{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T21:13:11Z","timestamp":1769029991214,"version":"3.49.0"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2019,12,19]],"date-time":"2019-12-19T00:00:00Z","timestamp":1576713600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,19]],"date-time":"2019-12-19T00:00:00Z","timestamp":1576713600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s11554-019-00937-z","type":"journal-article","created":{"date-parts":[[2019,12,19]],"date-time":"2019-12-19T18:03:17Z","timestamp":1576778597000},"page":"2077-2095","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Real-time watermark reconstruction for the identification of source information based on deep neural network"],"prefix":"10.1007","volume":"17","author":[{"given":"Rishi","family":"Sinhal","sequence":"first","affiliation":[]},{"given":"Irshad Ahmad","family":"Ansari","sequence":"additional","affiliation":[]},{"given":"Deepak Kumar","family":"Jain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,19]]},"reference":[{"issue":"3","key":"937_CR1","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1016\/j.pubrev.2018.04.004","volume":"44","author":"WHS Tsai","year":"2018","unstructured":"Tsai, W.H.S., Men, R.L.: Social messengers as the new frontier of organization-public engagement: a WeChat study. Public Relat Rev 44(3), 419\u2013429 (2018)","journal-title":"Public Relat Rev"},{"key":"937_CR2","doi-asserted-by":"crossref","unstructured":"Dadashzadeh, M.: Social media in government: from eGovernment to eGovernance. J. Bus. Econ. Res. 8(11) (2010)","DOI":"10.19030\/jber.v8i11.51"},{"issue":"6","key":"937_CR3","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1002\/cb.376","volume":"10","author":"K Heinonen","year":"2011","unstructured":"Heinonen, K.: Consumer activity in social media: managerial approaches to consumers\u2019 social media behavior. J. Consum. Behav. 10(6), 356\u2013364 (2011)","journal-title":"J. Consum. Behav."},{"issue":"4","key":"937_CR4","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1108\/QMR-06-2013-0041","volume":"16","author":"A Whiting","year":"2013","unstructured":"Whiting, A., Williams, D.: Why people use social media: a uses and gratifications approach. Qual. Mark Res. 16(4), 362\u2013369 (2013)","journal-title":"Qual. Mark Res."},{"issue":"1","key":"937_CR5","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1080\/22041451.2016.1155332","volume":"2","author":"T Highfield","year":"2016","unstructured":"Highfield, T., Leaver, T.: Instagrammatics and digital methods: studying visual social media, from selfies and GIFs to memes and emoji. Commun. Res. Pract. 2(1), 47\u201362 (2016)","journal-title":"Commun. Res. Pract."},{"key":"937_CR6","doi-asserted-by":"crossref","first-page":"15608","DOI":"10.1109\/ACCESS.2018.2810062","volume":"6","author":"A Anandhan","year":"2018","unstructured":"Anandhan, A., Shuib, L., Ismail, M.A., Mujtaba, G.: Social media recommender systems: review and open research issues. IEEE Access 6, 15608\u201315628 (2018)","journal-title":"IEEE Access"},{"issue":"12","key":"937_CR7","doi-asserted-by":"crossref","first-page":"114","DOI":"10.3390\/fi10120114","volume":"10","author":"S Ali","year":"2018","unstructured":"Ali, S., Islam, N., Rauf, A., Din, I., Guizani, M., Rodrigues, J.: Privacy and security issues in online social networks. Future Internet 10(12), 114 (2018)","journal-title":"Future Internet"},{"key":"937_CR8","doi-asserted-by":"crossref","first-page":"1516","DOI":"10.3389\/fpsyg.2018.01516","volume":"9","author":"J Mahmoodi","year":"2018","unstructured":"Mahmoodi, J., \u010curdov\u00e1, J., Henking, C., Kunz, M., Mati\u0107, K., Mohr, P., Vovko, M.: Internet users\u2019 valuation of enhanced data protection on social media: which aspects of privacy are worth the most? Front. Psychol. 9, 1516 (2018)","journal-title":"Front. Psychol."