{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:31:29Z","timestamp":1771518689792,"version":"3.50.1"},"reference-count":151,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11042-020-09606-x","type":"journal-article","created":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T04:25:17Z","timestamp":1598588717000},"page":"30367-30398","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":73,"title":["Image watermarking using soft computing techniques: A comprehensive survey"],"prefix":"10.1007","volume":"80","author":[{"given":"Om Prakash","family":"Singh","sequence":"first","affiliation":[]},{"given":"A. K.","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[]},{"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"key":"9606_CR1","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.measurement.2015.06.006","volume":"74","author":"A Abbasi","year":"2015","unstructured":"Abbasi A, Woo C, Shamshirband S (2015) Robust image watermarking based on Riesz transformation and IT2FLS. Measurement 74:116\u2013129","journal-title":"Measurement"},{"key":"9606_CR2","doi-asserted-by":"crossref","unstructured":"Abdullatif M, Zeki A, Chebil J, Gunawan T (2013) Properties of digital image watermarking. In: IEEE 9th International Colloquium on Signal Processing and its Applications, Kuala Lumpur, pp 235\u2013240","DOI":"10.1109\/CSPA.2013.6530048"},{"issue":"7","key":"9606_CR3","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1016\/j.jvcir.2013.07.007","volume":"24","author":"C Agarwal","year":"2013","unstructured":"Agarwal C, Mishra A, Sharma A (2013) Gray-scale image watermarking using GA-BPN hybrid network. J Vis Commun Image Represent 24(7):1135\u20131146","journal-title":"J Vis Commun Image Represent"},{"issue":"1","key":"9606_CR4","first-page":"83","volume":"16","author":"C Agarwal","year":"2015","unstructured":"Agarwal C, Mishra A, Sharma A (2015) A novel gray-scale image watermarking using hybrid Fuzzy-BPN architecture. Egypt Inf J 16(1):83\u2013102","journal-title":"Egypt Inf J"},{"key":"9606_CR5","doi-asserted-by":"publisher","first-page":"113157","DOI":"10.1016\/j.eswa.2019.113157","volume":"146","author":"M Ahmadi","year":"2020","unstructured":"Ahmadi M, Norouzi A, Karimi N, Samavi S, Emami A (2020) ReDMark: Framework for residual diffusion watermarking based on deep networks. Expert Syst Appl 146:113157","journal-title":"Expert Syst Appl"},{"issue":"3","key":"9606_CR6","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1007\/s13198-014-0288-4","volume":"9","author":"M Ali","year":"2014","unstructured":"Ali M, Ahn C (2014) An optimal image watermarking approach through cuckoo search algorithm in wavelet domain. Int J Syst Assur Eng Manag 9(3):602\u2013611","journal-title":"Int J Syst Assur Eng Manag"},{"issue":"10","key":"9606_CR7","doi-asserted-by":"publisher","first-page":"11751","DOI":"10.1007\/s11042-017-4815-6","volume":"77","author":"M Ali","year":"2017","unstructured":"Ali M, Ahn C, Pant M (2017) An efficient lossless robust watermarking scheme by integrating distributed invariant wavelet and fractional Fourier transforms. Multimedia Tools Appl 77(10):11751\u201311773","journal-title":"Multimedia Tools Appl"},{"issue":"4","key":"9606_CR8","first-page":"393","volume":"27","author":"Y AL-Nabhani","year":"2015","unstructured":"AL-Nabhani Y, Jalab H, Wahid A, Noor R (2015) Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network. J King Saud Univ 27(4):393\u2013401","journal-title":"J King Saud Univ"},{"issue":"12","key":"9606_CR9","doi-asserted-by":"publisher","first-page":"4346","DOI":"10.3390\/s18124346","volume":"18","author":"A Alromih","year":"2018","unstructured":"Alromih A, Al-Rodhaan M, Tian Y (2018) A randomized watermarking technique for detecting malicious data injection attacks in heterogeneous wireless sensor networks for Internet of things applications. Sensors 18(12):4346","journal-title":"Sensors"},{"key":"9606_CR10","doi-asserted-by":"crossref","unstructured":"Alshanbari H (2020) Medical image watermarking for ownership & tamper detection. Multimedia Tools Appl :1\u201316","DOI":"10.1007\/s11042-020-08814-9"},{"issue":"14","key":"9606_CR11","doi-asserted-by":"publisher","first-page":"8527","DOI":"10.1007\/s11042-015-2770-7","volume":"75","author":"T Amiri","year":"2015","unstructured":"Amiri T, Moghaddam M (2015) A new visual cryptography based watermarking scheme using DWT and SIFT for multiple cover images. Multimedia Tools Appl 75(14):8527\u20138543","journal-title":"Multimedia Tools Appl"},{"key":"9606_CR12","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.comcom.2020.01.038","volume":"152","author":"A Anand","year":"2020","unstructured":"Anand A, Singh A (2020) An improved DWT-SVD domain watermarking for medical information security. Comput Commun 152:72\u201380","journal-title":"Comput Commun"},{"key":"9606_CR13","doi-asserted-by":"crossref","unstructured":"Anand A, Singh A, Lv Z, Bhatnagar G (2020) Compression-then-Encryption based Secure Watermarking Technique for Smart Healthcare System. IEEE Multi-Media, pp 1\u201310","DOI":"10.1109\/MMUL.2020.2993269"},{"key":"9606_CR14","doi-asserted-by":"crossref","unstructured":"Anita, Parmar A (2015) Image security using watermarking based on DWT-SVD and Fuzzy Logic. 4th International Conference on Reliability, Infocom Technologies and Optimization, Noida, India, pp 1\u20136","DOI":"10.1109\/ICRITO.2015.7359302"},{"issue":"5","key":"9606_CR15","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1016\/j.aeue.2007.02.010","volume":"62","author":"V Aslantas","year":"2008","unstructured":"Aslantas V (2008) A singular-value decomposition-based image watermarking using genetic algorithm. AEU - Int J Electron Commun 62(5):386\u2013394","journal-title":"AEU - Int J Electron Commun"},{"key":"9606_CR16","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/978-3-319-11933-5_16","volume":"327","author":"S Ayesha","year":"2015","unstructured":"Ayesha S, Manikandan V, Masilamani V (2015) A combined SVD-DWT watermarking scheme with multi-level compression using sampling and quantization on DCT followed by PCA. Adv Intell Syst Comput 327:141\u2013149","journal-title":"Adv Intell Syst Comput"},{"issue":"2","key":"9606_CR17","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/s10278-015-9822-4","volume":"29","author":"G Badshah","year":"2015","unstructured":"Badshah G, Liew S, Zain J, Ali M (2015) Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique. J Digit Imaging 29(2):216\u2013225","journal-title":"J Digit Imaging"},{"key":"9606_CR18","doi-asserted-by":"crossref","unstructured":"CaiZhili, Guiyan J (2008) Application of multiple SVM classifier fusion technique in freeway automatic incident detection. In: 27th Chinese Control Conference, Kunming, pp 581\u2013585","DOI":"10.1109\/CHICC.2008.4605683"},{"key":"9606_CR19","doi-asserted-by":"crossref","unstructured":"Carballeira P, Cabrera J, Ekmekcioglu E, Jaureguizar F, Garcia N (2012) Analysis of pixel-mapping rounding on geometric distortion as a prediction for view synthesis distortion. 