{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:30:59Z","timestamp":1775745059519,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10028-y","type":"journal-article","created":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T05:02:41Z","timestamp":1604466161000},"page":"8667-8688","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Copyright protection using KELM-PSO based multi-spectral image watermarking in DCT domain with local texture information based selection"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0931-7659","authenticated-orcid":false,"given":"Varsha","family":"Sisaudia","sequence":"first","affiliation":[]},{"given":"Virendra P.","family":"Vishwakarma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,4]]},"reference":[{"issue":"7","key":"10028_CR1","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1016\/j.jvcir.2013.07.007","volume":"24","author":"C Agarwal","year":"2013","unstructured":"Agarwal C, Mishra A, Sharma A (2013) Gray-scale image watermarking using GA-BPN hybrid network. J Vis Commun Image Represent 24(7):1135\u20131146","journal-title":"J Vis Commun Image Represent"},{"issue":"1","key":"10028_CR2","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.eij.2015.01.002","volume":"16","author":"C Agarwal","year":"2015","unstructured":"Agarwal C, Mishra A, Sharma A (2015) A novel gray-scale image watermarking using hybrid fuzzy-BP N architecture. Egypt Informatics J 16(1):83\u2013102","journal-title":"Egypt Informatics J"},{"issue":"1","key":"10028_CR3","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1016\/j.sigpro.2013.07.024","volume":"94","author":"M Ali","year":"2014","unstructured":"Ali M, Ahn CW (2014) An optimized watermarking technique based on self-adaptive de in DWT-SVD transform domain. Signal Process 94(1):545\u2013556","journal-title":"Signal Process"},{"key":"10028_CR4","doi-asserted-by":"publisher","unstructured":"Anand A, Singh AK (2020) Watermarking techniques for medical data authentication : a survey. Multimed Tools Appl.\u00a0https:\/\/doi.org\/10.1007\/s11042-020-08801-0","DOI":"10.1007\/s11042-020-08801-0"},{"issue":"3","key":"10028_CR5","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/s12559-014-9255-2","volume":"6","author":"G Bin Huang","year":"2014","unstructured":"Bin Huang G (2014) An insight into extreme learning machines: random neurons, random features and kernels. Cogn Comput 6(3):376\u2013390","journal-title":"Cogn Comput"},{"issue":"1\u20133","key":"10028_CR6","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","volume":"70","author":"G Bin Huang","year":"2006","unstructured":"Bin Huang G, Zhu QY, Siew CK (2006) Extreme learning machine: theory and applications. Neurocomputing 70(1\u20133):489\u2013501","journal-title":"Neurocomputing"},{"issue":"2","key":"10028_CR7","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s13042-011-0019-y","volume":"2","author":"G Bin Huang","year":"2011","unstructured":"Bin Huang G, Wang DH, Lan Y (2011) Extreme learning machines: a survey. Int J Mach Learn Cybern 2(2):107\u2013122","journal-title":"Int J Mach Learn Cybern"},{"issue":"3","key":"10028_CR8","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.aeue.2013.08.018","volume":"68","author":"C Das","year":"2014","unstructured":"Das C, Panigrahi S, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU Int J Electron Commun 68(3):244\u2013253","journal-title":"AEU Int J Electron Commun"},{"key":"10028_CR9","unstructured":"Eberhart R, Kennedy J (1995, October) A new optimizer using particle swarm theory. In MHS'95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science, IEEE pp 39\u201343"},{"issue":"1","key":"10028_CR10","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s00371-018-1567-x","volume":"36","author":"F Ernawan","year":"2020","unstructured":"Ernawan F, Kabir MN (2020) A block-based RDWT-SVD image watermarking method using human visual system characteristics. Vis Comput 36(1):19\u201337","journal-title":"Vis