{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:45:59Z","timestamp":1762004759007,"version":"3.41.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T00:00:00Z","timestamp":1443052800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cogn Comput"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1007\/s12559-015-9357-5","type":"journal-article","created":{"date-parts":[[2015,9,24]],"date-time":"2015-09-24T11:12:53Z","timestamp":1443093173000},"page":"246-260","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Cognitive Computation of Compressed Sensing for Watermark Signal Measurement"],"prefix":"10.1007","volume":"8","author":[{"given":"Huimin","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Jinchang","family":"Ren","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,24]]},"reference":[{"issue":"6","key":"9357_CR1","doi-asserted-by":"crossref","first-page":"792","DOI":"10.1109\/TIP.2003.821551","volume":"13","author":"ML Miller","year":"2004","unstructured":"Miller ML, Doerr GJ, Cox IJ. Applying informed coding and embedding to design a robust high-capacity watermark. IEEE Trans Image Process. 2004;13(6):792\u2013807.","journal-title":"IEEE Trans Image Process"},{"issue":"5","key":"9357_CR2","doi-asserted-by":"crossref","first-page":"1853","DOI":"10.1109\/TIM.2005.855084","volume":"54","author":"S Biswas","year":"2005","unstructured":"Biswas S, Das R, Petriu M. An adaptive compressed MPEG-2 video watermarking scheme. IEEE Trans Instrum Meas. 2005;54(5):1853\u201361.","journal-title":"IEEE Trans Instrum Meas"},{"issue":"12","key":"9357_CR3","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox IJ, Kiliam I, Leighton FT, Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Transaction on Image Processing. 1997;6(12):1673\u201387.","journal-title":"IEEE Transaction on Image Processing"},{"key":"9357_CR4","doi-asserted-by":"crossref","unstructured":"Voyatzis G, Pitas I. Chaotic watermarks f or embedding in the spatial domain. In Proceedings of ICIP\u201998, Chicago, IL, Oct. 1997, pp. 432\u2013436.","DOI":"10.1109\/ICIP.1998.723411"},{"issue":"4","key":"9357_CR5","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1109\/TIFS.2010.2080675","volume":"5","author":"HY Huang","year":"2010","unstructured":"Huang HY, Yang CH, Hsu WH. A Video Watermarking Technique Based on Pseudo-3-D DCT and Quantization Index Modulation. IEEE Trans Inf Forensics Secur. 2010;5(4):625\u20137.","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"9357_CR6","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1007\/s12559-010-9033-8","volume":"2","author":"X Gao","year":"2010","unstructured":"Gao X, Deng C, Li X, Tao D. Local Feature Based Geometric-Resistant Image Information Hiding. Cognitive Computation. 2010;2(2):68\u201377.","journal-title":"Cognitive Computation"},{"issue":"10","key":"9357_CR7","doi-asserted-by":"crossref","first-page":"3976","DOI":"10.1109\/TSP.2005.855418","volume":"53","author":"F Cayre","year":"2005","unstructured":"Cayre F, Fontaine C, Furon T. Watermarking security: theory and practice. IEEE Transaction on Signal Processing. 2005;53(10):3976\u201387.","journal-title":"IEEE Transaction on Signal Processing"},{"issue":"5","key":"9357_CR8","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1109\/TIM.2014.2299371","volume":"63","author":"M Fallahpour","year":"2014","unstructured":"Fallahpour M, Shirmohammadi S, Semsarzadeh M, Zhao J. Tampering detection in compressed digital video using watermarking. IEEE Transaction on Instrumentation and Measurement. 2014;63(5):1057\u201372.","journal-title":"IEEE Transaction on Instrumentation and Measurement"},{"key":"9357_CR9","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1146\/annurev-neuro-062111-150410","volume":"35","author":"S Ganguli","year":"2012","unstructured":"Ganguli S, Sompolinsky H. Compressed sensing, sparsity and dimensionality in neuronal information processing and data analysis. Annu Rev Neurosci. 2012;35:485\u2013508.","journal-title":"Annu Rev Neurosci"},{"key":"9357_CR10","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1038\/381607a0","volume":"381","author":"BA Olshausen","year":"1996","unstructured":"Olshausen BA, Field DJ. Emergence of simple-cell receptive field properties by learning a sparse code for natural images. Nature. 1996;381:607\u20138.","journal-title":"Nature"},{"issue":"2","key":"9357_CR11","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/TNSRE.2009.2012711","volume":"17","author":"M Aghagolzadeh","year":"2009","unstructured":"Aghagolzadeh M, Oweiss K. Compressed and distributed sensing of neuronal activity for real time spike train decoding. IEEE Trans. Neural System Rehability Engineering. 