{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T19:26:54Z","timestamp":1772134014474,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T00:00:00Z","timestamp":1712966400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T00:00:00Z","timestamp":1712966400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-18982-7","type":"journal-article","created":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T06:01:45Z","timestamp":1712988105000},"page":"1429-1461","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A robust digital image watermarking technique in LWT-DCT domain using particle swarm optimization and statistical distortion correction"],"prefix":"10.1007","volume":"84","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2654-2073","authenticated-orcid":false,"given":"Saharul Alom","family":"Barlaskar","sequence":"first","affiliation":[]},{"given":"Anish Monsley","family":"Kirupakaran","sequence":"additional","affiliation":[]},{"given":"Rabul Hussain","family":"Laskar","sequence":"additional","affiliation":[]},{"given":"Taimoor","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,13]]},"reference":[{"key":"18982_CR1","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1080\/02564602.2015.1042927","volume":"32","author":"VS Verma","year":"2015","unstructured":"Verma VS, Jha RK (2015) An Overview of Robust Digital Image Watermarking. IETE Tech Rev (Institution Electron Telecommun Eng India) 32:479\u2013496. https:\/\/doi.org\/10.1080\/02564602.2015.1042927","journal-title":"IETE Tech Rev (Institution Electron Telecommun Eng India)"},{"key":"18982_CR2","doi-asserted-by":"publisher","first-page":"21653","DOI":"10.1007\/s11042-020-08960-0","volume":"79","author":"A Pourhadi","year":"2020","unstructured":"Pourhadi A, Mahdavi-Nasab H (2020) A robust digital image watermarking scheme based on bat algorithm optimization and SURF detector in SWT domain. Multimed Tools Appl 79:21653\u201321677. https:\/\/doi.org\/10.1007\/s11042-020-08960-0","journal-title":"Multimed Tools Appl"},{"key":"18982_CR3","doi-asserted-by":"publisher","unstructured":"Rassem TH, Makbol NM, Khoo BE (2016) Performance evaluation of RDWT-SVD and DWT-SVD watermarking schemes. AIP Conf Proc 1774. https:\/\/doi.org\/10.1063\/1.496510","DOI":"10.1063\/1.496510"},{"key":"18982_CR4","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s42044-020-00070-2","volume":"4","author":"C Saha","year":"2021","unstructured":"Saha C, Hossain MF, Rahman MA (2021) NSCT-based robust image watermarking in DC components of APDCBT using singular value decomposition. Iran J Comput Sci 4:133\u2013145. https:\/\/doi.org\/10.1007\/s42044-020-00070-2","journal-title":"Iran J Comput Sci"},{"key":"18982_CR5","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/s11042-020-09677-w","volume":"80","author":"LH Gong","year":"2021","unstructured":"Gong LH, Tian C, Zou WP, Zhou NR (2021) Robust and imperceptible watermarking scheme based on Canny edge detection and SVD in the contourlet domain. Multimed Tools Appl 80:439\u2013461. https:\/\/doi.org\/10.1007\/s11042-020-09677-w","journal-title":"Multimed Tools Appl"},{"key":"18982_CR6","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s00371-020-01808-6","volume":"37","author":"S Bagheri Baba Ahmadi","year":"2021","unstructured":"Bagheri Baba Ahmadi S, Zhang G, Wei S, Boukela L (2021) An intelligent and blind image watermarking scheme based on hybrid SVD transforms using human visual system characteristics. Vis Comput 37:385\u2013409. https:\/\/doi.org\/10.1007\/s00371-020-01808-6","journal-title":"Vis Comput"},{"key":"18982_CR7","first-page":"303","volume":"2","author":"K