{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T06:41:56Z","timestamp":1764225716463,"version":"3.37.3"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"21-23","license":[{"start":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T00:00:00Z","timestamp":1627344000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T00:00:00Z","timestamp":1627344000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s11042-021-11134-1","type":"journal-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T16:03:36Z","timestamp":1627401816000},"page":"32197-32217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["FD-TR: feature detector based on scale invariant feature transform and bidirectional feature regionalization for digital image watermarking"],"prefix":"10.1007","volume":"80","author":[{"given":"Mianjie","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7490-6695","authenticated-orcid":false,"given":"Xiaochen","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,27]]},"reference":[{"issue":"1","key":"11134_CR1","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TCI.2018.2794065","volume":"4","author":"B Ahmaderaghi","year":"2018","unstructured":"Ahmaderaghi B, Kurugollu F, Del Rincon JM, Bouridane A (2018) Blind image watermark detection algorithm based on discrete shearlet transform using statistical decision theory. IEEE Transactions on Computational Imaging 4(1):46\u201359","journal-title":"IEEE Transactions on Computational Imaging"},{"key":"11134_CR2","doi-asserted-by":"crossref","unstructured":"Ambadekar SP, Jain J, Khanapuri J (2019) Digital image watermarking through encryption and DWT for Copyright Protection, in Recent Trends in Signal and Image Processing: Springer, pp. 187\u2013195.","DOI":"10.1007\/978-981-10-8863-6_19"},{"key":"11134_CR3","unstructured":"Chaurasia P, Kohli R, Garg A (2014) Biometrics minutiae detection and feature extraction. LAP LAMBERT Academic Publishing"},{"issue":"4","key":"11134_CR4","doi-asserted-by":"publisher","first-page":"950","DOI":"10.1109\/TSP.2003.809367","volume":"51","author":"T Chih-Wei","year":"2003","unstructured":"Chih-Wei T, Hsueh-Ming H (2003) A feature-based robust digital image watermarking scheme. IEEE Trans Signal Process 51(4):950\u2013959","journal-title":"IEEE Trans Signal Process"},{"key":"11134_CR5","doi-asserted-by":"crossref","unstructured":"Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan kaufmann","DOI":"10.1016\/B978-012372585-1.50015-2"},{"issue":"10","key":"11134_CR6","doi-asserted-by":"publisher","first-page":"3089","DOI":"10.1109\/TIP.2006.877507","volume":"15","author":"ALD Cunha","year":"2006","unstructured":"Cunha ALD, Zhou J, Do MN (2006) The nonsubsampled Contourlet transform: theory, design, and applications. IEEE Trans Image Process 15(10):3089\u20133101","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"11134_CR7","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s11760-014-0684-x","volume":"9","author":"EH Elshazly","year":"2015","unstructured":"Elshazly EH et al (2015) Robust and secure fractional wavelet image watermarking. Signal, Image and Video Processing 9(1):89\u201398, 2015\/12\/01","journal-title":"Signal, Image and Video Processing"},{"issue":"3","key":"11134_CR8","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1049\/iet-ipr.2013.0386","volume":"8","author":"M Hamghalam","year":"2014","unstructured":"Hamghalam M, Mirzakuchaki S, Akhaee MA (2014) Geometric modelling of the wavelet coefficients for image watermarking using optimum detector. IET Image Process 8(3):162\u2013172","journal-title":"IET Image Process"},{"key":"11134_CR9","first-page":"12\/01","volume":"2019","author":"M Khosravi","year":"2019","unstructured":"Khosravi M, Samadi S (2019) Efficient payload communications for IoT-enabled ViSAR vehicles using discrete cosine transform-based quasi-sparse bit injection. EURASIP J Wirel Commun Netw 2019:12\/01","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"11134_CR10","doi-asserted-by":"crossref","unstructured":"Y. Liang, L. Liu, Y. Xu, Y. Xiang, and B. Zou (2011) Multi-task GLOH feature selection for human age estimation, in 2011 18th IEEE International Conference on Image Processing, 2011, pp. 565\u2013568.","DOI":"10.1109\/ICIP.2011.6116611"},{"key":"11134_CR11","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.eswa.2017.12.003","volume":"97","author":"Y Liu","year":"2018","unstructured":"Liu Y, Tang S, Liu R, Zhang L, Ma Z (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Systems with Applications 97:95\u2013105, 2018\/05\/01\/","journal-title":"Expert