{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T23:06:39Z","timestamp":1768518399555,"version":"3.49.0"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T00:00:00Z","timestamp":1610668800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T00:00:00Z","timestamp":1610668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11042-020-10392-9","type":"journal-article","created":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T02:11:50Z","timestamp":1610676710000},"page":"13491-13511","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["A geometrically robust multi-bit video watermarking algorithm based on 2-D DFT"],"prefix":"10.1007","volume":"80","author":[{"given":"Xue-Cheng","family":"Sun","sequence":"first","affiliation":[]},{"given":"Zhe-Ming","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Zhe","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yong-Liang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,15]]},"reference":[{"issue":"5","key":"10392_CR1","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1109\/83.918570","volume":"10","author":"M Barni","year":"2001","unstructured":"Barni M, Bartolini F, Piva A (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783\u2013791","journal-title":"IEEE Trans Image Process"},{"issue":"6","key":"10392_CR2","doi-asserted-by":"publisher","first-page":"7187","DOI":"10.1007\/s11042-017-4628-7","volume":"77","author":"L Chen","year":"2018","unstructured":"Chen L, Zhao J (2018) Contourlet-based image and video watermarking robust to geometric attacks and compressions. Multimed Tools Appl 77(6):7187\u20137204","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"10392_CR3","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1109\/76.475889","volume":"5","author":"CH Chou","year":"1995","unstructured":"Chou CH, Li YC (1995) A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile. IEEE Trans Circuits Syst Video Technol 5(6):467\u2013476","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10392_CR4","doi-asserted-by":"crossref","unstructured":"Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (2009) Digital watermarking and steganography, second edn. Morgan Kaufmann Publisher, San Francisco","DOI":"10.1016\/B978-012372585-1.50015-2"},{"issue":"12","key":"10392_CR5","doi-asserted-by":"publisher","first-page":"3256","DOI":"10.1016\/j.sigpro.2010.05.032","volume":"90","author":"C Deng","year":"2010","unstructured":"Deng C, Gao X, Li X, Tao D (2010) Local histogram based geometric invariant image watermarking. Signal Processing 90(12):3256\u20133264","journal-title":"Signal Processing"},{"key":"10392_CR6","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.jvcir.2015.12.007","volume":"38","author":"T Dutta","year":"2016","unstructured":"Dutta T, Gupta HP (2016) A robust watermarking framework for high efficiency video coding (HEVC)-encoded video with blind extraction process. J Vis Commun Image Represent 38:29\u201344","journal-title":"J Vis Commun Image Represent"},{"issue":"3","key":"10392_CR7","first-page":"189","volume":"67","author":"OS Faragallah","year":"2013","unstructured":"Faragallah OS (2013) Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain. AEU-INT J Electron 67(3):189\u2013196","journal-title":"AEU-INT J Electron"},{"key":"10392_CR8","volume-title":"Learning OpenCV 3: computer vision in C++ with the Opencv library","author":"A Kaehler","year":"2016","unstructured":"Kaehler A, Bradski G (2016) Learning OpenCV 3: computer vision in C++ with the Opencv library. O\u2019Reilly Media, Inc., California"},{"issue":"2","key":"10392_CR9","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/TPAMI.1985.4767641","volume":"7","author":"DT Kuan","year":"1985","unstructured":"Kuan DT, Sawchuk AA, Strand TC, Chavel P (1985) Adaptive noise smoothing filter for images with signal-dependent noise. IEEE Transactions on Pattern Analysis and Machine Intelligence 7(2):165\u2013177","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"20","key":"10392_CR10","doi-asserted-by":"publisher","first-page":"20739","DOI":"10.1007\/s11042-016-3971-4","volume":"76","author":"X Liao","year":"2017","unstructured":"Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76(20):20739\u201320753","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"10392_CR11","doi-asserted-by":"publisher","first-page":"10033","DOI":"10.1007\/s11042-017-4946-9","volume":"77","author":"X Liao","year":"2018","unstructured":"Liao X, Guo S, Yin J, Wang H, Sangaiah AK (2018) New cubic reference table based image steganography. Multimed Tools Appl 77(8):10033\u201310050","journal-title":"Multimed Tools Appl"},{"key":"10392_CR12","volume-title":"Two-dimensional signal and image processing","author":"JS Lim","year":"1990","unstructured":"Lim JS (1990) Two-dimensional signal and image processing. Prentice Hall PTR, New Jersey"},{"issue":"2","key":"10392_CR13","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1016\/j.sigpro.2009.08.001","volume":"90","author":"Y Liu","year":"2010","unstructured":"Liu