},{"issue":"10","key":"937_CR9","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1177\/2042098618789596","volume":"9","author":"S Rees","year":"2018","unstructured":"Rees, S., Mian, S., Grabowski, N.: Using social media in safety signal management: is it reliable? Ther. Adv. Drug Saf. 9(10), 591\u2013599 (2018)","journal-title":"Ther. Adv. Drug Saf."},{"issue":"8","key":"937_CR10","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MC.2018.3191268","volume":"51","author":"J Isaak","year":"2018","unstructured":"Isaak, J., Hanna, M.J.: User data privacy: Facebook, Cambridge analytica, and privacy protection. Computer 51(8), 56\u201359 (2018)","journal-title":"Computer"},{"issue":"3","key":"937_CR11","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1109\/30.883387","volume":"46","author":"SD Lin","year":"2000","unstructured":"Lin, S.D., Chen, C.F.: A robust DCT-based watermarking for copyright protection. IEEE Trans. Consum. Electron. 46(3), 415\u2013421 (2000)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"5","key":"937_CR12","doi-asserted-by":"crossref","first-page":"2392","DOI":"10.1016\/j.eswa.2014.10.045","volume":"42","author":"M Ali","year":"2015","unstructured":"Ali, M., Ahn, C.W.: Comments on \u201cOptimized gray-scale image watermarking using DWT-SVD and firefly algorithm\u201d. Expert Syst. Appl. 42(5), 2392\u20132394 (2015)","journal-title":"Expert Syst. Appl."},{"issue":"14","key":"937_CR13","doi-asserted-by":"crossref","first-page":"5711","DOI":"10.1016\/j.ijleo.2016.03.070","volume":"127","author":"IA Ansari","year":"2016","unstructured":"Ansari, I.A., Pant, M., Ahn, C.W.: ABC optimized secured image watermarking scheme to find out the rightful ownership. Optik 127(14), 5711\u20135721 (2016)","journal-title":"Optik"},{"issue":"11","key":"937_CR14","doi-asserted-by":"crossref","first-page":"3497","DOI":"10.1016\/j.patcog.2008.05.003","volume":"41","author":"TY Lee","year":"2008","unstructured":"Lee, T.Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497\u20133506 (2008)","journal-title":"Pattern Recogn."},{"issue":"6","key":"937_CR15","doi-asserted-by":"crossref","first-page":"1225","DOI":"10.1007\/s13042-015-0455-1","volume":"7","author":"IA Ansari","year":"2016","unstructured":"Ansari, I.A., Pant, M., Ahn, C.W.: SVD based fragile watermarking scheme for tamper localization and self-recovery. Int. J. Mach. Learn. Cybernet. 7(6), 1225\u20131239 (2016)","journal-title":"Int. J. Mach. Learn. Cybernet."},{"issue":"17","key":"937_CR16","doi-asserted-by":"crossref","first-page":"23815","DOI":"10.1007\/s11042-018-5915-7","volume":"78","author":"P Shamsolmoali","year":"2019","unstructured":"Shamsolmoali, P., Zareapoor, M., Jain, D.K., Jain, V.K., Yang, J.: Deep convolution network for surveillance records super-resolution. Multimed Tools Appl. 78(17), 23815\u201323829 (2019)","journal-title":"Multimed Tools Appl."},{"key":"937_CR17","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.patrec.2019.01.008","volume":"120","author":"DK Jain","year":"2019","unstructured":"Jain, D.K., Shamsolmoali, P., Sehdev, P.: Extended deep neural network for facial emotion recognition. Pattern Recogn. Lett. 120, 69\u201374 (2019)","journal-title":"Pattern Recogn. Lett."},{"key":"937_CR18","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.patrec.2019.01.014","volume":"120","author":"Dhiraj","year":"2019","unstructured":"Dhiraj, Jain, D.K.: An evaluation of deep learning based object detection strategies for threat object detection in baggage security imagery. Pattern Recogn. Lett. 120, 112\u2013119 (2019). https:\/\/doi.org\/10.1016\/j.patrec.2019.01.014","journal-title":"Pattern Recogn. Lett."