{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:17:45Z","timestamp":1774019865857,"version":"3.50.1"},"reference-count":87,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,2,23]],"date-time":"2021-02-23T00:00:00Z","timestamp":1614038400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,23]],"date-time":"2021-02-23T00:00:00Z","timestamp":1614038400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11277-021-08177-w","type":"journal-article","created":{"date-parts":[[2021,2,23]],"date-time":"2021-02-23T18:20:47Z","timestamp":1614104447000},"page":"3225-3249","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":82,"title":["Robust Digital Watermarking Techniques for Copyright Protection of Digital Data: A Survey"],"prefix":"10.1007","volume":"118","author":[{"given":"Poonam","family":"Kadian","sequence":"first","affiliation":[]},{"given":"Shiafali M.","family":"Arora","sequence":"additional","affiliation":[]},{"given":"Nidhi","family":"Arora","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,23]]},"reference":[{"issue":"12","key":"8177_CR1","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox, I. J., Kilian, J., Leighton, F. T., & Shamoon, T. (1997). Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing, 6(12), 1673\u20131687.","journal-title":"IEEE Transactions on Image Processing"},{"key":"8177_CR2","first-page":"226","volume":"3657","author":"M Kutter","year":"1999","unstructured":"Kutter, M., & Petitcolas, F. A. P. (1999). Fair benchmark for image watermarking systems in security and watermarking of multimedia contents. International Society for Optics and Photonics, 3657, 226\u2013240.","journal-title":"International Society for Optics and Photonics"},{"key":"8177_CR3","doi-asserted-by":"crossref","first-page":"820936","DOI":"10.1155\/S1110865702000525","volume":"2","author":"IJ Cox","year":"2002","unstructured":"Cox, I. J., & Miller, M. L. (2002). The first 50 years of electronic watermarking. EURASIP Journal on Advances in Signal Processing, 2, 820936.","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"key":"8177_CR4","first-page":"2001","volume-title":"Digital watermarking. Chapter 5\u2014Watermarking with Side Information","author":"IJ Cox","year":"2001","unstructured":"Cox, I. J., Miller, M. L., & Bloom, J. A. (2001). Digital watermarking. Chapter 5\u2014Watermarking with Side Information (p. 2001). Amsterdam: Elseiver."},{"issue":"1","key":"8177_CR5","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1080\/02533839.2012.726041","volume":"36","author":"ME Farfoura","year":"2013","unstructured":"Farfoura, M. E., Horng, S.-J., & Wang, X. (2013). A novel blind reversible method for watermarking relational databases. Journal of the Chinese Institute of Engineers., 36(1), 87\u201397.","journal-title":"Journal of the Chinese Institute of Engineers."},{"issue":"2","key":"8177_CR6","first-page":"199","volume":"5","author":"A Mishra","year":"2011","unstructured":"Mishra, A., Jain, A., Narwaria, M., & Agarwal, C. (2011). An experimental study into objective quality assessment of watermarked images. International Journal of Image Processing (IJIP), 5(2), 199.","journal-title":"International Journal of Image Processing (IJIP)"},{"key":"8177_CR7","doi-asserted-by":"crossref","unstructured":"Abdel-Aziz, B., & Chouinard, J.-Y. (2003). On perceptual quality of watermarked images\u2013an experimental approach. In: International Workshop on Digital Watermarking, pp. 277\u2013288. Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-540-24624-4_21"},{"issue":"6","key":"8177_CR8","doi-asserted-by":"crossref","first-page":"725","DOI":"10.7763\/IJMLC.2012.V2.223","volume":"2","author":"V Chaudhary","year":"2012","unstructured":"Chaudhary, V., Mishra, A., Mehta, R., Verma, M., Singh, R. P., & Rajpal, N. (2012). Watermarking of grayscale images in DCT domain using least-squares support vector regression. International Journal of Machine Learning and Computing, 2(6), 725.","journal-title":"International Journal of Machine Learning and Computing"},{"issue":"3","key":"8177_CR9","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1016\/S0165-1684(98)00017-6","volume":"66","author":"N Nikolaidis","year":"1998","unstructured":"Nikolaidis, N., & Pitas, I. (1998). Robust image watermarking in the spatial domain. Signal Processing, 66(3), 385\u2013403.","journal-title":"Signal Processing"},{"issue":"4","key":"8177_CR10","first-page":"505","volume":"24","author":"C-C Chang","year":"2000","unstructured":"Chang, C.