{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T06:14:16Z","timestamp":1764828856294,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T00:00:00Z","timestamp":1613692800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T00:00:00Z","timestamp":1613692800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-020-10376-9","type":"journal-article","created":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T23:47:31Z","timestamp":1613778451000},"page":"18653-18676","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A new digital steganography system based on hiding online signature within document image data in YUV color space"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0767-0683","authenticated-orcid":false,"given":"Anissa","family":"Zenati","sequence":"first","affiliation":[]},{"given":"Wael","family":"Ouarda","sequence":"additional","affiliation":[]},{"given":"Adel M.","family":"Alimi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,19]]},"reference":[{"key":"10376_CR1","doi-asserted-by":"crossref","unstructured":"Abdulrahman AK, Ozturk S (2019) A novel hybrid dct and dwt based robust watermarking algorithm for color images. Multimed Tools Applic, 1\u201323","DOI":"10.1007\/s11042-018-7085-z"},{"key":"10376_CR2","unstructured":"Abraham J, Paul V (2016) An imperceptible spatial domain color image watermarking scheme. Journal of King Saud University-Computer and Information Sciences"},{"key":"10376_CR3","doi-asserted-by":"crossref","unstructured":"Al-Haj A, Barouqa H (2017) Copyright protection of e-government document images using digital watermarking. In: 2017 3rd International conference on information management (iCIM). IEEE, pp 441\u2013446","DOI":"10.1109\/INFOMAN.2017.7950424"},{"issue":"6","key":"10376_CR4","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/0031-3203(92)90074-S","volume":"25","author":"N Bourbakis","year":"1992","unstructured":"Bourbakis N, Alexopoulos C (1992) Picture data encryp-tion using scan patterns. Pattern Recogn 25(6):567\u2013581","journal-title":"Pattern Recogn"},{"key":"10376_CR5","doi-asserted-by":"crossref","unstructured":"Burie JC, Ogier JM, Loc CV (2017) A spatial domain steganography for grayscale documents using pattern recognition techniques. In: 2017 14th IAPR international conference on document analysis and recognition (IC-DAR), vol 9. IEEE, pp 21\u201326","DOI":"10.1109\/ICDAR.2017.391"},{"key":"10376_CR6","doi-asserted-by":"crossref","unstructured":"Cu VL, Burie JC, Ogier JM, Liu CL Hiding security feature into text content for securing documents using generated font. In: 2019 International conference on document analysis and recognition (ICDAR) 2019 Sep 20. IEEE, pp 1214\u20131219","DOI":"10.1109\/ICDAR.2019.00196"},{"issue":"3","key":"10376_CR7","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1109\/TMM.2004.827493","volume":"6","author":"L Der-Chyuan","year":"2004","unstructured":"Der-Chyuan L, Chia-Hung S (2004) A steganographic scheme for secure communications based on the chaos and euler theorem. IEEE Trans Multimed 6(3):501\u2013509","journal-title":"IEEE Trans Multimed"},{"key":"10376_CR8","unstructured":"Dhieb T, Njah S, Boubaker H, Ouarda W, Ayed MB, Alimi AM (2018) An online writer identification system based on beta-elliptic model and fuzzy elementary perceptual codes. arXiv:1804.05661"},{"key":"10376_CR9","doi-asserted-by":"crossref","unstructured":"Dhieb T, Ouarda W, Boubaker H, Alimi AM (2016) Deep neural network for online writer identification using beta-elliptic model. In: 2016 International joint conference on neural networks (IJCNN), pp 1863\u20131870","DOI":"10.1109\/IJCNN.2016.7727426"},{"key":"10376_CR10","unstructured":"Dhieb T, Ouarda W, Boubaker H, Alimi AM (2016) Beta-elliptic model for writer identification from online arabic handwriting. Journal of Information Assurance & Security, 11(5)"},{"key":"10376_CR11","doi-asserted-by":"crossref","unstructured":"Garc\u00eda-Soto R, Hern\u00e1ndez-Anaya S, Nakano-Miyatake M, Rosales-Roldan L, Perez-Meana H (2013) Sender verification system for official documents based on watermarking technique. In: 2013 10th International conference on electrical engineering, computing science and automatic control (CCE). IEEE, pp 227\u2013232","DOI":"10.1109\/ICEEE.2013.6676011"},{"key":"10376_CR12","doi-asserted-by":"crossref","unstructured":"Gonge SS, Ghatol AA (2014) Combined