{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:51:30Z","timestamp":1767340290780,"version":"3.37.3"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"33","license":[{"start":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T00:00:00Z","timestamp":1709164800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T00:00:00Z","timestamp":1709164800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-18436-0","type":"journal-article","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T07:02:15Z","timestamp":1709190135000},"page":"78861-78878","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["On unique framework-based implementation of a novel image watermarking scheme"],"prefix":"10.1007","volume":"83","author":[{"given":"Anirban","family":"Saha","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5782-9694","authenticated-orcid":false,"given":"Subhrajit","family":"Sinha Roy","sequence":"additional","affiliation":[]},{"given":"Abhishek","family":"Basu","sequence":"additional","affiliation":[]},{"given":"Avik","family":"Chattopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"key":"18436_CR1","doi-asserted-by":"publisher","first-page":"21651","DOI":"10.1007\/s11042-021-10651-3","volume":"80","author":"P Pal","year":"2021","unstructured":"Pal P, Jana B, Bhaumik J (2021) A secure reversible color image watermarking scheme based on LBP, Lagrange interpolation polynomial and weighted matrix. Multimed Tools Appl 80:21651\u201321678","journal-title":"Multimed Tools Appl"},{"issue":"15","key":"18436_CR2","doi-asserted-by":"publisher","first-page":"3829","DOI":"10.1049\/iet-ipr.2019.1740","volume":"14","author":"Z Yuan","year":"2021","unstructured":"Yuan Z, Su Q, Liu D, Zhang X, Yao T (2021) Fast and robust image watermarking method in the spatial domain. IET Image Processing 14(15):3829\u20133838","journal-title":"IET Image Processing"},{"key":"18436_CR3","doi-asserted-by":"publisher","unstructured":"Zhang X, Su Q, Yuan Z, Liu D (2020) An efficient blind color image watermarking algorithm in spatial domain combining discrete Fourier transform. Optik, Elsevier 219:165272.\u00a0https:\/\/doi.org\/10.1016\/j.ijleo.2020.165272","DOI":"10.1016\/j.ijleo.2020.165272"},{"issue":"2","key":"18436_CR4","doi-asserted-by":"publisher","first-page":"e59","DOI":"10.1002\/spy2.59","volume":"2","author":"P Pal","year":"2019","unstructured":"Pal P, Jana B, Bhaumik J (2019) Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image. Secur Priv 2(2):e59","journal-title":"Secur Priv"},{"key":"18436_CR5","doi-asserted-by":"publisher","unstructured":"Yasmeen F, Uddin MS (2021) An efficient watermarking approach based on LL and HH edges of DWT\u2013SVD. SN Comput Sci 2(82).\u00a0https:\/\/doi.org\/10.1007\/s42979-021-00478-y","DOI":"10.1007\/s42979-021-00478-y"},{"key":"18436_CR6","doi-asserted-by":"publisher","unstructured":"Sinha Roy S, Basu A, Chattopadhyay A (2019) Intelligent copyright protection for images, 1st edn. CRC, Taylor and Francis, New York. https:\/\/doi.org\/10.1201\/9780429243431","DOI":"10.1201\/9780429243431"},{"key":"18436_CR7","doi-asserted-by":"publisher","unstructured":"Furqan A, Kumar M (2015) Study and analysis of robust DWT-SVD domain based digital image watermarking technique using MATLAB. IEEE Int Conf Comput Intell Commun Technol, Ghaziabad, India 638\u2013644.\u00a0https:\/\/doi.org\/10.1109\/CICT.2015.74","DOI":"10.1109\/CICT.2015.74"},{"issue":"6","key":"18436_CR8","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1080\/02564602.2015.1042927","volume":"32","author":"VS Verma","year":"2015","unstructured":"Verma VS, Jha RK (2015) An Overview of Robust Digital Image Watermarking. IETE Tech Rev 32(6):479\u2013496","journal-title":"IETE Tech Rev"},{"key":"18436_CR9","doi-asserted-by":"publisher","first-page":"13125","DOI":"10.1007\/s11042-020-08652-9","volume":"79","author":"S Sinha Roy","year":"2020","unstructured":"Sinha Roy S, Basu A, Chattopadhyay A (2020) On