Comput"},{"issue":"5","key":"10028_CR11","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1016\/j.jvcir.2014.03.012","volume":"25","author":"JM Guo","year":"2014","unstructured":"Guo JM, Prasetyo H (2014) False-positive-free SVD-based image watermarking. J Vis Commun Image Represent 25(5):1149\u20131163","journal-title":"J Vis Commun Image Represent"},{"issue":"1","key":"10028_CR12","first-page":"100","volume":"2","author":"JA Hussein","year":"2010","unstructured":"Hussein JA (2010) Spatial Domain Watermarking Scheme for Colored Images Based on Log-average Luminance. J Comput 2(1):100\u2013103","journal-title":"J Comput"},{"key":"10028_CR13","doi-asserted-by":"crossref","unstructured":"Juneja S, Anand R (2018) Contrast Enhancement of an Image by DWT-SVD and DCT-SVD. In Data Engineering and Intelligent Computing, Springer; Singapore pp 595\u2013603","DOI":"10.1007\/978-981-10-3223-3_57"},{"issue":"12","key":"10028_CR14","doi-asserted-by":"publisher","first-page":"4083","DOI":"10.1007\/s00500-017-2617-4","volume":"22","author":"B Kazemivash","year":"2018","unstructured":"Kazemivash B, Ebrahimi M (2018) A predictive model-based image watermarking scheme using regression tree and firefly algorithm. Soft Comput 22(12):4083\u20134098","journal-title":"Soft Comput"},{"issue":"3","key":"10028_CR15","first-page":"22","volume":"9","author":"A Kumar","year":"2019","unstructured":"Kumar A (2019) Design of Secure Image Fusion Technique Using Cloud for privacy- preserving and copyright protection. J Cloud Appl Comput (IJCAC) 9(3):22\u201336","journal-title":"J Cloud Appl Comput (IJCAC)"},{"key":"10028_CR16","doi-asserted-by":"publisher","unstructured":"Kumar S, Singh, BK, Yadav M (2020) A Recent Survey on Multimedia and Database Watermarking. Multimed Tools Appl 79:20149\u201320197. https:\/\/doi.org\/10.1007\/s11042-020-08881-y","DOI":"10.1007\/s11042-020-08881-y"},{"key":"10028_CR17","doi-asserted-by":"crossref","unstructured":"Lee H, Lu B (1994) FUZZY BP: a neural network model with fuzzy inference. In Proceedings of 1994 IEEE International Conference on Neural Networks (ICNN'94) 3:1583\u20131588","DOI":"10.1109\/ICNN.1994.374392"},{"issue":"4","key":"10028_CR18","doi-asserted-by":"publisher","first-page":"4545","DOI":"10.1007\/s11042-017-4452-0","volume":"77","author":"J Li","year":"2018","unstructured":"Li J, Yu C, Gupta BB (2018) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed Tools Appl 77(4):4545\u20134561","journal-title":"Multimed Tools Appl"},{"key":"10028_CR19","doi-asserted-by":"crossref","unstructured":"Liu Y, Tang S, Liu R, Zhang L, Ma Z (2017) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Systems with Applications 97:95\u2013105","DOI":"10.1016\/j.eswa.2017.12.003"},{"key":"10028_CR20","doi-asserted-by":"crossref","unstructured":"Mehta R, Vishwakarma VP (2018) LC-ELM-Based Gray Scale Image Watermarking in Wavelet Domain. Quality, IT and Business Operations. Springer; Singapore 191\u2013202.","DOI":"10.1007\/978-981-10-5577-5_16"},{"issue":"2","key":"10028_CR21","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s11265-015-1055-8","volume":"84","author":"R Mehta","year":"2016","unstructured":"Mehta R, Rajpal N, Vishwakarma VP (2016) Adaptive image watermarking scheme using fuzzy entropy and GA-ELM hybridization in DCT domain for copyright protection. J Signal Process Syst 84(2):265\u2013281","journal-title":"J Signal Process Syst"},{"issue":"1","key":"10028_CR22","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s13042-015-0329-6","volume":"9","author":"R Mehta","year":"2018","unstructured":"Mehta R, Rajpal N, Vishwakarma VP (2018) Robust image watermarking scheme in lifting wavelet domain using GA-LSVR hybridization. Int J Mach Learn Cybern 9(1):145\u2013161","journal-title":"Int J Mach Learn Cybern"},{"key":"10028_CR23","first-page":"71","volume":"38","author":"A Mishra","year":"2018","unstructured":"Mishra A, Rajpal A, Bala R (2018) Journal of information security and applications bi-directional extreme learning machine for semi-blind watermarking of compressed