{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T10:02:10Z","timestamp":1771236130969,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"29-30","license":[{"start":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T00:00:00Z","timestamp":1587945600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T00:00:00Z","timestamp":1587945600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11042-020-08715-x","type":"journal-article","created":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T10:02:46Z","timestamp":1587981766000},"page":"20897-20928","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Hamming code and logistic-map based pixel-level active forgery detection scheme using fragile watermarking"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9439-5765","authenticated-orcid":false,"given":"Shiv","family":"Prasad","sequence":"first","affiliation":[]},{"given":"Arup Kumar","family":"Pal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,27]]},"reference":[{"key":"8715_CR1","doi-asserted-by":"crossref","unstructured":"Al Sharif S, Al Ali M, Al Reqabi N, Iqbal F, Baker T, Marrington A (2016) Magec: an image searching tool for detecting forged images in forensic investigation, in 2016 8th IFIP international conference on new technologies, mobility and security (NTMS), pp 1-6. IEEE","DOI":"10.1109\/NTMS.2016.7792460"},{"key":"8715_CR2","doi-asserted-by":"crossref","unstructured":"Al-Sharif S, Iqbal F, Baker T, Khattack A (2016) White-hat hacking framework for promoting security awareness. In 2016 8th IFIP international conference on new technologies, mobility and security (NTMS), pp 1-6. IEEE","DOI":"10.1109\/NTMS.2016.7792489"},{"issue":"6","key":"8715_CR3","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1007\/s13042-015-0455-1","volume":"7","author":"I-A Ansari","year":"2015","unstructured":"Ansari I-A, Pant M, Ahn C-W (2015) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225\u20131239","journal-title":"Int J Mach Learn Cybern"},{"key":"8715_CR4","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.dsp.2017.11.005","volume":"73","author":"S Bravo-Solorio","year":"2018","unstructured":"Bravo-Solorio S, Calderon F, Li C-T, Nandi A-K (2018) Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. Digit Signal Process 73:83\u201393","journal-title":"Digit Signal Process"},{"issue":"2","key":"8715_CR5","doi-asserted-by":"publisher","first-page":"182","DOI":"10.2478\/s11772-013-0088-4","volume":"21","author":"Y-F Chang","year":"2013","unstructured":"Chang Y-F, Tail W-L (2013) A block-based watermarking scheme for image tamper detection and self-recovery. Opto-Electron Rev 21(2):182\u2013190","journal-title":"Opto-Electron Rev"},{"key":"8715_CR6","unstructured":"Chang C-C, Chen K-N,Lee C-F, Liu L-J (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 2011; 84(9): 1462\u20131470."},{"key":"8715_CR7","doi-asserted-by":"crossref","unstructured":"Hamdi D, Iqbal F, Baker T, Shah B(2016) Multimedia file signature analysis for smartphone forensics, in 2016 9th international conference on developments in eSystems engineering (DeSE), pp. 130-137. IEEE","DOI":"10.1109\/DeSE.2016.22"},{"key":"8715_CR8","doi-asserted-by":"crossref","unstructured":"He H, Zhang J, Chen F(2007) Block-wise fragile watermarking scheme based on scramble encryption. Second International Conference on Bio-Inspired Computing: Theories and Applications","DOI":"10.1109\/BICTA.2007.4806454"},{"issue":"9","key":"8715_CR9","doi-asserted-by":"publisher","first-page":"1737","DOI":"10.1016\/j.optcom.2009.12.073","volume":"283","author":"C-S Hsu","year":"2010","unstructured":"Hsu C-S, Tu S-F (2010) Probability-based tampering detection scheme for digital images. Opt Commun 283(9):1737\u20131743","journal-title":"Opt Commun"},{"key":"8715_CR10","unstructured":"Lee Y-K, Chang J-C, Wu H-L, Chen R-J (2012) An efficient fragile watermarking scheme for pixel-wise tamper detection. Sixth international conference on genetic and evolutionary computing, pp 149-152"},{"issue":"15","key":"8715_CR11","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.ins.2012.01.014","volume":"195","author":"F-D Martino","year":"2012","unstructured":"Martino F-D, Sessa S (2012) Fragile watermarking tamper detection with images compressed by fuzzy transform. Inf Sci 195(15):62\u201390","journal-title":"Inf Sci"},{"issue":"15","key":"8715_CR12","doi-asserted-by":"publisher","first-page":"16107","DOI":"10.1007\/s11042-016-3897-x","volume":"76","author":"M Nazari","year":"2017","unstructured":"Nazari M, Sharif S (2017) An improved method for digital image fragile watermarking based onchaotic maps. Multimed Tools Appl 76(15):16107\u201316123","journal-title":"Multimed Tools Appl"},{"key":"8715_CR13","first-page":"236","volume":"40","author":"Y