{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T01:02:33Z","timestamp":1775091753654,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100009169","name":"Assiut University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100009169","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Robust zero-watermarking is a protection of copyright approach that is both effective and distortion-free, and it has grown into a core of research on the subject of digital watermarking. This paper proposes a revolutionary zero-watermarking approach for color images using convolutional neural networks (CNN) and a 2D logistic-adjusted Chebyshev map (2D-LACM). In this algorithm, we first extracted deep feature maps from an original color image using the pre-trained VGG19. These feature maps were then fused into a featured image, and the owner's watermark sequence was incorporated using an XOR operation. Finally, 2D-LACM encrypts the copyright watermark and scrambles the binary feature matrix to ensure security. The experimental results show that the proposed\u00a0algorithm performs well in terms of imperceptibility and robustness. The BER values of the extracted watermarks were below 0.0044 and the NCC values were above 0.9929, while the average PSNR values of the attacked images were 33.1537 dB. Also, it is superior to other algorithms in terms of robustness to conventional image processing and geometric attacks.<\/jats:p>","DOI":"10.1007\/s11042-023-16649-3","type":"journal-article","created":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T03:25:57Z","timestamp":1694661957000},"page":"29969-29995","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Convolutional neural network and 2D logistic-adjusted-Chebyshev-based zero-watermarking of color images"],"prefix":"10.1007","volume":"83","author":[{"given":"Mohamed M.","family":"Darwish","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9171-2561","authenticated-orcid":false,"given":"Amal A.","family":"Farhat","sequence":"additional","affiliation":[]},{"given":"T. M.","family":"El-Gindy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,14]]},"reference":[{"key":"16649_CR1","doi-asserted-by":"publisher","first-page":"13367","DOI":"10.1007\/s11042-020-10257-1","volume":"80","author":"UA Bhatti","year":"2021","unstructured":"Bhatti UA, Yuan L, Yu Z, Li J, Nawaz SA, Mehmood A, Zhang K (2021) New watermarking algorithm utilizing quaternion Fourier transform with advanced scrambling and secure encryption. Multimed Tools Appl 80:13367\u201313387","journal-title":"Multimed Tools Appl"},{"key":"16649_CR2","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1016\/S0167-8655(02)00023-5","volume":"23","author":"C-C Chang","year":"2002","unstructured":"Chang C-C, Chuang J-C (2002) An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recognit Lett 23:931\u2013941","journal-title":"Pattern Recognit Lett"},{"key":"16649_CR3","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1016\/j.jss.2007.07.036","volume":"81","author":"C-C Chang","year":"2008","unstructured":"Chang C-C, Lin P-Y (2008) Adaptive watermark mechanism for rightful ownership protection. J Syst Softw 81:1118\u20131129","journal-title":"J Syst Softw"},{"key":"16649_CR4","doi-asserted-by":"crossref","unstructured":"Chen H, Luo T, Yu M, Jiang G, Zhou H, Mo K (2012) A zero-watermark method based on texture characteristic of image blocks for stereo images. In: 2012 International Conference on Industrial Control and Electronics Engineering. IEEE, pp 490\u2013493","DOI":"10.1109\/ICICEE.2012.136"},{"key":"16649_CR5","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s00521-014-1615-z","volume":"26","author":"Y-H Chen","year":"2015","unstructured":"Chen Y-H, Huang H-C (2015) Coevolutionary genetic watermarking for owner identification. Neural Comput Appl 26:291\u2013298","journal-title":"Neural Comput Appl"},{"key":"16649_CR6","unstructured":"CVG Bonn (2014) Computer Vision Group. https:\/\/pages.iai.uni-bonn.de\/gall_juergen\/index.html. Accessed\u00a09 