{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:31:10Z","timestamp":1774449070670,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"37-38","license":[{"start":{"date-parts":[[2020,8,4]],"date-time":"2020-08-04T00:00:00Z","timestamp":1596499200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,4]],"date-time":"2020-08-04T00:00:00Z","timestamp":1596499200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s11042-020-09333-3","type":"journal-article","created":{"date-parts":[[2020,8,4]],"date-time":"2020-08-04T12:02:36Z","timestamp":1596542556000},"page":"28453-28474","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Wavelet-Hadamard based blind image watermarking using genetic algorithm and decision tree"],"prefix":"10.1007","volume":"79","author":[{"given":"Enas M. F.","family":"El Houby","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0735-3231","authenticated-orcid":false,"given":"Nisreen I. R.","family":"Yassin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,4]]},"reference":[{"issue":"5","key":"9333_CR1","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1016\/j.aeue.2007.02.010","volume":"62","author":"V Aslantas","year":"2008","unstructured":"Aslantas V (2008) A singular-value decomposition-based image watermarking using genetic algorithm. AEU-International Journal of Electronics and Communications 62(5):386\u2013394","journal-title":"AEU-International Journal of Electronics and Communications"},{"key":"9333_CR2","doi-asserted-by":"crossref","unstructured":"Bamatraf A, Ibrahim R, Salleh M, Mohd N (2011). A new digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit. arXiv preprint arXiv:11116727","DOI":"10.1109\/ICCAIE.2010.5735066"},{"key":"9333_CR3","doi-asserted-by":"crossref","unstructured":"Bassel A, Nordin MJ, Abdulkareem MB (2017) An improved robust image watermarking scheme based on the singular value decomposition and genetic algorithm. In: International Visual Informatics Conference. Springer, pp 702\u2013713","DOI":"10.1007\/978-3-319-70010-6_65"},{"key":"9333_CR4","doi-asserted-by":"crossref","unstructured":"Gen M, Cheng R (2000) Genetic algorithms and engineering optimization, vol 7. John Wiley & Sons","DOI":"10.1002\/9780470172261"},{"key":"9333_CR5","unstructured":"Han J, Pei J, Kamber M (2011) Data mining: concepts and techniques. Elsevier"},{"key":"9333_CR6","unstructured":"Holland JH (1975). Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence. University of Michigan Press Ann Arbor,"},{"key":"9333_CR7","doi-asserted-by":"crossref","unstructured":"Huang H-C, Chen Y-H (2013). Application of genetic-based wavelet packet watermarking for copyright protection. In: Recent advances in information hiding and applications. Springer, pp 139\u2013153","DOI":"10.1007\/978-3-642-28580-6_7"},{"issue":"4","key":"9333_CR8","doi-asserted-by":"publisher","first-page":"46","DOI":"10.3390\/jimaging3040046","volume":"3","author":"S Kalarikkal Pullayikodi","year":"2017","unstructured":"Kalarikkal Pullayikodi S, Tarhuni N, Ahmed A, Shiginah FB (2017) Computationally efficient robust color image watermarking using fast Walsh hadamard transform. Journal of Imaging 3(4):46","journal-title":"Journal of Imaging"},{"issue":"20","key":"9333_CR9","doi-asserted-by":"publisher","first-page":"20499","DOI":"10.1007\/s11042-016-3962-5","volume":"76","author":"B Kazemivash","year":"2017","unstructured":"Kazemivash B, Moghaddam ME (2017) A robust digital image watermarking technique using lifting wavelet transform and firefly algorithm. Multimed Tools Appl 76(20):20499\u201320524","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"9333_CR10","doi-asserted-by":"publisher","first-page":"4083","DOI":"10.1007\/s00500-017-2617-4","volume":"22","author":"B Kazemivash","year":"2018","unstructured":"Kazemivash B, Moghaddam ME (2018) A predictive model-based image watermarking scheme using regression tree and firefly algorithm. Soft Comput 22(12):4083\u20134098","journal-title":"Soft