{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:34:08Z","timestamp":1769722448919,"version":"3.49.0"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T00:00:00Z","timestamp":1728345600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T00:00:00Z","timestamp":1728345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s11554-024-01559-w","type":"journal-article","created":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T10:06:07Z","timestamp":1728381967000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Robust block-based watermarking algorithm with parallelization using multi-level discrete wavelet transformation"],"prefix":"10.1007","volume":"21","author":[{"given":"Akash","family":"Yadav","sequence":"first","affiliation":[]},{"given":"Jitendra","family":"Goyal","sequence":"additional","affiliation":[]},{"given":"Mushtaq","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,8]]},"reference":[{"key":"1559_CR1","doi-asserted-by":"publisher","unstructured":"Obar, J.A., Wildman, S.: Social media definition and the governance challenge: An introduction to the special issue. Telecommun. Policy 39(9), 745\u2013750 (2015) https:\/\/doi.org\/10.1016\/j.telpol.2015.07.014.https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0308596115001172. SPECIAL ISSUE ON THE GOVERNANCE OF SOCIAL MEDIA","DOI":"10.1016\/j.telpol.2015.07.014."},{"key":"1559_CR2","doi-asserted-by":"publisher","first-page":"e0263725","DOI":"10.1371\/journal.pone.0263725","volume":"17","author":"Y \u00c3-zkent","year":"2022","unstructured":"\u00c3-zkent, Y.: Social media usage to share information in communication journals: an analysis of social media activity and article citations. PLoS ONE 17, e0263725 (2022). https:\/\/doi.org\/10.1371\/journal.pone.0263725","journal-title":"PLoS ONE"},{"key":"1559_CR3","doi-asserted-by":"publisher","unstructured":"Tsai, W.H.S., Men, R.L.: Social messengers as the new frontier of organization-public engagement: a wechat study. Public Relat. Rev. 44(3), 419\u2013429 (2018) https:\/\/doi.org\/10.1016\/j.pubrev.2018.04.004., https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0363811117300838","DOI":"10.1016\/j.pubrev.2018.04.004."},{"key":"1559_CR4","doi-asserted-by":"publisher","unstructured":"Burgess, J., Bruns, A. Twitter archives and the challenges of \u2019big social data\u2019; for media and communication research. M\/C J. 15(5) (2012)https:\/\/doi.org\/10.5204\/mcj.561, https:\/\/journal.media-culture.org.au\/index.php\/mcjournal\/article\/view\/561","DOI":"10.5204\/mcj.561"},{"key":"1559_CR5","doi-asserted-by":"publisher","unstructured":"Zhong, X., Das, A., Alrasheedi, F., Tanvir, A.: A brief, in-depth survey of deep learning-based image watermarking. Appl. Sci. 13(21) (2023)https:\/\/doi.org\/10.3390\/app132111852, https:\/\/www.mdpi.com\/2076-3417\/13\/21\/11852","DOI":"10.3390\/app132111852"},{"issue":"5","key":"1559_CR6","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1007\/s11554-020-01005-7","volume":"18","author":"S Shivani","year":"2021","unstructured":"Shivani, S., Patel, S.C., Arora, V., Sharma, B., Jolfaei, A., Srivastava, G.: Real-time cheating immune secret sharing for remote sensing images. J. Real-Time Image Process. 18(5), 1493\u20131508 (2021). https:\/\/doi.org\/10.1007\/s11554-020-01005-7","journal-title":"J. Real-Time Image Process."