images. J Inf Secur Appl 38:71\u201384","journal-title":"J Inf Secur Appl"},{"issue":"19","key":"10028_CR24","doi-asserted-by":"publisher","first-page":"9685","DOI":"10.1007\/s00500-018-3535-9","volume":"23","author":"E Moeinaddini","year":"2019","unstructured":"Moeinaddini E (2019) Selecting optimal blocks for image watermarking using entropy and distinct discrete firefly algorithm. Soft Comput 23(19):9685\u20139699","journal-title":"Soft Comput"},{"key":"10028_CR25","first-page":"28","volume":"47","author":"M Moosazadeh","year":"2019","unstructured":"Moosazadeh M, Ekbatanifard G (2019) Journal of information security and applications a new DCT-based robust image watermarking method using teaching-learning-based optimization. J Inf Secur Appl 47:28\u201338","journal-title":"J Inf Secur Appl"},{"key":"10028_CR26","unstructured":"Motwani M, Harris FC (2009) Fuzzy perceptual watermarking for ownership verification. In proceedings of the international conference on image processing, computer vision, and pattern recognition (IPCV'09), Las Vegas, pp 321\u2013325"},{"key":"10028_CR27","first-page":"144","volume":"44","author":"E Najafi","year":"2019","unstructured":"Najafi E, Loukhaoukha K (2019) Journal of information security and applications hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform. J Inf Secur Appl 44:144\u2013156","journal-title":"J Inf Secur Appl"},{"issue":"3","key":"10028_CR28","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/S0165-1684(98)00017-6","volume":"66","author":"N Nikolaidis","year":"1998","unstructured":"Nikolaidis N, Pitas I (1998) Robust image watermarking in the spatial domain. Signal Process 66(3):385\u2013403","journal-title":"Signal Process"},{"key":"10028_CR29","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.dsp.2016.02.005","volume":"53","author":"SA Parah","year":"2016","unstructured":"Parah SA, Sheikh JA, Loan NA, Bhat GM (2016) Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digit Signal Process A Rev J 53:11\u201324","journal-title":"Digit Signal Process A Rev J"},{"key":"10028_CR30","doi-asserted-by":"publisher","unstructured":"Pourhadi A, Mahdavi-nasab H (2020) A robust digital image watermarking scheme based on bat algorithm optimization and SURF detector in SWT domain. Multimed Tools Appl 79:21653\u201321677. https:\/\/doi.org\/10.1007\/s11042-020-08960-0","DOI":"10.1007\/s11042-020-08960-0"},{"issue":"1","key":"10028_CR31","doi-asserted-by":"publisher","first-page":"013004","DOI":"10.1117\/1.JEI.24.1.013004","volume":"24","author":"M Qi","year":"2015","unstructured":"Qi M, Li B-Z, Sun H (2015) Image watermarking via fractional polar harmonic transforms. J Electron Imaging 24(1):013004","journal-title":"J Electron Imaging"},{"key":"10028_CR32","unstructured":"Rahman M, Ahammed S, Ahmed R, Izhar MN (2017) A semi blind watermarking technique for copyright protection of image based on dct and svd domain. Global Journal of Research In Engineering 16(7)"},{"key":"10028_CR33","doi-asserted-by":"crossref","unstructured":"Rajpal A, Mishra A, Bala R (2016) Multiple scaling factors based Semi-Blind watermarking of grayscale images using OS-ELM neural network. In IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), pp 1\u20136","DOI":"10.1109\/ICSPCC.2016.7753622"},{"key":"10028_CR34","doi-asserted-by":"publisher","unstructured":"Roy SS, Basu A, Chattopadhyay A (2020) On the implementation of a copyright protection scheme using digital image watermarking. Multimed Tools Appl 79:13125\u201313138. https:\/\/doi.org\/10.1007\/s11042-020-08652-9","DOI":"10.1007\/s11042-020-08652-9"},{"key":"10028_CR35","doi-asserted-by":"publisher","unstructured":"Sharma V, Mir RN (2019) An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm. Journal of King Saud University - Computer and Information Sciences. https:\/\/doi.org\/10.1016\/j.jksuci.2019.03.009","DOI":"10.1016\/j.jksuci.2019.03.009"},{"issue":"21","key":"10028_CR36","doi-asserted-by":"publisher","first-page":"30523","DOI":"10.1007\/s11042-018-7115-x","volume":"78","author":"AK