{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T06:07:53Z","timestamp":1744870073752,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2021,5,15]],"date-time":"2021-05-15T00:00:00Z","timestamp":1621036800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,15]],"date-time":"2021-05-15T00:00:00Z","timestamp":1621036800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-021-11046-0","type":"journal-article","created":{"date-parts":[[2021,5,15]],"date-time":"2021-05-15T17:02:36Z","timestamp":1621098156000},"page":"27245-27258","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Hardware execution of a saliency map based digital image watermarking framework"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5782-9694","authenticated-orcid":false,"given":"Subhrajit","family":"Sinha Roy","sequence":"first","affiliation":[]},{"given":"Abhishek","family":"Basu","sequence":"additional","affiliation":[]},{"given":"Avik","family":"Chattopadhyay","sequence":"additional","affiliation":[]},{"given":"Rajeev","family":"Kamal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,15]]},"reference":[{"key":"11046_CR1","doi-asserted-by":"publisher","first-page":"13427","DOI":"10.1007\/s11042-020-08662-7","volume":"79","author":"E Akhtarkavan","year":"2020","unstructured":"Akhtarkavan E, Majidi B, Salleh MFM, Patra JC (2020) Fragile high capacity data hiding in digital images using integer-to-integer DWT and lattice vector quantization. Multimed Tools Appl 79:13427\u201313447. https:\/\/doi.org\/10.1007\/s11042-020-08662-7","journal-title":"Multimed Tools Appl"},{"key":"11046_CR2","doi-asserted-by":"publisher","first-page":"3272","DOI":"10.4028\/www.scientific.net\/AMM.602-605.330","volume":"602-605","author":"WC Bao","year":"2014","unstructured":"Bao WC (2014) Image copyright protection watermark algorithm based on spread Spectrum technology. Appl Mech Mater 602-605:3272\u20133277","journal-title":"Appl Mech Mater"},{"issue":"11","key":"11046_CR3","first-page":"1","volume":"4","author":"S Bhattacharya","year":"2014","unstructured":"Bhattacharya S (2014) Survey on digital watermarking \u2013 a Digital Forensics & Security Application. Int J Adv Res Comput Sci Softw Eng 4(11):1\u20137","journal-title":"Int J Adv Res Comput Sci Softw Eng"},{"key":"11046_CR4","doi-asserted-by":"crossref","unstructured":"Darabkh KA, Jafar IF, Al-Zubi RT, Hawa M (2014) An Improved Image Least Significant Bit Replacement Method, 37th Int. Convention on Information and Communication Tech., Electronics and Microelectronics (MIPRO), IEEE, p. 1182\u20131186.","DOI":"10.1109\/MIPRO.2014.6859747"},{"key":"11046_CR5","unstructured":"Dong ML, Dian HW, Jie L (2012) A novel robust blind watermarking algorithm based on wavelet and fractional Fourier transform, IEEE 14th international conference on communication technology"},{"key":"11046_CR6","doi-asserted-by":"crossref","unstructured":"Duan L, Wu C, Miao J et al., (2011) Visual saliency detection by spatially weighted dissimilarity, 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 20\u201325, p. 473\u2013480.","DOI":"10.1109\/CVPR.2011.5995676"},{"key":"11046_CR7","doi-asserted-by":"crossref","unstructured":"Field DJ, Brady N (1997) Visual sensitivity, blur and the sources of variability in the amplitude spectra of natural scenes, Vision Research, Elsevier, 37 (23), p. 3367\u20133383","DOI":"10.1016\/S0042-6989(97)00181-8"},{"issue":"4","key":"11046_CR8","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/s11741-003-0015-x","volume":"7","author":"PA Fordjour","year":"2003","unstructured":"Fordjour PA, Wang SZ (2003) Spatial Domain Technique for Visible Watermarking. J. Shanghai Univ (English Edition) 7(4):384\u2013388","journal-title":"J. Shanghai Univ (English Edition)"},{"key":"11046_CR9","doi-asserted-by":"publisher","first-page":"16949","DOI":"10.1007\/s11042-016-3597-6","volume":"76","author":"L Guo","year":"2017","unstructured":"Guo L (2017) An embedded multimedia communication terminal based on DSP+FPGA. Multimed Tools Appl 76:16949\u201316961","journal-title":"Multimed Tools Appl"},{"key":"11046_CR10","unstructured":"Harel J, Koch C, Perona P (2006) Graph-Based Visual Saliency, Proc. Neural Information Processing Systems, p. 545\u2013552"},{"key":"11046_CR11","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.image.2016.04.002","volume":"45","author":"L Hong","year":"2016","unstructured":"Hong L, Di X, Rui Z, Yushu Z, Sen B (2016) Robust and hierarchical watermarking of encrypted images based on compressive sensing. J Sign Process Image Commun 45:41\u201351","journal-title":"J Sign Process Image