},{"key":"1559_CR7","doi-asserted-by":"publisher","first-page":"135831","DOI":"10.1109\/ACCESS.2023.3335172","volume":"11","author":"P Singh","year":"2023","unstructured":"Singh, P., Devi, K.J., Thakkar, H.K., Bilal, M., Nayyar, A., Kwak, D.: Robust and secure medical image watermarking for edge-enabled e-healthcare. IEEE Access 11, 135831\u2013135845 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3335172","journal-title":"IEEE Access"},{"issue":"18","key":"1559_CR8","doi-asserted-by":"publisher","first-page":"25101","DOI":"10.1007\/s11042-022-11956-7","volume":"81","author":"M Magdy","year":"2022","unstructured":"Magdy, M., Hosny, K.M., Ghali, N.I., Ghoniemy, S.: Security of medical images for telemedicine: a systematic review. Multimed. Tools Appl. 81(18), 25101\u201325145 (2022). https:\/\/doi.org\/10.1007\/s11042-022-11956-7","journal-title":"Multimed. Tools Appl."},{"key":"1559_CR9","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1007\/978-3-030-11196-0_40","volume-title":"Innovations in Smart Cities Applications","author":"AH Allaf","year":"2019","unstructured":"Allaf, A.H., Kbir, M.A.: A review of digital watermarking applications for medical image exchange security. In: Ben Ahmed, M., Boudhir, A.A., Younes, A. (eds.) Innovations in Smart Cities Applications, 2nd edn., pp. 472\u2013480. Springer International Publishing, Cham (2019)","edition":"2"},{"key":"1559_CR10","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2017.70306","author":"S Almuhammadi","year":"2017","unstructured":"Almuhammadi, S., Al-Shaaby, A.: A survey on recent approaches combining cryptography and steganography. Comput. Sci. Inform. Technol. (CS IT) (2017). https:\/\/doi.org\/10.5121\/csit.2017.70306","journal-title":"Comput. Sci. Inform. Technol. (CS IT)"},{"key":"1559_CR11","doi-asserted-by":"publisher","first-page":"23409","DOI":"10.1109\/ACCESS.2021.3053998","volume":"9","author":"N Subramanian","year":"2021","unstructured":"Subramanian, N., Elharrouss, O., Al-Maadeed, S., Bouridane, A.: Image steganography: a review of the recent advances. IEEE Access 9, 23409\u201323423 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3053998","journal-title":"IEEE Access"},{"key":"1559_CR12","doi-asserted-by":"publisher","unstructured":"Majeed, M.A., Sulaiman, R., Shukur, Z., Hasan, M.K.: A review on text steganography techniques. Mathematics 9(21) (2021).https:\/\/doi.org\/10.3390\/math9212829, https:\/\/www.mdpi.com\/2227-7390\/9\/21\/2829","DOI":"10.3390\/math9212829"},{"key":"1559_CR13","doi-asserted-by":"publisher","first-page":"166589","DOI":"10.1109\/ACCESS.2020.3022779","volume":"8","author":"O Evsutin","year":"2020","unstructured":"Evsutin, O., Melman, A., Meshcheryakov, R.: Digital steganography and watermarking for digital images: a review of current research directions. IEEE Access 8, 166589\u2013166611 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3022779","journal-title":"IEEE Access"},{"key":"1559_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100530","volume":"47","author":"S Ullah","year":"2023","unstructured":"Ullah, S., Zheng, J., Din, N., Hussain, M.T., Ullah, F., Yousaf, M.: Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey. Comput. Sci. Rev. 47, 100530 (2023). https:\/\/doi.org\/10.1016\/j.cosrev.2022.100530","journal-title":"Comput. Sci. Rev."