{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T15:17:17Z","timestamp":1750173437893,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"26","license":[{"start":{"date-parts":[[2023,4,4]],"date-time":"2023-04-04T00:00:00Z","timestamp":1680566400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,4]],"date-time":"2023-04-04T00:00:00Z","timestamp":1680566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s11042-023-15125-2","type":"journal-article","created":{"date-parts":[[2023,4,4]],"date-time":"2023-04-04T11:41:54Z","timestamp":1680608514000},"page":"40937-40952","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Triple byte nonlinear component of block cipher and its application in frequency domain watermarking"],"prefix":"10.1007","volume":"82","author":[{"given":"Tariq","family":"Shah","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6522-3158","authenticated-orcid":false,"given":"Asma","family":"Batool","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,4]]},"reference":[{"key":"15125_CR1","unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. PhD Thesis, University of Buckingham"},{"key":"15125_CR2","doi-asserted-by":"crossref","unstructured":"Agarwal N, Singh PK (2022) Discrete cosine transforms and genetic algorithm based watermarking method for robustness and imperceptibility of color images for intelligent multimedia applications. Multimed Tools Appl:1\u201327","DOI":"10.1007\/s11042-021-11337-6"},{"key":"15125_CR3","doi-asserted-by":"crossref","unstructured":"Al-Maadeed TA, Hussain I, Anees A, Mustafa MT (2021) A image encryption algorithm based on chaotic lorenz system and novel primitive polynomial s-boxes. Multimed Tools Appl:1\u201322","DOI":"10.1007\/s11042-021-10695-5"},{"key":"15125_CR4","doi-asserted-by":"crossref","unstructured":"Arya V, Choudhary N (2021) RGB Image watermarking using DCT. Proc Integr Intell Enable Netw Comput:311\u2013316","DOI":"10.1007\/978-981-33-6307-6_32"},{"key":"15125_CR5","doi-asserted-by":"crossref","unstructured":"He Y, Hu Y (2018) A proposed digital image watermarking based on DWT-DCT-SVD. In: 2018 2nd IEEE advanced information management, communicates, electronic and automation control conference (IMCEC). IEEE, pp 1214\u20131218","DOI":"10.1109\/IMCEC.2018.8469626"},{"issue":"1","key":"15125_CR6","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1007\/s11071-021-06308-3","volume":"104","author":"Z Hua","year":"2021","unstructured":"Hua Z, Li J, Chen Y, Yi S (2021) Design and application of an s-box using complete latin square. Nonlinear Dyn 104(1):807\u2013825","journal-title":"Nonlinear Dyn"},{"issue":"4","key":"15125_CR7","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.1007\/s11276-017-1606-y","volume":"25","author":"SS Jamal","year":"2019","unstructured":"Jamal SS, Shah T, Farwa S, Khan MU (2019) A new technique of frequency domain watermarking based on a local ring. Wirel Netw 25(4):1491\u20131503","journal-title":"Wirel Netw"},{"key":"15125_CR8","unstructured":"Lee CF, Chang C, Wang ZH, Di YF (2021) A high robust and blind image watermarking using Arnold transform mapping in the DCT domain of YCbCr color space"},{"key":"15125_CR9","doi-asserted-by":"publisher","first-page":"975","DOI":"10.1016\/j.ijleo.2017.05.011","volume":"140","author":"M Moosazadeh","year":"2017","unstructured":"Moosazadeh M, Ekbatanifard G (2017) An improved robust image watermarking method using dct and ycocg-r color space. Optik 140:975\u2013988. https:\/\/doi.org\/10.1016\/j.ijleo.2017.05.011","journal-title":"Optik"},{"key":"15125_CR10","doi-asserted-by":"publisher","first-page":"115906","DOI":"10.1016\/j.eswa.2021.115906","volume":"187","author":"L Rakhmawati","year":"2022","unstructured":"Rakhmawati L, Wirawan W, Suwadi S, Delpha C, Duhamel P (2022) Blind robust image watermarking based on adaptive embedding strength and distribution of quantified coefficients. Expert Syst Appl 187:115906","journal-title":"Expert Syst Appl"},{"issue":"8-9","key":"15125_CR11","doi-asserted-by":"publisher","first-page":"567","DOI":"10.5560\/zna.2013-0021","volume":"68","author":"T Shah","year":"2013","unstructured":"Shah T, Qamar A, Hussain I (2013) Substitution box on maximal cyclic subgroup of units of a galois ring. Zeitschrift f\u00fc,r Naturforschung A 68 (8-9):567\u2013572","journal-title":"Zeitschrift f\u00fc,r Naturforschung A"},{"issue":"3","key":"15125_CR12","doi-asserted-by":"publisher","first-page":"1273","DOI":"10.1007\/s40314-015-0281-9","volume":"36","author":"T Shah","year":"2017","unstructured":"Shah T, Mehmood N, de Andrade AA, Palazzo R (2017) Maximal cyclic subgroups of the groups of units of galois rings: a computational approach. Comput