{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T13:42:30Z","timestamp":1740145350569,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2016,7,25]],"date-time":"2016-07-25T00:00:00Z","timestamp":1469404800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Autom. Comput."],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s11633-016-1010-6","type":"journal-article","created":{"date-parts":[[2016,7,24]],"date-time":"2016-07-24T20:37:20Z","timestamp":1469392640000},"page":"672-685","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Quantization based watermarking methods against valumetric distortions"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8483-7742","authenticated-orcid":false,"given":"Zai-Ran","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2763-7832","authenticated-orcid":false,"given":"Jing","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,25]]},"reference":[{"issue":"12","key":"1010_CR1","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I. J. Cox","year":"1997","unstructured":"I. J. Cox, J. Kilian, F. Leighton, T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673\u20131687, 1997.","journal-title":"IEEE Transactions on Image Processing"},{"issue":"4","key":"1010_CR2","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/49.668975","volume":"16","author":"C. Podilchuk","year":"1998","unstructured":"C. Podilchuk, W. J. Zeng. Image-adaptive watermarking using visual models. IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 525\u2013539, 1998.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"4","key":"1010_CR3","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B. Chen","year":"2001","unstructured":"B. Chen, G. W. Wornell. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory, vol. 47, no. 4, pp. 1423\u20131443, 2001.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"12","key":"1010_CR4","doi-asserted-by":"publisher","first-page":"2083","DOI":"10.1109\/JPROC.2005.859599","volume":"93","author":"P. Moulin","year":"2005","unstructured":"P. Moulin, R. Koetter. Data-hiding codes. Proceedings of the IEEE, vol. 93, no. 12, pp. 2083\u20132126, 2005.","journal-title":"Proceedings of the IEEE"},{"issue":"3","key":"1010_CR5","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/S0165-1684(98)00012-7","volume":"66","author":"J. J. K. O. Ruanaidh","year":"1998","unstructured":"J. J. K. O. Ruanaidh, T. Pun. Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing, vol. 66, no. 3, pp. 303\u2013317, 1998.","journal-title":"Signal Processing"},{"issue":"4","key":"1010_CR6","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1109\/TSP.2003.809385","volume":"51","author":"H. S. Malvar","year":"2003","unstructured":"H. S. Malvar, D. A. F. Florencio. Improved spread spectrum: A new modulation technique for robust watermarking. IEEE Transactions on Signal Processing, vol. 51, no. 4, pp. 898\u2013905, 2003.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"4","key":"1010_CR7","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1109\/TSP.2003.809371","volume":"51","author":"M. Barni","year":"2003","unstructured":"M. Barni, F. Bartolini, A. De Rosa, A. Piva. Optimum decoding and detection of multiplicative watermarks. IEEE Transactions on Signal Processing, vol. 51, no. 4, pp. 1118\u20131123, 2003.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"4","key":"1010_CR8","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1109\/TIFS.2007.908226","volume":"2","author":"W. Liu","year":"2007","unstructured":"W. Liu, L. N. Dong, W. J. Zeng. Optimum detection for spread-spectrum watermarking that employs self-masking. IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, pp. 645\u2013654, 2007.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"1010_CR9","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1109\/TSP.2003.809366","volume":"51","author":"J. J. Eggers","year":"2003","unstructured":"J. J. Eggers, R. Bauml, R. Tzschoppe, B. Girod. Scalar costa scheme for information embedding. IEEE Transactions on Signal Processing, vol. 51, no. 4, pp. 1003\u20131019, 2003.