{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T09:15:46Z","timestamp":1759482946296},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T00:00:00Z","timestamp":1603843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T00:00:00Z","timestamp":1603843200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11042-020-10155-6","type":"journal-article","created":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T15:03:20Z","timestamp":1603897400000},"page":"7515-7527","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["PCA-DTT 2D-DHCES based attack resilient imperceptible image watermarking"],"prefix":"10.1007","volume":"80","author":[{"given":"Ahmed","family":"Khan","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,28]]},"reference":[{"issue":"1","key":"10155_CR1","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s11042-019-07941-2","volume":"79","author":"P Bhinder","year":"2020","unstructured":"Bhinder P, Jindal N, Singh K (2020) An improved robust image-adaptive watermarking with two watermarks using statistical decoder. Multimed Tools Appl 79(1):183\u2013217","journal-title":"Multimed Tools Appl"},{"key":"10155_CR2","unstructured":"Broumandnia A (2020) Scale invariant digital image encryption using 3D modular chaotic map, Multimed Tools Appl, pp. 1\u201329"},{"issue":"6","key":"10155_CR3","doi-asserted-by":"publisher","first-page":"7973","DOI":"10.1007\/s11042-016-3449-4","volume":"76","author":"S Chakraborty","year":"2017","unstructured":"Chakraborty S, Jalal AS, Bhatnagar C (2017) LSB based non blind predictive edge adaptive image steganography. Multimed Tools Appl 76(6):7973\u20137987","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"10155_CR4","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1049\/iet-ipr.2018.6040","volume":"14","author":"F Deeba","year":"2020","unstructured":"Deeba F, Kun S, Dharejo FA, Zhou Y (2020) Lossless digital image watermarking in sparse domain by using K-singular value decomposition algorithm. IET Image Process 14(6):1005\u20131014","journal-title":"IET Image Process"},{"issue":"24","key":"10155_CR5","doi-asserted-by":"publisher","first-page":"26463","DOI":"10.1007\/s11042-016-4177-5","volume":"76","author":"MA El-Bendary","year":"2017","unstructured":"El-Bendary MA (2017) FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks. Multimed Tools Appl 76(24):26463\u201326501","journal-title":"Multimed Tools Appl"},{"key":"10155_CR6","doi-asserted-by":"publisher","first-page":"27211","DOI":"10.1007\/s11042-019-7448-0","volume":"78","author":"W El-Shafai","year":"2019","unstructured":"El-Shafai W, El-Rabaie S, El-Halawany MM et al (2019) Security of 3D-HEVC transmission based on fusion and watermarking techniques. Multimed Tools Appl 78:27211\u201327244","journal-title":"Multimed Tools Appl"},{"key":"10155_CR7","doi-asserted-by":"publisher","first-page":"29229","DOI":"10.1007\/s11042-018-6767-x","volume":"78","author":"J Guo","year":"2019","unstructured":"Guo J, Riyono D, Prasetyo H (2019) Hyperchaos permutation on false-positive-free SVD-based image watermarking. Multimed Tools Appl 78:29229\u201329270. https:\/\/doi.org\/10.1007\/s11042-018-6767-x","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"10155_CR8","doi-asserted-by":"publisher","first-page":"23","DOI":"10.5815\/ijigsp.2017.07.03","volume":"9","author":"S Kaur","year":"2017","unstructured":"Kaur S, Jindal H (2017) Enhanced image watermarking technique using wavelets and interpolation. International Journal of Image, Graphics and Signal Processing (IJIGSP) 9(7):23\u201335","journal-title":"International Journal of Image, Graphics and Signal Processing (IJIGSP)"},{"key":"10155_CR9","doi-asserted-by":"publisher","first-page":"28111","DOI":"10.1007\/s11042-019-07932-3","volume":"78","author":"V Khanduja","year":"2019","unstructured":"Khanduja V, Chakraverty S (2019) A generic watermarking model for object relational databases. Multimed Tools Appl 78:28111\u201328135. https:\/\/doi.org\/10.1007\/s11042-019-07932-3","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10155_CR10","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11554-016-0641-8","volume":"14","author":"C Kim","year":"2018","unstructured":"Kim C, Shin D, Leng L, Yang CN (2018) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14(1):101\u2013114","journal-title":"J Real-Time Image