{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:37:10Z","timestamp":1770230230338,"version":"3.49.0"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T00:00:00Z","timestamp":1726876800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T00:00:00Z","timestamp":1726876800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-20127-9","type":"journal-article","created":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T05:01:41Z","timestamp":1726894901000},"page":"27721-27746","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Copy-Right protection of color videos using robust watermarking based geometrically invariant moments of fractional orders and logistic sine cosine chaotic map"],"prefix":"10.1007","volume":"84","author":[{"given":"Yousef S.","family":"Alsahafi","sequence":"first","affiliation":[]},{"given":"Mohamed M.","family":"Darwish","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8065-8977","authenticated-orcid":false,"given":"Khalid M.","family":"Hosny","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,21]]},"reference":[{"key":"20127_CR1","doi-asserted-by":"publisher","unstructured":"Abdulla AA (2023) Digital image steganography: challenges, investigation, and recommendation for the future direction. Soft Comput 1\u201314. https:\/\/doi.org\/10.1007\/s00500-023-09130-8","DOI":"10.1007\/s00500-023-09130-8"},{"issue":"9","key":"20127_CR2","doi-asserted-by":"publisher","first-page":"2131","DOI":"10.1109\/TCSVT.2017.2712162","volume":"28","author":"M Asikuzzaman","year":"2018","unstructured":"Asikuzzaman M, Pickering M (2018) An overview of digital video watermarking. IEEE Trans Circuits Syst Video Technol 28(9):2131\u20132153","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"20127_CR3","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.comcom.2022.02.023","volume":"188","author":"P Amrit","year":"2022","unstructured":"Amrit P, Singh AK (2022) Survey on watermarking methods in the artificial intelligence domain and beyond. Comput Commun 188:52\u201365","journal-title":"Comput Commun"},{"issue":"5","key":"20127_CR4","doi-asserted-by":"publisher","first-page":"12313","DOI":"10.1007\/s10586-017-1614-9","volume":"22","author":"R Rajkumar","year":"2019","unstructured":"Rajkumar R, Vasuki A (2019) Reversible and robust image watermarking based on histogram shifting. Cluster Comput 22(5):12313\u201312323","journal-title":"Cluster Comput"},{"issue":"2","key":"20127_CR5","first-page":"1","volume":"102","author":"SP alias Sathya","year":"2018","unstructured":"alias Sathya SP, Ramakrishnan S (2018) Fibonacci-based key frame selection and scrambling for video watermarking in DWT-SVD domain. Wirel Pers Commun 102(2):1\u201321","journal-title":"Wirel Pers Commun"},{"issue":"2","key":"20127_CR6","first-page":"420","volume":"2017","author":"T Sathies Kumar","year":"2017","unstructured":"Sathies Kumar T, Arun C (2017) A review of robust video watermarking technique. J Adv Res Dyn Control Syst 2017(2):420\u2013433","journal-title":"J Adv Res Dyn Control Syst"},{"issue":"12","key":"20127_CR7","doi-asserted-by":"publisher","first-page":"4757","DOI":"10.1007\/s00542-018-3870-x","volume":"24","author":"M Shanmugam","year":"2018","unstructured":"Shanmugam M, Chokkalingam A (2018) Performance analysis of 2 level DWTSVD based non-blind and blind video watermarking using range conversion method. Microsyst Technol 24(12):4757\u20134765","journal-title":"Microsyst Technol"},{"issue":"6","key":"20127_CR8","doi-asserted-by":"publisher","first-page":"7187","DOI":"10.1007\/s11042-017-4628-7","volume":"77","author":"L Chen","year":"2017","unstructured":"Chen L, Zhao J (2017) Contourlet-based image and video watermarking robust to geometric attacks and compressions. Multimed Tools