{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:28:46Z","timestamp":1773844126596,"version":"3.50.1"},"reference-count":315,"publisher":"Springer Science and Business Media LLC","issue":"34","license":[{"start":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T00:00:00Z","timestamp":1745452800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T00:00:00Z","timestamp":1745452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-025-20850-x","type":"journal-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T06:36:21Z","timestamp":1745476581000},"page":"43013-43075","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Exploring information hiding in images \u2013 problems and measures: a survey"],"prefix":"10.1007","volume":"84","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0269-2349","authenticated-orcid":false,"given":"Ahmed","family":"Khan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aaliya","family":"Sarfaraz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,4,24]]},"reference":[{"issue":"7","key":"20850_CR1","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"FA Petitcolas","year":"1999","unstructured":"Petitcolas FA, Anderson RJ, Kuhn MG (1999) Information hiding-a survey. Proc IEEE 87(7):1062\u20131078","journal-title":"Proc IEEE"},{"issue":"3","key":"20850_CR2","first-page":"273","volume":"50","author":"C Shen","year":"2007","unstructured":"Shen C et al (2007) Survey of information security. Sci China Ser F: Inf Sci 50(3):273\u2013298","journal-title":"Sci China Ser F: Inf Sci"},{"key":"20850_CR3","doi-asserted-by":"crossref","unstructured":"Barthe G, Fournet C (2008) Trustworthy Global Computing: Third Symposium, TGC 2007, Sophia-Antipolis, France, Nov 5\u20136, 2007, Revised Selected Papers. Vol. 4912. Springer","DOI":"10.1007\/978-3-540-78663-4"},{"issue":"3","key":"20850_CR4","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A et al (2010) Digital image steganography: survey and analysis of current methods. Sign Process 90(3):727\u2013752","journal-title":"Sign Process"},{"issue":"1","key":"20850_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1687-6180-2014-1","volume":"2014","author":"H Nyeem","year":"2014","unstructured":"Nyeem H, Boles W, Boyd C (2014) Digital image watermarking: its formal model, fundamental properties and possible attacks. EURASIP J Adv Sign Process 2014(1):1\u201322","journal-title":"EURASIP J Adv Sign Process"},{"key":"20850_CR6","doi-asserted-by":"crossref","unstructured":"Khan JS et al (2015) A new chaos-based secure image encryption scheme using multiple substitution boxes. In: 2015 Conference on Information Assurance and Cyber Security (CIACS). IEEE","DOI":"10.1109\/CIACS.2015.7395561"},{"issue":"1","key":"20850_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13319-016-0084-9","volume":"7","author":"AU Rehman","year":"2016","unstructured":"Rehman AU et al (2016) A new image encryption scheme based on dynamic S-boxes and chaotic maps. 3D Res 7(1):1\u20138","journal-title":"3D Res"},{"issue":"9","key":"20850_CR8","doi-asserted-by":"publisher","first-page":"1905","DOI":"10.1109\/TIFS.2015.2434600","volume":"10","author":"B Li","year":"2015","unstructured":"Li B et al (2015) A strategy of clustering modification directions in spatial image steganography. IEEE Trans Inf Forensics Secur 10(9):1905\u20131917","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"20850_CR9","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1109\/TIFS.2014.2368364","volume":"10","author":"B Feng","year":"2015","unstructured":"Feng B, Lu W, Sun W (2015) Secure binary image steganography based on minimizing the distortion on the texture. IEEE Trans Inf Forensics Secur 10(2):243\u2013255","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9","key":"20850_CR10","doi-asserted-by":"publisher","first-page":"1610","DOI":"10.1109\/TCSVT.2015.2473235","volume":"26","author":"F Huang","year":"2016","unstructured":"Huang F et al (2016) Reversible Data Hiding in JPEG Images. IEEE Trans Circ Syst Video Technol 26(9):1610\u20131621","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"20850_CR11","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.procs.2016.03.042","volume":"79","author":"S Sabnis","year":"2016","unstructured":"Sabnis S, Awale R (2016) Statistical steganalysis of high capacity image steganography with cryptography. Procedia Comput Sci 79:321\u2013327","journal-title":"Procedia Comput Sci"},{"issue":"7","key":"20850_CR12","first-page":"83","volume":"10","author":"H Huang","year":"2016","unstructured":"Huang H, Zhou Z (2016) An image steganography algorithm based on the quantitative features of higher order local model. Int J Secur Appl 10(7):83\u201391","journal-title":"Int J Secur Appl"},{"issue":"14","key":"20850_CR13","doi-asserted-by":"publisher","first-page":"2371","DOI":"10.1002\/sec.1504","volume":"9","author":"M Li","year":"2016","unstructured":"Li M et al (2016) A recoverable chaos-based fragile watermarking with high PSNR preservation. Secur Commun Netw 9(14):2371\u20132386","journal-title":"Secur Commun Netw"},{"key":"20850_CR14","first-page":"1","volume":"76","author":"SH Soleymani","year":"2016","unstructured":"Soleymani SH, Taherinia AH (2016) Double expanding robust image watermarking based on Spread Spectrum technique and BCH coding. Multimed Tools Appl 76:1\u201319","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"20850_CR15","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/CC.2016.7559077","volume":"13","author":"X Chen","year":"2016","unstructured":"Chen X et al (2016) Steganalysis of LSB matching using characteristic function moment of pixel differences. China Commun 13(7):66\u201373","journal-title":"China Commun"},{"key":"20850_CR16","doi-asserted-by":"crossref","unstructured":"Thanh TM, Tanaka K (2017) An image zero-watermarking algorithm based on the encryption of visual map feature with watermark information. Multimed Tools Appl\u00a076:13455\u201313471","DOI":"10.1007\/s11042-016-3750-2"},{"key":"20850_CR17","doi-asserted-by":"publisher","first-page":"4261","DOI":"10.1007\/s11227-016-1848-y","volume":"74","author":"SR Kim","year":"2018","unstructured":"Kim SR, Kim JN, Kim ST, Shin S, Yi JH (2018) Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications. J\u00a0Supercomput 74:4261\u20134280","journal-title":"J\u00a0Supercomput"},{"issue":"10","key":"20850_CR18","doi-asserted-by":"publisher","first-page":"1374","DOI":"10.1016\/j.aeue.2016.07.011","volume":"70","author":"H-T Hu","year":"2016","unstructured":"Hu H-T, Chang J-R, Hsu L-Y (2016) Robust blind image watermarking by modulating the mean of partly sign-altered DCT coefficients guided by human visual perception. AEU-Int J Electron Commun 70(10):1374\u20131381","journal-title":"AEU-Int J Electron Commun"},{"key":"20850_CR19","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.compbiomed.2015.10.011","volume":"67","author":"R Karak\u0131\u015f","year":"2015","unstructured":"Karak\u0131\u015f R et al (2015) A novel fuzzy logic-based image steganography method to ensure medical data security. Comput Biol Med 67:172\u2013183","journal-title":"Comput Biol Med"},{"issue":"1","key":"20850_CR20","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.compeleceng.2016.02.010","volume":"55","author":"B Ramalingam","year":"2016","unstructured":"Ramalingam B, Amirtharajan R, Rayappan JBB (2016) Multiplexed stego path on reconfigurable hardware: a novel random approach. Comput Electr Eng 55(1):153\u2013163","journal-title":"Comput Electr Eng"},{"issue":"X","key":"20850_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compeleceng.2016.09.001","volume":"70","author":"SA El-Rahman","year":"2016","unstructured":"El-Rahman SA (2016) A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information. Comput Electr Eng 70(X):1\u201320. https:\/\/doi.org\/10.1016\/j.compeleceng.2016.09.001","journal-title":"Comput Electr Eng"},{"key":"20850_CR22","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1016\/j.ins.2016.07.015","volume":"367","author":"FY Shih","year":"2016","unstructured":"Shih FY, Zhong X (2016) High-capacity multiple regions of interest watermarking for medical images. Inf Sci 367:648\u2013659","journal-title":"Inf Sci"},{"key":"20850_CR23","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1016\/j.ins.2016.08.076","volume":"372","author":"X-Y Wang","year":"2016","unstructured":"Wang X-Y et al (2016) Blind optimum detector for robust image watermarking in nonsubsampled shearlet Domain. Inf Sci 372:634\u2013654","journal-title":"Inf Sci"},{"issue":"1","key":"20850_CR24","first-page":"1","volume":"11","author":"B Debnath","year":"2016","unstructured":"Debnath B, Das JC, De D (2016) Reversible logic-based image steganography using quantum dot cellular automata for secure nanocommunication. IET Circ Devices Syst 11(1):1\u201310","journal-title":"IET Circ Devices Syst"},{"issue":"4","key":"20850_CR25","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1080\/13682199.2016.1159816","volume":"64","author":"E Mansoori","year":"2016","unstructured":"Mansoori E, Soltani S (2016) A new semi-blind watermarking algorithm using ordered Hadamard transform. Imaging Sci J 64(4):204\u2013214","journal-title":"Imaging Sci J"},{"issue":"4","key":"20850_CR26","first-page":"1","volume":"25","author":"M TalebyAhvanooey","year":"2016","unstructured":"TalebyAhvanooey M, Mazraeh HD, Tabasi SH (2016) An innovative technique for web text watermarking (AITW). Inf Secur J: Glob Perspect 25(4):1\u20136","journal-title":"Inf Secur J: Glob Perspect"},{"key":"20850_CR27","doi-asserted-by":"crossref","unstructured":"Conci A et al (2015) AES cryptography in color image steganography by genetic algorithms. In: 2015 IEEE\/ACS 12th International Conference of Computer Systems and Applications (AICCSA). IEEE","DOI":"10.1109\/AICCSA.2015.7507100"},{"key":"20850_CR28","doi-asserted-by":"crossref","unstructured":"Cao J et al (2016) An improved spread transform dither modulation for robust and secure watermarking. In: 2016 IEEE International Conference on Image Processing (ICIP). IEEE","DOI":"10.1109\/ICIP.2016.7532853"},{"key":"20850_CR29","doi-asserted-by":"crossref","unstructured":"Cao J et al (2016) A secure watermarking technique without loss of robustness. In: IEEE International Conference on Image Processing","DOI":"10.1109\/ICIP.2016.7532854"},{"key":"20850_CR30","doi-asserted-by":"crossref","unstructured":"Narawade NS (2015) Robust reversible watermarking using integration of histogram shifting and patchwork algorithm to improve quality and capacity. In: 2015 International Conference on Information Processing (ICIP). IEEE","DOI":"10.1109\/INFOP.2015.7489459"},{"key":"20850_CR31","unstructured":"Shen Q et al (2015) Adaptive image steganography based on pixel selection. In: 2015 IEEE International Conference on Progress in Informatics and Computing (PIC). IEEE"},{"issue":"11","key":"20850_CR32","doi-asserted-by":"publisher","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia Z et al (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594\u20132608","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"20850_CR33","doi-asserted-by":"publisher","first-page":"1361","DOI":"10.1109\/TLA.2016.7459621","volume":"14","author":"AS Brandao","year":"2016","unstructured":"Brandao AS, Jorge DC (2016) Artificial Neural Networks Applied to Image Steganography. IEEE Lat Am Trans 14(3):1361\u20131366","journal-title":"IEEE Lat Am Trans"},{"issue":"4","key":"20850_CR34","first-page":"48","volume":"12","author":"S Rana","year":"2016","unstructured":"Rana S, Sur A (2016) Depth-Based View-Invariant Blind 3D Image Watermarking. ACM Trans Multimed Comput Commun Appl (TOMM) 12(4):48","journal-title":"ACM Trans Multimed Comput Commun Appl (TOMM)"},{"issue":"1","key":"20850_CR35","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1186\/s13173-016-0046-3","volume":"22","author":"PG Freitas","year":"2016","unstructured":"Freitas PG, Rigoni R, Farias MC (2016) Secure self-recovery watermarking scheme for error concealment and tampering detection. J Braz Comput Soc 22(1):5","journal-title":"J Braz Comput Soc"},{"issue":"3","key":"20850_CR36","first-page":"499","volume":"79","author":"E Ujianto","year":"2015","unstructured":"Ujianto E et al (2015) Cascaded image steganography to increase robustness againts attack of the stego image. J Theor Appl Inf Technol 79(3):499","journal-title":"J Theor Appl Inf Technol"},{"key":"20850_CR37","unstructured":"Hemalatha S, Acharya UD, Renuka A (2013) Comparison of secure and high capacity color image steganography techniques in RGB and YCbCr domains. arXiv preprint arXiv:1307.3026"},{"key":"20850_CR38","doi-asserted-by":"crossref","unstructured":"Chupeau B et al (2016) Impact of screencasting on video temporal synchronization. In: IEEE International Conference on Image Processing (ICIP). IEEE","DOI":"10.1109\/ICIP.2016.7533093"},{"issue":"11","key":"20850_CR39","doi-asserted-by":"publisher","first-page":"5158","DOI":"10.1109\/TIP.2016.2599785","volume":"25","author":"D Bhowmik","year":"2016","unstructured":"Bhowmik D, Abhayaratne C (2016) Quality scalability aware watermarking for visual content. IEEE Trans Image Process 25(11):5158\u20135172","journal-title":"IEEE Trans Image Process"},{"key":"20850_CR40","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1016\/j.procs.2016.07.234","volume":"93","author":"M Haribabu","year":"2016","unstructured":"Haribabu M, Bindu CH, Swamy KV (2016) A secure & invisible image watermarking scheme based on wavelet transform in HSI color space. Procedia Comput Sci 93:462\u2013468","journal-title":"Procedia Comput Sci"},{"key":"20850_CR41","doi-asserted-by":"crossref","unstructured":"Aljamea MM, Iliopoulos CS, Samiruzzaman M (2016) Detection of URL in image steganography. In Proceedings of the International Conference