Commun"},{"key":"11046_CR12","doi-asserted-by":"crossref","unstructured":"Hou X, Zhang L (2007) Saliency detection: a spectral residual approach, Int. Conf. Computer Vision and Pattern Recognition, IEEE, p. 1\u20138","DOI":"10.1109\/CVPR.2007.383267"},{"issue":"1","key":"11046_CR13","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1109\/TPAMI.2011.146","volume":"34","author":"X Hou","year":"2012","unstructured":"Hou X, Harel J, Koch C (2012) Image signature: highlighting sparse salient regions. IEEE Trans Patt Anal Mach Intell 34(1):194\u2013201","journal-title":"IEEE Trans Patt Anal Mach Intell"},{"key":"11046_CR14","doi-asserted-by":"crossref","unstructured":"Huynh-The T, Lee S (2017) Color Image Watermarking Using Selective MSB-LSB Embedding And 2D Otsu Thresholding, International Conference on Systems, Man and Cybernetics, IEEE, p. 1333\u20131338, Banff Center, Canada","DOI":"10.1109\/SMC.2017.8122798"},{"issue":"10\u201312","key":"11046_CR15","doi-asserted-by":"publisher","first-page":"1489","DOI":"10.1016\/S0042-6989(99)00163-7","volume":"40","author":"L Itti","year":"2000","unstructured":"Itti L, Koch C (2000) A saliency-based search mechanism for overt and covert shifts of visual attention. Vis Res 40(10\u201312):1489\u20131506","journal-title":"Vis Res"},{"issue":"5","key":"11046_CR16","first-page":"6400","volume":"3","author":"RM Khoshki","year":"2014","unstructured":"Khoshki RM, Oweis S, Wang S et al (2014) FPGA hardware based implementation of an image watermarking system. Intl J Adv Res Comput Commun Eng 3(5):6400\u20136405","journal-title":"Intl J Adv Res Comput Commun Eng"},{"issue":"4","key":"11046_CR17","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1117\/1.1287594","volume":"9","author":"M Kutter","year":"2000","unstructured":"Kutter M, Petitcolas FAP (2000) A fair benchmark for image watermarking systems. J Electron Imag 9(4):445\u2013455","journal-title":"J Electron Imag"},{"key":"11046_CR18","doi-asserted-by":"publisher","first-page":"1373","DOI":"10.1007\/s11042-019-08213-9","volume":"79","author":"J Li","year":"2020","unstructured":"Li J, Zhang C (2020) Blind and robust watermarking scheme combining bimodal distribution structure with iterative selection method. Multimed Tools Appl 79:1373\u20131407","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"11046_CR19","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1049\/iet-ipr.2014.0965","volume":"10","author":"NM Makbol","year":"2016","unstructured":"Makbol NM, Ee KB, Rassem TH (2016) Block-based discrete wavelet transform singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Process 10(1):34\u201352","journal-title":"IET Image Process"},{"issue":"12","key":"11046_CR20","doi-asserted-by":"publisher","first-page":"5060","DOI":"10.1109\/TIP.2015.2476961","volume":"24","author":"A Mehran","year":"2015","unstructured":"Mehran A, Chandler DM (2015) Digital image watermarking via adaptive logo Texturization. IEEE Trans Image Process 24(12):5060\u20135073","journal-title":"IEEE Trans Image Process"},{"key":"11046_CR21","doi-asserted-by":"crossref","unstructured":"Mishra A, Goel A (2015) A novel HVS based gray scale image watermarking scheme using fast fuzzy-ELM hybrid architecture, In: ELM-2014, 2, p. 145\u2013159","DOI":"10.1007\/978-3-319-14066-7_15"},{"key":"11046_CR22","doi-asserted-by":"publisher","first-page":"13351","DOI":"10.1007\/s11042-019-08504-1","volume":"79","author":"P Niu","year":"2020","unstructured":"Niu P, Wang X, Yang H et al (2020) A blind watermark algorithm in SWT domain using bivariate generalized Gaussian distributions. Multimed Tools Appl 79:13351\u201313377. https:\/\/doi.org\/10.1007\/s11042-019-08504-1","journal-title":"Multimed Tools Appl"},{"key":"11046_CR23","unstructured":"Pareek R, Ghosh PK (2012) Discrete cosine transformation based image watermarking for authentication and copyright protection, Intl J Eng Adv Technol, 1 (3)."},{"key":"11046_CR24","doi-asserted-by":"publisher","first-page":"12507","DOI":"10.1007\/s11042-019-08392-5","volume":"79","author":"A Phadikar","year":"2020","unstructured":"Phadikar A, Mandal H, Chiu T (2020) A novel QIM data hiding scheme and its hardware implementation using FPGA for quality access control of digital image. Multimed Tools Appl 79:12507\u201312532. https:\/\/doi.org\/10.1007\/s11042-019-08392-5","journal-title":"Multimed Tools Appl"},{"key":"11046_CR25","unstructured":"Prasanna S, Toshanlal M, Ankit S, et al. (2015) \u201cA DWT-SVD based digital watermarking technique for copyright protection\u201d, International Conference on Electrical, Electronics, Signals, Communication and Optimization."