{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T20:59:39Z","timestamp":1774645179450,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T00:00:00Z","timestamp":1738022400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T00:00:00Z","timestamp":1738022400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the Sichuan Science and Technology program","award":["2023NSFSC0470"],"award-info":[{"award-number":["2023NSFSC0470"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s11760-024-03803-z","type":"journal-article","created":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T18:48:14Z","timestamp":1738090094000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Robust and secure image watermarking algorithm resisting JPEG compression and cropping based on Reed Solomon (RS) codes"],"prefix":"10.1007","volume":"19","author":[{"given":"Yushi","family":"Liu","sequence":"first","affiliation":[]},{"given":"Canghong","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Xuefei","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Xianhua","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,28]]},"reference":[{"key":"3803_CR1","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.neucom.2022.02.083","volume":"488","author":"W Wan","year":"2022","unstructured":"Wan, W., Wang, J., Zhang, Y., Li, J., Hui, Yu., Sun, J.: A comprehensive survey on robust image watermarking. Neurocomputing 488, 226\u2013247 (2022)","journal-title":"Neurocomputing"},{"issue":"1","key":"3803_CR2","first-page":"125","volume":"31","author":"J Abraham","year":"2019","unstructured":"Abraham, J., Paul, V.: An imperceptible spatial domain color image watermarking scheme. J. King Saud Univ. Comput. Inf. Sci. 31(1), 125\u2013133 (2019)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"3803_CR3","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.ins.2020.05.034","volume":"535","author":"X Wang","year":"2020","unstructured":"Wang, X., Wen, T., Shen, X., Niu, P., Yang, H.: A new watermark decoder in DNST domain using singular values and Gaussian\u2013Cauchy mixture-based vector HMT. Inf. Sci. 535, 81\u2013106 (2020)","journal-title":"Inf. Sci."},{"key":"3803_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113225","volume":"149","author":"L-Y Hsu","year":"2020","unstructured":"Hsu, L.-Y., Hwai-Tsu, H.: Blind watermarking for color images using EMMQ based on QDFT. Expert Syst. Appl. 149, 113225 (2020)","journal-title":"Expert Syst. Appl."},{"key":"3803_CR5","doi-asserted-by":"publisher","first-page":"1867","DOI":"10.1007\/s00371-020-01945-y","volume":"37","author":"Z Yuan","year":"2021","unstructured":"Yuan, Z., Qingtang, S., Liu, D., Zhang, X.: A blind image watermarking scheme combining spatial domain and frequency domain. Vis. Comput. 37, 1867\u20131881 (2021)","journal-title":"Vis. Comput."},{"key":"3803_CR6","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1007\/s11760-013-0555-x","volume":"9","author":"M Cedillo-Hernandez","year":"2015","unstructured":"Cedillo-Hernandez, M., Garcia-Ugalde, F., Nakano-Miyatake, M., Perez-Meana, H.: Robust watermarking method in DFT domain for effective management of medical imaging. SIViP 9, 1163\u20131178 (2015)","journal-title":"SIViP"},{"key":"3803_CR7","doi-asserted-by":"publisher","first-page":"15487","DOI":"10.1007\/s11042-020-10322-9","volume":"80","author":"Sanjay Kumar and Binod Kumar Singh","year":"2021","unstructured":"Sanjay Kumar and Binod Kumar Singh: Dwt based color image watermarking using maximum entropy. Multimed. Tools Appl. 80, 15487\u201315510 (2021)","journal-title":"Multimed. Tools Appl."},{"key":"3803_CR8","doi-asserted-by":"crossref","unstructured":"Morita, Y., Ayeh, E., Adamo, O.B., Guturu, P.: Hardware\/software co-design approach for a DCT-based watermarking algorithm. In: 2009 52nd IEEE International Midwest Symposium on Circuits and Systems, pp. 683\u2013686. IEEE (2009)","DOI":"10.1109\/MWSCAS.2009.5236002"},{"issue":"1","key":"3803_CR9","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1109\/6046.985560","volume":"4","author":"R Liu","year":"2002","unstructured":"Liu, R., Tan, T.: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed. 4(1), 121\u2013128 (2002)","journal-title":"IEEE Trans. Multimed."