on Internet of things and Cloud Computing. ACM","DOI":"10.1145\/2896387.2896408"},{"key":"20850_CR42","unstructured":"Luo W et al. Improved audio steganalytic feature and its applications in audio forensics"},{"key":"20850_CR43","doi-asserted-by":"crossref","unstructured":"Banik BG, Bandyopadhyay SK (2015) Implementation of image steganography algorithm using scrambled image and quantization coefficient modification in DCT. In: 2015 IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN). IEEE","DOI":"10.1109\/ICRCICN.2015.7434272"},{"key":"20850_CR44","doi-asserted-by":"crossref","unstructured":"Chen L. Zhao J (2016) Adaptive contourlet-based image watermarking robust to geometric transformations and image compression. In: 2016 IEEE International Instrumentation and Measurement Technology Conference Proceedings (I2MTC). IEEE","DOI":"10.1109\/I2MTC.2016.7520503"},{"issue":"1","key":"20850_CR45","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.measurement.2016.05.079","volume":"92","author":"C Cui","year":"2016","unstructured":"Cui C, Niu X-M (2016) A robust DIBR 3D image watermarking algorithm based on histogram shape. Measurement 92(1):130\u2013143","journal-title":"Measurement"},{"issue":"7","key":"20850_CR46","first-page":"1","volume":"69","author":"BP Stoyanov","year":"2016","unstructured":"Stoyanov BP, Zhelezov SK, Kordov KM (2016) least significant bit image steganography algorithm based on chaotic rotation equations. Compt Rendus Acad Bulg Sci 69(7):1\u20137","journal-title":"Compt Rendus Acad Bulg Sci"},{"issue":"1","key":"20850_CR47","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1016\/j.procs.2016.06.046","volume":"89","author":"SS Gonge","year":"2016","unstructured":"Gonge SS, Ghatol A (2016) Aggregation of discrete cosine transform digital image watermarking with advanced encryption standard technique. Procedia Comput Sci 89(1):732\u2013742","journal-title":"Procedia Comput Sci"},{"issue":"10","key":"20850_CR48","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1049\/iet-ipr.2015.0818","volume":"10","author":"Y Guo","year":"2016","unstructured":"Guo Y, Li B-Z (2016) Blind image watermarking method based on linear canonical wavelet transform and QR decomposition. IET Image Proc 10(10):773\u2013786","journal-title":"IET Image Proc"},{"issue":"1","key":"20850_CR49","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1016\/j.pisc.2016.04.093","volume":"8","author":"M Jain","year":"2016","unstructured":"Jain M, Lenka SK, Vasistha SK (2016) Adaptive circular queue image steganography with RSA cryptosystem. Perspect Sci 8(1):417\u2013420","journal-title":"Perspect Sci"},{"key":"20850_CR50","doi-asserted-by":"publisher","unstructured":"Li X-J, Feng Y-Q, Lyu W-L (2016) A high-capacity image data hiding based on extended EMD-2 reference matrix. In: Chinese Conference on Image and Graphics Technologies. Springer. https:\/\/doi.org\/10.1007\/978-981-10-2260-9_7","DOI":"10.1007\/978-981-10-2260-9_7"},{"issue":"1","key":"20850_CR51","first-page":"41","volume":"45","author":"H Liu","year":"2016","unstructured":"Liu H et al (2016) Robust and hierarchical watermarking of encrypted images based on compressive sensing. Signal Process: Image Commun 45(1):41\u201351","journal-title":"Signal Process: Image Commun"},{"issue":"258","key":"20850_CR52","first-page":"1","volume":"75","author":"K Muhammad","year":"2016","unstructured":"Muhammad K et al (2016) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimed Tools Appl 75(258):1\u201330","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"20850_CR53","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1016\/j.aeue.2016.05.003","volume":"70","author":"T-S Nguyen","year":"2016","unstructured":"Nguyen T-S, Chang C-C, Yang X-Q (2016) A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. AEU-Int J Electron Commun 70(8):1055\u20131061","journal-title":"AEU-Int J Electron Commun"},{"issue":"1","key":"20850_CR54","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1016\/j.jvcir.2016.07.001","volume":"40","author":"M Rabizadeh","year":"2016","unstructured":"Rabizadeh M, Amirmazlaghani M, Ahmadian-Attari M (2016) A new detector for contourlet domain multiplicative image watermarking using Bessel K form distribution. J Vis Commun Image Represent 40(1):324\u2013334","journal-title":"J Vis Commun Image Represent"},{"issue":"1","key":"20850_CR55","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1016\/j.jvcir.2016.05.001","volume":"38","author":"P Rasti","year":"2016","unstructured":"Rasti P et al (2016) Robust non-blind color video watermarking using QR decomposition and entropy analysis. J Vis Commun Image Represent 38(1):838\u2013847","journal-title":"J Vis Commun Image Represent"},{"issue":"8","key":"20850_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2352\/ISSN.2470-1173.2016.8.MWSF-069","volume":"28","author":"K Kato","year":"2016","unstructured":"Kato K, Kuraki K, Tanaka R (2016) Improvement of trade-off between compression tolerance and perceptibility of video watermark for broadcasting. Electron Imaging 28(8):1\u20139","journal-title":"Electron Imaging"},{"issue":"6","key":"20850_CR57","first-page":"1","volume":"76","author":"A Sharif","year":"2016","unstructured":"Sharif A, Mollaeefar M, Nazari M (2016) A novel method for digital image steganography based on a new three-dimensional chaotic map. Multimed Tools Appl 76(6):1\u201319","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"20850_CR58","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1016\/j.jvcir.2016.04.023","volume":"38","author":"D Singh","year":"2016","unstructured":"Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent 38(1):775\u2013789","journal-title":"J Vis Commun Image Represent"},{"issue":"1","key":"20850_CR59","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.compeleceng.2016.04.017","volume":"54","author":"MS Subhedar","year":"2016","unstructured":"Subhedar MS, Mankar VH (2016) Image steganography using redundant discrete wavelet transform and QR factorization. Comput Electr Eng 54(1):406\u2013422","journal-title":"Comput Electr Eng"},{"issue":"2","key":"20850_CR60","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.ipl.2015.09.016","volume":"116","author":"S Sun","year":"2016","unstructured":"Sun S (2016) A novel edge based image steganography with 2 k correction and Huffman encoding. Inf Process Lett 116(2):93\u201399","journal-title":"Inf Process Lett"},{"issue":"1","key":"20850_CR61","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/j.ijleo.2015.09.216","volume":"127","author":"M Tang","year":"2016","unstructured":"Tang M et al (2016) An adaptive image steganography using AMBTC compression and interpolation technique. Optik-Int J Light Electron Optics 127(1):471\u2013477","journal-title":"Optik-Int J Light Electron Optics"},{"key":"20850_CR62","doi-asserted-by":"crossref","unstructured":"Ur-Rehman O, Zivic N, Ruland C (2016) Content based image authentication with error correction. In: 2016 IEEE International Conference on Communications (ICC). IEEE","DOI":"10.1109\/ICC.2016.7511095"},{"key":"20850_CR63","doi-asserted-by":"crossref","unstructured":"Wang F, Allebach JP (2016) Printed image watermarking using direct binary search halftoning. In: 2016 IEEE International Conference on Image Processing (ICIP). IEEE","DOI":"10.1109\/ICIP.2016.7532855"},{"issue":"1","key":"20850_CR64","doi-asserted-by":"publisher","first-page":"678","DOI":"10.1016\/j.jvcir.2016.04.011","volume":"38","author":"X-Y Wang","year":"2016","unstructured":"Wang X-Y et al (2016) Local quaternion PHT based robust color image watermarking algorithm. J Vis Commun Image Represent 38(1):678\u2013694","journal-title":"J Vis Commun Image Represent"},{"key":"20850_CR65","doi-asserted-by":"crossref","unstructured":"Wei W, Wen Y (2016) A novel image steganography using wavelet contrast and modulus operation. In International Conference on Intelligent Computing. Springer","DOI":"10.1007\/978-3-319-42294-7_37"},{"key":"20850_CR66","volume-title":"Digital image processing and computer vision","author":"RJ Schalkoff","year":"1989","unstructured":"Schalkoff RJ (1989) Digital image processing and computer vision, vol 286. Wiley, New York"},{"key":"20850_CR67","doi-asserted-by":"crossref","unstructured":"Jassim FA (2013) A novel steganography algorithm to hide a grayscale BMP image in two grayscale BMP images for dual secrecy. In 2013 2nd National Conference on Information Assurance (NCIA). IEEE","DOI":"10.1109\/NCIA.2013.6725327"},{"key":"20850_CR68","doi-asserted-by":"crossref","unstructured":"Anees A, Siddiqui AM (2013) A technique for digital watermarking in combined spatial and transform domains using chaotic maps. In 2013 2nd National Conference on Information Assurance (NCIA). IEEE","DOI":"10.1109\/NCIA.2013.6725335"},{"issue":"11","key":"20850_CR69","doi-asserted-by":"publisher","first-page":"1254","DOI":"10.1109\/34.730558","volume":"20","author":"L Itti","year":"1998","unstructured":"Itti L, Koch C, Niebur E (1998) A model of saliency-based visual attention for rapid scene analysis. IEEE Trans Pattern Anal Mach Intell 20(11):1254\u20131259","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"20850_CR70","unstructured":"Borji A, Cheng M-M, Jiang H, Li J (2014) Salient object detection: a survey. arXiv preprint arXiv:1411.5878"},{"issue":"1","key":"20850_CR71","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TPAMI.2012.89","volume":"35","author":"A Borji","year":"2013","unstructured":"Borji A, Itti L (2013) State-of-the-art in visual attention modeling. IEEE Trans Pattern Anal Mach Intell 35(1):185\u2013207","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"5","key":"20850_CR72","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1109\/TITS.2016.2597441","volume":"18","author":"Z Zhong","year":"2017","unstructured":"Zhong Z, Zhang B, Lu G, Zhao Y, Xu Y (2017) An adaptive background modeling method for foreground segmentation. IEEE Trans Intell Transp Syst 18(5):1109\u20131121","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"1","key":"20850_CR73","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1049\/el.2016.2156","volume":"53","author":"D Sidib\u00e9","year":"2016","unstructured":"Sidib\u00e9 D, M\u00e9riaudeau F (2016) Visual saliency detection in colour images based on density estimation. Electron Lett 53(1):24\u201325","journal-title":"Electron Lett"},{"issue":"10","key":"20850_CR74","doi-asserted-by":"publisher","first-page":"2093","DOI":"10.1109\/TMM.2016.2595262","volume":"18","author":"H Lee","year":"2016","unstructured":"Lee H, Kim H, Kim J-I (2016) Background subtraction using background sets with image-and color-space reduction. IEEE Trans Multimedia 18(10):2093\u20132103","journal-title":"IEEE Trans Multimedia"},{"issue":"1","key":"20850_CR75","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/TSMC.2016.2564922","volume":"47","author":"Q Peng","year":"2017","unstructured":"Peng Q, Cheung Y-M, You X, Tang YY (2017) A hybrid of local and global saliencies for detecting image salient region and appearance. IEEE Trans Syst Man Cybern: Syst 47(1):86\u201397","journal-title":"IEEE Trans Syst Man Cybern: Syst"},{"issue":"6","key":"20850_CR76","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1109\/LSP.2016.2558489","volume":"23","author":"L Ye","year":"2016","unstructured":"Ye L, Liu Z, Zhou X, Shen L, Zhang J (2016) Saliency detection via similar image retrieval. IEEE Signal Process Lett 23(6):838\u2013842","journal-title":"IEEE Signal Process Lett"},{"issue":"4","key":"20850_CR77","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1109\/TMM.2016.2522639","volume":"18","author":"Y Dong","year":"2016","unstructured":"Dong Y, Pourazad MT, Nasiopoulos P (2016) Human visual system-based saliency detection for high dynamic range content. IEEE Trans Multimedia 18(4):549\u2013562","journal-title":"IEEE Trans Multimedia"},{"issue":"10","key":"20850_CR78","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1049\/iet-ipr.2015.0559","volume":"10","author":"H-C Hsin","year":"2016","unstructured":"Hsin H-C (2016) Saliency histogram equalisation and its application to image resizing. IET Image Proc 10(10):787\u2013798","journal-title":"IET Image Proc"},{"issue":"12","key":"20850_CR79","doi-asserted-by":"publisher","first-page":"7431","DOI":"10.1109\/TGRS.2016.2603998","volume":"54","author":"M Conoscenti","year":"2016","unstructured":"Conoscenti M, Coppola R, Magli E (2016) Constant SNR, rate control, and entropy coding for predictive lossy hyperspectral image compression. IEEE Trans Geosci Remote Sens 54(12):7431\u20137441","journal-title":"IEEE Trans Geosci Remote Sens"},{"issue":"1","key":"20850_CR80","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1109\/TIP.2015.2484069","volume":"25","author":"F Auli-Llinas","year":"2016","unstructured":"Auli-Llinas F, Enfedaque P, Moure JC, Sanchez V (2016) Bitplane image coding with parallel coefficient processing. IEEE Trans Image Process 25(1):209\u2013219","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"20850_CR81","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2352\/ISSN.2470-1173.2016.2.VIPC-233","volume":"2016","author":"WA Pearlman","year":"2016","unstructured":"Pearlman WA, Hu Y (2016) A doubly error resilient coder of image sequences. Electron Imaging 2016(2):1\u20136","journal-title":"Electron Imaging"},{"issue":"2","key":"20850_CR82","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1109\/TIP.2014.2383320","volume":"24","author":"A Borji","year":"2015","unstructured":"Borji A (2015) What is a salient object? A dataset and a baseline model for salient object detection. IEEE Trans Image Process 24(2):742\u2013756","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"20850_CR83","doi-asserted-by":"publisher","first-page":"818","DOI":"10.1109\/TPAMI.2016.2562626","volume":"39","author":"H