Loukhaoukha","year":"2011","unstructured":"Loukhaoukha K, Chouinard JY, Taieb MH (2011) Optimal image watermarking algorithm based on LWT-SVD via multi-objective ant colony optimization. J Inf Hiding Multimed Signal Process 2:303\u2013319","journal-title":"J Inf Hiding Multimed Signal Process"},{"key":"18982_CR8","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1007\/s13198-014-0288-4","volume":"9","author":"M Ali","year":"2018","unstructured":"Ali M, Ahn CW (2018) An optimal image watermarking approach through cuckoo search algorithm in wavelet domain. Int J Syst Assur Eng Manag 9:602\u2013611. https:\/\/doi.org\/10.1007\/s13198-014-0288-4","journal-title":"Int J Syst Assur Eng Manag"},{"key":"18982_CR9","doi-asserted-by":"publisher","first-page":"2507","DOI":"10.1007\/s11042-018-6322-9","volume":"78","author":"NR Zhou","year":"2019","unstructured":"Zhou NR, Luo AW, Zou WP (2019) Secure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm. Multimed Tools Appl 78:2507\u20132523. https:\/\/doi.org\/10.1007\/s11042-018-6322-9","journal-title":"Multimed Tools Appl"},{"key":"18982_CR10","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1016\/j.ijleo.2013.06.082","volume":"125","author":"M Ali","year":"2014","unstructured":"Ali M, Ahn CW, Pant M (2014) A robust image watermarking technique using SVD and differential evolution in DCT domain. Optik (Stuttg) 125:428\u2013434. https:\/\/doi.org\/10.1016\/j.ijleo.2013.06.082","journal-title":"Optik (Stuttg)"},{"key":"18982_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-021-00478-y","volume":"2","author":"F Yasmeen","year":"2021","unstructured":"Yasmeen F, Uddin MS (2021) An Efficient Watermarking Approach Based on LL and HH Edges of DWT\u2013SVD. SN Comput Sci 2:1\u201316. https:\/\/doi.org\/10.1007\/s42979-021-00478-y","journal-title":"SN Comput Sci"},{"key":"18982_CR12","doi-asserted-by":"publisher","first-page":"8184","DOI":"10.1016\/j.eswa.2015.06.041","volume":"42","author":"VS Verma","year":"2015","unstructured":"Verma VS, Jha RK, Ojha A (2015) significant region based robust watermarking scheme in lifting wavelet transform domain. Expert Syst Appl 42:8184\u20138197. https:\/\/doi.org\/10.1016\/j.eswa.2015.06.041","journal-title":"Expert Syst Appl"},{"key":"18982_CR13","doi-asserted-by":"publisher","unstructured":"Rachmawanto EH, Setiadi DRIM, Sari CA, Rijati N (2019) Imperceptible and secure image watermarking using DCT and random spread technique. Telkomnika (Telecommunication Comput Electron Control) 17:1750\u20131757. https:\/\/doi.org\/10.12928\/TELKOMNIKA.v17i4.9227","DOI":"10.12928\/TELKOMNIKA.v17i4.9227"},{"key":"18982_CR14","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1007\/s11760-013-0603-6","volume":"9","author":"VS Verma","year":"2015","unstructured":"Verma VS, Kumar Jha R (2015) Improved watermarking technique based on significant difference of lifting wavelet coefficients. Signal, Image Video Process 9:1443\u20131450. https:\/\/doi.org\/10.1007\/s11760-013-0603-6","journal-title":"Signal, Image Video Process"},{"key":"18982_CR15","doi-asserted-by":"publisher","unstructured":"Zhou X, Zhang H, Wang C (2018) A robust image watermarking technique based on DWT, APDCBT, and SVD. Symmetry (Basel) 10. https:\/\/doi.org\/10.3390\/SYM10030077","DOI":"10.3390\/SYM10030077"},{"key":"18982_CR16","doi-asserted-by":"publisher","first-page":"8881","DOI":"10.1007\/s11042-016-3514-z","volume":"76","author":"AK Singh","year":"2017","unstructured":"Singh AK (2017) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed Tools Appl 76:8881\u20138900. https:\/\/doi.org\/10.1007\/s11042-016-3514-z","journal-title":"Multimed Tools