{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:55:00Z","timestamp":1762005300629,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T00:00:00Z","timestamp":1610150400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10220-0","type":"journal-article","created":{"date-parts":[[2021,1,9]],"date-time":"2021-01-09T04:28:02Z","timestamp":1610166482000},"page":"12275-12292","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["An adaptive, secure and imperceptive image watermarking using swarm intelligence, Arnold transform, SVD and DWT"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2012-2446","authenticated-orcid":false,"family":"Falgun Thakkar","sequence":"first","affiliation":[]},{"given":"Vinay Kumar","family":"Srivastava","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,9]]},"reference":[{"key":"10220_CR1","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1016\/j.sigpro.2013.07.024","volume":"94","author":"M Ali","year":"2014","unstructured":"Ali M, Ahn C (2014) An optimized watermarking technique based on self-adaptive DE in DWT-SVD transform domain. Signal Process 94:545\u2013556","journal-title":"Signal Process"},{"issue":"5","key":"10220_CR2","first-page":"386","volume":"62","author":"V Aslantas","year":"2008","unstructured":"Aslantas V (2008) A singular-value decomposition-based image watermarking using genetic algorithm. Electron Commun 62(5):386\u2013394","journal-title":"Electron Commun"},{"issue":"5","key":"10220_CR3","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1016\/j.csi.2008.09.031","volume":"31","author":"G Bhatnagar","year":"2009","unstructured":"Bhatnagar G, Raman B (2009) A new robust reference watermarking scheme based on DWT-SVD. Comput Stand Interfaces 31(5):1002\u20131013","journal-title":"Comput Stand Interfaces"},{"issue":"1","key":"10220_CR4","first-page":"7","volume":"3","author":"MB Chandra","year":"2008","unstructured":"Chandra MB, Srinivas KS (2008) A robust image watermarking scheme using singular value decomposition. J Multimed 3(1):7\u201315","journal-title":"J Multimed"},{"issue":"12","key":"10220_CR5","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I Cox","year":"1997","unstructured":"Cox I et al (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673\u20131687","journal-title":"IEEE Trans Image Process"},{"key":"10220_CR6","doi-asserted-by":"publisher","unstructured":"Farah M, Farah A (2020) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn. https:\/\/doi.org\/10.1007\/s11071-019-05413-8","DOI":"10.1007\/s11071-019-05413-8"},{"key":"10220_CR7","doi-asserted-by":"publisher","first-page":"147","DOI":"10.2528\/PIERB08041306","volume":"8","author":"R Ghazy","year":"2008","unstructured":"Ghazy R et al (2008) Performance evaluation of block based SVD image watermarking. Prog Electromagn Res B 8:147\u2013159","journal-title":"Prog Electromagn Res B"},{"issue":"7","key":"10220_CR8","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1080\/00207217.2014.963892","volume":"102","author":"R Ghazy","year":"2015","unstructured":"Ghazy R et al (2015) Block-based SVD image watermarking in spatial and transform domain. Int J Electron 102(7):1091\u20131113","journal-title":"Int J Electron"},{"issue":"4\u20135","key":"10220_CR9","first-page":"272","volume":"19","author":"S Ghosal","year":"2014","unstructured":"Ghosal S, Mandal J (2014) Binomial transform based fragile watermarking for image authentication. J Inf Secur Appl 19(4\u20135):272\u2013281","journal-title":"J Inf Secur Appl"},{"key":"10220_CR10","first-page":"320","volume":"46","author":"S Ghosal","year":"2019","unstructured":"Ghosal S, Mandal J (2019) On the use of the Stirling transform in image steganography. J Inf Secur Appl 46:320\u2013330","journal-title":"J Inf Secur Appl"},{"key":"10220_CR11","doi-asserted-by":"publisher","unstructured":"Ghosal S et al (2020) Application of Lah transform for security and privacy of data through information hiding in telecommunication. Trans Emerg Telecommun Technol. https:\/\/doi.org\/10.1002\/ett.3984","DOI":"10.1002\/ett.3984"},{"issue":"3","key":"10220_CR12","first-page":"239","volume":"1","author":"S Goyal","year":"2009","unstructured":"Goyal S, Gupta R, Bansal A (2009) Application of genetic algorithm to optimize robustness and fidelity of watermarked images. Comput Sci Eng 1(3):239\u2013242","journal-title":"Comput Sci