{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T20:08:25Z","timestamp":1767211705174,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T00:00:00Z","timestamp":1676937600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T00:00:00Z","timestamp":1676937600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1007\/s11042-023-14618-4","type":"journal-article","created":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T19:58:00Z","timestamp":1677009480000},"page":"28259-28279","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Digital image watermarking using DWT-SVD with enhanced tunicate swarm optimization algorithm"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7834-6939","authenticated-orcid":false,"given":"Ms R. Radha","family":"Kumari","sequence":"first","affiliation":[]},{"given":"V. Vijaya","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"K. Rama","family":"Naidu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,21]]},"reference":[{"key":"14618_CR1","doi-asserted-by":"crossref","unstructured":"Ahvanooey MT, Li Q, Shim HJ, Huang Y (2018) A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents. Secur Commun Netw","DOI":"10.1155\/2018\/5325040"},{"key":"14618_CR2","doi-asserted-by":"crossref","unstructured":"Alzahrani, A (2022) Enhanced invisibility and robustness of digital image watermarking based on DWT-SVD. Appl Bionics and Biomech\u00a02018(5325040):1\u201322","DOI":"10.1155\/2022\/5271600"},{"key":"14618_CR3","doi-asserted-by":"publisher","first-page":"113714","DOI":"10.1109\/ACCESS.2021.3104985","volume":"9","author":"A Alzahrani","year":"2021","unstructured":"Alzahrani A, Memon NA (2021) Blind and robust watermarking scheme in hybrid domain for copyright protection of medical images. IEEE Access 9:113714\u2013113734","journal-title":"IEEE Access"},{"key":"14618_CR4","doi-asserted-by":"crossref","unstructured":"Ambadekar SP, Jain J, Khanapuri J (2019) Digital image watermarking through encryption and DWT for copyright protection. Recent Trends in Signal and Image Processing. Advances in Intelligent Systems and Computing.\u00a0Springer, Singapore, vol 727, pp. 187\u2013195","DOI":"10.1007\/978-981-10-8863-6_19"},{"key":"14618_CR5","doi-asserted-by":"publisher","first-page":"76386","DOI":"10.1109\/ACCESS.2020.2988298","volume":"8","author":"UA Bhatti","year":"2020","unstructured":"Bhatti UA, Yu Z, Li J, Nawaz SA, Mehmood A, Zhang K, Yuan L (2020) Hybrid watermarking algorithm using Clifford algebra with Arnold scrambling and chaotic encryption. IEEE Access 8:76386\u201376398","journal-title":"IEEE Access"},{"key":"14618_CR6","doi-asserted-by":"publisher","first-page":"169525","DOI":"10.1109\/ACCESS.2020.3024181","volume":"8","author":"AM Cheema","year":"2020","unstructured":"Cheema AM, Adnan SM, Mehmood Z (2020) A novel optimized semi-blind scheme for color image watermarking. IEEE Access 8:169525\u2013169547","journal-title":"IEEE Access"},{"key":"14618_CR7","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.image.2016.03.007","volume":"45","author":"W Chun-peng","year":"2016","unstructured":"Chun-peng W, Xing-yuan W, Zhi-qiu X (2016) Geometrically invariant image watermarking based on fast radial harmonic Fourier moments. Signal Process Image Commun 45:10\u201323","journal-title":"Signal Process Image Commun"},{"key":"14618_CR8","unstructured":"Durafe, A, Patidar, V (2020) Development and analysis of IWT-SVD and DWT-SVD steganography using fractal cover. J King Saud Univ-Comput Inf Sci"},{"issue":"1","key":"14618_CR9","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1080\/09720529.2020.1721875","volume":"23","author":"P Garg","year":"2020","unstructured":"Garg P, Rama Kishore R (2020) Secured and multi optimized image watermarking using SVD and entropy and prearranged embedding locations in transform domain. J Discret Math Sci Cryptogr 23(1):73\u201382","journal-title":"J Discret Math Sci Cryptogr"},{"key":"14618_CR10","doi-asserted-by":"crossref","unstructured":"Kaur, S, Awasthi LK, Sangal, AL, Dhiman G (2020) Tunicate Swarm Algorithm:A new bio-inspired based metaheuristic paradigm for global optimization. Eng Appl Artif Intell","DOI":"10.1016\/j.engappai.2020.103541"},{"issue":"15","key":"14618_CR11","doi-asserted-by":"publisher","first-page":"11069","DOI":"10.1007\/s11042-018-6177-0","volume":"79","author":"C Kumar","year":"2020","unstructured":"Kumar C, Singh AK, Kumar P (2020) Improved wavelet-based image watermarking through SPIHT. Multimed Tools Appl 79(15):11069\u201311082","journal-title":"Multimed Tools Appl"},{"key":"14618_CR12","volume-title":"An efficient data encryption through image via prime order symmetric key and bit shuffle technique. In computer communication, networking and internet security (pp. 261\u2013270)","author":"RVSS Lalitha","year":"2017","unstructured":"Lalitha RVSS, Srinivasu PN (2017) An efficient data encryption through image via prime order symmetric key and bit shuffle technique. In computer communication, networking and internet security (pp. 261\u2013270). Springer, Singapore"},{"issue":"5","key":"14618_CR13","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1109\/TCSVT.2016.2633878","volume":"28","author":"XL Liu","year":"2018","unstructured":"Liu XL, Lin CC, Yuan SM (2018) Blind dual watermarking for color images\u2019 authentication and copyright protection. IEEE Trans Circ Syst Vid Technol 28(5):1047\u20131055","journal-title":"IEEE Trans Circ Syst Vid Technol"},{"key":"14618_CR14","doi-asserted-by":"publisher","first-page":"19876","DOI":"10.1109\/ACCESS.2018.2808172","volume":"6","author":"NA Loan","year":"2018","unstructured":"Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6:19876\u201319897","journal-title":"IEEE Access"},{"issue":"1","key":"14618_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11220-020-00291-6","volume":"21","author":"S Maloo","year":"2020","unstructured":"Maloo S, Kumar M, Lakshmi N (2020) A modified whale optimization algorithm based digital image watermarking approach. Sens Imaging 21(1):1\u201322","journal-title":"Sens Imaging"},{"issue":"1","key":"14618_CR16","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/s13042-015-0329-6","volume":"9","author":"R Mehta","year":"2018","unstructured":"Mehta R, Rajpal N, Vishwakarma VP (2018) Robust image watermarking scheme in lifting wavelet domain using GA-LSVR hybridization. Int J Mach Learn Cybern 9(1):145\u2013161","journal-title":"Int J Mach Learn Cybern"},{"key":"14618_CR17","doi-asserted-by":"crossref","unstructured":"Moeinaddini E (2019) Selecting optimal blocks for image watermarking using entropy and distinct discrete firefly algorithm. Soft Comput 23:9685\u20139699","DOI":"10.1007\/s00500-018-3535-9"},{"issue":"4","key":"14618_CR18","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s13735-020-00197-9","volume":"9","author":"A Ray","year":"2020","unstructured":"Ray A, Roy S (2020) Recent trends in image watermarking techniques for copyright protection: a survey. Int J Multimed Inf Retriev 9(4):249\u2013270","journal-title":"Int J Multimed Inf Retriev"},{"key":"14618_CR19","unstructured":"Sattarpoor, S, Barati, H (2021) Robust image watermarking in wavelet domain using GBT-DWT-SVD and whale optimization algorithm. arXiv preprint arXiv:2104.05023"},{"key":"14618_CR20","first-page":"102734","volume":"58","author":"R Singh","year":"2021","unstructured":"Singh R, Ashok A (2021) An optimized robust watermarking technique using CKGSA in frequency domain. J Inf Secur Appl 58:102734","journal-title":"J Inf Secur Appl"},{"key":"14618_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57699-2","volume-title":"State-of-the-Art Techniques of Image Watermarking: New Trends and Future Challenges. In Medical Image Watermarking","author":"AK Singh","year":"2017","unstructured":"Singh AK, Kumar B, An GS, Mohan (2017) State-of-the-Art Techniques of Image Watermarking: New Trends and Future Challenges. In Medical Image Watermarking. Springer, Cham"},{"issue":"6","key":"14618_CR22","doi-asserted-by":"publisher","first-page":"8667","DOI":"10.1007\/s11042-020-10028-y","volume":"80","author":"V Sisaudia","year":"2021","unstructured":"Sisaudia V, Vishwakarma VP (2021) Copyright protection using KELM-PSO based multi-spectral image watermarking in DCT domain with local texture information based selection. Multimed Tools Appl 80(6):8667\u20138688","journal-title":"Multimed Tools Appl"},{"key":"14618_CR23","doi-asserted-by":"crossref","unstructured":"Srinivasu, PN, Rao, S (2015) A multilevel image encryption based on duffing map and modified DNA hybridization for transfer over an unsecured channel. Int J Comput Appl, 120(4)","DOI":"10.5120\/21212-3915"},{"key":"14618_CR24","unstructured":"Srinivasu, PN, Norwawi, N, Amiripalli, SS, Deepalakshmi, P (n.d.) Secured compression for 2D medical images through the manifold and fuzzy trapezoidal correlation function. Gazi Univ J Sci"},{"issue":"1","key":"14618_CR25","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/S1665-6423(14)71612-8","volume":"12","author":"H Tao","year":"2014","unstructured":"Tao H, Chongmin L, Zain JM, Abdalla AN (2014) Robust image watermarking theories and techniques A review. J Appl Res Technol 12(1):122\u2013138","journal-title":"J Appl Res Technol"},{"issue":"6","key":"14618_CR26","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1016\/j.aeue.2012.12.001","volume":"67","author":"L Teng","year":"2013","unstructured":"Teng L, Wang X, Wang X (2013) Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme. AEU-Inte