Appl"},{"key":"18982_CR17","doi-asserted-by":"publisher","unstructured":"Laskar RH, Choudhury M, Chakraborty K, Chakraborty S (2011) A joint DWT-DCT based robust digital watermarking algorithm for ownership verification of digital images. Commun Comput Inf Sci 157 CCIS:482\u2013491. https:\/\/doi.org\/10.1007\/978-3-642-22786-8_61","DOI":"10.1007\/978-3-642-22786-8_61"},{"key":"18982_CR18","doi-asserted-by":"publisher","first-page":"7461","DOI":"10.1007\/s11042-021-11798-9","volume":"81","author":"SA Barlaskar","year":"2022","unstructured":"Barlaskar SA, Singh SV, Kirupakaran AM, Laskar RH (2022) Genetic Algorithm Based Optimized Watermarking Technique Using Hybrid DCNN-SVR and Statistical Approach for Watermark Extraction. Multimed Tools Appl 81:7461\u20137500. https:\/\/doi.org\/10.1007\/s11042-021-11798-9","journal-title":"Multimed Tools Appl"},{"key":"18982_CR19","doi-asserted-by":"publisher","unstructured":"Tao H, Chongmin L, Mohamad Zain J, Abdalla AN (2014) Robust image watermarking theories and techniques: a review. J Appl Res Technol 12:122\u2013138. https:\/\/doi.org\/10.1016\/S1665-6423(14)71612-8","DOI":"10.1016\/S1665-6423(14)71612-8"},{"key":"18982_CR20","doi-asserted-by":"publisher","first-page":"3221","DOI":"10.1007\/s12652-019-01500-1","volume":"11","author":"A Mohanarathinam","year":"2020","unstructured":"Mohanarathinam A, Kamalraj S, Prasanna Venkatesan GKD et al (2020) Digital watermarking techniques for image security: a review. J Ambient Intell Humaniz Comput 11:3221\u20133229. https:\/\/doi.org\/10.1007\/s12652-019-01500-1","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"18982_CR21","doi-asserted-by":"publisher","first-page":"14407","DOI":"10.1007\/s11042-017-5035-9","volume":"77","author":"M Islam","year":"2018","unstructured":"Islam M, Laskar RH (2018) Geometric distortion correction based robust watermarking scheme in LWT-SVD domain with digital watermark extraction using SVM. Multimed Tools Appl 77:14407\u201314434. https:\/\/doi.org\/10.1007\/s11042-017-5035-9","journal-title":"Multimed Tools Appl"},{"key":"18982_CR22","doi-asserted-by":"publisher","first-page":"12275","DOI":"10.1007\/s11042-020-10220-0","volume":"80","author":"F Thakkar","year":"2021","unstructured":"Thakkar F, Srivastava VK (2021) An adaptive, secure and imperceptive image watermarking using swarm intelligence, Arnold transform, SVD and DWT. Multimed Tools Appl 80:12275\u201312292. https:\/\/doi.org\/10.1007\/s11042-020-10220-0","journal-title":"Multimed Tools Appl"},{"key":"18982_CR23","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.dsp.2014.06.012","volume":"33","author":"NM Makbol","year":"2014","unstructured":"Makbol NM, Khoo BE (2014) A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition. Digit Signal Process 33:134\u2013147. https:\/\/doi.org\/10.1016\/j.dsp.2014.06.012","journal-title":"Digit Signal Process"},{"key":"18982_CR24","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1007\/978-981-32-9775-3_76","volume":"587","author":"P Khare","year":"2020","unstructured":"Khare P, Srivastava VK (2020) An Efficient Image Watermarking Technique Based on IWT-DCT-SVD. Lect Notes Electr Eng 587:841\u2013849. https:\/\/doi.org\/10.1007\/978-981-32-9775-3_76","journal-title":"Lect Notes Electr Eng"},{"key":"18982_CR25","doi-asserted-by":"publisher","unstructured":"Ernawan F, Kabir MN (2018) A blind watermarking technique using redundant wavelet transform for copyright protection. Proc - 2018 IEEE 14th Int Colloq Signal Process its Appl CSPA 2018 221\u2013226. https:\/\/doi.org\/10.1109\/CSPA.2018.8368716","DOI":"10.1109\/CSPA.2018.8368716"},{"key":"18982_CR26","doi-asserted-by":"crossref","unstructured":"Kennedy