dwt-dct digital watermarking technique software used for cts of bank. In: 2014 International conference on issues and challenges in intelligent computing techniques (ICICT). IEEE, , pp 776\u2013783","DOI":"10.1109\/ICICICT.2014.6781379"},{"issue":"9","key":"10376_CR13","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1109\/JRPROC.1952.273898","volume":"40","author":"DA Huffman","year":"1952","unstructured":"Huffman DA (1952) A method for the construction of minimum-redundancy codes. Proc IRE 40(9):1098\u20131101","journal-title":"Proc IRE"},{"key":"10376_CR14","first-page":"46","volume":"65","author":"M Hussain","year":"2018","unstructured":"Hussain M, Abdul-Wahab AW, Bin Idris Y, Anthony TH, Ki-Hyun J (2018) Image steganography in spatial domain: a survey. Signal Process: Image Commun 65:46\u201366","journal-title":"Signal Process: Image Commun"},{"key":"10376_CR15","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/j.asoc.2018.03.023","volume":"67","author":"R Jarusek","year":"2018","unstructured":"Jarusek R, Eva V, Martin K (2018) Robust steganographic method based on unconventional approach of neural networks. Appl Soft Comput 67:505\u2013518","journal-title":"Appl Soft Comput"},{"key":"10376_CR16","doi-asserted-by":"crossref","unstructured":"Leutenegger S, Chli M, Siegwart RY (2011) Brisk: binary robust invariant scalable keypoints. In: 2011 International conference on computer vision, pp 2548\u20132555","DOI":"10.1109\/ICCV.2011.6126542"},{"key":"10376_CR17","doi-asserted-by":"crossref","unstructured":"Leutenegger S, Chli M, Siegwart RY (2011) BRISK: binary robust invariant scalable keypoints. IEEE","DOI":"10.1109\/ICCV.2011.6126542"},{"issue":"9","key":"10376_CR18","doi-asserted-by":"publisher","first-page":"1905","DOI":"10.1109\/TIFS.2015.2423656","volume":"10","author":"B Li","year":"2015","unstructured":"Li B, Wang M, Li X, Tan S, Huang J (2015) A strategy of clustering modification directions in spatial image steganography. IEEE Trans Inform Forens Secur 10(9):1905\u20131917","journal-title":"IEEE Trans Inform Forens Secur"},{"issue":"4","key":"10376_CR19","doi-asserted-by":"publisher","first-page":"4545","DOI":"10.1007\/s11042-017-4452-0","volume":"77","author":"J Li","year":"2018","unstructured":"Li J, Yu C, Gupta B, Ren X (2018) Color image watermarking scheme based on quaternion hadamard transform and schur decomposition. Multimed Tools Applic 77(4):4545\u20134561","journal-title":"Multimed Tools Applic"},{"key":"10376_CR20","doi-asserted-by":"crossref","unstructured":"Loc CV, Burie JC, Ogier JM (2018) Document images watermarking for security issue using fully convolutional networks. In: 2018 24th International conference on pattern recognition (ICPR) 2018 Aug 20. IEEE, pp 1091\u20131096","DOI":"10.1109\/ICPR.2018.8546035"},{"key":"10376_CR21","volume-title":"Adaptive watermarking algorithm of color images of ancient documents on YIQ-PCA color space. Computational intelligence in security for information systems conference","author":"MN Maatouk","year":"2015","unstructured":"Maatouk MN, Najoua EBA (2015) Adaptive watermarking algorithm of color images of ancient documents on YIQ-PCA color space. Computational intelligence in security for information systems conference. Springer, Cham"},{"key":"10376_CR22","doi-asserted-by":"crossref","unstructured":"Mair E, Gregory DHr, Darius B, Michael S, Gerhard H (2010) Adaptive and generic corner detection based on the accelerated segment test. In: European conference on computer vision, pp 183\u2013196. Springer, Berlin","DOI":"10.1007\/978-3-642-15552-9_14"},{"key":"10376_CR23","doi-asserted-by":"crossref","unstructured":"Malik Z, Siddiqi I (2014) Detection and recognition of trafficsigns from road scene images. In: 2014 12th International conference on frontiers of information technology, pp 330\u2013335","DOI":"10.1109\/FIT.2014.68"},{"issue":"6","key":"10376_CR24","doi-asserted-by":"publisher","first-page":"8597","DOI":"10.1007\/s11042-016-3383-5","volume":"76","author":"K Muhammad","year":"2017","unstructured":"Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) Cisska-lsb: color image steganography using stego key-directed adaptive lsb substitution method. Multimed Tools Applic 76(6):8597\u20138626","journal-title":"Multimed Tools Applic"},{"key":"10376_CR25","unstructured":"Muhammad K, Jan Z, Ahmad J, Khan Z (2015) An adaptive