{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T08:28:05Z","timestamp":1770280085149,"version":"3.49.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T00:00:00Z","timestamp":1621900800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T00:00:00Z","timestamp":1621900800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the Science and Technology Research Project in Department of Education of Jiangxi Province","award":["GJJ191599"],"award-info":[{"award-number":["GJJ191599"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s11227-021-03886-2","type":"journal-article","created":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T14:02:57Z","timestamp":1621951377000},"page":"222-237","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["An optimized image watermarking algorithm based on SVD and IWT"],"prefix":"10.1007","volume":"78","author":[{"given":"Ting","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Wen","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Wenliang","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,25]]},"reference":[{"issue":"6","key":"3886_CR1","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1109\/34.295913","volume":"16","author":"R Adams","year":"2002","unstructured":"Adams R, Bischof L (2002) Seeded region growing. IEEE Trans Pattern Anal Mach Intell 16(6):641\u2013647","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"3886_CR2","doi-asserted-by":"crossref","unstructured":"Xuan TP, Siarry P, Oulhadj H (2018) Integrating fuzzy entropy clustering with an improved PSO for MRI brain image segmentation. Appl Soft Comput 65, S1568494618300097.","DOI":"10.1016\/j.asoc.2018.01.003"},{"issue":"20","key":"3886_CR3","doi-asserted-by":"publisher","first-page":"26351","DOI":"10.1007\/s11042-018-5863-2","volume":"77","author":"Y Niu","year":"2018","unstructured":"Niu Y, Chen J, Wenzhong G (2018) Meta-metric for saliency detection evaluation metrics based on application preference. Multimed Tools Appl Online Public 77(20):26351\u201326369","journal-title":"Multimed Tools Appl Online Public"},{"key":"3886_CR4","unstructured":"Xu Y, Zhu C, Li C, Zhang Q, Meng X, Wang X (2018) Field crop segmentation based on color coefficient reverse mutation particle swarm optimization algorithm. Trans Chinese Soc Agric Eng"},{"key":"3886_CR5","unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography[D]. The University of Buckingham, United Kingdom"},{"key":"3886_CR6","unstructured":"Thakkar F, Srivastava VK (2021) An adaptive, secure and imperceptive image watermarking using swarm intelligence, Arnold transform, SVD and DWT.\u00a0Multimed Tools Appl 1\u201318"},{"key":"3886_CR7","doi-asserted-by":"publisher","unstructured":"Priya C, Ramya C (2020) Robust and secure video watermarking based on cellular automata and singular value decomposition for copyright protection. Circ Syst Sign Process DOI:https:\/\/doi.org\/10.1007\/s00034-020-01585-6","DOI":"10.1007\/s00034-020-01585-6"},{"issue":"4","key":"3886_CR8","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1007\/s11704-015-4362-0","volume":"9","author":"X Chen","year":"2015","unstructured":"Chen X, Li A, Xue\u2019e Z, Wenzhong G, Gang H (2015) Runtime model based approach to IoT application development. Front Comp Sci 9(4):540\u2013553","journal-title":"Front Comp Sci"},{"key":"3886_CR9","doi-asserted-by":"crossref","unstructured":"Chakraborty R, Sushil R, Garg ML (2018) An improved pso-based multilevel image segmentation technique using minimum cross-entropy thresholding. Arab J Sci Eng (13), 1\u201316","DOI":"10.1007\/s13369-018-3400-2"},{"key":"3886_CR10","doi-asserted-by":"crossref","unstructured":"Wenzhong G, Guolong C (2015) Human action recognition via multi-task learning base on spatial-temporal feature. Inform Sci 320, 418\u2013428","DOI":"10.1016\/j.ins.2015.04.034"},{"key":"3886_CR11","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.knosys.2017.09.033","volume":"138","author":"S Wang","year":"2017","unstructured":"Wang S, Guo W (2017) Robust co-clustering via dual local learning and high-order matrix factorization. Knowl-Based Syst 138:176\u2013187","journal-title":"Knowl-Based Syst"},{"issue":"4","key":"3886_CR12","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1109\/TNN.2005.849822","volume":"16","author":"G Dong","year":"2005","unstructured":"Dong G, Xie M (2005) Color clustering and learning for image segmentation based on neural networks. IEEE Trans Neural Netw 16(4):925\u2013936","journal-title":"IEEE Trans Neural Netw"},{"key":"3886_CR13","doi-asserted-by":"crossref","unstructured":"Davis LS (1975) A survey of edge detection techniques. Comput Graph Image Process 4(3), 248\u2013270","DOI":"10.1016\/0146-664X(75)90012-X"},{"key":"3886_CR14","doi-asserted-by":"crossref","unstructured":"Ernawan F (2016) Robust image watermarking based on psychovisual threshold. J ICT Res Appl 10(3):228\u2013242","DOI":"10.5614\/itbj.ict.res.appl.2016.10.3.3"},{"key":"3886_CR15","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.knosys.2017.09.033","volume":"138","author":"S