{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T13:06:25Z","timestamp":1774271185007,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"25-26","license":[{"start":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T00:00:00Z","timestamp":1583712000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T00:00:00Z","timestamp":1583712000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s11042-020-08634-x","type":"journal-article","created":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T08:03:12Z","timestamp":1583740992000},"page":"18657-18678","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["An adaptive framework to image watermarking based on the twin support vector regression and genetic algorithm in lifting wavelet transform domain"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2041-8661","authenticated-orcid":false,"given":"Rajesh","family":"Mehta","sequence":"first","affiliation":[]},{"given":"Keshav","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Ashok Kumar","family":"Yadav","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,9]]},"reference":[{"key":"8634_CR1","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.eij.2015.01.002","volume":"16","author":"C Agarwal","year":"2015","unstructured":"Agarwal C, Mishra A, Sharma A (2015) A novel gray-scale image watermarking using hybrid fuzzy-BPN architecture. Egyptian Informatics Journal 16:83\u2013102","journal-title":"Egyptian Informatics Journal"},{"issue":"5","key":"8634_CR2","doi-asserted-by":"crossref","first-page":"2392","DOI":"10.1016\/j.eswa.2014.10.045","volume":"42","author":"M Ali","year":"2015","unstructured":"Ali M, Ahn CW (2015) Comments on optimized gray-scale image watermarking using DWT-SVD and firefly algorithm. Expert Syst Appl 42(5):2392\u20132394","journal-title":"Expert Syst Appl"},{"issue":"1","key":"8634_CR3","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1016\/j.ijleo.2013.06.082","volume":"125","author":"M Ali","year":"2014","unstructured":"Ali M, Ahn CW, Pant M (2014) A robust image watermarking technique using SVD and differential evolution in DCT domain. Optik 125(1):428\u2013434","journal-title":"Optik"},{"key":"8634_CR4","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1016\/j.patrec.2016.12.010","volume":"94","author":"IA Ansari","year":"2017","unstructured":"Ansari IA, Pant M (2017) Multipurpose image watermarking in the domain of DWT based on SVD and ABC. Pattern Recogn Lett 94:228\u2013236","journal-title":"Pattern Recogn Lett"},{"key":"8634_CR5","doi-asserted-by":"crossref","first-page":"3077","DOI":"10.1016\/j.eswa.2008.01.027","volume":"36","author":"E Avci","year":"2009","unstructured":"Avci E, Avci D (2009) An expert system based on fuzzy entropy for automatic threshold selection in image processing. Expert System with applications 36:3077\u20133085","journal-title":"Expert System with applications"},{"key":"8634_CR6","doi-asserted-by":"crossref","first-page":"S257","DOI":"10.1007\/s00521-012-0971-9","volume":"22","author":"S Balasundaram","year":"2013","unstructured":"Balasundaram S, Tanveer M (2013) On Lagrangian twin support vector regression. Naural Computing and Applications 22:S257\u2013S267","journal-title":"Naural Computing and Applications"},{"key":"8634_CR7","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.neunet.2013.12.003","volume":"51","author":"S Balasundaram","year":"2014","unstructured":"Balasundaram S, Gupta D, Kapil (2014) Lagrangian support vector regression via unconstrained convex minimization. Neural Newtroks 51:67\u201379","journal-title":"Neural Newtroks"},{"issue":"1","key":"8634_CR8","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/TMM.2003.808816","volume":"5","author":"WC Chu","year":"2003","unstructured":"Chu WC (2003) DCT based image watermarking using subsampling. IEEE Transaction on Multimedia 5(1):34\u201338","journal-title":"IEEE Transaction on Multimedia"},{"issue":"6","key":"8634_CR9","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","volume":"12","author":"IJ Cox","year":"1997","unstructured":"Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Transaction on Image Processing 12(6):1673\u20131687","journal-title":"IEEE Transaction on Image Processing"},{"issue":"3","key":"8634_CR10","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/BF02476026","volume":"4","author":"I Daubeches","year":"1998","unstructured":"Daubeches