3D TV-Conference: The True Vision Capture Transmission and Display of 3D video, Zurich, pp 1\u20134","DOI":"10.1109\/3DTV.2012.6365446"},{"issue":"21","key":"9606_CR20","doi-asserted-by":"publisher","first-page":"28483","DOI":"10.1007\/s11042-018-6005-6","volume":"77","author":"S Chouhan","year":"2018","unstructured":"Chouhan S, Kaul A, Singh U (2018) Soft computing approaches for image segmentation: a survey. Multimedia Tools Appl 77(21):28483\u201328537","journal-title":"Multimedia Tools Appl"},{"key":"9606_CR21","doi-asserted-by":"crossref","unstructured":"Dhar J, Islam M, Ullah M (2019) A fuzzy logic based contrast and edge sensitive digital image watermarking technique. SN Appl Sci 1(7)","DOI":"10.1007\/s42452-019-0731-x"},{"issue":"3","key":"9606_CR22","first-page":"60","volume":"2","author":"N Dharwadkar","year":"2010","unstructured":"Dharwadkar N, Amberker B (2010) An efficient non-blind watermarking scheme for color images using discrete wavelet transformation. Int J Comput Appl 2(3):60\u201366","journal-title":"Int J Comput Appl"},{"issue":"2","key":"9606_CR23","doi-asserted-by":"publisher","first-page":"2033","DOI":"10.1007\/s11042-016-4278-1","volume":"77","author":"E Etemad","year":"2017","unstructured":"Etemad E, Samavi S, Karimi N, Etemad M, Shirani S, Najarian K, Reza SM (2017) Robust image watermarking scheme using bit-plane ofhadamard coefficients. Multimedia Tools Appl 77(2):2033\u20132055","journal-title":"Multimedia Tools Appl"},{"key":"9606_CR24","first-page":"71","volume":"45","author":"A Fatahbeygi","year":"2019","unstructured":"Fatahbeygi A, Akhlaghian Tab F (2019) A highly robust and secure image watermarking based on classification and visual cryptography. J Inf Secur Appl 45:71\u201378","journal-title":"J Inf Secur Appl"},{"issue":"24","key":"9606_CR25","doi-asserted-by":"publisher","first-page":"4916","DOI":"10.1016\/j.optcom.2010.07.020","volume":"283","author":"O F\u0131nd\u0131k","year":"2010","unstructured":"F\u0131nd\u0131k O, Babao\u011flu \u0130, \u00dclker E (2010) A color image watermarking scheme based on hybrid classification method: Particle swarm optimization and k-nearest neighbor algorithm. Opt Commun 283(24):4916\u20134922","journal-title":"Opt Commun"},{"key":"9606_CR26","doi-asserted-by":"crossref","unstructured":"Fu Y (2013) Robust oblivious image watermarking scheme based on coefficient relation. Optic 124(6):517\u2013521","DOI":"10.1016\/j.ijleo.2011.12.042"},{"issue":"3","key":"9606_CR27","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.csi.2007.08.013","volume":"30","author":"Y Fu","year":"2008","unstructured":"Fu Y, Shen R (2008) Color image watermarking scheme based on linear discriminant analysis. Comput Stand Interfaces 30(3):115\u2013120","journal-title":"Comput Stand Interfaces"},{"key":"9606_CR28","doi-asserted-by":"crossref","unstructured":"Ganic E, Eskicioglu AM (2004) Robust DWT-SVD domain image watermarking: embedding data in all frequencies. In: Proceedings of the Workshop on Multimedia and Security, ACM, Germany, pp 166\u2013174","DOI":"10.1145\/1022431.1022461"},{"key":"9606_CR29","doi-asserted-by":"publisher","first-page":"844","DOI":"10.1007\/978-3-319-92058-0_81","volume":"10868","author":"M Ghadi","year":"2018","unstructured":"Ghadi M, Laouamer L, Nana L, Pascu A, Biskri I (2018) Performance comparison of intelligent techniques based image watermarking. Lect Notes Comput Sci 10868:844\u2013853","journal-title":"Lect Notes Comput Sci"},{"issue":"4","key":"9606_CR30","first-page":"1246","volume":"21","author":"A Ghafoor","year":"2012","unstructured":"Ghafoor A, Imran M (2012) A non-blind color image watermarking scheme resistant against geometric attacks. Radio Eng 21(4):1246\u20131251","journal-title":"Radio Eng"},{"issue":"2","key":"9606_CR31","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1080\/19361610.2017.1277878","volume":"12","author":"M Ghazvini","year":"2017","unstructured":"Ghazvini M, Hachrood E, Mirzadi M (2017) An improved image watermarking method in frequency domain. J Appl Secur Res 12(2):260\u2013275","journal-title":"J Appl Secur Res"},{"key":"9606_CR32","first-page":"290","volume":"536","author":"S Gonge","year":"2015","unstructured":"Gonge S, Ghatol A (2015) A robust and secure DWT-SVD digital image watermarking using encrypted watermark for copyright protection of cheque image. Commun Comput Inf Sci 536:290\u2013303","journal-title":"Commun Comput Inf Sci"},{"key":"9606_CR33","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/978-3-319-68385-0_8","volume":"683","author":"S Gonge","year":"2017","unstructured":"Gonge S, Ghatol A (2017) Combination of fuzzy logic digital image watermarking and advanced encryption technique for security and authentication of cheque image. Adv Intell Syst Comput 683:84\u2013101","journal-title":"Adv Intell Syst Comput"},{"key":"9606_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/313078","volume":"2014","author":"M Hajjaji","year":"2014","unstructured":"Hajjaji M, Bourennane E, Ben Abdelali A, Mtibaa A (2014) Combining haar wavelet and karhunenloeve transforms for medical images watermarking. BioMed Res Int 2014:1\u201315","journal-title":"BioMed Res Int"},{"issue":"3","key":"9606_CR35","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1049\/iet-ipr.2013.0386","volume":"8","author":"M Hamghalam","year":"2014","unstructured":"Hamghalam M, Mirzakuchaki S, Akhaee M (2014) Geometric modelling of the wavelet coefficients for image watermarking using optimum detector. IET Image Proc 8(3):162\u2013172","journal-title":"IET Image Proc"},{"key":"9606_CR36","doi-asserted-by":"crossref","unstructured":"Himanshu H, Rawat S, Raman B, Bhatnagar G (2011) DCT and SVD based new watermarking scheme. 