Wang","year":"2017","unstructured":"Wang S, Wenzhong G (2017) Robust co-clustering via dual local learning and high-order matrix factorization. Knowl-Based Syst 138:176\u2013187","journal-title":"Knowl-Based Syst"},{"key":"3886_CR16","doi-asserted-by":"crossref","unstructured":"Samat NA, Salleh MNM (2017) A study of data imputation using fuzzy C-means with particle swarm optimization","DOI":"10.1007\/978-3-319-51281-5_10"},{"issue":"5","key":"3886_CR17","first-page":"989","volume":"45","author":"G Liu","year":"2015","unstructured":"Liu G, Huang X, Wenzhong G, Yuzhen N, Guolong C (2015) Multilayer obstacle-avoiding X-architecture steiner minimal tree construction based on particle swarm optimization. IEEE Trans Cybern 45(5):989\u20131002","journal-title":"IEEE Trans Cybern"},{"key":"3886_CR18","doi-asserted-by":"crossref","unstructured":"Jones G, Willett P, Glen RC, Leach AR, Taylor R (1997) Development and validation of agenetic algorithm for flexible docking 267, 0\u2013748","DOI":"10.1006\/jmbi.1996.0897"},{"key":"3886_CR19","doi-asserted-by":"publisher","first-page":"59504","DOI":"10.1109\/ACCESS.2019.2913757","volume":"7","author":"LL Kang","year":"2019","unstructured":"Kang LL et al (2019) Selecting hyper-parameters of gaussian process regression based on non-inertial particle swarm optimization in internet of things. IEEE ACCESS 7:59504\u201359513","journal-title":"IEEE ACCESS"},{"key":"3886_CR20","doi-asserted-by":"crossref","unstructured":"Kang LL, Chen RS, Cao WL et al (2020) Non-inertial opposition-based particle swarm optimization and its theoretical analysis for deep learning applications. Appl Soft Comput 88: 106038","DOI":"10.1016\/j.asoc.2019.106038"},{"key":"3886_CR21","doi-asserted-by":"crossref","unstructured":"Kun G, Wenzhong G, Yuzhong C, Qirong Q, Qishan Z (2015) Community discovery by propagating local and global information based on the MapReduce model. Inform Sci 323, 73\u201393","DOI":"10.1016\/j.ins.2015.06.032"},{"issue":"3","key":"3886_CR22","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1109\/TNSM.2016.2554143","volume":"13","author":"B Lin","year":"2016","unstructured":"Lin B, Guo W, Xiong N et al (2016) A pretreatment workflow scheduling approach for big data applications in multicloud environments. IEEE Trans Netw Serv Manage 13(3):581\u2013594","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"3886_CR23","doi-asserted-by":"crossref","unstructured":"Mirghasemi S, Andreae P, Zhang M, Rayudu R (2017) Severely noisy image segmentation via wavelet shrinkage using PSO and Fuzzy C-Means.Comput Intell","DOI":"10.1109\/SSCI.2016.7850051"},{"key":"3886_CR24","doi-asserted-by":"crossref","unstructured":"RahkarFarshi T, Demirci R, Feiziderakhshi MR (2018) Image clustering with optimization algorithms and color space. Entropy 20(4), 296","DOI":"10.3390\/e20040296"},{"issue":"2","key":"3886_CR25","first-page":"121","volume":"4","author":"R Liu","year":"2002","unstructured":"Liu R, Tan T (2002) An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimedia 4(2):121\u2013128","journal-title":"IEEE Trans Multimedia"},{"issue":"2","key":"3886_CR26","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1049\/iet-cvi.2016.0027","volume":"11","author":"YZ Niu","year":"2017","unstructured":"Niu YZ, Lin W, Ke X et al (2017) (2017) Fitting-based optimization for image visual salient object detection. IET Comput Vision 11(2):161\u2013172","journal-title":"IET Comput Vision"},{"key":"3886_CR27","doi-asserted-by":"crossref","unstructured":"Pham TX, Siarry P, Oulhadj H (2017) Image clustering using improved particle swarm optimization","DOI":"10.1007\/978-3-319-74176-5_31"},{"issue":"1","key":"3886_CR28","first-page":"62","volume":"9","author":"N Ostu","year":"2007","unstructured":"Ostu N (2007) A threshold selection method from gray-histogram. IEEE Trans Syst Man Cybern 9(1):62\u201366","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"3886_CR29","doi-asserted-by":"crossref","unstructured":"Shnayderman A, Gusev A, Eskicioglu AM (2006) An SVD-based grayscale image quality measure for local and global assessment. IEEE Trans Image Process 15: 422\u2013429.","DOI":"10.1109\/TIP.2005.860605"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03886-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-03886-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03886-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,4]],"date-time":"2022-01-04T12:15:58Z","timestamp":1641298558000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-03886-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,25]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["3886"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-03886-2","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,25]]},"assertion":[{"value":"11 May 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 May 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}