J, Eberhart R (1995) Particle swarm optimization. In: Proceedings of ICNN\u201995 - International Conference on Neural Networks. pp 1942\u20131948 vol.4","DOI":"10.1109\/ICNN.1995.488968"},{"key":"18982_CR27","unstructured":"Gonzalez, EW (2019) ImageProcessingPlace. image database. Pearson-Prentice Hall. http:\/\/www.imageprocessingplace.com\/root_files_V3\/image_databases.html. Accessed 22 Mar 2019"},{"key":"18982_CR28","volume-title":"Genetic algorithms","author":"DE Goldberg","year":"2006","unstructured":"Goldberg DE (2006) Genetic algorithms. Pearson Education India"},{"key":"18982_CR29","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.visinf.2018.03.001","volume":"2","author":"R Roy","year":"2018","unstructured":"Roy R, Ahmed T, Changder S (2018) Watermarking through image geometry change tracking. Vis Informatics 2:125\u2013135. https:\/\/doi.org\/10.1016\/j.visinf.2018.03.001","journal-title":"Vis Informatics"},{"key":"18982_CR30","doi-asserted-by":"publisher","unstructured":"Punidha R, Sivaram M (2017) Integer Wavelet Transform Based Approach for High Robustness of Audio Signal Transmission. Int J Pure Appl Math 116:295\u2013304 Hu H-T, Hsu L-Y (2015) Exploring DWT\u2013SVD\u2013DCT feature parameters for robust multiple watermarking against JPEG and JPEG2000 compression. Comput Electr Eng 41:52\u201363. https:\/\/doi.org\/10.1016\/j.compeleceng.2014.08.001","DOI":"10.1016\/j.compeleceng.2014.08.001"},{"key":"18982_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1117\/1.JEI.27.5.053008","volume":"27","author":"M Islam","year":"2018","unstructured":"Islam M, Laskar RH (2018) Robust image watermarking technique using support vector regression for blind geometric distortion correction in lifting wavelet transform and singular value decomposition domain. J Electron Imaging 27:1\u201319. https:\/\/doi.org\/10.1117\/1.JEI.27.5.053008","journal-title":"J Electron Imaging"},{"key":"18982_CR32","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/978-3-030-51935-3_37","volume-title":"Image and Signal Processing","author":"K Gourrame","year":"2020","unstructured":"Gourrame K, Douzi H, Harba R et al (2020) Image Watermarking Based on Fourier-Mellin Transform. In: El Moataz A, Mammass D, Mansouri A, Nouboud F (eds) Image and Signal Processing. Springer International Publishing, Cham, pp 348\u2013356"},{"key":"18982_CR33","doi-asserted-by":"publisher","unstructured":"Yu C, Li X, Chen X, Li J (2019) An Adaptive and Secure Holographic Image Watermarking Scheme. Entropy (Basel) 21. https:\/\/doi.org\/10.3390\/e21050460","DOI":"10.3390\/e21050460"},{"key":"18982_CR34","doi-asserted-by":"publisher","unstructured":"Wang Y-R, Lin W-H, Yang L (2011) An intelligent watermarking method based on particle swarm optimization. Expert Syst Appl 38:8024\u20138029. https:\/\/doi.org\/10.1016\/j.eswa.2010.12.129","DOI":"10.1016\/j.eswa.2010.12.129"},{"key":"18982_CR35","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/TEVC.2005.857610","volume":"10","author":"JJ Liang","year":"2006","unstructured":"Liang JJ, Qin AK, Suganthan PN, Baskar S (2006) Comprehensive learning particle swarm optimizer for global optimization of multimodal functions. IEEE Trans Evol Comput 10:281\u2013295. https:\/\/doi.org\/10.1109\/TEVC.2005.857610","journal-title":"IEEE Trans Evol Comput"},{"key":"18982_CR36","doi-asserted-by":"publisher","first-page":"100665","DOI":"10.1016\/j.swevo.2020.100665","volume":"54","author":"J Carrasco","year":"2020","unstructured":"Carrasco J, Garc\u00eda S, Rueda MM et al (2020) Recent trends in the use of statistical tests for comparing swarm and evolutionary