Appl 77(6):7187\u20137204","journal-title":"Multimed Tools Appl"},{"issue":"21","key":"20127_CR9","doi-asserted-by":"publisher","first-page":"13093","DOI":"10.1007\/s11042-015-2733-z","volume":"75","author":"D Li","year":"2015","unstructured":"Li D, Qiao L, Kim J (2015) A video zero-watermarking algorithm based on LPM. Multimed Tools Appl 75(21):13093\u201313106","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"20127_CR10","doi-asserted-by":"publisher","first-page":"3775","DOI":"10.1007\/s00371-021-02220-4","volume":"38","author":"M Du","year":"2022","unstructured":"Du M, Luo T, Xu H, Song Y, Wang C (2022) Robust HDR video watermarking method based on saliency extraction and T-SVD. Visual Comput 38(11):3775\u20133789","journal-title":"Visual Comput"},{"issue":"13","key":"20127_CR11","doi-asserted-by":"publisher","first-page":"16419","DOI":"10.1007\/s11042-017-5213-9","volume":"77","author":"KM Singh","year":"2018","unstructured":"Singh KM (2018) A robust rotation resilient video watermarking scheme based on the SIFT. Multimed Tools Appl 77(13):16419\u201316444","journal-title":"Multimed Tools Appl"},{"key":"20127_CR12","doi-asserted-by":"publisher","first-page":"20449","DOI":"10.1007\/s11042-021-10730-5","volume":"80","author":"MR Keyvanpour","year":"2021","unstructured":"Keyvanpour MR, Khanbani N, Boreiry M (2021) A secure method in digital video watermarking with transform domain algorithms. Multimedia Tools Appl 80:20449\u201320476","journal-title":"Multimedia Tools Appl"},{"issue":"18","key":"20127_CR13","doi-asserted-by":"publisher","first-page":"26089","DOI":"10.1007\/s11042-019-07809-5","volume":"78","author":"Z Cao","year":"2019","unstructured":"Cao Z, Wang L (2019) A secure video watermarking technique based on hyperchaotic Lorentz system. Multimed Tools Appl 78(18):26089\u201326109","journal-title":"Multimed Tools Appl"},{"key":"20127_CR14","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.apm.2020.04.015","volume":"85","author":"Q Liu","year":"2020","unstructured":"Liu Q, Yang S, Liu J, Xiong P, Zhou M (2020) A discrete wavelet transform and singular value decomposition-based digital video watermark method. Appl Math Model 85:273\u2013293","journal-title":"Appl Math Model"},{"key":"20127_CR15","doi-asserted-by":"publisher","first-page":"14361","DOI":"10.1007\/s11042-017-5033-y","volume":"77","author":"I Bayoudh","year":"2017","unstructured":"Bayoudh I, Jabra SB, Zagrouba E (2017) Online multi-sprites based video watermarking robust to collusion and transcoding attacks for emerging applications. Multimedia Tools Appl 77:14361\u201314379","journal-title":"Multimedia Tools Appl"},{"key":"20127_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.110066","volume":"259","author":"Q Liu","year":"2023","unstructured":"Liu Q, Yang S, Liu J, Zhao L, Xiong P, Shen J (2023) An efficient video watermark method using blockchain. Knowledge-Based Systems 259:110066","journal-title":"Knowledge-Based Systems"},{"key":"20127_CR17","doi-asserted-by":"publisher","first-page":"116593","DOI":"10.1016\/j.image.2021.116593","volume":"102","author":"L Velazquez-Garcia","year":"2022","unstructured":"Velazquez-Garcia L, Cedillo-Hernandez A (2022) Manuel Cedillo-Hernandez, Mariko Nakano-Miyatake, and H\u00e9ctor Perez-Meana. Imperceptible\u2013visible watermarking for copyright protection of digital videos based on temporal codes. Sig Process Image Commun 102:116593","journal-title":"Sig Process Image Commun"},{"issue":"5","key":"20127_CR18","doi-asserted-by":"publisher","first-page":"7509","DOI":"10.1007\/s11042-022-13609-1","volume":"82","author":"S Zhang","year":"2023","unstructured":"Zhang S, Li H, Li L, Lu J, Ching-Chun C (2023) A video watermarking algorithm based on time factor matrix. Multimedia