{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:47:45Z","timestamp":1762004865568},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,3,31]],"date-time":"2017-03-31T00:00:00Z","timestamp":1490918400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multidim Syst Sign Process"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1007\/s11045-017-0490-z","type":"journal-article","created":{"date-parts":[[2017,3,31]],"date-time":"2017-03-31T18:24:05Z","timestamp":1490984645000},"page":"1095-1117","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Utilizing neighborhood coefficient correlation: a new image watermarking technique robust to singular and hybrid attacks"],"prefix":"10.1007","volume":"29","author":[{"given":"Shabir A.","family":"Parah","sequence":"first","affiliation":[]},{"given":"Javaid A.","family":"Sheikh","sequence":"additional","affiliation":[]},{"given":"Nazir A.","family":"Loan","sequence":"additional","affiliation":[]},{"given":"Farhana","family":"Ahad","sequence":"additional","affiliation":[]},{"given":"Ghulam M.","family":"Bhat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,31]]},"reference":[{"issue":"01","key":"490_CR1","first-page":"125","volume":"4","author":"GM Bhat","year":"2010","unstructured":"Bhat, G. M., Parah, S. A., & Sheikh, J. A. (2010). FPGA implementation of novel complex PN code generator based data scrambler and descrambler. International, Journal of Science and Technology, 4(01), 125\u2013135.","journal-title":"International, Journal of Science and Technology"},{"issue":"2015","key":"490_CR2","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.future.2014.07.001","volume":"43\u201344","author":"A Castiglione","year":"2015","unstructured":"Castiglione, A., Pizzolante, R., Santis, A. D., Carpentieri, B., Castiglione, A., & Palmieri, F. (2015). Cloud-based adaptive compression and secure management services for 3D healthcare data. Future Generation Computer Systems, 43\u201344(2015), 120\u2013134.","journal-title":"Future Generation Computer Systems"},{"key":"490_CR3","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I Cox","year":"1997","unstructured":"Cox, I., Kilian, J., Leighton, T., & Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6, 1673\u20131687.","journal-title":"IEEE Transactions on Image Processing"},{"key":"490_CR4","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.aeue.2013.08.018","volume":"68","author":"C Das","year":"2014","unstructured":"Das, C., Panigrahi, S., Sharma, V. K., & Mahapatra, K. K. (2014). A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. International Journal of Electronics and Communications (AE\u00dc), 68, 244\u2013253.","journal-title":"International Journal of Electronics and Communications (AE\u00dc)"},{"key":"490_CR5","doi-asserted-by":"crossref","unstructured":"Elbadri, M., Peterkin, R., Groza, V., Ionescu, D., & Saddik, A. E. (2005). Hardware support of JPEG. In: Proceedings of Canadian conference on electrical and computer engineering (pp. 812\u2013815).","DOI":"10.1109\/CCECE.2005.1557052"},{"key":"490_CR6","doi-asserted-by":"crossref","first-page":"964","DOI":"10.1016\/j.ijleo.2015.09.205","volume":"127","author":"S Fazli","year":"2016","unstructured":"Fazli, S., & Moeini, M. (2016). A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks. Optik, 127, 964\u2013972.","journal-title":"Optik"},{"key":"490_CR7","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.jvcir.2015.03.009","volume":"30","author":"J Guo","year":"2015","unstructured":"Guo, J., Zheng, P., & Huang, J. (2015). Secure watermarking scheme against watermark attacks in the encrypted domain. Journal of Visual Communication and Image Representation, 30, 125\u2013135.","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"490_CR8","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/83.736686","volume":"8","author":"CT Hsu","year":"1999","unstructured":"Hsu, C. T., & Wu, J. L. (1999). Hidden digital watermarks in images. IEEE Transactions on Image Processing, 8, 58\u201368.","journal-title":"IEEE Transactions on Image Processing"},{"key":"490_CR9","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1109\/TCSVT.2009.2035842","volume":"20","author":"NK Kalantari","year":"2010","unstructured":"Kalantari, N. K., Ahadi, S. M., & Vafadust, M. (2010). A robust image watermarking in the ridgelet domain using universally optimum decoder. IEEE Transactions on Circuits and Systems for Video Technology, 20, 396\u2013406.