},{"key":"1559_CR15","doi-asserted-by":"publisher","unstructured":"Shalini\u00a0Subramani Selvi\u00a0M, K.A., Svn, S.K.: Review of security methods based on classical cryptography and quantum cryptography. Cybern. Syst. (2023). https:\/\/doi.org\/10.1080\/01969722.2023.2166261","DOI":"10.1080\/01969722.2023.2166261"},{"issue":"11","key":"1559_CR16","doi-asserted-by":"publisher","first-page":"7066","DOI":"10.1109\/TCSVT.2023.3269468","volume":"33","author":"X Yin","year":"2023","unstructured":"Yin, X., Wu, S., Wang, K., Lu, W., Zhou, Y., Huang, J.: Anti-rounding image steganography with separable fine-tuned network. IEEE Trans. Circuits Syst. Video Technol. 33(11), 7066\u20137079 (2023). https:\/\/doi.org\/10.1109\/TCSVT.2023.3269468","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"1559_CR17","doi-asserted-by":"crossref","unstructured":"Ruan, F., Zhang, X., Zhu, D., Xu, Z., Wan, S., Qi, L.: Deep learning for real-time image steganalysis: a survey. J. Real-Time Image Process. 17, 149 \u2013 160 (2019). https:\/\/api.semanticscholar.org\/CorpusID:203654112","DOI":"10.1007\/s11554-019-00915-5"},{"key":"1559_CR18","doi-asserted-by":"publisher","unstructured":"Begum, M., Uddin, M.S.: Digital image watermarking techniques: a review. Information 11(2) (2020)https:\/\/doi.org\/10.3390\/info11020110. https:\/\/www.mdpi.com\/2078-2489\/11\/2\/110","DOI":"10.3390\/info11020110"},{"issue":"4","key":"1559_CR19","doi-asserted-by":"publisher","first-page":"3225","DOI":"10.1007\/s11277-021-08177-w","volume":"118","author":"P Kadian","year":"2021","unstructured":"Kadian, P., Arora, S.M., Arora, N.: Robust digital watermarking techniques for copyright protection of digital data: a survey. Wirel. Pers. Commun. 118(4), 3225\u20133249 (2021). https:\/\/doi.org\/10.1007\/s11277-021-08177-w","journal-title":"Wirel. Pers. Commun."},{"key":"1559_CR20","doi-asserted-by":"publisher","first-page":"77212","DOI":"10.1109\/ACCESS.2018.2879919","volume":"6","author":"KM Hosny","year":"2018","unstructured":"Hosny, K.M., Darwish, M.M., Li, K., Salah, A.: Parallel multi-core cpu and gpu for fast and robust medical image watermarking. IEEE Access 6, 77212\u201377225 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2879919","journal-title":"IEEE Access"},{"key":"1559_CR21","doi-asserted-by":"publisher","unstructured":"Ivanescu, R.C., Nagy, R., Ofiteru, A.I., Comanescu, C., Manda, A.: Parallel vs distributed edge detection for large medical image datasets. In: 2022 E-Health and Bioengineering Conference (EHB), 1\u20134 (2022).https:\/\/doi.org\/10.1109\/EHB55594.2022.9991599","DOI":"10.1109\/EHB55594.2022.9991599"},{"key":"1559_CR22","doi-asserted-by":"publisher","DOI":"10.1186\/1687-6180-2014-135","author":"H Nyeem","year":"2014","unstructured":"Nyeem, H., Boles, W., Boyd, C.: Digital image watermarking: its formal model, fundamental properties, and possible attacks. EURASIP J. Adv. Signal Process. (2014). https:\/\/doi.org\/10.1186\/1687-6180-2014-135","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"1559_CR23","doi-asserted-by":"crossref","unstructured":"P\u00e9rez-Freire, L., Alfaro, P.C., Troncoso-Pastoriza, J.R., P\u00e9rez-Gonz\u00e1lez, F.: Watermarking security: a survey. Trans. Data Hiding Multim. Secur. 1, 41\u201372 (2006). https:\/\/api.semanticscholar.org\/CorpusID:6753393","DOI":"10.1007\/11926214_2"},{"key":"1559_CR24","doi-asserted-by":"publisher","first-page":"2742","DOI":"10.35940\/ijeat.C5773.029320","volume":"9","author":"A Embaby","year":"2020","unstructured":"Embaby, A., Wahby\u00a0Shalaby, M., Elsayed, K.: Digital watermarking properties, classification and techniques. Int. J. Eng. Adv. Technol. 9, 2742\u20132750 (2020). https:\/\/doi.org\/10.35940\/ijeat.C5773.029320","journal-title":"Int. J. Eng. Adv. Technol."