2009;17(2):116\u201328.","journal-title":"IEEE Trans. Neural System Rehability Engineering"},{"issue":"2","key":"9357_CR12","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1162\/neco.2008.09-07-606","volume":"21","author":"S Eldawlatly","year":"2009","unstructured":"Eldawlatly S, Jin R, Oweiss KG. Identifying functional connectivity in large-scale neural ensemble recordings: a multiscale data mining approach. Neural Comput. 2009;21(2):450\u201377.","journal-title":"Neural Comput"},{"issue":"4","key":"9357_CR13","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1007\/s12559-012-9194-8","volume":"5","author":"S Kim","year":"2013","unstructured":"Kim S, Kwon S, Kweon IS. A perceptual visual feature extraction method achieved by imitating V1 and V4 of the human visual system. Cognitive Computation. 2013;5(4):610\u201328.","journal-title":"Cognitive Computation"},{"issue":"4","key":"9357_CR14","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1080\/09548980600931995","volume":"17","author":"Z Li","year":"2006","unstructured":"Li Z. Theoretical understanding of the early visual processes by data compression and data selection. Network: Computation in Neural Systems. 2006;17(4):301\u201334.","journal-title":"Network: Computation in Neural Systems"},{"key":"9357_CR15","doi-asserted-by":"crossref","unstructured":"Hunt J, Dayan P, Goodhill G. Sparse coding can predict primary visual cortex receptive field changes induced by abnormal visual input. PLoS Comput Biol. 2013;9(5). Article number: e1003005.","DOI":"10.1371\/journal.pcbi.1003005"},{"key":"9357_CR16","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1038\/nrn2155","volume":"8","author":"O Schwartz","year":"2007","unstructured":"Schwartz O, Hsu A, Dayan P. Space and time in visual context. Nat Rev Neurosci. 2007;8:522\u201335.","journal-title":"Nat Rev Neurosci"},{"key":"9357_CR17","doi-asserted-by":"crossref","unstructured":"Orsdemir A, Altun HO, Sharma G, Bocko MF. On the security and robustness of encryption via compressed sensing. In: IEEE Military Communicaiton Conference. 2008. pp. 1040\u20131046.","DOI":"10.1109\/MILCOM.2008.4753187"},{"issue":"2","key":"9357_CR18","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1109\/JSTSP.2009.2039178","volume":"4","author":"M Davenport","year":"2010","unstructured":"Davenport M, Boufounos P, Wakin M, Baraniuk R. Signal processing with compressive measurements. IEEE Journal of Selected Topics in Signal Processing. 2010;4(2):445\u201360.","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"9357_CR19","doi-asserted-by":"crossref","unstructured":"Lu W, Varna AL, Wu M. Security analysis for privacy preserving search for multimedia. In: Proceedings of IEEE 17th international conference on image processing. 2010.","DOI":"10.1109\/ICIP.2010.5653399"},{"key":"9357_CR20","unstructured":"Calderbank R, Jafarpour S, Schapire R. Compressed learning: universal sparse dimensionality deduction and learning in the measurement domain. http:\/\/dsp.rice.edu\/sites\/dsp.rice.edu\/files\/cs\/ . 2009."},{"key":"9357_CR21","unstructured":"Hsu D, Kakade SM, Langford J, Zhang T. Multi-label prediction via compressed sensing. In: Neural information processing systems (NIPS). 2009."},{"issue":"4","key":"9357_CR22","doi-asserted-by":"crossref","first-page":"609","DOI":"10.3724\/SP.J.1004.2012.00609","volume":"38","author":"CH Zhao","year":"2012","unstructured":"Zhao CH, Liu W. Block compressive sensing based image semi-fragile zero-watermarking algorithm. Acta Autom Sin. 2012;38(4):609\u201317.","journal-title":"Acta Autom Sin"},{"issue":"4","key":"9357_CR23","doi-asserted-by":"crossref","first-page":"1223","DOI":"10.1109\/TIFS.2011.2159208","volume":"6","author":"X Zhang","year":"2011","unstructured":"Zhang X, Qian Z, Ren Y, Feng G. Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Transaction on Information Forensics and Security. 2011;6(4):1223\u201332.","journal-title":"IEEE Transaction on Information Forensics and Security"},{"key":"9357_CR24","first-page":"67","volume-title":"\u201cIntegrated secure watermark detection and privacy preserving storage in the compressive sensing domain\u201d, IEEE International Workshop on Information Forensics and Security","author":"Q Wang","year":"2013","unstructured":"Wang Q, Zeng W, Tian J. \u201cIntegrated secure watermark detection and privacy preserving storage in the compressive sensing domain\u201d, IEEE International Workshop on Information Forensics and Security. China: Guangzhou; 2013. p. 67\u201372."},{"issue":"6","key":"9357_CR25","first-page":"1153","volume":"41","author":"HM Zhao","year":"2013","unstructured":"Zhao HM, Lai JH, Cai J, Chen XL. A Video Watermarking Algorithm for Intraframe Tampering Detection Based Compressed Sensing. Acta Electronica Sinica. 