Jan 2022"},{"key":"16649_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116193","volume":"190","author":"A Daoui","year":"2022","unstructured":"Daoui A, Karmouni H, Sayyouri M, Qjidaa H (2022) Robust image encryption and zero-watermarking scheme using SCA and modified logistic map. Expert Syst Appl 190:116193","journal-title":"Expert Syst Appl"},{"key":"16649_CR8","doi-asserted-by":"publisher","first-page":"166589","DOI":"10.1109\/ACCESS.2020.3022779","volume":"8","author":"OO Evsutin","year":"2020","unstructured":"Evsutin OO, Melman AS, Meshcheryakov RV (2020) Digital steganography and watermarking for digital images: a review of current research directions. IEEE Access 8:166589\u2013166611. https:\/\/doi.org\/10.1109\/ACCESS.2020.3022779","journal-title":"IEEE Access"},{"key":"16649_CR9","doi-asserted-by":"crossref","unstructured":"Fierro-Radilla A, Nakano-Miyatake M, Cedillo-Hernandez M, Cleofas-Sanchez L, Perez-Meana H (2019) A robust image zero-watermarking using convolutional neural networks. In: 2019 7th International Workshop on Biometrics and Forensics, IWBF. Cancun, Mexico, pp 1\u20135","DOI":"10.1109\/IWBF.2019.8739245"},{"key":"16649_CR10","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1007\/s11042-013-1701-8","volume":"74","author":"G Gao","year":"2015","unstructured":"Gao G, Jiang G (2015) Bessel-Fourier moment-based robust image zero-watermarking. Multimed Tools Appl 74:841\u2013858. https:\/\/doi.org\/10.1007\/s11042-013-1701-8","journal-title":"Multimed Tools Appl"},{"key":"16649_CR11","volume":"65","author":"J Gao","year":"2022","unstructured":"Gao J, Li Z, Fan B (2022) An efficient robust zero watermarking scheme for diffusion tensor-Magnetic resonance imaging high-dimensional data. J Inf Secur Appl 65:103106","journal-title":"J Inf Secur Appl"},{"key":"16649_CR12","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1109\/TSMCC.2009.2037512","volume":"40","author":"X Gao","year":"2010","unstructured":"Gao X, Deng C, Li X, Tao D (2010) Geometric distortion insensitive image watermarking in affine covariant regions. IEEE Trans Syst Man Cybern Part C Appl Rev 40:278\u2013286","journal-title":"IEEE Trans Syst Man Cybern Part C Appl Rev"},{"key":"16649_CR13","doi-asserted-by":"publisher","first-page":"6019","DOI":"10.1007\/s11042-020-09904-4","volume":"80","author":"Y Gao","year":"2021","unstructured":"Gao Y, Kang X, Chen Y (2021) A robust video zero-watermarking based on deep convolutional neural network and self-organizing map in polar complex exponential transform domain. Multimed Tools Appl 80:6019\u20136039. https:\/\/doi.org\/10.1007\/s11042-020-09904-4","journal-title":"Multimed Tools Appl"},{"key":"16649_CR14","doi-asserted-by":"publisher","unstructured":"Han B, Du J, Jia Y, Zhu H (2021) Zero-Watermarking Algorithm for Medical Image Based on VGG19 Deep Convolution Neural Network. J Healthc Eng 2021. https:\/\/doi.org\/10.1155\/2021\/5551520","DOI":"10.1155\/2021\/5551520"},{"key":"16649_CR15","doi-asserted-by":"publisher","unstructured":"Han B, Wang H, Qiao D, Xu J, Yan T (2023) Application of zero-watermarking scheme based on swin transformer for securing the metaverse healthcare data. IEEE J Biomed Heal Informatics. https:\/\/doi.org\/10.1109\/JBHI.2023.3257340","DOI":"10.1109\/JBHI.2023.3257340"},{"key":"16649_CR16","doi-asserted-by":"publisher","first-page":"6121","DOI":"10.1007\/s00034-021-01756-z","volume":"40","author":"KM Hosny","year":"2021","unstructured":"Hosny KM, Darwish MM (2021) Reversible Color Image Watermarking Using Fractional - Order Polar Harmonic Transforms and a Chaotic Sine Map. Circuits Syst Signal Process 40:6121\u20136145. https:\/\/doi.org\/10.1007\/s00034-021-01756-z","journal-title":"Circuits Syst Signal Process"},{"key":"16649_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2021.103007","volume":"70","author":"KM Hosny","year":"2021","unstructured":"Hosny KM, Darwish MM (2021) New geometrically invariant multiple