3rd International Conference on Emerging Trends in Engineering and Technology (ICETET), Goa, India, pp 146\u2013151","DOI":"10.1109\/ICETET.2010.82"},{"key":"9606_CR37","doi-asserted-by":"crossref","unstructured":"Horng S, Rosiyadi D, Fan P, Wang X, Khan M (2013) An adaptive watermarking scheme for e-government document images. Multimedia Tools Appl 72(3):3085\u20133103","DOI":"10.1007\/s11042-013-1579-5"},{"key":"9606_CR38","doi-asserted-by":"crossref","unstructured":"Hou Y (2005) Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt Eng 44(7)","DOI":"10.1117\/1.1951647"},{"key":"9606_CR39","doi-asserted-by":"crossref","unstructured":"Huang S, Zhang W (2009) Digital watermarking based on neural network and image features. Second International Conference on Information and Computing Science, vol 2, pp 238\u2013240","DOI":"10.1109\/ICIC.2009.170"},{"key":"9606_CR40","doi-asserted-by":"crossref","unstructured":"Huang S, Zhang W, Feng W, Yang H (2008) Blind watermarking scheme based on neural network. In: Intelligent Control and Automation, Chongqing, pp 5985\u20135989","DOI":"10.1109\/WCICA.2008.4594557"},{"key":"9606_CR41","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1016\/j.future.2018.12.036","volume":"94","author":"N Hurrah","year":"2019","unstructured":"Hurrah N, Parah S, Loan N, Sheikh J, Elhoseny M, Muhammad K (2019) Dual watermarking framework for privacy protection and content authentication of multimedia. Future Gener Comput Syst 94:654\u2013673","journal-title":"Future Gener Comput Syst"},{"issue":"11","key":"9606_CR42","doi-asserted-by":"publisher","first-page":"14407","DOI":"10.1007\/s11042-017-5035-9","volume":"77","author":"M Islam","year":"2017","unstructured":"Islam M, Laskar R (2017) Geometric distortion correction based robust watermarking scheme in LWT-SVD domain with digital watermark extraction using SVM. Multimedia Tools Appl 77(11):14407\u201314434","journal-title":"Multimedia Tools Appl"},{"key":"9606_CR43","doi-asserted-by":"publisher","first-page":"1379","DOI":"10.1007\/s00521-018-3647-2","volume":"32","author":"M Islam","year":"2018","unstructured":"Islam M, Roy A, Laskar R (2018) SVM-based robust image watermarking technique in LWT domain using different sub-bands. Neural Comput Appl 32:1379\u20131403","journal-title":"Neural Comput Appl"},{"issue":"14","key":"9606_CR44","first-page":"1","volume":"73","author":"B Jagadeesh","year":"2013","unstructured":"Jagadeesh B, Kumar PR, Chenna Reddy P (2013) Robust digital image watermarking scheme in discrete wavelet transform domain using support vector machines. Int J Comput Appl 73(14):1\u20137","journal-title":"Int J Comput Appl"},{"key":"9606_CR45","doi-asserted-by":"crossref","unstructured":"Jagadeesh B, RajeshKumar P, ChennaReddy P (2015) Fuzzy inference system based robust digital image watermarking technique using discrete cosine transform. In: Proceedings of international conference on information and communication technologies (ICICT), vol 46, pp 1618\u20131625","DOI":"10.1016\/j.procs.2015.02.095"},{"issue":"4","key":"9606_CR46","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1016\/S1665-6423(14)70091-4","volume":"12","author":"O Jane","year":"2014","unstructured":"Jane O, Elba\u015fi E, \u0130lk H (2014) Hybrid non-blind watermarking based on DWT and SVD. J Appl Res Technol 12(4):750\u2013761","journal-title":"J Appl Res Technol"},{"issue":"2","key":"9606_CR47","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1117\/1.482648","volume":"7","author":"F Jordan","year":"1998","unstructured":"Jordan F (1998) Digital watermarking of color images using amplitude modulation. J Electron Imaging 7(2):326","journal-title":"J Electron Imaging"},{"key":"9606_CR48","doi-asserted-by":"crossref","unstructured":"Jun-Dong Chang B-H, Chen, Chwei-Shyong Tsai (2013) LBP-based fragile watermarking scheme for image tamper detection and recovery\u201d, International Symposium on Next-Generation Electronics, Kaohsiung, pp 173\u2013176","DOI":"10.1109\/ISNE.2013.6512330"},{"key":"9606_CR49","doi-asserted-by":"crossref","unstructured":"K S, M. K and Kora P (2020) An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomed Signal Process Control 55:1\u201315","DOI":"10.1016\/j.bspc.2019.101665"},{"key":"9606_CR50","doi-asserted-by":"crossref","unstructured":"Kasana G, Kasana S (2017) Reference based semi blind image watermarking scheme in wavelet domain. Optik 142:191\u2013204","DOI":"10.1016\/j.ijleo.2017.05.027"},{"key":"9606_CR51","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1016\/j.asoc.2018.05.023","volume":"70","author":"M Kaushal","year":"2018","unstructured":"Kaushal M, Khehra B, Sharma A (2018) Soft computing based object detection and tracking approaches: State-of-the-Art survey. Appl Soft Comput 70:423\u2013464","journal-title":"Appl Soft Comput"},{"key":"9606_CR52","doi-asserted-by":"crossref","unstructured":"Kumar S, Singh B, Yadav M (2020) A Recent survey on multimedia and database watermarking. Multimedia Tools and Applications, pp 1\u201349","DOI":"10.1007\/s11042-020-08881-y"},{"issue":"11","key":"9606_CR53","doi-asserted-by":"publisher","first-page":"3060","DOI":"10.1109\/TIM.2010.2066770","volume":"59","author":"C Lai","year":"2010","unstructured":"Lai C, Tsai C (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060\u20133063","journal-title":"IEEE Trans Instrum Meas"},{"key":"9606_CR54","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.cmpb.2018.02.021","volume":"159","author":"C Lakshmi","year":"2018","unstructured":"Lakshmi C, Thenmozhi K, Rayappan J, Amirtharajan R (2018) Encryption and watermark-treated medical image against hacking disease an immune convention in spatial and frequency domains. Comput Methods Programs Biomed 159:11\u201321","journal-title":"Comput Methods Programs Biomed"},{"issue":"19","key":"9606_CR55","doi-asserted-by":"publisher","first-page":"27085","DOI":"10.1007\/s11042-017-4743-5","volume":"78","author":"Lei","year":"2017","unstructured":"Lei