{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:23:47Z","timestamp":1773512627211,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T00:00:00Z","timestamp":1543968000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11042-018-6877-5","type":"journal-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T21:55:57Z","timestamp":1543960557000},"page":"8463-8480","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":42,"title":["Contourlet-DCT based multiple robust watermarkings for medical images"],"prefix":"10.1007","volume":"78","author":[{"given":"Xiaoqi","family":"Wu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2386-3728","authenticated-orcid":false,"given":"Jingbing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Rong","family":"Tu","sequence":"additional","affiliation":[]},{"given":"Jieren","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Uzair Aslam","family":"Bhatti","sequence":"additional","affiliation":[]},{"given":"Jixin","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"issue":"5","key":"6877_CR1","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1109\/TMM.2009.2012922","volume":"11","author":"MA Akhaee","year":"2009","unstructured":"Akhaee MA, Bartolini SME, Sankur B, Marvastic F (2009) Robust scaling-based image watermarking using maximum-likelihood decoder with optimum strength factor. IEEE Trans Multimedia 11(5):822\u2013833","journal-title":"IEEE Trans Multimedia"},{"issue":"4","key":"6877_CR2","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1109\/TIP.2009.2038774","volume":"19","author":"MA Akhaee","year":"2010","unstructured":"Akhaee MA, Sahraeian ME, Marvasti F (2010) Contourlet-based image watermarking using optimum detector in a noisy environment. IEEE Trans Image Process 19(4):967\u2013980","journal-title":"IEEE Trans Image Process"},{"issue":"7","key":"6877_CR3","doi-asserted-by":"publisher","first-page":"1679","DOI":"10.1007\/s11760-014-0626-7","volume":"9","author":"MH Asmare","year":"2015","unstructured":"Asmare MH, Asirvadam VS, Hani AFM (2015) Image enhancement based on contourlet transform. SIViP 9(7):1679\u20131690","journal-title":"SIViP"},{"issue":"4","key":"6877_CR4","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1109\/TCOM.1983.1095851","volume":"31","author":"PJ Burt","year":"1983","unstructured":"Burt PJ, Adelson EH (1983) The Laplacian pyramid as a compact image code. IEEE Trans Commun 31(4):532\u2013540","journal-title":"IEEE Trans Commun"},{"issue":"2","key":"6877_CR5","first-page":"197","volume":"54","author":"Y Cao","year":"2018","unstructured":"Cao Y, Zhou Z, Sun X, Gao C (2018) Coverless information hiding based on the molecular structure images of material. Comput Mater Con 54(2):197\u2013207","journal-title":"Comput Mater Con"},{"issue":"4","key":"6877_CR6","first-page":"61","volume":"27","author":"ZJ Deng","year":"2004","unstructured":"Deng ZJ, Xiao D, Tu FH (2004) Design and implementation of chaotic encryption algorithm based on logistic map. JCU 27(4):61\u201363","journal-title":"JCU"},{"issue":"12","key":"6877_CR7","doi-asserted-by":"publisher","first-page":"2091","DOI":"10.1109\/TIP.2005.859376","volume":"14","author":"MN Do","year":"2005","unstructured":"Do MN, Vetterli M (2005) The contourlet transform: an efficient directional multiresolution image representation. IEEE Trans Image Process 14(12):2091\u20132106","journal-title":"IEEE Trans Image Process"},{"issue":"11","key":"6877_CR8","doi-asserted-by":"publisher","first-page":"4614","DOI":"10.1109\/TIP.2015.2467317","volume":"24","author":"M Dzwonkowski","year":"2015","unstructured":"Dzwonkowski M, Papaj M, Rykaczewski R (2015) A new quaternion-based encryption method for DICOM images. IEEE Trans Image Process 24(11):4614\u20134622","journal-title":"IEEE Trans Image Process"},{"issue":"13","key":"6877_CR9","first-page":"292","volume":"7","author":"HY Feng","year":"2012","unstructured":"Feng HY, Gu YS, Li YC (2012) Research on digital watermarking based on wavelet theory. J Converg Inf Technol 7(13):292\u2013299","journal-title":"J Converg Inf Technol"},{"key":"6877_CR10","unstructured":"Hu DH, Wang L, Jiang WJ, Zheng SL, Li B (2018) A novel image steganography method via deep convolutional generative adversarial networks. IEEE Access (9):1\u20131"},{"key":"6877_CR11","unstructured":"Jin C (2008) Digital watermarking technology and theory. Bei Jing, China"},{"key":"6877_CR12","unstructured":"Kevin RE, Eduardo FN, Clara CR, Rogelio RR, Mariko