{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T09:17:27Z","timestamp":1759483047685,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"31-32","license":[{"start":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T00:00:00Z","timestamp":1590710400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T00:00:00Z","timestamp":1590710400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61861209"],"award-info":[{"award-number":["61861209"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61462061"],"award-info":[{"award-number":["61462061"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100016082","name":"Department of Human Resources and Social security of Jiangxi Province","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100016082","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012259","name":"Major Discipline Academic and Technical Leaders Training Program of Jiangxi Province","doi-asserted-by":"publisher","award":["20162BCB22011"],"award-info":[{"award-number":["20162BCB22011"]}],"id":[{"id":"10.13039\/501100012259","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004479","name":"Natural Science Foundation of Jiangxi Province","doi-asserted-by":"publisher","award":["20171BAB202002"],"award-info":[{"award-number":["20171BAB202002"]}],"id":[{"id":"10.13039\/501100004479","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Cultivation Plan of Applied Research of Jiangxi Province","award":["20181BBE58022"],"award-info":[{"award-number":["20181BBE58022"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11042-020-08987-3","type":"journal-article","created":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T17:02:55Z","timestamp":1590771775000},"page":"22727-22747","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Imperceptible digital watermarking scheme combining 4-level discrete wavelet transform with singular value decomposition"],"prefix":"10.1007","volume":"79","author":[{"given":"Jun-Yun","family":"Wu","sequence":"first","affiliation":[]},{"given":"Wei-Liang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Wei-Ming","family":"Xia-Hou","sequence":"additional","affiliation":[]},{"given":"Wei-Ping","family":"Zou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1180-3023","authenticated-orcid":false,"given":"Li-Hua","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,29]]},"reference":[{"key":"8987_CR1","doi-asserted-by":"publisher","first-page":"10332","DOI":"10.1109\/ACCESS.2018.2799879","volume":"6","author":"AA Abd El-Latif","year":"2018","unstructured":"Abd El-Latif AA, Abd-El-Atty B, Hossain MS, Elmougy S, Ghoneim A (2018) Secure quantum steganography protocol for fog cloud Internet of Things. IEEE Access 6:10332\u201310340","journal-title":"IEEE Access"},{"key":"8987_CR2","doi-asserted-by":"publisher","first-page":"21075","DOI":"10.1109\/ACCESS.2018.2820603","volume":"6","author":"AA Abd El-Latif","year":"2018","unstructured":"Abd El-Latif AA, Abd-El-Atty B, Hossain MS, Rahman MA, Alamri A, Gupta BB (2018) Efficient quantum information hiding for remote medical image sharing. IEEE Access 6:21075\u201321083","journal-title":"IEEE Access"},{"key":"8987_CR3","first-page":"1073","volume":"6","author":"AA Abd El-Latif","year":"2018","unstructured":"Abd El-Latif AA, Abd-El-Atty B, Talha M (2018) Robust encryption of quantum medical images. IEEE Access: Practical Innovations. Open Solutions 6:1073\u20131081","journal-title":"Open Solutions"},{"key":"8987_CR4","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.optlastec.2013.04.018","volume":"54","author":"AA Abd El-Latif","year":"2013","unstructured":"Abd El-Latif AA, Yan XH, Li L, Wang N, Peng JL, Niu XM (2013) A new meaningful secret sharing scheme based on random grids, error diffusion and chaotic encryption. Opt Laser Technol 54:389\u2013400","journal-title":"Opt Laser Technol"},{"key":"8987_CR5","doi-asserted-by":"crossref","unstructured":"Abd El-Latif AA, Li L, Wang N, Li Q, Niu XM (2012) A new image encryption based on chaotic systems and singular value decomposition. 