{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T21:31:17Z","timestamp":1775251877629,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T00:00:00Z","timestamp":1610582400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T00:00:00Z","timestamp":1610582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11042-020-10257-1","type":"journal-article","created":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T21:03:27Z","timestamp":1610658207000},"page":"13367-13387","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["New watermarking algorithm utilizing quaternion Fourier transform with advanced scrambling and secure encryption"],"prefix":"10.1007","volume":"80","author":[{"given":"Uzair Aslam","family":"Bhatti","sequence":"first","affiliation":[]},{"given":"Linwang","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Zhaoyuan","family":"Yu","sequence":"additional","affiliation":[]},{"given":"JingBing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Saqib Ali","family":"Nawaz","sequence":"additional","affiliation":[]},{"given":"Anum","family":"Mehmood","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,14]]},"reference":[{"key":"10257_CR1","doi-asserted-by":"publisher","first-page":"76386","DOI":"10.1109\/ACCESS.2020.2988298","volume":"8","author":"UA Bhatti","year":"2020","unstructured":"Bhatti UA, Yu Z, Li J, Nawaz SA, Mehmood A, Zhang K, Yuan L (2020) Hybrid watermarking algorithm using Clifford algebra with Arnold scrambling and chaotic encryption. IEEE Access 8:76386\u201376398","journal-title":"IEEE Access"},{"key":"10257_CR2","doi-asserted-by":"publisher","first-page":"20809","DOI":"10.1007\/s11042-017-5511-2","volume":"77","author":"B Chen","year":"2018","unstructured":"Chen B, Zhou C, Jeon B, Zheng Y, Wang J (2018) Quaternion discrete fractional random transform for color image adaptive watermarking. Multimed Tools Appl 77:20809\u201320837","journal-title":"Multimed Tools Appl"},{"key":"10257_CR3","doi-asserted-by":"publisher","first-page":"1426","DOI":"10.1109\/TIP.2019.2941319","volume":"29","author":"Y Chen","year":"2019","unstructured":"Chen Y, Xiao X, Zhou Y (2019) Low-rank quaternion approximation for color image processing. IEEE Trans Image Process 29:1426\u20131439","journal-title":"IEEE Trans Image Process"},{"issue":"7","key":"10257_CR4","doi-asserted-by":"publisher","first-page":"8057","DOI":"10.1007\/s11042-018-6595-z","volume":"78","author":"B Chen","year":"2019","unstructured":"Chen B, Yu M, Su Q, Li L (2019) Fractional quaternion cosine transform and its application in color image copy-move forgery detection. Multimed Tools Appl 78(7):8057\u20138073","journal-title":"Multimed Tools Appl"},{"key":"10257_CR5","doi-asserted-by":"publisher","first-page":"30628","DOI":"10.1109\/ACCESS.2020.2973044","volume":"8","author":"Y Chen","year":"2020","unstructured":"Chen Y, Jia Z, Peng Y, Peng Y (2020) Robust dual-color watermarking based on quaternion singular value decomposition. IEEE Access 8:30628\u201330642. https:\/\/doi.org\/10.1109\/ACCESS.2020.2973044","journal-title":"IEEE Access"},{"issue":"11","key":"10257_CR6","doi-asserted-by":"publisher","first-page":"2966","DOI":"10.1109\/TIP.2010.2052261","volume":"19","author":"CH Chou","year":"2010","unstructured":"Chou CH, Liu KC (2010) A perceptually tuned watermarking scheme for color images. IEEE Trans Image Process 19(11):2966\u20132982","journal-title":"IEEE Trans Image Process"},{"key":"10257_CR7","doi-asserted-by":"crossref","unstructured":"Darwish MM, Hosny KM, Kamal ST (2020) Improved color image watermarking using logistic maps and quaternion Legendre-Fourier moments. In Multimedia Security Using Chaotic Maps: Principles and Methodologies(pp. 137\u2013158). Springer, Cham","DOI":"10.1007\/978-3-030-38700-6_6"},{"key":"10257_CR8","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1016\/j.chaos.2016.07.014","volume":"91","author":"Y Deng","year":"2016","unstructured":"Deng Y (2016) Deng entropy. Chaos, Solitons & Fractals 91:549\u2013553","journal-title":"Chaos, Solitons & Fractals"},{"key":"10257_CR9","doi-asserted-by":"crossref","unstructured":"Ell TA, Le Bihan N, Sangwine SJ (2014) Quaternion Fourier transforms for signal and image processing. John Wiley & Sons","DOI":"10.1002\/9781118930908"},{"key":"10257_CR10","doi-asserted-by":"crossref","unstructured":"Fazli S, Moeini M (2016) A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks.\" Optik 127.2: 964\u2013972","DOI":"10.1016\/j.ijleo.2015.09.205"},{"issue":"20","key":"10257_CR11","doi-asserted-by":"publisher","first-page":"27181","DOI":"10.1007\/s11042-018-5913-9","volume":"77","author":"M Hamidi","year":"2018","unstructured":"Hamidi M, El Haziti M, Cherifi H, El Hassouni M (2018) Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform. Multimed Tools Appl 77(20):27181\u201327214","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"10257_CR12","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.1007\/s10044-018-0740-1","volume":"22","author":"KM Hosny","year":"2019","unstructured":"Hosny KM, Darwish MM (2019) Invariant color images representation using accurate quaternion Legendre\u2013Fourier moments. Pattern Anal Applic 22(3):1105\u20131122","journal-title":"Pattern Anal Applic"},{"issue":"2","key":"10257_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3325193","volume":"15","author":"KM Hosny","year":"2019","unstructured":"Hosny KM, Darwish MM (2019) Resilient color image watermarking using accurate quaternion radial substituted Chebyshev moments. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 15(2):1\u201325","journal-title":"ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM)"},{"key":"10257_CR14","volume-title":"\u201cThe theory and application research of color image processing based on hyper-complex\u201d, Ph.D dissertation","author":"S Jiang","year":"2008","unstructured":"Jiang S (2008) \u201cThe theory and application research of color image processing based on hyper-complex\u201d, Ph.D dissertation. Fudan University, Shanghai"},{"key":"10257_CR15","doi-asserted-by":"crossref","unstructured":"Jiang F, Gao T (2020) A robust zero-watermarking algorithm for color image based on tensor mode expansion. Multimed Tools Appl: 1\u201316.","DOI":"10.1007\/s11042-019-08459-3"},{"issue":"6","key":"10257_CR16","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1109\/LSP.2006.887840","volume":"14","author":"L Jin","year":"2007","unstructured":"Jin L, Li D (2007) An efficient color-impulse detector and its application to color images. IEEE Signal Processing Letters 14(6):397\u2013400","journal-title":"IEEE Signal Processing Letters"},{"key":"10257_CR17","doi-asserted-by":"crossref","unstructured":"Kaur, A., Singh, P., & Nayyar, A. (2020). Robust multimedia watermarking: characteristics, applications, and attacks. In handbook of research on multimedia cyber security (pp. 73-89). IGI global.","DOI":"10.4018\/978-1-7998-2701-6.ch004"},{"key":"10257_CR18","unstructured":"Kim TH, Haldar JP (2018) USC-SIPI Report# 443 LORAKS Software Version 2.0: Faster Implementation and Enhanced Capabilities"},{"key":"10257_CR19","unstructured":"Labunets V (2004) Clifford algebras as unified language for image processing and pattern recognition. Computational Noncommutative Algebra and Applications. Springer, Dordrecht. 197\u2013225."},{"issue":"1","key":"10257_CR20","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/s11771-005-0414-1","volume":"12","author":"B Li","year":"2005","unstructured":"Li B, Jia-wei X (2005) Period of Arnold transformation and its application in image scrambling. J Cent S Univ Technol 12(1):278\u2013282","journal-title":"J Cent S Univ Technol"},{"issue":"3\u20134","key":"10257_CR21","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/S0375-9601(01)00612-0","volume":"A290","author":"S Li","year":"2001","unstructured":"Li S, Mou X, Cai Y (2001) Improving security of a chaotic encryption approach. Phys Lett A290(3\u20134):127\u2013133","journal-title":"Phys Lett"},{"key":"10257_CR22","doi-asserted-by":"publisher","first-page":"4545","DOI":"10.1007\/s11042-017-4452-0","volume":"77","author":"J