Korus","year":"2015","unstructured":"Korus P, Bia\u0142as J, Dziech A (2015) Towards practical self-embedding for JPEG-compressed digital images. IEEE Transactions on Multimedia 17(2):157\u2013170","journal-title":"IEEE Transactions on Multimedia"},{"issue":"3","key":"6505_CR12","doi-asserted-by":"publisher","first-page":"3597","DOI":"10.1007\/s11042-017-5222-8","volume":"77","author":"C Kumar","year":"2018","unstructured":"Kumar C, Singh AK, Kumar P (2018) A recent survey on image watermarking techniques and its application in e-governance. Multimedia Tools and Applications 77(3):3597\u20133622","journal-title":"Multimedia Tools and Applications"},{"issue":"11","key":"6505_CR13","doi-asserted-by":"publisher","first-page":"13531","DOI":"10.1007\/s11042-017-4974-5","volume":"77","author":"Y Lakrissi","year":"2018","unstructured":"Lakrissi Y, Saaidi A, Essahlaoui A (2018) Novel dynamic color image watermarking based on DWT-SVD and the human visual system. Multimedia Tools and Applications 77(11):13531\u201313555","journal-title":"Multimedia Tools and Applications"},{"issue":"4","key":"6505_CR14","doi-asserted-by":"publisher","first-page":"1939","DOI":"10.1109\/TIP.2018.2790481","volume":"27","author":"J Lee","year":"2018","unstructured":"Lee J, Choe Y (2018) Robust PCA based on incoherence with geometrical interpretation. IEEE Trans Image Process 27(4):1939\u20131950","journal-title":"IEEE Trans Image Process"},{"key":"6505_CR15","unstructured":"Leng L, Zhang J, Xu J, Khan MK, and Alghathbar K (2010) Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition. In: 2010 International Conference on Information and Communication Technology Convergence (ICTC)"},{"issue":"17","key":"6505_CR16","first-page":"2543","volume":"5","author":"L Leng","year":"2010","unstructured":"Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. International Journal of the Physical Sciences 5(17):2543\u20132554","journal-title":"International Journal of the Physical Sciences"},{"key":"6505_CR17","doi-asserted-by":"crossref","unstructured":"Leng L, Zhang J, Chen G, Khan MK, and Alghathbar K (2011) Two-directional two dimensional random projection and its variations for face and palmprint recognition. In: International Conference on Computational Science and Its Applications (ICCSA) pp. 458\u2013470","DOI":"10.1007\/978-3-642-21934-4_37"},{"key":"6505_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/895063","volume":"2014","author":"Li Li","year":"2014","unstructured":"Li L, Hou Q, Lu J, Xu Q, Dai J, Mao X, Chang CC (2014) A new pixels flipping method for huge watermarking capacity of the invoice font image. Sci World J 2014. https:\/\/doi.org\/10.1155\/2014\/895063","journal-title":"The Scientific World Journal"},{"issue":"1","key":"6505_CR19","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s00500-016-2320-x","volume":"22","author":"JZ Li","year":"2018","unstructured":"Li JZ, Lin Q, Yu C, Ren X, Li P (2018) A QDCT- and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram. Soft Comput 22(1):47\u201365","journal-title":"Soft Comput"},{"issue":"2","key":"6505_CR20","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1109\/TDEI.2018.007038","volume":"25","author":"S Li","year":"2018","unstructured":"Li S, Geng Y, Liu Z, Wang J (2018) \"V\" shape curves of physical parameters of field emitters versus applied voltage toward breakdown in vacuum. IEEE Trans Dielectr Electr Insul 25(2):749\u2013755","journal-title":"IEEE Trans Dielectr Electr Insul"},{"issue":"1\u20132","key":"6505_CR21","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.csi.2009.06.004","volume":"32","author":"SD Lin","year":"2010","unstructured":"Lin SD, Shie SC, Guo JY (2010) Improving the robustness of DCT-based image watermarking against JPEG compression. Computer Standards & Interfaces 32(1\u20132):54\u201360","journal-title":"Computer Standards & Interfaces"},{"key":"6505_CR22","unstructured":"Liu