et al (2017) Multipurpose watermarking scheme via intelligent method and chaotic map. Multimedia Tools Appl 78(19):27085\u201327107","journal-title":"Multimedia Tools Appl"},{"key":"9606_CR56","doi-asserted-by":"crossref","unstructured":"Li Chun-hua, L. He-fei and Lu Zheng-ding (2007) Semi-Fragile Watermarking based on SVM for Image Authentication. Multimedia and Expo, IEEE International Conference, Beijing, pp 1255\u20131258","DOI":"10.1109\/ICME.2007.4284885"},{"key":"9606_CR57","doi-asserted-by":"crossref","unstructured":"Li Chun-hua, Lu Zheng-ding, Zhou K (2005) An image watermarking technique based on support vector regression. In: IEEE International Symposium on Communications and Information Technology, vol 1, pp 183\u2013186","DOI":"10.1109\/ISCIT.2005.1566827"},{"issue":"5","key":"9606_CR58","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1016\/j.aeue.2010.06.001","volume":"65","author":"L Li","year":"2011","unstructured":"Li L, Qian J, Pan J (2011) Characteristic region based watermark embedding with RST invariance and high capacity. AEU - Int J Electron Commun 65(5):435\u2013442","journal-title":"AEU - Int J Electron Commun"},{"key":"9606_CR59","doi-asserted-by":"crossref","unstructured":"Li X, Niu D, Zhan S, Chen W (2018) Research of secret sharing digital watermarking scheme based on spread spectrum algorithm and PCA. Adv Multimedia Inf Process 11166:793\u2013803","DOI":"10.1007\/978-3-030-00764-5_73"},{"key":"9606_CR60","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.ins.2018.02.060","volume":"479","author":"D Li","year":"2019","unstructured":"Li D, Deng L, Bhooshan Gupta B, Wang H, Choi C (2019) A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf Sci 479:432\u2013447","journal-title":"Inf Sci"},{"issue":"5","key":"9606_CR61","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TMM.2008.922795","volume":"10","author":"W-H Lin","year":"2008","unstructured":"Lin W-H, Horng S-J, Kao T-W, Fan P, Lee C-L, Pan Y (2008) An Efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimedia 10(5):746\u2013757","journal-title":"IEEE Trans Multimedia"},{"issue":"1","key":"9606_CR62","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/TIFS.2009.2035975","volume":"5","author":"Z LixinLuo","year":"2010","unstructured":"LixinLuo Z, Chen M, Chen X, Zeng, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Trans Inf Forensics Secur 5(1):187\u2013193","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9606_CR63","doi-asserted-by":"publisher","first-page":"19876","DOI":"10.1109\/ACCESS.2018.2808172","volume":"6","author":"N Loan","year":"2018","unstructured":"Loan N, Hurrah N, Parah S, Lee J, Sheikh J, Bhat G (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6:19876\u201319897","journal-title":"IEEE Access"},{"issue":"1","key":"9606_CR64","doi-asserted-by":"publisher","first-page":"45","DOI":"10.2478\/s11772-014-0177-z","volume":"22","author":"K Loukhaoukha","year":"2014","unstructured":"Loukhaoukha K, Nabti M, Zebbiche K (2014) A robust SVD-based image watermarking using a multi-objective particle swarm optimization. Opto-Electron Rev 22(1):45\u201354","journal-title":"Opto-Electron Rev"},{"issue":"1","key":"9606_CR65","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1049\/iet-ipr.2014.0965","volume":"10","author":"N Makbol","year":"2016","unstructured":"Makbol N, Khoo B, Rassem T (2016) Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Proc 10(1):34\u201352","journal-title":"IET Image Proc"},{"issue":"5","key":"9606_CR66","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1109\/41.538609","volume":"43","author":"K Man","year":"1996","unstructured":"Man K, Tang K, Kwong S (1996) Genetic algorithms: concepts and applications [in engineering design]. IEEE Trans Industr Electron 43(5):519\u2013534","journal-title":"IEEE Trans Industr Electron"},{"key":"9606_CR67","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1016\/j.compeleceng.2018.03.007","volume":"72","author":"V Manikandan","year":"2018","unstructured":"Manikandan V, Masilamani V (2018) Histogram shifting-based blind watermarking scheme for copyright protection in 5G. Comput Electr Eng 72:614\u2013630","journal-title":"Comput Electr Eng"},{"key":"9606_CR68","unstructured":"Nakamoto M, Fujimoto S, Doi A, Hinamoto T (2008) Genetic algorithm approach for wavelet-based image watermarking. 9th International Conference on Signal Processing, Beijing, pp 5\u20138"},{"key":"9606_CR69","doi-asserted-by":"crossref","unstructured":"Meng F, Peng H, Pei Z, Wang J (2008) A novel blind image watermarking scheme based on SVM in DCT Domain. International Conference on Computational Intelligence and Security, Suzhou, pp 16\u201320","DOI":"10.1109\/CIS.2008.20"},{"key":"9606_CR70","doi-asserted-by":"crossref","unstructured":"Mingzhi C, Yan L, Yajian Z, Min L (2013) A combined DWT and DCT watermarking scheme optimized using genetic algorithm. J Multimedia 8(3)","DOI":"10.4304\/jmm.8.3.299-305"},{"issue":"3","key":"9606_CR71","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MCE.2017.2684980","volume":"6","author":"S Mohanty","year":"2017","unstructured":"Mohanty S, Sengupta A, Guturu P, Kougianos E (2017) Everything you want to know about watermarking: from paper marks to hardware protection: from paper marks to hardware protection. IEEE Consum Electron Mag 6(3):83\u201391","journal-title":"IEEE Consum Electron Mag"},{"key":"9606_CR72","doi-asserted-by":"crossref","unstructured":"Moosazadeh M, Andalib A (2016) A new robust color digital image watermarking algorithm in DCT domain using genetic algorithm and coefficients exchange approach\u201d, Second International Conference on Web Research (ICWR), Tehran, pp 19\u201324","DOI":"10.1109\/ICWR.2016.7498441"},{"issue":"2","key":"9606_CR73","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TIT.2012.2222345","volume":"59","author":"I Naiss","year":"2013","unstructured":"Naiss I, Permuter H (2013) Computable bounds for rate distortion with feed forward for stationary and ergodic sources. IEEE Trans Inf Theory 59(2):760\u2013781","journal-title":"IEEE Trans Inf Theory"},{"key":"9606_CR74","doi-asserted-by":"crossref","unstructured":"Pandey