Y, Zhao J (2010) A new video watermarking algorithm based on 1D DFT and Radon transform. Signal Processing 90(2):626\u2013639","journal-title":"Signal Processing"},{"issue":"4","key":"10392_CR14","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/TIFS.2010.2076280","volume":"5","author":"A Mansouri","year":"2010","unstructured":"Mansouri A, Aznaveh AM, Torkamani-Azar F, Kurugollu F (2010) A low complexity video watermarking in H. 264 compressed domain. IEEE Transactions on Information Forensics and Security 5(4):649\u2013657","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"10392_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMM.2003.819759","volume":"6","author":"DP Mukherjee","year":"2004","unstructured":"Mukherjee DP, Maitra S, Acton ST (2004) Spatial domain digital watermarking of multimedia objects for buyer authentication. IEEE Trans Multimed 6(1):1\u201315","journal-title":"IEEE Trans Multimed"},{"issue":"2","key":"10392_CR16","first-page":"II","volume":"2005","author":"M Noorkami","year":"2005","unstructured":"Noorkami M, Mersereau RM (2005) Compressed-domain video watermarking for H. 264. IEEE International Conference on Image Processing 2005(2):II\u2013890","journal-title":"IEEE International Conference on Image Processing"},{"issue":"6","key":"10392_CR17","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1109\/83.846253","volume":"9","author":"S Pereira","year":"2000","unstructured":"Pereira S, Pun T (2000) Robust template matching for affine resistant image watermarks. IEEE Trans Image Process 9(6):1123\u20131129","journal-title":"IEEE Trans Image Process"},{"key":"10392_CR18","first-page":"279","volume-title":"Multiple domain watermarking for print-scan and JPEG resilient data hiding","author":"A Pramila","year":"2007","unstructured":"Pramila A, Keskinarkaus A, Sepp\u00e4nen T (2007) Multiple domain watermarking for print-scan and JPEG resilient data hiding. International Workshop on Digital Watermarking, Springer, Berlin, Heidelberg, pp 279\u2013293"},{"issue":"23","key":"10392_CR19","doi-asserted-by":"publisher","first-page":"1873","DOI":"10.1049\/el.2015.2522","volume":"51","author":"RO Preda","year":"2015","unstructured":"Preda RO, Vizireanu DN (2015) Watermarking-based image authentication robust to JPEG compression. Electronics Letters 51(23):1873\u20131875","journal-title":"Electronics Letters"},{"issue":"14","key":"10392_CR20","doi-asserted-by":"publisher","first-page":"8381","DOI":"10.1007\/s11042-015-2754-7","volume":"75","author":"AK Singh","year":"2016","unstructured":"Singh AK, Dave M, Mohan A (2016) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl 75(14):8381\u20138401","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"10392_CR21","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1109\/83.967401","volume":"10","author":"V Solachidis","year":"2001","unstructured":"Solachidis V, Pitas L (2001) Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Trans Image Process 10(11):1741\u20131753","journal-title":"IEEE Trans Image Process"},{"issue":"5","key":"10392_CR22","doi-asserted-by":"publisher","first-page":"1640","DOI":"10.1109\/TIM.2003.817155","volume":"52","author":"MA Suhail","year":"2003","unstructured":"Suhail MA, Obaidat MS (2003) Digital watermarking-based DCT and JPEG model. IEEE Trans Instrum Meas 52(5):1640\u20131647","journal-title":"IEEE Trans Instrum Meas"},{"issue":"3","key":"10392_CR23","doi-asserted-by":"publisher","first-page":"3669","DOI":"10.1007\/s11042-016-3928-7","volume":"76","author":"FN Thakkar","year":"2017","unstructured":"Thakkar FN, Srivastava VK (2017) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed Tools Appl 76(3):3669\u20133697","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"10392_CR24","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.1109\/TIFS.2014.2322497","volume":"9","author":"M Urvoy","year":"2014","unstructured":"Urvoy M, Goudia D, Autrusseau F (2014) Perceptual DFT watermarking with improved detection and robustness to geometrical distortions. IEEE Trans Inf Forensics Secur 9(7):1108\u20131119","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"10392_CR25","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"10392_CR26","unstructured":"Xiph.Org Foundation (2020) Xiph.org Video Test Media [derf\u2019s collection]. https:\/\/media.xiph.org\/video\/derf. Accessed 20 April 2020"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10392-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10392-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10392-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T08:44:57Z","timestamp":1619340297000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10392-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,15]]},"references-count":26,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10392"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10392-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,15]]},"assertion":[{"value":"19 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}