Y, Nie L, Han L, Zhang L, and Rosenblum DS (2015) Action2Activity: Recognizing Complex Activities from Sensor Data. In: Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI) pp. 1617\u20131623"},{"key":"6505_CR23","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.neucom.2015.08.096","volume":"181","author":"Y Liu","year":"2016","unstructured":"Liu Y, Nie L, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108\u2013115","journal-title":"Neurocomputing"},{"key":"6505_CR24","unstructured":"Liu Y, Zheng Y, Liang Y, Liu S, and Rosenblum DS (2016) Urban Water Quality Prediction Based on Multi-task Multi-view Learning. In: The International Joint Conference on Artificial Intelligence( IJCAI) pp. 2576\u20132582"},{"issue":"10","key":"6505_CR25","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1049\/iet-ipr.2016.0862","volume":"11","author":"S Liu","year":"2017","unstructured":"Liu S, Pan Z, Song H (2017) Digital image watermarking method based on DCT and fractal encoding. IET Image Process 11(10):815\u2013821","journal-title":"IET Image Process"},{"key":"6505_CR26","doi-asserted-by":"publisher","first-page":"19876","DOI":"10.1109\/ACCESS.2018.2808172","volume":"6","author":"NA Loan","year":"2018","unstructured":"Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6:19876\u201319897","journal-title":"IEEE Access"},{"key":"6505_CR27","unstructured":"Lu Y, Yuan C, Lai Z, Li X, Zhang D, Wong WK (2018) Horizontal and Vertical Nuclear Norm-Based 2DLDA for Image Representation. IEEE Transactions on Circuits and Systems for Video Technology pp. 1\u20131"},{"issue":"3","key":"6505_CR28","doi-asserted-by":"publisher","first-page":"1704","DOI":"10.1109\/TGRS.2017.2767068","volume":"56","author":"X Lu","year":"2018","unstructured":"Lu X, Zhang W, Li X (2018) A hybrid sparsity and distance-based discrimination detector for hyperspectral images. IEEE Trans Geosci Remote Sens 56(3):1704\u20131717","journal-title":"IEEE Trans Geosci Remote Sens"},{"key":"6505_CR29","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-94-007-6996-0_7","volume":"253","author":"IH Pan","year":"2013","unstructured":"Pan IH, Huang PS, Chang TJ (2013) DCT-based watermarking for color images via two-dimensional linear discriminant analysis. Information Technology Convergence, Lecture Notes in Electrical Engineering 253:57\u201365","journal-title":"Information Technology Convergence, Lecture Notes in Electrical Engineering"},{"issue":"1B","key":"6505_CR30","first-page":"127","volume":"38","author":"MT Parvez","year":"2011","unstructured":"Parvez MT, Gutub AAA (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait Journal of Science and Engineering (KJSE) 38(1B):127\u2013142","journal-title":"Kuwait Journal of Science and Engineering (KJSE)"},{"issue":"10","key":"6505_CR31","doi-asserted-by":"publisher","first-page":"12655","DOI":"10.1007\/s11042-017-4909-1","volume":"77","author":"C Patvardhan","year":"2018","unstructured":"Patvardhan C, Kumar P, Lakshmi CV (2018) Effective color image watermarking scheme using YCbCr color space and QR code. Multimedia Tools and Applications 77(10):12655\u201312677","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"6505_CR32","doi-asserted-by":"publisher","first-page":"2206","DOI":"10.1109\/JSTARS.2016.2555938","volume":"9","author":"J Pei","year":"2016","unstructured":"Pei J, Huang Y, Huo W, Wu J, Yang J, Yang H (2016) SAR imagery feature extraction using 2DPCA-based two-dimensional neighborhood virtual points discriminant embedding. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 9(6):2206\u20132214","journal-title":"IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing"},{"issue":"3","key":"6505_CR33","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1016\/j.compeleceng.2011.02.002","volume":"37","author":"A Phadikar","year":"2011","unstructured":"Phadikar A, Maity SP, Verma B (2011) Region based QIM digital watermarking scheme for image database in DCT domain. Computers & Electrical Engineering 37(3):339\u2013355","journal-title":"Computers & Electrical Engineering"},{"key":"6505_CR34","doi-asserted-by":"crossref","unstructured":"Pizzolante R, Carpentieri B, Castiglione A, and Maio GD (2011) The AVQ Algorithm: Watermarking and Compression Performances. In: Third International Conference on Intelligent Networking and Collaborative Systems, pp. 698\u2013702","DOI":"10.1109\/INCoS.2011.153"},{"key":"6505_CR35","unstructured":"Pizzolante R, Castiglione A, Carpentieri B, Santis AD , and Castiglione A (2016) Reversible Copyright Protection for DNA Microarray Images. In: 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC) pp. 458\u2013470"},{"key":"6505_CR36","doi-asserted-by":"publisher","first-page":"16189","DOI":"10.1109\/ACCESS.2018.2815037","volume":"6","author":"Amna Shifa","year":"2018","unstructured":"Shifa A, Afgan MS, Asghar MN, Fleury M, Memon I, Abdullah S, N Rasheed (2018) Joint crypto-Stego scheme for enhanced image protection with nearest-centroid clustering. IEEE Access 6:16189\u201316206","journal-title":"IEEE Access"},{"issue":"3","key":"6505_CR37","doi-asserted-by":"publisher","first-page":"3669","DOI":"10.1007\/s11042-016-3928-7","volume":"76","author":"FN Thakkar","year":"2017","unstructured":"Thakkar FN, Srivastava VK (2017) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimedia Tools and Applications 76(3):3669\u20133697","journal-title":"Multimedia Tools and Applications"},{"issue":"11","key":"6505_CR38","doi-asserted-by":"publisher","first-page":"13455","DOI":"10.1007\/s11042-016-3750-2","volume":"76","author":"TM Thanh","year":"2017","unstructured":"Thanh TM, Tanaka K (2017) An image zero-watermarking algorithm based on the encryption of visual map feature with watermark information. Multimedia Tools and Applications 76(11):13455\u201313471","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"6505_CR39","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1049\/iet-map.2017.0364","volume":"12","author":"M Uccellari","year":"2018","unstructured":"Uccellari M, Facchini F, Sola M, Sirignano E, Vitetta GM, Barbieri A, Tondelli S (2018) on the application of support vector machines to the prediction of propagation losses at 169\u00a0MHz for smart metering applications. IET Microwaves, Antennas & Propagation 12(3):302\u2013312","journal-title":"IET Microwaves, Antennas & Propagation"},{"issue":"3","key":"6505_CR40","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1109\/JAS.2018.7511063","volume":"5","author":"Y Xing","year":"2018","unstructured":"Xing Y, Lv C, Chen L, Wang H, Wang H, Cao D, Velenis E, Wang FY (2018) Advances in vision-based lane detection: algorithms, integration, assessment, and perspectives on ACP-based parallel vision. IEEE\/CAA Journal of Automatica Sinica 5(3):645\u2013661","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"issue":"8","key":"6505_CR41","doi-asserted-by":"publisher","first-page":"1669","DOI":"10.1109\/TNNLS.2014.2350993","volume":"26","author":"J Zhao","year":"2015","unstructured":"Zhao J, Shi L, Zhu J (2015) Two-stage regularized linear discriminant analysis for 2-D data. IEEE Transactions on Neural Networks and Learning Systems 26(8):1669\u20131681","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6505-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6505-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6505-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T18:24:32Z","timestamp":1661797472000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6505-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,17]]},"references-count":41,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["6505"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6505-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,17]]},"assertion":[{"value":"16 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}