{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T21:36:15Z","timestamp":1773524175482,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,9,14]],"date-time":"2020-09-14T00:00:00Z","timestamp":1600041600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,14]],"date-time":"2020-09-14T00:00:00Z","timestamp":1600041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11042-020-09508-y","type":"journal-article","created":{"date-parts":[[2020,9,14]],"date-time":"2020-09-14T20:02:42Z","timestamp":1600113762000},"page":"2395-2411","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["2DOTS-multi-bit-encoding for robust and imperceptible image watermarking"],"prefix":"10.1007","volume":"80","author":[{"given":"Ahmed","family":"Khan","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,14]]},"reference":[{"key":"9508_CR1","doi-asserted-by":"publisher","first-page":"5531","DOI":"10.1109\/ACCESS.2017.2693438","volume":"5","author":"W Abdul","year":"2017","unstructured":"Abdul W, Ali Z, Ghouzali S, Alfawaz B, Muhammad G, Hossain MS (2017) Biometric security through visual encryption for fog edge computing. IEEE Access 5:5531\u20135538","journal-title":"IEEE Access"},{"issue":"7","key":"9508_CR2","doi-asserted-by":"publisher","first-page":"2369","DOI":"10.1007\/s00500-017-2501-2","volume":"22","author":"N Aherrahrou","year":"2018","unstructured":"Aherrahrou N, Tairi H (2018) A new image watermarking technique based on periodic plus smooth decomposition (PPSD). Soft Comput 22(7):2369\u20132379","journal-title":"Soft Comput"},{"key":"9508_CR3","doi-asserted-by":"publisher","first-page":"2136","DOI":"10.3906\/elk-162-267","volume":"25","author":"DCS Bhowal","year":"2017","unstructured":"Bhowal DCS, Biswas S, Sarkar PP (2017) A steganographic approach to hide secret data in digital audio based on XOR operands triplet property with high embedding rate and good quality audio. Turk J Electr Eng Comput Sci 25:2136\u20132148","journal-title":"Turk J Electr Eng Comput Sci"},{"issue":"19","key":"9508_CR4","doi-asserted-by":"publisher","first-page":"27211","DOI":"10.1007\/s11042-019-7448-0","volume":"78","author":"W El-Shafai","year":"2019","unstructured":"El-Shafai W, El-Rabaie S, El-Halawany MM, El-Samie FA (2019) Security of 3D-HEVC transmission based on fusion and watermarking techniques. Multimed Tools Appl 78(19):27211\u201327244","journal-title":"Multimed Tools Appl"},{"key":"9508_CR5","doi-asserted-by":"crossref","unstructured":"H Jindal, SS Kasana and S Saxena (2016). \u201cA Novel Image Zooming Technique using Wavelet Coefficients\u201d, in Book: Proceedings of International Conference on Recent Cognizance in Wireless Communication and Image Processing, pp. 1-7, Springer, New Delhi, India. [ISBN: 978-81-322-2638-3]","DOI":"10.1007\/978-81-322-2638-3_1"},{"issue":"7","key":"9508_CR6","doi-asserted-by":"publisher","first-page":"23","DOI":"10.5815\/ijigsp.2017.07.03","volume":"9","author":"S Kaur","year":"2017","unstructured":"Kaur S, Jindal H (2017) Enhanced image watermarking technique using wavelets and interpolation. International Journal of Image, Graphics and Signal Processing (IJIGSP) 9(7):23\u201335","journal-title":"International Journal of Image, Graphics and Signal Processing (IJIGSP)"},{"issue":"12","key":"9508_CR7","doi-asserted-by":"publisher","first-page":"4083","DOI":"10.1007\/s00500-017-2617-4","volume":"22","author":"B Kazemivash","year":"2018","unstructured":"Kazemivash B, Moghaddam ME (2018) A predictive model-based image watermarking scheme using regression tree and firefly algorithm. Soft Comput 22(12):4083\u20134098","journal-title":"Soft Comput"},{"issue":"19","key":"9508_CR8","doi-asserted-by":"publisher","first-page":"28111","DOI":"10.1007\/s11042-019-07932-3","volume":"78","author":"V Khanduja","year":"2019","unstructured":"Khanduja V, Chakraverty S (2019) A generic watermarking model for object relational databases. Multimed Tools Appl 78(19):28111\u201328135","journal-title":"Multimed Tools Appl"},{"key":"9508_CR9","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.displa.2018.04.002","volume":"55","author":"C Kim","year":"2018","unstructured":"Kim C, Shin D, Leng L, Yang CN (2018) Separable reversible data hiding in encrypted halftone image. Displays 55:71\u201379","journal-title":"Displays"},{"issue":"1","key":"9508_CR10","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11554-016-0641-8","volume":"14","author":"C Kim","year":"2018","unstructured":"Kim C, Shin D, Leng L, Yang CN (2018) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14(1):101\u2013114","journal-title":"J