-C., Hwang, K.-F., & Hwang, M.-S. (2000). Digital watermarking scheme using human visual effects. Informatica (Ljubljana), 24(4), 505\u2013511.","journal-title":"Informatica (Ljubljana)"},{"issue":"2","key":"8177_CR11","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1109\/TIFS.2006.873652","volume":"1","author":"IG Karybali","year":"2006","unstructured":"Karybali, I. G., & Berberidis, K. (2006). Efficient spatial image watermarking via new perceptual masking and blind detection schemes. IEEE Transactions on Information Forensics and security, 1(2), 256\u2013274.","journal-title":"IEEE Transactions on Information Forensics and security"},{"key":"8177_CR12","doi-asserted-by":"crossref","unstructured":"Cheng, L.-M., Cheng, L. L., Chan, C. K., & Ng, K. W. (2004) Digital watermarking based on frequency random position insertion. In ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004 (vol. 2, pp. 977\u2013982)","DOI":"10.1109\/ICARCV.2004.1468975"},{"key":"8177_CR13","doi-asserted-by":"crossref","first-page":"36","DOI":"10.9790\/0661-0613641","volume":"6","author":"D Chopra","year":"2012","unstructured":"Chopra, D., Gupta, P., Sanjay, G., & Gupta, A. (2012). LSB based digital image watermarking for gray scale image. IOSR Journal of Computer Engineering (IOSRJCE), 6, 36\u201341.","journal-title":"IOSR Journal of Computer Engineering (IOSRJCE)"},{"issue":"16\u201317","key":"8177_CR14","doi-asserted-by":"crossref","first-page":"3904","DOI":"10.1016\/j.optcom.2011.04.004","volume":"284","author":"Z Wenyin","year":"2011","unstructured":"Wenyin, Z., & Shih, F. Y. (2011). Semi-fragile spatial watermarking based on local binary pattern operators. Optics Communication, 284(16\u201317), 3904\u20133912.","journal-title":"Optics Communication"},{"key":"8177_CR15","doi-asserted-by":"crossref","unstructured":"Chang J.D., Chen, B.H. & Tsai, C.S. (2013). LBP-based fragile watermarking scheme for image tamper detection and recovery. In 2013 IEEE International Symposium NextGeneration Electronics (ISNE) (pp. 173\u2013176)","DOI":"10.1109\/ISNE.2013.6512330"},{"issue":"1","key":"8177_CR16","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/83.736686","volume":"8","author":"C-T Hsu","year":"1999","unstructured":"Hsu, C.-T., & Ja-Ling, Wu. (1999). Hidden digital watermarks in images. IEEE Transactions on Image Processing, 8(1), 58\u201368.","journal-title":"IEEE Transactions on Image Processing"},{"key":"8177_CR17","unstructured":"Singh, D., Choudhary, N., & Agrawal, M. (2012). Spatial and frequency domain for grey level digital images. IJCA Special Issue on Communication Security (comnetcs) (pp. 16\u201320)."},{"issue":"1","key":"8177_CR18","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/TMM.2003.808816","volume":"5","author":"WC Chu","year":"2003","unstructured":"Chu, W. C. (2003). DCT-based image watermarking using subsampling. IEEE Transactions on Multimedia, 5(1), 34\u201338.","journal-title":"IEEE Transactions on Multimedia"},{"key":"8177_CR19","doi-asserted-by":"crossref","unstructured":"Yavuz, E., & Telatar, Z. (2006). SVD adapted DCT domain DC subband image watermarking against watermark ambiguity. In Multimedia Content Representation, Classification and Security (pp. 66\u201373)","DOI":"10.1007\/11848035_11"},{"issue":"10","key":"8177_CR20","doi-asserted-by":"crossref","first-page":"1405","DOI":"10.1016\/j.patrec.2004.11.027","volume":"26","author":"M Eyadat","year":"2005","unstructured":"Eyadat, M., & Vasikarla, S. (2005). Performance evaluation of an incorporated DCT block-based watermarking algorithm with human visual system model. Pattern Recognition Letters, 26(10), 1405\u20131411.","journal-title":"Pattern Recognition Letters"},{"issue":"2","key":"8177_CR21","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/18.119724","volume":"38","author":"O Rioul","year":"1992","unstructured":"Rioul, O., & Duhamel, P. (1992). Fast algorithms for discrete and continuous wavelet transforms. IEEE Transactions on Information Theory, 38(2), 569\u2013586.