{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T17:08:44Z","timestamp":1772125724554,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T00:00:00Z","timestamp":1609977600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T00:00:00Z","timestamp":1609977600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10368-9","type":"journal-article","created":{"date-parts":[[2021,1,7]],"date-time":"2021-01-07T23:03:44Z","timestamp":1610060624000},"page":"11739-11764","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Color image watermarking for content authentication and self-restoration applications based on a dual-domain approach"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3628-3191","authenticated-orcid":false,"given":"Hazem Munawer","family":"Al-Otum","sequence":"first","affiliation":[]},{"given":"Mouaz","family":"Ibrahim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,7]]},"reference":[{"key":"10368_CR1","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.ijleo.2019.04.074","volume":"187","author":"MJ Barani","year":"2019","unstructured":"Barani MJ, Valandar MY, Ayubi P (2019) A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map. Optik 187:205\u2013222","journal-title":"Optik"},{"issue":"2","key":"10368_CR2","doi-asserted-by":"publisher","first-page":"110","DOI":"10.3390\/info11020110","volume":"11","author":"M Begum","year":"2020","unstructured":"Begum M, Uddin MS (2020) Digital image watermarking techniques: a review. Information 11(2):110","journal-title":"Information"},{"issue":"10","key":"10368_CR3","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1016\/j.image.2014.09.001","volume":"29","author":"S Dadkhah","year":"2014","unstructured":"Dadkhah S, Manaf AA, Hori Y, Hassanien AE, Sadeghi S (2014) An effective svd-based image tampering detection and self-recovery using active watermarking. Signal Process Image Commun 29(10):1197\u20131210","journal-title":"Signal Process Image Commun"},{"key":"10368_CR4","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1016\/j.jvcir.2016.04.023","volume":"38","author":"S Durgesh","year":"2016","unstructured":"Durgesh S, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent 38:775\u2013789. https:\/\/doi.org\/10.1016\/j.jvcir.2016.04.023","journal-title":"J Vis Commun Image Represent"},{"key":"10368_CR5","unstructured":"Ernawan, F., & Kabir, M. N. (2018). A block-based RDWT-SVD image watermarking method using human visual system characteristics. The Visual Computer, 1-19."},{"key":"10368_CR6","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.image.2018.04.003","volume":"66","author":"MQ Fan","year":"2018","unstructured":"Fan MQ, Wang HX (2018) An enhanced fragile watermarking scheme to digital image protection and self-recovery. Signal Process 66:19\u201329. https:\/\/doi.org\/10.1016\/j.image.2018.04.003","journal-title":"Signal Process"},{"issue":"4\u20135","key":"10368_CR7","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.jisa.2014.07.004","volume":"19","author":"SK Ghosal","year":"2014","unstructured":"Ghosal SK, Mandal JK (2014) Binomial transform based fragile watermarking for image authentication. Journal of information security and applications 19(4\u20135):272\u2013281","journal-title":"Journal of information security and applications"},{"key":"10368_CR8","doi-asserted-by":"crossref","unstructured":"Hemida, O., & He, H. (2020). A self-recovery watermarking scheme based on block truncation coding and quantum chaos map. Multimedia Tools and Applications, 1-31.","DOI":"10.1007\/s11042-020-08727-7"},{"issue":"17","key":"10368_CR9","doi-asserted-by":"publisher","first-page":"6849","DOI":"10.1007\/s11042-014-1932-3","volume":"74","author":"GS Kalra","year":"2015","unstructured":"Kalra GS, Talwar R, Sadawarti H (2015) Adaptive digital image watermarking for color images in frequency domain. Multimed Tools Appl 74(17):6849\u20136869","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"10368_CR10","doi-asserted-by":"publisher","first-page":"3497","DOI":"10.1016\/j.patcog.2008.05.003","volume":"41","author":"TY Lee","year":"2008","unstructured":"Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497\u20133506","journal-title":"Pattern Recogn"},{"issue":"5","key":"10368_CR11","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1109\/TCSVT.2016.2633878","volume":"28","author":"XL Liu","year":"2016","unstructured":"Liu XL, Lin CC, Yuan SM (2016) Blind dual watermarking for color images\u2019 authentication and copyright protection. IEEE Transactions on Circuits and Systems for Video Technology 28(5):1047\u20131055","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"10","key":"10368_CR12","doi-asserted-by":"publisher","first-page":"1579","DOI":"10.1109\/83.951542","volume":"10","author":"CS Lu","year":"2001","unstructured":"Lu CS, Liao HY (2001) Multipurpose watermarking for image authentication and protection. IEEE Trans Image Process 10(10):1579\u20131592","journal-title":"IEEE Trans Image Process"},{"issue":"5","key":"10368_CR13","doi-asserted-by":"publisher","first-page":"1268","DOI":"10.1016\/j.sigpro.2012.10.018","volume":"93","author":"F