4th international conference on digital image processing, 2012 ICDIP, IEEE, pp 8334","DOI":"10.1117\/12.964281"},{"issue":"14","key":"8987_CR6","first-page":"3227","volume":"11","author":"A Bassel","year":"2016","unstructured":"Bassel A, Nordin M J (2016) Digital image watermark authentication using DWT-DCT. J Eng Appl Sci 11(14):3227\u20133232","journal-title":"J Eng Appl Sci"},{"key":"8987_CR7","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.optlaseng.2016.07.010","volume":"88","author":"A Belazi","year":"2017","unstructured":"Belazi A, Abd El-Latif AA, Diaconu AV, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37\u201350","journal-title":"Opt Lasers Eng"},{"key":"8987_CR8","doi-asserted-by":"crossref","unstructured":"Belazi A, Abd El-Latif AA, Rhouma R, Safya B (2015) Selective image encryption scheme based on DWT, AES S-box and chaotic permutation. 2015 International Wireless Communications and Mobile Computing Conference, IWCMC, IEEE, pp 606\u2013610","DOI":"10.1109\/IWCMC.2015.7289152"},{"issue":"14","key":"8987_CR9","doi-asserted-by":"publisher","first-page":"8695","DOI":"10.1007\/s11042-015-2786-z","volume":"75","author":"O Benrhouma","year":"2016","unstructured":"Benrhouma O, Hermassi H, Abd El-Latif AA, Belghith S (2016) Chaotic watermark for blind forgery detection in images. Multimed Tools Appl 75(14):8695\u20138718","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"8987_CR10","doi-asserted-by":"publisher","first-page":"13221","DOI":"10.1007\/s11042-016-3751-1","volume":"76","author":"WQ Cao","year":"2017","unstructured":"Cao WQ, Guan Q X, Zhao XF, Wang KR, Han JS (2017) Constructing local information feature for spatial image steganalysis. Multimed Tools Appl 76(11):13221\u201313237","journal-title":"Multimed Tools Appl"},{"key":"8987_CR11","doi-asserted-by":"crossref","unstructured":"Esgandari R, Khalili M (2015) A robust image watermarking scheme based on discrete wavelet transforms. 2015 2nd IEEE International Conference on Knowledge-Based Engineering and Innovation, pp 988\u2013992","DOI":"10.1109\/KBEI.2015.7436179"},{"issue":"4","key":"8987_CR12","first-page":"425","volume":"37","author":"AK Gupta","year":"2012","unstructured":"Gupta AK, Raval MS (2012) A robust and secure watermarking scheme based on singular values replacement. Sadhana-Acad Proc Eng Sci 37(4):425\u2013440","journal-title":"Sadhana-Acad Proc Eng Sci"},{"issue":"5","key":"8987_CR13","doi-asserted-by":"publisher","first-page":"6575","DOI":"10.1007\/s11042-016-3332-3","volume":"76","author":"HT Hu","year":"2017","unstructured":"Hu HT, Hsu LY (2017) Collective blind image watermarking in DWT-DCT domain with adaptive embedding strength governed by quality metrics. Multimed Tools Appl 76(5):6575\u20136594","journal-title":"Multimed Tools Appl"},{"issue":"16","key":"8987_CR14","doi-asserted-by":"publisher","first-page":"22727","DOI":"10.1007\/s11042-019-7560-1","volume":"78","author":"M Li","year":"2019","unstructured":"Li M, Xiao D, Zhu Y, Zhang YS, Sun L (2019) Commutative fragile zero-watermarking and encryption for image integrity protection. Multimed Tools Appl 78(16):22727\u201322742","journal-title":"Multimed Tools Appl"},{"key":"8987_CR15","doi-asserted-by":"crossref","unstructured":"Liu CY, Tang LL, Pan JS (2012) Novel fragile FRFT watermarking algorithm based on blocking method. International Conference on Computing, Measurement, Control and Sensor Network, Taiyuan, China, pp 273\u2013276","DOI":"10.1109\/CMCSN.2012.66"},{"issue":"4","key":"8987_CR16","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.ijleo.2009.12.018","volume":"122","author":"H Luo","year":"2011","unstructured":"Luo H, Yu FX, Huang ZL, Lu ZM (2011) Blind image watermarking based on discrete fractional random