Peng","year":"2017","unstructured":"Peng H, Li B, Ling H, Hu W, Xiong W, Maybank SJ (2017) Salient object detection via structured matrix decomposition. IEEE Trans Pattern Anal Mach Intell 39(4):818\u2013832","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"20850_CR84","doi-asserted-by":"crossref","unstructured":"Zhang Y, Yang C, Zhang Q, Cosman P (2014) Primal sketch based adaptive perceptual JND model for digital watermarking. In 2014 48th Annual Conference on Information Sciences and Systems (CISS): IEEE, pp. 1\u20136","DOI":"10.1109\/CISS.2014.6814192"},{"issue":"4\u20135","key":"20850_CR85","first-page":"521","volume":"7","author":"SU Maheswari","year":"2015","unstructured":"Maheswari SU, Hemanth DJ (2015) Different methodology for image steganography-based data hiding. Int J Inf Commun Technol 7(4\u20135):521\u2013536","journal-title":"Int J Inf Commun Technol"},{"key":"20850_CR86","unstructured":"Mardanpour M, Chahooki MAZ (2016) Robust hybrid image watermarking based on discrete wavelet and shearlet transforms. arXiv preprint arXiv:1603.09396"},{"key":"20850_CR87","first-page":"56","volume":"54","author":"L Chen","year":"2017","unstructured":"Chen L, Zhao J (2017) Robust contourlet-based blind watermarking for depth-image-based rendering 3D images. Signal Proc: Image Commun 54:56\u201365","journal-title":"Signal Proc: Image Commun"},{"key":"20850_CR88","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.optlaseng.2017.01.013","volume":"93","author":"X-W Li","year":"2017","unstructured":"Li X-W, Liu Y, Kim S-T, Wang Q-H (2017) Designing a genetic watermarking approach for 3D scenes. Opt Lasers Eng 93:83\u201391","journal-title":"Opt Lasers Eng"},{"key":"20850_CR89","doi-asserted-by":"crossref","unstructured":"Abraham J, Paul V (2019) An imperceptible spatial domain color image watermarking scheme. J King Saud Univ-Comput Inf Sci\u00a031(1):125\u2013133","DOI":"10.1016\/j.jksuci.2016.12.004"},{"key":"20850_CR90","doi-asserted-by":"crossref","unstructured":"Basu A, Roy SS, Chattopadhyay A (2016) Implementation of a spatial domain salient region based digital image watermarking scheme. In Second International Conference on Research in Computational Intelligence and Communication Networks: IEEE, pp. 269\u2013270.","DOI":"10.1109\/ICRCICN.2016.7813669"},{"issue":"4\u20136","key":"20850_CR91","first-page":"118","volume":"24","author":"MR Nayak","year":"2015","unstructured":"Nayak MR, Tudu B, Basu A, Sarkar SK (2015) On the implementation of a secured digital watermarking framework. Inf Secur J: Global Perspect 24(4\u20136):118\u2013126","journal-title":"Inf Secur J: Global Perspect"},{"issue":"1","key":"20850_CR92","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1049\/iet-ipr.2014.0965","volume":"10","author":"NM Makbol","year":"2016","unstructured":"Makbol NM, Khoo BE, Rassem TH (2016) Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Proc 10(1):34\u201352","journal-title":"IET Image Proc"},{"key":"20850_CR93","doi-asserted-by":"crossref","unstructured":"Basu A, Talukdar S, Sengupta N, Kar A, Chakraborty SL, Sarkar SK (2015) On the implementation of a saliency based digital watermarking. In Information Systems Design and Intelligent Applications: Springer, pp. 447\u2013455","DOI":"10.1007\/978-81-322-2250-7_44"},{"issue":"24","key":"20850_CR94","doi-asserted-by":"publisher","first-page":"11828","DOI":"10.1016\/j.ijleo.2016.09.098","volume":"127","author":"M Sung","year":"2016","unstructured":"Sung M, Li X, Lee I-K (2016) Visual perception based robust watermarking with integral imaging. Optik-Int J Light Electron Optics 127(24):11828\u201311839","journal-title":"Optik-Int J Light Electron Optics"},{"issue":"10","key":"20850_CR95","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1049\/el.2014.4329","volume":"51","author":"W Wan","year":"2015","unstructured":"Wan W, Liu J, Sun J, Ge C, Nie X (2015) Logarithmic STDM watermarking using visual saliency-based JND model. Electron Lett 51(10):758\u2013760","journal-title":"Electron Lett"},{"key":"20850_CR96","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/197215","author":"M Yao","year":"2015","unstructured":"Yao M, Qi M, Yi Y, Shi Y, Kong J (2015) An improved information hiding method based on sparse representation. Math Probl Eng. https:\/\/doi.org\/10.1155\/2015\/197215","journal-title":"Math Probl Eng"},{"key":"20850_CR97","doi-asserted-by":"crossref","unstructured":"Oakes M, Bhowmik D, Abhayaratne C (2011) Visual attention-based watermarking. In 2011 IEEE International Symposium on Circuits and Systems (ISCAS): IEEE, pp. 2653\u20132656","DOI":"10.1109\/ISCAS.2011.5938150"},{"key":"20850_CR98","doi-asserted-by":"publisher","first-page":"8002","DOI":"10.1109\/ACCESS.2016.2627241","volume":"4","author":"D Bhowmik","year":"2016","unstructured":"Bhowmik D, Oakes M, Abhayaratne C (2016) Visual attention-based image watermarking. IEEE Access 4:8002\u20138018","journal-title":"IEEE Access"},{"key":"20850_CR99","doi-asserted-by":"publisher","first-page":"10180","DOI":"10.1109\/ACCESS.2016.2623905","volume":"4","author":"MA Abdullah","year":"2016","unstructured":"Abdullah MA, Dlay SS, Woo WL, Chambers JA (2016) A framework for iris biometrics protection: a marriage between watermarking and visual cryptography. IEEE Access 4:10180\u201310193","journal-title":"IEEE Access"},{"issue":"1","key":"20850_CR100","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1186\/s40064-016-1818-0","volume":"5","author":"Z Cao","year":"2016","unstructured":"Cao Z, Yin Z, Hu H, Gao X, Wang L (2016) High capacity data hiding scheme based on (7, 4) Hamming code. Springerplus 5(1):175","journal-title":"Springerplus"},{"issue":"7","key":"20850_CR101","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/CC.2016.7559084","volume":"13","author":"Y Yu","year":"2016","unstructured":"Yu Y, Lei M, Liu X, Qu Z, Wang C (2016) Novel zero-watermarking scheme based on DWT-DCT. China Commun 13(7):122\u2013126","journal-title":"China Commun"},{"key":"20850_CR102","doi-asserted-by":"crossref","unstructured":"Siddiqui A, Kaur A (2017) A secure and robust image watermarking system using wavelet domain. In 2017 7th International Conference on Cloud Computing, Data Science & Engineering-Confluence: IEEE, pp. 599\u2013604","DOI":"10.1109\/CONFLUENCE.2017.7943222"},{"key":"20850_CR103","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2016.0515","author":"Y Guo","year":"2017","unstructured":"Guo Y, Li B-Z, Goel N (2017) Optimised blind image watermarking method based on firefly algorithm in DWT-QR transform domain. IET Image Process. https:\/\/doi.org\/10.1049\/iet-ipr.2016.0515","journal-title":"IET Image Process"},{"issue":"3","key":"20850_CR104","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MCE.2017.2684980","volume":"6","author":"SP Mohanty","year":"2017","unstructured":"Mohanty SP, Sengupta A, Guturu P, Kougianos E (2017) Everything you want to know about watermarking: from paper marks to hardware protection: from paper marks to hardware protection. IEEE Consum Electron Mag 6(3):83\u201391","journal-title":"IEEE Consum Electron Mag"},{"key":"20850_CR105","doi-asserted-by":"crossref","unstructured":"Koley S, Mandal KK (2016) A novel approach of secret message passing through text steganography. In International Conference on \u201cSignal Processing, Communication, Power and Embedded System (SCOPES-2016)\u201d, Issue\u2013III, pp. 978\u20131","DOI":"10.1109\/SCOPES.2016.7955624"},{"key":"20850_CR106","doi-asserted-by":"crossref","unstructured":"Abodena O, Agoyi M, Celebi E (2017) Hybrid technique for robust image watermarking using discrete time fourier transform. In, 2017 25th Signal Processing and Communications Applications Conference (SIU), IEEE, pp. 1\u20134","DOI":"10.1109\/SIU.2017.7960254"},{"key":"20850_CR107","doi-asserted-by":"crossref","unstructured":"Rasti P, Anbarjafari G, Demirel H (2017) Colour image watermarking based on wavelet and QR decomposition. In 2017 25th Signal Processing and Communications Applications Conference (SIU), IEEE, pp. 1\u20134","DOI":"10.1109\/SIU.2017.7960259"},{"key":"20850_CR108","doi-asserted-by":"crossref","unstructured":"Rajput M, Deshmukh M, Nain N (2016) A novel approach for concealing image by utilizing the concept of secret sharing scheme and steganography. In 2016 International Conference on Information Technology (ICIT): IEEE, pp. 51\u201356","DOI":"10.1109\/ICIT.2016.023"},{"key":"20850_CR109","doi-asserted-by":"crossref","unstructured":"ST PGPJ, Hidayat B, Suratman FY (2017) Enhanced LSB Steganography with people detection as stego key generator. In 2017 International Conference on Signals and Systems (ICSigSys), IEEE, pp. 99\u2013104","DOI":"10.1109\/ICSIGSYS.2017.7967078"},{"issue":"1","key":"20850_CR110","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/S1665-6423(14)71612-8","volume":"12","author":"H Tao","year":"2014","unstructured":"Tao H, Chongmin L, Zain JM, Abdalla AN (2014) Robust image watermarking theories and techniques: a review. J Appl Res Technol 12(1):122\u2013138","journal-title":"J Appl Res Technol"},{"key":"20850_CR111","first-page":"23","volume":"55","author":"LR Haddada","year":"2017","unstructured":"Haddada LR, Dorizzi B, Amara NEB (2017) A combined watermarking approach for securing biometric data. Signal Process: Image Commun 55:23\u201331","journal-title":"Signal Process: Image Commun"},{"issue":"11","key":"20850_CR112","first-page":"1179","volume":"14","author":"A Saxena","year":"2016","unstructured":"Saxena A, Badal N (2016) A robust and deterministic digital watermarking technique based on cosine transform. Int J Comput Sci Inf Secur 14(11):1179","journal-title":"Int J Comput Sci Inf Secur"},{"issue":"9","key":"20850_CR113","doi-asserted-by":"publisher","first-page":"1502","DOI":"10.1109\/TIFS.2014.2338274","volume":"9","author":"M Asikuzzaman","year":"2014","unstructured":"Asikuzzaman M, Alam MJ, Lambert AJ, Pickering MR (2014) Imperceptible and robust blind video watermarking using chrominance embedding: a set of approaches in the DT CWT domain. IEEE Trans Inf Forensic Secur 9(9):1502\u20131517","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"9","key":"20850_CR114","doi-asserted-by":"publisher","first-page":"1733","DOI":"10.1109\/TMM.2016.2589208","volume":"18","author":"M Asikuzzaman","year":"2016","unstructured":"Asikuzzaman M, Alam MJ, Lambert AJ, Pickering MR (2016) Robust dt cwt-based dibr 3d video watermarking using chrominance embedding. IEEE Trans Multimedia 18(9):1733\u20131748","journal-title":"IEEE Trans Multimedia"},{"issue":"3","key":"20850_CR115","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1007\/s11771-017-3455-3","volume":"24","author":"M Kazemi","year":"2017","unstructured":"Kazemi M, Pourmina M, Mazinan A (2017) A new image watermarking framework based on levels-directions decomposition in contourlet representation. J Central South Univ 24(3):521\u2013532","journal-title":"J Central South Univ"},{"issue":"5","key":"20850_CR116","doi-asserted-by":"publisher","first-page":"6575","DOI":"10.1007\/s11042-016-3332-3","volume":"76","author":"H-T Hu","year":"2017","unstructured":"Hu H-T, Hsu L-Y (2017) Collective blind image watermarking in DWT-DCT domain with adaptive embedding strength governed by quality metrics. Multimed Tools Appl 76(5):6575\u20136594","journal-title":"Multimed Tools Appl"},{"key":"20850_CR117","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.jocs.2016.11.009","volume":"19","author":"S Kumar","year":"2017","unstructured":"Kumar S, Jain N, Fernandes SL (2017) Rough set based effective technique of image watermarking. J Comput Sci 19:121\u2013137","journal-title":"J Comput Sci"},{"key":"20850_CR118","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.optlaseng.2017.01.003","volume":"92","author":"S Liansheng","year":"2017","unstructured":"Liansheng S, Bei Z, Zhanmin W, Ailing T (2017) An optical color image watermarking scheme by using compressive sensing with human visual characteristics in gyrator domain. Opt Lasers Eng 92:85\u201393","journal-title":"Opt Lasers Eng"},{"issue":"7","key":"20850_CR119","doi-asserted-by":"publisher","first-page":"1894","DOI":"10.1109\/TSP.2017.2652383","volume":"65","author":"X Liu","year":"2017","unstructured":"Liu X, Han G, Wu J, Shao Z, Coatrieux G, Shu H (2017) Fractional krawtchouk transform with an application to image watermarking. IEEE Trans Signal Process 65(7):1894\u20131908","journal-title":"IEEE Trans Signal Process"},{"issue":"3","key":"20850_CR120","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1049\/cje.2016.05.014","volume":"25","author":"Z Ma","year":"2016","unstructured":"Ma Z, Huang J, Jiang M, Niu X (2016) A novel image digital rights management scheme with high-level security, usage control and traceability. Chin J Electron 25(3):481\u2013494","journal-title":"Chin J Electron"},{"key":"20850_CR121","doi-asserted-by":"crossref","unstructured":"Muhammad N, Bibi N, Qasim I, Jahangir A, Mahmood Z\u00a0(2018)\u00a0Digital watermarking using Hall property image decomposition method. Pattern Anal Appl\u00a021:997\u20131012","DOI":"10.1007\/s10044-017-0613-z"},{"key":"20850_CR122","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.aeue.2016.12.003","volume":"72","author":"S Roy","year":"2017","unstructured":"Roy S, Pal AK (2017) A blind DCT based color watermarking algorithm for embedding multiple watermarks. AEU-Int J Electron Commun 72:149\u2013161","journal-title":"AEU-Int J Electron Commun"},{"issue":"2","key":"20850_CR123","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s40998-017-0021-9","volume":"41","author":"S Trivedy","year":"2017","unstructured":"Trivedy S, Pal AK (2017) A logistic map-based fragile watermarking scheme of digital images with tamper detection. Iran J Sci Technol Trans Electr Eng 41(2):103\u2013113","journal-title":"Iran J Sci Technol Trans Electr Eng"},{"key":"20850_CR124","first-page":"78","volume":"47","author":"L Xiong","year":"2019","unstructured":"Xiong L, Dong D (2019) Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion. J Inf Secur Appl 47:78\u201385","journal-title":"J Inf Secur Appl"},{"key":"20850_CR125","doi-asserted-by":"crossref","unstructured":"Roy SS, Basu A, Chattopadhyay A (2020) On the implementation of a copyright protection scheme using digital image watermarking. Multimedia Tools Appl\u00a079(19):13125\u201313138","DOI":"10.1007\/s11042-020-08652-9"},{"issue":"1","key":"20850_CR126","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s13319-018-0211-x","volume":"10","author":"AK Sahu","year":"2019","unstructured":"Sahu AK, Swain G (2019) A novel n-rightmost bit replacement image steganography technique. 