Tools Appl 82(5):7509\u20137527","journal-title":"Multimedia Tools Appl"},{"issue":"13","key":"20127_CR19","doi-asserted-by":"publisher","first-page":"19557","DOI":"10.1007\/s11042-022-14299-5","volume":"82","author":"S Zhang","year":"2023","unstructured":"Zhang S, Guo X, Xu X, Li L (2023) A video watermark algorithm based on tensor feature map. Multimedia Tools Appl 82(13):19557\u201319575","journal-title":"Multimedia Tools Appl"},{"issue":"2","key":"20127_CR20","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1007\/s10462-020-09877-8","volume":"54","author":"P Ayubi","year":"2021","unstructured":"Ayubi P, Barani MJ, Valandar MY, Irani BY, Sadigh RS (2021) A new chaotic complex map for robust video watermarking. Artif Intell Rev 54(2):1237\u20131280","journal-title":"Artif Intell Rev"},{"issue":"11","key":"20127_CR21","doi-asserted-by":"publisher","first-page":"14511","DOI":"10.1007\/s11042-018-6723-9","volume":"78","author":"F Alenizi","year":"2019","unstructured":"Alenizi F, Kurdahi F, Eltawil AM, Al-Asmari AK (2019) Hybrid pyramid-DWT-SVD dual data hiding technique for videos ownership protection. Multimedia Tools Appl 78(11):14511\u201314547","journal-title":"Multimedia Tools Appl"},{"issue":"3","key":"20127_CR22","doi-asserted-by":"publisher","first-page":"2127","DOI":"10.1007\/s11042-019-08225-5","volume":"79","author":"MJ Barani","year":"2020","unstructured":"Barani MJ, Ayubi P, Valandar MY, Irani BY (2020) A blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform. Multimedia Tools Appl 79(3):2127\u20132159","journal-title":"Multimedia Tools Appl"},{"issue":"3","key":"20127_CR23","doi-asserted-by":"publisher","first-page":"1759","DOI":"10.1007\/s11042-019-08256-y","volume":"79","author":"L Tian","year":"2020","unstructured":"Tian L, Dai H, Li C (2020) A semi-fragile video watermarking algorithm based on chromatic residual DCT. Multimedia Tools Appl 79(3):1759\u20131779","journal-title":"Multimedia Tools Appl"},{"issue":"5","key":"20127_CR24","doi-asserted-by":"publisher","first-page":"2464","DOI":"10.1007\/s00034-020-01585-6","volume":"40","author":"C Priya","year":"2021","unstructured":"Priya C, Ramya C (2021) Robust and secure video watermarking based on cellular automata and singular value decomposition for copyright protection. Circuits Syst Signal Process 40(5):2464\u20132493","journal-title":"Circuits Syst Signal Process"},{"issue":"2","key":"20127_CR25","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1007\/s40747-021-00569-6","volume":"8","author":"R Singh","year":"2022","unstructured":"Singh R, Mittal H, Pal R (2022) Optimal keyframe selection-based lossless video-watermarking technique using IGSA in LWT domain for copyright protection. Complex Intell Syst 8(2):1047\u20131070","journal-title":"Complex Intell Syst"},{"issue":"4","key":"20127_CR26","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1007\/s11071-018-4295-x","volume":"93","author":"E Farri","year":"2018","unstructured":"Farri E, Ayubi P (2018) A blind and robust video watermarking based on IWT and new 3D generalized chaotic sine map. Nonlinear Dyn 93(4):1875\u20131897","journal-title":"Nonlinear Dyn"},{"key":"20127_CR27","first-page":"1","volume":"80","author":"YM Gao","year":"2020","unstructured":"Gao YM, Kang XB, Chen YJ (2020) A robust video zero-watermarking based on deep convolutional neural network and self-organizing map in polar complex exponential transform domain[J]. Multimed Tools Appl 80:1\u201312","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"20127_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3479428","volume":"55","author":"S Qi","year":"2021","unstructured":"Qi S, Zhang Y, Wang C, Zhou J, Cao X (2021) A survey of orthogonal moments for image representation: theory, implementation, and evaluation. ACM Comput Surv (CSUR) 55(1):1\u201335","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"4","key":"20127_CR29","doi-asserted-by":"publisher","first-page":"2533","DOI":"10.1016\/j.jfranklin.2020.01.025","volume":"357","author":"KM Hosny","year":"2020","unstructured":"Hosny KM, Darwish MM, Aboelenen T (2020) Novel fractional-order polar harmonic transforms for gray-scale and color image analysis. J Frankl Inst 357(4):2533\u20132560","journal-title":"J Frankl Inst"},{"key":"20127_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.patcog.2020.107324","volume":"103","author":"KM Hosny","year":"2020","unstructured":"Hosny KM, Darwish MM, Aboelenen T (2020) New fractional-order legendre-fourier moments for pattern recognition applications. Pattern Recogn 103:1\u201319","journal-title":"Pattern Recogn"},{"key":"20127_CR31","doi-asserted-by":"crossref","unstructured":"Hosny KM, Darwish MM, Aboelenen T (2020) Novel fractional-order generic Jacobi-Fourier moments for image analysis. Signal Process 172:107545","DOI":"10.1016\/j.sigpro.2020.107545"},{"key":"20127_CR32","doi-asserted-by":"publisher","first-page":"2488","DOI":"10.1109\/TIP.2022.3156380","volume":"31","author":"B Yang","year":"2022","unstructured":"Yang B, Shi X, Chen X (2022) Image analysis by fractional-order gaussian-hermite moments. IEEE Trans Image Process 31:2488\u20132502","journal-title":"IEEE Trans Image Process"},{"key":"20127_CR33","doi-asserted-by":"crossref","unstructured":"Duan CF, Zhou J, Gong LH, Wu JY, Zhou NR (2022) New color image encryption scheme based on multi-parameter fractional discrete Chebyshev moments and nonlinear fractal permutation method. Opt Laser Eng 150:106881","DOI":"10.1016\/j.optlaseng.2021.106881"},{"key":"20127_CR34","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1007\/s00371-021-02382-1","volume":"39","author":"KM Hosny","year":"2023","unstructured":"Hosny KM, Kamal ST, Darwish MM (2023) A novel color image encryption based on fractional shifted Gegenbauer moments and 2D logistic-sine map. Vis Comput 39:1027\u20131044","journal-title":"Vis Comput"},{"key":"20127_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2021.116410","volume":"98","author":"O El Ogri","year":"2021","unstructured":"El Ogri O, Karmouni H, Sayyouri M, Qjidaa H (2021) 3D image recognition using new set of fractional-order Legendre moments and deep neural networks. Signal Process Image Commun 98:116410","journal-title":"Signal Process Image Commun"},{"key":"20127_CR36","doi-asserted-by":"publisher","first-page":"5419","DOI":"10.1007\/s00521-020-05280-0","volume":"33","author":"KM Hosny","year":"2021","unstructured":"Hosny KM, Abd Elaziz M, Darwish MM (2021) Color face recognition using novel fractional-order multi-channel exponent moments. Neural Comput Appl 33:5419\u20135435","journal-title":"Neural Comput Appl"},{"key":"20127_CR37","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s10489-021-02476-2","volume":"52","author":"Z Xia","year":"2022","unstructured":"Xia Z, Wang X, Wang C et al (2022) A robust zero-watermarking algorithm for lossless copyright protection of medical images. Appl Intell 52:607\u2013621","journal-title":"Appl Intell"},{"key":"20127_CR38","doi-asserted-by":"publisher","first-page":"103007","DOI":"10.1016\/j.bspc.2021.103007","volume":"70","author":"KM Hosny","year":"2021","unstructured":"Hosny KM, Darwish MM (2021) New geometrically invariant multiple zero-watermarking algorithm for color medical images. Biomed Signal Process Control 70:103007","journal-title":"Biomed Signal Process Control"},{"key":"20127_CR39","doi-asserted-by":"publisher","first-page":"47425","DOI":"10.1109\/ACCESS.2021.3068211","volume":"9","author":"KM Hosny","year":"2021","unstructured":"Hosny