Li","year":"2018","unstructured":"Li J, Yu C, Gupta BB, Ren X (2018) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed Tools Appl 77:4545\u20134561","journal-title":"Multimed Tools Appl"},{"key":"10257_CR23","doi-asserted-by":"publisher","first-page":"72308","DOI":"10.1109\/ACCESS.2020.2987914","volume":"8","author":"M Li","year":"2020","unstructured":"Li M, Yuan X, Chen H, Li J (2020) Quaternion discrete Fourier transform-based color image watermarking method using quaternion QR decomposition. IEEE Access 8:72308\u201372315","journal-title":"IEEE Access"},{"key":"10257_CR24","doi-asserted-by":"crossref","unstructured":"Liu J, Ma D, Yang Y (2018) A New Singular Value Decomposition Watermarking Algorithm Based on Directionlet. 2018 11th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI). IEEE","DOI":"10.1109\/CISP-BMEI.2018.8633024"},{"issue":"3\u20134","key":"10257_CR25","first-page":"236","volume":"15","author":"S Madhavan","year":"2017","unstructured":"Madhavan S, Yamuna G (2017) DWT-based grey-scale image watermarking using area of best fit equation and cuckoo search algorithm. Int J Comput Sci Eng 15(3\u20134):236\u2013247","journal-title":"Int J Comput Sci Eng"},{"key":"10257_CR26","doi-asserted-by":"crossref","unstructured":"Min L, Ting L, Yu-jie H (2013) Arnold transform based image scrambling method. In 3rd International Conference on Multimedia Technology (ICMT-13). Atlantis Press","DOI":"10.2991\/icmt-13.2013.160"},{"issue":"6","key":"10257_CR27","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0232902","volume":"15","author":"SA Nawaz","year":"2020","unstructured":"Nawaz SA, Li J, Bhatti UA, Mehmood A, Shoukat MU, Bhatti MA (2020) Advance hybrid medical watermarking algorithm using speeded up robust features and discrete cosine transform. PLoS One 15(6):e0232902","journal-title":"PLoS One"},{"issue":"6","key":"10257_CR28","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0232902","volume":"15","author":"SA Nawaz","year":"2020","unstructured":"Nawaz SA, Li J, Bhatti UA, Mehmood A, Shoukat MU, Bhatti MA (2020) Advance hybrid medical watermarking algorithm using speeded up robust features and discrete cosine transform. PLoS One 15(6):e0232902","journal-title":"PLoS One"},{"issue":"1","key":"10257_CR29","doi-asserted-by":"publisher","first-page":"83","DOI":"10.3390\/s20010083","volume":"20","author":"T Nestor","year":"2020","unstructured":"Nestor T, De Dieu NJ, Jacques K, Yves EJ, Iliyasu AM, El-Latif A, Ahmed A (2020) A multidimensional hyperjerk oscillator: dynamics analysis, analogue and embedded systems implementation, and its application as a cryptosystem. Sensors 20(1):83","journal-title":"Sensors"},{"issue":"3","key":"10257_CR30","doi-asserted-by":"publisher","first-page":"2081","DOI":"10.1016\/j.eswa.2010.07.147","volume":"38","author":"PP Niu","year":"2011","unstructured":"Niu PP, Wang XY, Yang YP, Lu MY (2011) A novel color image watermarking scheme in nonsampled contourlet-domain. Expert Syst Appl 38(3):2081\u20132098","journal-title":"Expert Syst Appl"},{"issue":"11","key":"10257_CR31","doi-asserted-by":"publisher","first-page":"2783","DOI":"10.1109\/78.960426","volume":"49","author":"S-C Pei","year":"2001","unstructured":"Pei S-C, Ding J-J, Chang J-H (2001) Efficient implementation of quaternion Fourier transform, convolution, and correlation by 2-D complex FFT. IEEE Trans Signal Process 49(11):2783\u20132797","journal-title":"IEEE Trans Signal Process"},{"issue":"2","key":"10257_CR32","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/10658980701322528","volume":"16","author":"NV Rao","year":"2007","unstructured":"Rao NV, Narahari Pandit SN (2007) Multimedia digital rights protection using watermarking techniques. Inf Syst Secur 16(2):93\u201399","journal-title":"Inf Syst Secur"},{"issue":"10","key":"10257_CR33","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1049\/el:19980697","volume":"34","author":"SJ Sangwine","year":"1998","unstructured":"Sangwine SJ (1998) Colour image edge detector based on quaternion convolution. Electron Lett 