Comput"},{"key":"9333_CR11","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.displa.2018.04.002","volume":"55","author":"C Kim","year":"2018","unstructured":"Kim C, Shin D, Leng L, Yang C-N (2018) Separable reversible data hiding in encrypted halftone image. Displays 55:71\u201379","journal-title":"Displays"},{"issue":"1","key":"9333_CR12","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11554-016-0641-8","volume":"14","author":"C Kim","year":"2018","unstructured":"Kim C, Shin D, Leng L, Yang C-N (2018) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14(1):101\u2013114","journal-title":"J Real-Time Image Proc"},{"key":"9333_CR13","doi-asserted-by":"crossref","unstructured":"Kumaran T, Thangavel P (2008) Genetic algorithm based watermarking in double-density dual-tree DWT. In: Wavelet Analysis and Pattern Recognition. In: 2008. ICWAPR\u201908. International conference on. IEEE, pp 585\u2013590","DOI":"10.1109\/ICWAPR.2008.4635847"},{"issue":"1","key":"9333_CR14","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TMM.2003.819747","volume":"6","author":"D Kundur","year":"2004","unstructured":"Kundur D, Hatzinakos D (2004) Toward robust logo watermarking using multiresolution image fusion principles. IEEE Transactions on Multimedia 6(1):185\u2013198","journal-title":"IEEE Transactions on Multimedia"},{"issue":"1","key":"9333_CR15","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s11042-015-3058-7","volume":"76","author":"L Leng","year":"2017","unstructured":"Leng L, Li M, Kim C, Bi X (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76(1):333\u2013354","journal-title":"Multimed Tools Appl"},{"key":"9333_CR16","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.image.2016.04.002","volume":"45","author":"H Liu","year":"2016","unstructured":"Liu H, Xiao D, Zhang R, Zhang Y, Bai S (2016) Robust and hierarchical watermarking of encrypted images based on compressive sensing. Signal Process Image Commun 45:41\u201351","journal-title":"Signal Process Image Commun"},{"issue":"7","key":"9333_CR17","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1109\/34.192463","volume":"11","author":"SG Mallat","year":"1989","unstructured":"Mallat SG (1989) A theory for multiresolution signal decomposition: the wavelet representation. IEEE Trans Pattern Anal Mach Intell 11(7):674\u2013693","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"1","key":"9333_CR18","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s13042-015-0329-6","volume":"9","author":"R Mehta","year":"2018","unstructured":"Mehta R, Rajpal N, Vishwakarma VP (2018) Robust image watermarking scheme in lifting wavelet domain using GA-LSVR hybridization. Int J Mach Learn Cybern 9(1):145\u2013161","journal-title":"Int J Mach Learn Cybern"},{"issue":"1","key":"9333_CR19","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.jesit.2015.11.009","volume":"3","author":"N Mohananthini","year":"2016","unstructured":"Mohananthini N, Yamuna G (2016) Comparison of multiple watermarking techniques using genetic algorithms. Journal of Electrical Systems and Information Technology 3(1):68\u201380. https:\/\/doi.org\/10.1016\/j.jesit.2015.11.009","journal-title":"Journal of Electrical Systems and Information Technology"},{"issue":"11","key":"9333_CR20","doi-asserted-by":"publisher","first-page":"1726","DOI":"10.1109\/83.967400","volume":"10","author":"A Nikolaidis","year":"2001","unstructured":"Nikolaidis A, Pitas I (2001) Region-based image watermarking. IEEE Trans Image Process 10(11):1726\u20131740","journal-title":"IEEE Trans Image Process"},{"issue":"10","key":"9333_CR21","first-page":"5893","volume":"7","author":"Y-T Pai","year":"2011","unstructured":"Pai Y-T, Lee L-T, Ruan S-J (2011) DS-CDMA-based watermarking: a low-power, high-security algorithm for embedded systems. International Journal of Innovative Computing Information and Control 7(10):5893\u20135908","journal-title":"International Journal of Innovative