transform and subsampling. Opt Int J Light Electron Opt 122(4):311\u2013316","journal-title":"Opt Int J Light Electron Opt"},{"issue":"19","key":"8987_CR17","doi-asserted-by":"publisher","first-page":"26083","DOI":"10.1007\/s11042-018-5838-3","volume":"77","author":"E Moeinaddini","year":"2018","unstructured":"Moeinaddini E, Afsari F (2018) Robust Watermarking in DWT domain using SVD and opposition and dimensional based modified firefly algorithm. Multimed Tools Appl 77(19):26083\u201326105","journal-title":"Multimed Tools Appl"},{"key":"8987_CR18","doi-asserted-by":"publisher","first-page":"8881","DOI":"10.1007\/s11042-016-3514-z","volume":"76","author":"AK Singh","year":"2017","unstructured":"Singh AK (2017) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed Tools Appl 76:8881\u20138900","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"8987_CR19","doi-asserted-by":"publisher","first-page":"13001","DOI":"10.1007\/s11042-016-3706-6","volume":"76","author":"D Singh","year":"2017","unstructured":"Singh D, Singh SK (2017) DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection. Multimed Tools Appl 76(11):13001\u201313024","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"8987_CR20","first-page":"911","volume":"38","author":"RK Singh","year":"2017","unstructured":"Singh RK, Shaw DK, Sahoo J (2017) A secure and robust block based DWT-SVD image watermarking approach. J Inf Optim Sci 38(6):911\u2013925","journal-title":"J Inf Optim Sci"},{"issue":"4","key":"8987_CR21","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/s00530-014-0355-3","volume":"20","author":"XH Song","year":"2014","unstructured":"Song XH, Wang S, Abd El-Latif AA, Niu XM (2014) Dynamic watermarking scheme for quantum images based on Hadamard transform. Multimed Syst 20(4):379\u2013388","journal-title":"Multimed Syst"},{"issue":"12","key":"8987_CR22","doi-asserted-by":"publisher","first-page":"3689","DOI":"10.1007\/s11128-013-0629-2","volume":"12","author":"XH Song","year":"2013","unstructured":"Song XH, Wang S, Liu S, Abd El-Latif AA, Niu XM (2013) A dynamic watermarking scheme for quantum images using quantum wavelet transform. Quantum Inf Process 12(12):3689\u20133706","journal-title":"Quantum Inf Process"},{"issue":"12","key":"8987_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-013-1531-8","volume":"74","author":"LL Tang","year":"2015","unstructured":"Tang LL, Huang CT, Pan JS, Liu CY (2015) Dual watermarking algorithm based on the Fractional Fourier Transform. Multimed Tools Appl 74(12):1\u201317","journal-title":"Multimed Tools Appl"},{"key":"8987_CR24","doi-asserted-by":"crossref","unstructured":"Van Schyndel RG, Tirkel AZ, Osborne CF (1994) A digital watermark. In: Int. Conf. on Image Processing, Austin, Texas, USA 2(2), 86\u201390","DOI":"10.1109\/ICIP.1994.413536"},{"issue":"1","key":"8987_CR25","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s11554-016-0600-4","volume":"14","author":"C Xia","year":"2017","unstructured":"Xia C, Guan QX, Zhao XF, Zhao CD (2017) Highly accurate real-time image steganalysis based on GPU. J Real-Time Image Process 14(1):223\u2013236","journal-title":"J Real-Time Image Process"},{"key":"8987_CR26","doi-asserted-by":"publisher","first-page":"50339","DOI":"10.1109\/ACCESS.2019.2910536","volume":"7","author":"C Xia","year":"2019","unstructured":"Xia C, Wu KK, Guan QX, Tong XH, Li ZY, Xue YM (2019) Improved PHARM for JPEG steganalysis: making PHARM more efficient and effective. IEEE Access 7:50339\u201350346","journal-title":"IEEE Access"},{"issue":"21","key":"8987_CR27","doi-asserted-by":"publisher","first-page":"13779","DOI":"10.1007\/s11042-015-2922-9","volume":"75","author":"D Xiao","year":"2016","unstructured":"Xiao D, Cai HK, Wang Y, Bai S (2016) High-capacity separable data hiding in encrypted image based on compressive sensing. Multimed Tools Appl 75 (21):13779\u201313789","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"8987_CR28","doi-asserted-by":"publisher","first-page":"9265","DOI":"10.1007\/s11042-016-3532-x","volume":"76","author":"D Xiao","year":"2017","unstructured":"Xiao D, Chang YT, Xiang T, Bai S (2017) A watermarking algorithm in encrypted image based on compressive sensing with high quality image reconstruction and watermark performance. Multimed Tools Appl 76(7):9265\u20139296","journal-title":"Multimed Tools Appl"},{"issue":"18","key":"8987_CR29","doi-asserted-by":"publisher","first-page":"7729","DOI":"10.1007\/s11042-014-2017-z","volume":"74","author":"D Xiao","year":"2015","unstructured":"Xiao D, Deng MM, Zhu XY (2015) A reversible image authentication scheme based on compressive sensing. Multimed Tools Appl 74(18):7729\u20137752","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"8987_CR30","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/s11760-013-0465-y","volume":"9","author":"XH Yan","year":"2015","unstructured":"Yan XH, Wang S, Abd El-Latif AA, Niu XM (2015) New approaches for efficient information hiding-based secret image sharing schemes. Signal, Image and Video Process 9(3):499\u2013510","journal-title":"Signal, Image and Video Process"},{"key":"8987_CR31","doi-asserted-by":"crossref","unstructured":"Ye X, Chen X, Deng M, Wang YL (2015) A SIFT-based DWT-SVD blind watermark method against geometrical attacks. CISP, Bangalore, India, pp 323\u2013329","DOI":"10.1109\/CISP.2014.7003800"},{"issue":"4","key":"8987_CR32","doi-asserted-by":"publisher","first-page":"48634","DOI":"10.1007\/s11042-016-3862-8","volume":"77","author":"A Zear","year":"2018","unstructured":"Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):48634\u20134882","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"8987_CR33","doi-asserted-by":"publisher","first-page":"14093","DOI":"10.1007\/s11042-017-5016-z","volume":"77","author":"ZZ Zhao","year":"2018","unstructured":"Zhao ZZ, Guan QX, Zhao XF, Yu HB, Liu CJ (2018) Universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain. Multimed Tools Appl 77(11):14093\u201314113","journal-title":"Multimed Tools Appl"},{"issue":"23","key":"8987_CR34","doi-asserted-by":"publisher","first-page":"30251","DOI":"10.1007\/s11042-018-6128-9","volume":"77","author":"NR Zhou","year":"2018","unstructured":"Zhou NR, Xiahou WM, Wen RH, Zou WP (2018) Imperceptible digital watermarking scheme in multiple transform domains. Multimed Tools Appl 77 (23):30251\u201330267","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"8987_CR35","doi-asserted-by":"publisher","first-page":"2507","DOI":"10.1007\/s11042-018-6322-9","volume":"78","author":"NR Zhou","year":"2019","unstructured":"Zhou NR, Luo AW, Zou WP (2019) Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm. Multimed Tools Appl 78(2):2507\u20132523","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"8987_CR36","doi-asserted-by":"publisher","first-page":"77","DOI":"10.3390\/sym10030077","volume":"10","author":"X Zhou","year":"2018","unstructured":"Zhou X, Zhang H, Wang CY (2018) A Robust image watermarking technique based on DWT, APDCBT, and SVD. Symmetry-Basel 10(3):77","journal-title":"Symmetry-Basel"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08987-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-08987-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08987-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,29]],"date-time":"2021-05-29T00:02:42Z","timestamp":1622246562000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-08987-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,29]]},"references-count":36,"journal-issue":{"issue":"31-32","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["8987"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-08987-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,5,29]]},"assertion":[{"value":"14 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}