{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:23:46Z","timestamp":1773512626307,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T00:00:00Z","timestamp":1573084800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T00:00:00Z","timestamp":1573084800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s11042-019-08144-5","type":"journal-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T16:04:02Z","timestamp":1573142642000},"page":"1673-1705","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":51,"title":["A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9439-5765","authenticated-orcid":false,"given":"Shiv","family":"Prasad","sequence":"first","affiliation":[]},{"given":"Arup Kumar","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,7]]},"reference":[{"key":"8144_CR1","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.dsp.2017.11.005","volume":"73","author":"S Bravo-Solorio","year":"2018","unstructured":"Bravo-Solorio S, Calderon F, Li C-T, Nandi AK (2018) Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. Digital Signal Processing 73:83\u201393","journal-title":"Digital Signal Processing"},{"key":"8144_CR2","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1016\/j.patcog.2006.05.018","volume":"40","author":"C-S Chana","year":"2007","unstructured":"Chana C-S, Chang C-C (2007) An efficient image authentication method based on Hamming code. Pattern Recogn 40:681\u2013690","journal-title":"Pattern Recogn"},{"issue":"9","key":"8144_CR3","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1016\/j.jss.2011.02.029","volume":"84","author":"CC Chang","year":"2011","unstructured":"Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462\u20131470","journal-title":"J Syst Softw"},{"issue":"2","key":"8144_CR4","doi-asserted-by":"publisher","first-page":"182","DOI":"10.2478\/s11772-013-0088-4","volume":"21","author":"Y-F Chang","year":"2013","unstructured":"Chang Y-F, Tail W-L (2013) A block-based watermarking scheme for image tamper detection and self-recovery. Opto-Electronics Review 21(2):182\u2013190","journal-title":"Opto-Electronics Review"},{"issue":"1","key":"8144_CR5","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s11042-012-1332-5","volume":"72","author":"F Chen","year":"2012","unstructured":"Chen F, He H, Tai H-M, Wang H (2012) Chaos-based self-embedding fragile watermarking with flexible watermark payload. Multimed Tools Appl 72(1):41\u201356","journal-title":"Multimed Tools Appl"},{"key":"8144_CR6","doi-asserted-by":"crossref","unstructured":"He, H, Zhang, J, Chen, F (2007) Block-wise fragile watermarking scheme based on scramble encryption. In Bio-Inspired Computing: Theories and Applications, 2007. BIC-TA 2007. Second International Conference on (pp. 216\u2013220). IEEE","DOI":"10.1109\/BICTA.2007.4806454"},{"key":"8144_CR7","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/j.measurement.2016.03.053","volume":"88","author":"C-S Hsu","year":"2016","unstructured":"Hsu C-S, Tu S-F (2016) Image tamper detection and recovery using adaptive embedding rules. Measurement 88:287\u2013296","journal-title":"Measurement"},{"issue":"7","key":"8144_CR8","first-page":"1058","volume":"6","author":"Y Kaur","year":"2017","unstructured":"Kaur Y, Ranade SK (2017) Image authentication and tamper detection using fragile watermarking in spatial domain. International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) 6(7):1058\u20131063","journal-title":"International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)"},{"key":"8144_CR9","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.sigpro.2013.11.028","volume":"98","author":"C-C Lo","year":"2014","unstructured":"Lo C-C, Hu Y-C (2014) A novel reversible image authentication scheme for digital images. Signal Process 98:174\u2013118","journal-title":"Signal Process"},{"key":"8144_CR10","doi-asserted-by":"crossref","unstructured":"Lu C-S (2005) Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property. Idea Group Publishing","DOI":"10.4018\/978-1-59140-192-6"},{"issue":"15","key":"8144_CR11","doi-asserted-by":"publisher","first-page":"16107","DOI":"10.1007\/s11042-016-3897-x","volume":"76","author":"M Nazari","year":"2017","unstructured":"Nazari M, Sharif S (2017) An improved method for digital image fragile watermarking based on chaotic maps. Multimed Tools Appl 76(15):16107\u201316123","journal-title":"Multimed Tools Appl"},{"issue":"2018","key":"8144_CR12","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1016\/j.jisa.2018.04.007","volume":"40","author":"Y Peng","year":"2018","unstructured":"Peng Y, Niu X, Fu L, Yin Z (2018) Image authentication scheme based on reversible fragile watermarking with two images. Journal of Information Security and Applications 40(2018):236\u2013246","journal-title":"Journal of Information Security and Applications"},{"issue":"2","key":"8144_CR13","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.jvcir.2010.12.005","volume":"22","author":"X Qi","year":"2011","unstructured":"Qi X, Xin X (2011) A