the implementation of a copyright protection scheme using digital image watermarking. Multimed Tools Appl 79:13125\u201313138","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"18436_CR10","first-page":"15","volume":"3","author":"R Goyal","year":"2014","unstructured":"Goyal R, Kumar N (2014) LSB Based Digital Watermarking Technique. Int J Appl Innov Eng Manag 3(9):15\u201318","journal-title":"Int J Appl Innov Eng Manag"},{"key":"18436_CR11","doi-asserted-by":"publisher","first-page":"27245","DOI":"10.1007\/s11042-021-11046-0","volume":"80","author":"S Sinha Roy","year":"2021","unstructured":"Sinha Roy S, Basu A, Chattopadhyay A, Kamal R (2021) Hardware execution of a saliency map based digital image watermarking scheme. Multimed Tools Appl 80:27245\u201327258","journal-title":"Multimed Tools Appl"},{"key":"18436_CR12","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1016\/j.procs.2015.06.071","volume":"54","author":"RK Singh","year":"2015","unstructured":"Singh RK, Shaw DK, Alam MJ (2015) Experimental Studies of LSB Watermarking with Different Noise. Procedia Comput Sci 54:612\u2013620","journal-title":"Procedia Comput Sci"},{"issue":"8","key":"18436_CR13","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/35.940051","volume":"39","author":"JR Hernandez Martin","year":"2001","unstructured":"Hernandez Martin JR, Kutter M (2001) Information Retrieval in Digital Watermarking. IEEE Commun Mag 39(8):110\u2013116","journal-title":"IEEE Commun Mag"},{"issue":"5","key":"18436_CR14","first-page":"309","volume":"3","author":"G Balamurugan","year":"2014","unstructured":"Balamurugan G, Jayarraman KB, Arulalan V (2014) A Survey on Medical Image Watermarking Techniques. IJCSN Int J Comput Sci Netw 3(5):309\u2013317","journal-title":"IJCSN Int J Comput Sci Netw"},{"key":"18436_CR15","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.neucom.2022.02.083","volume":"488","author":"W Wan","year":"2022","unstructured":"Wan W, Wang J, Zhang Y et al (2022) A comprehensive survey on robust image watermarking. Neurocomputing 488:226\u2013247","journal-title":"Neurocomputing"},{"key":"18436_CR16","doi-asserted-by":"crossref","unstructured":"Liu G, Liu H, Kadir A (2012) Wavelet-Based Color Pathological Image Watermark through Dynamically Adjusting the Embedding Intensity,\u00a0Computational and Mathematical Methods in Medicine vol 2012, Article ID 406349, 10 pp 15","DOI":"10.1155\/2012\/406349"},{"issue":"3","key":"18436_CR17","first-page":"259","volume":"4","author":"T Kimoto","year":"2013","unstructured":"Kimoto T (2013) Spatial Image Watermarking by Error-Correction Coding in Gray Codes. J Sig Inf Process 4(3):259-273.16","journal-title":"J Sig Inf Process"},{"issue":"815","key":"18436_CR18","first-page":"821.17","volume":"11","author":"S Liu","year":"2017","unstructured":"Liu S, Pan Z, Song H (2017) Digital image watermarking method based on DCT and fractal encoding. IET Image Process 11(815):821.17","journal-title":"IET Image Process"},{"issue":"4358","key":"18436_CR19","first-page":"4370.18","volume":"7","author":"Q Su","year":"2019","unstructured":"Su Q, Yuan Z, Liu D (2019) An Approximate Schur Decomposition-Based Spatial Domain Color Image Watermarking Method. IEEE Access 7(4358):4370.18","journal-title":"IEEE Access"},{"issue":"1","key":"18436_CR20","first-page":"125","volume":"31","author":"J Abraham","year":"2019","unstructured":"Abraham J, Paul V (2019) An Imperceptible Spatial Domain Color Image Watermarking Scheme. J King Saud Univ-Comput Inf Sci 31(1):125-133.19","journal-title":"J King Saud Univ-Comput Inf Sci"},{"issue":"9","key":"18436_CR21","doi-asserted-by":"publisher","first-page":"1428.20","DOI":"10.3390\/electronics9091428","volume":"9","author":"M Ali","year":"2020","unstructured":"Ali M, Ahn CW, Pant M, Kumar S, Singh M, Saini D (2020) An Optimized Digital Watermarking Scheme Based on Invariant DC Coefficients in Spatial Domain. Electronics 