{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:24:11Z","timestamp":1774538651486,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T00:00:00Z","timestamp":1659052800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T00:00:00Z","timestamp":1659052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61202446"],"award-info":[{"award-number":["61202446"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["N150404004"],"award-info":[{"award-number":["N150404004"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s11042-022-13601-9","type":"journal-article","created":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T12:41:48Z","timestamp":1659098508000},"page":"4551-4567","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Novel zero-watermarking method using the compressed sensing significant feature"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5029-5703","authenticated-orcid":false,"given":"Jun","family":"Lang","sequence":"first","affiliation":[]},{"given":"Chunlei","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,29]]},"reference":[{"key":"13601_CR1","first-page":"144","volume":"4","author":"JIA Chao","year":"2013","unstructured":"Chao JIA, Zhang Z-H (2013) A digital image zero-watermarking algorithm based on SURF and normalization. Comput Technol Dev 4:144\u2013147","journal-title":"Comput Technol Dev"},{"issue":"12","key":"13601_CR2","first-page":"1617","volume":"11","author":"H Chen","year":"2011","unstructured":"Chen H, Luo T, Yu M (2011) A zero-watermark method based on texture characteristic of image blocks for stereo images. AJER 11(12):1617\u20131620","journal-title":"AJER"},{"key":"13601_CR3","unstructured":"Davenport M (2013) \u201cThe Fundamentals of Compressive Sensing\u201d. IEEE SPEL"},{"issue":"4","key":"13601_CR4","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho DL (2006) Compressed sensing. IEEE T Inform Theory 52(4):1289\u20131306","journal-title":"IEEE T Inform Theory"},{"issue":"5","key":"13601_CR5","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/s11859-010-0675-x","volume":"15","author":"L Fan","year":"2010","unstructured":"Fan L, Gao TG, Yang QT (2010) A novel zero-watermark copyright authentication scheme based on lifting wavelet and Harris corner detection. Wuhan Univ J of Nature Science 15(5):408\u2013414","journal-title":"Wuhan Univ J of Nature Science"},{"key":"13601_CR6","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.image.2018.06.004","volume":"68","author":"H Gan","year":"2018","unstructured":"Gan H, Xiao S, Zhao Y, Xue X (2018) Construction of efficient and structural chaotic sensing matrix for compressive sensing. Signal Process Image Commun 68:129\u2013137","journal-title":"Signal Process Image Commun"},{"key":"13601_CR7","unstructured":"Gan L, Do TT, Tran TD (2008) Fast compressive imaging using scrambled block hadamard ensemble. Proc, EUSIPCO"},{"key":"13601_CR8","doi-asserted-by":"publisher","first-page":"2505","DOI":"10.12733\/jics20103699","volume":"11","author":"S Hao","year":"2014","unstructured":"Hao S, Zhu X, Zhu G, Li G (2014) A robust zero-watermarking scheme for image based on block compressive sensing and Arnold transformation. J Inform Comput Sci 11:2505\u20132516","journal-title":"J Inform Comput Sci"},{"key":"13601_CR9","unstructured":"Hu C, Wang X (2009) \u201cZero watermark protocol based on time-stamp and digital signature.\u201d IFITA. 193\u2013196"},{"key":"13601_CR10","doi-asserted-by":"crossref","unstructured":"Hu MY, Tian XL and Xia SW (2011). Robust Digital Image Zero-watermarking Based on CDMA Technology. 4th CISP. 1035\u20131038","DOI":"10.1109\/CISP.2011.6100270"},{"key":"13601_CR11","unstructured":"Jing L, Li SH (2007) Robust Zero-watermarking scheme using local invariant keypoints. Proceed Int Conf on Multimedia Syst Signal Process (IEEE. Computer Society Press, Hangzhou. 39\u201344."},{"key":"13601_CR12","doi-asserted-by":"crossref","unstructured":"Jing L, Liu FL (2007) Double zero-watermarks scheme utilizing scale invariant feature transform and log-polar mapping. Proceed IEEE Int Conf Multimedia Expo (IEEE Computer Society, Beijing):2118\u20132121","DOI":"10.1109\/ICME.2007.4285101"},{"key":"13601_CR13","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.optlaseng.2013.08.021","volume":"53","author":"J Lang","year":"2014","unstructured":"Lang J, Zhang ZG (2014) Blind digital watermarking method in the fractional Fourier transform domain. Opt Laser Eng 53:112\u2013121","journal-title":"Opt Laser Eng"},{"issue":"4","key":"13601_CR14","first-page":"372","volume":"38","author":"C