J Electron Commun 67(6):540\u2013547","journal-title":"AEU-Inte J Electron Commun"},{"issue":"19","key":"14618_CR27","doi-asserted-by":"publisher","first-page":"27491","DOI":"10.1007\/s11042-019-7650-0","volume":"78","author":"M Veni","year":"2019","unstructured":"Veni M, Meyyappan T (2019) Digital image watermark embedding and extraction using oppositional fruit Fly algorithm. Multimed Tools Appl 78(19):27491\u201327510","journal-title":"Multimed Tools Appl"},{"key":"14618_CR28","doi-asserted-by":"publisher","first-page":"27434","DOI":"10.1109\/ACCESS.2021.3058128","volume":"9","author":"M Wang","year":"2021","unstructured":"Wang M, Lu G (2021) A modified sine cosine algorithm for solving optimization problems. IEEE Access 9:27434\u201327450","journal-title":"IEEE Access"},{"key":"14618_CR29","doi-asserted-by":"crossref","unstructured":"Wang C, Wang X, Zhang C, Xia Z (2017) Geometric correction based color image watermarking using fuzzy least squares support vector machine and Bessel K form distribution. Signal Process 134:197\u2013208","DOI":"10.1016\/j.sigpro.2016.12.010"},{"key":"14618_CR30","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.ins.2018.03.040","volume":"450","author":"C Wang","year":"2018","unstructured":"Wang C, Wang X, Li Y, Xia Z, Zhang C (2018) Quaternion polar harmonic Fourier moments for color images. Inf Sci 450:141\u2013156","journal-title":"Inf Sci"},{"key":"14618_CR31","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.ins.2018.08.028","volume":"470","author":"C Wang","year":"2019","unstructured":"Wang C, Wang X, Xia Z, Zhang C (2019) Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf Sci 470:109\u2013120","journal-title":"Inf Sci"},{"issue":"12","key":"14618_CR32","doi-asserted-by":"publisher","first-page":"4440","DOI":"10.1109\/TCSVT.2019.2960507","volume":"30","author":"C Wang","year":"2019","unstructured":"Wang C, Wang X, Xia Z, Ma B, Shi YQ (2019) Image description with polar harmonic Fourier moments. IEEE Trans Circ Syst Vid Technol 30(12):4440\u20134452","journal-title":"IEEE Trans Circ Syst Vid Technol"},{"key":"14618_CR33","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.sigpro.2018.11.011","volume":"157","author":"Z Xia","year":"2019","unstructured":"Xia Z, Wang X, Zhou W, Li R, Wang C, Zhang C (2019) Color medical image lossless watermarking using chaotic system and accurate quaternion polar harmonic transforms. Signal Process 157:108\u2013118","journal-title":"Signal Process"},{"key":"14618_CR34","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.sigpro.2019.06.025","volume":"164","author":"Z Xia","year":"2019","unstructured":"Xia Z, Wang X, Li X, Wang C, Unar S, Wang M, Zhao T (2019) Efficient copyright protection for three CT images based on quaternion polar harmonic Fourier moments. Signal Process 164:368\u2013379","journal-title":"Signal Process"},{"key":"14618_CR35","doi-asserted-by":"publisher","first-page":"107864","DOI":"10.1016\/j.sigpro.2020.107864","volume":"180","author":"Z Xia","year":"2021","unstructured":"Xia Z, Wang X, Han B, Li Q, Wang X, Wang C, Zhao T (2021) Color image triple zero-watermarking using decimal-order polar harmonic transforms and chaotic system. Signal Process 180:107864","journal-title":"Signal Process"},{"key":"14618_CR36","doi-asserted-by":"publisher","first-page":"103130","DOI":"10.1016\/j.dsp.2021.103130","volume":"116","author":"Z Xia","year":"2021","unstructured":"Xia Z, Wang X, Wang C, Ma B, Zhang H, Li Q (2021) Novel quaternion polar complex exponential transform and its application in color image zero-watermarking. Digit Signal Process 116:103130","journal-title":"Digit Signal Process"},{"key":"14618_CR37","doi-asserted-by":"publisher","first-page":"32931","DOI":"10.1109\/ACCESS.2021.3060861","volume":"9","author":"Z Zainol","year":"2021","unstructured":"Zainol Z, Teh JS, Alawida M, Alabdulatif A (2021) Hybrid SVD-based image watermarking schemes: a review. IEEE Access 9:32931\u201332968","journal-title":"IEEE Access"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14618-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-14618-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14618-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T21:10:00Z","timestamp":1687900200000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-14618-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,21]]},"references-count":37,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["14618"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-14618-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,2,21]]},"assertion":[{"value":"9 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 February 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}