Singh","year":"2019","unstructured":"Singh AK (2019) Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimed Tools Appl 78(21):30523\u201330533","journal-title":"Multimed Tools Appl"},{"key":"10028_CR37","doi-asserted-by":"crossref","unstructured":"Su Q, Chen B (2018) Robust color image watermarking technique in the spatial domain. Soft Computing 22(1):91\u2013106","DOI":"10.1007\/s00500-017-2489-7"},{"issue":"1","key":"10028_CR38","doi-asserted-by":"publisher","first-page":"81","DOI":"10.3233\/ICA-2012-0392","volume":"19","author":"H Tao","year":"2012","unstructured":"Tao H, Zain JM, Ahmed MM, Abdalla AN, Jing W (2012) A wavelet-based particle swarm optimization algorithm for digital image watermarking. Integr Comput Aided Eng 19(1):81\u201391","journal-title":"Integr Comput Aided Eng"},{"issue":"3","key":"10028_CR39","doi-asserted-by":"publisher","first-page":"3457","DOI":"10.1007\/s11042-018-6263-3","volume":"78","author":"S Thakur","year":"2018","unstructured":"Thakur S, Singh AK, Ghrera SP (2018) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 78(3):3457\u20133470","journal-title":"Multimed Tools Appl"},{"key":"10028_CR40","unstructured":"Vishwakarma VP, Sisaudia V (2020) Self-adjustive DE and KELM-based image watermarking in DCT domain using fuzzy entropy. Int J Embed Syst 13(1):74\u201384"},{"key":"10028_CR41","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1016\/j.jvcir.2016.04.011","volume":"38","author":"XY Wang","year":"2016","unstructured":"Wang XY, Liu YN, Han MM, Yang HY (2016) Local quaternion PHT based robust color image watermarking algorithm. J Vis Commun Image Represent 38:678\u2013694","journal-title":"J Vis Commun Image Represent"},{"issue":"2","key":"10028_CR42","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1016\/j.asoc.2012.09.028","volume":"13","author":"X Wu","year":"2013","unstructured":"Wu X, Sun W (2013) Robust copyright protection scheme for digital images using overlapping DCT and SVD. Appl Soft Comput J 13(2):1170\u20131182","journal-title":"Appl Soft Comput J"},{"key":"10028_CR43","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.jvcir.2019.05.012","volume":"62","author":"W Xiang-yang","year":"2019","unstructured":"Xiang-yang W, Si-yu Z, Li W, Hong-ying Y, Pan-pan N (2019) Locally optimum image watermark decoder by modeling NSCT domain difference coefficients with vector based Cauchy distribution. J Vis Commun Image Represent 62:309\u2013329","journal-title":"J Vis Commun Image Represent"},{"issue":"9","key":"10028_CR44","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1109\/TNNLS.2012.2202289","volume":"23","author":"Y Yang","year":"2012","unstructured":"Yang Y, Wang Y, Yuan X (2012) Bidirectional extreme learning machine for regression problem and its learning effectiveness. IEEE Trans Neur Netw Learn Syst 23(9):1498\u20131505","journal-title":"IEEE Trans Neur Netw Learn Syst"},{"key":"10028_CR45","doi-asserted-by":"crossref","unstructured":"Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863\u20134882","DOI":"10.1007\/s11042-016-3862-8"},{"key":"10028_CR46","doi-asserted-by":"crossref","unstructured":"Zhang L, Wei D (2020) Robust and reliable image copyright protection scheme using downsampling and block transform in integer wavelet domain. Digit Signal Process 106:102805","DOI":"10.1016\/j.dsp.2020.102805"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10028-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-10028-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10028-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T21:28:46Z","timestamp":1614634126000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-10028-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,4]]},"references-count":46,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10028"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10028-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,4]]},"assertion":[{"value":"12 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}