NM (2017) Adaptive removable visible watermarking technique using dual watermarking for digital color images. Multimed Tool Appl:1\u201328"},{"issue":"3","key":"6877_CR13","first-page":"317","volume":"27","author":"Y Liu","year":"2016","unstructured":"Liu Y, Wang JX, Hu HH, Zhu YH (2016) Robust blind digital watermarking scheme based on contourlet transform and QR decomposition. J Optoelectronics Laser 27(3):317\u2013324","journal-title":"J Optoelectronics Laser"},{"issue":"4","key":"6877_CR14","doi-asserted-by":"publisher","first-page":"882","DOI":"10.1109\/78.127960","volume":"40","author":"HB Roberto","year":"1992","unstructured":"Roberto HB, Smith MJT (1992) A filter bank for the directional decomposition of image: theory and design. IEEE Trans Signal Process 40(4):882\u2013893","journal-title":"IEEE Trans Signal Process"},{"issue":"2","key":"6877_CR15","first-page":"1","volume":"14","author":"X Sun","year":"2002","unstructured":"Sun X, Yi KY, Sun YX (2002) Image encryption algorithm based on chaotic system. J Comput Aided Des Comput Graph 14(2):1\u20134","journal-title":"J Comput Aided Des Comput Graph"},{"key":"6877_CR16","doi-asserted-by":"publisher","first-page":"8184","DOI":"10.1016\/j.eswa.2015.06.041","volume":"42","author":"VS Verma","year":"2015","unstructured":"Verma VS, Jha RK, Ojha A (2015) Significant region based robust watermarking scheme in lifting wavelet transform domain. Expert Syst Appl 42:8184\u20138197","journal-title":"Expert Syst Appl"},{"issue":"22","key":"6877_CR17","doi-asserted-by":"publisher","first-page":"23721","DOI":"10.1007\/s11042-016-4153-0","volume":"76","author":"JW Wang","year":"2017","unstructured":"Wang JW, Li T, Shi YQ, Lian SG, Ye JY (2017) Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimed Tools Appl 76(22):23721\u201323737","journal-title":"Multimed Tools Appl"},{"issue":"13","key":"6877_CR18","first-page":"265","volume":"6","author":"YF Zhan","year":"2012","unstructured":"Zhan YF, Feng X, Fu C, Bai GT, Ma HF (2012) An efficient medical image cryplosystem based on chaotic maps. J Digit Content Technol Appl 6(13):265\u2013274","journal-title":"J Digit Content Technol Appl"},{"key":"6877_CR19","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.sigpro.2018.01.011","volume":"146","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Qin C, Zhang WM, Liu FL, Luo XY (2018) On the fault-tolerant performance for a class of robust image steganography. Signal Process 146:99\u2013111","journal-title":"Signal Process"},{"key":"6877_CR20","doi-asserted-by":"crossref","unstructured":"Zheng SL, Wang L, Ling BH, Hu DH (2017). Coverless information hiding based on robust image hashing. 13th International Conference Intelligent Computing (ICIC 2017), Liverpool, UK, August 7-10, p 536-547","DOI":"10.1007\/978-3-319-63315-2_47"},{"key":"6877_CR21","unstructured":"Zhou YS, Jin W (2011) A novel image zero-watermarking scheme based on DWT-SVD. IEEE International Conference on Multimedia Technology (ICMT 2011):2873\u20132876"},{"issue":"1","key":"6877_CR22","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.commatsci.2018.08.040","volume":"55","author":"QL Zhou","year":"2018","unstructured":"Zhou QL, Qiu YB, Li L, Lu JF, Yuan WQ, Feng XQ, Mao XY (2018) Steganography using reversible texture synthesis based on seeded region growing and LSB. Comput Mater Con 55(1):151\u2013163","journal-title":"Comput Mater Con"},{"key":"6877_CR23","doi-asserted-by":"crossref","unstructured":"Zhu TT, Hu DH, Wang LN (2009) Perceptual hash functions based on contourlet transform and singular value decomposition, 2009 International Conference on Multimedia Information Networking and Security, p 87-90","DOI":"10.1109\/MINES.2009.105"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6877-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6877-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6877-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,4]],"date-time":"2019-12-04T19:19:10Z","timestamp":1575487150000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6877-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,5]]},"references-count":23,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["6877"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6877-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,5]]},"assertion":[{"value":"29 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 December 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}