I, Sweldens W (1998) Factoring wavelets into lifting steps. Journal of Fourier Analysisand Applications 4(3):247\u2013269","journal-title":"Journal of Fourier Analysisand Applications"},{"issue":"11","key":"8634_CR11","doi-asserted-by":"crossref","first-page":"1405","DOI":"10.1016\/j.patrec.2004.11.027","volume":"26","author":"M Eyadat","year":"2005","unstructured":"Eyadat M, Vasikarla S (2005) Performance evaluation of an incorporated DCT block-based watermarking algorithm with human visual system model. Pattern Recogn Lett 26(11):1405\u20131411","journal-title":"Pattern Recogn Lett"},{"key":"8634_CR12","series-title":"Part II, LNAI","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1007\/11596981_122","volume-title":"CIS 2005","author":"W Fan","year":"2005","unstructured":"Fan W, Chen J, Zhen J (2005) SPIHT algorithm based on fast lifting wavelet transform in image compression. In: Hao Y et al (eds) CIS 2005, Part II, LNAI, vol 3802, pp 838\u2013844. https:\/\/doi.org\/10.1007\/11596981_122"},{"issue":"9","key":"8634_CR13","doi-asserted-by":"crossref","first-page":"3679","DOI":"10.1007\/s00500-015-1729-y","volume":"20","author":"B Jagadeesh","year":"2016","unstructured":"Jagadeesh B, Kumar PR, Reddy PC (2016) Robust digital image watermarking based on fuzzy inference system and back propagation neural networks using DCT. Soft Computing (2016) 20(9):3679\u20133686","journal-title":"Soft Computing (2016)"},{"key":"8634_CR14","volume-title":"Fuzzy sets and fuzzy logic: theory and applications; prentice hall","author":"GJ Klir","year":"1995","unstructured":"Klir GJ, Yuan B (1995) Fuzzy sets and fuzzy logic: theory and applications; prentice hall. Msm, New Jersey"},{"issue":"6","key":"8634_CR15","doi-asserted-by":"crossref","first-page":"1657","DOI":"10.1007\/BF02831844","volume":"11","author":"SU Lian","year":"2006","unstructured":"Lian SU, Hong MA, Shifu T (2006) Adaptive image digital watermarking with DCT and FCM. Wuhan University Journal of Natural Sciences 11(6):1657\u20131660","journal-title":"Wuhan University Journal of Natural Sciences"},{"issue":"1","key":"8634_CR16","first-page":"161","volume":"2001","author":"OL Mangasarian","year":"2001","unstructured":"Mangasarian OL, Musciant DR (2001) Lagrangian support vector machines. J Mach Learn Res 2001(1):161\u2013177","journal-title":"J Mach Learn Res"},{"key":"8634_CR17","doi-asserted-by":"crossref","unstructured":"Mehta R, Rajpal N (2013) General regression neural network based image watermarking using fractional DCT-II Transform. IEEE international Conference on Image Information Processing (ICIIP), pp. 340\u2013345.","DOI":"10.1109\/ICIIP.2013.6707612"},{"issue":"1","key":"8634_CR18","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s13042-015-0329-6","volume":"9","author":"R Mehta","year":"2015","unstructured":"Mehta R, Rajpal N, Vishwakarma VP (2015) Robust image watermarking scheme in lifting wavelet domain using GA-LSVR hybridization. Int J Mach Learn Cybern 9(1):145\u2013161","journal-title":"Int J Mach Learn Cybern"},{"key":"8634_CR19","doi-asserted-by":"publisher","unstructured":"Mehta R, Rajpal N, Vishwakarma VP (2015) A robust and efficient image watermarking scheme based on Lagrangian SVR and lifting wavelet transform. Int J Mach Learn Cybern. https:\/\/doi.org\/10.1007\/s-13042-015-0331-z","DOI":"10.1007\/s-13042-015-0331-z"},{"issue":"3","key":"8634_CR20","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1016\/S0165-1684(98)00017-6","volume":"66","author":"N Nikolaidis","year":"1998","unstructured":"Nikolaidis N, Pitas I (1998) Robust image watermarking in the spatial domain. Signal Process 66(3):385\u2013403","journal-title":"Signal Process"},{"issue":"9","key":"8634_CR21","doi-asserted-by":"crossref","first-page":"1470","DOI":"10.1016\/j.jss.2010.03.006","volume":"83","author":"H Peng","year":"2010","unstructured":"Peng H, Wang J, Wang W (2010) Image watermarking method in multiwavelet domain based on support vector machines. The Journal of System and Software 83(9):1470\u20131477","journal-title":"The Journal of System and Software"},{"key":"8634_CR22","doi-asserted-by":"crossref","unstructured":"Petitcolas FAP (2000) Watermarking schemes evaluation. IEEE Signal Process Mag:58\u201364","DOI":"10.1109\/79.879339"},{"issue":"6","key":"8634_CR23","doi-asserted-by":"crossref","first-page":"1480","DOI":"10.1016\/j.sigpro.2011.12.006","volume":"92","author":"S