3D Res 10(1):2","journal-title":"3D Res"},{"issue":"1","key":"20850_CR127","first-page":"69","volume":"18","author":"K Sahu","year":"2018","unstructured":"Sahu K, Swain G, Babu ES (2018) Digital image steganography using bit flipping. Cybern Inf Technol 18(1):69\u201380","journal-title":"Cybern Inf Technol"},{"issue":"3","key":"20850_CR128","doi-asserted-by":"publisher","first-page":"2495","DOI":"10.1007\/s11042-019-08190-z","volume":"79","author":"OS Faragallah","year":"2020","unstructured":"Faragallah OS et al (2020) Secure color image cryptosystem based on chaotic logistic in the FrFT domain. Multim Tools Appl 79(3):2495\u20132519","journal-title":"Multim Tools Appl"},{"key":"20850_CR129","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1016\/j.future.2019.01.008","volume":"95","author":"S Pirbhulal","year":"2019","unstructured":"Pirbhulal S, Samuel OW, Wu W, Sangaiah AK, Li G (2019) A joint resource-aware and medical data security framework for wearable healthcare systems. Futur Gener Comput Syst 95:382\u2013391","journal-title":"Futur Gener Comput Syst"},{"issue":"sup1","key":"20850_CR130","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1080\/02564602.2018.1520153","volume":"35","author":"S Li","year":"2018","unstructured":"Li S, Chen X, Wang Z, Qian Z, Zhang X (2018) Data hiding in iris image for privacy protection. IETE Tech Rev 35(sup1):34\u201341","journal-title":"IETE Tech Rev"},{"issue":"23","key":"20850_CR131","doi-asserted-by":"publisher","first-page":"31177","DOI":"10.1007\/s11042-018-6214-z","volume":"77","author":"PK Mondal","year":"2018","unstructured":"Mondal PK, Singh S (2018) A chaotic permutation and diffusion based image encryption algorithm for secure communications. Multimed Tools Appl 77(23):31177\u201331198","journal-title":"Multimed Tools Appl"},{"issue":"15","key":"20850_CR132","doi-asserted-by":"publisher","first-page":"22127","DOI":"10.1007\/s11042-019-7452-4","volume":"78","author":"A Mishra","year":"2019","unstructured":"Mishra A, Gupta R, Jain S (2019) Secure and robust color image watermarking scheme using partial homomorphic cryptosystem in ASWDR compressed domain. Multimed Tools Appl 78(15):22127\u201322154","journal-title":"Multimed Tools Appl"},{"key":"20850_CR133","first-page":"102393","volume":"49","author":"MU Wagdarikar","year":"2019","unstructured":"Wagdarikar MU, Senapati RK (2019) Optimization based interesting region identification for video watermarking. J Inf Secur Appl 49:102393","journal-title":"J Inf Secur Appl"},{"key":"20850_CR134","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/j.neucom.2018.09.091","volume":"335","author":"Y Liu","year":"2019","unstructured":"Liu Y, Liu S, Wang Y, Zhao H, Liu S (2019) Video steganography: a review. Neurocomputing 335:238\u2013250","journal-title":"Neurocomputing"},{"key":"20850_CR135","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.measurement.2018.12.030","volume":"136","author":"R Mothi","year":"2019","unstructured":"Mothi R, Karthikeyan M (2019) Protection of bio medical iris image using watermarking and cryptography with WPT. Measurement 136:67\u201373","journal-title":"Measurement"},{"issue":"23","key":"20850_CR136","doi-asserted-by":"publisher","first-page":"30251","DOI":"10.1007\/s11042-018-6128-9","volume":"77","author":"NR Zhou","year":"2018","unstructured":"Zhou NR, Hou WMX, Wen RH, Zou WP (2018) Imperceptible digital watermarking scheme in multiple transform domains. Multimed Tools Appl 77(23):30251\u201330267","journal-title":"Multimed Tools Appl"},{"key":"20850_CR137","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1016\/j.future.2018.12.036","volume":"94","author":"NN Hurrah","year":"2019","unstructured":"Hurrah NN, Parah SA, Loan NA, Sheikh JA, Elhoseny M, Muhammad K (2019) Dual watermarking framework for privacy protection and content authentication of multimedia. Futur Gener Comput Syst 94:654\u2013673","journal-title":"Futur Gener Comput Syst"},{"issue":"7","key":"20850_CR138","doi-asserted-by":"publisher","first-page":"4263","DOI":"10.1007\/s11042-018-6691-0","volume":"79","author":"S Thakur","year":"2020","unstructured":"Thakur S, Singh AK, Ghrera SP, Mohan A (2020) Chaotic based secure watermarking approach for medical images. Multimed Tools Appl\u00a0 79(7):4263\u20134276","journal-title":"Multimed Tools Appl\u00a0"},{"issue":"2","key":"20850_CR139","doi-asserted-by":"publisher","first-page":"2223","DOI":"10.1007\/s11277-017-4971-z","volume":"98","author":"S Roy","year":"2018","unstructured":"Roy S, Pal AK (2018) An SVD based location specific robust color image watermarking scheme using RDWT and Arnold scrambling. Wireless Pers Commun 98(2):2223\u20132250","journal-title":"Wireless Pers Commun"},{"key":"20850_CR140","doi-asserted-by":"crossref","unstructured":"Geetha R, Geetha S (2020) Embedding electronic patient information in clinical images: an improved and efficient reversible data hiding technique. Multimed Tools Appl\u00a079(19):12869\u201312890","DOI":"10.1007\/s11042-019-08484-2"},{"key":"20850_CR141","doi-asserted-by":"crossref","unstructured":"Gong X, Chen L, Yu F, Zhao X, Wang S (2020) A secure image authentication scheme based on dual fragile watermark. Multimed Tools Appl\u00a079(25):18071\u201318088","DOI":"10.1007\/s11042-019-08594-x"},{"key":"20850_CR142","doi-asserted-by":"crossref","unstructured":"Pradhan SS, Padakandla A, Shirani F (2020) An algebraic and probabilistic framework for network information theory.\u00a0Found Trends Commun Inf Theory\u00a018(2):173\u2013379","DOI":"10.1561\/0100000083"},{"key":"20850_CR143","first-page":"102368","volume":"48","author":"A Kamal","year":"2019","unstructured":"Kamal A, Islam MM (2019) A prediction error based histogram association and mapping technique for data embedment. J Inf Secur Appl 48:102368","journal-title":"J Inf Secur Appl"},{"issue":"2","key":"20850_CR144","first-page":"373","volume":"11","author":"S Malik","year":"2019","unstructured":"Malik S, Reddlapalli RK (2019) Histogram and entropy based digital image watermarking scheme. Int J Inf Technol 11(2):373\u2013379","journal-title":"Int J Inf Technol"},{"key":"20850_CR145","first-page":"102374","volume":"48","author":"A Malik","year":"2019","unstructured":"Malik A et al (2019) Reversible data hiding in homomorphically encrypted image using interpolation technique. J Inf Secur Appl 48:102374","journal-title":"J Inf Secur Appl"},{"issue":"16","key":"20850_CR146","doi-asserted-by":"publisher","first-page":"20535","DOI":"10.1007\/s11042-017-5446-7","volume":"77","author":"H Shi","year":"2018","unstructured":"Shi H, Liu D, Lu H, Zhou C (2018) A homomorphic encrypted reversible information hiding scheme for integrity authentication and piracy tracing. Multimedia Tools Appl 77(16):20535\u201320567","journal-title":"Multimedia Tools Appl"},{"issue":"20","key":"20850_CR147","doi-asserted-by":"publisher","first-page":"27041","DOI":"10.1007\/s11042-018-5903-y","volume":"77","author":"S Begum","year":"2018","unstructured":"Begum S, Nirmala S (2018) Secure visual cryptography for medical image using modified cuckoo search. Multimedia Tools Appl 77(20):27041\u201327060","journal-title":"Multimedia Tools Appl"},{"issue":"19","key":"20850_CR148","doi-asserted-by":"publisher","first-page":"24937","DOI":"10.1007\/s11042-018-5724-z","volume":"77","author":"ME Hodeish","year":"2018","unstructured":"Hodeish ME, Humbe VT (2018) An optimized halftone visual cryptography scheme using error diffusion. Multimedia Tools Appl 77(19):24937\u201324953","journal-title":"Multimedia Tools Appl"},{"issue":"21","key":"20850_CR149","doi-asserted-by":"publisher","first-page":"28685","DOI":"10.1007\/s11042-018-5995-4","volume":"77","author":"B Zou","year":"2018","unstructured":"Zou B, Du J, Liu X, Wang Y (2018) Distinguishable zero-watermarking scheme with similarity-based retrieval for digital rights Management of Fundus Image. Multimedia Tools Appl 77(21):28685\u201328708","journal-title":"Multimedia Tools Appl"},{"issue":"1\u20132","key":"20850_CR150","doi-asserted-by":"publisher","first-page":"1409","DOI":"10.1007\/s11042-019-08103-0","volume":"79","author":"C Pak","year":"2020","unstructured":"Pak C, Kim J, An K, Kim C, Kim K, Pak C (2020) A novel color image LSB steganography using improved 1D chaotic map. Multimedia Tools Appl 79(1\u20132):1409\u20131425","journal-title":"Multimedia Tools Appl"},{"issue":"8","key":"20850_CR151","doi-asserted-by":"publisher","first-page":"9971","DOI":"10.1007\/s11042-018-6584-2","volume":"78","author":"MY Valandar","year":"2019","unstructured":"Valandar MY, Barani MJ, Ayubi P, Aghazadeh M (2019) An integer wavelet transform image steganography method based on 3D sine chaotic map. Multimedia Tools Appl 78(8):9971\u20139989","journal-title":"Multimedia Tools Appl"},{"key":"20850_CR152","doi-asserted-by":"publisher","first-page":"7175","DOI":"10.1007\/s11042-019-7657-6","volume":"79","author":"HA Abdallah","year":"2020","unstructured":"Abdallah HA, Amoon M, Hadhoud MM, Shaalan AA, Alshebeili SA, Abd El-Samie FE (2020) An embedding approach using orthogonal matrices of the singular value decomposition for image steganography. Multimed Tools Appl 79:7175\u20137191","journal-title":"Multimed Tools Appl"},{"key":"20850_CR153","doi-asserted-by":"crossref","unstructured":"Khurana M, Singh H (2020) Two level phase retrieval in fractional Hartley domain for secure image encryption and authentication using digital signatures. Multimed Tools Appl\u00a079(19):13967\u201313986","DOI":"10.1007\/s11042-020-08658-3"},{"key":"20850_CR154","doi-asserted-by":"crossref","unstructured":"Selva Mary G, Manoj Kumar S (2020) Secure grayscale image communication using significant visual cryptography scheme in real time applications. Multimed Tools Appl\u00a079(15):10363\u201310382","DOI":"10.1007\/s11042-019-7202-7"},{"issue":"20","key":"20850_CR155","doi-asserted-by":"publisher","first-page":"27181","DOI":"10.1007\/s11042-018-5913-9","volume":"77","author":"M Hamidi","year":"2018","unstructured":"Hamidi M, El Haziti M, Cherifi H, El Hassouni M (2018) Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform. Multimedia Tools Appl 77(20):27181\u201327214","journal-title":"Multimedia Tools Appl"},{"issue":"21","key":"20850_CR156","doi-asserted-by":"publisher","first-page":"28567","DOI":"10.1007\/s11042-018-6055-9","volume":"77","author":"O Evsutin","year":"2018","unstructured":"Evsutin O, Kokurina A, Meshcheryakov R, Shumskaya O (2018) The adaptive algorithm of information unmistakable embedding into digital images based on the discrete Fourier transformation. Multimedia Tools Appl 77(21):28567\u201328599","journal-title":"Multimedia Tools Appl"},{"key":"20850_CR157","doi-asserted-by":"crossref","unstructured":"Bagheri Baba Ahmadi S, Zhang G, Wei S, Boukela L (2021) An intelligent and blind image watermarking scheme based on hybrid SVD transforms using human visual system characteristics. Vis Comput 37(2):385\u2013409","DOI":"10.1007\/s00371-020-01808-6"},{"key":"20850_CR158","doi-asserted-by":"crossref","unstructured":"Salimi L, Haghighi A, Fathi A (2020) A novel watermarking method based on differential evolutionary algorithm and wavelet transform. Multimed Tools Appl\u00a079(17):11357\u201311374","DOI":"10.1007\/s11042-019-08455-7"},{"issue":"20","key":"20850_CR159","doi-asserted-by":"publisher","first-page":"26845","DOI":"10.1007\/s11042-018-5891-y","volume":"77","author":"NM Makbol","year":"2018","unstructured":"Makbol NM, Khoo BE, Rassem TH (2018) Security analyses of false positive problem for the SVD-based hybrid digital image watermarking techniques in the wavelet transform domain. Multimedia Tools Appl 77(20):26845\u201326879","journal-title":"Multimedia Tools Appl"},{"key":"20850_CR160","doi-asserted-by":"crossref","unstructured":"Zheng P, Zhang Y (2020) A robust image watermarking scheme in hybrid transform domains resisting to rotation attacks. Multimed Tools Appl\u00a079(25):18343\u201318365","DOI":"10.1007\/s11042-019-08490-4"},{"issue":"3","key":"20850_CR161","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1007\/s11042-019-08144-5","volume":"79","author":"S Prasad","year":"2020","unstructured":"Prasad S, Pal AK (2020) A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimedia Tools Appl 79(3):1673\u20131705","journal-title":"Multimedia Tools Appl"},{"issue":"6","key":"20850_CR162","doi-asserted-by":"publisher","first-page":"7691","DOI":"10.1007\/s11042-018-6501-8","volume":"78","author":"MT Naseem","year":"2019","unstructured":"Naseem MT, Nadeem M, Qureshi IM, Hussain A (2019) Optimal secure information using digital watermarking and fuzzy rule base. Multimedia Tools Appl 78(6):7691\u20137712","journal-title":"Multimedia Tools Appl"},{"key":"20850_CR163","doi-asserted-by":"crossref","unstructured":"Nazari M, Dorostkar Ahmadi I (2020) A novel chaotic steganography method with three approaches for color and grayscale images based on FIS and DCT with flexible capacity. Multimed Tools Appl 