{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T13:20:03Z","timestamp":1762953603322},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,10,5]],"date-time":"2013-10-05T00:00:00Z","timestamp":1380931200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multidim Syst Sign Process"],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1007\/s11045-013-0257-0","type":"journal-article","created":{"date-parts":[[2013,10,4]],"date-time":"2013-10-04T11:08:28Z","timestamp":1380884908000},"page":"291-306","source":"Crossref","is-referenced-by-count":21,"title":["A geometrical attack resistant image watermarking algorithm based on histogram modification"],"prefix":"10.1007","volume":"26","author":[{"given":"Xuansen","family":"He","sequence":"first","affiliation":[]},{"given":"Tao","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Gaobo","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,10,5]]},"reference":[{"key":"257_CR1","unstructured":"Ali, H. A., & Khamis, S. A. K. (2012). Robust digital image watermarking technique based on histogram analysis. World of Computer Science and Information Technology Journal, 2(5), 163\u2013168."},{"issue":"2","key":"257_CR2","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1109\/TIFS.2012.2184093","volume":"7","author":"J Cao","year":"2012","unstructured":"Cao, J., & Huang, J. (2012). Controllable secure watermarking technique for tradeoff between robustness and security. IEEE Transactions on Information Forensics and Security, 7(2), 821\u2013826.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"257_CR3","doi-asserted-by":"crossref","first-page":"592","DOI":"10.1109\/JSTSP.2010.2049222","volume":"4","author":"M Chen","year":"2010","unstructured":"Chen, M., Chen, Z., Zeng, X., & Xiong, Z. (2010). Model order selection in reversible image watermarking. IEEE Journal of Selected Topics in Signal Processing, 4(3), 592\u2013604.","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"issue":"1","key":"257_CR4","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1109\/TIP.2011.2162424","volume":"21","author":"D Coltuc","year":"2012","unstructured":"Coltuc, D. (2012). Low distortion transform for reversible watermarking. IEEE Transactions on Image Processing, 21(1), 412\u2013417.","journal-title":"IEEE Transactions on Image Processing"},{"issue":"3","key":"257_CR5","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1109\/TSMCC.2009.2037512","volume":"40","author":"X Gao","year":"2010","unstructured":"Gao, X., Deng, C., Li, X., & Tao, D. (2010). Geometric distortion insensitive image watermarking in affine covariant regions. IEEE Transactions on Systems, Man, and Cybernetica\u2014Part C: Applications and Reviews, 40(3), 278\u2013286.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetica\u2014Part C: Applications and Reviews"},{"issue":"8","key":"257_CR6","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1109\/TCSVT.2003.815957","volume":"13","author":"X Kang","year":"2003","unstructured":"Kang, X., Huang, J., Shi, Y. Q., & Lin, Y. (2003). A DWT\u2013DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 776\u2013786.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"2","key":"257_CR7","first-page":"197","volume":"6","author":"Y Lee","year":"2012","unstructured":"Lee, Y., & Kim, J. (2012). Histogram rotation-based image watermarking with reversibility. International Journal of Security and Its Applications, 6(2), 197\u2013201.","journal-title":"International Journal of Security and Its Applications"},{"issue":"5","key":"257_CR8","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1109\/83.918569","volume":"10","author":"C-Y Lin","year":"2001","unstructured":"Lin, C.-Y., Wu, M., Bloom, J. A., Cox, I. J., Miller, M. L., & Lui, Y. M. (2001). Rotation, scale, and translation resilient public watermarking for images. IEEE Transactions on Image Processing, 10(5), 767\u2013782.","journal-title":"IEEE Transactions on Image Processing"},{"key":"257_CR9","doi-asserted-by":"crossref","unstructured":"Lu, C.-S., Sun, S.-W., & Chang, P.