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"8","key":"490_CR10","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1109\/TCSVT.2003.815957","volume":"13","author":"X Kang","year":"2003","unstructured":"Kang, X., Huang, J., Shi, Y. Q., & Lin, Y. (2003). A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Transactions on Circuits and Systems for Video Technology, 13(8), 776\u2013786.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"490_CR11","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.optlaseng.2013.08.021","volume":"53","author":"J Lang","year":"2014","unstructured":"Lang, J., & Zhang, Z. (2014). Blind digital watermarking method in the fractional Fourier transform domain. Optics and Lasers in Engineering, 53, 112\u2013121.","journal-title":"Optics and Lasers in Engineering"},{"key":"490_CR12","unstructured":"Lee, J. S., & Li, B. (2014). Image protection technique that resists large scale cropping (pp. 60\u201373). Jan-Mar: IEEE MultiMedia."},{"key":"490_CR13","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1109\/30.883387","volume":"46","author":"SD Lin","year":"2000","unstructured":"Lin, S. D., & Chen, C. F. (2000). A robust DCT-based watermarking for copyright protection. IEEE Transactions on Consumer Electronics, 46, 415\u201321.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"490_CR14","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.csi.2009.06.004","volume":"32","author":"SD Lin","year":"2010","unstructured":"Lin, S. D., Shie, S. C., & Guo, J. Y. (2010). Improving the robustness of DCT-based image watermarking against JPEG compression. Computer Standards & Interfaces, 32, 54\u201360.","journal-title":"Computer Standards & Interfaces"},{"key":"490_CR15","doi-asserted-by":"crossref","unstructured":"Li, Z., Yap, K. H., & Lei, B. Y. (2011). A new blind robust image watermarking scheme in SVD-DCT composite domain. In: Proceedings of 2011 18th IEEE international conference on image processing (ICIP) (pp. 2757\u20132260).","DOI":"10.1109\/ICIP.2011.6116241"},{"key":"490_CR16","doi-asserted-by":"crossref","unstructured":"Lu, Z. M., Zheng, H. Y., & Huang, J. (2007). A digital watermarking scheme based on DCT and SVD. In: Proceedings of third international conference on intelligent information hiding and multimedia signal processing (pp. 241\u2013244).","DOI":"10.1109\/IIH-MSP.2007.13"},{"key":"490_CR17","unstructured":"Ma, F., Zhang, J. P., Zhang, W. (2012). A blind watermarking technology based on DCT domain international conference on computer science and service system (pp. 398\u2013401)."},{"key":"490_CR18","unstructured":"Parah, S. A., Sheikh, J. A., & Bhat, G. M. (2014). Fragility Evaluation of Intermediate Significant Bit Embedding (ISBE) Based Digital Image Watermarking Scheme for Content Authentication (pp. 1\u20136). ICEACC, Reva Banglore: IEEE international conference proceeding."},{"key":"490_CR19","doi-asserted-by":"publisher","unstructured":"Parah, S. A., Sheikh, J. A., Ahad, F., Loan, N. A., & Bhat, G. M. (2015). Information hiding in medical images: A robust medical image watermarking system for E-healthcare. Multimedia Tools and Applications . doi:\n                        10.1007\/s11042-015-3127-y\n                        \n                    .","DOI":"10.1007\/s11042-015-3127-y"},{"key":"490_CR20","first-page":"10141","volume":"49","author":"SA Parah","year":"2012","unstructured":"Parah, S. A., Sheikh, J. A., & Bhat, G. M. (2012). On the realization of a secure, high capacity data embedding technique using joint top-down and down- top embedding approach. Computer Science and Engineering, 49, 10141\u201310146.","journal-title":"Computer Science and Engineering"},{"key":"490_CR21","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.compeleceng.2013.11.006","volume":"40","author":"SA