computing algorithms: Practical guidelines and a critical review. Swarm Evol Comput 54:100665. https:\/\/doi.org\/10.1016\/j.swevo.2020.100665","journal-title":"Swarm Evol Comput"},{"key":"18982_CR37","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.swevo.2011.03.001","volume":"1","author":"A Zhou","year":"2011","unstructured":"Zhou A, Qu BY, Li H et al (2011) Multiobjective evolutionary algorithms: A survey of the state of the art. Swarm Evol Comput 1:32\u201349. https:\/\/doi.org\/10.1016\/j.swevo.2011.03.001","journal-title":"Swarm Evol Comput"},{"key":"18982_CR38","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1016\/j.comcom.2020.01.038","volume":"77","author":"A Zear","year":"2018","unstructured":"Zear A, Singh AM, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77:4863\u20134882. https:\/\/doi.org\/10.1016\/j.comcom.2020.01.038","journal-title":"Multimed Tools Appl"},{"key":"18982_CR39","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.comcom.2020.01.038","volume":"152","author":"A Ashima","year":"2020","unstructured":"Ashima A, Singh AM (2020) An improved DWT-SVD domain watermarking for medical information security. Comp Commu 152:72\u201380. https:\/\/doi.org\/10.1016\/j.comcom.2020.01.038","journal-title":"Comp Commu"},{"key":"18982_CR40","doi-asserted-by":"crossref","unstructured":"Agilandeeswari L, Prabukumar M, Alenizi FA (2023) A robust semi-fragile watermarking system using Pseudo-Zernike moments and dual tree complex wavelet transform for social media content authentication. Multimedia Tools and Applications 1\u201353","DOI":"10.1007\/s11042-023-15177-4"},{"key":"18982_CR41","doi-asserted-by":"publisher","first-page":"25431","DOI":"10.1007\/s11042-018-5800-4","volume":"77","author":"L Agilandeeswari","year":"2018","unstructured":"Agilandeeswari L, Ganesan K (2018) RST invariant robust video watermarking algorithm using quaternion curvelet transform. Multimed Tools Appl 77:25431\u201325474","journal-title":"Multimed Tools Appl"},{"key":"18982_CR42","doi-asserted-by":"crossref","unstructured":"Zhou X, Ma J, Du W (2013) \u201cSoW: a hybrid DWT-SVD based secured image watermarking,\u201d in Proceedings of the International Conference on Sensor Network Security Technology and Privacy Communication System (SNS & PCS), pp 197\u2013 200, Nangang, China","DOI":"10.1109\/SNS-PCS.2013.6553864"},{"key":"18982_CR43","doi-asserted-by":"crossref","unstructured":"Jane O, Elbas\u00b8I E, Ilk HG (2014) Hybrid non-blind watermarking based on DWT and SVD. J Appl Res Technol 12(4):750\u2013761","DOI":"10.1016\/S1665-6423(14)70091-4"},{"key":"18982_CR44","doi-asserted-by":"crossref","unstructured":"Jain P, Ghanekar U (2018) \u201cRobust watermarking technique for textured images,\u201d in Proceedings of the 6th International Conference on Smart Computing and Communications (ICSCC), pp 179\u2013186, Kurukshetra, India","DOI":"10.1016\/j.procs.2017.12.025"},{"issue":"20","key":"18982_CR45","doi-asserted-by":"publisher","first-page":"27181","DOI":"10.1007\/s11042-018-5913-9","volume":"77","author":"M Hamidi","year":"2018","unstructured":"Hamidi M, Haziti ME, Cherifi H, Hassouni ME (2018) Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform. Multimed Tools Appl 77(20):27181\u201327214","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"18982_CR46","first-page":"169","volume":"11","author":"I Assini","year":"2018","unstructured":"Assini I, Badri A, Badri A, Safi K, Sahel A, Baghdad A (2018) A robust hybrid watermarking technique for securing medical image. Int J Intell Eng Syst 11(3):169\u2013176","journal-title":"Int J Intell Eng