-C. (2005). Robust hash-based image watermarking with resistance to geometric distortions and watermark-estimation attack. In Proceedings of SPIE-IS &T electronic image SPIE5681, pp. 147\u2013163.","DOI":"10.1117\/12.586637"},{"issue":"2","key":"257_CR10","first-page":"91","volume":"2","author":"R Martinez-Noriega","year":"2011","unstructured":"Martinez-Noriega, R., & Nakano, M. (2011). High payload audio watermarking: toward channel characterization of MP3 compression. Journal of Information Hiding and Multimedia Signal Processing, 2(2), 91\u2013107.","journal-title":"Journal of Information Hiding and Multimedia Signal Processing"},{"issue":"4","key":"257_CR11","doi-asserted-by":"crossref","first-page":"199","DOI":"10.4236\/jilsa.2012.43020","volume":"2012","author":"K Pal","year":"2012","unstructured":"Pal, K., Ghosh, G., & Bhattacharya, M. (2012). Reversible digital image watermarking scheme using bit replacement and majority algorithm technique. Journal of Intelligent Learning Systems and Applications, 2012(4), 199\u2013206.","journal-title":"Journal of Intelligent Learning Systems and Applications"},{"issue":"5","key":"257_CR12","first-page":"434","volume":"5","author":"C-M Pun","year":"2010","unstructured":"Pun, C.-M., & Yuan, X.-C. (2010a). Geometric invariant digital image watermarking scheme based on histogram in DWT domain. Journal of Multimedia, 5(5), 434\u2013442.","journal-title":"Journal of Multimedia"},{"issue":"3","key":"257_CR13","doi-asserted-by":"crossref","first-page":"171","DOI":"10.4156\/jdcta.vol4.issue3.17","volume":"4","author":"C-M Pun","year":"2010","unstructured":"Pun, C.-M., & Yuan, X.-C. (2010b). Robust and geometric invariant watermarking scheme using block and gray-level histograms. International Journal of Digital Content Technology and its Applications, 4(3), 171\u2013183.","journal-title":"International Journal of Digital Content Technology and its Applications"},{"issue":"2","key":"257_CR14","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1049\/iet-ipr.2010.0347","volume":"6","author":"K Ramanjaneyulu","year":"2012","unstructured":"Ramanjaneyulu, K., & Rajarajeswari, K. (2012). Wavelet-based oblivious image watermarking scheme using genetic algorithm. IET Image Processing, 6(2), 364\u2013373.","journal-title":"IET Image Processing"},{"issue":"1","key":"257_CR15","first-page":"95","volume":"15","author":"B Surekha","year":"2013","unstructured":"Surekha, B., & Swamy, G. N. (2013). Sensitive digital image watermarking for copyright protection. International Journal of Network Security, 15(1), 95\u2013103.","journal-title":"International Journal of Network Security"},{"issue":"6","key":"257_CR16","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1109\/TCSVT.2008.918843","volume":"18","author":"S Xiang","year":"2008","unstructured":"Xiang, S., Kim, H. J., & Huang, J. (2008a). Invariant image watermarking based on statistical features in the low-frequency domain. IEEE Transactions on Circuits and Systems for Video Technology, 18(6), 777\u2013790.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"10","key":"257_CR17","doi-asserted-by":"crossref","first-page":"2372","DOI":"10.1016\/j.sigpro.2008.03.019","volume":"88","author":"S Xiang","year":"2008","unstructured":"Xiang, S., Kim, H. J., & Huang, J. (2008b). Audio watermarking robust against time-scale modification and MP3 compression. Signal Processing, 88(10), 2372\u20132387.","journal-title":"Signal Processing"},{"key":"257_CR18","first-page":"482","volume":"44","author":"RI Zaghloul","year":"2008","unstructured":"Zaghloul, R. I., & Al-Rawashdeh, E. F. (2008). HSV image watermarking scheme based on visual cryptography. World Academy of Science, Engineering and Technology, 44, 482\u2013485.","journal-title":"World Academy of Science, Engineering and Technology"},{"issue":"2","key":"257_CR19","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1109\/TIP.2010.2066981","volume":"20","author":"X Zhang","year":"2011","unstructured":"Zhang, X., Wang, S., Qian, Z., & Feng, G. (2011). Reference sharing mechanism for watermark self-embedding. IEEE Transactions on Image Processing, 20(2), 485\u2013495.","journal-title":"IEEE Transactions on Image Processing"}],"container-title":["Multidimensional Systems and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11045-013-0257-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11045-013-0257-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11045-013-0257-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T01:52:14Z","timestamp":1564365134000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11045-013-0257-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,5]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["257"],"URL":"https:\/\/doi.org\/10.1007\/s11045-013-0257-0","relation":{},"ISSN":["0923-6082","1573-0824"],"issn-type":[{"value":"0923-6082","type":"print"},{"value":"1573-0824","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,5]]}}}