{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T10:18:20Z","timestamp":1760955500650,"version":"3.40.4"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2014,8,26]],"date-time":"2014-08-26T00:00:00Z","timestamp":1409011200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s11760-014-0684-x","type":"journal-article","created":{"date-parts":[[2014,8,25]],"date-time":"2014-08-25T04:23:40Z","timestamp":1408940620000},"page":"89-98","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Robust and secure fractional wavelet image watermarking"],"prefix":"10.1007","volume":"9","author":[{"given":"Ehab H.","family":"Elshazly","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Osama S.","family":"Faragallah","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alaa M.","family":"Abbas","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mahmoud A.","family":"Ashour","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"El-Sayed M.","family":"El-Rabaie","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hassan","family":"Kazemian","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Saleh A.","family":"Alshebeili","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fathi E.","family":"Abd El-Samie","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hala S.","family":"El-sayed","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,8,26]]},"reference":[{"key":"684_CR1","doi-asserted-by":"crossref","unstructured":"Miyazaki, A.: A study on the best wavelet filter bank problem in the wavelet-based image watermarking. In: 18th European Conference on Circuit Theory and Design, ECCTD, pp. 184\u2013187 (2007)","DOI":"10.1109\/ECCTD.2007.4529567"},{"key":"684_CR2","doi-asserted-by":"crossref","unstructured":"Brannock, E., Weeks, M., Harrison, R.: Watermarking with wavelets: simplicity leads to robustness. In: Proceedings of the IEEE Southeast Conference 2008, Huntsville, Alabama, April 3\u20136, pp. 587\u2013592 (2008)","DOI":"10.1109\/SECON.2008.4494361"},{"key":"684_CR3","doi-asserted-by":"crossref","unstructured":"Djurovic, I., Stankovic, S., Pitas, I.: Digital watermarking in the fractional Fourier transformation domain. J. Netw. Comput. Appl. 24(2), 167\u2013173 (2001)","DOI":"10.1006\/jnca.2000.0128"},{"key":"684_CR4","doi-asserted-by":"crossref","unstructured":"Yu, F.Q., Zhang, Z. K., Xu, M.H.: A digital watermarking algorithm for image based on fractional Fourier transform. In: 2006 1ST IEEE Conference on Industrial Electronics and Applications, IEEE (2006)","DOI":"10.1109\/ICIEA.2006.257372"},{"key":"684_CR5","doi-asserted-by":"crossref","unstructured":"Hussain, F., Khan, E., Farooq, O.: Embedding and non-blind extraction of watermark data in images in FRFT domain. In: International Conference on Multimedia, Signal Processing, and Communication Technologies 14\u201316 March, pp. 280\u2013283 (2009)","DOI":"10.1109\/MSPCT.2009.5164230"},{"key":"684_CR6","doi-asserted-by":"crossref","unstructured":"Elshazly, Ehab H., Ashour, Mahmoud A., El-Rabaie, El-sayed M., Abbas, Alaa M., Kazemian, H.: An efficient fractional fourier transform approach for digital image watermarking. In: Proceeding of National Radio Science Conference NRSC (2012)","DOI":"10.1109\/NRSC.2012.6208529"},{"issue":"6","key":"684_CR7","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1080\/03772063.2007.10876174","volume":"53","author":"Chirag Pujara","year":"2007","unstructured":"Pujara, Chirag, Bhardwaj, Ashok, Gadre, Vikram M.: Secured watermarking in fractional wavelet domains. IETE J. Res. 53(6), 573\u2013580 (2007)","journal-title":"IETE J. Res."},{"key":"684_CR8","doi-asserted-by":"crossref","unstructured":"Dietze, M., Jassim, S.: Filters ranking for DWT domain robust digital watermarking. EURASIP J. Appl. Signal Process. 