79(19):13693\u201313724","DOI":"10.1007\/s11042-019-08415-1"},{"issue":"7","key":"20850_CR164","doi-asserted-by":"publisher","first-page":"8113","DOI":"10.1007\/s11042-018-6632-y","volume":"78","author":"Q Su","year":"2019","unstructured":"Su Q, Liu Y, Liu D, Yuan Z, Ning H (2019) A new watermarking scheme for colour image using QR decomposition and ternary coding. Multimedia Tools Appl 78(7):8113\u20138132","journal-title":"Multimedia Tools Appl"},{"key":"20850_CR165","doi-asserted-by":"publisher","first-page":"11297","DOI":"10.1007\/s11042-019-08367-6","volume":"79","author":"CS Hsu","year":"2020","unstructured":"Hsu CS, Tu SF (2020) Enhancing the robustness of image watermarking against cropping attacks with dual watermarks. Multimed Tools Appl 79:11297\u201311323","journal-title":"Multimed Tools Appl"},{"key":"20850_CR166","doi-asserted-by":"publisher","first-page":"14777","DOI":"10.1007\/s11042-018-7062-6","volume":"79","author":"Z Zhang","year":"2020","unstructured":"Zhang Z, Bi H, Kong X, Li N, Lu D (2020) Adaptive compressed sensing of color images based on salient region detection. Multimed Tools Appl 79:14777\u201314791","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"20850_CR167","doi-asserted-by":"publisher","first-page":"17027","DOI":"10.1007\/s11042-018-7085-z","volume":"78","author":"AK Abdulrahman","year":"2019","unstructured":"Abdulrahman AK, Ozturk S (2019) A novel hybrid DCT and DWT based robust watermarking algorithm for color images. Multimedia Tools Appl 78(12):17027\u201317049","journal-title":"Multimedia Tools Appl"},{"issue":"13","key":"20850_CR168","doi-asserted-by":"publisher","first-page":"17607","DOI":"10.1007\/s11042-018-7127-6","volume":"78","author":"S Mukherjee","year":"2019","unstructured":"Mukherjee S, Sanyal G (2019) A multi level image steganography methodology based on adaptive PMS and block based pixel swapping. Multimedia Tools Appl 78(13):17607\u201317622","journal-title":"Multimedia Tools Appl"},{"key":"20850_CR169","first-page":"46","volume":"65","author":"M Hussain","year":"2018","unstructured":"Hussain M, Wahab AWA, Idris YIB, Ho AT, Jung K-H (2018) Image steganography in spatial domain: a survey. Signal Process: Image Commun 65:46\u201366","journal-title":"Signal Process: Image Commun"},{"issue":"13","key":"20850_CR170","doi-asserted-by":"publisher","first-page":"18571","DOI":"10.1007\/s11042-019-7239-7","volume":"78","author":"S Mukherjee","year":"2019","unstructured":"Mukherjee S, Sanyal G (2019) A physical equation based image steganography with electro-magnetic embedding. Multimedia Tools Appl 78(13):18571\u201318593","journal-title":"Multimedia Tools Appl"},{"issue":"13","key":"20850_CR171","doi-asserted-by":"publisher","first-page":"9101","DOI":"10.1007\/s11042-019-7507-6","volume":"79","author":"GVK Murugan","year":"2020","unstructured":"Murugan GVK, Uthandipalayam Subramaniyam R (2020) Performance analysis of image steganography using wavelet transform for safe and secured transaction. Multimed Tools Appl 79(13):9101\u20139115","journal-title":"Multimed Tools Appl"},{"key":"20850_CR172","first-page":"59","volume":"32","author":"A Kamal","year":"2017","unstructured":"Kamal A, Islam MM (2017) Enhancing embedding capacity and stego image quality by employing multi predictors. J Inf Secur Appl 32:59\u201374","journal-title":"J Inf Secur Appl"},{"key":"20850_CR173","unstructured":"Hashim M, Rahim M, Shafry M, Alwan AA (2018) A review and open issues of multifarious image steganography techniques in spatial domain. J Theor Appl Inf Tech 96(4)"},{"issue":"13","key":"20850_CR174","doi-asserted-by":"publisher","first-page":"17535","DOI":"10.1007\/s11042-018-7130-y","volume":"78","author":"N Nasrullah","year":"2019","unstructured":"Nasrullah N, Sang J, Mateen M, Akbar MA, Xiang H, Xia X (2019) Reversible data hiding in compressed and encrypted images by using Kd-tree. Multimedia Tools Appl 78(13):17535\u201317554","journal-title":"Multimedia Tools Appl"},{"issue":"6","key":"20850_CR175","doi-asserted-by":"publisher","first-page":"7181","DOI":"10.1007\/s11042-018-6465-8","volume":"78","author":"A Mohammad","year":"2019","unstructured":"Mohammad A, Al-Haj A, Farfoura M (2019) An improved capacity data hiding technique based on image interpolation. Multimedia Tools Appl 78(6):7181\u20137205","journal-title":"Multimedia Tools Appl"},{"issue":"20","key":"20850_CR176","doi-asserted-by":"publisher","first-page":"26711","DOI":"10.1007\/s11042-018-5886-8","volume":"77","author":"L Wang","year":"2018","unstructured":"Wang L, Pan Z (2018) An improved reversible data hiding scheme using best neighboring coding based on color images. Multimedia Tools Appl 77(20):26711\u201326739","journal-title":"Multimedia Tools Appl"},{"issue":"14","key":"20850_CR177","doi-asserted-by":"publisher","first-page":"20133","DOI":"10.1007\/s11042-019-7326-9","volume":"78","author":"F Zhang","year":"2019","unstructured":"Zhang F, Luo T, Jiang G, Yu M, Xu H, Zhou W (2019) A novel robust color image watermarking method using RGB correlations. Multimedia Tools Appl 78(14):20133\u201320155","journal-title":"Multimedia Tools Appl"},{"key":"20850_CR178","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.sigpro.2018.09.024","volume":"155","author":"T Luo","year":"2019","unstructured":"Luo T, Jiang G, Yu M, Xu H, Gao W (2019) Robust high dynamic range color image watermarking method based on feature map extraction. Signal Process 155:83\u201395","journal-title":"Signal Process"},{"issue":"15","key":"20850_CR179","doi-asserted-by":"publisher","first-page":"20765","DOI":"10.1007\/s11042-019-7394-x","volume":"78","author":"SP Singh","year":"2019","unstructured":"Singh SP, Bhatnagar G (2019) A simplified watermarking algorithm based on lifting wavelet transform. Multimedia Tools Appl 78(15):20765\u201320786","journal-title":"Multimedia Tools Appl"},{"issue":"21","key":"20850_CR180","doi-asserted-by":"publisher","first-page":"30523","DOI":"10.1007\/s11042-018-7115-x","volume":"78","author":"K Singh","year":"2019","unstructured":"Singh K (2019) Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimedia Tools Appl 78(21):30523\u201330533","journal-title":"Multimedia Tools Appl"},{"issue":"12","key":"20850_CR181","doi-asserted-by":"publisher","first-page":"7893","DOI":"10.1007\/s13369-018-3246-7","volume":"43","author":"AA Soualmi","year":"2018","unstructured":"Soualmi AA, Laouamer L (2018) A new blind medical image watermarking based on weber descriptors and Arnold chaotic map. Arab J Sci Eng 43(12):7893\u20137905","journal-title":"Arab J Sci Eng"},{"key":"20850_CR182","doi-asserted-by":"crossref","unstructured":"Kazemivash, Moghaddam ME (2018) A predictive model-based image watermarking scheme using Regression Tree and Firefly algorithm. Soft Comput 22(12):4083-4098","DOI":"10.1007\/s00500-017-2617-4"},{"issue":"19","key":"20850_CR183","doi-asserted-by":"publisher","first-page":"9685","DOI":"10.1007\/s00500-018-3535-9","volume":"23","author":"E Moeinaddini","year":"2019","unstructured":"Moeinaddini E (2019) Selecting optimal blocks for image watermarking using entropy and distinct discrete firefly algorithm. Soft Comput 23(19):9685\u20139699","journal-title":"Soft Comput"},{"key":"20850_CR184","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1016\/j.ijleo.2019.02.001","volume":"183","author":"H Xu","year":"2019","unstructured":"Xu H, Kang X, Chen Y, Wang Y (2019) Rotation and scale invariant image watermarking based on polar harmonic transforms. Optik 183:401\u2013414","journal-title":"Optik"},{"key":"20850_CR185","first-page":"119","volume":"74","author":"P Lef\u00e8vre","year":"2019","unstructured":"Lef\u00e8vre P, Carr\u00e9 P, Gaborit P (2019) Application of rank metric codes in digital image watermarking. Signal Process: Image Commun 74:119\u2013128","journal-title":"Signal Process: Image Commun"},{"key":"20850_CR186","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.ins.2019.02.055","volume":"486","author":"BB Haghighi","year":"2019","unstructured":"Haghighi BB, Taherinia AH, Mohajerzadeh AH (2019) TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using LWT and GA. Inf Sci 486:204\u2013230","journal-title":"Inf Sci"},{"key":"20850_CR187","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.neucom.2018.06.075","volume":"335","author":"IJ Kadhim","year":"2019","unstructured":"Kadhim IJ, Premaratne P, Vial PJ, Halloran B (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299\u2013326","journal-title":"Neurocomputing"},{"issue":"14","key":"20850_CR188","doi-asserted-by":"publisher","first-page":"6123","DOI":"10.1016\/j.eswa.2014.04.022","volume":"41","author":"HR Kanan","year":"2014","unstructured":"Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41(14):6123\u20136130","journal-title":"Expert Syst Appl"},{"issue":"25","key":"20850_CR189","doi-asserted-by":"publisher","first-page":"18657","DOI":"10.1007\/s11042-020-08634-x","volume":"79","author":"R Mehta","year":"2020","unstructured":"Mehta R, Gupta K, Yadav AK (2020) An adaptive framework to image watermarking based on the twin support vector regression and genetic algorithm in lifting wavelet transform domain. Multimed Tools Appl 79(25):18657\u201318678","journal-title":"Multimed Tools Appl"},{"key":"20850_CR190","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.jvcir.2019.02.034","volume":"60","author":"Y Zou","year":"2019","unstructured":"Zou Y, Zhang G, Liu L (2019) Research on image steganography analysis based on deep learning. J Vis Commun Image Represent 60:266\u2013275","journal-title":"J Vis Commun Image Represent"},{"key":"20850_CR191","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.measurement.2019.02.069","volume":"139","author":"S Arunkumar","year":"2019","unstructured":"Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N, Logesh R (2019) SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139:426\u2013437","journal-title":"Measurement"},{"issue":"18","key":"20850_CR192","doi-asserted-by":"publisher","first-page":"23673","DOI":"10.1007\/s11042-018-5713-2","volume":"77","author":"T Rabie","year":"2018","unstructured":"Rabie T, Baziyad M, Kamel I (2018) Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid. Multimed Tools Appl 77(18):23673\u201323698","journal-title":"Multimed Tools Appl"},{"key":"20850_CR193","doi-asserted-by":"crossref","unstructured":"EL-Latif AAA, Abd-El-Atty B, Venegas-Andraca SE (2019) A novel image steganography technique based on quantum substitution boxes. Optics Laser Technol 116:92\u2013102","DOI":"10.1016\/j.optlastec.2019.03.005"},{"issue":"1","key":"20850_CR194","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s11277-017-5054-x","volume":"99","author":"SS Jamal","year":"2018","unstructured":"Jamal SS, Shah T (2018) A novel algebraic technique for the construction of strong substitution box. Wireless Pers Commun 99(1):213\u2013226","journal-title":"Wireless Pers Commun"},{"key":"20850_CR195","doi-asserted-by":"publisher","first-page":"17463","DOI":"10.1007\/s11042-020-08676-1","volume":"79","author":"S Pramanik","year":"2020","unstructured":"Pramanik S, Singh RP, Ghosh R (2020) Application of bi-orthogonal wavelet transform and genetic algorithm in image steganography. Multimed Tools Appl 79:17463\u201317482","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"20850_CR196","doi-asserted-by":"publisher","first-page":"6355","DOI":"10.1007\/s11042-018-6361-2","volume":"78","author":"X Liu","year":"2019","unstructured":"Liu X, Wang Y, Du J, Liao S, Lou J, Zou B (2019) Robust hybrid image watermarking scheme based on KAZE features and IWT-SVD. Multimed Tools Appl 78(5):6355\u20136384","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"20850_CR197","doi-asserted-by":"publisher","first-page":"1184","DOI":"10.1049\/cje.2017.09.025","volume":"26","author":"S Wang","year":"2017","unstructured":"Wang S, Cui C, Niu X (2017) A novel DIBR 3D image watermarking algorithm resist to geometrical attacks. Chin J Electron 26(6):1184\u20131193","journal-title":"Chin J Electron"},{"issue":"11","key":"20850_CR198","doi-asserted-by":"publisher","first-page":"1994","DOI":"10.1049\/iet-ipr.2018.5399","volume":"12","author":"H Singh","year":"2018","unstructured":"Singh H (2018) Watermarking image encryption using deterministic phase mask and singular value decomposition in fractional Mellin transform domain. IET Image Proc 12(11):1994\u20132001","journal-title":"IET Image Proc"},{"issue":"2","key":"20850_CR199","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.visinf.2018.03.001","volume":"2","author":"R Roy","year":"2018","unstructured":"Roy R, Ahmed T, Changder S (2018) Watermarking through image geometry change tracking. Vis Inform 2(2):125\u2013135","journal-title":"Vis Inform"},{"key":"20850_CR200","doi-asserted-by":"crossref","unstructured":"Etoom W, Al-Haj A (2017) Frequency-domain watermarking of 3D DIBR images using the steerable pyramid and discrete cosine transforms. In 2017 8th International Conference on Information Technology (ICIT), IEEE, pp. 819\u2013826","DOI":"10.1109\/ICITECH.2017.8079953"},{"key":"20850_CR201","first-page":"1","volume":"10","author":"R Nilesh","year":"2014","unstructured":"Nilesh R, Ganga H (2014) Securing medical images by watermarking using DWT-DCT-SVD. Int J Comput Trends Technol 10:1\u20139","journal-title":"Int J Comput Trends Technol"},{"issue":"4","key":"20850_CR202","first-page":"714","volume":"47","author":"G Swain","year":"2018","unstructured":"Swain G (2018) A data hiding technique by mixing MFPVD and LSB substitution in a pixel. Inf Technol Control 47(4):714\u2013727","journal-title":"Inf Technol Control"},{"issue":"3","key":"20850_CR203","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/s13319-018-0188-5","volume":"9","author":"AK Sahu","year":"2018","unstructured":"Sahu AK, Swain G (2018) Pixel overlapping image steganography using PVD and modulus function. 