Rawat","year":"2012","unstructured":"Rawat S, Raman B (2012) A blind watermarking algorithm based on fractional Fourier transform and visual cryptography. Signal Process 92(6):1480\u20131491","journal-title":"Signal Process"},{"issue":"1","key":"8634_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jss.2005.02.013","volume":"78","author":"R Shen","year":"2005","unstructured":"Shen R, Fu Y, Lu H (2005) A novel image watermarking scheme based on support vector regression. Journal of System and Software 78(1):1\u20138","journal-title":"Journal of System and Software"},{"key":"8634_CR25","doi-asserted-by":"publisher","unstructured":"Wang, S., Zhao, W., Wang, Z. (2008) A gray scale watermarking algorithm based on LU factorization.in IEEE International Conf. on Information Processing (ISIP). https:\/\/doi.org\/10.1109\/ISIP.2008.149, pp. 598-602.","DOI":"10.1109\/ISIP.2008.149"},{"key":"8634_CR26","doi-asserted-by":"crossref","unstructured":"Wu L, Deng W, Zhang J, He D (2009) Arnold transformation algorithm and anti Arnold transformation algorithm, in: Proc. of 1st International Conference on Information Science and Engineering (ICISE), pp. 1164-1167.","DOI":"10.1109\/ICISE.2009.347"},{"key":"8634_CR27","doi-asserted-by":"crossref","unstructured":"Xianghong T, Shuqin X, Li Q (2003) Watermarking for the digital images based on model of human perception. IEEE International Conference on Neural Networks & Signal Processing, pp.1509\u20131512.","DOI":"10.1109\/ICNNSP.2003.1281162"},{"issue":"3","key":"8634_CR28","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1016\/j.neunet.2009.07.002","volume":"23","author":"P Xinjun","year":"2010","unstructured":"Xinjun P (2010) TSVR: an efficient twin support vector machine for regression. Neural Newtorks 23(3):365\u2013372","journal-title":"Neural Newtorks"},{"issue":"15","key":"8634_CR29","doi-asserted-by":"crossref","first-page":"9371","DOI":"10.1007\/s11042-016-3381-7","volume":"75","author":"A Yadav","year":"2016","unstructured":"Yadav A, Mehta R, Kumar R, Vishwakarma VP (2016) Lagrangian twin support vector regression and genetic algorithm based robust grayscale image watermarking. International Journal of Multimedia Tools and Applications 75(15):9371\u20139394","journal-title":"International Journal of Multimedia Tools and Applications"},{"key":"8634_CR30","unstructured":"Yadav A, Mehta R Kumar R (2016) Lagrangian twin SVR based grayscale image watermarking using LWT-QR decomposition. Networking Communication and Data Knowledge Engineering, LNDECT, 115\u2013126."},{"key":"8634_CR31","doi-asserted-by":"publisher","unstructured":"Yao Z, Yen GG (2018) Evolving deep neural networks for movie box-office revenues prediction. IEEE Congress on Evolutionary Computation (CEC). https:\/\/doi.org\/10.1109\/CEC.2018.8477691","DOI":"10.1109\/CEC.2018.8477691"},{"key":"8634_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCYB.2019.2928174","volume":"99","author":"Z Yao","year":"2019","unstructured":"Yao Z, Yen GG, Zhang Y (2019) A knee-guided evolutionary algorithm for compressing deep neural networks. IEEE Transactions on Cybernetics 99:1\u201313. https:\/\/doi.org\/10.1109\/TCYB.2019.2928174","journal-title":"IEEE Transactions on Cybernetics"},{"key":"8634_CR33","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1088\/1742-6596\/48\/1\/131","volume":"48","author":"SQ Zhang","year":"2006","unstructured":"Zhang SQ, He N, Zang HY (2006) Research of the lifting wavelet arithmetic and applied in rotary mechanic fault diagnosis. J Phys Conf Ser 48:696\u2013700. https:\/\/doi.org\/10.1088\/1742-6596\/48\/1\/131","journal-title":"J Phys Conf Ser"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08634-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-08634-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08634-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T00:41:33Z","timestamp":1615250493000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-08634-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,9]]},"references-count":33,"journal-issue":{"issue":"25-26","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["8634"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-08634-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,9]]},"assertion":[{"value":"25 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}