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"10","key":"8177_CR22","doi-asserted-by":"crossref","first-page":"7040","DOI":"10.1016\/j.eswa.2010.03.014","volume":"37","author":"X-Y Wang","year":"2010","unstructured":"Wang, X.-Y., Yang, H.-Y., & Zhong-Kai, Fu. (2010). A new wavelet-based image denoising using undecimated discrete wavelet transform and least squares support vector machine. Expert Systems with Applications, 37(10), 7040\u20137049.","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"8177_CR23","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/BF02476026","volume":"4","author":"I Daubechies","year":"1998","unstructured":"Daubechies, I., & Sweldens, W. (1998). Factoring wavelet transforms into lifting steps. Journal of Fourier Analysis and Applications, 4(3), 247\u2013269.","journal-title":"Journal of Fourier Analysis and Applications"},{"key":"8177_CR24","doi-asserted-by":"crossref","unstructured":"Verma, V.S., & Jha, R.K. (2015). Improved watermarking technique based on significant difference of lifting wavelet coefficients. Signal, Image and Video Processing, 9(6), 1443\u20131450.","DOI":"10.1007\/s11760-013-0603-6"},{"issue":"8","key":"8177_CR25","doi-asserted-by":"crossref","first-page":"1097","DOI":"10.1109\/82.718818","volume":"45","author":"C-T Hsu","year":"1998","unstructured":"Hsu, C.-T., & Ja-Ling, Wu. (1998). Multiresolution watermarking for digital images. IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, 45(8), 1097\u20131101.","journal-title":"IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing"},{"key":"8177_CR26","unstructured":"Lie, W.-N., Lin, G.-S., Wu, C.-L., & Wang, T.-C. (2000). Robust image watermarking on the DCT domain. In Proceedings ISCAS 2000 Circuits and Systems, 2000, Geneva."},{"issue":"1","key":"8177_CR27","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/83.817598","volume":"9","author":"JR Hernandez","year":"2000","unstructured":"Hernandez, J. R., Amado, M., & Perez-Gonzalez, F. (2000). DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Transactions on Image Processing, 9(1), 55\u201368.","journal-title":"IEEE Transactions on Image Processing"},{"issue":"5","key":"8177_CR28","doi-asserted-by":"crossref","first-page":"783","DOI":"10.1109\/83.918570","volume":"10","author":"M Barni","year":"2001","unstructured":"Barni, M., Bartolini, F., & Piva, A. (2001). Improved wavelet-based watermarking through pixel-wise masking. IEEE Transactions on Image Processing, 10(5), 783\u2013791.","journal-title":"IEEE Transactions on Image Processing"},{"issue":"6","key":"8177_CR29","doi-asserted-by":"crossref","first-page":"1657","DOI":"10.1007\/BF02831844","volume":"11","author":"SU Liyun","year":"2006","unstructured":"Liyun, S. U., Hong, M. A., & Shifu, T. (2006). Adaptive image digital watermarking with DCT and FCM. Wuhan University Journal of Natural Sciences, 11(6), 1657\u20131660.","journal-title":"Wuhan University Journal of Natural Sciences"},{"issue":"6","key":"8177_CR30","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1007\/s11760-013-0603-6","volume":"9","author":"VS Verma","year":"2015","unstructured":"Verma, V. S., & Jha, R. K. (2015). Improved watermarking technique based on significant difference of lifting wavelet coefficients. Signal, Image and Video Processing, 9(6), 1443\u20131450.","journal-title":"Signal, Image and Video Processing"},{"key":"8177_CR31","first-page":"10256","volume":"2","author":"E Li","year":"2006","unstructured":"Li, E., Liang, H., & Niu, X. (2006). Blind image watermarking scheme based on wavelet tree quantization robust to geometric attacks. Proceedings on IEEE WCICA, 2, 10256\u201310260.","journal-title":"Proceedings on IEEE WCICA"},{"issue":"5","key":"8177_CR32","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TMM.2008.922795","volume":"10","author":"W-H Lin","year":"2008","unstructured":"Lin, W.-H., Horng, S.-J., Kao, T.-W., Fan, P., Lee, C.-L., & Pan, Y. (2008). An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Transactions on Multimedia, 10(5), 746\u2013757.","journal-title":"IEEE Transactions on Multimedia"},{"key":"8177_CR33","unstructured":"Byun, K., Lee, S., & Kim, H. (2005). A watermarking method using quantization and statistical characteristics of wavelet transform. In Proceedings of IEEE PDCAT (pp. 689\u2013693)."