{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:32:06Z","timestamp":1772119926715,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s11760-023-02753-2","type":"journal-article","created":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T04:17:50Z","timestamp":1698121070000},"page":"953-960","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Large-capacity fragile watermarking scheme for color images based on prime number distribution theory"],"prefix":"10.1007","volume":"18","author":[{"given":"Weijie","family":"Hao","sequence":"first","affiliation":[]},{"given":"Ruixia","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Qiaoqiao","family":"Du","sequence":"additional","affiliation":[]},{"given":"Jiuru","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wenyin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,24]]},"reference":[{"key":"2753_CR1","volume-title":"Digital Watermarking and Steganograph","author":"I Cox","year":"2007","unstructured":"Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganograph. Morgan kaufmann, San Francisco (2007)"},{"issue":"2","key":"2753_CR2","doi-asserted-by":"publisher","first-page":"110","DOI":"10.3390\/info11020110","volume":"11","author":"M Begum","year":"2020","unstructured":"Begum, M., Uddin, M.S.: Digital image watermarking techniques: a review. Information 11(2), 110 (2020)","journal-title":"Information"},{"key":"2753_CR3","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s11760-020-01726-z","volume":"15","author":"Z Yao","year":"2021","unstructured":"Yao, Z., Liu, Y., Zhang, S., Yang, J.: Effective quaternion radial harmonic fourier moments for color image representation. SIViP 15, 93\u2013101 (2021)","journal-title":"SIViP"},{"key":"2753_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2020.165272","volume":"219","author":"X Zhang","year":"2020","unstructured":"Zhang, X., Su, Q., Yuan, Z., Liu, D.: An efficient blind color image watermarking algorithm in spatial domain combining discrete fourier transform. Optik 219, 165272 (2020). https:\/\/doi.org\/10.1016\/j.ijleo.2020.165272","journal-title":"Optik"},{"key":"2753_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2023.170585","volume":"274","author":"H Wang","year":"2023","unstructured":"Wang, H., Yuan, Z., Chen, S., Su, Q.: Embedding color watermark image to color host image based on 2d-dct. Optik 274, 170585 (2023). https:\/\/doi.org\/10.1016\/j.ijleo.2023.170585","journal-title":"Optik"},{"key":"2753_CR6","doi-asserted-by":"publisher","unstructured":"Yang, Z., Sun, Q., Qi, Y., Li, S., Ren, F.: A hyper-chaotically encrypted robust digital image watermarking method with large capacity using compress sensing on a hybrid domain. Entropy 24, 1486 (2022). https:\/\/doi.org\/10.3390\/e24101486","DOI":"10.3390\/e24101486"},{"key":"2753_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114540","volume":"170","author":"D Liu","year":"2021","unstructured":"Liu, D., Su, Q., Yuan, Z., Zhang, X.: A fusion-domain color image watermarking based on haar transform and image correction. Expert Syst. Appl. 170, 114540 (2021). https:\/\/doi.org\/10.1016\/j.eswa.2020.114540","journal-title":"Expert Syst. Appl."},{"key":"2753_CR8","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.ins.2022.05.046","volume":"606","author":"Q Su","year":"2022","unstructured":"Su, Q., Liu, D., Sun, Y.: A robust adaptive blind color image watermarking for resisting geometric attacks. Inf. Sci. 606, 194\u2013212 (2022). https:\/\/doi.org\/10.1016\/j.ins.2022.05.046","journal-title":"Inf. Sci."},{"key":"2753_CR9","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1080\/19393555.2021.1956023","volume":"31","author":"M Jana","year":"2022","unstructured":"Jana, M., Jana, B.: A new dct based robust image watermarking scheme using cellular automata. Inform. Security J.: A Glob. Perspect. 31, 527\u2013543 (2022). https:\/\/doi.org\/10.1080\/19393555.2021.1956023","journal-title":"Inform. Security J.: A Glob. Perspect."},{"key":"2753_CR10","doi-asserted-by":"crossref","unstructured":"Song, M., Wang, H., Wu, J., Yan, X., Yuan, L., Tu, Y.: A robust watermarking hybrid algorithm for color image. MATEC Web of Conferences (2021)","DOI":"10.1051\/matecconf\/202133607012"},{"key":"2753_CR11","doi-asserted-by":"publisher","unstructured":"Hsu, L., Hu, H.: Blind watermarking for color images using emmq based on qdft. Expert Systems with Applications 149, 113225 (2020) https:\/\/doi.org\/10.1016\/j.eswa.2020.113225","DOI":"10.1016\/j.eswa.2020.113225"},{"key":"2753_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117134","volume":"199","author":"L Hsu","year":"2022","unstructured":"Hsu, L., Hu, H., Chou, H.: A high-capacity qrd-based blind color image watermarking algorithm incorporated with ai technologies. Expert Syst. Appl. 199, 117134 (2022). https:\/\/doi.org\/10.1016\/j.eswa.2022.117134","journal-title":"Expert Syst. Appl."},{"key":"2753_CR13","doi-asserted-by":"publisher","first-page":"2982","DOI":"10.1016\/j.jksuci.2020.04.003","volume":"34","author":"K Prabha","year":"2022","unstructured":"Prabha, K., Sam, I.S.: An effective robust and imperceptible blind color image watermarking using wht. J. King Saud Univ.-Comput. Inform. Sci. 34, 2982\u20132992 (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2020.04.003","journal-title":"J. King Saud Univ.-Comput. Inform. Sci."},{"key":"2753_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.169319","volume":"262","author":"H Cao","year":"2022","unstructured":"Cao, H., Hu, F., Sun, Y., Chen, S., Su, Q.: Robust and reversible color image watermarking based on dft in the spatial domain. Optik 262, 169319 (2022). https:\/\/doi.org\/10.1016\/j.ijleo.2022.169319","journal-title":"Optik"},{"issue":"5","key":"2753_CR15","doi-asserted-by":"publisher","first-page":"6477","DOI":"10.1007\/s11042-021-11704-3","volume":"81","author":"Z Xia","year":"2022","unstructured":"Xia, Z., Zhang, W., Duan, H., Wang, J., Wei, X.: Fragile watermarking scheme in spatial domain based on prime number distribution theory. Multimed. Tools Appl. 81(5), 6477\u20136496 (2022)","journal-title":"Multimed. Tools Appl."},{"key":"2753_CR16","doi-asserted-by":"publisher","first-page":"1447","DOI":"10.1007\/s10278-021-00524-4","volume":"34","author":"X Wei","year":"2021","unstructured":"Wei, X., Zhang, W., Yang, B., Wang, J., Xia, Z.: Fragile watermark in medical image based on prime number distribution theory. J. Digit. Imaging 34, 1447\u20131462 (2021)","journal-title":"J. Digit. Imaging"},{"key":"2753_CR17","doi-asserted-by":"crossref","unstructured":"Peng, J., Wang, Z., Wang, S.: Similarity calculation method for images based on the scene graph. Signal, Image and Video Processing, 1\u20139 (2023)","DOI":"10.1007\/s11760-022-02456-0"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02753-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-023-02753-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02753-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T10:50:31Z","timestamp":1706179831000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-023-02753-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,24]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["2753"],"URL":"https:\/\/doi.org\/10.1007\/s11760-023-02753-2","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3169770\/v1","asserted-by":"object"}]},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,24]]},"assertion":[{"value":"14 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 October 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and\/or discussion reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}