},{"key":"937_CR19","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-5225-0105-3","volume-title":"Handbook of research on modern cryptographic solutions for computer and cyber security","author":"B Gupta","year":"2016","unstructured":"Gupta, B., Agrawal, D.P., Yamaguchi, S.: Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, Pennsylvania (2016)"},{"key":"937_CR20","first-page":"125","volume-title":"Enhancing computer security with smart technology","author":"S Mukkamala","year":"2005","unstructured":"Mukkamala, S., Sung, A., Abraham, A.: Cyber security challenges: designing efficient intrusion detection systems and antivirus tools. In: Vemuri, Rao, V. (eds.) Enhancing computer security with smart technology, pp. 125\u2013163. Auerbach, New York (2005)"},{"key":"937_CR21","unstructured":"Forstrom, H.S., Wojciechowski, E., Phadke, M. S.: U.S. Patent No. 7,260,722. Washington, DC: U.S. Patent and Trademark Office (2007)"},{"key":"937_CR22","unstructured":"Tsai, M. J., Lai, C. L., Liu, J.: Camera\/mobile phone source identification for digital forensics. In: IEEE international conference on acoustics, speech and signal processing, 2007. ICASSP 2007, vol. 2, pp. II\u2013221. IEEE (2007)"},{"issue":"7553","key":"937_CR23","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436 (2015)","journal-title":"Nature"},{"key":"937_CR24","doi-asserted-by":"crossref","first-page":"94","DOI":"10.3389\/fncom.2016.00094","volume":"10","author":"AH Marblestone","year":"2016","unstructured":"Marblestone, A.H., Wayne, G., Kording, K.P.: Toward an integration of deep learning and neuroscience. Front. Comput. Neurosci. 10, 94 (2016)","journal-title":"Front. Comput. Neurosci."},{"issue":"5","key":"937_CR25","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.1109\/TITS.2014.2311123","volume":"15","author":"W Huang","year":"2014","unstructured":"Huang, W., Song, G., Hong, H., Xie, K.: Deep architecture for traffic flow prediction: deep belief networks with multitask learning. IEEE Trans. Intell. Transp. Syst. 15(5), 2191\u20132201 (2014)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"937_CR26","unstructured":"Toderici, G., O\u2019Malley, S.M., Hwang, S.J., Vincent, D., Minnen, D., Baluja, S., Sukthankar, R.: Variable rate image compression with recurrent neural networks.\u00a0arXiv:1511.06085 (2015)"},{"key":"937_CR27","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.neucom.2016.12.038","volume":"234","author":"W Liu","year":"2017","unstructured":"Liu, W., Wang, Z., Liu, X., Zeng, N., Liu, Y., Alsaadi, F.E.: A survey of deep neural network architectures and their applications. Neurocomputing 234, 11\u201326 (2017)","journal-title":"Neurocomputing"},{"issue":"1","key":"937_CR28","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/j.fcij.2017.12.001","volume":"3","author":"H Mohsen","year":"2018","unstructured":"Mohsen, H., El-Dahshan, E.S.A., El-Horbaty, E.S.M., Salem, A.B.M.: Classification using deep learning neural networks for brain tumors. Future Comput. Inform. J. 3(1), 68\u201371 (2018)","journal-title":"Future Comput. Inform. J."},{"key":"937_CR29","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1016\/j.ins.2016.01.082","volume":"345","author":"MM Al Rahhal","year":"2016","unstructured":"Al Rahhal, M.M., Bazi, Y., AlHichri, H., Alajlan, N., Melgani, F., Yager, R.R.: Deep learning approach for active classification of electrocardiogram signals. Inf. Sci. 345, 340\u2013354 (2016)","journal-title":"Inf. Sci."},{"key":"937_CR30","unstructured":"Cohen, G., Sapiro, G., Giryes, R.: DNN or k-NN: That is the Generalize vs. Memorize Question.\u00a0arXiv:1805.06822 (2018)"},{"issue":"4","key":"937_CR31","doi-asserted-by":"crossref","first-page":"2442","DOI":"10.1109\/TGRS.2016.2645226","volume":"55","author":"J Geng","year":"2017","unstructured":"Geng, J., Wang, H., Fan, J., Ma, X.: Deep supervised and contractive neural network for SAR image classification. IEEE Trans. Geosci. Remote Sens. 55(4), 2442\u20132459 (2017)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"937_CR32","doi-asserted-by":"crossref","unstructured":"Hung, C.Y., Chen, W.C., Lai, P.T., Lin, C.H., Lee, C.C.: Comparing deep neural network and other machine learning algorithms for stroke prediction in a large-scale population-based electronic medical claims database. In: 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 3110\u20133113 (2017)","DOI":"10.1109\/EMBC.2017.8037515"},{"issue":"1","key":"937_CR33","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1186\/s13321-017-0226-y","volume":"9","author":"A Koutsoukas","year":"2017","unstructured":"Koutsoukas, A., Monaghan, K.J., Li, X., Huan, J.: Deep-learning: investigating deep neural networks hyper-parameters and comparison of performance to shallow methods for modeling bioactivity data. J. Cheminform. 