},{"key":"8177_CR34","doi-asserted-by":"crossref","unstructured":"Phadikar, A., Maity, S.P., & Kundu, M.K. (2008). Quantization based data hiding scheme for efficient quality access control of image using dwt via lifting. In Proceedings of IEEE ICVGIP (pp. 265\u2013272).","DOI":"10.1109\/ICVGIP.2008.23"},{"issue":"4","key":"8177_CR35","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.istr.2013.01.001","volume":"18","author":"V Santhi","year":"2013","unstructured":"Santhi, V., & Arulmozhivarman, P. (2013). Hadamard transform based adaptive visible\/invisible watermarking scheme for digital images. Journal of Information Security and Applications, 18(4), 167\u2013179.","journal-title":"Journal of Information Security and Applications"},{"issue":"4","key":"8177_CR36","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1504\/IJESDF.2014.065739","volume":"6","author":"AK Singh","year":"2014","unstructured":"Singh, A. K., Dave, M., & Mohan, A. (2014). Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine. International Journal of Electronic Security and Digital Forensics, 6(4), 285\u2013305.","journal-title":"International Journal of Electronic Security and Digital Forensics"},{"issue":"12","key":"8177_CR37","doi-asserted-by":"crossref","first-page":"58","DOI":"10.5815\/ijcnis.2014.12.07","volume":"6","author":"A Asma","year":"2014","unstructured":"Asma, A., Sinha, G. R., & Kashyap, N. (2014). 3-level DWT Image watermarking against frequency and geometrical attacks. International Journal of Computer Network and Information Security, 6(12), 58.","journal-title":"International Journal of Computer Network and Information Security"},{"issue":"6","key":"8177_CR38","doi-asserted-by":"crossref","first-page":"193","DOI":"10.14257\/ijsip.2015.8.6.20","volume":"8","author":"MA Rahman","year":"2015","unstructured":"Rahman, M. A., & Rabbi, M. M. F. (2015). DWT-SVD based new watermarking idea in RGB color space. International Journal of Signal Processing, Image Processing and Pattern Recognition, 8(6), 193\u2013198.","journal-title":"International Journal of Signal Processing, Image Processing and Pattern Recognition"},{"key":"8177_CR39","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/j.procs.2015.08.063","volume":"58","author":"SP Vaidya","year":"2015","unstructured":"Vaidya, S. P., & Mouli, P. C. (2015). Adaptive digital watermarking for copyright protection of digital images in wavelet domain. Procedia Computer Science, 58, 233\u2013240.","journal-title":"Procedia Computer Science"},{"issue":"12","key":"8177_CR40","doi-asserted-by":"crossref","first-page":"3000","DOI":"10.1016\/j.sigpro.2012.05.034","volume":"92","author":"HT Wu","year":"2012","unstructured":"Wu, H. T., & Huang, J. (2012). Reversible image watermarking on prediction errors by efficient histogram modification. Signal Processing, 92(12), 3000\u20133009.","journal-title":"Signal Processing"},{"issue":"1","key":"8177_CR41","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.sigpro.2011.06.006","volume":"92","author":"F Peng","year":"2012","unstructured":"Peng, F., Li, X., & Yang, B. (2012). Adaptive reversible data hiding scheme based on integer transform. Signal Processing, 92(1), 54\u201362.","journal-title":"Signal Processing"},{"issue":"4","key":"8177_CR42","doi-asserted-by":"crossref","first-page":"2033","DOI":"10.1007\/s11277-016-3436-0","volume":"90","author":"SS Jamal","year":"2016","unstructured":"Jamal, S. S., Khan, M. U., & Shah, T. (2016). A watermarking technique with chaotic fractional S-box transformation. Wireless Personal Communications, 90(4), 2033\u20132049.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"8177_CR43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s13319-015-0059-2","volume":"6","author":"A Anees","year":"2015","unstructured":"Anees, A. (2015). An image encryption scheme based on Lorenz system for low profile applications. 