},{"key":"1559_CR25","doi-asserted-by":"publisher","unstructured":"Mohanarathinam, A., Subramaniam, K., G\u00a0K\u00a0D, P.V., Ravi, R., Manikandababu, C.: Digital watermarking techniques for image security: a review. J. Ambient Intell. Humaniz. Comput. (2020). https:\/\/doi.org\/10.1007\/s12652-019-01500-1","DOI":"10.1007\/s12652-019-01500-1"},{"key":"1559_CR26","doi-asserted-by":"publisher","unstructured":"Wang, C., Zhang, H., Zhou, X.: A self-recovery fragile image watermarking with variable watermark capacity. Appl. Sci. 8(4), (2018)https:\/\/doi.org\/10.3390\/app8040548, https:\/\/www.mdpi.com\/2076-3417\/8\/4\/548","DOI":"10.3390\/app8040548"},{"key":"1559_CR27","doi-asserted-by":"publisher","unstructured":"Zhang, F., Zhang, H.: Digital watermarking capacity and reliability. In: Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004., 295\u2013298 (2004). https:\/\/doi.org\/10.1109\/ICECT.2004.1319746","DOI":"10.1109\/ICECT.2004.1319746"},{"key":"1559_CR28","doi-asserted-by":"publisher","unstructured":"Faheem, Z.B., Ishaq, A., Rustam, F., de\u00a0la Torre\u00a0D\u00ed\u00adez, I., Gavilanes, D., Vergara, M.M., Ashraf, I.: Image watermarking using least significant bit and canny edge detection. Sensors 23(3), (2023).https:\/\/doi.org\/10.3390\/s23031210, https:\/\/www.mdpi.com\/1424-8220\/23\/3\/1210","DOI":"10.3390\/s23031210"},{"key":"1559_CR29","doi-asserted-by":"publisher","unstructured":"Muyco, S.D., Hernandez, A.A.: Least significant bit hash algorithm for digital image watermarking authentication. In: Proceedings of the 2019 5th International Conference on Computing and Artificial Intelligence, ICCAI \u201919, p. 150-154. Association for Computing Machinery, New York, NY, USA (2019). https:\/\/doi.org\/10.1145\/3330482.3330523","DOI":"10.1145\/3330482.3330523"},{"key":"1559_CR30","doi-asserted-by":"publisher","first-page":"117248","DOI":"10.1109\/ACCESS.2022.3217920","volume":"10","author":"S Mehraj","year":"2022","unstructured":"Mehraj, S., Mushtaq, S., Parah, S.A., Giri, K.J., Sheikh, J.A., Gandomi, A.H., Hijji, M., Muhammad, K.: Spatial domain-based robust watermarking framework for cultural images. IEEE Access 10, 117248\u2013117260 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3217920","journal-title":"IEEE Access"},{"key":"1559_CR31","doi-asserted-by":"crossref","unstructured":"Zeki, A.M., Abubakar, A.I., Chiroma, H.: An intermediate significant bit (isb) watermarking technique using neural networks. SpringerPlus (2016). https:\/\/api.semanticscholar.org\/CorpusID:14102455","DOI":"10.1186\/s40064-016-2371-6"},{"issue":"3","key":"1559_CR32","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s00530-003-0097-0","volume":"9","author":"IK Yeo","year":"2003","unstructured":"Yeo, I.K., Kim, H.J.: Generalized patchwork algorithm for image watermarking. Multimedia Syst. 9(3), 261\u2013265 (2003). https:\/\/doi.org\/10.1007\/s00530-003-0097-0","journal-title":"Multimedia Syst."},{"key":"1559_CR33","doi-asserted-by":"publisher","unstructured":"Abraham, J., Paul, V.: An imperceptible spatial domain color image watermarking scheme. J. King Saud Univ.-Comput. Inform. Sci. 31(1), 125\u2013133 (2019)https:\/\/doi.org\/10.1016\/j.jksuci.2016.12.004., https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1319157816301483","DOI":"10.1016\/j.jksuci.2016.12.004."},{"key":"1559_CR34","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/S1665-6423(14)71612-8","volume":"12","author":"H Tao","year":"2014","unstructured":"Tao, H., Chongmin, L., Mohamad Zain, J., Abdalla, A.: Robust image watermarking theories and techniques: a review. J. Appl. Res. Technol. 