Eng"},{"issue":"5","key":"10220_CR13","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1016\/j.jvcir.2014.03.012","volume":"25","author":"J Guo","year":"2014","unstructured":"Guo J, Prasetyo H (2014) False-positive-free SVD-based image watermarking. Vis Commun Image Represent 25(5):1149\u20131163","journal-title":"Vis Commun Image Represent"},{"key":"10220_CR14","unstructured":"Jain C, Arora S, Panigrahi P (2008) A reliable SVD based watermarking scheme. Cornell University Library, arXiv:0808.0309v1 [cs.MM]. http:\/\/arxiv.org\/abs\/0808.0309v1"},{"issue":"4","key":"10220_CR15","doi-asserted-by":"publisher","first-page":"750","DOI":"10.1016\/S1665-6423(14)70091-4","volume":"12","author":"O Jane","year":"2014","unstructured":"Jane O, Elbasi E, Ilk H (2014) Hybrid non-blind watermarking based on DWT and SVD. J Appl Res Technol 12(4):750\u2013761","journal-title":"J Appl Res Technol"},{"issue":"4","key":"10220_CR16","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1080\/0952813X.2013.782348","volume":"25","author":"A Jordehi","year":"2013","unstructured":"Jordehi A, Jasni J (2013) Parameter selection in particle swarm optimisation: a survey. J Exp Theor Artif Intell 25(4):527\u2013542","journal-title":"J Exp Theor Artif Intell"},{"issue":"4","key":"10220_CR17","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1016\/j.optcom.2010.10.047","volume":"284","author":"C-C Lai","year":"2011","unstructured":"Lai C-C (2011) An improved SVD-based watermarking scheme using human visual characteristics. Opt Commun 284(4):938\u2013944","journal-title":"Opt Commun"},{"issue":"11","key":"10220_CR18","doi-asserted-by":"publisher","first-page":"3060","DOI":"10.1109\/TIM.2010.2066770","volume":"59","author":"C-C Lai","year":"2010","unstructured":"Lai C-C, Tsai C-C (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060\u20133063","journal-title":"IEEE Trans Instrum Meas"},{"key":"10220_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2467-2_83","volume-title":"Research of a digital image watermarking algorithm based on DCT transform","author":"L Li","year":"2012","unstructured":"Li L, Gao N (2012) Research of a digital image watermarking algorithm based on DCT transform. Springer-Verlang, London"},{"key":"10220_CR20","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/677\/4\/042020","volume":"677","author":"R Liang","year":"2019","unstructured":"Liang R et al (2019) An improved Arnold image scrambling algorithm. IOP Conf Series: Mater Sci Eng 677:042020. https:\/\/doi.org\/10.1088\/1757-899X\/677\/4\/042020","journal-title":"IOP Conf Series: Mater Sci Eng"},{"issue":"2","key":"10220_CR21","first-page":"124","volume":"5","author":"C-C Lin","year":"2014","unstructured":"Lin C-C, Chang C-C, Chen Y-H (2014) A novel SVD-based watermarking scheme for protecting rightful ownership of digital images. J Inf Hiding Multimed Signal Process 5(2):124\u2013143","journal-title":"J Inf Hiding Multimed Signal Process"},{"issue":"1","key":"10220_CR22","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/6046.985560","volume":"4","author":"R Liu","year":"2002","unstructured":"Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimed 4(1):121\u2013128","journal-title":"IEEE Trans Multimed"},{"key":"10220_CR23","doi-asserted-by":"publisher","unstructured":"Makbol N, Khoo B (2013) A hybrid robust image watermarking scheme using integer wavelet transform, singular value decomposition and Arnold transform. In: Zaman HB, Robinson P, Olivier P, Shih TK, Velastin S (eds) Advances in visual informatics. IVIC 2013. Lecture Notes in Computer Science, vol 8237. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-02958-0_4","DOI":"10.1007\/978-3-319-02958-0_4"},{"key":"10220_CR24","first-page":"71","volume":"38","author":"A Mishra","year":"2018","unstructured":"Mishra A, Rajpal A, Bala R (2018) Bi-directional extreme learning machine for semi-blind watermarking of compressed images. J Inf Secur Appl 38:71\u201384","journal-title":"J Inf Secur Appl"},{"issue":"9","key":"10220_CR25","doi-asserted-by":"publisher","first-page":"2158","DOI":"10.1016\/j.sigpro.2008.02.015","volume":"88","author":"A Mohammad","year":"2008","unstructured":"Mohammad A, Alhaj A, Shaltaf S (2008) An improved SVD-based watermarking scheme for protecting rightful ownership. Signal Process 88(9):2158\u20132180","journal-title":"Signal Process"},{"key":"10220_CR26","doi-asserted-by":"publisher","unstructured":"Pradhan