Real-Time Image Proc"},{"issue":"4","key":"9508_CR11","doi-asserted-by":"publisher","first-page":"644","DOI":"10.3390\/electronics9040644","volume":"9","author":"C Kim","year":"2020","unstructured":"Kim C, Yang CN, Leng L (2020) High-capacity data hiding for ABTC-EQ based compressed image. Electronics 9(4):644","journal-title":"Electronics"},{"issue":"19","key":"9508_CR12","doi-asserted-by":"publisher","first-page":"27085","DOI":"10.1007\/s11042-017-4743-5","volume":"78","author":"B Lei","year":"2019","unstructured":"Lei B, Zhao X, Lei H, Ni D, Chen S, Zhou F, Wang T (2019) Multipurpose watermarking scheme via intelligent method and chaotic map. Multimed Tools Appl 78(19):27085\u201327107","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"9508_CR13","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s11042-015-3058-7","volume":"76","author":"L Leng","year":"2017","unstructured":"Leng L, Li M, Kim C, Bi X (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76(1):333\u2013354","journal-title":"Multimed Tools Appl"},{"key":"9508_CR14","unstructured":"Leng, L, Zhang, J, Xu, J, Khan, MK and Alghathbar, K (2010, November). Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition. In 2010 international conference on information and communication technology convergence (ICTC) (pp. 467-471). IEEE"},{"issue":"1","key":"9508_CR15","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s00500-016-2320-x","volume":"22","author":"J Li","year":"2018","unstructured":"Li J, Lin Q, Yu C, Ren X, Li P (2018) A QDCT-and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram. Soft Comput 22(1):47\u201365","journal-title":"Soft Comput"},{"key":"9508_CR16","doi-asserted-by":"crossref","unstructured":"Liu, S, Pan, Z, Song, H (2017). \u201cDigital image watermarking method based on DCT and fractal encoding\u201d. IET Image Processing, Volume-11, Issue-10 October 2017, pp: 815\u2013821","DOI":"10.1049\/iet-ipr.2016.0862"},{"issue":"8","key":"9508_CR17","doi-asserted-by":"publisher","first-page":"17","DOI":"10.5815\/ijigsp.2017.08.03","volume":"9","author":"K Mander","year":"2017","unstructured":"Mander K, Jindal H (2017) An improved image compression decompression technique using block truncation and wavelets. International Journal of Image, Graphics and Signal Processing (IJIGSP) 9(8):17\u201329","journal-title":"International Journal of Image, Graphics and Signal Processing (IJIGSP)"},{"issue":"9","key":"9508_CR18","doi-asserted-by":"publisher","first-page":"28","DOI":"10.5815\/ijigsp.2017.05.04","volume":"5","author":"A Mittal","year":"2017","unstructured":"Mittal A, Jindal H (2017) Novelty in image reconstruction using DWT and CLAHE. International Journal of Image, Graphics and Signal Processing (IJIGSP) 5(9):28\u201334","journal-title":"International Journal of Image, Graphics and Signal Processing (IJIGSP)"},{"key":"9508_CR19","doi-asserted-by":"publisher","first-page":"644","DOI":"10.3906\/elk-1507-232","volume":"25","author":"RK Movaghar","year":"2017","unstructured":"Movaghar RK, Bizaki HK (2017) A new approach for digital image watermarking to predict optimal blocks using artificial neural networks. Turk J Electr Eng Comput Sci 25:644\u2013654","journal-title":"Turk J Electr Eng Comput Sci"},{"issue":"4","key":"9508_CR20","doi-asserted-by":"publisher","first-page":"1535","DOI":"10.1007\/s11277-018-6097-3","volume":"104","author":"R Noor","year":"2019","unstructured":"Noor R, Khan A, Sarfaraz A (2019) High performance and energy efficient image watermarking for video using a Mobile device. Wirel Pers Commun 104(4):1535\u20131551","journal-title":"Wirel Pers Commun"},{"key":"9508_CR21","doi-asserted-by":"crossref","unstructured":"Noor R, Khan A, Sarfaraz A, Mehmood Z, Cheema A M. (2019). \u201cHighly robust hybrid image watermarking approach using Tchebichef transform with secured PCA and CAT encryption\u201d, soft computing, 1-9","DOI":"10.1007\/s00500-019-03838-2"},{"issue":"19","key":"9508_CR22","doi-asserted-by":"publisher","first-page":"26885","DOI":"10.1007\/s11042-017-4362-1","volume":"78","author":"F Peng","year":"2019","unstructured":"Peng F, Long Q, Lin ZX, Long M (2019) A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates. Multimed Tools Appl 78(19):26885\u201326905","journal-title":"Multimed Tools Appl"},{"key":"9508_CR23","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TETC.2014.2385594","volume":"3","author":"G Pilato","year":"2015","unstructured":"Pilato G, Vassallo G (2015) Tsvd as a statistical estimator in the latent