3D Research, 6(3), 1\u201310.","journal-title":"3D Research"},{"issue":"3","key":"8177_CR44","doi-asserted-by":"crossref","first-page":"3403","DOI":"10.1007\/s11042-016-3935-8","volume":"76","author":"N Pan-Pan","year":"2017","unstructured":"Pan-Pan, N., Xiang-Yang, W., Yu-Nan, L., & Hong-Ying, Y. (2017). A robust color image watermarking using local invariant significant bitplane histogram. Multimedia Tools and Applications, 76(3), 3403\u20133433.","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"8177_CR45","doi-asserted-by":"crossref","first-page":"892","DOI":"10.1016\/j.jvcir.2012.05.008","volume":"23","author":"XY Wang","year":"2012","unstructured":"Wang, X. Y., Niu, P. P., Yang, H. Y., & Chen, L. L. (2012). Affine invariant image watermarking using intensity probability density-based Harris Laplace detector. Journal of Visual Communication and Image Representation, 23(6), 892\u2013907.","journal-title":"Journal of Visual Communication and Image Representation"},{"issue":"3","key":"8177_CR46","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1109\/TSMCC.2009.2037512","volume":"40","author":"X Gao","year":"2010","unstructured":"Gao, X., Deng, C., Li, X., & Tao, D. (2010). Geometric distortion insensitive image watermarking in affine covariant regions. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 40(3), 278\u2013286.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)"},{"issue":"4","key":"8177_CR47","doi-asserted-by":"crossref","first-page":"1537","DOI":"10.1109\/TSP.2006.870581","volume":"54","author":"JS Seo","year":"2006","unstructured":"Seo, J. S., & Yoo, C. D. (2006). Image watermarking based on invariant regions of scale-space representation. IEEE Transactions on Signal Processing, 54(4), 1537\u20131549.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"3","key":"8177_CR48","doi-asserted-by":"crossref","first-page":"1134","DOI":"10.1016\/j.ijleo.2013.07.126","volume":"125","author":"C-H Chen","year":"2014","unstructured":"Chen, C.-H., Tang, Y.-L., Wang, C.-P., & Hsieh, W.-S. (2014). A robust watermarking algorithm based on salient image features. Optik-International Journal for Light and Electron Optics, 125(3), 1134\u20131140.","journal-title":"Optik-International Journal for Light and Electron Optics"},{"key":"8177_CR49","first-page":"1","volume":"78","author":"B Lei","year":"2017","unstructured":"Lei, B., Zhao, X., Lei, H., Ni, D., Chen, S., Zhou, F., & Wang, T. (2017). Multipurpose watermarking scheme via intelligent method and chaotic map. Multimedia Tools and Applications, 78, 1\u201323.","journal-title":"Multimedia Tools and Applications"},{"key":"8177_CR50","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/3219042","author":"X Cao","year":"2016","unstructured":"Cao, X., Fu, Z., & Sun, X. (2016). A privacy-preserving outsourcing data storage scheme with fragile digital watermarking-based data auditing. Journal of Electrical and Computer Engineering. https:\/\/doi.org\/10.1155\/2016\/3219042.","journal-title":"Journal of Electrical and Computer Engineering"},{"issue":"6","key":"8177_CR51","doi-asserted-by":"crossref","first-page":"8881","DOI":"10.1007\/s11042-016-3514-z","volume":"76","author":"AK Singh","year":"2017","unstructured":"Singh, A. K. (2017). Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimedia Tools and Applications, 76(6), 8881\u20138900.","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"8177_CR52","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MMUL.2011.41","volume":"19","author":"D Rosiyadi","year":"2012","unstructured":"Rosiyadi, D., Horng, S. J., Fan, P., Wang, X., Khan, M. K., & Pan, Y. (2012). Copyright protection for e-government document images. IEEE Multimedia, 19(3), 62\u201373.","journal-title":"IEEE Multimedia"},{"issue":"18","key":"8177_CR53","doi-asserted-by":"crossref","first-page":"19113","DOI":"10.1007\/s11042-017-4570-8","volume":"76","author":"S Singh","year":"2017","unstructured":"Singh, S., Rathore, V. S., Singh, R., & Singh, M. K. (2017). Hybrid semi-blind image watermarking in redundant wavelet domain. Multimedia Tools and Applications, 76(18), 19113\u201319137.","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"8177_CR54","doi-asserted-by":"crossref","first-page":"3731","DOI":"10.1007\/s11042-016-3975-0","volume":"76","author":"M Amini","year":"2017","unstructured":"Amini, M., Ahmad, M. O., & Swamy, M. N. S. (2017). Digital watermark extraction in wavelet domain using hidden Markov model. Multimedia Tools and Applications, 76(3), 