Proc"},{"key":"10155_CR11","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.displa.2018.04.002","volume":"55","author":"C Kim","year":"2018","unstructured":"Kim C, Shin D, Leng L, Yang CN (2018) Separable reversible data hiding in encrypted halftone image. Displays 55:71\u201379","journal-title":"Displays"},{"issue":"4","key":"10155_CR12","doi-asserted-by":"publisher","first-page":"644","DOI":"10.3390\/electronics9040644","volume":"9","author":"C Kim","year":"2020","unstructured":"Kim C, Yang CN, Leng L (2020) High-capacity data hiding for ABTC-EQ based compressed image. Electronics 9(4):644","journal-title":"Electronics"},{"key":"10155_CR13","doi-asserted-by":"publisher","first-page":"27085","DOI":"10.1007\/s11042-017-4743-5","volume":"78","author":"B Lei","year":"2019","unstructured":"Lei B, Zhao X, Lei H, Ni D, Chen S, Zhou F, Wang T (2019) Multipurpose watermarking scheme via intelligent method and chaotic map. Multimed Tools Appl 78:27085\u201327107. https:\/\/doi.org\/10.1007\/s11042-017-4743-5","journal-title":"Multimed Tools Appl"},{"issue":"17","key":"10155_CR14","first-page":"2543","volume":"5","author":"L Leng","year":"2010","unstructured":"Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. International Journal of the Physical Sciences 5(17):2543\u20132554","journal-title":"International Journal of the Physical Sciences"},{"issue":"1","key":"10155_CR15","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s11042-015-3058-7","volume":"76","author":"L Leng","year":"2017","unstructured":"Leng L, Li M, Kim C, Bi X (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76(1):333\u2013354","journal-title":"Multimed Tools Appl"},{"key":"10155_CR16","doi-asserted-by":"publisher","first-page":"20739","DOI":"10.1007\/s11042-016-3971-4","volume":"76","author":"X Liao","year":"2017","unstructured":"Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76:20739\u201320753","journal-title":"Multimed Tools Appl"},{"key":"10155_CR17","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.image.2017.07.006","volume":"58","author":"X Liao","year":"2017","unstructured":"Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Process Image Commun 58:146\u2013156","journal-title":"Signal Process Image Commun"},{"key":"10155_CR18","doi-asserted-by":"publisher","first-page":"19876","DOI":"10.1109\/ACCESS.2018.2808172","volume":"6","author":"NA Loan","year":"2018","unstructured":"Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6:19876\u201319897","journal-title":"IEEE Access"},{"issue":"8","key":"10155_CR19","doi-asserted-by":"publisher","first-page":"17","DOI":"10.5815\/ijigsp.2017.08.03","volume":"9","author":"K Mander","year":"2017","unstructured":"Mander K, Jindal H (2017) An improved image compression decompression technique using block truncation and wavelets. Int Journal of Image, Graphics and Signal Processing 9(8):17\u201329","journal-title":"Int Journal of Image, Graphics and Signal Processing"},{"issue":"11","key":"10155_CR20","doi-asserted-by":"publisher","first-page":"13133","DOI":"10.1007\/s11042-017-4935-z","volume":"77","author":"A Miri","year":"2018","unstructured":"Miri A, Faez K (2018) An image steganography method based on integer wavelet transform. Multimed Tools Appl 77(11):13133\u201313144","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"10155_CR21","doi-asserted-by":"publisher","first-page":"28","DOI":"10.5815\/ijigsp.2017.05.04","volume":"5","author":"A Mittal","year":"2017","unstructured":"Mittal A, Jindal H (2017) Novelty in image reconstruction using DWT and CLAHE. International Journal of Image, Graphics and Signal Processing (IJIGSP) 5(9):28\u201334","journal-title":"International Journal of Image, Graphics and Signal Processing (IJIGSP)"},{"issue":"6","key":"10155_CR22","doi-asserted-by":"publisher","first-page":"1509","DOI":"10.1109\/TIFS.2018.2790953","volume":"13","author":"X Nie","year":"2018","unstructured":"Nie X, Li X, Chai Y, Cui C, Xi X, Yin Y (2018) Robust image fingerprinting based on feature point relationship mining. IEEE Transactions on Information Forensics and Security 13(6):1509\u20131523","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10155_CR23","doi-asserted-by":"publisher","first-page":"26885","DOI":"10.1007\/s11042-017-4362-1","volume":"78","author":"F Peng","year":"2019","unstructured":"Peng F, Long Q, Lin Z et al (2019) A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates. Multimed