zero-watermarking algorithm for color medical images. Biomed Signal Process Control 70:103007","journal-title":"Biomed Signal Process Control"},{"key":"16649_CR18","doi-asserted-by":"publisher","first-page":"47425","DOI":"10.1109\/ACCESS.2021.3068211","volume":"9","author":"KM Hosny","year":"2021","unstructured":"Hosny KM, Darwish MM, Fouda MM (2021) Robust Color Images Watermarking Using New Fractional-Order Exponent Moments. IEEE Access 9:47425\u201347435. https:\/\/doi.org\/10.1109\/ACCESS.2021.3068211","journal-title":"IEEE Access"},{"key":"16649_CR19","doi-asserted-by":"publisher","first-page":"91209","DOI":"10.1109\/ACCESS.2021.3091614","volume":"9","author":"KM Hosny","year":"2021","unstructured":"Hosny KM, Darwish MM, Fouda MM (2021) New Color Image Zero-Watermarking Using Orthogonal Multi-Channel Fractional-Order Legendre-Fourier Moments. IEEE Access 9:91209\u201391219. https:\/\/doi.org\/10.1109\/ACCESS.2021.3091614","journal-title":"IEEE Access"},{"key":"16649_CR20","doi-asserted-by":"publisher","first-page":"2841","DOI":"10.1007\/s00371-021-02168-5","volume":"37","author":"K Hu","year":"2021","unstructured":"Hu K, Wang X, Hu J, Wang H, Qin H (2021) A novel robust zero-watermarking algorithm for medical images. Vis Comput 37:2841\u20132853. https:\/\/doi.org\/10.1007\/s00371-021-02168-5","journal-title":"Vis Comput"},{"key":"16649_CR21","doi-asserted-by":"publisher","first-page":"72650","DOI":"10.1109\/ACCESS.2020.2988160","volume":"8","author":"C Iwendi","year":"2020","unstructured":"Iwendi C, Jalil Z, Javed AR, Thippa Reddy G, Kaluri R, Srivastava G, Jo O (2020) KeySplitWatermark: Zero Watermarking Algorithm for Software Protection against Cyber-Attacks. IEEE Access 8:72650\u201372660. https:\/\/doi.org\/10.1109\/ACCESS.2020.2988160","journal-title":"IEEE Access"},{"key":"16649_CR22","doi-asserted-by":"publisher","first-page":"1169","DOI":"10.1007\/s11042-019-08191-y","volume":"79","author":"X Kang","year":"2020","unstructured":"Kang X, Lin G, Chen Y, Zhao F, Zhang E, Jing C (2020) Robust and secure zero-watermarking algorithm for color images based on majority voting pattern and hyper-chaotic encryption. Multimed Tools Appl 79:1169\u20131202","journal-title":"Multimed Tools Appl"},{"key":"16649_CR23","unstructured":"Keith A. Johnson and J. Alex Becker The Whole Brain Atlas. http:\/\/www.med.harvard.edu\/AANLIB\/home.html. Accessed\u00a016 Dec 2021"},{"key":"16649_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-022-02106-6","volume":"2022","author":"T Li","year":"2022","unstructured":"Li T, Li J, Liu J, Huang M, Chen Y-W, Bhatti UA (2022) Robust watermarking algorithm for medical images based on log-polar transform. EURASIP J Wirel Commun Netw 2022:1\u201311","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"16649_CR25","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1109\/JSTSP.2020.3002391","volume":"14","author":"X Liao","year":"2020","unstructured":"Liao X, Li K, Zhu X, Liu KJR (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Sel Top Signal Process 14:955\u2013968","journal-title":"IEEE J Sel Top Signal Process"},{"key":"16649_CR26","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1109\/30.883387","volume":"46","author":"SD Lin","year":"2000","unstructured":"Lin SD, Chen C-F (2000) A robust DCT-based watermarking for copyright protection. IEEE Trans Consum Electron 46:415\u2013421","journal-title":"IEEE Trans Consum Electron"},{"key":"16649_CR27","volume":"60","author":"L Liu","year":"2021","unstructured":"Liu L, Jiang D, Wang X, Rong X, Zhang R (2021) 2D Logistic-Adjusted-Chebyshev map for visual color image encryption. J Inf Secur Appl 60:102854","journal-title":"J Inf Secur Appl"},{"key":"16649_CR28","doi-asserted-by":"crossref","unstructured":"Liu W, Li J, Shao C, Ma J, Huang M, Bhatti UA (2022) Robust Zero Watermarking Algorithm for Medical Images Using Local Binary Pattern and Discrete Cosine Transform. In: International Conference on Artificial Intelligence and Security. Springer, pp 