{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T23:35:23Z","timestamp":1721864123788},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"35-36","license":[{"start":{"date-parts":[[2020,7,15]],"date-time":"2020-07-15T00:00:00Z","timestamp":1594771200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,15]],"date-time":"2020-07-15T00:00:00Z","timestamp":1594771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s11042-020-08986-4","type":"journal-article","created":{"date-parts":[[2020,7,15]],"date-time":"2020-07-15T12:02:45Z","timestamp":1594814565000},"page":"26427-26445","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Reversible Fragile Watermarking for Multichannel Images with High Redundancy Channels"],"prefix":"10.1007","volume":"79","author":[{"given":"Marco","family":"Botta","sequence":"first","affiliation":[]},{"given":"Davide","family":"Cavagnino","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Pomponiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,15]]},"reference":[{"issue":"8","key":"8986_CR1","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"AM Alattar","year":"2004","unstructured":"Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147\u20131156","journal-title":"IEEE Trans Image Process"},{"issue":"14","key":"8986_CR2","doi-asserted-by":"publisher","first-page":"2806","DOI":"10.1016\/j.optcom.2009.04.034","volume":"282","author":"V Aslantas","year":"2009","unstructured":"Aslantas V, Ozer S, Ozturk S (2009) Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms. Opt Commun 282(14):2806\u20132817","journal-title":"Opt Commun"},{"key":"8986_CR3","unstructured":"Bandyopadhyay P, Das S, Chaudhuri A, Banerjee M (2012) A new invisible color image watermarking framework through Alpha Channel. International conference on advance in engineering, science and management p 302\u2013308"},{"issue":"3","key":"8986_CR4","doi-asserted-by":"publisher","first-page":"29:1","DOI":"10.1145\/2568224","volume":"10","author":"M Botta","year":"2014","unstructured":"Botta M, Cavagnino D, Pomponiu V (2014) Protecting the content integrity of digital imagery with Fidelity preservation: an improved version. ACM trans multimedia Comput Commun Appl 10(3):29:1\u201329:5","journal-title":"ACM trans multimedia Comput Commun Appl"},{"key":"8986_CR5","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.sigpro.2015.07.018","volume":"119","author":"M Botta","year":"2016","unstructured":"Botta M, Cavagnino D, Pomponiu V (2016) A modular framework for color image watermarking. Signal Process 119:102\u2013114","journal-title":"Signal Process"},{"key":"8986_CR6","doi-asserted-by":"crossref","unstructured":"Chaumont M, Puech W (2009) A High Capacity Reversible Watermarking Scheme Proceedings of SPIE 7257","DOI":"10.1117\/12.805561"},{"key":"8986_CR7","doi-asserted-by":"crossref","unstructured":"Dworkin MJ (2015) SHA-3 standard: permutation-based hash and extendable-output functions. NIST FIPS \u2013 202","DOI":"10.6028\/NIST.FIPS.202"},{"key":"8986_CR8","unstructured":"Goldberg DE (1989) Genetic algorithms in search, Optimization and Machine Learning. Addison-Wesley Longman Publishing Co."},{"key":"8986_CR9","unstructured":"Gonzalez RC, Wintz P (1987) Digital image processing 2nd ed. Addison-Wesley Publishing Company"},{"key":"8986_CR10","first-page":"3","volume":"96","author":"A-E Hassanien","year":"2008","unstructured":"Hassanien A-E, Abraham A, Kacprzyk J, Peters JF (2008) Computational intelligence in multimedia processing: foundation and trends. Studies in Computational Intelligence 96:3\u201349","journal-title":"Studies in Computational Intelligence"},{"issue":"11","key":"8986_CR11","doi-asserted-by":"publisher","first-page":"3083","DOI":"10.1016\/j.patcog.2009.04.004","volume":"42","author":"KS Kim","year":"2009","unstructured":"Kim KS, Lee MJ, Lee HY, Lee HK (2009) Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recogn 42(11):3083\u20133096","journal-title":"Pattern Recogn"},{"issue":"1","key":"8986_CR12","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1109\/TIP.2011.2159984","volume":"21","author":"C-H Lee","year":"2012","unstructured":"Lee C-H, Tsai W-H (2012) A secret-sharing-based method for authentication of Grayscale document images via the use of the PNG image with a data repair capability. IEEE Trans Image Process 21(1):207\u2013218","journal-title":"IEEE Trans Image Process"},{"issue":"7","key":"8986_CR13","doi-asserted-by":"publisher","first-page":"2010","DOI":"10.1016\/j.sigpro.2013.01.009","volume":"93","author":"C-H Lee","year":"2013","unstructured":"Lee C-H, Tsai W-H (2013) A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding. Signal Process 93(7):2010\u20132025","journal-title":"Signal Process"},{"issue":"3","key":"8986_CR14","doi-asserted-by":"publisher","first-page":"15:1","DOI":"10.1145\/2000486.2000489","volume":"7","author":"P-Y Lin","year":"2011","unstructured":"Lin P-Y, Lee J-S, Chang C-C (2011) Protecting the content integrity of digital imagery with Fidelity preservation. ACM