{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T17:13:05Z","timestamp":1772125985637,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2021,7,13]],"date-time":"2021-07-13T00:00:00Z","timestamp":1626134400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,13]],"date-time":"2021-07-13T00:00:00Z","timestamp":1626134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902448"],"award-info":[{"award-number":["61902448"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11042-021-11179-2","type":"journal-article","created":{"date-parts":[[2021,7,13]],"date-time":"2021-07-13T11:04:12Z","timestamp":1626174252000},"page":"29805-29826","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A dual-tamper-detection method for digital image authentication and content self-recovery"],"prefix":"10.1007","volume":"80","author":[{"given":"Tong","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7490-6695","authenticated-orcid":false,"given":"Xiaochen","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,13]]},"reference":[{"key":"11179_CR1","unstructured":"Abdulla AA (2015) \"Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography,\" University of Buckingham"},{"key":"11179_CR2","doi-asserted-by":"crossref","unstructured":"Agarwal R, Verma OP (2019) An efficient copy move forgery detection using deep learning feature extraction and matching algorithm. Multimedia Tools Applications:1\u201322","DOI":"10.1007\/s11042-019-08495-z"},{"key":"11179_CR3","doi-asserted-by":"publisher","first-page":"29199","DOI":"10.1007\/s11042-020-09441-0","volume":"79","author":"L AlShehri","year":"2020","unstructured":"AlShehri L, Hussain M, Aboalsamh H, Wadood A (2020) Fragile watermarking for image authentication using BRINT and ELM. Multimedia Tools and Applications 79:29199\u201329223","journal-title":"Multimedia Tools and Applications"},{"key":"11179_CR4","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1007\/s13042-015-0455-1","volume":"7","author":"IA Ansari","year":"2016","unstructured":"Ansari IA, Pant M, Ahn CW (2016) SVD based fragile watermarking scheme for tamper localization and self-recovery. International Journal of Machine Learning and Cybernetics 7:1225\u20131239","journal-title":"International Journal of Machine Learning and Cybernetics"},{"key":"11179_CR5","unstructured":"Bas P, Furon T (2007) \"BOWS-2,\u00a0http:\/\/bows2.eclille.fr\/index.php?mode=VIEW&tmpl=index1.,\" ."},{"key":"11179_CR6","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.displa.2017.01.001","volume":"46","author":"F Cao","year":"2017","unstructured":"Cao F, An B, Wang J, Ye D, Wang H (2017) Hierarchical recovery for tampered images based on watermark self-embedding. Displays 46:52\u201360","journal-title":"Displays"},{"key":"11179_CR7","doi-asserted-by":"crossref","unstructured":"Chang Y-F, Tai W-L (2013) A block-based watermarking scheme for image tamper detection and self-recovery. Opto-Electronics Review 21(2):182\u2013190","DOI":"10.2478\/s11772-013-0088-4"},{"key":"11179_CR8","doi-asserted-by":"crossref","unstructured":"Chen W-C, Wang M-S (2009) A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst Appl 36(2):1300\u20131307","DOI":"10.1016\/j.eswa.2007.11.018"},{"key":"11179_CR9","doi-asserted-by":"crossref","unstructured":"Dhole VS, Patil NN (2015) \"Self embedding fragile watermarking for image tampering detection and image recovery using self recovery blocks,\" in\u00a02015 International Conference on Computing Communication Control and Automation, pp. 752\u2013757: IEEE","DOI":"10.1109\/ICCUBEA.2015.150"},{"key":"11179_CR10","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.ins.2012.01.014","volume":"195","author":"F Di Martino","year":"2012","unstructured":"Di Martino F, Sessa S (2012) Fragile watermarking tamper detection with images compressed by fuzzy transform. Information Sciences 195:62\u201390","journal-title":"Information Sciences"},{"key":"11179_CR11","doi-asserted-by":"publisher","first-page":"2041","DOI":"10.1007\/s12652-018-0806-3","volume":"10","author":"F Di Martino","year":"2019","unstructured":"Di Martino F, Sessa S (2019) Fragile watermarking tamper detection via bilinear fuzzy relation equations. Journal of Ambient Intelligence and Humanized Computing 10:2041\u20132061","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"11179_CR12","doi-asserted-by":"publisher","first-page":"17333","DOI":"10.1007\/s11042-017-5308-3","volume":"77","author":"M