H (2020) Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography. Future Gener Comput Syst 111:213\u2013225","DOI":"10.1016\/j.future.2020.04.034"},{"issue":"3","key":"9606_CR75","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s40747-016-0023-7","volume":"2","author":"G Papakostas","year":"2016","unstructured":"Papakostas G, Tsougenis E, Koulouriotis D (2016) Fuzzy knowledge-based adaptive image watermarking by the method of moments. Complex Intell Syst 2(3):205\u2013220","journal-title":"Complex Intell Syst"},{"issue":"8","key":"9606_CR76","doi-asserted-by":"publisher","first-page":"1470","DOI":"10.1016\/j.jss.2010.03.006","volume":"83","author":"H Peng","year":"2010","unstructured":"Peng H, Wang J, Wang W (2010) Image watermarking method in multi-wavelet domain based on support vector machines. J Syst Softw 83(8):1470\u20131477","journal-title":"J Syst Softw"},{"key":"9606_CR77","doi-asserted-by":"crossref","unstructured":"Pourhadi A, Mahdavi-Nasab H (2020) A robust digital image watermarking scheme based on bat algorithm optimization and SURF detector in SWT domain. Multimedia Tools Appl :1\u201325","DOI":"10.1007\/s11042-020-08960-0"},{"key":"9606_CR78","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1016\/j.protcy.2012.10.109","volume":"6","author":"C Pradhan","year":"2012","unstructured":"Pradhan C, Rath S, Bisoi A (2012) Non blind digital watermarking technique using DWT and cross chaos. Procedia Technol 6:897\u2013904","journal-title":"Procedia Technol"},{"key":"9606_CR79","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.cosrev.2017.11.003","volume":"27","author":"A Qasim","year":"2018","unstructured":"Qasim A, Meziane F, Aspin R (2018) Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review. Comput Sci Rev 27:45\u201360","journal-title":"Comput Sci Rev"},{"issue":"18","key":"9606_CR80","doi-asserted-by":"publisher","first-page":"18605","DOI":"10.1007\/s11042-016-4215-3","volume":"76","author":"A Rai","year":"2010","unstructured":"Rai A, Singh H (2010) SVM based robust watermarking for enhanced medical image security. Multimedia Tools Appl 76(18):18605\u201318618","journal-title":"Multimedia Tools Appl"},{"issue":"1","key":"9606_CR81","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1515\/jisys-2017-0068","volume":"27","author":"A Rai","year":"2018","unstructured":"Rai A, Singh H (2018) Machine learning-based robust watermarking technique for medical image transmitted over LTE network. J Intell Syst 27(1):105\u2013114","journal-title":"J Intell Syst"},{"key":"9606_CR82","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.sigpro.2020.107556","volume":"172","author":"D Rajani","year":"2020","unstructured":"Rajani D, Kumar P (2020) An optimized blind watermarking scheme based on principal component analysis in redundant discrete wavelet domain. Sig Process 172:1\u20139","journal-title":"Sig Process"},{"key":"9606_CR83","doi-asserted-by":"crossref","unstructured":"Rakhmawati L, Wirawan W, Suwadi S (2019) A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability. EURASIP J Image Video Process","DOI":"10.1186\/s13640-019-0462-3"},{"key":"9606_CR84","first-page":"137","volume":"5","author":"N Ramamurthy","year":"2012","unstructured":"Ramamurthy N, Varadarajan S (2012) Robust digital image watermarking using quantization and back propagation neural network. Contemp Eng Sci 5:137\u2013147","journal-title":"Contemp Eng Sci"},{"key":"9606_CR85","doi-asserted-by":"crossref","unstructured":"Ramanjaneyulu K, Rajarajeswari K (2012) Wavelet-based oblivious image watermarking scheme using genetic algorithm. IET Image Process 6(4):364","DOI":"10.1049\/iet-ipr.2010.0347"},{"key":"9606_CR86","first-page":"445","volume":"2","author":"DK Ramanjaneyulu","year":"2013","unstructured":"Ramanjaneyulu DK, Pandarinath DP, Reddy BR (2013) Robust and oblivious watermarking based on swapping of DCT coefficients. Int J Appl Innov Eng Manag 2:445\u2013452","journal-title":"Int J Appl Innov Eng Manag"},{"key":"9606_CR87","doi-asserted-by":"crossref","unstructured":"Ramly S, Aljunid S, Shaker Hussain H (2011) SVM-SS Watermarking Model for Medical Images. Commun Comput Inf Sci 194:372\u2013386","DOI":"10.1007\/978-3-642-22603-8_34"},{"key":"9606_CR88","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.compbiomed.2016.03.020","volume":"72","author":"D Ravichandran","year":"2016","unstructured":"Ravichandran D, Praveenkumar P, BalaguruRayappan JB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Computional Biol Med 72:170\u2013184","journal-title":"Computional Biol Med"},{"issue":"6","key":"9606_CR89","doi-asserted-by":"publisher","first-page":"1480","DOI":"10.1016\/j.sigpro.2011.12.006","volume":"92","author":"S Rawat","year":"2012","unstructured":"Rawat S, Raman B (2012) A blind watermarking algorithm based on fractional Fourier transform and visual cryptography. Sig Process 92(6):1480\u20131491","journal-title":"Sig Process"},{"key":"9606_CR90","doi-asserted-by":"crossref","unstructured":"Reddy M, Sandeep P, Mounika C, Gopi J, Suganya S (2017) Optimized watermarking technique using PCA-DWT and log filter\u201d, International Conference on Networks & Advances in Computational Technologies, Trivandrum (India) pp 126\u2013130","DOI":"10.1109\/NETACT.2017.8076754"},{"issue":"3","key":"9606_CR91","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MMUL.2011.41","volume":"19","author":"D Rosiyadi","year":"2012","unstructured":"Rosiyadi D, Horng S-J, Fan P, Wang X, Khan MK, Pan Y (2012) An efficient copyright protection scheme for e-government document images. IEEE Multimedia 19(3):62\u201373","journal-title":"IEEE Multimedia"},{"key":"9606_CR92","doi-asserted-by":"crossref","unstructured":"Rubio-Hernan J, De Cicco L, Garcia-Alfaro J (2017) On the use of watermark-based schemes to detect cyber-physical attacks. EURASIP J Inf Secur, 2017(1)","DOI":"10.1186\/s13635-017-0060-9"},{"key":"9606_CR93","unstructured":"Sakr N, Zhao J, Groza V (2005) A dynamic fuzzy logic approach to adaptive HVS-based watermarking\u201d, In: Proceedings of IEEE international workshop on haptic audio visual environments and their applications, Ottawa, Canada, pp 121\u2013126"},{"issue":"3","key":"9606_CR94","first-page":"218","volume":"4","author":"A