Parah","year":"2014","unstructured":"Parah, S. A., Sheikh, J. A., Hafiz, A. M., & Bhat, G. M. (2014). Data hiding in scrambled images: A new double layer security data hiding technique. Computers and Electrical Engineering, 40, 70\u201382.","journal-title":"Computers and Electrical Engineering"},{"key":"490_CR22","doi-asserted-by":"crossref","first-page":"1597","DOI":"10.1016\/j.dsp.2010.03.010","volume":"20","author":"JC Patra","year":"2010","unstructured":"Patra, J. C., Phua, J. E., & Bornand, C. (2010). A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digital Signal Process, 20, 1597\u2013611.","journal-title":"Digital Signal Process"},{"key":"490_CR23","doi-asserted-by":"publisher","unstructured":"Pizzolante, R., Castiglione, A., Carpentieri, B., Santis, A. D., Palmieri, F., & Castiglione, A. (2015). Format-independent protection of DNA microarray images. In 2015 IEEE 10th international conference on P2P, parallel, grid, cloud and internet computing (pp. 351\u2013357). doi:\n                        10.1109\/3PGCIC.2015.138\n                        \n                    .","DOI":"10.1109\/3PGCIC.2015.138"},{"issue":"1","key":"490_CR24","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1016\/j.eswa.2011.07.059","volume":"39","author":"RS Run","year":"2012","unstructured":"Run, R. S., Horng, S. J., Lai, J. L., Kao, T. W., & Chen, R. J. (2012). An improved SVD based watermarking technique for copyright protection. Expert Systems with Applications, 39(1), 673\u2013689.","journal-title":"Expert Systems with Applications"},{"key":"490_CR25","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1016\/j.aeue.2011.09.001","volume":"66","author":"H Sadreazami","year":"2012","unstructured":"Sadreazami, H., & Amini, M. (2012). A robust spread spectrum based image watermarking in ridgelet domain. AEU International Journal of Electronics and Communications, 66, 364\u2013371.","journal-title":"AEU International Journal of Electronics and Communications"},{"key":"490_CR26","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/ICIP.1994.413536","volume":"2","author":"RG Schyndel","year":"1996","unstructured":"Schyndel, R. G., Tirkel, A. Z., & Osborne, C. F. (1996). A digital watermarking. Proceedings of IEEE International Conference on Image Processing, 2, 86\u201390.","journal-title":"Proceedings of IEEE International Conference on Image Processing"},{"key":"490_CR27","doi-asserted-by":"publisher","unstructured":"Sun, L., XU, J., Liu, S., Zhang, S., Li, Y., & Shen, C., (2016). A robust image watermarking scheme using Arnold transform and BP neural network. Neural Computing and Applications. doi:\n                        10.1007\/s00521-016-2788-4\n                        \n                    .","DOI":"10.1007\/s00521-016-2788-4"},{"key":"490_CR28","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/30.125072","volume":"38","author":"GK Wallace","year":"1992","unstructured":"Wallace, G. K. (1992). The JPEG still picture compression standard. IEEE Transactions on Consumer Electronics, 38, 18\u201324.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"490_CR29","first-page":"1","volume":"4","author":"NI Wu","year":"2007","unstructured":"Wu, N. I., & Hwang, M. S. (2007). Data hiding: Current status and key issues. International Journal of Network Security, 4, 1\u20139.","journal-title":"International Journal of Network Security"}],"container-title":["Multidimensional Systems and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11045-017-0490-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11045-017-0490-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11045-017-0490-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,20]],"date-time":"2018-03-20T05:36:16Z","timestamp":1521524176000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11045-017-0490-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,31]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["490"],"URL":"https:\/\/doi.org\/10.1007\/s11045-017-0490-z","relation":{},"ISSN":["0923-6082","1573-0824"],"issn-type":[{"value":"0923-6082","type":"print"},{"value":"1573-0824","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,31]]}}}