350\u2013362","DOI":"10.1007\/978-3-031-06764-8_28"},{"key":"16649_CR29","doi-asserted-by":"publisher","first-page":"3667","DOI":"10.1007\/s10586-017-1251-3","volume":"20","author":"Y Liu","year":"2017","unstructured":"Liu Y, Yang F, Gao K, Dong W, Song J (2017) A zero-watermarking scheme with embedding timestamp in vector maps for Big Data computing. Cluster Comput 20:3667\u20133675","journal-title":"Cluster Comput"},{"key":"16649_CR30","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.1007\/s10851-021-01048-w","volume":"63","author":"B Ma","year":"2021","unstructured":"Ma B, Chang L, Wang C, Li J, Li G, Xia Z, Wang X (2021) Double Medical Images Zero-Watermarking Algorithm Based on the Chaotic System and Ternary Accurate Polar Complex Exponential Transform. J Math Imaging Vis 63:1160\u20131178","journal-title":"J Math Imaging Vis"},{"key":"16649_CR31","unstructured":"Nandini DU, Divya S (2017) A literature survey on various watermarking techniques. In: 2017 International Conference on Inventive Systems and Control (ICISC). IEEE, pp 1\u20134"},{"key":"16649_CR32","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.jvcir.2015.05.006","volume":"30","author":"X Qi","year":"2015","unstructured":"Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 30:312\u2013327","journal-title":"J Vis Commun Image Represent"},{"key":"16649_CR33","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/s10278-020-00396-0","volume":"34","author":"A Ro\u010dek","year":"2021","unstructured":"Ro\u010dek A, Javorn\u00edk M, Slav\u00ed\u010dek K, Dost\u00e1l O (2021) Zero watermarking: critical analysis of its role in current medical imaging. J Digit Imaging 34:204\u2013211","journal-title":"J Digit Imaging"},{"key":"16649_CR34","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.image.2012.11.006","volume":"28","author":"L Rosales-Roldan","year":"2013","unstructured":"Rosales-Roldan L, Cedillo-Hernandez M, Nakano-Miyatake M, Perez-Meana H, Kurkoski B (2013) Watermarking-based image authentication with recovery capability using halftoning technique. Signal Process Image Commun 28:69\u201383","journal-title":"Signal Process Image Commun"},{"key":"16649_CR35","doi-asserted-by":"publisher","unstructured":"Seenivasagam V, Velumani R (2013) A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud. Comput Math Methods Med 2013. https:\/\/doi.org\/10.1155\/2013\/516465","DOI":"10.1155\/2013\/516465"},{"key":"16649_CR36","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.image.2016.09.001","volume":"48","author":"Z Shao","year":"2016","unstructured":"Shao Z, Shang Y, Zeng R, Shu H, Coatrieux G, Wu J (2016) Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography. Signal Process Image Commun 48:12\u201321","journal-title":"Signal Process Image Commun"},{"key":"16649_CR37","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1016\/j.sigpro.2015.10.005","volume":"120","author":"Z Shao","year":"2016","unstructured":"Shao Z, Shang Y, Zhang Y, Liu X, Guo G (2016) Robust watermarking using orthogonal Fourier-Mellin moments and chaotic map for double images. Signal Process 120:522\u2013531","journal-title":"Signal Process"},{"key":"16649_CR38","unstructured":"Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. 3rd Int Conf Learn Represent ICLR 2015 - Conf Track Proc"},{"key":"16649_CR39","doi-asserted-by":"crossref","unstructured":"Singh A, Dutta MK (2018) Lossless and robust digital watermarking scheme for retinal images. In: 2018 4th International Conference on Computational Intelligence & Communication Technology (CICT). IEEE, pp 1\u20135","DOI":"10.1109\/CIACT.2018.8480151"},{"key":"16649_CR40","first-page":"2023","volume":"4","author":"L Sun","year":"2015","unstructured":"Sun L, Xu JC, Zhang XX, Dong W, Tian Y (2015) A novel generalized Arnold transform-based zero-watermarking scheme. Appl Math Inf Sci 4:2023\u20132035","journal-title":"Appl Math Inf Sci"},{"key":"16649_CR41","doi-asserted-by":"publisher","first-page":"13455","DOI":"10.1007\/s11042-016-3750-2","volume":"76","author":"TM