{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:26:00Z","timestamp":1760955960297},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T00:00:00Z","timestamp":1565308800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T00:00:00Z","timestamp":1565308800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s11042-019-08058-2","type":"journal-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T21:02:32Z","timestamp":1565384552000},"page":"34867-34899","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Fusing PDTDFB magnitude and relative phase modeling for geometrical correction-based image watermarking"],"prefix":"10.1007","volume":"78","author":[{"given":"Xiang-Yang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Si-Yu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Tao-Tao","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hong-Ying","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,9]]},"reference":[{"key":"8058_CR1","first-page":"281","volume-title":"ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II","author":"Tauheed Ahmed","year":"2014","unstructured":"Ahmed T, Roy R, Changder S (2014) Cropping and rotation invariant watermarking scheme in the spatial domain. Proceedings of the 48th Annual Convention of Computer Society of India- Volume II, Advances in Intelligent Systems and Computing, pp. 281\u2013292"},{"issue":"12","key":"8058_CR2","doi-asserted-by":"publisher","first-page":"5060","DOI":"10.1109\/TIP.2015.2476961","volume":"24","author":"M Andalibi","year":"2015","unstructured":"Andalibi M, Chandler DM (2015) Digital image watermarking via adaptive logo texturization. IEEE Trans Image Process 24(12):5060\u20135073","journal-title":"IEEE Trans Image Process"},{"issue":"14","key":"8058_CR3","doi-asserted-by":"publisher","first-page":"8695","DOI":"10.1007\/s11042-015-2786-z","volume":"75","author":"O Benrhouma","year":"2016","unstructured":"Benrhouma O, Hermassi H, El-Latif AAA (2016) Chaotic watermark for blind forgery detection in images. Multimed Tools Appl 75(14):8695\u20138718","journal-title":"Multimed Tools Appl"},{"key":"8058_CR4","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.sigpro.2015.07.018","volume":"119","author":"M Botta","year":"2016","unstructured":"Botta M, Cavagnino D, Pomponiu V (2016) A modular framework for color image watermarking. Signal Process 119:102\u2013114","journal-title":"Signal Process"},{"key":"8058_CR5","doi-asserted-by":"publisher","first-page":"5493","DOI":"10.1007\/s11042-015-2522-8","volume":"75","author":"ST Chen","year":"2016","unstructured":"Chen ST, Huang HN, Kung WM, Hsu CY (2016) Optimization-based image watermarking with integrated quantization embedding in the wavelet-domain. Multimed Tools Appl 75:5493\u20135511","journal-title":"Multimed Tools Appl"},{"key":"8058_CR6","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.aeue.2013.08.018","volume":"68","author":"C Das","year":"2014","unstructured":"Das C, Panigrahi S, Sharma YK, Mahapatra KK (2014) A novel blind robustimage watermarking in DCT domain using inter-block coefficient correlation. AEU-International Journal of Electronics and Communications 68:244\u2013253","journal-title":"AEU-International Journal of Electronics and Communications"},{"key":"8058_CR7","doi-asserted-by":"publisher","first-page":"21075","DOI":"10.1109\/ACCESS.2018.2820603","volume":"6","author":"AAA El-Latif","year":"2018","unstructured":"El-Latif AAA, Abd-El-Atty B, Hossain MS (2018) Efficient quantum information hiding for remote medical image sharing. IEEE Access 6:21075\u201321083","journal-title":"IEEE Access"},{"issue":"2","key":"8058_CR8","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.ijleo.2015.09.205","volume":"127","author":"S Fazli","year":"2016","unstructured":"Fazli S, Moeini M (2016) A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks. Optik-International Journal for Light and Electron Optics 127(2):964\u2013972","journal-title":"Optik-International Journal for Light and Electron Optics"},{"key":"8058_CR9","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.jvcir.2015.03.009","volume":"30","author":"J Guo","year":"2015","unstructured":"Guo J, Zheng P, Huang J (2015) Secure watermarking scheme against watermark attacks in the encrypted domain. J Vis Commun Image Represent 30:125\u2013135","journal-title":"J Vis Commun Image Represent"},{"key":"8058_CR10","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.jvcir.2015.07.017","volume":"32","author":"LY Hsu","year":"2015","unstructured":"Hsu LY, Hu HT (2015) Blind image