secret key-directed cryptographic scheme for secure transmission in wireless sensor networks, arXiv:1510.00226"},{"key":"10376_CR26","unstructured":"Muhammad K, Mehmood I, Sajjad M, Ahmad J, Yoo SJ, Han D, Wook S (2015) Secure visual content la-belling for personalized image retrieval. In: The 11th international conference on multimedia information technology and applications (MITA 2015), pp 165\u2013166"},{"issue":"6","key":"10376_CR27","doi-asserted-by":"publisher","first-page":"8695","DOI":"10.1007\/s11042-016-3485-0","volume":"76","author":"S Munib","year":"2017","unstructured":"Munib S, Khan A (2017) Robust image watermarking technique using triangular regions and zernike moments for quantization based embedding. Multimed Tools Applic 76(6):8695\u20138710","journal-title":"Multimed Tools Applic"},{"key":"10376_CR28","doi-asserted-by":"crossref","unstructured":"Pandey MK, Parmar G, Gupta R, Sikander A (2018) Non-blind arnold scrambled hybrid image watermarking in ycbcr color space. Micro Syst Technol, 1\u201311","DOI":"10.1007\/s00542-018-4162-1"},{"key":"10376_CR29","doi-asserted-by":"crossref","unstructured":"Patvardhan C, Kumar P, Lakshmi CV (2018) Effective color image watermarking scheme using ycbcr color space and qr code. Multimed Tools Applic, 1\u201323","DOI":"10.1007\/s11042-017-4909-1"},{"key":"10376_CR30","doi-asserted-by":"crossref","unstructured":"Pham VQ, Miyaki T, Yamasaki T, Aizawa K (2007) Geometrically invariant object-based watermarking using sift feature. In: 2007 IEEE International conference on image processing, vol 5. IEEE, pp V\u2013473","DOI":"10.1109\/ICIP.2007.4379868"},{"key":"10376_CR31","doi-asserted-by":"crossref","unstructured":"Rosten E, Drummond T (2006) Machine learning for highspeed corner detection. In: Proceedings of the European conference on computer vision (ECCV)","DOI":"10.1007\/11744023_34"},{"key":"10376_CR32","unstructured":"Roy SS, Abhishek B, Avik C (2019) Intelligent copyright protection for images. Chapman and Hall\/CRC"},{"issue":"2","key":"10376_CR33","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TIFS.2015.2486744","volume":"11","author":"V Sedighi","year":"2016","unstructured":"Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inform Forens Secur 11 (2):221\u2013234","journal-title":"IEEE Trans Inform Forens Secur"},{"issue":"7","key":"10376_CR34","doi-asserted-by":"publisher","first-page":"34","DOI":"10.5120\/ijca2016911189","volume":"147","author":"S Sejpal","year":"2016","unstructured":"Sejpal S, Shah N (2016) Comparative performance analysis of secured lwt-svd based color image watermarking technique in yuv, yiq and ycbcr color spaces. Int J Comput Applic 147(7):34\u201340","journal-title":"Int J Comput Applic"},{"issue":"1","key":"10376_CR35","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.amc.2004.04.059","volume":"164","author":"W Shiuh-Jeng","year":"2005","unstructured":"Shiuh-Jeng W (2005) Steganography of capacity required using modulo operator for embedding secret image. Appl Mathem Comput 164(1):99\u2013116","journal-title":"Appl Mathem Comput"},{"issue":"1","key":"10376_CR36","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s00500-017-2489-7","volume":"22","author":"Q Su","year":"2018","unstructured":"Su Q, Chen B (2018) Robust color image watermarking technique in the spatial domain. Soft Comput 22(1):91\u2013106","journal-title":"Soft Comput"},{"issue":"9","key":"10376_CR37","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1016\/j.imavis.2005.05.014","volume":"23","author":"L Yu","year":"2005","unstructured":"Yu L, Niu X, Sun S (2005) Print-and-scan model and the watermarking countermeasure. Image Vis Comput 23(9):807\u2013814","journal-title":"Image Vis Comput"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10376-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10376-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10376-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T09:26:35Z","timestamp":1621502795000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10376-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,19]]},"references-count":37,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10376"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10376-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,2,19]]},"assertion":[{"value":"1 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}