},{"issue":"2","key":"3803_CR10","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.ijleo.2015.09.205","volume":"127","author":"S Fazli","year":"2016","unstructured":"Fazli, S., Moeini, M.: A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks. Optik 127(2), 964\u2013972 (2016)","journal-title":"Optik"},{"issue":"12","key":"3803_CR11","doi-asserted-by":"publisher","first-page":"3032","DOI":"10.1109\/78.969511","volume":"49","author":"J Liang","year":"2001","unstructured":"Liang, J., Tran, T.D.: Fast multiplierless approximations of the DCT with the lifting scheme. IEEE Trans. Signal Process. 49(12), 3032\u20133044 (2001)","journal-title":"IEEE Trans. Signal Process."},{"issue":"11","key":"3803_CR12","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.1109\/TIP.2002.804279","volume":"11","author":"C Tu","year":"2002","unstructured":"Tu, C., Tran, T.D.: Context-based entropy coding of block transform coefficients for image compression. IEEE Trans. Image Process. 11(11), 1271\u20131283 (2002)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"3803_CR13","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.aeue.2013.08.018","volume":"68","author":"C Das","year":"2014","unstructured":"Das, C., Panigrahi, S., Sharma, V.K., Mahapatra, K.K.: A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU-Int. J. Electron. Commun. 68(3), 244\u2013253 (2014)","journal-title":"AEU-Int. J. Electron. Commun."},{"key":"3803_CR14","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.dsp.2016.02.005","volume":"53","author":"SA Parah","year":"2016","unstructured":"Parah, S.A., Sheikh, J.A., Loan, N.A., Bhat, G.M.: Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digit. Signal Process. 53, 11\u201324 (2016)","journal-title":"Digit. Signal Process."},{"key":"3803_CR15","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ins.2019.11.005","volume":"517","author":"H-J Ko","year":"2020","unstructured":"Ko, H.-J., Huang, C.-T., Horng, G., Wang, S.-J.: Robust and blind image watermarking in DCT domain using inter-block coefficient correlation. Inf. Sci. 517, 128\u2013147 (2020)","journal-title":"Inf. Sci."},{"key":"3803_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119011","volume":"213","author":"X Wang","year":"2023","unstructured":"Wang, X., Yuan, X., Li, M., Sun, Y., Tian, J., Guo, H., Li, J.: Parallel multiple watermarking using adaptive inter-block correlation. Expert Syst. Appl. 213, 119011 (2023)","journal-title":"Expert Syst. Appl."},{"key":"3803_CR17","doi-asserted-by":"publisher","first-page":"19876","DOI":"10.1109\/ACCESS.2018.2808172","volume":"6","author":"NA Loan","year":"2018","unstructured":"Loan, N.A., Hurrah, N.N., Parah, S.A., Lee, J.W., Sheikh, J.A., Bhat, G.M.: Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6, 19876\u201319897 (2018)","journal-title":"IEEE Access"},{"key":"3803_CR18","doi-asserted-by":"publisher","first-page":"25026","DOI":"10.1109\/ACCESS.2019.2896304","volume":"7","author":"Y Tan","year":"2019","unstructured":"Tan, Y., Qin, J., Xiang, X., Ma, W., Pan, W., Xiong, N.N.: A robust watermarking scheme in YCBCR color space based on channel coding. IEEE Access 7, 25026\u201325036 (2019)","journal-title":"IEEE Access"},{"key":"3803_CR19","doi-asserted-by":"crossref","unstructured":"Ge, H., Su, F., Zhu, Y.: Color image text watermarking using wavelet transform and error-correcting code. In: 6th International Conference on Signal Processing, 2002, vol.\u00a02, pp. 1584\u20131587. IEEE (2002)","DOI":"10.1109\/ICOSP.2002.1180100"},{"key":"3803_CR20","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.image.2017.12.010","volume":"62","author":"S Sarreshtedari","year":"2018","unstructured":"Sarreshtedari, S., Akhaee, M.A., Abbasfar, A.: Source-channel coding-based watermarking for self-embedding of jpeg images. Signal Process. Image Commun. 