Sameh Oueslati","year":"2010","unstructured":"Sameh Oueslati A, Cherif B, Solaiman (2010) A fuzzy watermarking approach based on the human visual system. Int J Image Process 4(3):218\u2013231","journal-title":"Int J Image Process"},{"key":"9606_CR95","doi-asserted-by":"crossref","unstructured":"Sangeetha N, Anita X (2017) Linear weighted watermarking using normalized principal components. Complex Intell Syst 4(3):181\u2013193","DOI":"10.1007\/s40747-017-0065-5"},{"issue":"1","key":"9606_CR96","doi-asserted-by":"publisher","first-page":"8","DOI":"10.7763\/IJCEE.2011.V3.285","volume":"3","author":"V Santhi","year":"2011","unstructured":"Santhi V, Thangavelu A (2011) DC coefficients based watermarking technique for color images using singular value decomposition. Int J Comput Electron Eng 3(1):8\u201316","journal-title":"Int J Comput Electron Eng"},{"key":"9606_CR97","first-page":"61","volume":"24","author":"MM Sathik","year":"2010","unstructured":"Sathik MM, Sujatha S (2010) An improved invisible watermarking technique for image authentication. Int J Adv Sci Technol 24:61\u201374","journal-title":"Int J Adv Sci Technol"},{"key":"9606_CR98","doi-asserted-by":"crossref","unstructured":"Senthilkumaran N, Rajesh R (2009) Image segmentation-a survey of soft computing approaches. In: International Conference on Advances in Recent Technologies in Communication and Computing, Kottayam, Kerala, India, pp 844\u2013846","DOI":"10.1109\/ARTCom.2009.219"},{"key":"9606_CR99","doi-asserted-by":"crossref","unstructured":"Sharma D, Aggrawal A (2016) Robust watermarking scheme based on discrete wavelet transform and visual hided scheme. Int J Advancements Technol 7(3)","DOI":"10.4172\/0976-4860.1000161"},{"key":"9606_CR100","doi-asserted-by":"crossref","unstructured":"Sharma V, Mir R (2019) An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm. J King Saud Univ Comput Inf Sci :1\u201312","DOI":"10.1016\/j.jksuci.2019.03.009"},{"issue":"1","key":"9606_CR101","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jss.2005.02.013","volume":"78","author":"R Shen","year":"2005","unstructured":"Shen R, Fu Y, Lu H (2005) A novel image watermarking scheme based on support vector regression. J Syst Softw 78(1):1\u20138","journal-title":"J Syst Softw"},{"issue":"7","key":"9606_CR102","first-page":"1749","volume":"9","author":"H Shi","year":"2014","unstructured":"Shi H, Lv F, Cao Y (2014) A blind watermarking technique for color image based on SVD with circulation. J Softw 9(7):1749\u20131756","journal-title":"J Softw"},{"issue":"3","key":"9606_CR103","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1016\/j.patcog.2003.07.003","volume":"37","author":"CS Shieh","year":"2004","unstructured":"Shieh CS, Huang HC, Wang FH, Pan JS (2004) Genetic watermarking based on transform-domain technique. Pattern Recog 37(3):555\u2013565","journal-title":"Pattern Recog"},{"issue":"3","key":"9606_CR104","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1016\/j.patcog.2003.07.003","volume":"37","author":"C Shieh","year":"2004","unstructured":"Shieh C, Huang H, Wang F, Pan J (2004) Genetic watermarking based on transform-domain techniques. Pattern Recogn 37(3):555\u2013565","journal-title":"Pattern Recogn"},{"issue":"6","key":"9606_CR105","doi-asserted-by":"publisher","first-page":"8881","DOI":"10.1007\/s11042-016-3514-z","volume":"76","author":"A Singh","year":"2016","unstructured":"Singh A (2016) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimedia Tools Appl 76(6):8881\u20138900","journal-title":"Multimedia Tools Appl"},{"issue":"2","key":"9606_CR106","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MITP.2019.2961898","volume":"22","author":"A Singh","year":"2020","unstructured":"Singh A, Kumar C (2020) Encryption-then-compression-based copyright protection scheme for E-governance. IT Prof 22(2):45\u201352","journal-title":"IT Prof"},{"issue":"11","key":"9606_CR107","doi-asserted-by":"publisher","first-page":"13001","DOI":"10.1007\/s11042-016-3706-6","volume":"76","author":"D Singh","year":"2016","unstructured":"Singh D, Singh S (2016) DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection. Multimedia Tools Appl 76(11):13001\u201313024","journal-title":"Multimedia Tools Appl"},{"key":"9606_CR108","doi-asserted-by":"crossref","unstructured":"Singh A, Sharma N, Dave M, Mohan A (2012) A novel technique for digital image watermarking in spatial domain. In: (2012) 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, Solan, H.P, India, pp 497\u2013501","DOI":"10.1109\/PDGC.2012.6449871"},{"key":"9606_CR109","doi-asserted-by":"crossref","unstructured":"Singh A, Kumar B, Singh G, Mohan A (2017) Digital image watermarking: concepts and applications. Medical Image Watermarking, Springer, Berlin. pp 1\u201312. ISBN: 978-3319576985","DOI":"10.1007\/978-3-319-57699-2_1"},{"key":"9606_CR110","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.future.2016.11.023","volume":"86","author":"A Singh","year":"2018","unstructured":"Singh A, Kumar B, Singh S, Ghrera S, Mohan A (2018) Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network. Future Gener Comput Syst 86:926\u2013939","journal-title":"Future Gener Comput Syst"},{"issue":"13","key":"9606_CR111","first-page":"16","volume":"74","author":"T Sridevi","year":"2013","unstructured":"Sridevi T, Sameena Fathima S (2013) Digital image watermarking using fuzzy logic approach based on DWT and SVD. Int J Comput Appl 74(13):16\u201320","journal-title":"Int J Comput Appl"},{"key":"9606_CR112","first-page":"6","volume":"1","author":"T Sridevi","year":"2013","unstructured":"Sridevi T, Sameena Fatima S (2013) Digital image watermarking using fuzzy logic approach based on DWT and SVD. Int J Comput Appl 1:6\u201320","journal-title":"Int J Comput Appl"},{"key":"9606_CR113","doi-asserted-by":"crossref","unstructured":"Su Q, Chen B (2017) Robust color image watermarking technique in the spatial domain. Soft Comput 22(1):91\u2013106","DOI":"10.1007\/s00500-017-2489-7"},{"key":"9606_CR114","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/978-81-322-2135-7_3","volume":"325","author":"R Sukanesh","year":"2014","unstructured":"Sukanesh R, Karthikeyan N (2014) High payload