quantization-based semi-fragile watermarking scheme for image content authentication. J Vis Commun Image Represent 22(2):187\u2013200","journal-title":"J Vis Commun Image Represent"},{"issue":"2015","key":"8144_CR14","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.jvcir.2015.05.006","volume":"23","author":"X Qi","year":"2015","unstructured":"Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 23(2015):312\u2013327","journal-title":"J Vis Commun Image Represent"},{"issue":"2","key":"8144_CR15","doi-asserted-by":"publisher","first-page":"2267","DOI":"10.1007\/s11042-015-3218-9","volume":"76","author":"C Qin","year":"2017","unstructured":"Qin C, Ji P, Wang J, Chang C-C (2017) Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed Tools Appl 76(2):2267\u20132287","journal-title":"Multimed Tools Appl"},{"key":"8144_CR16","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.sigpro.2017.03.033","volume":"138","author":"C Qin","year":"2017","unstructured":"Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280\u2013293","journal-title":"Signal Process"},{"issue":"10","key":"8144_CR17","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.aeue.2011.01.016","volume":"65","author":"S Rawat","year":"2011","unstructured":"Rawat S, Raman B (2011) A chaotic system based fragile watermarking scheme for image tamper detection. International Journal of Electronics and Communications (AEU) 65(10):840\u2013847","journal-title":"International Journal of Electronics and Communications (AEU)"},{"issue":"9","key":"8144_CR18","first-page":"165","volume":"2","author":"P Singh","year":"2013","unstructured":"Singh P, Chadha RS (2013) A Survey of Digital Watermarking Techniques, Applications and Attacks. International Journal of Engineering and Innovative Technology 2(9):165\u2013175","journal-title":"International Journal of Engineering and Innovative Technology"},{"key":"8144_CR19","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.jvcir.2017.09.001","volume":"49","author":"K Sreenivas","year":"2017","unstructured":"Sreenivas K, Kamakshiprasad V (2017) Improved image tamper localisation using chaotic maps and self-recovery. J Vis Commun Image Represent 49:164\u2013176","journal-title":"J Vis Commun Image Represent"},{"key":"8144_CR20","doi-asserted-by":"crossref","unstructured":"Suthaharan S (2010, 2010) Logistic Map-Based Fragile Watermarking for Pixel Level Tamper Detection and Resistance. EURASIP J Inf Secur:7","DOI":"10.1155\/2010\/829516"},{"issue":"3","key":"8144_CR21","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.image.2012.12.003","volume":"28","author":"X Tong","year":"2013","unstructured":"Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301\u2013308","journal-title":"Signal Process Image Commun"},{"issue":"2","key":"8144_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40998-017-0021-9","volume":"41","author":"S Trivedy","year":"2017","unstructured":"Trivedy S, Pal AK (2017) A Logistic Map-Based Fragile Watermarking Scheme of Digital Images with Tamper Detection. Iranian Journal of Science and Technology, Transactions of Electrical Engineering 41(2):1\u201311","journal-title":"Iranian Journal of Science and Technology, Transactions of Electrical Engineering"},{"key":"8144_CR23","unstructured":"William S (2007) Cryptography and Network Security: Principles and Practices. 4th Ed. India; Pearson Education"},{"key":"8144_CR24","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"D-C Wu","year":"2003","unstructured":"Wu D-C, Tsai W-H (2003) A Steganographic Method for Images by Pixel Value Differencing. Pattern Recogn Lett 24:1613\u20131626","journal-title":"Pattern Recogn Lett"},{"issue":"10\u201311","key":"8144_CR25","doi-asserted-by":"publisher","first-page":"2596","DOI":"10.1016\/j.optcom.2012.02.002","volume":"285","author":"D Xiao","year":"2012","unstructured":"Xiao D, Shih FY (2012) An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post- processing. Opt Commun 285(10\u201311):2596\u20132606","journal-title":"Opt Commun"},{"issue":"5","key":"8144_CR26","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1007\/s12559-016-9408-6","volume":"8","author":"Z Yin","year":"2016","unstructured":"Yin Z, Niu X, Zhou Z, Tang J, Luo B (2016) Improved reversible image authentication scheme. Cogn Comput 8(5):890\u2013899","journal-title":"Cogn Comput"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08144-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-019-08144-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-019-08144-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T00:46:18Z","timestamp":1604623578000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-019-08144-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,7]]},"references-count":26,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["8144"],"URL":"https:\/\/doi.org\/10.1007\/s11042-019-08144-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,7]]},"assertion":[{"value":"20 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}