Computing Information and Control"},{"key":"9333_CR22","unstructured":"Patil P, Bormane D (2013). DWT based invisible watermarking technique for digital images. International Journal of Engineering and Advanced Technology (IJEAT) ISSN 2249"},{"issue":"2","key":"9333_CR23","doi-asserted-by":"publisher","first-page":"138","DOI":"10.7763\/IJFCC.2013.V2.138","volume":"2","author":"MK Samee","year":"2013","unstructured":"Samee MK, G\u00f6tze J (2013) CDMA based reversible and blind watermarking scheme for images. International Journal of Future Computer and Communication 2(2):138","journal-title":"International Journal of Future Computer and Communication"},{"issue":"5","key":"9333_CR24","doi-asserted-by":"publisher","first-page":"298","DOI":"10.6029\/smartcr.2013.05.001","volume":"3","author":"MIH Sarker","year":"2013","unstructured":"Sarker MIH, Khan MI (2013) An efficient image watermarking scheme using BFS technique based on hadamard transform. SmartCR 3(5):298\u2013308","journal-title":"SmartCR"},{"issue":"5","key":"9333_CR25","first-page":"220","volume":"8","author":"A Shaamala","year":"2011","unstructured":"Shaamala A, Abdullah SM, Manaf AA (2011) Study of the effect DCT and DWT domains on the imperceptibility and robustness of genetic watermarking. International Journal of Computer Science Issues (IJCSI) 8(5):220","journal-title":"International Journal of Computer Science Issues (IJCSI)"},{"issue":"8","key":"9333_CR26","doi-asserted-by":"publisher","first-page":"2442","DOI":"10.1016\/j.asoc.2012.02.021","volume":"12","author":"H-H Tsai","year":"2012","unstructured":"Tsai H-H, Jhuang Y-J, Lai Y-S (2012) An SVD-based image watermarking in wavelet domain using SVR and PSO. Appl Soft Comput 12(8):2442\u20132453","journal-title":"Appl Soft Comput"},{"issue":"4","key":"9333_CR27","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1016\/j.patcog.2010.10.004","volume":"44","author":"H-H Tsai","year":"2011","unstructured":"Tsai H-H, Liu C-C (2011) Wavelet-based image watermarking with visibility range estimation based on HVS and neural networks. Pattern Recogn 44(4):751\u2013763","journal-title":"Pattern Recogn"},{"issue":"1","key":"9333_CR28","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TIFS.2007.916275","volume":"3","author":"TK Tsui","year":"2008","unstructured":"Tsui TK, Zhang X-P, Androutsos D (2008) Color image watermarking using multidimensional Fourier transforms. IEEE Transactions on Information Forensics and security 3(1):16\u201328","journal-title":"IEEE Transactions on Information Forensics and security"},{"key":"9333_CR29","unstructured":"USC-SIPI image database website. n.d. http:\/\/sipi.usc.edu\/database\/database.php."},{"key":"9333_CR30","doi-asserted-by":"crossref","unstructured":"Vahedi E, Lucas C, Zoroofi RA, Shiva M (2007). A bio-inspired content adaptive approach for multiresolution-based image watermarking. In: Natural Computation, 2007. ICNC. Third international conference on, 2007. IEEE, pp 58\u201362","DOI":"10.1109\/ICNC.2007.4"},{"key":"9333_CR31","doi-asserted-by":"crossref","unstructured":"Vahedi E, Lucas C, Zoroofi RA, Shiva M (2007). A new approach for image watermarking by using particle swarm optimization. In: Signal Processing and Communications, 2007. ICSPC 2007. IEEE international conference on, IEEE, pp 1383\u20131386","DOI":"10.1109\/ICSPC.2007.4728586"},{"key":"9333_CR32","doi-asserted-by":"crossref","unstructured":"Vahedi E, Zoroofi RA, Shiva M (2007). On optimal color coordinate selection for wavelet-based color image watermarking. In: Intelligent and Advanced Systems, 2007. ICIAS 2007. International conference on, IEEE, pp 635\u2013640","DOI":"10.1109\/ICIAS.2007.4658465"},{"key":"9333_CR33","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.jvcir.2015.06.001","volume":"31","author":"VS Verma","year":"2015","unstructured":"Verma VS, Jha RK, Ojha A (2015) Digital watermark extraction using support vector machine with principal component analysis