Lusson","year":"2013","unstructured":"Lusson F, Bailey K, Leeney M, Curran K (2013) A novel approach to digital watermarking, exploiting colour spaces. Signal Process 93(5):1268\u20131294","journal-title":"Signal Process"},{"key":"10368_CR14","doi-asserted-by":"publisher","first-page":"115725","DOI":"10.1016\/j.image.2019.115725","volume":"81","author":"J Molina-Garcia","year":"2020","unstructured":"Molina-Garcia J, Garcia-Salgado BP, Ponomaryov V, Reyes-Reyes R, Sadovnychiy S, Cruz-Ramos C (2020) An effective fragile watermarking scheme for color image tampering detection and self-recovery. Signal Process Image Commun 81:115725","journal-title":"Signal Process Image Commun"},{"key":"10368_CR15","doi-asserted-by":"crossref","unstructured":"Nematollahi MA, Vorakulpipat C, Rosales HG (2017) Digital watermarking techniques and trends. Springer","DOI":"10.1007\/978-981-10-2095-7"},{"key":"10368_CR16","doi-asserted-by":"crossref","unstructured":"Patra, B. and Patra, J.C., (2012), November. Crt-based fragile self-recovery watermarking scheme for image authentication and recovery. In intelligent signal processing and communications systems (ISPACS), 2012 international symposium on (pp. 430-435). IEEE.","DOI":"10.1109\/ISPACS.2012.6473528"},{"key":"10368_CR17","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.jvcir.2015.05.006","volume":"30","author":"X Qi","year":"2015","unstructured":"Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 30:312\u2013327","journal-title":"J Vis Commun Image Represent"},{"key":"10368_CR18","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.sigpro.2017.03.033","volume":"138","author":"C Qin","year":"2017","unstructured":"Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280\u2013293","journal-title":"Signal Process"},{"issue":"3","key":"10368_CR19","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1134\/S1054661817030257","volume":"27","author":"DG Savakar","year":"2017","unstructured":"Savakar DG, Ghuli A (2017) Non-blind digital watermarking with enhanced image embedding capacity using Meyer wavelet decomposition, SVD, and DFT. Pattern Recognition and Image Analysis 27(3):511\u2013517","journal-title":"Pattern Recognition and Image Analysis"},{"key":"10368_CR20","doi-asserted-by":"crossref","unstructured":"Sikder I, Dhar PK, Shimamura T (2017), February. A semi-fragile watermarking method using slant transform and LU decomposition for image authentication. In Electrical, Computer and Communication Engineering (ECCE), International Conference on (pp. 881-885). IEEE.","DOI":"10.1109\/ECACE.2017.7913027"},{"issue":"1","key":"10368_CR21","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s00500-017-2489-7","volume":"22","author":"Q Su","year":"2018","unstructured":"Su Q, Chen B (2018) Robust color image watermarking technique in the spatial domain. Soft Comput 22(1):91\u2013106","journal-title":"Soft Comput"},{"key":"10368_CR22","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.image.2018.03.011","volume":"65","author":"WL Tai","year":"2018","unstructured":"Tai WL, Liao ZJ (2018) Image self-recovery with watermark self-embedding. Signal Process 65:11\u201325. https:\/\/doi.org\/10.1016\/j.image.2018.03.011","journal-title":"Signal Process"},{"issue":"3","key":"10368_CR23","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.image.2012.12.003","volume":"28","author":"X Tong","year":"2013","unstructured":"Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301\u2013308","journal-title":"Signal Process Image Commun"},{"key":"10368_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.patrec.2006.04.020","volume":"28","author":"F Zhang","year":"2007","unstructured":"Zhang F, Zhang X (2007) Digital image watermarking capacity and detection error rate. Pattern Recognition Letters 28:1\u201310. https:\/\/doi.org\/10.1016\/j.patrec.2006.04.020","journal-title":"Pattern Recognition Letters"},{"issue":"4","key":"10368_CR25","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/TIFS.2011.2159208","volume":"6","author":"X Zhang","year":"2011","unstructured":"Zhang X, Qian Z, Ren Y, Feng G (2011) Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Transactions on Information Forensics and Security 6(4):1223\u20131232","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10368-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10368-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10368-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,16]],"date-time":"2021-04-16T17:36:42Z","timestamp":1618594602000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10368-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,7]]},"references-count":25,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10368"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10368-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,7]]},"assertion":[{"value":"24 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"Author (Hazem Munawer Al-Otum) declares that he has no conflict of interest.Author (Mouaz Ibrahim) declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}