9(9):1428.20","journal-title":"Electronics"},{"issue":"6","key":"18436_CR22","doi-asserted-by":"publisher","first-page":"9315","DOI":"10.1007\/s11042-020-09943-x","volume":"80","author":"S Kumar","year":"2021","unstructured":"Kumar S, Singh B (2021) Entropy based spatial domain image watermarking and its performance analysis. Multimedia Tools and Applications 80(6):9315-9331.21","journal-title":"Multimedia Tools and Applications"},{"key":"18436_CR23","first-page":"104049.22","volume":"97","author":"J-S Pan","year":"2021","unstructured":"Pan J-S, Sun X-X, Chu S-C, Abraham A, Yan B (2021) Digital watermarking with improved SMS applied for QR code. Eng Appl Art Intell 97:104049.22","journal-title":"Eng Appl Art Intell"},{"issue":"1","key":"18436_CR24","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1515\/comp-2019-0023","volume":"11","author":"S Sharma","year":"2021","unstructured":"Sharma S, Chauhan U, Khanam R, Singh KK (2021) Digital Watermarking using Grasshopper Optimization Algorithm. Open Comput Sci 11(1):330-336.23","journal-title":"Open Comput Sci"},{"issue":"13","key":"18436_CR25","doi-asserted-by":"publisher","first-page":"2027.24","DOI":"10.3390\/electronics11132027","volume":"11","author":"L Wang","year":"2022","unstructured":"Wang L, Ji H (2022) A Watermarking Optimization Method Based on Matrix Decomposition and DWT for Multi-Size Images. Electronics 11(13):2027.24","journal-title":"Electronics"},{"key":"18436_CR26","doi-asserted-by":"publisher","unstructured":"Duan L, Wu C, Miao J, Qing L (2011) Visual saliency detection by spatially weighted dissimilarity. IEEE ConfComput Vis Pattern Recognit, Colorado Springs, USA 473\u2013480.\u00a0https:\/\/doi.org\/10.1109\/CVPR.2011.5995676","DOI":"10.1109\/CVPR.2011.5995676"},{"issue":"10","key":"18436_CR27","doi-asserted-by":"publisher","first-page":"1915","DOI":"10.1109\/TPAMI.2011.272","volume":"34","author":"S Goferman","year":"2013","unstructured":"Goferman S, Zelnik-Manor Land Tal A (2013) Context-aware saliency detection. IEEE Trans Pattern Anal Mach Intell 34(10):1915\u20131926","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"1","key":"18436_CR28","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1080\/02564602.2019.1711208","volume":"38","author":"Z Cui","year":"2021","unstructured":"Cui Z, Qi W, Liu Y, Guo J (2021) Research on Region Selection Strategy for Visible Watermark Embedding. IETE Techn Rev 38(1):5\u201316","journal-title":"IETE Techn Rev"},{"key":"18436_CR29","doi-asserted-by":"crossref","unstructured":"Basu A, Sinha Roy S, Chattopadhyay A (2016) Implementation of a spatial domain salient region based digital image watermarking scheme. Int. Conf. Res Comput Intell Commun Netw IEEE 269-272","DOI":"10.1109\/ICRCICN.2016.7813669"},{"key":"18436_CR30","unstructured":"The USC-SIPI Image Database. http:\/\/sipi.usc.edu\/database\/database.php?volume=misc"},{"key":"18436_CR31","doi-asserted-by":"publisher","unstructured":"Kutter M, Petitcolas FAP (1999) A fair benchmark for image watermarking systems. Electronic Imaging \u201999, Security and Watermarking of Multimedia Contents 3657.\u00a0https:\/\/doi.org\/10.1117\/12.344672","DOI":"10.1117\/12.344672"},{"issue":"1","key":"18436_CR32","first-page":"91","volume":"22","author":"Q Su","year":"2017","unstructured":"Su Q, Chen B (2017) Robust color image watermarking technique in the spatial domain. Springer J Soft Comput A Fusion Found Methodologies Appl 22(1):91\u2013106","journal-title":"Springer J Soft Comput A Fusion Found Methodologies Appl"},{"key":"18436_CR33","doi-asserted-by":"publisher","unstructured":"Huynh-The T, Lee S (2017) Color image watermarking using selective MSB-LSB embedding and 2D otsu thresholding. IEEE Int Conf Syst Man Cybern Banff Cent Banff Can 1333\u20131338. https:\/\/doi.org\/10.1109\/SMC.2017.8122798","DOI":"10.1109\/SMC.2017.8122798"},{"key":"18436_CR34","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1007\/s11042-016-3862-8","volume":"77","author":"A