Systems with Applications"},{"key":"11134_CR12","doi-asserted-by":"crossref","unstructured":"Lowe DG Distinctive image features from scale-invariant keypoints. International Journal of Computer Vision 60(2):91\u2013110 November 01 2004","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"11134_CR13","doi-asserted-by":"crossref","unstructured":"Saha BJ, Pradhan C, Kabi KK, Bisoi AK (2014) Robust watermarking technique using Arnold's transformation and RSA in discrete wavelets, in 2014 International Conference on Information Systems and Computer Networks (ISCON), pp. 83\u201387.","DOI":"10.1109\/ICISCON.2014.6965223"},{"key":"11134_CR14","doi-asserted-by":"crossref","unstructured":"Singh A (2019) Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimed Tools Appl:1\u201311","DOI":"10.1007\/s11042-018-7115-x"},{"key":"11134_CR15","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.jvcir.2018.03.006","volume":"53","author":"SP Singh","year":"2018","unstructured":"Singh SP, Bhatnagar G (2018) A new robust watermarking system in integer DCT domain. J Vis Commun Image Represent 53:86\u2013101","journal-title":"J Vis Commun Image Represent"},{"issue":"5","key":"11134_CR16","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1007\/s11760-013-0534-2","volume":"9","author":"Q Su","year":"2015","unstructured":"Su Q, Wang G, Jia S, Zhang X, Liu Q, Liu X (2015) Embedding color image watermark in color image based on two-level DCT. Signal, Image and Video Processing 9(5):991\u20131007, 2015\/07\/01","journal-title":"Signal, Image and Video Processing"},{"issue":"3","key":"11134_CR17","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1109\/TIP.2010.2073475","volume":"20","author":"J Tsai","year":"2011","unstructured":"Tsai J, Huang W, Kuo Y (2011) On the selection of optimal feature region set for robust digital image watermarking. IEEE Trans Image Process 20(3):735\u2013743","journal-title":"IEEE Trans Image Process"},{"issue":"11","key":"11134_CR18","doi-asserted-by":"publisher","first-page":"3985","DOI":"10.1007\/s11042-013-1808-y","volume":"74","author":"ED Tsougenis","year":"2015","unstructured":"Tsougenis ED, Papakostas GA, Koulouriotis DE (June 01 2015) Image watermarking via separable moments. Multimedia Tools and Applications 74(11):3985\u20134012","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"11134_CR19","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1007\/s11760-013-0603-6","volume":"9","author":"VS Verma","year":"2015","unstructured":"Verma VS, Kumar Jha R (2015) Improved watermarking technique based on significant difference of lifting wavelet coefficients. Signal, Image and Video Processing 9(6):1443\u20131450, 2015\/09\/01","journal-title":"Signal, Image and Video Processing"},{"issue":"8","key":"11134_CR20","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TCSVT.2003.815957","volume":"13","author":"K Xiangui","year":"2003","unstructured":"Xiangui K, Jiwu H, Yun QS, Yan L (2003) A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Transactions on Circuits and Systems for Video Technology 13(8):776\u2013786","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"1","key":"11134_CR21","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1007\/s11042-013-1405-0","volume":"72","author":"X-C Yuan","year":"2014","unstructured":"Yuan X-C, Pun C-M (2014) Feature extraction and local Zernike moments based geometric invariant watermarking. Multimed Tools Appl 72(1):777\u2013799","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"11134_CR22","doi-asserted-by":"publisher","first-page":"2087","DOI":"10.1016\/j.sigpro.2013.01.024","volume":"93","author":"X-C Yuan","year":"2013","unstructured":"Yuan X-C, Pun C-M, Chen CLP (2013) Geometric invariant watermarking by local Zernike moments of binary image patches. Signal Processing 93(7):2087\u20132095, 2013\/07\/01\/","journal-title":"Signal Processing"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11134-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11134-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11134-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T04:53:59Z","timestamp":1633841639000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11134-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,27]]},"references-count":22,"journal-issue":{"issue":"21-23","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["11134"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11134-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,7,27]]},"assertion":[{"value":"15 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}