Thanh","year":"2017","unstructured":"Thanh TM, Tanaka K (2017) An image zero-watermarking algorithm based on the encryption of visual map feature with watermark information. Multimed Tools Appl 76:13455\u201313471","journal-title":"Multimed Tools Appl"},{"key":"16649_CR42","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/j.jss.2012.08.040","volume":"86","author":"H-H Tsai","year":"2013","unstructured":"Tsai H-H, Lai Y-S, Lo S-C (2013) A zero-watermark scheme with geometrical invariants using SVM and PSO against geometrical attacks for image protection. J Syst Softw 86:335\u2013348","journal-title":"J Syst Softw"},{"key":"16649_CR43","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1016\/j.jss.2009.12.026","volume":"83","author":"H-H Tsai","year":"2010","unstructured":"Tsai H-H, Tseng H-C, Lai Y-S (2010) Robust lossless image watermarking based on \u03b1-trimmed mean algorithm and support vector machine. J Syst Softw 83:1015\u20131028","journal-title":"J Syst Softw"},{"key":"16649_CR44","unstructured":"University of Southern California (2020) USC-SIPI Image Database. In: USC-SIPI Image Database. http:\/\/sipi.usc.edu\/database\/. Accessed\u00a022 Nov 2021"},{"key":"16649_CR45","doi-asserted-by":"publisher","first-page":"718","DOI":"10.1049\/iet-ipr.2013.0558","volume":"8","author":"S Vellaisamy","year":"2014","unstructured":"Vellaisamy S, Ramesh V (2014) Inversion attack resilient zero-watermarking scheme for medical image authentication. IET Image Process 8:718\u2013727","journal-title":"IET Image Process"},{"key":"16649_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2021.104450","volume":"106","author":"C Wang","year":"2021","unstructured":"Wang C, Hao Q, Ma B, Wu X, Li J, Xia Z, Gao H (2021) Octonion continuous orthogonal moments and their applications in color stereoscopic image reconstruction and zero-watermarking. Eng Appl Artif Intell 106:104450","journal-title":"Eng Appl Artif Intell"},{"key":"16649_CR47","doi-asserted-by":"publisher","first-page":"26355","DOI":"10.1007\/s11042-016-4130-7","volume":"76","author":"CP Wang","year":"2017","unstructured":"Wang CP, Wang XY, Chen XJ, Zhang C (2017) Robust zero-watermarking algorithm based on polar complex exponential transform and logistic mapping. Multimed Tools Appl 76:26355\u201326376. https:\/\/doi.org\/10.1007\/s11042-016-4130-7","journal-title":"Multimed Tools Appl"},{"key":"16649_CR48","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.ins.2018.08.028","volume":"470","author":"C Wang","year":"2019","unstructured":"Wang C, Wang X, Xia Z, Zhang C (2019) Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf Sci (Ny) 470:109\u2013120. https:\/\/doi.org\/10.1016\/j.ins.2018.08.028","journal-title":"Inf Sci (Ny)"},{"key":"16649_CR49","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1007\/s10851-020-01002-2","volume":"63","author":"XY Wang","year":"2021","unstructured":"Wang XY, Wang L, Tian JL, Niu PP, Yang HY (2021) Color Image Zero-Watermarking Using Accurate Quaternion Generalized Orthogonal Fourier-Mellin Moments. J Math Imaging Vis 63:708\u2013734. https:\/\/doi.org\/10.1007\/s10851-020-01002-2","journal-title":"J Math Imaging Vis"},{"key":"16649_CR50","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/83.982816","volume":"11","author":"Y Wang","year":"2002","unstructured":"Wang Y, Doherty JF, Van Dyck RE (2002) A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans Image Process 11:77\u201388","journal-title":"IEEE Trans Image Process"},{"key":"16649_CR51","first-page":"214","volume":"31","author":"Q Wen","year":"2003","unstructured":"Wen Q, Sun T-F, Wang S-X (2003) Concept and application of zero-watermark. Acta Electron Sin 31:214\u2013216","journal-title":"Acta Electron Sin"},{"key":"16649_CR52","doi-asserted-by":"crossref","unstructured":"Wu-Jie Z, Mei Y, Si-Min Y, Gang-Yi J, Ding-Fei G (2012) A zero-watermarking algorithm of stereoscopic image based on hyperchaotic system. Acta Phys