Tools Appl 78:26885\u201326905. https:\/\/doi.org\/10.1007\/s11042-017-4362-1","journal-title":"Multimed Tools Appl"},{"key":"10155_CR24","doi-asserted-by":"publisher","first-page":"29089","DOI":"10.1007\/s11042-018-6304-y","volume":"78","author":"H Prasetyo","year":"2019","unstructured":"Prasetyo H (2019) Chih-Hsien Hsia improved multiple secret sharing using generalized chaotic image scrambling. Multimed Tools Appl 78:29089\u201329120. https:\/\/doi.org\/10.1007\/s11042-018-6304-y","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"10155_CR25","doi-asserted-by":"publisher","first-page":"13493","DOI":"10.1007\/s11042-016-3722-6","volume":"76","author":"M Saidi","year":"2017","unstructured":"Saidi M, Hermassi H, Rhouma R, Belghith S (2017) A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl 76(11):13493\u201313510","journal-title":"Multimed Tools Appl"},{"key":"10155_CR26","doi-asserted-by":"publisher","first-page":"27491","DOI":"10.1007\/s11042-019-7650-0","volume":"78","author":"M Veni","year":"2019","unstructured":"Veni M, Meyyappan T (2019) Digital image watermark embedding and extraction using oppositional fruit Fly algorithm. Multimed Tools Appl 78:27491\u201327510. https:\/\/doi.org\/10.1007\/s11042-019-7650-0","journal-title":"Multimed Tools Appl"},{"key":"10155_CR27","doi-asserted-by":"publisher","first-page":"27001","DOI":"10.1007\/s11042-017-4666-1","volume":"78","author":"X Wang","year":"2019","unstructured":"Wang X, Zhan Y (2019) A zero-watermarking scheme for three-dimensional mesh models based on multi-features. Multimed Tools Appl 78:27001\u201327028. https:\/\/doi.org\/10.1007\/s11042-017-4666-1","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"10155_CR28","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1049\/iet-ipr.2016.0927","volume":"11","author":"Y Wang","year":"2017","unstructured":"Wang Y, Liu J, Yang Y, Ma D, Liu R (2017) 3D model watermarking algorithm robust to geometric attacks. IET Image Process 11(10):822\u2013832","journal-title":"IET Image Process"},{"issue":"4","key":"10155_CR29","doi-asserted-by":"publisher","first-page":"2063","DOI":"10.1109\/TIP.2018.2795745","volume":"27","author":"YG Wang","year":"2018","unstructured":"Wang YG, Zhu G, Shi YQ (2018) Transportation spherical watermarking. IEEE Trans Image Process 27(4):2063\u20132077","journal-title":"IEEE Trans Image Process"},{"issue":"14","key":"10155_CR30","doi-asserted-by":"publisher","first-page":"17875","DOI":"10.1007\/s11042-017-5053-7","volume":"77","author":"Q Wei","year":"2018","unstructured":"Wei Q, Yin Z, Wang Z, Zhang X (2018) Distortion function based on residual blocks for JPEG steganography. Multimed Tools Appl 77(14):17875\u201317888","journal-title":"Multimed Tools Appl"},{"issue":"14","key":"10155_CR31","doi-asserted-by":"publisher","first-page":"17861","DOI":"10.1007\/s11042-017-4565-5","volume":"77","author":"Y Wei","year":"2018","unstructured":"Wei Y, Zhang W, Li W, Yu N, Sun X (2018) Which gray level should be given the smallest cost for adaptive steganography? Multimed Tools Appl 77(14):17861\u201317874","journal-title":"Multimed Tools Appl"},{"key":"10155_CR32","doi-asserted-by":"publisher","first-page":"28003","DOI":"10.1007\/s11042-019-07902-9","volume":"78","author":"L Zhang","year":"2019","unstructured":"Zhang L, Wei D (2019) Dual DCT-DWT-SVD digital watermarking algorithm based on particle swarm optimization. Multimed Tools Appl 78:28003\u201328023. https:\/\/doi.org\/10.1007\/s11042-019-07902-9","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10155-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-10155-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10155-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,24]],"date-time":"2021-02-24T23:46:56Z","timestamp":1614210416000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-10155-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,28]]},"references-count":32,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["10155"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10155-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,28]]},"assertion":[{"value":"9 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 October 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"No conflict of interest upon this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}