3D Res 9(3):40","journal-title":"3D Res"},{"key":"20850_CR204","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1016\/j.ijleo.2018.11.015","volume":"180","author":"G Swain","year":"2019","unstructured":"Swain G (2019) Two new steganography techniques based on quotient value differencing with addition-subtraction logic and PVD with modulus function. Optik 180:807\u2013823","journal-title":"Optik"},{"issue":"23","key":"20850_CR205","doi-asserted-by":"publisher","first-page":"30419","DOI":"10.1007\/s11042-018-6121-3","volume":"77","author":"C-Y Hsiao","year":"2018","unstructured":"Hsiao C-Y, Tsai M-F, Yang C-Y (2018) Simple and robust watermarking scheme based on square-root-modulus technique. Multimed Tools Appl 77(23):30419\u201330435","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"20850_CR206","doi-asserted-by":"publisher","first-page":"14705","DOI":"10.1007\/s11042-017-5056-4","volume":"77","author":"MA Hameed","year":"2018","unstructured":"Hameed MA, Aly S, Hassaballah M (2018) An efficient data hiding method based on adaptive directional pixel value differencing (ADPVD). Multimed Tools Appl 77(12):14705\u201314723","journal-title":"Multimed Tools Appl"},{"issue":"23","key":"20850_CR207","doi-asserted-by":"publisher","first-page":"17003","DOI":"10.1007\/s11042-019-7557-9","volume":"79","author":"TD Sairam","year":"2020","unstructured":"Sairam TD, Boopathybagan K (2020) An improved high capacity data hiding scheme using pixel value adjustment and modulus operation. Multimed Tools Appl 79(23):17003\u201317013","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"20850_CR208","doi-asserted-by":"publisher","first-page":"2995","DOI":"10.1007\/s13369-018-3372-2","volume":"44","author":"G Swain","year":"2019","unstructured":"Swain G (2019) Very high capacity image steganography technique using quotient value differencing and LSB substitution. Arab J Sci Eng 44(4):2995\u20133004","journal-title":"Arab J Sci Eng"},{"key":"20850_CR209","doi-asserted-by":"crossref","unstructured":"Alshanbari HS (2021) Medical image watermarking for ownership & tamper detection. Multimed Tools Appl 80(11):16549\u201316564","DOI":"10.1007\/s11042-020-08814-9"},{"issue":"19","key":"20850_CR210","first-page":"13449","volume":"79","author":"G Paul","year":"2020","unstructured":"Paul G, Saha SK, Burman D (2020) A PVD based high capacity steganography algorithm with embedding in non-sequential position. Multimed Tools Appl 79(19):13449\u201313479","journal-title":"Multimed Tools Appl"},{"key":"20850_CR211","doi-asserted-by":"crossref","unstructured":"Thongkor K. Amornraksa T (2017) An image watermarking method in HSL color model. In 2017 10th International Conference on Ubi-media Computing and Workshops (Ubi-Media), IEEE, pp. 1\u20136","DOI":"10.1109\/UMEDIA.2017.8074101"},{"key":"20850_CR212","doi-asserted-by":"crossref","unstructured":"Sharma KU, Talan PP, Nawade PP, Ali MS, Sharma AU (2019) Digital watermarking\u2014an overview and a possible solution. In Information and Communication Technology for Intelligent Systems: Springer, pp. 447\u2013455","DOI":"10.1007\/978-981-13-1747-7_43"},{"key":"20850_CR213","doi-asserted-by":"crossref","unstructured":"Pramoun T, Thongkor K, Amornraksa T (2017) Image watermarking against color blind image correction. In 2017 10th International Conference on Ubi-media Computing and Workshops (Ubi-Media), IEEE, pp. 1\u20136","DOI":"10.1109\/UMEDIA.2017.8074102"},{"key":"20850_CR214","doi-asserted-by":"crossref","unstructured":"Assini I, Badri A, Safi K, Sahel A, Baghdad A (2017) Hybrid multiple watermarking technique for securing medical image using DWT-FWHT-SVD. In 2017 International Conference on Advanced Technologies for Signal and Image Processing, IEEE, pp. 1\u20136","DOI":"10.1109\/ATSIP.2017.8075569"},{"key":"20850_CR215","doi-asserted-by":"crossref","unstructured":"Abdel-Nabi H, Al-Haj A (2017) Medical imaging security using partial encryption and histogram shifting watermarking. In 2017 8th International Conference on Information Technology (ICIT), IEEE, pp. 802\u2013807","DOI":"10.1109\/ICITECH.2017.8079950"},{"key":"20850_CR216","doi-asserted-by":"crossref","unstructured":"Singh A, Kumar A, Dutta K (2020) DWT, DCT and PBFO based approach for biometric image security. In 2020 International Conference on Contemporary Computing and Applications (IC3A), IEEE, pp. 298\u2013303","DOI":"10.1109\/IC3A48958.2020.233317"},{"key":"20850_CR217","doi-asserted-by":"publisher","first-page":"22727","DOI":"10.1007\/s11042-020-08987-3","volume":"79","author":"JY Wu","year":"2020","unstructured":"Wu JY, Huang WL, Xia-Hou WM, Zou WP, Gong LH (2020) Imperceptible digital watermarking scheme combining 4-level discrete wavelet transform with singular value decomposition. Multimed Tools Appl 79:22727\u201322747","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"20850_CR218","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1007\/s11042-019-08197-6","volume":"79","author":"SBB Ahmadi","year":"2020","unstructured":"Ahmadi SBB, Zhang G, Wei S (2020) Robust and hybrid SVD-based image watermarking schemes. Multimed Tools Appl 79(1):1075\u20131117","journal-title":"Multimed Tools Appl"},{"key":"20850_CR219","doi-asserted-by":"publisher","first-page":"10269","DOI":"10.1109\/ACCESS.2018.2799240","volume":"6","author":"A Shehab","year":"2018","unstructured":"Shehab A et al (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269\u201310278","journal-title":"IEEE Access"},{"key":"20850_CR220","doi-asserted-by":"publisher","first-page":"19876","DOI":"10.1109\/ACCESS.2018.2808172","volume":"6","author":"NA Loan","year":"2018","unstructured":"Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6:19876\u201319897","journal-title":"IEEE Access"},{"key":"20850_CR221","doi-asserted-by":"publisher","first-page":"21075","DOI":"10.1109\/ACCESS.2018.2820603","volume":"6","author":"AAA El-Latif","year":"2018","unstructured":"El-Latif AAA, Abd-El-Atty B, Hossain MS, Rahman MA, Alamri A, Gupta B (2018) Efficient quantum information hiding for remote medical image sharing. IEEE Access 6:21075\u201321083","journal-title":"IEEE Access"},{"key":"20850_CR222","doi-asserted-by":"publisher","first-page":"20464","DOI":"10.1109\/ACCESS.2018.2819424","volume":"6","author":"F Ernawan","year":"2018","unstructured":"Ernawan F, Kabir MN (2018) A robust image watermarking technique with an optimal DCT-psychovisual threshold. IEEE Access 6:20464\u201320480","journal-title":"IEEE Access"},{"issue":"6","key":"20850_CR223","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1177\/0165551518816303","volume":"45","author":"A Rehman","year":"2019","unstructured":"Rehman A, Saba T, Mahmood T, Mehmood Z, Shah M, Anjum A (2019) Data hiding technique in steganography for information security using number theory. J Inf Sci 45(6):767\u2013778","journal-title":"J Inf Sci"},{"key":"20850_CR224","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1016\/j.measurement.2018.12.016","volume":"135","author":"Q Zhang","year":"2019","unstructured":"Zhang Q, Song X, Wen T, Fu C (2019) Reversibility improved data hiding in 3D mesh models using prediction-error expansion and sorting. Measurement 135:738\u2013746","journal-title":"Measurement"},{"issue":"19","key":"20850_CR225","doi-asserted-by":"publisher","first-page":"24593","DOI":"10.1007\/s11042-017-5488-x","volume":"77","author":"NH Abbas","year":"2018","unstructured":"Abbas NH, Ahmad SMS, Parveen S, Wan WA, Ramli ARB (2018) Design of high performance copyright protection watermarking based on lifting wavelet transform and bi empirical mode decomposition. Multimed Tools Appl 77(19):24593\u201324614","journal-title":"Multimed Tools Appl"},{"key":"20850_CR226","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.eswa.2018.02.002","volume":"100","author":"AM Abdelhakim","year":"2018","unstructured":"Abdelhakim AM, Abdelhakim M (2018) A time-efficient optimization for robust image watermarking using machine learning. Expert Syst Appl 100:197\u2013210","journal-title":"Expert Syst Appl"},{"issue":"7","key":"20850_CR227","doi-asserted-by":"publisher","first-page":"2369","DOI":"10.1007\/s00500-017-2501-2","volume":"22","author":"N Aherrahrou","year":"2018","unstructured":"Aherrahrou N, Tairi H (2018) A new image watermarking technique based on periodic plus smooth decomposition (PPSD). Soft Comput 22(7):2369\u20132379","journal-title":"Soft Comput"},{"key":"20850_CR228","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/j.measurement.2016.10.016","volume":"95","author":"A Al-Haj","year":"2017","unstructured":"Al-Haj A, Farfoura ME, Mohammad A (2017) Transform-based watermarking of 3D depth-image-based-rendering images. Measurement 95:405\u2013417","journal-title":"Measurement"},{"issue":"18","key":"20850_CR229","doi-asserted-by":"publisher","first-page":"24521","DOI":"10.1007\/s11042-018-5759-1","volume":"77","author":"G Anbarjafari","year":"2018","unstructured":"Anbarjafari G, Ozcinar C (2018) Imperceptible non-blind watermarking and robustness against tone mapping operation attacks for high dynamic range images. Multimed Tools Appl 77(18):24521\u201324535","journal-title":"Multimed Tools Appl"},{"key":"20850_CR230","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.eswa.2018.06.024","volume":"112","author":"TK Araghi","year":"2018","unstructured":"Araghi TK, Manaf AA, Araghi SK (2018) A secure blind discrete wavelet transform based watermarking scheme using two-level singular value decomposition. Expert Syst Appl 112:208\u2013228","journal-title":"Expert Syst Appl"},{"issue":"19","key":"20850_CR231","doi-asserted-by":"publisher","first-page":"27491","DOI":"10.1007\/s11042-019-7650-0","volume":"78","author":"M Veni","year":"2019","unstructured":"Veni M, Meyyappan T (2019) Digital image Watermark embedding and extraction using oppositional fruit Fly algorithm. Multimed Tools Appl 78(19):27491\u201327510","journal-title":"Multimed Tools Appl"},{"issue":"23","key":"20850_CR232","doi-asserted-by":"publisher","first-page":"30841","DOI":"10.1007\/s11042-018-5997-2","volume":"77","author":"H Bouslehi","year":"2018","unstructured":"Bouslehi H, Seddik H (2018) Innovative image encryption scheme based on a new rapid hyperchaotic system and random iterative permutation. Multimed Tools Appl 77(23):30841\u201330863","journal-title":"Multimed Tools Appl"},{"issue":"19","key":"20850_CR233","doi-asserted-by":"publisher","first-page":"25223","DOI":"10.1007\/s11042-018-5782-2","volume":"77","author":"S Sheela","year":"2018","unstructured":"Sheela S, Suresh K, Tandur D (2018) Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimed Tools Appl 77(19):25223\u201325251","journal-title":"Multimed Tools Appl"},{"key":"20850_CR234","first-page":"102428","volume":"50","author":"K Jithin","year":"2020","unstructured":"Jithin K, Sankar S (2020) Colour image encryption algorithm combining, Arnold map, DNA sequence operation, and a Mandelbrot set. J Inf Secur Appl 50:102428","journal-title":"J Inf Secur Appl"},{"key":"20850_CR235","doi-asserted-by":"publisher","first-page":"15901","DOI":"10.1007\/s11042-018-6407-5","volume":"79","author":"L Singh","year":"2020","unstructured":"Singh L, Singh AK, Singh PK (2020) Secure data hiding techniques: a survey. Multimed Tools Appl 79:15901\u201315921","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"20850_CR236","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s00371-018-1567-x","volume":"36","author":"F Ernawan","year":"2020","unstructured":"Ernawan F, Kabir MN (2020) A block-based RDWT-SVD image watermarking method using human visual system characteristics. Vis Comput 36(1):19\u201337","journal-title":"Vis Comput"},{"issue":"17","key":"20850_CR237","doi-asserted-by":"publisher","first-page":"12041","DOI":"10.1007\/s11042-019-08338-x","volume":"79","author":"D Ariatmanto","year":"2020","unstructured":"Ariatmanto D, Ernawan F (2020) An improved robust image watermarking by using different embedding strengths. Multimed Tools Appl 79(17):12041\u201312067","journal-title":"Multimed Tools Appl"},{"issue":"23","key":"20850_CR238","doi-asserted-by":"publisher","first-page":"30403","DOI":"10.1007\/s11042-018-6126-y","volume":"77","author":"SK Ghosal","year":"2018","unstructured":"Ghosal SK, Mandal JK, Sarkar R (2018) High payload image steganography based on Laplacian of Gaussian (LoG) edge detector. Multimed Tools Appl 77(23):30403\u201330418","journal-title":"Multimed Tools Appl"},{"issue":"21","key":"20850_CR239","doi-asserted-by":"publisher","first-page":"27851","DOI":"10.1007\/s11042-018-5996-3","volume":"77","author":"S Mukherjee","year":"2018","unstructured":"Mukherjee S, Sanyal G (2018) A chaos based image steganographic system. Multimed Tools Appl 77(21):27851\u201327876","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"20850_CR240","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s11801-018-7212-0","volume":"14","author":"S-C Han","year":"2018","unstructured":"Han S-C, Yang J-F, Wang R, Jia G-M (2018) A robust color image watermarking algorithm against rotation attacks. Optoelectron Lett 14(1):61\u201366","journal-title":"Optoelectron Lett"},{"key":"20850_CR241","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.sigpro.2018.11.011","volume":"157","author":"Z Xia","year":"2019","unstructured":"Xia Z, Wang X, Zhou W, Li R, Wang C, Zhang C (2019) Color medical image lossless watermarking using chaotic system and accurate quaternion polar harmonic transforms. Signal Process 157:108\u2013118","journal-title":"Signal Process"},{"issue":"19","key":"20850_CR242","doi-asserted-by":"publisher","first-page":"9719","DOI":"10.1007\/s00500-018-3537-7","volume":"23","author":"C-F Lee","year":"2019","unstructured":"Lee C-F, Weng C-Y, Kao C-Y (2019) Reversible data hiding using Lagrange interpolation for prediction-error expansion embedding. Soft Comput 