{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:44:36Z","timestamp":1766580276713,"version":"3.37.3"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,4,15]],"date-time":"2022-04-15T00:00:00Z","timestamp":1649980800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,15]],"date-time":"2022-04-15T00:00:00Z","timestamp":1649980800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Not Applicable"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s11277-022-09675-1","type":"journal-article","created":{"date-parts":[[2022,4,15]],"date-time":"2022-04-15T15:03:11Z","timestamp":1650034991000},"page":"2581-2619","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Block-Level Image Tamper Detection Scheme Using Modulus Function Based Fragile Watermarking"],"prefix":"10.1007","volume":"125","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9439-5765","authenticated-orcid":false,"given":"Shiv","family":"Prasad","sequence":"first","affiliation":[]},{"given":"Arup Kumar","family":"Pal","sequence":"additional","affiliation":[]},{"given":"Srilekha","family":"Paul","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"9675_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0757-7","volume-title":"Digital image forensics: There is more to a picture than meets the eye","author":"H Sencar","year":"2014","unstructured":"Sencar, H., & Memon, N. (2014). Digital image forensics: There is more to a picture than meets the eye. Springer. https:\/\/doi.org\/10.1007\/978-1-4614-0757-7"},{"key":"9675_CR2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-192-6","author":"CS Lu","year":"2005","unstructured":"Lu, C. S. (2005). Multimedia security: Steganography and digital watermarking techniques for protection of intellectual property. Idea Group Publishing. https:\/\/doi.org\/10.4018\/978-1-59140-192-6","journal-title":"Idea Group Publishing"},{"key":"9675_CR3","doi-asserted-by":"publisher","unstructured":"He, H., Zhang, J., & Chen, F. (2007). Block-wise fragile watermarking scheme based on scramble encryption. In Second international conference on bio-inspired computing: Theories and applications. https:\/\/doi.org\/10.1109\/BICTA.2007.4806454.","DOI":"10.1109\/BICTA.2007.4806454"},{"key":"9675_CR4","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.sigpro.2017.03.033","volume":"138","author":"C Qin","year":"2017","unstructured":"Qin, C., Ji, P., Zhang, X., Dong, J., & Wang, J. (2017). Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Processing, 138, 280\u2013293. https:\/\/doi.org\/10.1016\/j.sigpro.2017.03.033","journal-title":"Signal Processing"},{"key":"9675_CR5","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1016\/j.sigpro.2008.10.001","volume":"89","author":"X Zhang","year":"2009","unstructured":"Zhang, X., & Wang, S. (2009). Fragile watermarking scheme using a hierarchical mechanism. Signal Processing, 89, 675\u2013679. https:\/\/doi.org\/10.1016\/j.sigpro.2008.10.001","journal-title":"Signal Processing"},{"issue":"4","key":"9675_CR6","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1049\/iet-ifs.2010.0059","volume":"7","author":"A Piper","year":"2013","unstructured":"Piper, A., & Safavi-Naini, R. (2013). Scalable fragile watermarking for image authentication. IET Information Security, 7(4), 300\u2013311. https:\/\/doi.org\/10.1049\/iet-ifs.2010.0059","journal-title":"IET Information Security"},{"issue":"9","key":"9675_CR7","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1016\/j.jss.2011.02.029","volume":"84","author":"CC Chang","year":"2011","unstructured":"Chang, C. C., Chen, K. N., Lee, C. F., & Liu, L. J. (2011). A secure fragile watermarking scheme based on chaos-and-hamming code. Journal of Systems and Software, 84(9), 1462\u20131470. https:\/\/doi.org\/10.1016\/j.jss.2011.02.029","journal-title":"Journal of Systems and Software"},{"issue":"4","key":"9675_CR8","doi-asserted-by":"publisher","first-page":"728","DOI":"10.1016\/j.sigpro.2010.07.019","volume":"91","author":"SB Solorio","year":"2011","unstructured":"Solorio, S. B., & Nandi, A. K. (2011). Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Signal Processing, 91(4), 728\u2013739. https:\/\/doi.org\/10.1016\/j.sigpro.2010.07.019","journal-title":"Signal Processing"},{"issue":"3","key":"9675_CR9","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.image.2012.12.003","volume":"8","author":"X Tong","year":"2013","unstructured":"Tong, X., Liu, Y., Zhang, M., & Chen, Y. (2013). A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Processing: Image Communication, 8(3), 301\u2013308. https:\/\/doi.org\/10.1016\/j.image.2012.12.003","journal-title":"Signal Processing: Image Communication"},{"key":"9675_CR10","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1007\/s40998-019-00275-7","volume":"44","author":"S Prasad","year":"2020","unstructured":"Prasad, S., & Pal, A. K. (2019). A secure fragile watermarking scheme for protecting integrity of digital images. Iranian Journal of Science and Technology, Transactions of Electrical Engineering, 43(4), 1\u201325. https:\/\/doi.org\/10.1007\/s40998-019-00275-7","journal-title":"Iranian Journal of Science and Technology, Transactions of Electrical Engineering"},{"key":"9675_CR11","doi-asserted-by":"publisher","first-page":"1737","DOI":"10.1016\/j.optcom.2009.12.073","volume":"283","author":"C-S Hsu","year":"2010","unstructured":"Hsu, C.-S., & Tu, S.