semantic analysis paradigm. IEEE Trans Emerg Top Comput 3:185\u2013192","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"9508_CR24","doi-asserted-by":"publisher","unstructured":"Heri Prasetyo & Chih-Hsien Hsia (2019). Multimed Tools Appl 78: 29089. https:\/\/doi.org\/10.1007\/s11042-018-6304-y","DOI":"10.1007\/s11042-018-6304-y"},{"issue":"5","key":"9508_CR25","doi-asserted-by":"publisher","first-page":"1555","DOI":"10.1007\/s00500-017-2944-5","volume":"22","author":"I Shafi","year":"2018","unstructured":"Shafi I, Noman M, Gohar M, Ahmad A, Khan M, Din S, Ahmad SH, Ahmad J (2018) An adaptive hybrid fuzzy-wavelet approach for image steganography using bit reduction and pixel adjustment. Soft Comput 22(5):1555\u20131567","journal-title":"Soft Comput"},{"issue":"19","key":"9508_CR26","doi-asserted-by":"publisher","first-page":"5693","DOI":"10.1007\/s00500-016-2146-6","volume":"21","author":"G Sheng","year":"2017","unstructured":"Sheng G, Li T, Su Q, Chen B, Tang Y (2017) Detection of content-aware image resizing based on Benford\u2019s law. Soft Comput 21(19):5693\u20135701","journal-title":"Soft Comput"},{"issue":"1","key":"9508_CR27","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s00500-017-2489-7","volume":"22","author":"Q Su","year":"2018","unstructured":"Su Q, Chen B (2018) Robust color image watermarking technique in the spatial domain. Soft Comput 22(1):91\u2013106","journal-title":"Soft Comput"},{"key":"9508_CR28","doi-asserted-by":"publisher","first-page":"3273","DOI":"10.3906\/elk-1603-17","volume":"25","author":"F Thakkar","year":"2017","unstructured":"Thakkar F, Srivastava VK (2017) A particle swarm optimization and block-SVD-based watermarking for digital images. Turk J Electr Eng Comput Sci 25:3273\u20133288","journal-title":"Turk J Electr Eng Comput Sci"},{"issue":"19","key":"9508_CR29","doi-asserted-by":"publisher","first-page":"27491","DOI":"10.1007\/s11042-019-7650-0","volume":"78","author":"M Veni","year":"2019","unstructured":"Veni M, Meyyappan T (2019) Digital image watermark embedding and extraction using oppositional fruit Fly algorithm. Multimed Tools Appl 78(19):27491\u201327510","journal-title":"Multimed Tools Appl"},{"key":"9508_CR30","first-page":"82","volume":"15","author":"P Venugopala","year":"2017","unstructured":"Venugopala P, Sarojadevi H, Chiplunkar NN (2017) An approach to embed image in video as watermark using a mobile device. Sustainable Computing: Informatics and Systems 15:82\u201387","journal-title":"Sustainable Computing: Informatics and Systems"},{"issue":"19","key":"9508_CR31","doi-asserted-by":"publisher","first-page":"27001","DOI":"10.1007\/s11042-017-4666-1","volume":"78","author":"X Wang","year":"2019","unstructured":"Wang X, Zhan Y (2019) A zero-watermarking scheme for three-dimensional mesh models based on multi-features. Multimed Tools Appl 78(19):27001\u201327028","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"9508_CR32","doi-asserted-by":"publisher","first-page":"2063","DOI":"10.1109\/TIP.2018.2795745","volume":"27","author":"YG Wang","year":"2018","unstructured":"Wang YG, Zhu G, Shi YQ (2018) Transportation spherical watermarking. IEEE Trans Image Process 27(4):2063\u20132077","journal-title":"IEEE Trans Image Process"},{"key":"9508_CR33","doi-asserted-by":"crossref","unstructured":"Wei, Q, Yin, Z, Wang, Z, Zhang, X (2017). Distortion function based on residual blocks for JPEG steganography. Multimedia tools and applications, 1-14","DOI":"10.1007\/s11042-017-5053-7"},{"issue":"19","key":"9508_CR34","doi-asserted-by":"publisher","first-page":"28003","DOI":"10.1007\/s11042-019-07902-9","volume":"78","author":"L Zhang","year":"2019","unstructured":"Zhang L, Wei D (2019) Dual DCT-DWT-SVD digital watermarking algorithm based on particle swarm optimization. Multimed Tools Appl 78(19):28003\u201328023","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09508-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09508-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09508-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T01:37:55Z","timestamp":1631583475000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09508-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,14]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9508"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09508-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,14]]},"assertion":[{"value":"30 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"No conflict of interest in this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}