23(19):9719\u20139731","journal-title":"Soft Comput"},{"key":"20850_CR243","first-page":"104","volume":"70","author":"Y-S Lee","year":"2019","unstructured":"Lee Y-S, Seo Y-H, Kim D-W (2019) Digital blind watermarking based on depth variation prediction map and DWT for DIBR free-viewpoint image. Signal Process: Image Commun 70:104\u2013113","journal-title":"Signal Process: Image Commun"},{"key":"20850_CR244","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.optlaseng.2018.10.014","volume":"114","author":"S Wang","year":"2019","unstructured":"Wang S et al (2019) Optical image watermarking based on singular value decomposition ghost imaging and lifting wavelet transform. Opt Lasers Eng 114:76\u201382","journal-title":"Opt Lasers Eng"},{"issue":"5","key":"20850_CR245","doi-asserted-by":"publisher","first-page":"1555","DOI":"10.1007\/s00500-017-2944-5","volume":"22","author":"I Shafi","year":"2018","unstructured":"Shafi I et al (2018) An adaptive hybrid fuzzy-wavelet approach for image steganography using bit reduction and pixel adjustment. Soft Comput 22(5):1555\u20131567","journal-title":"Soft Comput"},{"key":"20850_CR246","doi-asserted-by":"publisher","first-page":"7491","DOI":"10.1007\/s11042-019-08423-1","volume":"79","author":"D Liu","year":"2020","unstructured":"Liu D, Yuan Z, Su Q (2020) A blind color image watermarking scheme with variable steps based on Schur decomposition. Multimed Tools Appl 79:7491\u20137513","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"20850_CR247","doi-asserted-by":"publisher","first-page":"8133","DOI":"10.1007\/s11042-018-6717-7","volume":"78","author":"L Feng","year":"2019","unstructured":"Feng L, Gong D, Liu F, Lu H (2019) Affine invariant image watermarking scheme based on ASIFT and Delaunay tessellation. Multimed Tools Appl 78(7):8133\u20138149","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"20850_CR248","doi-asserted-by":"publisher","first-page":"6891","DOI":"10.1007\/s11042-019-08570-5","volume":"79","author":"UA Waqas","year":"2020","unstructured":"Waqas UA, Khan M, Batool SI (2020) A new watermarking scheme based on Daubechies wavelet and chaotic map for quick response code images. Multimed Tools Appl 79(9):6891\u20136914","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"20850_CR249","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1007\/s10044-019-00828-w","volume":"23","author":"XY Wang","year":"2020","unstructured":"Wang XY, Zhang SY, Wen TT, Xu H, Yang HY (2020) Synchronization correction-based robust digital image watermarking approach using Bessel K-form PDF. Pattern Anal Appl 23(2):933\u2013951","journal-title":"Pattern Anal Appl"},{"issue":"17","key":"20850_CR250","doi-asserted-by":"publisher","first-page":"11327","DOI":"10.1007\/s11042-019-08337-y","volume":"79","author":"A Broumandnia","year":"2020","unstructured":"Broumandnia A (2020) Scale invariant digital image encryption using 3D modular chaotic map. Multimed Tools Appl 79(17):11327\u201311355","journal-title":"Multimed Tools Appl"},{"issue":"19","key":"20850_CR251","doi-asserted-by":"publisher","first-page":"13161","DOI":"10.1007\/s11042-020-08639-6","volume":"79","author":"AK Chaturvedi","year":"2020","unstructured":"Chaturvedi AK, Shukla PK (2020) Effective watermarking technique using optimal discrete wavelet transform and sanitization technique. Multimed Tools Appl 79(19):13161\u201313177","journal-title":"Multimed Tools Appl"},{"issue":"19","key":"20850_CR252","doi-asserted-by":"publisher","first-page":"13427","DOI":"10.1007\/s11042-020-08662-7","volume":"79","author":"E Akhtarkavan","year":"2020","unstructured":"Akhtarkavan E, Majidi B, Salleh MFM, Patra JC (2020) Fragile high capacity data hiding in digital images using integer-to-integer DWT and lattice vector quantization. Multimed Tools Appl 79(19):13427\u201313447","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"20850_CR253","doi-asserted-by":"publisher","first-page":"14867","DOI":"10.1007\/s11042-018-6827-2","volume":"78","author":"F Musanna","year":"2019","unstructured":"Musanna F, Kumar S (2019) A novel fractional order chaos-based image encryption using Fisher Yates algorithm and 3-D cat map. Multimed Tools Appl 78(11):14867\u201314895","journal-title":"Multimed Tools Appl"},{"issue":"29","key":"20850_CR254","doi-asserted-by":"publisher","first-page":"20897","DOI":"10.1007\/s11042-020-08715-x","volume":"79","author":"S Prasad","year":"2020","unstructured":"Prasad S, Pal AK (2020) Hamming code and logistic-map based pixel-level active forgery detection scheme using fragile watermarking. Multimed Tools Appl 79(29):20897\u201320928","journal-title":"Multimed Tools Appl"},{"key":"20850_CR255","doi-asserted-by":"publisher","first-page":"18695","DOI":"10.1007\/s11042-020-08727-7","volume":"79","author":"O Hemida","year":"2020","unstructured":"Hemida O, He H (2020) A self-recovery watermarking scheme based on block truncation coding and quantum chaos map. Multimed Tools Appl 79:18695\u201318725","journal-title":"Multimed Tools Appl"},{"issue":"20","key":"20850_CR256","doi-asserted-by":"publisher","first-page":"30165","DOI":"10.1007\/s11042-020-08801-0","volume":"80","author":"A Anand","year":"2021","unstructured":"Anand A, Singh AK (2021) Watermarking techniques for medical data authentication: a survey. Multimed Tools Appl 80(20):30165\u201330197","journal-title":"Multimed Tools Appl"},{"key":"20850_CR257","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s11554-020-00971-2","volume":"18","author":"A Ghaemi","year":"2021","unstructured":"Ghaemi A, Danyali H, Kazemi K (2021) Simple, robust and secure data hiding based on CRT feature extraction and closed-loop chaotic encryption system. J Real-Time Image Process 18:221\u2013232","journal-title":"J Real-Time Image Process"},{"key":"20850_CR258","doi-asserted-by":"crossref","unstructured":"Singh P, Pradhan AK (2019) Medical image watermarking for authentication, confidentiality, tamper detection and recovery. In 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE, pp. 1\u20137","DOI":"10.1109\/ICCCNT45670.2019.8944801"},{"key":"20850_CR259","doi-asserted-by":"crossref","unstructured":"Taha DB, Taha TB (2019) Towards a new metric for watermarked image assessment. In 2019 2nd International Conference on Electrical, Communication, Computer, Power and Control Engineering (ICECCPCE), IEEE, pp. 109\u2013113.","DOI":"10.1109\/ICECCPCE46549.2019.203757"},{"issue":"03","key":"20850_CR260","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1109\/TLA.2020.9082736","volume":"18","author":"J Molina","year":"2020","unstructured":"Molina J, Ponomaryov V, Reyes R, Sadovnychiy S, Cruz C (2020) Watermarking framework for authentication and self-recovery of tampered colour images. IEEE Lat Am Trans 18(03):631\u2013638","journal-title":"IEEE Lat Am Trans"},{"issue":"4","key":"20850_CR261","doi-asserted-by":"publisher","first-page":"88","DOI":"10.23919\/JCC.2020.04.009","volume":"17","author":"G Yuan","year":"2020","unstructured":"Yuan G, Hao Q (2020) Digital watermarking secure scheme for remote sensing image protection. China Commun 17(4):88\u201398","journal-title":"China Commun"},{"issue":"17","key":"20850_CR262","doi-asserted-by":"publisher","first-page":"8045","DOI":"10.1007\/s00500-018-3441-1","volume":"23","author":"A Khan","year":"2019","unstructured":"Khan A, Sarfaraz A (2019) Novel high-capacity robust and imperceptible image steganography scheme using multi-flipped permutations and frequency entropy matching method. Soft Comput 23(17):8045\u20138056","journal-title":"Soft Comput"},{"key":"20850_CR263","doi-asserted-by":"publisher","first-page":"39826","DOI":"10.1109\/ACCESS.2019.2906912","volume":"7","author":"W Wan","year":"2019","unstructured":"Wan W, Wang J, Xu M, Li J, Sun J, Zhang H (2019) Robust image watermarking based on two-layer visual saliency-induced JND profile. IEEE Access 7:39826\u201339841","journal-title":"IEEE Access"},{"key":"20850_CR264","doi-asserted-by":"publisher","first-page":"151985","DOI":"10.1109\/ACCESS.2019.2948086","volume":"7","author":"F Ernawan","year":"2019","unstructured":"Ernawan F, Kabir MN (2019) An improved watermarking technique for copyright protection based on tchebichef moments. IEEE Access 7:151985\u2013152003","journal-title":"IEEE Access"},{"key":"20850_CR265","doi-asserted-by":"publisher","first-page":"76386","DOI":"10.1109\/ACCESS.2020.2988298","volume":"8","author":"UA Bhatti","year":"2020","unstructured":"Bhatti UA et al (2020) Hybrid watermarking algorithm using clifford algebra with arnold scrambling and chaotic encryption. IEEE Access 8:76386\u201376398","journal-title":"IEEE Access"},{"key":"20850_CR266","doi-asserted-by":"publisher","first-page":"20375","DOI":"10.1109\/ACCESS.2020.2966515","volume":"8","author":"K Wang","year":"2020","unstructured":"Wang K, Chen G, Ai Q, Cao H, Zhou P, Wu D (2020) Reversible data hiding based on structural similarity block selection. IEEE Access 8:20375\u201320385","journal-title":"IEEE Access"},{"issue":"19","key":"20850_CR267","doi-asserted-by":"publisher","first-page":"27085","DOI":"10.1007\/s11042-017-4743-5","volume":"78","author":"B Lei","year":"2019","unstructured":"Lei B et al (2019) Multipurpose watermarking scheme via intelligent method and chaotic map. Multimed Tools Appl 78(19):27085\u201327107","journal-title":"Multimed Tools Appl"},{"issue":"13","key":"20850_CR268","doi-asserted-by":"publisher","first-page":"8727","DOI":"10.1007\/s11042-018-6096-0","volume":"79","author":"B Hemamalini","year":"2020","unstructured":"Hemamalini B, Nagarajan V (2020) Wavelet transform and pixel strength-based robust watermarking using dragonflyoptimization. Multimed Tools Appl 79(13):8727\u20138746","journal-title":"Multimed Tools Appl"},{"key":"20850_CR269","doi-asserted-by":"publisher","first-page":"72308","DOI":"10.1109\/ACCESS.2020.2987914","volume":"8","author":"M Li","year":"2020","unstructured":"Li M, Yuan X, Chen H, Li J (2020) Quaternion discrete fourier transform-based color image watermarking method using quaternion QR decomposition. IEEE Access 8:72308\u201372315","journal-title":"IEEE Access"},{"key":"20850_CR270","doi-asserted-by":"publisher","first-page":"85367","DOI":"10.1109\/ACCESS.2020.2993604","volume":"8","author":"W Wang","year":"2020","unstructured":"Wang W, Wang W (2020) New high capacity reversible data hiding using the second-order difference shifting. IEEE Access 8:85367\u201385379","journal-title":"IEEE Access"},{"issue":"18","key":"20850_CR271","doi-asserted-by":"publisher","first-page":"25999","DOI":"10.1007\/s11042-019-7664-7","volume":"78","author":"A Khan","year":"2019","unstructured":"Khan A, Sarfaraz A (2019) FFT-ETM based distortion less and high payload image steganography. Multimed Tools Appl 78(18):25999\u201326022","journal-title":"Multimed Tools Appl"},{"key":"20850_CR272","doi-asserted-by":"publisher","first-page":"20263","DOI":"10.1007\/s11042-020-08879-6","volume":"79","author":"A Kamrani","year":"2020","unstructured":"Kamrani A, Zenkouar K, Najah S (2020) A new set of image encryption algorithms based on discrete orthogonal moments and Chaos theory. Multimed Tools Appl 79:20263\u201320279","journal-title":"Multimed Tools Appl"},{"issue":"17","key":"20850_CR273","doi-asserted-by":"publisher","first-page":"24903","DOI":"10.1007\/s11042-019-7626-0","volume":"78","author":"A Banerjee","year":"2019","unstructured":"Banerjee A, Jana B (2019) A robust reversible data hiding scheme for color image using reed-solomon code. Multimed Tools Appl 78(17):24903\u201324922","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"20850_CR274","doi-asserted-by":"publisher","first-page":"7267","DOI":"10.1007\/s11042-018-6461-z","volume":"78","author":"H Gao","year":"2019","unstructured":"Gao H, Gao T (2019) Double verifiable image encryption based on chaos and reversible watermarking algorithm. Multimed Tools Appl 78(6):7267\u20137288","journal-title":"Multimed Tools Appl"},{"issue":"23","key":"20850_CR275","doi-asserted-by":"publisher","first-page":"34129","DOI":"10.1007\/s11042-019-08134-7","volume":"78","author":"F Sabbane","year":"2019","unstructured":"Sabbane F, Tairi H (2019) Medical image watermarking technique based on polynomial decomposition. Multimed Tools Appl 78(23):34129\u201334155","journal-title":"Multimed Tools Appl"},{"key":"20850_CR276","doi-asserted-by":"crossref","unstructured":"Kaur G, Singh S, Rani R (2020) A High Capacity Reversible Data Hiding Technique Based on Pixel Value Ordering Using Interlock Partitioning. In 2020 7th International Conference on Signal Processing and Integrated Networks (SPIN), IEEE, pp. 727\u2013732","DOI":"10.1109\/SPIN48934.2020.9071330"},{"issue":"29","key":"20850_CR277","doi-asserted-by":"publisher","first-page":"20753","DOI":"10.1007\/s11042-020-08835-4","volume":"79","author":"L Zhang","year":"2020","unstructured":"Zhang L, Zhang X (2020) Multiple-image encryption algorithm based on bit planes and chaos. Multimed Tools Appl 79(29):20753\u201320771","journal-title":"Multimed Tools Appl"},{"issue":"15","key":"20850_CR278","doi-asserted-by":"publisher","first-page":"11069","DOI":"10.1007\/s11042-018-6177-0","volume":"79","author":"C Kumar","year":"2020","unstructured":"Kumar C, Singh AK, Kumar P (2020) Improved wavelet-based image watermarking through SPIHT. Multimed Tools Appl 79(15):11069\u201311082","journal-title":"Multimed Tools Appl"},{"key":"20850_CR279","doi-asserted-by":"crossref","unstructured":"Kumar A, Dwivedi A, Dutta MK (2020) A zero watermarking approach for biometric image security. In 2020 International Conference on Contemporary Computing and Applications (IC3A), IEEE, pp. 53\u201358","DOI":"10.1109\/IC3A48958.2020.233268"},{"key":"20850_CR280","doi-asserted-by":"crossref","unstructured":"Nawrin SSK, Saha C (2019) Differential embedding and chirikov map based image watermarking in transformed