Peng","year":"2018","unstructured":"Peng Y, Niu X, Fu L, Yin Z (2018) Image authentication scheme based on reversible fragile watermarking with two images. J Inf Secur Appl 40:236\u2013246","journal-title":"J Inf Secur Appl"},{"issue":"22","key":"8715_CR14","first-page":"1","volume":"78","author":"S Prasad","year":"2019","unstructured":"Prasad S, Pal AK (2019) A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimed Tools Appl 78(22):1\u201333","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"8715_CR15","doi-asserted-by":"publisher","first-page":"2267","DOI":"10.1007\/s11042-015-3218-9","volume":"76","author":"C Qin","year":"2017","unstructured":"Qin C, Ji P, Wang J, Chang C-C (2017) Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed Tools Appl 76(2):2267\u20132287","journal-title":"Multimed Tools Appl"},{"key":"8715_CR16","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.sigpro.2017.03.033","volume":"138","author":"C Qin","year":"2017","unstructured":"Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280\u2013229","journal-title":"Signal Process"},{"issue":"4","key":"8715_CR17","doi-asserted-by":"publisher","first-page":"728","DOI":"10.1016\/j.sigpro.2010.07.019","volume":"91","author":"S-B Solorio","year":"2011","unstructured":"Solorio S-B, Nandi A-K (2011) Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Signal Process 91(4):728\u2013739","journal-title":"Signal Process"},{"key":"8715_CR18","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.jvcir.2017.09.001","volume":"49","author":"K Sreenivas","year":"2017","unstructured":"Sreenivas K, Kamakshiprasad V (2017) Improved image tamper localisation using chaotic maps and self \u2013recovery. J Vis Commun Image Represent 49:164\u2013176","journal-title":"J Vis Commun Image Represent"},{"key":"8715_CR19","first-page":"7","volume":"2010","author":"S Suthaharan","year":"2010","unstructured":"Suthaharan S (2010) Logistic map-based fragile watermarking for pixel level tamper detection and resistance. EURASIP J Inf Secur 2010:7 (2010)","journal-title":"EURASIP J Inf Secur"},{"key":"8715_CR20","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.image.2018.03.011","volume":"65","author":"W-L Tai","year":"2018","unstructured":"Tai W-L, Liao Z-J (2018) Image self-recovery with watermark self-embedding. Signal Process Image Commun 65:11\u201325","journal-title":"Signal Process Image Commun"},{"key":"8715_CR21","unstructured":"Thar B, Asim M, MacDermott \u00c1, Iqbal F, Kamoun F, Shah B, Alfandi O, Hammoudeh M (2019) A secure fog-based platform for SCADA-based IoT critical infrastructure, Software: Practice and Experience, pp 1\u201316"},{"key":"8715_CR22","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.image.2012.12.003","volume":"28","author":"X Tong","year":"2013","unstructured":"Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28:301\u2013308","journal-title":"Signal Process Image Commun"},{"issue":"2","key":"8715_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40998-017-0021-9","volume":"41","author":"S Trivedy","year":"2017","unstructured":"Trivedy S, Pal A-K (2017) A logistic map-based fragile watermarking scheme of digital images with tamper detection. Iranian Journal of Science and Technology, Transactions of Electrical Engineering 41(2):1\u201311","journal-title":"Iranian Journal of Science and Technology, Transactions of Electrical Engineering"},{"issue":"10\u201311","key":"8715_CR24","doi-asserted-by":"publisher","first-page":"2596","DOI":"10.1016\/j.optcom.2012.02.002","volume":"285","author":"D Xiao","year":"2012","unstructured":"Xiao D, Shih F-Y (2012) An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post- processing. Opt Commun 285(10\u201311):2596\u20132606","journal-title":"Opt Commun"},{"key":"8715_CR25","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1016\/j.sigpro.2008.10.001","volume":"89","author":"X Zhang","year":"2009","unstructured":"Zhang X, Wang S (2009) Fragile watermarking scheme using a hierarchical mechanism. Signal Process 89:675\u2013679","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08715-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-08715-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08715-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T00:29:44Z","timestamp":1619483384000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-08715-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,27]]},"references-count":25,"journal-issue":{"issue":"29-30","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["8715"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-08715-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,27]]},"assertion":[{"value":"3 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}