9(1), 42 (2017)","journal-title":"J. Cheminform."},{"issue":"24","key":"937_CR34","doi-asserted-by":"crossref","first-page":"5441","DOI":"10.1039\/C8SC00148K","volume":"9","author":"A Mayr","year":"2018","unstructured":"Mayr, A., Klambauer, G., Unterthiner, T., Steijaert, M., Wegner, J.K., Ceulemans, H., Hochreiter, S.: Large-scale comparison of machine learning methods for drug target prediction on ChEMBL. Chem. Sci. 9(24), 5441\u20135451 (2018)","journal-title":"Chem. Sci."},{"issue":"1","key":"937_CR35","first-page":"177","volume":"9","author":"F Zhang","year":"2018","unstructured":"Zhang, F., Mao, Z., Huang, Y., Lin, X., Ding, G.: Deep learning models for EEG-based rapid serial visual presentation event classification. J. Inf. Hiding Multimed Signal Process 9(1), 177\u2013187 (2018)","journal-title":"J. Inf. Hiding Multimed Signal Process"},{"issue":"12","key":"937_CR36","doi-asserted-by":"crossref","first-page":"4462","DOI":"10.1021\/acs.molpharmaceut.7b00578","volume":"14","author":"A Korotcov","year":"2017","unstructured":"Korotcov, A., Tkachenko, V., Russo, D.P., Ekins, S.: Comparison of deep learning with multiple machine learning methods and metrics using diverse drug discovery data sets. Mol. Pharm. 14(12), 4462\u20134475 (2017)","journal-title":"Mol. Pharm."},{"issue":"5","key":"937_CR37","doi-asserted-by":"crossref","first-page":"1304","DOI":"10.1109\/78.757218","volume":"47","author":"IW Selesnick","year":"1999","unstructured":"Selesnick, I.W.: The slantlet transform. IEEE Trans. Signal Process. 47(5), 1304\u20131313 (1999)","journal-title":"IEEE Trans. Signal Process."},{"issue":"4","key":"937_CR38","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1016\/j.bspc.2006.12.001","volume":"1","author":"M Maitra","year":"2006","unstructured":"Maitra, M., Chatterjee, A.: A Slantlet transform based intelligent system for magnetic resonance brain image classification. Biomed. Signal Process. Control 1(4), 299\u2013306 (2006)","journal-title":"Biomed. Signal Process. Control"},{"key":"937_CR39","doi-asserted-by":"crossref","unstructured":"Mohammed, R.T., Khoo, B.E.: Image watermarking using slantlet transform. In\u00a02012 IEEE Symposium on Industrial Electronics and Applications, pp. 281\u2013286 (2012)","DOI":"10.1109\/ISIEA.2012.6496644"},{"issue":"1","key":"937_CR40","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.sigpro.2007.07.012","volume":"88","author":"J Wang","year":"2008","unstructured":"Wang, J., Liu, G., Dai, Y., Sun, J., Wang, Z., Lian, S.: Locally optimum detection for Barni\u2019s multiplicative watermarking in DWT domain. Signal Process 88(1), 117\u2013130 (2008)","journal-title":"Signal Process"},{"issue":"5","key":"937_CR41","doi-asserted-by":"crossref","first-page":"755","DOI":"10.1109\/83.918568","volume":"10","author":"M Barni","year":"2001","unstructured":"Barni, M., Bartolini, F., De Rosa, A., Piva, A.: A new decoder for the optimum recovery of nonadditive watermarks. IEEE Trans. Image Process. 10(5), 755\u2013766 (2001)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"937_CR42","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1016\/j.compeleceng.2009.12.003","volume":"36","author":"R Chamlawi","year":"2010","unstructured":"Chamlawi, R., Khan, A., Usman, I.: Authentication and recovery of images using multiple watermarks. Comput. Electr. Eng. 36(3), 578\u2013584 (2010)","journal-title":"Comput. Electr. Eng."