Douglas","year":"2018","unstructured":"Douglas M, Bailey K, Leeney M, Curran K (2018) An overview of steganography techniques applied to the protection of biometric data. Multimedia Tools and Applications 77:17333\u201317373","journal-title":"Multimedia Tools and Applications"},{"key":"11179_CR13","doi-asserted-by":"publisher","first-page":"15353","DOI":"10.1007\/s11042-018-6891-7","volume":"78","author":"MA Elaskily","year":"2019","unstructured":"Elaskily MA, Elnemr HA, Dessouky MM, Faragallah OS (2019) Two stages object recognition based copy-move forgery detection algorithm. Multimedia Tools and Applications 78:15353\u201315373","journal-title":"Multimedia Tools and Applications"},{"key":"11179_CR14","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1049\/iet-ipr.2014.0986","volume":"9","author":"R Eswaraiah","year":"2015","unstructured":"Eswaraiah R, Sreenivasa Reddy E (2015) Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest. IET Image Processing 9:615\u2013625","journal-title":"IET Image Processing"},{"key":"11179_CR15","unstructured":"Falkenstern KR, Reed AM, Holub V, Rodriguez TF (2019) \"digital watermarking and data hiding with narrow-band absorption materials,\" ed: Google patents"},{"key":"11179_CR16","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/s11554-018-0812-x","volume":"16","author":"Y Gao","year":"2019","unstructured":"Gao Y, Wang Ji, Shi Y-Q (2019) Dynamic multi-watermarking and detecting in DWT domain. Journal of Real-Time Image Processing 16:565\u2013576","journal-title":"Journal of Real-Time Image Processing"},{"key":"11179_CR17","doi-asserted-by":"publisher","first-page":"243","DOI":"10.32604\/cmc.2018.03781","volume":"57","author":"D Gong","year":"2018","unstructured":"Gong D, Chen Y, Lu H, Li Z, Han Y (2018) Self-embedding Image Watermarking based on Combined Decision Using Pre-offset and Post-offset Blocks. Computers, Materials & Continua 57:243\u2013260","journal-title":"Computers, Materials & Continua"},{"key":"11179_CR18","doi-asserted-by":"publisher","first-page":"32037","DOI":"10.1007\/s11042-020-09275-w","volume":"79","author":"N Kaur","year":"2020","unstructured":"Kaur N, Jindal N, Singh K (2020) A passive approach for the detection of splicing forgery in digital images. Multimedia Tools and Applications 79:32037\u201332063","journal-title":"Multimedia Tools and Applications"},{"key":"11179_CR19","doi-asserted-by":"crossref","unstructured":"\u00a0Liu K-C (2012) Colour image watermarking for tamper proofing and pattern-based recovery. (in En),\u00a0IET Image Processing\u00a06(5):445\u2013454","DOI":"10.1049\/iet-ipr.2011.0574"},{"key":"11179_CR20","unstructured":"Mishra S, Markam K, (2018) \"Analysis of active and passive mechanism for image forgery detection"},{"key":"11179_CR21","doi-asserted-by":"publisher","first-page":"7867","DOI":"10.1007\/s00521-018-3586-y","volume":"31","author":"Z Moghaddasi","year":"2019","unstructured":"Moghaddasi Z, Jalab HA, Noor RM (2019) Image splicing forgery detection based on low-dimensional singular value decomposition of discrete cosine transform coefficients. Neural Computing and Applications 31:7867\u20137877","journal-title":"Neural Computing and Applications"},{"key":"11179_CR22","doi-asserted-by":"crossref","unstructured":"\u00a0Molina J, Ponomaryov V, Reyes R, Sadovnychiy S, Cruz C (2020) Watermarking framework for authentication and self-recovery of tampered colour images. IEEE Lat Am Trans 18(03):631\u2013638","DOI":"10.1109\/TLA.2020.9082736"},{"key":"11179_CR23","doi-asserted-by":"publisher","first-page":"16107","DOI":"10.1007\/s11042-016-3897-x","volume":"76","author":"M Nazari","year":"2017","unstructured":"Nazari M, Sharif A, Mollaeefar M (2017) An improved method for digital image fragile watermarking based on chaotic maps. Multimedia Tools and Applications 76:16107\u201316123","journal-title":"Multimedia Tools and Applications"},{"key":"11179_CR24","doi-asserted-by":"crossref","unstructured":"\u00a0Pal P, Jana B, Bhaumik J (2019) Robust watermarking scheme for tamper detection and authentication exploiting CA. (in En),\u00a0IET Image Processing\u00a013(12):2116\u20132129","DOI":"10.1049\/iet-ipr.2018.6638"},{"key":"11179_CR25","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.sigpro.2017.03.033","volume":"138","author":"C Qin","year":"2017","unstructured":"Qin C, Ji P, Zhang X, Dong J, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Processing 138:280\u2013293","journal-title":"Signal Processing"},{"key":"11179_CR26","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/s11554-019-00881-y","volume":"16","author":"C Qin","year":"2019","unstructured":"Qin C, Qian Z, Feng G, Zhang X (2019) Special issue on real-time image watermarking and forensics in cloud computing. Journal of Real-Time Image Processing 16:559\u2013563","journal-title":"Journal of Real-Time Image Processing"},{"key":"11179_CR27","doi-asserted-by":"publisher","first-page":"35519","DOI":"10.1007\/s11042-019-07971-w","volume":"79","author":"V Rajput","year":"2020","unstructured":"Rajput V, Ansari IA (2020) Image tamper detection and self-recovery using multiple median watermarking. Multimedia Tools and Applications 79:35519\u201335535","journal-title":"Multimedia Tools and Applications"},{"key":"11179_CR28","doi-asserted-by":"crossref","unstructured":"Said A, Pearlman WA (1996) A new, fast, and efficient image codec based on set partitioning in hierarchical trees. IEEE Transactions on circuits and systems for video technology 6(3):243\u2013250","DOI":"10.1109\/76.499834"},{"key":"11179_CR29","doi-asserted-by":"publisher","first-page":"17761","DOI":"10.1007\/s11042-020-08669-0","volume":"79","author":"D Sarkar","year":"2020","unstructured":"Sarkar D, Palit S, Som S, Dey KN (2020) Large scale image tamper detection and restoration. Multimedia Tools and Applications 79:17761\u201317791","journal-title":"Multimedia Tools and Applications"},{"key":"11179_CR30","doi-asserted-by":"crossref","unstructured":"Sarreshtedari S, Akhaee MA (2015) A source-channel coding approach to digital image protection and self-recovery. IEEE Trans Image Process 24(7):2266\u20132277","DOI":"10.1109\/TIP.2015.2414878"},{"key":"11179_CR31","doi-asserted-by":"crossref","unstructured":"Sedighi V, Cogranne R, Fridrich J (2015) Content-adaptive steganography by minimizing statistical detectability. IEEE Transactions on Information Forensics and Security 11(2):221\u2013234","DOI":"10.1109\/TIFS.2015.2486744"},{"key":"11179_CR32","doi-asserted-by":"crossref","unstructured":"Singh D, Singh SK (2017) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl 76(1):953\u2013977","DOI":"10.1007\/s11042-015-3010-x"},{"key":"11179_CR33","doi-asserted-by":"crossref","unstructured":"Steve W (1995) Information authentication for a slippery new age. Dr Dobbs Journal:18\u201326","DOI":"10.1016\/0045-8732(95)90029-2"},{"key":"11179_CR34","doi-asserted-by":"crossref","unstructured":"Su Z, Yao L, Mei J, Zhou L, Li W (2020) \"Learning to hash for personalized image authentication,\" IEEE Transactions on Circuits and Systems for Video Technology","DOI":"10.1109\/TCSVT.2020.3002146"},{"key":"11179_CR35","doi-asserted-by":"crossref","unstructured":"Tagliasacchi M, Valenzise G, Tubaro S (2009) Hash-based identification of sparse image tampering. IEEE Trans Image Process 18(11):2491\u20132504","DOI":"10.1109\/TIP.2009.2028251"},{"key":"11179_CR36","doi-asserted-by":"crossref","unstructured":"Yang Q, Yu D, Zhang Z, Yao Y, Chen L, (2020) \"Spatiotemporal trident networks: detection and localization of object removal tampering in video passive forensics,\" IEEE Transactions on Circuits and Systems for Video Technology,\u00a01","DOI":"10.1109\/TCSVT.2020.3046240"},{"key":"11179_CR37","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s11554-019-00904-8","volume":"17","author":"H Yao","year":"2020","unstructured":"Yao H, Wei H, Qin C, Tang Z (2020) A real-time reversible image authentication method using uniform embedding strategy. Journal of Real-Time Image Processing 17:41\u201354","journal-title":"Journal of Real-Time Image Processing"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11179-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11179-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11179-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T00:08:48Z","timestamp":1672790928000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11179-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,13]]},"references-count":37,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["11179"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11179-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,13]]},"assertion":[{"value":"18 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}