{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:15:49Z","timestamp":1772122549395,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T00:00:00Z","timestamp":1614643200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T00:00:00Z","timestamp":1614643200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-021-10713-6","type":"journal-article","created":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T23:02:16Z","timestamp":1614726136000},"page":"19827-19844","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["A color value differentiation scheme for blind digital image watermarking"],"prefix":"10.1007","volume":"80","author":[{"given":"Fares","family":"Kahlessenane","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1637-9129","authenticated-orcid":false,"given":"Amine","family":"Khaldi","sequence":"additional","affiliation":[]},{"given":"Med Redouane","family":"Kafi","sequence":"additional","affiliation":[]},{"given":"Salah","family":"Euschi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,2]]},"reference":[{"key":"10713_CR1","first-page":"125","volume":"31","author":"J Abraham","year":"2019","unstructured":"Abraham J, Paul V (2019) An imperceptible spatial domain color image watermarking scheme. J King Saud Univ Comput Info Sci 31:125\u2013133","journal-title":"J King Saud Univ Comput Info Sci"},{"issue":"1","key":"10713_CR2","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TCI.2018.2794065","volume":"4","author":"B Ahmaderaghi","year":"2018","unstructured":"Ahmaderaghi B, Kurugollu F, Martinez Del Rincon J, Bouridane A (2018) Blind image watermark detection algorithm based on discrete Shearlet transform using statistical decision theory. IEEE Trans Comput Imag 4(1):46\u201359","journal-title":"IEEE Trans Comput Imag"},{"issue":"1","key":"10713_CR3","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/TMM.2018.2851447","volume":"21","author":"M Amini","year":"2019","unstructured":"Amini M, Sadreazami H, Ahmad M, Swamy M (2019) A channel-dependent statistical watermark detector for color images. IEEE Trans Multimed 21(1):65\u201373","journal-title":"IEEE Trans Multimed"},{"issue":"3","key":"10713_CR4","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1049\/iet-ipr.2018.5288","volume":"13","author":"P Aparna","year":"2019","unstructured":"Aparna P, Venkata P, Kishore V (2019) Biometric-based efficient medical image watermarking in E-healthcare application. IET Image Process 13(3):421\u2013428","journal-title":"IET Image Process"},{"key":"10713_CR5","doi-asserted-by":"crossref","unstructured":"Bhat S, Singh A (2018) Light Weight Secure Image Transmission Scheme for LTE Using Arnold Function, International Conference on Intelligent Circuits and Systems, 334\u2013339","DOI":"10.1109\/ICICS.2018.00075"},{"key":"10713_CR6","doi-asserted-by":"crossref","unstructured":"Dubolia R, Singh R, Singh S, Gupta R (2011) Digital Image Watermarking by Using Discrete Wavelet Transform and Discrete Cosine Transform and Comparison Based on PSNR, International Conference on Communication Systems and Network Technologies, 593\u2013596","DOI":"10.1109\/CSNT.2011.127"},{"key":"10713_CR7","doi-asserted-by":"publisher","first-page":"20464","DOI":"10.1109\/ACCESS.2018.2819424","volume":"6","author":"F Ernawan","year":"2018","unstructured":"Ernawan F, Kabir M (2018) A robust image watermarking technique with an optimal DCT-Psychovisual threshold. IEEE Access 6:20464\u201320480","journal-title":"IEEE Access"},{"key":"10713_CR8","doi-asserted-by":"publisher","first-page":"1018","DOI":"10.1016\/j.cad.2011.03.011","volume":"43","author":"P Fei","year":"2011","unstructured":"Fei P, Lei Y, Long M, Sun X (2011) A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Comput Aided Des 43:1018\u20131024","journal-title":"Comput Aided Des"},{"key":"10713_CR9","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.cad.2013.12.006","volume":"49","author":"P Fei","year":"2014","unstructured":"Fei P, Liu Y, Long M (2014) Reversible watermarking for 2D CAD engineering graphics based on improved histogram shifting. Comput Aided Des 49:42\u201350","journal-title":"Comput Aided Des"},{"key":"10713_CR10","first-page":"436","volume":"16","author":"Q