trans multimedia Comput Commun Appl 7(3):15:1\u201315:20","journal-title":"ACM trans multimedia Comput Commun Appl"},{"issue":"12","key":"8986_CR15","doi-asserted-by":"publisher","first-page":"3582","DOI":"10.1016\/j.patcog.2008.05.015","volume":"41","author":"C-C Lin","year":"2008","unstructured":"Lin C-C, Tai W-L, Chang C-C (2008) Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn 41(12):3582\u20133591","journal-title":"Pattern Recogn"},{"issue":"1","key":"8986_CR16","first-page":"16","volume":"5","author":"L Luo","year":"2010","unstructured":"Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Transactions on Information Forensics and Security 5(1):16\u201321","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"8986_CR17","doi-asserted-by":"publisher","first-page":"19:1","DOI":"10.1145\/2487268.2487272","volume":"9","author":"R Naskar","year":"2013","unstructured":"Naskar R, Chakraborty RS (2013) A generalized tamper localization approach for reversible watermarking algorithms. ACM trans multimedia Comput Commun Appl 9(3):19:1\u201319:22","journal-title":"ACM trans multimedia Comput Commun Appl"},{"key":"8986_CR18","first-page":"42","volume":"3332","author":"V Oktavia","year":"2004","unstructured":"Oktavia V, Lee W-H (2004) A fragile watermarking technique for image authentication using singular value decomposition. Advances in Multimedia Information Processing LNCS 3332:42\u201349","journal-title":"Advances in Multimedia Information Processing LNCS"},{"issue":"2","key":"8986_CR19","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.dsp.2010.04.006","volume":"21","author":"Z Qian","year":"2011","unstructured":"Qian Z, Feng G, Zhang X, Wang S (2011) Image self-embedding with high-quality restoration capability. Digital Signal Process 21(2):278\u2013286","journal-title":"Digital Signal Process"},{"issue":"1","key":"8986_CR20","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1007\/s11042-015-3010-x","volume":"76","author":"D Singh","year":"2017","unstructured":"Singh D, Singh SK (2017) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl 76(1):953\u2013977","journal-title":"Multimed Tools Appl"},{"key":"8986_CR21","unstructured":"Telegram.org Available online: https:\/\/telegram.org\/blog\/stickers-meet-art-and-history (accessed on September 2018)"},{"key":"8986_CR22","unstructured":"Telegram.org Available online: https:\/\/telegram.org\/blog\/moar-stickers (accessed on September 2018)"},{"issue":"8","key":"8986_CR23","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology 13(8):890\u2013896","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"3","key":"8986_CR24","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","volume":"34","author":"R-Z Wang","year":"2001","unstructured":"Wang R-Z, Lin C-F, Lin J-C (2001) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn 34(3):671\u2013683","journal-title":"Pattern Recogn"},{"issue":"4","key":"8986_CR25","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/TIFS.2011.2159208","volume":"6","author":"X Zhang","year":"2011","unstructured":"Zhang X, Qian Z, Ren Y, Feng G (2011) Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans Inf Forensics Secur 6(4):1223\u20131232","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"8986_CR26","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s11042-010-0541-z","volume":"54","author":"X Zhang","year":"2011","unstructured":"Zhang X, Wang S, Qian Z, Feng G (2011) Self-embedding watermark with flexible restoration quality. Multimed Tools Appl 54(2):385\u2013395","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"8986_CR27","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/TIP.2010.2066981","volume":"20","author":"X Zhang","year":"2011","unstructured":"Zhang X, Wang S, Qian Z, Feng G (2011) Reference sharing mechanism for watermark self-embedding. IEEE Trans Image Process 20(2):485\u2013495","journal-title":"IEEE Trans Image Process"},{"issue":"15","key":"8986_CR28","doi-asserted-by":"publisher","first-page":"5767","DOI":"10.1007\/s11042-014-1882-9","volume":"74","author":"XP Zhang","year":"2015","unstructured":"Zhang XP, Xiao YY, Zhao ZM (2015) Self-embedding fragile watermarking based on DCT and fast fractal coding. Multimed Tools Appl 74(15):5767\u20135786","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08986-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-08986-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08986-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T23:54:36Z","timestamp":1626306876000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-08986-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,15]]},"references-count":28,"journal-issue":{"issue":"35-36","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["8986"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-08986-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,15]]},"assertion":[{"value":"13 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 July 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}