{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:28:41Z","timestamp":1753601321591},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2019,1,31]],"date-time":"2019-01-31T00:00:00Z","timestamp":1548892800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11042-018-7140-9","type":"journal-article","created":{"date-parts":[[2019,1,31]],"date-time":"2019-01-31T13:04:54Z","timestamp":1548939894000},"page":"8981-8995","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A blind watermarking algorithm based on adaptive quantization in Contourlet domain"],"prefix":"10.1007","volume":"78","author":[{"given":"Di","family":"Fan","sequence":"first","affiliation":[]},{"given":"Ying","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chunwei","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,31]]},"reference":[{"key":"7140_CR1","doi-asserted-by":"crossref","unstructured":"Baaziz N (2005) Adaptive watermarking schemes based on a redundant contourlet transform[C]. International conference on image processing 221\u2013224","DOI":"10.1109\/ICIP.2005.1529727"},{"key":"7140_CR2","unstructured":"Bi H, Li X, Zhang Y et al (2010) A blind robust watermarking scheme based on CT and SVD[C] IEEE, international conference on signal processing. IEEE 881\u2013884"},{"key":"7140_CR3","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.image.2015.03.010","volume":"34","author":"N Cai","year":"2015","unstructured":"Cai N, Zhu N, Weng S et al (2015) Difference angle quantization index modulation scheme for image watermarking[J]. Signal Process Image Commun 34:52\u201360","journal-title":"Signal Process Image Commun"},{"key":"7140_CR4","unstructured":"Huang Z, He X (2014) Contourlet domain watermarking algorithms based on Arnold scrambling and singular value decomposition.\u00a0International Conference on Mechatronic Sciences. IEEE."},{"issue":"10","key":"7140_CR5","doi-asserted-by":"publisher","first-page":"5493","DOI":"10.1007\/s11042-015-2522-8","volume":"75","author":"ST Chen","year":"2016","unstructured":"Chen ST, Huang HN, Kung WM et al (2016) Optimization-based image watermarking with integrated quantization embedding in the wavelet-domain[J]. Multimed Tools Appl 75(10):5493\u20135511","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"7140_CR6","first-page":"63","volume":"8","author":"SA Hosseini","year":"2014","unstructured":"Hosseini SA, Ghofrani S (2014) Digital Watermarking based on Contourlet-SVD[J]. Majlesi. J Electr Eng 8(1):63\u201368","journal-title":"J Electr Eng"},{"key":"7140_CR7","unstructured":"Huang Z, He X (2014) Contourlet domain watermarking algorithms based on Arnold scrambling and singular value decomposition[C]. International conference on mechatronic sciences, electric engineering and computer. IEEE 874\u2013878"},{"key":"7140_CR8","doi-asserted-by":"crossref","unstructured":"Idrissi N, Roukhe A (2014) Robust watermarking method based on contourlet transform, maximum entropy, and SVD decomposition.\u00a0International Conference on Multimedia Computing & Systems. IEEE.","DOI":"10.1109\/ICMCS.2014.6911195"},{"issue":"8","key":"7140_CR9","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1016\/j.aeue.2013.02.005","volume":"67","author":"Yanling Jiang","year":"2013","unstructured":"Jiang Y, Zhang Y, Pei W et al (2013) Adaptive spread transform QIM watermarking algorithm based on improved perceptual models . AEU-Int J Electron Commun 67(8):690\u2013696","journal-title":"AEU - International Journal of Electronics and Communications"},{"issue":"05","key":"7140_CR10","first-page":"262","volume":"02","author":"Y Li","year":"2012","unstructured":"Li Y, Sun J, Li C (2012) Robust image Watermarking algorithm based on Contourlet transform and SVD decomposition[J]. Comput Sci Appl 02(05):262\u2013265","journal-title":"Comput Sci Appl"},{"key":"7140_CR11","unstructured":"Liu D, Liu W, Zhang G (2008) An adaptive watermarking scheme based on nonsubsampled Contourlet transform for color image authentication[C]\/\/ young computer scientists, 