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"4","key":"1010_CR10","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1109\/TSP.2003.809368","volume":"51","author":"F. Perez-Gonzalez","year":"2003","unstructured":"F. Perez-Gonzalez, F. Balado, J. R. H. Martin. Performance analysis of existing and new methods for data hiding with known-host information in additive channels. IEEE Transactions on Signal Processing, vol. 51, no. 4, pp. 960\u2013980, 2003.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"10","key":"1010_CR11","doi-asserted-by":"publisher","first-page":"2965","DOI":"10.1109\/TSP.2004.833868","volume":"52","author":"F. Bartolini","year":"2004","unstructured":"F. Bartolini, M. Barni, A. Piva. Performance analysis of stdm watermarking in presence of nonadditive attacks. IEEE Transactions on Signal Processing, vol. 52, no. 10, pp. 2965\u20132974, 2004.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"1","key":"1010_CR12","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1016\/j.eswa.2011.07.059","volume":"39","author":"R. S. Run","year":"2012","unstructured":"R. S. Run, S. J. Horng, J. L. Lai, T. W. Kao, R. J. Chen. An improved SVD-based watermarking technique for copyright protection. Expert Systems with Applications, vol. 39, no. 1, pp. 673\u2013689, 2012.","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"1010_CR13","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MMUL.2011.41","volume":"19","author":"D. Rosiyadi","year":"2012","unstructured":"D. Rosiyadi, S. J. Horng, P. Z. Fan, X. Wang, M. K. Khan, Y. Pan. Copyright protection for e-government document images. IEEE MultiMedia, vol. 19, no. 3, pp. 62\u201373, 2012.","journal-title":"IEEE MultiMedia"},{"issue":"7","key":"1010_CR14","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1016\/j.jvcir.2013.07.008","volume":"24","author":"S. J. Horng","year":"2013","unstructured":"S. J. Horng, D. Rosiyadi, T. R. Li, T. Takao, M. Y. Guo, M. K. Khan. A blind image copyright protection scheme for e-government. Journal of Visual Communication and Image Representation, vol. 24, no. 7, pp. 1099\u20131105, 2013.","journal-title":"Journal of Visual Communication and Image Representation"},{"issue":"3","key":"1010_CR15","doi-asserted-by":"publisher","first-page":"3085","DOI":"10.1007\/s11042-013-1579-5","volume":"72","author":"S. J. Horng","year":"2014","unstructured":"S. J. Horng, D. Rosiyadi, P. Z. Fan, X. Wang, M. K. Khan. An adaptive watermarking scheme for e-government document images. Multimedia Tools and Applications, vol. 72, no. 3, pp. 3085\u20133103, 2014.","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"1010_CR16","doi-asserted-by":"publisher","first-page":"3185","DOI":"10.1016\/j.eswa.2011.09.005","volume":"39","author":"M. E. Farfoura","year":"2012","unstructured":"M. E. Farfoura, S. J. Horng, J. L. Lai, R. S. Run, R. J. Chen, M. K. Khan. A blind reversible method for watermarking relational databases based on a time-stamping protocol. Expert Systems with Applications, vol. 39, no. 3, pp. 3185\u20133196, 2012.","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"1010_CR17","doi-asserted-by":"publisher","first-page":"2469","DOI":"10.1007\/s11042-013-1561-2","volume":"72","author":"S. J. Horng","year":"2014","unstructured":"S. J. Horng, M. E. Farfoura, P. Z. Fan, X. Wang, T. R. Li, J. M. Guo. A low cost fragile watermarking scheme in H.264\/AVC compressed domain. Multimedia Tools and Applications, vol. 72, no. 3, pp. 2469\u20132495, 2014.","journal-title":"Multimedia Tools and Applications"},{"issue":"12","key":"1010_CR18","doi-asserted-by":"publisher","first-page":"2140","DOI":"10.1109\/TIP.2005.857263","volume":"14","author":"P. Dong","year":"2005","unstructured":"P. Dong, J. G. Brankov, N. P. Galatsanos, Y. Y. Yang, F. Davoine. Digital watermarking robust to geometric distortions. IEEE Transactions on Image Processing, vol. 14, no. 12, pp. 2140\u20132150, 2005.","journal-title":"IEEE Transactions on Image Processing"},{"issue":"6","key":"1010_CR19","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1109\/83.846253","volume":"9","author":"S. Pereira","year":"2000","unstructured":"S. Pereira, T. Pun. Robust template matching for affine resistant image watermarks. IEEE Transactions on Image Processing, vol. 9, no. 6, pp. 1123\u20131129, 2000.","journal-title":"IEEE Transactions on Image Processing"},{"issue":"3","key":"1010_CR20","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1109\/TIFS.2011.2146250","volume":"6","author":"M. A. Akhaee","year":"2011","unstructured":"M. A. Akhaee, S. M. E. Sahraeian, C. Jin. Blind image watermarking using a sample projection approach. IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp. 883\u2013893, 2011.