3731\u20133749.","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"8177_CR55","doi-asserted-by":"crossref","first-page":"1504","DOI":"10.1109\/TIP.2010.2042646","volume":"19","author":"NK Kalantari","year":"2010","unstructured":"Kalantari, N. K., & Ahadi, S. M. (2010). A logarithmic quantization index modulation for perceptually betterdata hiding. IEEE Transactiona Image Process, 19(6), 1504\u20131517.","journal-title":"IEEE Transactiona Image Process"},{"issue":"4","key":"8177_CR56","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TIFS.2011.2163627","volume":"6","author":"E Nezhadarya","year":"2011","unstructured":"Nezhadarya, E., Wang, Z. J., & Ward, R. K. (2011). Robust image watermarking based on multiscale gradient direction quantization. IEEE Transactions on Information Forensics and Security, 6(4), 1200\u20131213.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"8177_CR57","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11042-018-5891-y","volume":"77","author":"NM Makbol","year":"2018","unstructured":"Makbol, N. M., Khoo, B. E., & Rassem, T. H. (2018). Security analyses of false positive problem for the SVD-based hybrid digital image watermarking techniques in the wavelet transform domain. Multimedia Tools and Applications, 77, 1\u201335.","journal-title":"Multimedia Tools and Applications"},{"issue":"23","key":"8177_CR58","doi-asserted-by":"crossref","first-page":"30251","DOI":"10.1007\/s11042-018-6128-9","volume":"77","author":"NR Zhou","year":"2018","unstructured":"Zhou, N. R., Hou, W. M. X., Wen, R. H., & Zou, W. P. (2018). Imperceptible digital watermarking scheme in multiple transform domains. Multimedia Tools and Applications, 77(23), 30251\u201330267.","journal-title":"Multimedia Tools and Applications"},{"key":"8177_CR59","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/978-981-10-8863-6_19","volume-title":"Digital image watermarking through encryption and DWT for copyright protection. Recent trends in signal and image processing","author":"SP Ambadekar","year":"2019","unstructured":"Ambadekar, S. P., Jain, J., & Khanapuri, J. (2019). Digital image watermarking through encryption and DWT for copyright protection. Recent trends in signal and image processing (pp. 187\u2013195). Singapore: Springer."},{"key":"8177_CR60","doi-asserted-by":"crossref","first-page":"1441","DOI":"10.1016\/j.procs.2018.05.076","volume":"132","author":"SM Arora","year":"2018","unstructured":"Arora, S. M. (2018). A DWT-SVD based robust digital watermarking for digital images. Procedia Computer Science, 132, 1441\u20131448.","journal-title":"Procedia Computer Science"},{"key":"8177_CR61","doi-asserted-by":"crossref","unstructured":"Kadian, P., Arora, N. & Arora, S.M. (2019). Performance evaluation of robust watermarking using DWT-SVD and RDWT-SVD. In 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN) (pp. 987\u2013991). IEEE","DOI":"10.1109\/SPIN.2019.8711681"},{"issue":"3","key":"8177_CR62","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1016\/S0165-1684(00)00239-5","volume":"81","author":"P-T Yu","year":"2001","unstructured":"Yu, P.-T., Tsai, H.-H., & Lin, J.-S. (2001). Digital watermarking based on neural network for color images. Signal Processing, 81(3), 663\u2013671.","journal-title":"Signal Processing"},{"issue":"6","key":"8177_CR63","doi-asserted-by":"crossref","first-page":"1667","DOI":"10.1007\/BF02831846","volume":"11","author":"W Zhenfei","year":"2006","unstructured":"Zhenfei, W., Guangqun, Z., & Nengchao, W. (2006). Digital watermarking algorithm based on wavelet transform and neural network. Wuhan University Journal of Natural Sciences, 11(6), 1667\u20131670.","journal-title":"Wuhan University Journal of Natural Sciences"},{"key":"8177_CR64","doi-asserted-by":"crossref","unstructured":"Xu, X.-Q., Wen, X.-B., Li, Y.-Q., & Quan, J.-J. (2007). A new watermarking approach based on neural network in wavelet domain. In International Conference on Intelligent Computing, Berlin, Heidelberg.","DOI":"10.1007\/978-3-540-74205-0_1"},{"key":"8177_CR65","doi-asserted-by":"crossref","unstructured":"Huang, S., Zhang, W., Feng, W.. & Yang, H. (2008). Blind watermarking scheme based on neural network. In Intelligent Control and Automation, 2008. WCICA 2008. 