C, Rath S, Bisoi A (2012) Non blind digital watermarking technique using DWT and cross chaos. Procedia Tech 6:897\u2013904. https:\/\/doi.org\/10.1016\/j.protcy.2012.10.109","DOI":"10.1016\/j.protcy.2012.10.109"},{"key":"10220_CR27","first-page":"19","volume":"7","author":"R Rao","year":"2016","unstructured":"Rao R (2016) Jaya: a simple and new optimization algorithm for solving constrained and unconstrained optimization problems. Int J Ind Eng Comput 7:19\u201334","journal-title":"Int J Ind Eng Comput"},{"key":"10220_CR28","doi-asserted-by":"publisher","unstructured":"Rao S, Shekhavat R, Srivastava V (2012) A reliable digital image watermarking scheme based on SVD and particle swarm optimization. Proc. Student conference on engineering and systems, Allahabad, Uttar Pradesh, India. https:\/\/doi.org\/10.1109\/SCES.2012.6199012","DOI":"10.1109\/SCES.2012.6199012"},{"issue":"1","key":"10220_CR29","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1016\/j.eswa.2011.07.059","volume":"39","author":"R-S Run","year":"2012","unstructured":"Run R-S, Horng SJ, Lai JL, Kao TW, Chen RJ (2012) An improved SVD based watermarking technique for copyright protection. Expert Syst Appl 39(1):673\u2013689","journal-title":"Expert Syst Appl"},{"issue":"2","key":"10220_CR30","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1109\/TMM.2006.886297","volume":"9","author":"R Rykaczewski","year":"2007","unstructured":"Rykaczewski R (2007) Comments on \u201can SVD-based watermarking scheme for protecting rightful ownership\u201d. IEEE Trans Multimed 9(2):421\u2013423","journal-title":"IEEE Trans Multimed"},{"issue":"5","key":"10220_CR31","first-page":"220","volume":"8","author":"A Shaamala","year":"2011","unstructured":"Shaamala A, Abdullah S, Manaf A (2011) Study of the effect DCT and DWT domains on the imperceptibility and robustness of genetic watermarking. Int J Comput Sci Issues 8(5):220\u2013225","journal-title":"Int J Comput Sci Issues"},{"issue":"3","key":"10220_CR32","doi-asserted-by":"publisher","first-page":"655","DOI":"10.4304\/jsw.9.3.655-662","volume":"9","author":"H Shi","year":"2014","unstructured":"Shi H (2014) DWT and SVD based watermarking scheme with circulation. J Softw 9(3):655\u2013662","journal-title":"J Softw"},{"key":"10220_CR33","doi-asserted-by":"publisher","unstructured":"Song J, Wang G (2011) A wavelet domain digital image-watermarking by double encryption based on Arnold transform and chaos. In: Chen R. (eds) 2011 International Conference in Electrics, Communication and Automatic Control Proceedings. Springer, New York, NY. https:\/\/doi.org\/10.1007\/978-1-4419-8849-2_76","DOI":"10.1007\/978-1-4419-8849-2_76"},{"key":"10220_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74769-7_34","volume-title":"A novel watermarking scheme based on PSO algorithm","author":"Z Wang","year":"2007","unstructured":"Wang Z, Sun X, Zang D (2007) A novel watermarking scheme based on PSO algorithm. Springer-Verlang, Berlin"},{"issue":"5","key":"10220_CR35","doi-asserted-by":"publisher","first-page":"460","DOI":"10.3390\/e21050460","volume":"21","author":"C Yu","year":"2019","unstructured":"Yu C et al (2019) An adaptive and secure holographic image watermarking scheme. Entropy 21(5):460","journal-title":"Entropy"},{"issue":"2","key":"10220_CR36","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/TMM.2005.843357","volume":"7","author":"X Zhang","year":"2005","unstructured":"Zhang X, Li K (2005) Comments on \u201can SVD-based watermarking scheme for protecting rightful ownership\u201d. IEEE Trans Multimed 7(2):593\u2013594","journal-title":"IEEE Trans Multimed"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10220-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10220-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10220-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,16]],"date-time":"2021-04-16T17:41:44Z","timestamp":1618594904000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10220-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,9]]},"references-count":36,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10220"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10220-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,1,9]]},"assertion":[{"value":"24 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 October 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}