12, 122\u2013138 (2014). https:\/\/doi.org\/10.1016\/S1665-6423(14)71612-8","journal-title":"J. Appl. Res. Technol."},{"key":"1559_CR35","doi-asserted-by":"publisher","first-page":"1792","DOI":"10.1016\/j.optcom.2011.12.065","volume":"285","author":"Q Su","year":"2012","unstructured":"Su, Q., Niu, Y., Liu, X., Zhu, Y.: Embedding color watermarks in color images based on Schur decomposition. Opt. Commun. 285, 1792\u20131802 (2012). https:\/\/doi.org\/10.1016\/j.optcom.2011.12.065","journal-title":"Opt. Commun."},{"key":"1559_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.06.024","author":"T Araghi","year":"2018","unstructured":"Araghi, T., Manaf, A., Kohpayeh, S.: A secure blind discrete wavelet transform based watermarking scheme using two-level singular value decomposition. Expert Syst. Appl. (2018). https:\/\/doi.org\/10.1016\/j.eswa.2018.06.024","journal-title":"Expert Syst. Appl."},{"issue":"10","key":"1559_CR37","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1049\/iet-ipr.2016.0862","volume":"11","author":"S Liu","year":"2017","unstructured":"Liu, S., Pan, Z., Song, H.: Digital image watermarking method based on dct and fractal encoding. IET Image Process. 11(10), 815\u2013821 (2017). https:\/\/doi.org\/10.1049\/iet-ipr.2016.0862","journal-title":"IET Image Process."},{"key":"1559_CR38","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/s11042-020-09677-w","volume":"80","author":"LH Gong","year":"2021","unstructured":"Gong, L.H., Tian, C., Zou, W.P., Zhou, N.R.: Robust and imperceptible watermarking scheme based on canny edge detection and svd in the contourlet domain. Multimed. Tools Appl. 80, 439\u2013461 (2021)","journal-title":"Multimed. Tools Appl."},{"issue":"11","key":"1559_CR39","doi-asserted-by":"publisher","first-page":"13197","DOI":"10.1007\/s11042-017-4941-1","volume":"77","author":"XB Kang","year":"2018","unstructured":"Kang, X.B., Zhao, F., Lin, G.F., Chen, Y.J.: A novel hybrid of dct and svd in dwt domain for robust and invisible blind image watermarking with optimal embedding strength. Multimed. Tools Appl. 77(11), 13197\u201313224 (2018). https:\/\/doi.org\/10.1007\/s11042-017-4941-1","journal-title":"Multimed. Tools Appl."},{"key":"1559_CR40","doi-asserted-by":"publisher","unstructured":"Verma, L., Pratap Singh\u00a0Chauhan, S.: A review on digital image watermarking using transformation and optimization techniques. In: 2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), 1008\u20131012 (2020). https:\/\/doi.org\/10.1109\/ICACCCN51052.2020.9362885","DOI":"10.1109\/ICACCCN51052.2020.9362885"},{"issue":"12","key":"1559_CR41","doi-asserted-by":"publisher","first-page":"7342","DOI":"10.1109\/TCSVT.2023.3281618","volume":"33","author":"S Chen","year":"2023","unstructured":"Chen, S., Malik, A., Zhang, X., Feng, G., Wu, H.: A fast method for robust video watermarking based on zernike moments. IEEE Trans. Circuits Syst. Video Technol. 33(12), 7342\u20137353 (2023). https:\/\/doi.org\/10.1109\/TCSVT.2023.3281618","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"1559_CR42","doi-asserted-by":"publisher","unstructured":"Devi, H.S., Singh, K.M.: Red-cyan anaglyph image watermarking using dwt, hadamard transform and singular value decomposition for copyright protection. J. Inform. Secur. Appl. 50, 102424 (2020)https:\/\/doi.org\/10.1016\/j.jisa.2019.102424., https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2214212619301826","DOI":"10.1016\/j.jisa.2019.102424."