2013;41(6):1153\u20138.","journal-title":"Acta Electronica Sinica"},{"issue":"4","key":"9357_CR26","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"D Donoho","year":"2006","unstructured":"Donoho D. Compressed sensing. IEEE Transaction on Information Theory. 2006;52(4):1289\u2013306.","journal-title":"IEEE Transaction on Information Theory"},{"issue":"3","key":"9357_CR27","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1016\/j.sigpro.2005.05.027","volume":"86","author":"DL Donoho","year":"2006","unstructured":"Donoho DL, Tsaig Y. Extensions of compressed sensing. Sig Process. 2006;86(3):533\u201348.","journal-title":"Sig Process"},{"issue":"2","key":"9357_CR28","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MSP.2007.914731","volume":"25","author":"E Candes","year":"2008","unstructured":"Candes E, Wakin M. An introduction to compressive sampling. IEEE Signal Process Mag. 2008;25(2):21\u201330.","journal-title":"IEEE Signal Process Mag"},{"key":"9357_CR29","unstructured":"Fowler JE, Mun SW, Tramel EW. Multiscale block compressed sensing with smoothed projected landweber reconstruction. In: 19th European signal processing conference (EUSIPCO 2011), Barcelona, Aug 29\u2013Sep 2. 2011, pp. 564\u2013568."},{"issue":"3","key":"9357_CR30","doi-asserted-by":"crossref","first-page":"931","DOI":"10.1137\/100808794","volume":"4","author":"K Ni","year":"2011","unstructured":"Ni K, Datta S, Mahanti P, Roudenko S, Cochran D. Efficient Deterministic Compressed Sensing for Images with Chirps and Reed-Muller Codes. SIAM Journal on Imaging Sciences. 2011;4(3):931\u201353.","journal-title":"SIAM Journal on Imaging Sciences"},{"key":"9357_CR31","doi-asserted-by":"crossref","unstructured":"Rachlin Y, Baron D. The secrecy of compressed sensing measurements. In: Proceedings of the 46th annual allerton conference in communication, control and computing, Illinois, USA. 2008, pp. 813\u2013817.","DOI":"10.1109\/ALLERTON.2008.4797641"},{"issue":"4","key":"9357_CR32","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1109\/TIFS.2010.2080675","volume":"5","author":"HY Huang","year":"2010","unstructured":"Huang HY, Yang CH, Hsu WH. A video watermarking technique based on Pseudo-3-D DCT and quantization index modulation. IEEE Trans Inf Forensics Secur. 2010;5(4):625\u20137.","journal-title":"IEEE Trans Inf Forensics Secur."},{"key":"9357_CR33","doi-asserted-by":"crossref","unstructured":"Seo YS, Kim WG, Huh YH, Oh WG, Hwang CJ. QIM watermarking for image with tow adaptive quantization step-sizes. In: Proceedings of 9th international conference on advanced communication technology. 2007, pp. 997\u2013800.","DOI":"10.1109\/ICACT.2007.358470"},{"key":"9357_CR34","unstructured":"Fingerprint verification competition. http:\/\/bias.csr.unibo.it\/fvc2004\/ ."},{"key":"9357_CR35","unstructured":"Kong W, Yang B, Wu D, Niu X. SVD based blind video watermarking algorithm. In: Proceedings of first international conference on innovative computing, information and control. 2006, pp. 265\u2013268."},{"issue":"1","key":"9357_CR36","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s12559-014-9268-x","volume":"7","author":"V Sachnev","year":"2015","unstructured":"Sachnev V, Ramasamy S, Sundaram S, et al. A cognitive ensemble of extreme learning machine for steganalysis based on risk-sensitive hinge loss function. Cognitive Computation. 2015;7(1):103\u201310.","journal-title":"Cognitive Computation"},{"issue":"3","key":"9357_CR37","doi-asserted-by":"crossref","first-page":"608","DOI":"10.1007\/s12559-014-9252-5","volume":"6","author":"J Xu","year":"2014","unstructured":"Xu J, Yang G, Yin Y, Man H, He H. Sparse-representation-based classification with structure-preserving dimension reduction. Cognitive Computation. 2014;6(3):608\u201321.","journal-title":"Cognitive Computation"}],"container-title":["Cognitive Computation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-015-9357-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12559-015-9357-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-015-9357-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T19:57:51Z","timestamp":1748635071000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12559-015-9357-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,24]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,4]]}},"alternative-id":["9357"],"URL":"https:\/\/doi.org\/10.1007\/s12559-015-9357-5","relation":{},"ISSN":["1866-9956","1866-9964"],"issn-type":[{"type":"print","value":"1866-9956"},{"type":"electronic","value":"1866-9964"}],"subject":[],"published":{"date-parts":[[2015,9,24]]}}}