reversible watermarking for securing medical images in a cloud environment. Adv Intell Syst Comput 325:17\u201324","journal-title":"Adv Intell Syst Comput"},{"key":"9606_CR115","doi-asserted-by":"crossref","unstructured":"Sundararajan M, Yamuna G (2018) Optimization of colour image watermarking using area of best fit equation and cuckoo search algorithm 5(1):1138\u20131146","DOI":"10.1016\/j.matpr.2017.11.194"},{"key":"9606_CR116","first-page":"477","volume":"1101","author":"M Swain","year":"2020","unstructured":"Swain M, Swain D, Paikaray B (2020) A competitive analysis on digital image tamper detection and its secure recovery techniques using watermarking. Mach Learn Inf Process 1101:477\u2013484","journal-title":"Mach Learn Inf Process"},{"issue":"11","key":"9606_CR117","first-page":"50","volume":"10","author":"T Takore","year":"2018","unstructured":"Takore T, Kumar P, Devi G (2018) A new robust and imperceptible image watermarking scheme based on hybrid transform and PSO. Int J Intell Syst Appl 10(11):50\u201363","journal-title":"Int J Intell Syst Appl"},{"key":"9606_CR118","doi-asserted-by":"crossref","unstructured":"TalatNaheed I, Usman TM.Khan AmirHDar, Farhan M (2014) Intelligent reversible watermarking technique in medical images using GA and PSO 125(11):2515\u20132525","DOI":"10.1016\/j.ijleo.2013.10.124"},{"issue":"1","key":"9606_CR119","first-page":"117","volume":"4","author":"S Tamane","year":"2012","unstructured":"Tamane S (2012) Blind 3D model watermarking based on multi-resolution representation and fuzzy logic. Int J Comput Sci Inf Technol 4(1):117\u2013126","journal-title":"Int J Comput Sci Inf Technol"},{"key":"9606_CR120","doi-asserted-by":"crossref","unstructured":"Tanwar L, Panda J (2018) Review of different transforms used in digital image watermarking. In: 2nd IEEE International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES), Delhi, India, pp 1165\u20131171","DOI":"10.1109\/ICPEICES.2018.8897456"},{"key":"9606_CR121","doi-asserted-by":"crossref","unstructured":"Thakur S, Singh A, Ghrera S, Dave M (2018) Watermarking techniques and its applications in tele-health: A technical survey. In: S Ramakrishnan(eds) Cryptographic and Information Security Approaches for Images and Videos, CRC Press, Boca Raton, pp 467\u2013508","DOI":"10.1201\/9780429435461-17"},{"issue":"2","key":"9606_CR122","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1016\/j.ins.2006.05.002","volume":"177","author":"H Tsai","year":"2007","unstructured":"Tsai H, Sun D (2007) Color image watermark extraction based on support vector machines. Inf Sci 177(2):550\u2013569","journal-title":"Inf Sci"},{"issue":"8","key":"9606_CR123","doi-asserted-by":"publisher","first-page":"2442","DOI":"10.1016\/j.asoc.2012.02.021","volume":"12","author":"H Tsai","year":"2012","unstructured":"Tsai H, Jhuang Y, Lai Y (2012) An SVD-based image watermarking in wavelet domain using SVR and PSO. Appl Soft Comput 12(8):2442\u20132453","journal-title":"Appl Soft Comput"},{"key":"9606_CR124","unstructured":"Vafaei M, Mahdavi-Nasab H, Pourghassem H. A new robust blind watermarking method based on neural networks in wavelet transform domain. World Appl Sci J 22(11):1572\u20131580"},{"key":"9606_CR125","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1016\/j.compeleceng.2017.12.029","volume":"70","author":"S Vairaprakash","year":"2018","unstructured":"Vairaprakash S, Shenbagavalli A (2018) A Discrete Rajan Transform-based robustness improvement encrypted watermark scheme backed by Support Vector Machine. Comput Electr Eng 70:826\u2013843","journal-title":"Comput Electr Eng"},{"key":"9606_CR126","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.jvcir.2015.06.001","volume":"31","author":"V Verma","year":"2015","unstructured":"Verma V, Jha R, Ojha A (2015) Digital watermark extraction using support vector machine with principal component analysis based feature reduction. J Vis Commun Image Represent 31:75\u201385","journal-title":"J Vis Commun Image Represent"},{"issue":"21","key":"9606_CR127","doi-asserted-by":"publisher","first-page":"8184","DOI":"10.1016\/j.eswa.2015.06.041","volume":"42","author":"V Verma","year":"2015","unstructured":"Verma V, Jha R, Ojha A (2015) Significant region based robust watermarking scheme in lifting wavelet transform domain. Expert Syst Appl 42(21):8184\u20138197","journal-title":"Expert Syst Appl"},{"issue":"1","key":"9606_CR128","first-page":"147","volume":"8","author":"J Waleed","year":"2015","unstructured":"Waleed J, Jun HD, Hameed S, Kamil M (2015) Optimal positions selection for watermark inclusion based on a nature inspired algorithm. Int J Signal Process Image Process Pattern Recog 8(1):147\u2013160","journal-title":"Int J Signal Process Image Process Pattern Recog"},{"key":"9606_CR129","doi-asserted-by":"crossref","unstructured":"Wang F, Song W, Hou J (2008) Regression of SVM based robust watermarking algorithm. 9th International Conference on Signal Processing, Beijing, pp 2197\u20132200","DOI":"10.1109\/ICOSP.2008.4697584"},{"issue":"5","key":"9606_CR130","doi-asserted-by":"publisher","first-page":"9056","DOI":"10.1016\/j.eswa.2008.12.040","volume":"36","author":"X Wang","year":"2009","unstructured":"Wang X, Xu Z, Yang H (2009) A robust image watermarking algorithm using SVR detection. Expert Syst Appl 36(5):9056\u20139064","journal-title":"Expert Syst Appl"},{"issue":"2","key":"9606_CR131","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1016\/j.asoc.2011.10.003","volume":"12","author":"X Wang","year":"2012","unstructured":"Wang X, Miao E, Yang H (2012) A new SVM-based image watermarking using Gaussian-Hermite moments. Appl Soft Comput 12(2):887\u2013903","journal-title":"Appl Soft Comput"},{"key":"9606_CR132","doi-asserted-by":"crossref","unstructured":"Wang X, Liu Y, Xu H, Wang A, Yang H (2016) Blind optimum detector for robust image watermarking in non-subsampled shearlet Domain. Inf Sci 372:634\u2013654","DOI":"10.1016\/j.ins.2016.08.076"},{"key":"9606_CR133","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/s00500-008-0331-y","volume":"13","author":"XB Wen","year":"2009","unstructured":"Wen XB, Zhang H, Xu XQ, Quan JJ (2009) \u201cA new watermarking approach based on probabilistic neural