},{"key":"1559_CR43","doi-asserted-by":"publisher","unstructured":"Manikandan, V., Masilamani, V.: Histogram shifting-based blind watermarking scheme for copyright protection in 5g. Comput. Electric. Eng. 72, 614\u2013630 (2018)https:\/\/doi.org\/10.1016\/j.compeleceng.2018.03.007., https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0045790617319754","DOI":"10.1016\/j.compeleceng.2018.03.007."},{"key":"1559_CR44","doi-asserted-by":"crossref","unstructured":"Darwish, S.M., Al-Khafaji, L.D.S.: Dual watermarking for color images: A new image copyright protection model based on the fusion of successive and segmented watermarking. Multimed. Tools Appl. 79, 6503 \u2013 6530 (2019). https:\/\/api.semanticscholar.org\/CorpusID:209381178","DOI":"10.1007\/s11042-019-08290-w"},{"key":"1559_CR45","doi-asserted-by":"crossref","unstructured":"Liu, X., Lin, C.C., Yuan, S.M.: Blind dual watermarking for color images\u2019 authentication and copyright protection. IEEE Trans. Circuits Syst. Video Technol. 28, 1047\u20131055 (2018). https:\/\/api.semanticscholar.org\/CorpusID:19109093","DOI":"10.1109\/TCSVT.2016.2633878"},{"key":"1559_CR46","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4931-3","author":"K Rangel-Espinoza","year":"2018","unstructured":"Rangel-Espinoza, K., Fragoso-Navarro, E., Cruz-Ramos, C., Reyes-Reyes, R., Nakano-Miyatake, M., Perez-Meana, H.: Adaptive removable visible watermarking technique using dual watermarking for digital color images. Multimed. Tools Appl. (2018). https:\/\/doi.org\/10.1007\/s11042-017-4931-3","journal-title":"Multimed. Tools Appl."},{"key":"1559_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.07.012","author":"M Begum","year":"2021","unstructured":"Begum, M., Ferdush, J., Uddin, M.S.: Hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition. J. King Saud Univ. Comput. Inform. Sci. (2021). https:\/\/doi.org\/10.1016\/j.jksuci.2021.07.012","journal-title":"J. King Saud Univ. Comput. Inform. Sci."},{"key":"1559_CR48","doi-asserted-by":"publisher","first-page":"151985","DOI":"10.1109\/ACCESS.2019.2948086","volume":"7","author":"F Ernawan","year":"2019","unstructured":"Ernawan, F., Kabir, M.N.: An improved watermarking technique for copyright protection based on Tchebichef moments. IEEE Access 7, 151985\u2013152003 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2948086","journal-title":"IEEE Access"},{"key":"1559_CR49","doi-asserted-by":"publisher","unstructured":"Murali, P., Sankaradass, V.: An efficient roi based copyright protection scheme for digital images with svd and orthogonal polynomials transformation. Optik 170, 242\u2013264 (2018)https:\/\/doi.org\/10.1016\/j.ijleo.2018.04.050., https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0030402618305436","DOI":"10.1016\/j.ijleo.2018.04.050."},{"issue":"2","key":"1559_CR50","doi-asserted-by":"publisher","first-page":"3357","DOI":"10.1007\/s11042-023-15349-2","volume":"83","author":"S.P Vaidya","year":"2023","unstructured":"Vaidya, S..P., Mouli, P..V..S..S..R..C.: Robust digital color image watermarking based on compressive sensing and dwt. Multimed. Tools Appl. 83(2), 3357\u20133371 (2023). https:\/\/doi.org\/10.1007\/s11042-023-15349-2","journal-title":"Multimed. Tools Appl."},{"key":"1559_CR51","doi-asserted-by":"publisher","unstructured":"Gong, L.H., Luo, H.X.: Dual color images watermarking scheme with geometric correction based on quaternion froofmms and ls-svr. Opt. Laser Technol. 