Hu","year":"2013","unstructured":"Hu Q, Abr\u00e0moff M, Garvin M (2013) Automated separation of binary overlapping trees in low-contrast color retinal images. Med Image Comput Comput Assist Interv 16:436\u2013443","journal-title":"Med Image Comput Comput Assist Interv"},{"key":"10713_CR11","doi-asserted-by":"crossref","unstructured":"Kahlessenane F, Khaldi A, Euschi S (2020) A robust blind color image watermarking based on Fourier transform domain, Optik, 208","DOI":"10.1016\/j.ijleo.2020.164562"},{"key":"10713_CR12","doi-asserted-by":"publisher","unstructured":"Kahlessenane F, Khaldi A, Kafi R, Euschi S (2020) A DWT based watermarking approach for medical image protection. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-020-02450-9","DOI":"10.1007\/s12652-020-02450-9"},{"key":"10713_CR13","first-page":"147","volume":"10","author":"A Khaldi","year":"2018","unstructured":"Khaldi A (2018) Diffie-Hellman key exchange through Steganographied images. Revista de Direito Estado e Telecomunica\u00e7\u00f5es 10:147\u2013160","journal-title":"Revista de Direito Estado e Telecomunica\u00e7\u00f5es"},{"key":"10713_CR14","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1504\/IJCVR.2020.10029218","volume":"10","author":"A Khaldi","year":"2020","unstructured":"Khaldi A (2020) Lossless blind image data hiding scheme for semi-fragile image watermark. Int J Comput Vis Robot 10:373. https:\/\/doi.org\/10.1504\/IJCVR.2020.10029218","journal-title":"Int J Comput Vis Robot"},{"key":"10713_CR15","doi-asserted-by":"publisher","first-page":"143","DOI":"10.21467\/ias.8.1.143-149","volume":"8","author":"A Khaldi","year":"2019","unstructured":"Khaldi A (2019) Steganographic techniques classification according to image format. Int Annals Sci 8:143\u2013149","journal-title":"Int Annals Sci"},{"key":"10713_CR16","first-page":"1","volume":"10","author":"C Kim","year":"2020","unstructured":"Kim C, Shin D, Yang C, Leng L (2020) Hybrid data hiding based on AMBTC using enhanced hamming code. Appl Sci 10:1\u201318","journal-title":"Appl Sci"},{"key":"10713_CR17","first-page":"1","volume":"9","author":"C Kim","year":"2020","unstructured":"Kim C, Yang C, Leng L (2020) High-capacity data hiding for ABTC-EQ based compressed image. electronics 9:1\u201315","journal-title":"electronics"},{"key":"10713_CR18","doi-asserted-by":"crossref","unstructured":"Kim P, Yoon E, Ryu K, Jung K (2019) Data-hiding scheme using multidirectional pixel-value differencing on colour images, Secur Commun Netw 2019","DOI":"10.1155\/2019\/9038650"},{"key":"10713_CR19","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11554-016-0641-8","volume":"14","author":"C Kim","year":"2018","unstructured":"Kim C, Shin D, Leng L, Yang C (2018) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14:101\u2013114","journal-title":"J Real-Time Image Proc"},{"key":"10713_CR20","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.displa.2018.04.002","volume":"55","author":"C Kim","year":"2018","unstructured":"Kim C, Shin D, Leng L, Yang C (2018) Separable reversible data hiding in encrypted halftone image. Displays 55:71\u201379","journal-title":"Displays"},{"key":"10713_CR21","doi-asserted-by":"crossref","unstructured":"Koju R, Joshi S (2016) Semi blind color image watermarking using Slant transform, 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics, 509\u2013513","DOI":"10.1109\/AEEICB.2016.7538342"},{"key":"10713_CR22","doi-asserted-by":"publisher","first-page":"46194","DOI":"10.1109\/ACCESS.2018.2866153","volume":"6","author":"O Kwon","year":"2018","unstructured":"Kwon O, Choi S, Lee B (2018) A watermark-based scheme for authenticating JPEG image integrity. IEEE Access 6:46194\u201346205","journal-title":"IEEE Access"},{"key":"10713_CR23","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s11042-015-3058-7","volume":"76","author":"L Leng","year":"2017","unstructured":"Leng L, Li M, Kim C, Bi X (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76:333\u2013354","journal-title":"Multimed Tools Appl"},{"key":"10713_CR24","first-page":"2543","volume":"5","author":"L Leng","year":"2010","unstructured":"Leng L, Zhang J, Khan M, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5:2543\u20132554","journal-title":"Int J Phys Sci"},{"key":"10713_CR25","doi-asserted-by":"publisher","first-page":"28969","DOI":"10.1007\/s11042-018-6072-8","volume":"77","author":"X Lingyun","year":"2018","unstructured":"Lingyun X, Wu W, Li X, Yang C (2018) A linguistic steganography based on word indexing compression and candidate selection. Multimed Tools Appl 77:28969\u201328989","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"10713_CR26","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1049\/iet-cvi.2015.0344","volume":"10","author":"B Murugan","year":"2016","unstructured":"Murugan B, Gounden A, Gounder N (2016) Image encryption scheme based on block-based confusion and multiple levels of diffusion. IET Comput Vis 10(6):593\u2013602","journal-title":"IET Comput Vis"},{"key":"10713_CR27","unstructured":"Nandini D, Divya S (2017) A literature survey on various watermarking techniques, International Conference on Inventive Systems and Control, 1\u20134"},{"issue":"11","key":"10713_CR28","doi-asserted-by":"publisher","first-page":"2385","DOI":"10.1109\/TIP.2009.2025923","volume":"18","author":"P Sampat","year":"2009","unstructured":"Sampat P, Wang Z, Gupta S, Bovik A, Markey K (2009) Complex wavelet structural similarity: a new image similarity index. IEEE Trans Image Process 18(11):2385\u20132401","journal-title":"IEEE Trans Image Process"},{"key":"10713_CR29","doi-asserted-by":"publisher","first-page":"10269","DOI":"10.1109\/ACCESS.2018.2799240","volume":"6","author":"A Shehab","year":"2018","unstructured":"Shehab A, Elhoseny M, Muhammad K, Sangaiah A, Yang P, Huang H, Hou H (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269\u201310278","journal-title":"IEEE Access"},{"key":"10713_CR30","doi-asserted-by":"crossref","unstructured":"Shukla D, Sharma M (2016) Video watermarking using dyadic filter and discrete wavelet transform, International Conference on Wireless Communications, Signal Processing and Networking, 1647\u20131650","DOI":"10.1109\/WiSPNET.2016.7566419"},{"issue":"11","key":"10713_CR31","doi-asserted-by":"publisher","first-page":"1994","DOI":"10.1049\/iet-ipr.2018.5399","volume":"12","author":"H Singh","year":"2018","unstructured":"Singh H (2018) Watermarking image encryption using deterministic phase mask and singular value decomposition in fractional Mellin transform domain. IET Image Process 12(11):1994\u20132001","journal-title":"IET Image Process"},{"key":"10713_CR32","doi-asserted-by":"publisher","first-page":"4358","DOI":"10.1109\/ACCESS.2018.2888857","volume":"7","author":"Q Su","year":"2019","unstructured":"Su Q, Yuan Z, Liu D (December 2019) An approximate Schur decomposition-based spatial domain color image watermarking method. IEEE Access 7:4358\u20134370","journal-title":"IEEE Access"},{"key":"10713_CR33","first-page":"541","volume":"55","author":"H Wei","year":"2018","unstructured":"Wei H, Xiang L, Li Y, Yang P, Shen X (2018) Reversible natural language watermarking using synonym substitution and arithmetic coding. Comput Mater Continua 55:541\u2013559","journal-title":"Comput Mater Continua"},{"key":"10713_CR34","doi-asserted-by":"publisher","first-page":"136592","DOI":"10.1109\/ACCESS.2019.2942449","volume":"7","author":"X Xiong","year":"2019","unstructured":"Xiong X (October 2019) Novel scheme of reversible watermarking with a complementary embedding strategy. IEEE Access 7:136592\u2013136603","journal-title":"IEEE Access"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10713-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10713-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10713-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,21]],"date-time":"2021-05-21T06:12:53Z","timestamp":1621577573000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10713-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,2]]},"references-count":34,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10713"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10713-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,2]]},"assertion":[{"value":"12 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}