based feature reduction. J Vis Commun Image Represent 31:75\u201385","journal-title":"J Vis Commun Image Represent"},{"key":"9333_CR34","unstructured":"Viswanatham VM, Reddy GS, Jagadeesh P (2012). A hybrid digital watermarking algorithm for color images based on DWT and DCT. Anale Seria Informatic\u0103 10 (2)"},{"issue":"4","key":"9333_CR35","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1016\/j.aeue.2016.01.002","volume":"70","author":"X Wang","year":"2016","unstructured":"Wang X, Shi Q, Wang S, Yang H (2016) A blind robust digital watermarking using invariant exponent moments. AEU-International Journal of Electronics and Communications 70(4):416\u2013426","journal-title":"AEU-International Journal of Electronics and Communications"},{"key":"9333_CR36","unstructured":"Wang J, Yaojin L, Wang Y (2014). Blind watermarking scheme based on support vector machine and singular value decomposition. Computer science:212\u2013215"},{"issue":"12","key":"9333_CR37","doi-asserted-by":"publisher","first-page":"3000","DOI":"10.1016\/j.sigpro.2012.05.034","volume":"92","author":"H-T Wu","year":"2012","unstructured":"Wu H-T, Huang J (2012) Reversible image watermarking on prediction errors by efficient histogram modification. Signal Process 92(12):3000\u20133009","journal-title":"Signal Process"},{"issue":"15","key":"9333_CR38","doi-asserted-by":"publisher","first-page":"9371","DOI":"10.1007\/s11042-016-3381-7","volume":"75","author":"AK Yadav","year":"2016","unstructured":"Yadav AK, Mehta R, Kumar R, Vishwakarma VP (2016) Lagrangian twin support vector regression and genetic algorithm based robust grayscale image watermarking. Multimed Tools Appl 75(15):9371\u20139394","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"9333_CR39","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1016\/j.aej.2014.07.008","volume":"53","author":"NI Yassin","year":"2014","unstructured":"Yassin NI, Salem NM, El Adawy MI (2014) QIM blind video watermarking scheme based on wavelet transform and principal component analysis. Alexandria Engineering Journal 53(4):833\u2013842","journal-title":"Alexandria Engineering Journal"},{"issue":"5","key":"9333_CR40","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1109\/TIFS.2016.2636090","volume":"12","author":"J Yu","year":"2017","unstructured":"Yu J, Zhang B, Kuang Z, Lin D, Fan J (2017) iPrivacy: image privacy protection by identifying sensitive objects via deep multi-task learning. IEEE Transactions on Information Forensics and Security 12(5):1005\u20131016","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9333_CR41","doi-asserted-by":"crossref","unstructured":"Zhang J, Gu Z, Jang J, Wu H, Stoecklin MP, Huang H, Molloy I (2018), Protecting intellectual property of deep neural networks with watermarking. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, ACM, pp 159\u2013172","DOI":"10.1145\/3196494.3196550"},{"key":"9333_CR42","doi-asserted-by":"crossref","unstructured":"Zhou X, Cao C, Ma J, Wang L (2018). Adaptive digital watermarking scheme based on support vector machines and optimized genetic algorithm mathematical problems in engineering 2018","DOI":"10.1155\/2018\/2685739"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09333-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09333-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09333-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,3]],"date-time":"2021-08-03T23:42:34Z","timestamp":1628034154000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09333-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,4]]},"references-count":42,"journal-issue":{"issue":"37-38","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["9333"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09333-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,4]]},"assertion":[{"value":"21 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"All authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}]}}