watermarking via exploitation of inter-block prediction and visibility threshold in DCT domain. J Vis Commun Image Represent 32:130\u2013143","journal-title":"J Vis Commun Image Represent"},{"key":"8058_CR11","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.jvcir.2017.03.009","volume":"46","author":"LY Hsu","year":"2017","unstructured":"Hsu LY, Hu HT (2017) Robust blind image watermarking using crisscross inter-block prediction in the DCT domain. J Vis Commun Image Represent 46:33\u201347","journal-title":"J Vis Commun Image Represent"},{"key":"8058_CR12","doi-asserted-by":"crossref","unstructured":"Kaur M, Kaur P (2009) Robust watermarking into the color models based on the synchronization template. International Conference on Information and Multimedia Technology (ICIMT '09), Jeju, Island, 296\u2013300","DOI":"10.1109\/ICIMT.2009.81"},{"issue":"1","key":"8058_CR13","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s00500-016-2320-x","volume":"22","author":"Jianzhong Li","year":"2016","unstructured":"Li J, Lin Q, Yu C (2016) A QDCT-and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram. Soft Comput:1\u201319. \nhttps:\/\/doi.org\/10.1007\/s00500-016-2320-x","journal-title":"Soft Computing"},{"key":"8058_CR14","doi-asserted-by":"crossref","unstructured":"J. Li, J. Zhang (2014) A robust image watermarking scheme with kinoform in hybrid NSCT and SVD domain. 2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference (ITAIC), 48\u201352","DOI":"10.1109\/ITAIC.2014.7065003"},{"key":"8058_CR15","doi-asserted-by":"crossref","unstructured":"Liu Z, Zhu Y S, Fan Y (2016) A SIFT-based robust watermarking scheme in DWT-SVD domain using majority voting mechanism. The Eighth International Conference on Digital Image Processing (ICDIP 2016), 100332U-100332U-6","DOI":"10.1117\/12.2243606"},{"key":"8058_CR16","doi-asserted-by":"publisher","DOI":"10.1002\/047147326X","volume-title":"Weibull models, vol. 358","author":"DNP Murthy","year":"2003","unstructured":"Murthy DNP, Xie M, Jiang R (2003) Weibull models, vol. 358. Wiley, New York"},{"issue":"10","key":"8058_CR17","doi-asserted-by":"publisher","first-page":"4651","DOI":"10.1109\/TSP.2007.912897","volume":"56","author":"TT Nguyen","year":"2008","unstructured":"Nguyen TT, Oraintara S (2008) The shiftable complex directional pyramid\u2014Part I: Theoretical aspects. IEEE Trans on Signal Processing 56(10):4651\u20134660","journal-title":"IEEE Trans on Signal Processing"},{"issue":"10","key":"8058_CR18","doi-asserted-by":"publisher","first-page":"4661","DOI":"10.1109\/TSP.2008.927461","volume":"56","author":"TT Nguyen","year":"2008","unstructured":"Nguyen TT, Oraintara S (2008) The shiftable complex directional pyramid\u2014Part II: Implementation and applications. IEEE Trans on Signal Processing 56(10):4661\u20134672","journal-title":"IEEE Trans on Signal Processing"},{"key":"8058_CR19","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/j.compeleceng.2015.03.004","volume":"46","author":"J Ouyang","year":"2015","unstructured":"Ouyang J, Coatrieux G, Chen B (2015) Color image watermarking based on quaternion Fourier transform and improved uniform log-polar mapping. Comput Electr Eng 46:419\u2013432","journal-title":"Comput Electr Eng"},{"issue":"4","key":"8058_CR20","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/s00530-014-0355-3","volume":"20","author":"X Song","year":"2014","unstructured":"Song X, Wang S, Abd El-Latif AA, Niu X (2014) Dynamic watermarking scheme for quantum images based on Hadamard transform. Multimedia Systems 20(4):379\u2013388","journal-title":"Multimedia Systems"},{"issue":"3","key":"8058_CR21","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1023\/A:1018628609742","volume":"9","author":"JAK Suykens","year":"1999","unstructured":"Suykens JAK, Vandewalle J (1999) Least squares support vector machine classifiers. Neural Process Lett 9(3):293\u2013300","journal-title":"Neural Process Lett"},{"key":"8058_CR22","unstructured":"Test images database. Available: \nhttp:\/\/decsai.ugr.es\/cvg\/dbimagenes\/"},{"issue":"7","key":"8058_CR23","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.1109\/TIFS.2014.2322497","volume":"9","author":"M Urvoy","year":"2014","unstructured":"Urvoy M, Goudia D, Autrusseau M (2014) Perceptual DFT watermarking with improved detection and robustness to geometrical distortions. IEEE Trans on Information Forensics and Security 9(7):1108\u20131119","journal-title":"IEEE Trans on Information Forensics and Security"},{"issue":"1","key":"8058_CR24","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.sigpro.2010.06.014","volume":"91","author":"A