Sin 61","DOI":"10.7498\/aps.61.080701"},{"key":"16649_CR53","doi-asserted-by":"publisher","first-page":"1170","DOI":"10.1016\/j.asoc.2012.09.028","volume":"13","author":"X Wu","year":"2013","unstructured":"Wu X, Sun W (2013) Robust copyright protection scheme for digital images using overlapping DCT and SVD. Appl Soft Comput 13:1170\u20131182","journal-title":"Appl Soft Comput"},{"key":"16649_CR54","doi-asserted-by":"publisher","unstructured":"Xia Z, Wang X, Wang C, Ma B, Zhang H, Li Q (2021) Novel quaternion polar complex exponential transform and its application in color image zero-watermarking. Digit Signal Process A Rev J 116. https:\/\/doi.org\/10.1016\/j.dsp.2021.103130","DOI":"10.1016\/j.dsp.2021.103130"},{"key":"16649_CR55","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s10489-021-02476-2","volume":"52","author":"Z Xia","year":"2022","unstructured":"Xia Z, Wang X, Wang C, Wang C, Ma B, Li Q, Wang M, Zhao T (2022) A robust zero-watermarking algorithm for lossless copyright protection of medical images. Appl Intell 52:607\u2013621","journal-title":"Appl Intell"},{"key":"16649_CR56","doi-asserted-by":"crossref","unstructured":"Xiao X, Li J, Yi D, Fang Y, Cui W, Bhatti UA, Han B (2021) Robust Zero Watermarking Algorithm for Encrypted Medical Images Based on DWT-Gabor. In: Innovation in Medicine and Healthcare: Proceedings of 9th KES-InMed 2021. Springer, pp 75\u201386","DOI":"10.1007\/978-981-16-3013-2_7"},{"key":"16649_CR57","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2022.3148301","author":"L Xiyao","year":"2022","unstructured":"Xiyao L, Zhang Y, Du S, Zhang J, Jiang M, Fang H (2022) DIBR Zero-watermarking based on Invariant Feature and Geometric Rectification. IEEE Multimed. https:\/\/doi.org\/10.1109\/MMUL.2022.3148301","journal-title":"IEEE Multimed"},{"key":"16649_CR58","doi-asserted-by":"crossref","unstructured":"Yi D, Li J, Fang Y, Cui W, Xiao X, Bhatti UA, Han B (2021) A robust zero-watermarkinging algorithm based on PHTs-DCT for medical images in the encrypted domain. In: Innovation in Medicine and Healthcare: Proceedings of 9th KES-InMed 2021. Springer, pp 101\u2013113","DOI":"10.1007\/978-981-16-3013-2_9"},{"key":"16649_CR59","doi-asserted-by":"publisher","unstructured":"Zeng C, Liu J, Li J, Cheng J, Zhou J, Nawaz SA, Xiao X, Bhatti UA (2022) Multi-watermarking algorithm for\u00a0medical image based on KAZE-DCT. J Ambient Intell Humaniz Comput 1\u20139. https:\/\/doi.org\/10.1007\/s12652-021-03539-5","DOI":"10.1007\/s12652-021-03539-5"},{"key":"16649_CR60","doi-asserted-by":"publisher","unstructured":"Zhou WJ, Yu M, Yu SM, Jiang GY, Ge DF (2012) A zero-watermarking algorithm of stereoscopic image based on hyperchaotic system. Wuli Xuebao\/Acta Phys Sin 61. https:\/\/doi.org\/10.7498\/aps.61.080701","DOI":"10.7498\/aps.61.080701"},{"key":"16649_CR61","doi-asserted-by":"publisher","first-page":"28685","DOI":"10.1007\/s11042-018-5995-4","volume":"77","author":"B Zou","year":"2018","unstructured":"Zou B, Du J, Liu X, Wang Y (2018) Distinguishable zero-watermarking scheme with similarity-based retrieval for digital rights Management of Fundus Image. Multimed Tools Appl 77:28685\u201328708","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16649-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16649-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16649-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,10]],"date-time":"2024-03-10T10:07:30Z","timestamp":1710065250000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16649-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,14]]},"references-count":61,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["16649"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16649-3","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,14]]},"assertion":[{"value":"17 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 July 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 September 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}