62, 106\u2013116 (2018)","journal-title":"Signal Process. Image Commun."},{"key":"3803_CR21","doi-asserted-by":"crossref","unstructured":"Fan, M.Q., Wang, H.X.: An enhanced fragile watermarking scheme to digital image protection and self-recovery. Signal Process. Image Commun. 66, 19\u201329 (2018)","DOI":"10.1016\/j.image.2018.04.003"},{"key":"3803_CR22","doi-asserted-by":"crossref","unstructured":"Wang, X., Chang, C.-C., Lin, C.-C.: Reversible data hiding in encrypted images with block-based adaptive msb encoding. Inf. Sci. 567, 375\u2013394 (2021)","DOI":"10.1016\/j.ins.2021.02.079"},{"key":"3803_CR23","doi-asserted-by":"publisher","unstructured":"Wang, X., Qu, L., Wu, H.-T., Han, Y., Tian, Z.: Reversible Image Thumbnail Preservation With High-Visual Naturalness (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3366328","DOI":"10.1109\/JIOT.2024.3366328"},{"issue":"3","key":"3803_CR24","doi-asserted-by":"publisher","first-page":"508","DOI":"10.3390\/e25030508","volume":"25","author":"AM Ramos","year":"2023","unstructured":"Ramos, A.M., Artiles, J.A.P., Chaves, D.P.B., Pimentel, C.: A fragile image watermarking scheme in dwt domain using chaotic sequences and error-correcting codes. Entropy 25(3), 508 (2023)","journal-title":"Entropy"},{"issue":"11","key":"3803_CR25","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/ad08ca","volume":"25","author":"Y Dong","year":"2023","unstructured":"Dong, Y., Mou, D., Liu, H., Zhu, T.: Quantum color image watermarking scheme based on quantum error correction coding. New J. Phys. 25(11), 113016 (2023)","journal-title":"New J. Phys."},{"key":"3803_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2021.108342","volume":"190","author":"P Lef\u00e8vre","year":"2022","unstructured":"Lef\u00e8vre, P., Carr\u00e9, P., Fontaine, C., Gaborit, P., Huang, J.: Efficient image tampering localization using semi-fragile watermarking and error control codes. Signal Process. 190, 108342 (2022)","journal-title":"Signal Process."},{"key":"3803_CR27","first-page":"103219","volume":"68","author":"JAP Artiles","year":"2022","unstructured":"Artiles, J.A.P., Chaves, D.P.B., Pimentel, C.: Robust image watermarking algorithm using chaotic sequences. J. Inf. Secur. Appl. 68, 103219 (2022)","journal-title":"J. Inf. Secur. Appl."},{"key":"3803_CR28","doi-asserted-by":"crossref","unstructured":"Moloi, N., Ouahada, K., Zhu, H.: Performance analysis for Reed Solomon codes and Bose Chaudhuri-Hocquenghem codes in digital image watermarking. In: 2019 IEEE AFRICON, pp. 1\u20134. IEEE (2019)","DOI":"10.1109\/AFRICON46755.2019.9133852"},{"key":"3803_CR29","unstructured":"University of Southern California, Signal and Image Processing Institute. USC-SIPI image database. Data set (1997)"},{"key":"3803_CR30","doi-asserted-by":"publisher","first-page":"e1427","DOI":"10.7717\/peerj-cs.1427","volume":"9","author":"J Varghese","year":"2023","unstructured":"Varghese, J., Hussain, O.B., Subash, S., Razak, A.: An effective digital image watermarking scheme incorporating DCT, DFT and SVD transformations. PeerJ Comput. Sci. 9, e1427 (2023)","journal-title":"PeerJ Comput. Sci."}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03803-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-024-03803-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03803-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T14:56:02Z","timestamp":1739458562000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-024-03803-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,28]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["3803"],"URL":"https:\/\/doi.org\/10.1007\/s11760-024-03803-z","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,28]]},"assertion":[{"value":"21 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known financial interests or personal relationships that might influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"253"}}