Vo","year":"2011","unstructured":"Vo A, Oraintara S, Nguyen N (2011) Vonn distribution of relative phase for statistical image modeling in complex wavelet domain. Signal Process 91(1):114\u2013125","journal-title":"Signal Process"},{"key":"8058_CR25","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1016\/j.neucom.2015.09.082","volume":"174","author":"X Wang","year":"2016","unstructured":"Wang X, Liu Y, Li S (2016) Robust image watermarking approach using polar harmonic transforms based geometric correction. Neurocomputing 174:627\u2013642","journal-title":"Neurocomputing"},{"key":"8058_CR26","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.sigpro.2016.12.010","volume":"134","author":"C Wang","year":"2017","unstructured":"Wang C, Wang X, Zhang C et al (2017) Geometric correction based color image watermarking using fuzzy least squares support vector machine and Bessel K form distribution. Signal Process 134:197\u2013208","journal-title":"Signal Process"},{"issue":"4","key":"8058_CR27","doi-asserted-by":"publisher","first-page":"2063","DOI":"10.1109\/TIP.2018.2795745","volume":"27","author":"YG Wang","year":"2018","unstructured":"Wang YG, Zhu G, Shi YQ (2018) Transportation spherical watermarking. IEEE Trans Image Process 27(4):2063\u20132077","journal-title":"IEEE Trans Image Process"},{"key":"8058_CR28","unstructured":"Xie Y, Li J, Wang J (2014) A geometric distortion correction method for lithographic watermarked authentication images. The Fifth International Conference on Graphic and Image Processing, 906908\u2013906908-5"},{"issue":"3","key":"8058_CR29","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/s11760-013-0465-y","volume":"9","author":"X Yan","year":"2013","unstructured":"Yan X, Wang S, Abd El-Latif AA, Niu X (2013) New approaches for efficient information hiding-based secret image sharing schemes. SIViP 9(3):499\u2013510","journal-title":"SIViP"},{"issue":"3","key":"8058_CR30","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1016\/j.compeleceng.2012.07.009","volume":"39","author":"H-y Yang","year":"2013","unstructured":"Yang H-y, Wang X-y, Wang C-p (2013) A robust digital watermarking algorithm in undecimated discrete wavelet transform domain. Comput Electr Eng 39(3):893\u2013906","journal-title":"Comput Electr Eng"},{"issue":"8","key":"8058_CR31","doi-asserted-by":"publisher","first-page":"2189","DOI":"10.1109\/TIP.2011.2118216","volume":"20","author":"H Zhang","year":"2011","unstructured":"Zhang H, Shu H, Coatrieux G (2011) Affine Legendre moment invariants for image watermarking robust to geometric distortions. IEEE Trans Image Process 20(8):2189\u20132199","journal-title":"IEEE Trans Image Process"},{"issue":"8","key":"8058_CR32","doi-asserted-by":"publisher","first-page":"2189","DOI":"10.1109\/TIP.2011.2118216","volume":"20","author":"H Zhang","year":"2011","unstructured":"Zhang H, Shu H, Coatrieux G, Zhu J (2011) Affine Legendre moment invariants for image watermarking robust to geometric distortions. IEEE Trans Image Process 20(8):2189\u20132199","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"8058_CR33","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1007\/s11432-011-4470-x","volume":"55","author":"Y Zhao","year":"2012","unstructured":"Zhao Y, Ni R, Zhu Z (2012) RST transforms resistant image watermarking based on centroid and sector-shaped partition. SCIENCE CHINA Inf Sci 55(3):650\u2013662","journal-title":"SCIENCE CHINA Inf Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08058-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-08058-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08058-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,7]],"date-time":"2020-08-07T23:17:09Z","timestamp":1596842229000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-08058-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,9]]},"references-count":33,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["8058"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08058-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,9]]},"assertion":[{"value":"11 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 August 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and\/or national research committee and with the 1964 Helsinki declaration and its later amendments or comparable ethical standards.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical standard"}},{"value":"The authors declare that they have no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}