Liu","year":"2019","unstructured":"Liu C, Sun J, Zhang Y, Liu W (2019) Robust zero watermarking algorithm based on singular value decomposition. J Liaoning Techn Univ 38(4):372\u2013376","journal-title":"J Liaoning Techn Univ"},{"key":"13601_CR15","first-page":"90","volume":"48","author":"JJ Liu","year":"2012","unstructured":"Liu JJ, Tao L (2012) Robust image zero-watermarking using non-negative matrix factorization. Comput Eng Appl 48:90\u201393","journal-title":"Comput Eng Appl"},{"key":"13601_CR16","unstructured":"Mayiami M, Seyfe B, Bafghi H (2013) Perfect secrecy via compressed sensing. Iran Workshop Commun Inform Theory 1-5"},{"key":"13601_CR17","doi-asserted-by":"crossref","unstructured":"Orsdemir A, Altun H, Sharma G, Bocko M (2008) On the security and robustness of encryption via compressed sensing. IEEE Milit Commun Conf:1\u20137","DOI":"10.1109\/MILCOM.2008.4753187"},{"key":"13601_CR18","doi-asserted-by":"crossref","unstructured":"Rachlin Y, Baron D (2008) The Secrecy of Compressed Sensing Measurements. 46th Ann Allerton Conf Commun, Control Comput. 813\u2013817","DOI":"10.1109\/ALLERTON.2008.4797641"},{"key":"13601_CR19","doi-asserted-by":"crossref","unstructured":"Rahmani H, Mortezaei R, Moghaddam ME (2010) \u201cA new lossless watermarking scheme based on DCT coefficients.\u201d The 6th IDC. 28\u201333","DOI":"10.1155\/2010\/428183"},{"issue":"6","key":"13601_CR20","doi-asserted-by":"publisher","first-page":"1480","DOI":"10.1016\/j.sigpro.2011.12.006","volume":"92","author":"S Rawat","year":"2012","unstructured":"Rawat S, Raman B (2012) A blind watermarking algorithm based on fractional Fourier transform and visual cryptography. Signal PR 92(6):1480\u20131491","journal-title":"Signal PR"},{"key":"13601_CR21","unstructured":"S Z, Kintak U (2017) A novel image zero-watermarking scheme based on non-uniform rectangular. Proceed Int Conf Wavelet Anal Patt Recogn:78\u201382"},{"key":"13601_CR22","doi-asserted-by":"crossref","unstructured":"Sang J, Liao X, Alam MS (2006). \u201cNeural-network-based zerowatermark scheme for digital images,\u201d Opt. Eng. 45(9), 097006\u20131\u2013097006-9","DOI":"10.1117\/1.2354076"},{"key":"13601_CR23","first-page":"214","volume":"31","author":"Q Wen","year":"2003","unstructured":"Wen Q, Sun T, Wang S (2003) Concept and application of zero-watermark. Acta Electron Sin 31:214\u2013216","journal-title":"Acta Electron Sin"},{"key":"13601_CR24","doi-asserted-by":"crossref","unstructured":"Yang K, Wang W, Yuan Z, Zhao W (2018) Strong robust zero watermarking algorithm based on NSCT transform and image normalization. IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC 2018), pp, 236\u2013240","DOI":"10.1109\/IAEAC.2018.8577943"},{"issue":"3","key":"13601_CR25","first-page":"126","volume":"33","author":"TY Ye","year":"2010","unstructured":"Ye TY, Ma ZF, Niu XX, Yang YX (2010) A zero-watermark technology with strong robustness. J Beijing Univ Posts Telecomm 33(3):126\u2013129","journal-title":"J Beijing Univ Posts Telecomm"},{"issue":"1","key":"13601_CR26","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1186\/s13634-017-0508-6","volume":"2017","author":"NY Yu","year":"2017","unstructured":"Yu NY (2017) On the security of compressed encryption with partial unitary sensing matrices embedding a secret keystream. EURASIP J Adv Signal Process 2017(1):73","journal-title":"EURASIP J Adv Signal Process"},{"key":"13601_CR27","doi-asserted-by":"crossref","unstructured":"Zhang L, Cai P, Tian XL and Xia SW (2011) A novel zero-watermarking algorithm based on DWT and edge detection. 4th CISP. 1016\u20131020","DOI":"10.1109\/CISP.2011.6100325"},{"issue":"4","key":"13601_CR28","first-page":"681","volume":"40","author":"CH Zhao","year":"2012","unstructured":"Zhao CH, Liu W (2012) Mutual support dual watermark algorithm based on compressive sensing. Acta Electron Sin 40(4):681\u2013687","journal-title":"Acta Electron Sin"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13601-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13601-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13601-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T09:52:48Z","timestamp":1672825968000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13601-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,29]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["13601"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13601-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,29]]},"assertion":[{"value":"24 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}]}}