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"1010_CR21","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/TIFS.2008.2011080","volume":"4","author":"P. Guccione","year":"2009","unstructured":"P. Guccione, M. Scagliola. Hyperbolic rdm for nonlinear valumetric distortions. IEEE Transactions on Information Forensics and Security, vol. 4, no. 1, pp. 25\u201335, 2009.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1010_CR22","first-page":"5487","volume-title":"Proceedings of IEEE International Conference on Image Processing, IEEE, Paris, France","author":"Z. R. Wang","year":"2014","unstructured":"Z. R. Wang, J. Dong, W. Wang, T. N. Tan. An effective watermarking method against valumetric distortions. In Proceedings of IEEE International Conference on Image Processing, IEEE, Paris, France, pp. 5487\u20135491, 2014."},{"issue":"10","key":"1010_CR23","doi-asserted-by":"publisher","first-page":"3960","DOI":"10.1109\/TSP.2005.855407","volume":"53","author":"F. Perez-Gonzalez","year":"2005","unstructured":"F. Perez-Gonzalez, C. Mosquera, M. Barni, A. Abrardo. Rational dither modulation: A high-rate data-hiding method invariant to gain attacks. IEEE Transactions on Signal Processing, vol. 53, no. 10, pp. 3960\u20133975, 2005.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"1010_CR24","first-page":"797","volume":"2","author":"F. Ourique","year":"2005","unstructured":"F. Ourique, V. Licks, R. Jordan, F. Perez-Gonzalez. Angle QIM: A novel watermark embedding scheme robust against amplitude scaling distortions. In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, IEEE, Philadelphia, USA, vol. 2, pp. 797\u2013800, 2005.","journal-title":"Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, IEEE, Philadelphia, USA"},{"key":"1010_CR25","first-page":"2945","volume-title":"Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE, Vancouver, Canada","author":"M. Zareian","year":"2013","unstructured":"M. Zareian, H. R. Tohidypour, Z. J. Wang. A novel quantization-based watermarking approach invariant to gain attack. In Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE, Vancouver, Canada, pp. 2945\u20132948, 2013."},{"key":"1010_CR26","first-page":"1765","volume-title":"Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE, Kyoto, Japan","author":"X. S. Zhu","year":"2012","unstructured":"X. S. Zhu, S. L. Peng. A novel quantization watermarking scheme by modulating the normalized correlation. In Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE, Kyoto, Japan, pp. 1765\u20131768, 2012."},{"key":"1010_CR27","first-page":"387","volume-title":"Proceedings of SPIE Security andWatermarking of Multimedia Contents IV, SPIE, San Jose, USA","author":"J. J. Eggers","year":"2002","unstructured":"J. J. Eggers, R. B\u00e4uml, B. Girod. Estimation of amplitude modifications before scs watermark detection. In Proceedings of SPIE Security andWatermarking of Multimedia Contents IV, SPIE, San Jose, USA, vol. 4675, pp. 387\u2013398, 2002.","edition":"4675"},{"key":"1010_CR28","first-page":"796","volume-title":"Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia Contents VI, SPIE, San Jose, USA","author":"I. D. Shterev","year":"2004","unstructured":"I. D. Shterev, R. L. Lagendijk, R. Heusdens. Statistical amplitude scale estimation for quantization-based watermarking. In Proceedings of SPIE Security, Steganography, and Watermarking of Multimedia Contents VI, SPIE, San Jose, USA, vol. 5306, pp. 796\u2013804, 2004.","edition":"5306"},{"issue":"11","key":"1010_CR29","doi-asserted-by":"publisher","first-page":"4146","DOI":"10.1109\/TSP.2006.881216","volume":"54","author":"I. D. Shterev","year":"2006","unstructured":"I. D. Shterev, R. L. Lagendijk. Amplitude scale estimation for quantization-based watermarking. IEEE Transactions on Signal Processing, vol. 54, no. 11, pp. 4146\u20134155, 2006.","journal-title":"IEEE Transactions on Signal Processing"},{"key":"1010_CR30","first-page":"129","volume-title":"Proceedings