2008. Icycs 2008. The, international conference for. IEEE 748\u2013752"},{"key":"7140_CR12","unstructured":"Luo P, Wei P, Liu YQA (2013) Color digital watermarking in nonsampled Contourlet domain using generic algorithm[C]\/\/ international conference on intelligent NETWORKING and collaborative systems. IEEE computer society 673\u2013676"},{"issue":"3","key":"7140_CR13","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1016\/j.jksuci.2016.02.005","volume":"29","author":"Abdulmawla Najih","year":"2017","unstructured":"Najih A, Al-Haddad SAR, Ramli AR et al (2016) Digital image watermarking based on angle quantization in discrete contourlet transform[J]. Journal of King Saud University - Computer and Information Sciences 29(3)","journal-title":"Journal of King Saud University - Computer and Information Sciences"},{"key":"7140_CR14","unstructured":"Nguyen SC, Ha KH, Nguyen HM. A new image watermarking scheme using contourlet transforms[C]\/\/ ICITEE2018. IEEE 1\u20136"},{"issue":"2","key":"7140_CR15","doi-asserted-by":"publisher","first-page":"519","DOI":"10.12733\/jics20102841","volume":"11","author":"CA Qin","year":"2014","unstructured":"Qin CA (2014) Novel digital watermarking algorithm in Contourlet domain[J]. Journal of Information & Computational Science 11(2):519\u2013526","journal-title":"Journal of Information & Computational Science"},{"key":"7140_CR16","unstructured":"Ramanjaneyulu K, Rajarajeswari K (2012) DCT based robust image watermarking scheme using adaptive quantization index modulation and genetic algorithm[J]. Int J Comput Appl:81\u201384"},{"key":"7140_CR17","doi-asserted-by":"crossref","unstructured":"Seo YH, Choi HJ, Yoo JS et al (2010) Adaptive Watermarking scheme using biased shift of quantization index.[J]. J Electr Comput Eng:5\u20138","DOI":"10.1155\/2010\/348321"},{"issue":"347\u2013350","key":"7140_CR18","doi-asserted-by":"publisher","first-page":"2983","DOI":"10.4028\/www.scientific.net\/AMM.347-350.2983","volume":"347-350","author":"G Wu","year":"2013","unstructured":"Wu G, Wei DW, Tang GM et al (2013) Adaptive semi-fragile Watermarking based on complete quantization and image contents[J]. Appl Mech Mater 347-350(347\u2013350):2983\u20132988","journal-title":"Appl Mech Mater"},{"key":"7140_CR19","first-page":"202","volume":"7","author":"YU Yong","year":"2017","unstructured":"Yong YU (2017) Contourlet domain Watermarking algorithm based on singular value decomposition[J]. Packag Eng 7:202\u2013205","journal-title":"Packag Eng"},{"key":"7140_CR20","doi-asserted-by":"crossref","unstructured":"Zareian M, Daneshkhah A (2012) Adaptive angle quantization index modulation for robust image watermarking[C]. Global communications conference. IEEE 881\u2013884","DOI":"10.1109\/GLOCOM.2012.6503224"},{"issue":"4","key":"7140_CR21","first-page":"1402","volume":"29","author":"FY Zhang","year":"2012","unstructured":"Zhang FY, Quan HL, Lin LY et al (2012) Robust digital watermark algorithm in Contourlet domain based on singular value decomposition[J]. Application Research of Computers 29(4):1402\u20131401","journal-title":"Application Research of Computers"},{"key":"7140_CR22","unstructured":"Zhu X, Zhao J, Xu HA (2006) Digital watermarking algorithm and implementation based on improved SVD[C]\/\/ international conference on pattern recognition. IEEE computer society 651\u2013656"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-7140-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-7140-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-7140-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T00:17:44Z","timestamp":1580429864000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-7140-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,31]]},"references-count":22,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["7140"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-7140-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,31]]},"assertion":[{"value":"28 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}