domain. In 2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2), IEEE, pp.1\u20134","DOI":"10.1109\/IC4ME247184.2019.9036680"},{"issue":"3","key":"20850_CR281","doi-asserted-by":"publisher","first-page":"1865","DOI":"10.1007\/s11042-019-08221-9","volume":"79","author":"MS Subhedar","year":"2020","unstructured":"Subhedar MS, Mankar VH (2020) Secure image steganography using framelet transform and bidiagonal SVD. Multimed Tools Appl 79(3):1865\u20131886","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"20850_CR282","doi-asserted-by":"publisher","first-page":"1169","DOI":"10.1007\/s11042-019-08191-y","volume":"79","author":"X-B Kang","year":"2020","unstructured":"Kang X-B, Lin G-F, Chen Y-J, Zhao F, Zhang E-H, Jing C-N (2020) Robust and secure zero-watermarking algorithm for color images based on majority voting pattern and hyper-chaotic encryption. Multimed Tools Appl 79(1):1169\u20131202","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"20850_CR283","doi-asserted-by":"publisher","first-page":"6845","DOI":"10.1007\/s11042-019-08212-w","volume":"79","author":"K Prabha","year":"2020","unstructured":"Prabha K, Sam IS (2020) A novel blind color image watermarking based on Walsh Hadamard Transform. Multimed Tools Appl 79(9):6845\u20136869","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"20850_CR284","doi-asserted-by":"publisher","first-page":"6503","DOI":"10.1007\/s11042-019-08290-w","volume":"79","author":"SM Darwish","year":"2020","unstructured":"Darwish SM, Al-Khafaji LDS (2020) Dual watermarking for color images: a new image copyright protection model based on the fusion of successive and segmented watermarking. Multimed Tools Appl 79(9):6503\u20136530","journal-title":"Multimed Tools Appl"},{"key":"20850_CR285","doi-asserted-by":"crossref","unstructured":"Chen K, Wang Y, Hu C, Shao H (2020) Salient object detection with boundary information. In 2020 IEEE International Conference on Multimedia and Expo (ICME), IEEE, pp. 1\u20136","DOI":"10.1109\/ICME46284.2020.9102715"},{"issue":"19","key":"20850_CR286","doi-asserted-by":"publisher","first-page":"25709","DOI":"10.1007\/s11042-018-5814-y","volume":"77","author":"KA Al-Afandy","year":"2018","unstructured":"Al-Afandy KA et al (2018) Robust hybrid watermarking techniques for different color imaging systems. Multimed Tools Appl 77(19):25709\u201325759","journal-title":"Multimed Tools Appl"},{"issue":"13","key":"20850_CR287","doi-asserted-by":"publisher","first-page":"18595","DOI":"10.1007\/s11042-019-7220-5","volume":"78","author":"C-N Yang","year":"2019","unstructured":"Yang C-N, Wu S-Y, Chou Y-S, Kim C (2019) Enhanced stego-image quality and embedding capacity for the partial reversible data hiding scheme. Multimed Tools Appl 78(13):18595\u201318616","journal-title":"Multimed Tools Appl"},{"key":"20850_CR288","doi-asserted-by":"crossref","unstructured":"Mohashin A, Dhar PK, Shimamura T (2019) Blind image watermarking based on discrete hilbert transform and polar decomposition. In 2019 11th International Conference on Knowledge and Smart Technology (KST), IEEE, pp. 78\u201381","DOI":"10.1109\/KST.2019.8687512"},{"key":"20850_CR289","doi-asserted-by":"publisher","first-page":"17885","DOI":"10.1007\/s11042-020-08644-9","volume":"79","author":"SK Singh","year":"2020","unstructured":"Singh SK, Srivastava R (2020) A robust salient object detection using edge enhanced global topographical saliency. Multimed Tools Appl 79:17885\u201317902","journal-title":"Multimed Tools Appl"},{"key":"20850_CR290","doi-asserted-by":"publisher","first-page":"17669","DOI":"10.1007\/s11042-020-08645-8","volume":"79","author":"Y Liu","year":"2020","unstructured":"Liu Y, Zhang J, Han D, Wu P, Sun Y, Moon YS (2020) A multidimensional chaotic image encryption algorithm based on the region of interest. Multimed Tools Appl 79:17669\u201317705","journal-title":"Multimed Tools Appl"},{"key":"20850_CR291","doi-asserted-by":"publisher","first-page":"25679","DOI":"10.1007\/s11042-020-09226-5","volume":"79","author":"Y Pang","year":"2020","unstructured":"Pang Y, Wu Y, Wu C, Zhang M (2020) Salient object detection via effective background prior and novel graph. Multimed Tools Appl 79:25679\u201325695","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"20850_CR292","doi-asserted-by":"publisher","first-page":"12537","DOI":"10.1007\/s11042-018-6791-x","volume":"78","author":"G Kaur","year":"2019","unstructured":"Kaur G, Kasana SS, Sharma MK (2019) An efficient watermarking scheme for enhanced high efficiency video coding\/h. 265. Multimed Tools Appl 78(9):12537\u201312559","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"20850_CR293","doi-asserted-by":"publisher","first-page":"3975","DOI":"10.1007\/s11042-019-7584-6","volume":"79","author":"R Shanthakumari","year":"2020","unstructured":"Shanthakumari R, Malliga S (2020) Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm. Multimed Tools Appl 79(5):3975\u20133991","journal-title":"Multimed Tools Appl"},{"key":"20850_CR294","doi-asserted-by":"publisher","first-page":"107255","DOI":"10.1016\/j.compeleceng.2021.107255","volume":"93","author":"DK Mahto","year":"2021","unstructured":"Mahto DK, Singh AK (2021) A survey of color image watermarking: State-of-the-art and research directions. Comput Electr Eng 93:107255","journal-title":"Comput Electr Eng"},{"key":"20850_CR295","doi-asserted-by":"publisher","first-page":"32931","DOI":"10.1109\/ACCESS.2021.3060861","volume":"9","author":"Z Zainol","year":"2021","unstructured":"Zainol Z, Teh JS, Alawida M, Alabdulatif A (2021) Hybrid SVD-based image watermarking schemes: a review. IEEE Access 9:32931\u201332968","journal-title":"IEEE Access"},{"issue":"3","key":"20850_CR296","doi-asserted-by":"publisher","first-page":"2069","DOI":"10.1007\/s10586-020-03215-x","volume":"24","author":"F Kahlessenane","year":"2021","unstructured":"Kahlessenane F, Khaldi A, Kafi R, Euschi S (2021) A robust blind medical image watermarking approach for telemedicine applications. Clust Comput 24(3):2069\u20132082","journal-title":"Clust Comput"},{"key":"20850_CR297","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.02.083","author":"W Wan","year":"2022","unstructured":"Wan W, Wang J, Zhang Y, Li J, Yu H, Sun J (2022) A comprehensive survey on robust image watermarking. Neurocomputing. https:\/\/doi.org\/10.1016\/j.neucom.2022.02.083","journal-title":"Neurocomputing"},{"key":"20850_CR298","doi-asserted-by":"publisher","first-page":"108207","DOI":"10.1016\/j.compeleceng.2022.108207","volume":"102","author":"A Aminuddin","year":"2022","unstructured":"Aminuddin A, Ernawan F (2022) AuSR2: image watermarking technique for authentication and self-recovery with image texture preservation. Comput Electr Eng 102:108207","journal-title":"Comput Electr Eng"},{"issue":"6","key":"20850_CR299","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1007\/s00371-022-02406-4","volume":"39","author":"SP Vaidya","year":"2023","unstructured":"Vaidya SP (2023) Fingerprint-based robust medical image watermarking in hybrid transform. Vis Comput 39(6):2245\u20132260","journal-title":"Vis Comput"},{"issue":"1","key":"20850_CR300","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/s11227-021-03886-2","volume":"78","author":"T Zhu","year":"2022","unstructured":"Zhu T, Qu W, Cao W (2022) An optimized image watermarking algorithm based on SVD and IWT. J Supercomput 78(1):222\u2013237","journal-title":"J Supercomput"},{"issue":"10","key":"20850_CR301","doi-asserted-by":"publisher","first-page":"4573","DOI":"10.1007\/s00371-022-02610-2","volume":"39","author":"F Hu","year":"2023","unstructured":"Hu F, Cao H, Chen S, Sun Y, Su Q (2023) A robust and secure blind color image watermarking scheme based on contourlet transform and Schur decomposition. Vis Comput 39(10):4573\u20134592","journal-title":"Vis Comput"},{"issue":"10","key":"20850_CR302","doi-asserted-by":"publisher","first-page":"15475","DOI":"10.1007\/s11042-022-13928-3","volume":"82","author":"OF Saritas","year":"2023","unstructured":"Saritas OF, Ozturk S (2023) A blind CT and DCT based robust color image watermarking method. Multimed Tools Appl 82(10):15475\u201315491","journal-title":"Multimed Tools Appl"},{"key":"20850_CR303","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-18908-3","author":"A Khan","year":"2024","unstructured":"Khan A, Wong KS, Baskaran VM (2024) Trade-off independent image watermarking using enhanced structured matrix decomposition. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-024-18908-3","journal-title":"Multimed Tools Appl"},{"key":"20850_CR304","doi-asserted-by":"crossref","unstructured":"Khan A, Wong KS, Kuribayashi M, Baskaran VM (2024) Tone-mapping resilient HDR image watermarking based on multi-transforms and saliency detection. 23rd International Conference on Electronics, Information, and Communication, xx\u2013xx, IEEE","DOI":"10.1109\/ICEIC61013.2024.10457183"},{"key":"20850_CR305","doi-asserted-by":"crossref","unstructured":"Khan A, Kuribayashi M, Wong KS, Baskaran VM (2023) HDR image watermarking based on saliency detection and quantization index modulation. 15th Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 1691\u20131696, IEEE","DOI":"10.1109\/APSIPAASC58517.2023.10317464"},{"issue":"10","key":"20850_CR306","doi-asserted-by":"publisher","first-page":"15553","DOI":"10.1007\/s11042-022-13907-8","volume":"82","author":"A Khan","year":"2023","unstructured":"Khan A, Wong KS (2023) High payload watermarking based on enhanced image saliency detection. Multimed Tools Appl 82(10):15553\u201315571","journal-title":"Multimed Tools Appl"},{"key":"20850_CR307","doi-asserted-by":"crossref","unstructured":"Khan A, Wong KS, Baskaran VM (2022) Image watermarking based on saliency detection and multiple transformations. 14th Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 1514\u20131518, IEEE","DOI":"10.23919\/APSIPAASC55919.2022.9980044"},{"key":"20850_CR308","unstructured":"Khan A, Wong KS (2021). Image watermarking based on non-newtonian effect and interpolated SWT-DWT. 13th Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 1828\u20131832, IEEE"},{"issue":"5","key":"20850_CR309","doi-asserted-by":"publisher","first-page":"7515","DOI":"10.1007\/s11042-020-10155-6","volume":"80","author":"A Khan","year":"2021","unstructured":"Khan A (2021) PCA-DTT 2D-DHCES based attack resilient imperceptible image watermarking. Multimed Tools Appl 80(5):7515\u20137527","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"20850_CR310","doi-asserted-by":"publisher","first-page":"2395","DOI":"10.1007\/s11042-020-09508-y","volume":"80","author":"A Khan","year":"2021","unstructured":"Khan A (2021) 2DOTS-multi-bit-encoding for robust and imperceptible image watermarking. Multimed Tools Appl 80(2):2395\u20132411","journal-title":"Multimed Tools Appl"},{"issue":"20","key":"20850_CR311","doi-asserted-by":"publisher","first-page":"9821","DOI":"10.1007\/s00500-019-03838-2","volume":"23","author":"R Noor","year":"2019","unstructured":"Noor R, Khan A, Sarfaraz A, Mehmood Z, Cheema AM (2019) Highly robust hybrid image watermarking approach using tchebichef transform with secured PCA and CAT encryption. Soft Comput 23(20):9821\u20139829","journal-title":"Soft Comput"},{"issue":"4","key":"20850_CR312","doi-asserted-by":"publisher","first-page":"1535","DOI":"10.1007\/s11277-018-6097-3","volume":"104","author":"R Noor","year":"2019","unstructured":"Noor R, Khan A, Sarfaraz A (2019) High performance and energy efficient image watermarking for video using a mobile device. Wireless Pers Commun 104(4):1535\u20131551","journal-title":"Wireless Pers Commun"},{"key":"20850_CR313","doi-asserted-by":"publisher","first-page":"108341","DOI":"10.1016\/j.sigpro.2021.108341","volume":"190","author":"F Li","year":"2022","unstructured":"Li F, Yu Z, Qin C (2022) GAN-based spatial image steganography with cross feedback mechanism. Signal Process 190:108341","journal-title":"Signal Process"},{"issue":"3","key":"20850_CR314","first-page":"e1481","volume":"13","author":"MA Wani","year":"2023","unstructured":"Wani MA, Sultan B (2023) Deep learning based image steganography: a review. Wiley Interdisc Rev: Data Min Knowl Discov 13(3):e1481","journal-title":"Wiley Interdisc Rev: Data Min Knowl Discov"},{"key":"20850_CR315","doi-asserted-by":"publisher","first-page":"123471","DOI":"10.1016\/j.eswa.2024.123471","volume":"249","author":"D Wang","year":"2024","unstructured":"Wang D, Yang G, Chen J, Ding X (2024) GAN-based adaptive cost learning for enhanced image steganography security. Expert Syst Appl 249:123471","journal-title":"Expert Syst Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20850-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-025-20850-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20850-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T00:04:46Z","timestamp":1759449886000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-025-20850-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,24]]},"references-count":315,"journal-issue":{"issue":"34","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["20850"],"URL":"https:\/\/doi.org\/10.1007\/s11042-025-20850-x","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,24]]},"assertion":[{"value":"11 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"N\/A. This article does not contain any studies with human participants or animals performed by any authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All authors have consent to participate.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All authors have consent to publish.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"Authors have no conflict of interest in this article. This article does not contain any studies with human participants or animals performed by any authors.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}