7th World Congress , 2008.","DOI":"10.1109\/WCICA.2008.4594557"},{"key":"8177_CR66","doi-asserted-by":"crossref","first-page":"3769","DOI":"10.1016\/j.proeng.2012.06.432","volume":"388","author":"N Ramamurthy","year":"2012","unstructured":"Ramamurthy, N., & Varadarajan, S. (2012). The robust digital image watermarking scheme with back propagation neural network in DWT domain. Procedia Engineering, 388, 3769\u20133778.","journal-title":"Procedia Engineering"},{"key":"8177_CR67","unstructured":"Mun, S.-M., Nam, S.-H., Jang, H.-U., Kim, D., & Lee, H.-K. (2017). A robust blind watermarking using convolutional neural network. arXiv preprint:1704.03248"},{"issue":"22","key":"8177_CR68","doi-asserted-by":"crossref","first-page":"24009","DOI":"10.1007\/s11042-016-4178-4","volume":"76","author":"J-X Liu","year":"2017","unstructured":"Liu, J.-X., Wen, X.-B., Yuan, L.-M., & Hai-Xia, Xu. (2017). A robust approach of watermarking in contourlet domain based on probabilistic neural network. Multimedia Tools and Applications, 76(22), 24009\u201324026.","journal-title":"Multimedia Tools and Applications"},{"key":"8177_CR69","first-page":"161","volume":"1","author":"OL Mangasarian","year":"2001","unstructured":"Mangasarian, O. L., & Musicant, D. R. (2001). Lagrangian support vector machines. Journal of Machine Learning Research, 1, 161\u2013177.","journal-title":"Journal of Machine Learning Research"},{"issue":"12","key":"8177_CR70","doi-asserted-by":"crossref","first-page":"8784","DOI":"10.1016\/j.eswa.2010.06.028","volume":"37","author":"S Balasundaram","year":"2010","unstructured":"Balasundaram, S. (2010). On Lagrangian support vector regression. Expert Systems with Applications, 37(12), 8784\u20138792.","journal-title":"Expert Systems with Applications"},{"key":"8177_CR71","doi-asserted-by":"crossref","unstructured":"Fu, G., & Peng, H. (2007). Subsampling-based wavelet watermarking algorithm using support vector regression. In The International Conference on EUROCON, 2007 Computer as a Tool.","DOI":"10.1109\/EURCON.2007.4400269"},{"key":"8177_CR72","doi-asserted-by":"crossref","unstructured":"Meng, F., Peng, H., Pei, Z., & Wang, J. (2008). A novel blind image watermarking scheme based on support vector machine in DCT domain. In Computational Intelligence and Security, 2008. CIS'08.","DOI":"10.1109\/CIS.2008.20"},{"issue":"12","key":"8177_CR73","doi-asserted-by":"crossref","first-page":"125407","DOI":"10.1088\/1464-4258\/11\/12\/125407","volume":"11","author":"X-Y Wang","year":"2009","unstructured":"Wang, X.-Y., Yang, Y.-P., & Yang, H.-Y. (2009). A novel nonsampled contourlet-domain image watermarking using support vector regression. Journal of Optics A: Pure and Applied Optics, 11(12), 125407.","journal-title":"Journal of Optics A: Pure and Applied Optics"},{"key":"8177_CR74","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.neucom.2011.10.028","volume":"82","author":"G Feng","year":"2012","unstructured":"Feng, G., Qian, Z., & Dai, N. (2012). Reversible watermarking via extreme learning machine prediction. Neurocomputing, 82, 62\u201368.","journal-title":"Neurocomputing"},{"issue":"5","key":"8177_CR75","first-page":"737","volume":"6","author":"A Mishra","year":"2014","unstructured":"Mishra, A., & Goel, A. (2014). Novel gray scale image watermarking using extreme learning machine. International Journal of Scientific and Engineering Research, 6(5), 737\u2013744.","journal-title":"International Journal of Scientific and Engineering Research"},{"key":"8177_CR76","first-page":"381","volume":"19","author":"C-S Shieh","year":"2003","unstructured":"Shieh, C.-S., Huang, H.-C., Wang, F.-H., & Pan, J.-S. (2003). An embedding algorithm for multiple watermarks. Journal of Information Science and Engineering, 19, 381\u2013395.","journal-title":"Journal of Information Science and Engineering"},{"issue":"5","key":"8177_CR77","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1016\/j.aeue.2007.02.010","volume":"62","author":"V Aslantas","year":"2008","unstructured":"Aslantas, V. (2008). A singular-value decomposition-based image watermarking using genetic algorithm. AEU-International Journal of Electronics and Communications, 62(5), 386\u2013394.","journal-title":"AEU-International Journal of Electronics and Communications"},{"key":"8177_CR78","doi-asserted-by":"crossref","unstructured":"Loukhaoukha, K., Chouinard, J.