Zear","year":"2018","unstructured":"Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77:4863\u20134882","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"18436_CR35","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s11801-018-7212-0","volume":"14","author":"S Han","year":"2018","unstructured":"Han S, Yang J, Wang R, Jia G (2018) A Robust Color Image Watermarking Algorithm Against Rotation Attacks. Optoelectron Lett 14(1):61\u201366","journal-title":"Optoelectron Lett"},{"key":"18436_CR36","first-page":"1","volume-title":"Improved wavelet-based image watermarking through SPIHT","author":"C Kumar","year":"2018","unstructured":"Kumar C, Singh AK, Kumar P (2018) Improved wavelet-based image watermarking through SPIHT. Springer, J. Multimedia Tools and Application, pp 1\u201314"},{"key":"18436_CR37","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1016\/j.future.2018.12.036","volume":"94","author":"NN Hurrah","year":"2019","unstructured":"Hurrah NN, Parah SA, Loan NA, Sheikh JA, Elhoseny M, Muhammad K (2019) Dual watermarking scheme for privacy protection and content authentication of multimedia. Future Generation Computer System 94:654\u2013673","journal-title":"Future Generation Computer System"},{"key":"18436_CR38","first-page":"215","volume":"814","author":"S Sharmin","year":"2019","unstructured":"Sharmin S, Khaliluzzaman M, Mahiuddin M, Kafi A (2019) Blind Digital Image Watermarking for Copyright Protection Based on Hadamard Transform, Emerging Technologies in Data Mining and Information Security. Adv Intell Syst Comput Springer Singap 814:215\u2013225","journal-title":"Adv Intell Syst Comput Springer Singap"},{"key":"18436_CR39","doi-asserted-by":"publisher","first-page":"212","DOI":"10.15623\/ijret.2014.0303039","volume":"03","author":"A Akter","year":"2014","unstructured":"Akter A, Ullah MA (2014) Digital Watermarking with A New Algorithm. Int J Res Eng Technol 03:212\u2013217","journal-title":"Int J Res Eng Technol"},{"key":"18436_CR40","doi-asserted-by":"publisher","first-page":"74048","DOI":"10.1109\/ACCESS.2023.3294570","volume":"11","author":"M Kaur","year":"2023","unstructured":"Kaur M, AlZubi AA, Singh D, Kumar V, Lee HN (2023) Lightweight Biomedical Image Encryption Approach. IEEE Access 11:74048\u201374057","journal-title":"IEEE Access"},{"key":"18436_CR41","doi-asserted-by":"publisher","first-page":"90739","DOI":"10.1109\/ACCESS.2023.3305271","volume":"11","author":"M Kaur","year":"2023","unstructured":"Kaur M et al (2023) EGCrypto: A Low-Complexity Elliptic Galois Cryptography Model for Secure Data Transmission in IoT. IEEE Access 11:90739\u201390748","journal-title":"IEEE Access"},{"key":"18436_CR42","doi-asserted-by":"publisher","first-page":"2689","DOI":"10.1007\/s00500-021-06423-8","volume":"26","author":"M Kaur","year":"2022","unstructured":"Kaur M, Singh D, Kumar V (2022) Improved seven-dimensional (i7D) hyperchaotic map-based image encryption technique. Soft Comput 26:2689\u20132698","journal-title":"Soft Comput"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18436-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-18436-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18436-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,7]],"date-time":"2024-10-07T13:24:16Z","timestamp":1728307456000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-18436-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,29]]},"references-count":42,"journal-issue":{"issue":"33","published-online":{"date-parts":[[2024,10]]}},"alternative-id":["18436"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-18436-0","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,2,29]]},"assertion":[{"value":"18 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 January 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This research does not have any funding or conflicts of interests","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interests"}}]}}