Appl Math 36(3):1273\u20131297","journal-title":"Comput Appl Math"},{"issue":"2","key":"15125_CR13","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1007\/s11277-020-07274-6","volume":"113","author":"T Shah","year":"2020","unstructured":"Shah T, Ali A, Khan M, Farooq G, de Andrade AA (2020) Galois ring GR(23, 8) dependent 24x24 S-box design: an RGB image encryption application. Wirel Pers Commun 113(2):1201\u20131224","journal-title":"Wirel Pers Commun"},{"issue":"3","key":"15125_CR14","doi-asserted-by":"publisher","first-page":"1429","DOI":"10.1007\/s11277-019-06793-1","volume":"110","author":"T Shah","year":"2020","unstructured":"Shah T, Jamal SS, et al. (2020) An improved chaotic cryptosystem for image encryption and digital watermarking. Wirel Pers Commun 110 (3):1429\u20131442","journal-title":"Wirel Pers Commun"},{"key":"15125_CR15","doi-asserted-by":"crossref","unstructured":"Shah T, et al. (2022) Design of 24-by-24-replacement-matrix: a functionality to astronomical visual. Multimed Tools Appl:1\u201327","DOI":"10.1007\/s11042-021-11682-6"},{"issue":"2","key":"15125_CR16","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.jvcir.2004.05.002","volume":"16","author":"FY Shih","year":"2005","unstructured":"Shih FY, Wu Y-T (2005) Enhancement of image watermark retrieval based on genetic algorithms. J Visual Commun Image Represent 16(2):115\u2013133","journal-title":"J Visual Commun Image Represent"},{"key":"15125_CR17","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.patrec.2021.02.011","volume":"145","author":"R Sinhal","year":"2021","unstructured":"Sinhal R, Jain DK, Ansari IA (2021) Machine learning based blind color image watermarking scheme for copyright protection. Pattern Recogn Lett 145:171\u2013177","journal-title":"Pattern Recogn Lett"},{"key":"15125_CR18","unstructured":"Thanki RM, Borisagar KR (2013) Combined dct\u2013cs theory based digital watermarking technique for color images. In: Proceedings on national conference on emerging trends in information and communication technology (NCETICT 2013). Citeseer, pp 17\u201323"},{"issue":"4","key":"15125_CR19","doi-asserted-by":"publisher","first-page":"2757","DOI":"10.1007\/s11071-017-3409-1","volume":"88","author":"A Ullah","year":"2017","unstructured":"Ullah A, Jamal SS, Shah T (2017) A novel construction of substitution box using a combination of chaotic maps with improved chaotic range. Nonlinear Dyn 88(4):2757\u20132769","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"15125_CR20","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/s11071-017-3874-6","volume":"91","author":"A Ullah","year":"2018","unstructured":"Ullah A, Jamal SS, Shah T (2018) A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dyn 91(1):359\u2013370","journal-title":"Nonlinear Dyn"},{"key":"15125_CR21","unstructured":"University of Southern California S, Institute IP (2023) SIPI image database-misc. https:\/\/sipi.usc.edu\/database\/database.php?volume=misc&image=37#top\/"},{"issue":"2","key":"15125_CR22","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1049\/el:20010065","volume":"37","author":"J-C Yen","year":"2001","unstructured":"Yen J-C (2001) Watermark embedded in permuted domain. Electron Lett 37(2):80\u201381","journal-title":"Electron Lett"},{"issue":"41","key":"15125_CR23","doi-asserted-by":"publisher","first-page":"30557","DOI":"10.1007\/s11042-020-09499-w","volume":"79","author":"Z Yuan","year":"2020","unstructured":"Yuan Z, Liu D, Zhang X, Wang H, Su Q (2020) DCT-Based color digital image blind watermarking method with variable steps. Multimed Tools Appl 79(41):30557\u201330581","journal-title":"Multimed Tools Appl"},{"key":"15125_CR24","doi-asserted-by":"crossref","unstructured":"Zhao M, Dang Y (2008) Color image copyright protection digital watermarking algorithm based on DWT and DCT. In: 2008 4th International conference on wireless communications, networking and mobile computing. IEEE, pp 1\u20134","DOI":"10.1109\/WiCom.2008.2913"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15125-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-15125-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-15125-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T09:22:27Z","timestamp":1698052947000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-15125-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,4]]},"references-count":24,"journal-issue":{"issue":"26","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["15125"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-15125-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2023,4,4]]},"assertion":[{"value":"4 February 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}