167, 109665 (2023)https:\/\/doi.org\/10.1016\/j.optlastec.2023.109665., https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0030399223005583","DOI":"10.1016\/j.optlastec.2023.109665."},{"key":"1559_CR52","doi-asserted-by":"publisher","unstructured":"Sharma, S., Sharma, H., Sharma, J.B.: An adaptive color image watermarking using rdwt-svd and artificial bee colony based quality metric strength factor optimization. Appl. Soft Comput. 84, 105696 (2019)https:\/\/doi.org\/10.1016\/j.asoc.2019.105696., https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1568494619304776","DOI":"10.1016\/j.asoc.2019.105696."},{"issue":"1","key":"1559_CR53","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s00371-018-1567-x","volume":"36","author":"F Ernawan","year":"2020","unstructured":"Ernawan, F., Kabir, M.N.: A block-based rdwt-svd image watermarking method using human visual system characteristics. Vis. Comput. 36(1), 19\u201337 (2020). https:\/\/doi.org\/10.1007\/s00371-018-1567-x","journal-title":"Vis. Comput."},{"key":"1559_CR54","doi-asserted-by":"publisher","unstructured":"Das, C., Panigrahi, S., Sharma, V.K., Mahapatra, K.: A novel blind robust image watermarking in dct domain using inter-block coefficient correlation. AEU Int. J. Electron. Commun. 68(3), 244\u2013253 (2014)https:\/\/doi.org\/10.1016\/j.aeue.2013.08.018., https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1434841113002239","DOI":"10.1016\/j.aeue.2013.08.018."},{"key":"1559_CR55","doi-asserted-by":"publisher","unstructured":"yang Wang, X., Tian, J., lin Tian, J., pan Niu, P., ying Yang, H.: Statistical image watermarking using local rhfms magnitudes and beta exponential distribution. J. Vis. Commun. Image Represent. 77, 103123 (2021). https:\/\/doi.org\/10.1016\/j.jvcir.2021.103123, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1047320321000778","DOI":"10.1016\/j.jvcir.2021.103123"},{"issue":"6","key":"1559_CR56","doi-asserted-by":"publisher","first-page":"2153","DOI":"10.1007\/s00371-021-02275-3","volume":"38","author":"K Hu","year":"2022","unstructured":"Hu, K., Wang, X., Hu, J., Li, D., Du, L., Wang, H., Qin, H.: Robust and efficient image watermarking via emd and dimensionality reduction. Vis. Comput. 38(6), 2153\u20132170 (2022). https:\/\/doi.org\/10.1007\/s00371-021-02275-3","journal-title":"Vis. Comput."},{"key":"1559_CR57","doi-asserted-by":"publisher","unstructured":"Makbol, N.M., Khoo, B.E., Rassem, T.H., Loukhaoukha, K.: A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection. Inform. Sci. 417, 381\u2013400 (2017)https:\/\/doi.org\/10.1016\/j.ins.2017.07.026., https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025516322186","DOI":"10.1016\/j.ins.2017.07.026."}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-024-01559-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11554-024-01559-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-024-01559-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T13:15:41Z","timestamp":1732799741000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11554-024-01559-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,8]]},"references-count":57,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["1559"],"URL":"https:\/\/doi.org\/10.1007\/s11554-024-01559-w","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"value":"1861-8200","type":"print"},{"value":"1861-8219","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,8]]},"assertion":[{"value":"25 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"182"}}