Syst"},{"issue":"6","key":"18982_CR47","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1049\/iet-ipr.2016.0515","volume":"11","author":"Y Guo","year":"2017","unstructured":"Guo Y, Li B-Z, Goel N (2017) Optimised blind image watermarking method based on firefly algorithm in DWT-QR transform domain. IET Image Proc 11(6):406\u2013415","journal-title":"IET Image Proc"},{"issue":"5","key":"18982_CR48","doi-asserted-by":"publisher","first-page":"6575","DOI":"10.1007\/s11042-016-3332-3","volume":"76","author":"H-T Hu","year":"2017","unstructured":"Hu H-T, Hsu L-Y (2017) Collective blind image watermarking in DWT-DCT domain with adaptive embedding strength governed by quality metrics. Multimed Tools Appl 76(5):6575\u20136594","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"18982_CR49","doi-asserted-by":"publisher","first-page":"3979","DOI":"10.1007\/s13369-023-08261-2","volume":"49","author":"SA Barlaskar","year":"2024","unstructured":"Barlaskar SA, Kirupakaran AM, Laskar RH (2024) A Human Visual System-Based Blind Image Watermarking Scheme in the IWT-APDCBT Domain Integrating Geometric and Non-Geometric Distortion Correction Techniques. Arab J Sci Eng 49(3):3979\u20134003. https:\/\/doi.org\/10.1007\/s13369-023-08261-2","journal-title":"Arab J Sci Eng"},{"issue":"4","key":"18982_CR50","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1504\/IJIPSI.2016.082095","volume":"2","author":"L Agilandeeswari","year":"2016","unstructured":"Agilandeeswari L, Ganesan K (2016) False-positive free Hilbert and multi-resolution-based image watermarking technique using firefly optimisation algorithm. Int J Inf Priv Sec Integr 2(4):257\u2013280. https:\/\/doi.org\/10.1504\/IJIPSI.2016.082095","journal-title":"Int J Inf Priv Sec Integr"},{"issue":"1","key":"18982_CR51","first-page":"107","volume":"15","author":"A Bansal","year":"2023","unstructured":"Bansal A (2023) Vision transformer-based watermark generation for authentication and tamper detection using schur decomposition and hybrid transforms. Int J Comput Inf Syst Indust Manage Appl 15(1):107\u2013121","journal-title":"Int J Comput Inf Syst Indust Manage Appl"},{"issue":"8","key":"18982_CR52","first-page":"101688","volume":"35","author":"SD Mali","year":"2023","unstructured":"Mali SD, Agilandeeswari L (2023) Non-redundant shift-invariant complex wavelet transform and fractional gorilla troops optimization-based deep convolutional neural network for video watermarking. J King Saud Univ-Comput Inf Sci 35(8):101688","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"18982_CR53","doi-asserted-by":"publisher","first-page":"339","DOI":"10.37391\/ijeer.110214","volume":"11","author":"A Palani","year":"2023","unstructured":"Palani A, Loganathan A (2023) Multi-image feature map-based watermarking techniques using transformer. Int J Electr Electron Res 11:339\u2013344","journal-title":"Int J Electr Electron Res"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18982-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-18982-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18982-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T13:08:28Z","timestamp":1738069708000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-18982-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,13]]},"references-count":53,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,1]]}},"alternative-id":["18982"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-18982-7","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,13]]},"assertion":[{"value":"30 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No animals were harmed or used for this study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}]}}