34(10):969\u2013971","journal-title":"Electron Lett"},{"issue":"11","key":"10257_CR34","doi-asserted-by":"publisher","first-page":"13001","DOI":"10.1007\/s11042-016-3706-6","volume":"76","author":"D Singh","year":"2017","unstructured":"Singh D, Singh SK (2017) DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection. Multimed Tools Appl 76(11):13001\u201313024","journal-title":"Multimed Tools Appl"},{"key":"10257_CR35","doi-asserted-by":"crossref","unstructured":"Singh N, Joshi S, Birla S (2019) Color image watermarking with watermark authentication against false positive detection using SVD. International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM)","DOI":"10.2139\/ssrn.3352328"},{"issue":"1","key":"10257_CR36","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TIFS.2007.916275","volume":"3","author":"TK Tsui","year":"2008","unstructured":"Tsui TK, Zhang X-P, Androutsos D (2008) Color image watermarking using multidimensional Fourier transforms. IEEE Transactions on Information Forensics and Security 3(1):16\u201328","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"7","key":"10257_CR37","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1109\/5.771072","volume":"87","author":"G Voyatzis","year":"1999","unstructured":"Voyatzis G, Pitas I (1999) The use of watermarks in the protection of digital multimedia products. Proc IEEE 87(7):1197\u20131207","journal-title":"Proc IEEE"},{"issue":"4","key":"10257_CR38","doi-asserted-by":"publisher","first-page":"1418","DOI":"10.1109\/TIP.2012.2231090","volume":"22","author":"S Wang","year":"2012","unstructured":"Wang S, Rehman A, Wang Z, Ma S, Gao W (2012) Perceptual video coding based on SSIM-inspired divisive normalization. IEEE Trans Image Process 22(4):1418\u20131429","journal-title":"IEEE Trans Image Process"},{"key":"10257_CR39","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1016\/j.jvcir.2016.04.011","volume":"38","author":"XY Wang","year":"2016","unstructured":"Wang XY, Liu YN, Han MM, Yang HY (2016) Local quaternion PHT based robust color image watermarking algorithm. J Vis Commun Image Represent 38:678\u2013694","journal-title":"J Vis Commun Image Represent"},{"key":"10257_CR40","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT) 1.2: 31\u201338"},{"key":"10257_CR41","doi-asserted-by":"publisher","first-page":"122544","DOI":"10.1109\/ACCESS.2019.2935174","volume":"7","author":"Z Xia","year":"2019","unstructured":"Xia Z, Wang X, Wang M, Unar S, Wang C, Liu Y, Li X (2019) Geometrically invariant color medical image null-watermarking based on precise quaternion polar harmonic Fourier moments. IEEE Access 7:122544\u2013122560","journal-title":"IEEE Access"},{"key":"10257_CR42","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.sigpro.2019.06.025","volume":"164","author":"Z Xia","year":"2019","unstructured":"Xia Z, Wang X, Li X, Wang C, Unar S, Wang M, Zhao T (2019) Efficient copyright protection for three CT images based on quaternion polar harmonic Fourier moments. Signal Process 164:368\u2013379","journal-title":"Signal Process"},{"key":"10257_CR43","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.sigpro.2018.11.011","volume":"157","author":"Z Xia","year":"2019","unstructured":"Xia Z, Wang X, Zhou W, Li R, Wang C, Zhang C (2019) Color medical image lossless watermarking using chaotic system and accurate quaternion polar harmonic transforms. Signal Process 157:108\u2013118","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10257-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10257-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10257-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T08:40:14Z","timestamp":1619340014000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10257-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,14]]},"references-count":43,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10257"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10257-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,14]]},"assertion":[{"value":"3 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}