2004, 2093\u20132101 (2004)","DOI":"10.1155\/S1110865704402169"},{"key":"684_CR9","doi-asserted-by":"crossref","unstructured":"Tao, P., Eskicioglu, A.M.: A robust multiple watermarking scheme in the DWT Domain. In: Optics East 2004 Symposium, Internet Multimedia Management Systems V Conference, Philadelphia, PA, pp. 133\u2013144, October 25\u201328 (2004)","DOI":"10.1117\/12.569641"},{"key":"684_CR10","unstructured":"Tcheslavski, G.V.: Wavelets Fundamentals. http:\/\/ee.lamar.edu\/gleb\/dip\/index.htm , April (2008)"},{"key":"684_CR11","doi-asserted-by":"crossref","first-page":"2141","DOI":"10.1109\/78.536672","volume":"9","author":"MH Ozaktas","year":"1996","unstructured":"Ozaktas, M.H., Arikan, O.: Digital computation of the fractional fourier transform. IEEE Transactions on Signal Processing 9, 2141\u20132149 (1996)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"684_CR12","doi-asserted-by":"crossref","unstructured":"Elhoseny, H.M., Ahmed, H.E.H., Abbas, A.M., Kazemian, H.B., Faragallah, O.S., El-Rabaie, S.M., Abd El-Samie, F.E.: Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation. Signal Image Video Process. J. (2013). doi: 10.1007\/s11760-013-0490-x . Springer","DOI":"10.1007\/s11760-013-0490-x"},{"key":"684_CR13","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/S0165-1684(98)00024-3","volume":"67","author":"SC Pei","year":"1998","unstructured":"Pei, S.C., Yeh, M.H.: Two dimensional discrete fractional fourier transform. Signal Process. 67, 99\u2013108 (1998)","journal-title":"Signal Process."},{"key":"684_CR14","doi-asserted-by":"crossref","unstructured":"Bhatnagar, G., Raman, B.: A new SVD based watermarking framework in fractional Fourier domain. Contemp. Comput. IC3(1), 107\u2013118 (2010)","DOI":"10.1007\/978-3-642-14834-7_11"},{"key":"684_CR15","doi-asserted-by":"crossref","unstructured":"Ejima, M., Myazaki, A.: On the evaluation of performance of digital watermarking in the frequency domain. In: Proceedings of the IEEE International Conference on Image Processing, pp. 546\u2013549 (2001)","DOI":"10.1109\/ICIP.2001.958549"},{"key":"684_CR16","doi-asserted-by":"crossref","unstructured":"Aboshosha, A., Hassan, M., Ashour, M., El Mashade, M.: Image denoising based on spatial filters, an analytical study. In: ICCES09, Cairo, Egypt (2009)","DOI":"10.1109\/ICCES.2009.5384036"},{"issue":"8","key":"684_CR17","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/35.940053","volume":"39","author":"S Voloshynovskiy","year":"2001","unstructured":"Voloshynovskiy, S., Pereira, S., Pun, T.: Attacks on digital watermarks: classification, estimation-based attacks, and benchmarks. Comm. Mag. 39(8), 118\u2013126 (2001)","journal-title":"Comm. Mag."},{"key":"684_CR18","doi-asserted-by":"crossref","unstructured":"Sheng Xie, R., Zhou, M., Huang, C., Li, Y.: Anti-geometrical attacks image watermarking scheme based on template watermark. In: Proceedings of Computer Network and Multimedia Technology, CNMT, pp. 1\u20134 (2009)","DOI":"10.1109\/CNMT.2009.5374556"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-014-0684-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11760-014-0684-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-014-0684-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T09:56:40Z","timestamp":1746352600000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11760-014-0684-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,26]]},"references-count":18,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["684"],"URL":"https:\/\/doi.org\/10.1007\/s11760-014-0684-x","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"type":"print","value":"1863-1703"},{"type":"electronic","value":"1863-1711"}],"subject":[],"published":{"date-parts":[[2014,8,26]]}}}