-F. (2010). Probability-based tampering detection scheme for digital images. Optics Communications, 283, 1737\u20131743. https:\/\/doi.org\/10.1016\/j.optcom.2009.12.073","journal-title":"Optics Communications"},{"key":"9675_CR12","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.jvcir.2017.09.001","volume":"49","author":"K Sreenivas","year":"2017","unstructured":"Sreenivas, K., & Kamakshiprasad, V. (2017). Improved image tamper localisation using chaotic maps and self-recovery. Journal of Visual Communication and Image Representation, 49, 164\u2013176. https:\/\/doi.org\/10.1016\/j.jvcir.2017.09.001","journal-title":"Journal of Visual Communication and Image Representation"},{"issue":"2","key":"9675_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40998-017-0021-9","volume":"41","author":"S Trivedy","year":"2017","unstructured":"Trivedy, S., & Pal, A. K. (2017). A logistic map-based fragile watermarking scheme of digital images with tamper detection. Iranian Journal of Science and Technology, Transactions of Electrical Engineering, 41(2), 1\u201311. https:\/\/doi.org\/10.1007\/s40998-017-0021-9","journal-title":"Iranian Journal of Science and Technology, Transactions of Electrical Engineering"},{"key":"9675_CR14","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.aeue.2011.01.016","volume":"65","author":"S Rawat","year":"2011","unstructured":"Rawat, S., & Raman, B. (2011). A chaotic system based fragile watermarking scheme for image tamper detection. International Journal of Electronics and Communications (AEU), 65, 840\u2013847. https:\/\/doi.org\/10.1016\/j.aeue.2011.01.016","journal-title":"International Journal of Electronics and Communications (AEU)"},{"issue":"15","key":"9675_CR15","doi-asserted-by":"publisher","first-page":"16107","DOI":"10.1007\/s11042-016-3897-x","volume":"76","author":"M Nazari","year":"2017","unstructured":"Nazari, M., & Sharif, S. (2017). An improved method for digital image fragile watermarking based on chaotic maps. Multimedia Tools and Applications, 76(15), 16107\u201316123.","journal-title":"Multimedia Tools and Applications"},{"issue":"3-4","key":"9675_CR16","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1007\/s11042-019-08144-5","volume":"79","author":"S Prasad","year":"2020","unstructured":"Prasad, S., & Pal, A. K. (2020). A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimedia Tools and Applications, 79(2020), 1673\u20131705. https:\/\/doi.org\/10.1007\/s11042-019-08144-5","journal-title":"Multimedia Tools and Applications"},{"issue":"2","key":"9675_CR17","doi-asserted-by":"publisher","first-page":"182","DOI":"10.2478\/s11772-013-0088-4","volume":"21","author":"YF Chang","year":"2013","unstructured":"Chang, Y. F., & Tai, W. L. (2013). A block-based watermarking scheme for image tamper detection and self-recovery. Opto Electronics Review, 21(2), 182\u2013190. https:\/\/doi.org\/10.2478\/s11772-013-0088-4","journal-title":"Opto Electronics Review"},{"key":"9675_CR18","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-981-13-1501-5_17","volume":"814","author":"S Prasad","year":"2019","unstructured":"Prasad, S., & Pal, A. K. (2019). Logistic map-based image steganography scheme using combined LSB and PVD for security enhancement. Emerging technologies in data mining and information security. Advances in Intelligent Systems and Computing, 814, 203\u2013214. https:\/\/doi.org\/10.1007\/978-981-13-1501-5_17","journal-title":"Advances in Intelligent Systems and Computing"},{"key":"9675_CR19","doi-asserted-by":"publisher","first-page":"2875","DOI":"10.1016\/S0031-3203(03)00221-8","volume":"36","author":"C-C Thien","year":"2003","unstructured":"Thien, C.-C., & Lin, J. C. (2003). A simple and high-hiding capacity method for hiding digit-by-digit in images based on modulus function. Pattern Recognition, 36, 2875\u20132881. https:\/\/doi.org\/10.1016\/S0031-3203(03)00221-8","journal-title":"Pattern Recognition"},{"issue":"5","key":"9675_CR20","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1016\/j.jvcir.2014.01.008","volume":"25","author":"A Tanchenko","year":"2014","unstructured":"Tanchenko, A. (2014). Visual-psnr measure of image quality. Journal of Visual Communication and Image Representation, 25(5), 874\u2013878. https:\/\/doi.org\/10.1016\/j.jvcir.2014.01.008","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"9675_CR21","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.neucom.2018.04.059","volume":"308","author":"M Tong","year":"2018","unstructured":"Tong, M., Pan, Y., Li, Z., & Lin, W. (2018). Valid data based normalized cross-correlation (VDNCC) for topography identification. Neurocomputing, 308, 184\u2013193. https:\/\/doi.org\/10.1016\/j.neucom.2018.04.059","journal-title":"Neurocomputing"},{"issue":"1","key":"9675_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJISP.2022010102","volume":"16","author":"A Soualmi","year":"2022","unstructured":"Soualmi, A., Alti, A., & Laouamer, L. (2022). An imperceptible watermarking scheme for medical image tamper detection. International Journal of Information Security and Privacy, 16(1), 1\u201318. https:\/\/doi.org\/10.4018\/IJISP.2022010102","journal-title":"International Journal of Information Security and Privacy"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09675-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-022-09675-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-09675-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T15:16:24Z","timestamp":1659366984000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-022-09675-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,15]]},"references-count":22,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["9675"],"URL":"https:\/\/doi.org\/10.1007\/s11277-022-09675-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2022,4,15]]},"assertion":[{"value":"22 March 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}