},{"key":"937_CR43","unstructured":"Conroy, N.J., Rubin, V.L., & Chen, Y.: Automatic deception detection: Methods for finding fake news. In: Proceedings of the 78th ASIS&T Annual Meeting: Information Science with Impact: Research in and for the Community. American Society for Information Science, p. 82 (2015)"},{"issue":"9","key":"937_CR44","doi-asserted-by":"crossref","first-page":"3679","DOI":"10.1007\/s00500-015-1729-y","volume":"20","author":"B Jagadeesh","year":"2016","unstructured":"Jagadeesh, B., Kumar, P.R., Reddy, P.C.: Robust digital image watermarking based on fuzzy inference system and back propagation neural networks using DCT. Soft. Comput. 20(9), 3679\u20133686 (2016)","journal-title":"Soft. Comput."},{"issue":"16","key":"937_CR45","doi-asserted-by":"crossref","first-page":"9745","DOI":"10.1007\/s11042-015-2718-y","volume":"75","author":"CT Yen","year":"2016","unstructured":"Yen, C.T., Huang, Y.J.: Frequency domain digital watermark recognition using image code sequences with a back-propagation neural network. Multimed Tools Appl 75(16), 9745\u20139755 (2016)","journal-title":"Multimed Tools Appl"},{"key":"937_CR46","doi-asserted-by":"crossref","first-page":"2745","DOI":"10.1177\/1461444817731756","volume":"20","author":"EC Tandoc Jr","year":"2017","unstructured":"Tandoc Jr., E.C., Ling, R., Westlund, O., Duffy, A., Goh, D., Zheng Wei, L.: Audiences\u2019 acts of authentication in the age of fake news: a conceptual framework. New Media Soc. 20, 2745\u20132763 (2017)","journal-title":"New Media Soc."},{"issue":"2","key":"937_CR47","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1007\/s11045-015-0363-2","volume":"28","author":"J Wang","year":"2017","unstructured":"Wang, J., Lian, S., Shi, Y.Q.: Hybrid multiplicative multi-watermarking in DWT domain. Multidimens. Syst. Signal Process. 28(2), 617\u2013636 (2017)","journal-title":"Multidimens. Syst. Signal Process."},{"key":"937_CR48","doi-asserted-by":"crossref","unstructured":"Dragani\u0107, A., Mari\u0107, M., Orovi\u0107, I., Stankovi\u0107, S.: Identification of image source using serial-number-based watermarking under Compressive Sensing conditions. In: 2017 40th International convention on information and communication technology, electronics and microelectronics (MIPRO), pp. 1227\u20131232 (2017)","DOI":"10.23919\/MIPRO.2017.7973611"},{"issue":"1","key":"937_CR49","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s13042-015-0329-6","volume":"9","author":"R Mehta","year":"2018","unstructured":"Mehta, R., Rajpal, N., Vishwakarma, V.P.: Robust image watermarking scheme in lifting wavelet domain using GA-LSVR hybridization. Int. J. Mach. Learn. Cybernet. 9(1), 145\u2013161 (2018)","journal-title":"Int. J. Mach. Learn. Cybernet."},{"issue":"4","key":"937_CR50","doi-asserted-by":"crossref","first-page":"1933","DOI":"10.1007\/s11071-018-4299-6","volume":"93","author":"SA Parah","year":"2018","unstructured":"Parah, S.A., Loan, N.A., Shah, A.A., Sheikh, J.A., Bhat, G.M.: A new secure and robust watermarking technique based on logistic map and modification of DC coefficient. Nonlinear Dyn. 93(4), 1933\u20131951 (2018)","journal-title":"Nonlinear Dyn."},{"issue":"13","key":"937_CR51","doi-asserted-by":"crossref","first-page":"16447","DOI":"10.1007\/s11042-017-5214-8","volume":"77","author":"R Srivastava","year":"2018","unstructured":"Srivastava, R., Kumar, B., Singh, A.K., Mohan, A.: Computationally efficient joint imperceptible image watermarking and JPEG compression: a green computing approach. Multimed. Tools Appl. 77(13), 16447\u201316459 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"937_CR52","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.future.2016.11.023","volume":"86","author":"AK Singh","year":"2018","unstructured":"Singh, A.K., Kumar, B., Singh, S.K., Ghrera, S.P., Mohan, A.: Multiple watermarking technique for securing online social network contents using back propagation neural network. Future Gener. Comput. Syst. 86, 926\u2013939 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"937_CR53","first-page":"1","volume":"16","author":"T Zhang","year":"2018","unstructured":"Zhang, T., Li, X., Qi, W., Li, W., Guo, Z.: Real-time reversible data hiding based on multiple histogram modification. J. Real-Time Image Process. 16, 1\u201311 (2018)","journal-title":"J. Real-Time Image Process."