},{"key":"11046_CR26","doi-asserted-by":"crossref","unstructured":"Seo HJ, Milanfar P (Nov. 2009) Static and space-time visual saliency detection by self-resemblance. J Vis 9(12):15.1\u201315.1527","DOI":"10.1167\/9.12.15"},{"key":"11046_CR27","first-page":"1","volume":"24-26","author":"J Shi","year":"2013","unstructured":"Shi J, Yan Q, Shi H et al (2013) Visual attention based image zero watermark scheme with ensemble similarity. Intl Conf Wireless Commun Sign Process 24-26:1\u20135","journal-title":"Intl Conf Wireless Commun Sign Process"},{"key":"11046_CR28","unstructured":"Sinha Roy S, Saha S, Basu A, (2015) A generic testing architecture for digital watermarking, Proc. FRCCD-2015, p. 50\u201358"},{"key":"11046_CR29","unstructured":"Sinha Roy S, Basu A, Chattopadhyay A (2017) Relative study on some saliency map models: leads to improve data protection in network surroundings, Recent Trends in Renewable Energy and Smart Grid, ISBN: 978-93-86432-07-0"},{"key":"11046_CR30","unstructured":"Sinha Roy S, Basu A, Chattopadhyay A, (2019) Perspectives on Digital Image Watermarking, Intelligent Copyright Protection for Images, 1st Ed., New York, USA, CRC, Taylor and Francis."},{"key":"11046_CR31","unstructured":"Sinha Roy, S., Basu, A., Chattopadhyay, A., 2020, \u201cOn the Implementation of a Copyright Protection Scheme using Digital Image Watermarking,\u201d Multimed Tools Appl. https:\/\/doi.org\/10.007\/s11042-020-08652-9"},{"key":"11046_CR32","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1007\/s11045-017-0487-7","volume":"29","author":"Q Su","year":"2018","unstructured":"Su Q, Wang G, Zhang X, Lv G, Chen B (2018) A new algorithm of blind color image watermarking based on LU decomposition. Multidim Syst Sign Process 29:1055\u20131074","journal-title":"Multidim Syst Sign Process"},{"key":"11046_CR33","unstructured":"The USC-SIPI Image Database. http:\/\/sipi.usc.edu\/database\/database.php?volume=misc."},{"issue":"1","key":"11046_CR34","doi-asserted-by":"publisher","first-page":"113","DOI":"10.15388\/Informatica.2014.07","volume":"25","author":"HH Tsai","year":"2014","unstructured":"Tsai HH, Lo SC (2014) JND-based watermark embedding and GA-based watermark extraction with fuzzy inference system for image verification. Informatica 25(1):113\u2013137","journal-title":"Informatica"},{"key":"11046_CR35","doi-asserted-by":"crossref","unstructured":"Wang W, Wang C, Zheng H, et al. (2020) An improved reversible watermarking scheme using weighted prediction and watermarking simulation,\u201dSignal Processing: Image Communication, Elsevier, 81","DOI":"10.1016\/j.image.2019.115705"},{"key":"11046_CR36","doi-asserted-by":"crossref","unstructured":"Wu Q, Zhu C, Li JJ, Chang CC, Wang ZH (2016). A magic cube based information hiding scheme of large payload. J Inf Secur Appl 26:1\u20137","DOI":"10.1016\/j.jisa.2015.08.003"},{"key":"11046_CR37","doi-asserted-by":"crossref","unstructured":"Yan J, Zhu M, Liu H et al. (2010) Visual Saliency Detection via Sparsity Pursuit, Signal Processing Letters, IEEE, 17 (8), p. 739\u2013742","DOI":"10.1109\/LSP.2010.2053200"},{"key":"11046_CR38","doi-asserted-by":"publisher","first-page":"28003","DOI":"10.1007\/s11042-019-07902-9","volume":"78","author":"L Zhang","year":"2019","unstructured":"Zhang L, Wei D (2019) Dual DCT-DWT-SVD digital watermarking algorithm based on particle swarm optimization. Multimed Tools Appl 78:28003\u201328023","journal-title":"Multimed Tools Appl"},{"key":"11046_CR39","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.sigpro.2019.05.035","volume":"164","author":"H Zheng","year":"2019","unstructured":"Zheng H, Wang C, Wang J, Xiang S (2019) A new reversible watermarking scheme using the content-adaptive block size for prediction. Signal Process Elsevier 164:74\u201383","journal-title":"Signal Process Elsevier"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11046-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11046-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11046-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,24]],"date-time":"2021-07-24T15:11:08Z","timestamp":1627139468000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11046-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,15]]},"references-count":39,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["11046"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11046-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,5,15]]},"assertion":[{"value":"22 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 May 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}