KM, Darwish MM, Fouda MM (2021) Robust color images watermarking using new fractional-order exponent moments. IEEE Access 9:47425\u201347435","journal-title":"IEEE Access"},{"key":"20127_CR40","doi-asserted-by":"crossref","unstructured":"Daoui A, Yamni M, Karmouni H, Sayyouri M, Qjidaa H (2021) Biomedical signals reconstruction and zero-watermarking using separable fractional order Charlier\u2013Krawtchouk transformation and sine Cosine Algorithm. Sig Process 180:107854","DOI":"10.1016\/j.sigpro.2020.107854"},{"key":"20127_CR41","doi-asserted-by":"crossref","unstructured":"Yamni M, Karmouni H, Sayyouri M, Qjidaa H (2022) Robust audio watermarking scheme based on fractional Charlier moment transform and dual-tree complex wavelet transform. Expert Syst Appl 203 Article ID. 117325","DOI":"10.1016\/j.eswa.2022.117325"},{"key":"20127_CR42","doi-asserted-by":"publisher","unstructured":"Khalid M, Hosny MM, Darwish K, Li A (n.d.) Salah COVID-19 diagnosis from CT scans and chest X-ray images using low-cost raspberry pi. PLoS ONE 16(5):e0250688. https:\/\/doi.org\/10.1371\/journal.pone.0250688","DOI":"10.1371\/journal.pone.0250688"},{"issue":"12","key":"20127_CR43","doi-asserted-by":"publisher","first-page":"7342","DOI":"10.1109\/TCSVT.2023.3281618","volume":"33","author":"S Chen","year":"2023","unstructured":"Chen S, Malik A, Zhang X, Feng G, Wu H (2023) A fast method for robust video watermarking based on Zernike moments. IEEE Trans Circuits Syst Video Technol 33(12):7342\u20137353","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"20127_CR44","unstructured":"Hamilton WR Elements of Quaternions, Longmans, Green, and Company, 1866"},{"key":"20127_CR45","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/TIP.2006.884955","volume":"16","author":"TA Ell","year":"2007","unstructured":"Ell TA, Sangwine SJ (2007) Hypercomplex Fourier transforms of color images. IEEE Trans Image Process 16:22\u201335","journal-title":"IEEE Trans Image Process"},{"key":"20127_CR46","doi-asserted-by":"crossref","unstructured":"Hosny KM, Darwish MM (2022) Novel quaternion discrete shifted Gegenbauer moments of fractional-orders for color image analysis. Appl Math Comput 421:126926","DOI":"10.1016\/j.amc.2022.126926"},{"key":"20127_CR47","unstructured":"Faires JD, Burden RL (2002) Numerical Methods (third edn). Brooks Cole Publication"},{"issue":"6","key":"20127_CR48","doi-asserted-by":"publisher","first-page":"795","DOI":"10.1016\/j.patrec.2011.01.006","volume":"32","author":"KM Hosny","year":"2011","unstructured":"Hosny KM (2011) Image representation using accurate orthogonal gegenbauer moments. Pattern Recognit Lett 32(6):795\u2013804","journal-title":"Pattern Recognit Lett"},{"key":"20127_CR49","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci (Ny) 480:403\u2013419. https:\/\/doi.org\/10.1016\/j.ins.2018.12.048","journal-title":"Inf Sci (Ny)"},{"key":"20127_CR50","unstructured":"Video test media (2017) https:\/\/media.xiph.org\/video\/derf\/. Accessed 10 Apr 2023"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20127-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-20127-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20127-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T22:33:43Z","timestamp":1757111623000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-20127-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,21]]},"references-count":50,"journal-issue":{"issue":"24","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["20127"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-20127-9","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,21]]},"assertion":[{"value":"18 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interests\/Competing interests"}}]}}