},{"key":"937_CR54","first-page":"1","volume":"16","author":"Y Gao","year":"2018","unstructured":"Gao, Y., Wang, J., Shi, Y.Q.: Dynamic multi-watermarking and detecting in DWT domain. J. Real-Time Image Process. 16, 1\u201312 (2018)","journal-title":"J. Real-Time Image Process."},{"key":"937_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.03.009","author":"V Sharma","year":"2019","unstructured":"Sharma, V., Mir, R.N.: An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm. J King Saud Univ Comput Inform Sci (2019). https:\/\/doi.org\/10.1016\/j.jksuci.2019.03.009","journal-title":"J King Saud Univ Comput Inform Sci"},{"key":"937_CR56","volume-title":"Soft computing: theories and applications","author":"R Sinhal","year":"2019","unstructured":"Sinhal, R., Ansari, I.A.: A source and ownership identification framework for mobile based messenger applications. Soft computing: theories and applications. Springer, Singapore (2019)"},{"issue":"7","key":"937_CR57","doi-asserted-by":"crossref","first-page":"3800","DOI":"10.1109\/TSP.2007.894229","volume":"55","author":"AN Akansu","year":"2007","unstructured":"Akansu, A.N., Poluri, R.: Walsh-like nonlinear phase orthogonal codes for direct sequence CDMA communications. IEEE Trans. Signal Process. 55(7), 3800\u20133806 (2007)","journal-title":"IEEE Trans. Signal Process."},{"issue":"9","key":"937_CR58","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/35.714616","volume":"36","author":"EH Dinan","year":"1998","unstructured":"Dinan, E.H., Jabbari, B.: Spreading codes for direct sequence CDMA and wideband CDMA cellular networks. IEEE Commun. Mag. 36(9), 48\u201354 (1998)","journal-title":"IEEE Commun. Mag."},{"key":"937_CR59","doi-asserted-by":"crossref","unstructured":"Sewaif, A.B., Al-Mualla, M., Al-Ahmad, H.: Walsh-coded signatures for robust digital image watermarking. In: TENCON 2004. 2004 IEEE region 10 conference, pp. 431\u2013434, IEEE (2004)","DOI":"10.1109\/TENCON.2004.1414449"},{"issue":"17","key":"937_CR60","doi-asserted-by":"crossref","first-page":"18001","DOI":"10.1007\/s11042-016-3680-z","volume":"76","author":"IA Ansari","year":"2017","unstructured":"Ansari, I.A., Pant, M., Ahn, C.W.: Artificial bee colony optimized robust-reversible image watermarking. Multimed Tools Appl. 76(17), 18001\u201318025 (2017)","journal-title":"Multimed Tools Appl."},{"key":"937_CR61","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.jss.2013.09.033","volume":"88","author":"R Thabit","year":"2014","unstructured":"Thabit, R., Khoo, B.E.: Robust reversible watermarking scheme using Slantlet transform matrix. J. Syst. Softw. 88, 74\u201386 (2014)","journal-title":"J. Syst. Softw."},{"issue":"3","key":"937_CR62","doi-asserted-by":"crossref","first-page":"3669","DOI":"10.1007\/s11042-016-3928-7","volume":"76","author":"FN Thakkar","year":"2017","unstructured":"Thakkar, F.N., Srivastava, V.K.: A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed. Tools Appl. 76(3), 3669\u20133697 (2017)","journal-title":"Multimed. Tools Appl."},{"key":"937_CR63","doi-asserted-by":"crossref","unstructured":"Fridrich, J., Goljan, M.: Comparing robustness of watermarking techniques. In: Security and watermarking of multimedia contents, vol. 3657, pp. 214\u2013225. International Society for Optics and Photonics (1999)","DOI":"10.1117\/12.344671"}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00937-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11554-019-00937-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-019-00937-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T07:04:55Z","timestamp":1695539095000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11554-019-00937-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,19]]},"references-count":63,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["937"],"URL":"https:\/\/doi.org\/10.1007\/s11554-019-00937-z","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,19]]},"assertion":[{"value":"22 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}