network in wavelet-domain\u201d. Soft Comput 13:355\u2013360","journal-title":"Soft Comput"},{"issue":"2","key":"9606_CR134","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1016\/j.asoc.2012.09.028","volume":"13","author":"X Wu","year":"2013","unstructured":"Wu X, Sun W (2013) Robust copyright protection scheme for digital images using overlapping DCT and SVD. Appl Soft Comput 13(2):1170\u20131182","journal-title":"Appl Soft Comput"},{"issue":"11","key":"9606_CR135","doi-asserted-by":"publisher","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensic Secur 11(11):2594\u20132608","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"9606_CR136","first-page":"62","volume":"19","author":"Y Xing","year":"2010","unstructured":"Xing Y, Tan J (2010) A color image watermarking scheme resistant against geometrical attacks. Radio Eng 19:62\u201367","journal-title":"Radio Eng"},{"key":"9606_CR137","doi-asserted-by":"publisher","first-page":"177","DOI":"10.4236\/wjet.2015.33C026","volume":"3","author":"X Xiong","year":"2015","unstructured":"Xiong X (2015) A new robust color image watermarking scheme based on 3D-DCT. World Junior Eng Technol 3:177\u2013183","journal-title":"World Junior Eng Technol"},{"key":"9606_CR138","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1016\/j.procs.2018.05.098","volume":"132","author":"J Yadav","year":"2018","unstructured":"Yadav J, Sehra K (2018) Large scale dual tree complex wavelet transform based robust features in PCA and SVD subspace for digital image watermarking. Procedia Comput Sci 132:863\u2013872","journal-title":"Procedia Comput Sci"},{"issue":"3","key":"9606_CR139","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1016\/j.compeleceng.2012.07.009","volume":"39","author":"H Yang","year":"2013","unstructured":"Yang H, Wang X, Wang C (2013) A robust digital watermarking algorithm in undecimated discrete wavelet transform domain. Comput Electr Eng 39(3):893\u2013906","journal-title":"Comput Electr Eng"},{"key":"9606_CR140","doi-asserted-by":"crossref","unstructured":"Yang H, Wang X, Zhang Y, M. E (2013) Robust digital watermarking in PDTDFB domain based on least squares support vector machine. Eng Appl Artif Intell 26(9):2058\u20132072","DOI":"10.1016\/j.engappai.2013.04.014"},{"key":"9606_CR141","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-030-37352-8_23","volume":"11983","author":"J Yang","year":"2019","unstructured":"Yang J, Cao C, Zhang J, Ma J, Zhou X (2019) A blind watermarking scheme using adaptive neuro-fuzzy inference system optimized by BP network and LS learning model. Cyberspace Saf Secur 11983:263\u2013274","journal-title":"Cyberspace Saf Secur"},{"issue":"16","key":"9606_CR142","doi-asserted-by":"publisher","first-page":"9745","DOI":"10.1007\/s11042-015-2718-y","volume":"75","author":"C Yen","year":"2015","unstructured":"Yen C, Huang Y (2015) Frequency domain digital watermark recognition using image code sequences with a back-propagation neural network. Multimedia Tools Appl 75(16):9745\u20139755","journal-title":"Multimedia Tools Appl"},{"issue":"3","key":"9606_CR143","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1016\/S0165-1684(00)00239-5","volume":"81","author":"P Yu","year":"2001","unstructured":"Yu P, Tsai H, Lin J (2001) Digital watermarking based on neural networks for color images. Sig Process 81(3):663\u2013671","journal-title":"Sig Process"},{"key":"9606_CR144","doi-asserted-by":"crossref","unstructured":"Yuan Y, Huang D, Liu D (2006) An integer wavelet based multiple logo-watermarking scheme. First Inter- national Multi-Symposiums on Computer and Computational Sciences (IMSCCS), vol 2, pp 175\u2013179","DOI":"10.1109\/IMSCCS.2006.187"},{"issue":"4","key":"9606_CR145","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1007\/s11042-016-3862-8","volume":"77","author":"A Zear","year":"2016","unstructured":"Zear A, Singh A, Kumar P (2016) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools Appl 77(4):4863\u20134882","journal-title":"Multimedia Tools Appl"},{"issue":"1\/2","key":"9606_CR146","first-page":"20","volume":"9","author":"A Zear","year":"2017","unstructured":"Zear A, Singh A, Kumar P (2017) Robust watermarking technique using back propagation neural network: a security protection mechanism for social applications. Int J Inform Comput Secur 9(1\/2):20\u201335","journal-title":"Int J Inform Comput Secur"},{"key":"9606_CR147","unstructured":"Zhang Y (2009) Blind watermark algorithm based on HVS and RBF neural network in DWT domain. WSEAS Trans Comput 8(1):174\u2013183"},{"key":"9606_CR148","doi-asserted-by":"crossref","unstructured":"Zhang Y, Sun G (2019) A watermark algorithm based on space-domain and transform-domain. In: IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC), Beijing, China, pp 41\u201344, 2019","DOI":"10.1109\/ICEIEC.2019.8784574"},{"key":"9606_CR149","unstructured":"Zhang J, Wang N, FengXiong ( 2002) Hiding a logo watermark into the multi-wavelet domain using neural networks. In: IEEE International Conference on Tools with Artificial Intelligence, Washington, DC, USA, pp 472\u2013482"},{"key":"9606_CR150","unstructured":"Zhang D, Pan Z, Li H (2009) A novel watermarking algorithm in DCT domain to authenticate image content. In: Intelligent Computing and Intelligent Systems, vol 3, pp 608\u2013611"},{"key":"9606_CR151","doi-asserted-by":"crossref","unstructured":"Zhao M, Dang Y (2008) Color image copyright protection digital watermarking algorithm based on DWT & DCT. 4th International Conference on Wireless Communications, Networking and Mobile Computing, Dalian, pp 1\u20134","DOI":"10.1109\/WiCom.2008.2913"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09606-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09606-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09606-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,6]],"date-time":"2023-10-06T12:04:34Z","timestamp":1696593874000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09606-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"references-count":151,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["9606"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09606-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}