-Y., & Taieb, M.H. (2010). Multi-objective genetic algorithm optimization for image watermarking based on singular value decomposition and lifting wavelet transform. In ICISP 2010","DOI":"10.1007\/978-3-642-13681-8_46"},{"issue":"24","key":"8177_CR79","doi-asserted-by":"crossref","first-page":"5501","DOI":"10.1016\/j.ins.2011.07.040","volume":"181","author":"J Wang","year":"2011","unstructured":"Wang, J., Peng, H., & Shi, P. (2011). An optimal image watermarking approach based on a multi-objective genetic algorithm. Information Sciences, 181(24), 5501\u20135514.","journal-title":"Information Sciences"},{"key":"8177_CR80","doi-asserted-by":"crossref","unstructured":"Tao, H., Zain, J. M., Abd Alla, A. N. & Hongwu, Q. (2010). An implementation of digital image watermarking based on particle swarm optimization. In International Conference on Networked Digital Technologies, Berlin, 2010.","DOI":"10.1007\/978-3-642-14292-5_33"},{"key":"8177_CR81","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.optlaseng.2017.01.013","volume":"93","author":"X-W Li","year":"2017","unstructured":"Li, X.-W., Liu, Y., Kim, S.-T., & Wang, Q.-H. (2017). Designing a genetic watermarking approach for 3D scenes. Optics and Lasers in Engineering, 93, 83\u201391.","journal-title":"Optics and Lasers in Engineering"},{"issue":"7","key":"8177_CR82","doi-asserted-by":"crossref","first-page":"1135","DOI":"10.1016\/j.jvcir.2013.07.007","volume":"24","author":"C Agarwal","year":"2013","unstructured":"Agarwal, C., Mishra, A., & Sharma, A. (2013). Gray-scale image watermarking using GA-BPN hybrid network. Journal of Visual Communication and Image Representation., 24(7), 1135\u201346.","journal-title":"Journal of Visual Communication and Image Representation."},{"issue":"1","key":"8177_CR83","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.jss.2012.06.057","volume":"86","author":"SP Maity","year":"2013","unstructured":"Maity, S. P., Maity, S., Sil, J., & Delpha, C. (2013). Collusion resilient spread spectrum watermarking in M-band wavelets using GA-fuzzy hybridization. Journal of Systems and Software, 86(1), 47\u201359.","journal-title":"Journal of Systems and Software"},{"key":"8177_CR84","unstructured":"Rajasekaran, S., & Vijayalakshmi Pai, G.A. (1996). Genetic algorithm based weight determination for backpropagation networks. In Fourth International Conference on Advanced Computing (ADCOMP 1996), Bangalore, India."},{"key":"8177_CR85","doi-asserted-by":"crossref","unstructured":"Jagadeesh, B., Srinivas Kumar, S., & Raja Rajeswari, K. (2010). Image watermarking scheme using singular value decomposition, quantization and genetic algorithm. In Signal Acquisition and Processing, 2010. ICSAP'10.","DOI":"10.1109\/ICSAP.2010.71"},{"issue":"2","key":"8177_CR86","doi-asserted-by":"crossref","first-page":"2223","DOI":"10.1007\/s11277-017-4971-z","volume":"98","author":"S Roy","year":"2018","unstructured":"Roy, S., & Pal, A. K. (2018). An SVD based location specific robust color image watermarking scheme using RDWT and Arnold scrambling. Wireless Personal Communications, 98(2), 2223\u20132250.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"8177_CR87","doi-asserted-by":"crossref","first-page":"2011","DOI":"10.1007\/s11277-018-5252-1","volume":"102","author":"SP Sathya","year":"2018","unstructured":"Sathya, S. P., Ponni, S., & Ramakrishnan, S. (2018). Fibonacci based key frame selection and scrambling for video watermarking in DWT\u2013SVD domain. Wireless Personal Communications, 102(2), 2011\u20132031.","journal-title":"Wireless Personal Communications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08177-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08177-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08177-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T18:54:56Z","timestamp":1724525696000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08177-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,23]]},"references-count":87,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["8177"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08177-w","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,23]]},"assertion":[{"value":"28 January 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}