of International Conference on Image Processing, IEEE, Rochester, USA","author":"M. L. Miller","year":"2002","unstructured":"M. L. Miller, G. J. Dorr, I. J. Cox. Dirty-paper trellis codes for watermarking. In Proceedings of International Conference on Image Processing, IEEE, Rochester, USA, vol. 2, pp. 129\u2013132, 2002.","edition":"2"},{"key":"1010_CR31","first-page":"1","volume-title":"Proceedings of IEEE the 7th Workshop on Multimedia Signal Processing, IEEE, Shanghai, China","author":"Q. Li","year":"2005","unstructured":"Q. Li, I. J. Cox. Rational dither modulation watermarking using a perceptual model. In Proceedings of IEEE the 7th Workshop on Multimedia Signal Processing, IEEE, Shanghai, China, pp. 1\u20134, 2005."},{"key":"1010_CR32","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1007\/11558859_9","volume":"3727","author":"P. Bas","year":"2005","unstructured":"P. Bas. A quantization watermarking technique robust to linear and non-linear valumetric distortions using a fractal set of floating quantizers. In Proceedings of International Conference on Information Hiding, Barcelona, Spain, vol. 3727, pp. 106\u2013117, 2005.","journal-title":"Proceedings of International Conference on Information Hiding, Barcelona, Spain"},{"issue":"7","key":"1010_CR33","doi-asserted-by":"publisher","first-page":"1888","DOI":"10.1109\/TMM.2014.2340695","volume":"16","author":"X. S. Zhu","year":"2014","unstructured":"X. S. Zhu, J. Ding, H. H. Dong, K. F. Hu, X. B. Zhang. Normalized correlation-based quantization modulation for robust watermarking. IEEE Transactions on Multimedia, vol. 16, no. 7, pp. 1888\u20131904, 2014.","journal-title":"IEEE Transactions on Multimedia"},{"issue":"11","key":"1010_CR34","doi-asserted-by":"publisher","first-page":"1804","DOI":"10.1109\/TIFS.2014.2355912","volume":"9","author":"M. Zareian","year":"2014","unstructured":"M. Zareian, H. R. Tohidypour. A novel gain invariant quantization-based watermarking approach. IEEE Transactions on Information Forensics and Security, vol. 9, no. 11, pp. 1804\u20131813, 2014.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1010_CR35","first-page":"V","volume":"5","author":"F. Guerrini","year":"2006","unstructured":"F. Guerrini, R. Leonardi, M. Barni. Image watermarking robust against non-linear value-metric scaling based on higher order statistics. In Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE, Toulouse, France, vol. 5, pp.V\u2013V, 2006.","journal-title":"Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE, Toulouse, France"},{"key":"1010_CR36","first-page":"473","volume":"5","author":"V. Q. Pham","year":"2007","unstructured":"V. Q. Pham, T. Miyaki, T. Yamasaki, K. Aizawa. Geometrically invariant object-based watermarking using sift feature. In Proceedings of IEEE International Conference on Image Processing, IEEE, San Antonio, USA, vol. 5, pp. 473\u2013476, 2007.","journal-title":"Proceedings of IEEE International Conference on Image Processing, IEEE, San Antonio, USA"},{"issue":"4","key":"1010_CR37","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1049\/iet-ipr.2009.0264","volume":"5","author":"Y. T. Lin","year":"2011","unstructured":"Y. T. Lin, C. Y. Huang, G. Lee. Rotation, scaling, and translation resilient watermarking for images. IET Image Processing, vol. 5, no. 4, pp. 328\u2013340, 2011.","journal-title":"IET Image Processing"}],"container-title":["International Journal of Automation and Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11633-016-1010-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-016-1010-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-016-1010-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11633-016-1010-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T13:06:33Z","timestamp":1568207193000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11633-016-1010-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,25]]},"references-count":37,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["1010"],"URL":"https:\/\/doi.org\/10.1007\/s11633-016-1010-6","relation":{},"ISSN":["1476-8186","1751-8520"],"issn-type":[{"type":"print","value":"1476-8186"},{"type":"electronic","value":"1751-8520"}],"subject":[],"published":{"date-parts":[[2016,7,25]]}}}