{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T22:50:34Z","timestamp":1775170234464,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T00:00:00Z","timestamp":1658448000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T00:00:00Z","timestamp":1658448000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s12652-022-04101-7","type":"journal-article","created":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T02:02:21Z","timestamp":1658455341000},"page":"13901-13913","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Electrocardiogram signal security by digital watermarking"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1637-9129","authenticated-orcid":false,"given":"Amine","family":"Khaldi","sequence":"first","affiliation":[]},{"given":"Med Redouane","family":"Kafi","sequence":"additional","affiliation":[]},{"given":"Billel","family":"Meghni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,22]]},"reference":[{"issue":"3","key":"4101_CR1","doi-asserted-by":"publisher","first-page":"3283","DOI":"10.1007\/s12652-020-02456-3","volume":"12","author":"FS Ahmad","year":"2021","unstructured":"Ahmad FS, Ali L, Raza-Ul-Mustafa A, Khattak HA, Hameed T, Wajahat I, Kadry S, Bukhari SAC (2021) A hybrid machine learning framework to predict mortality in paralytic ileus patients using electronic health records (EHRs). J Ambient Intell Hum Comput 12(3):3283\u20133293. https:\/\/doi.org\/10.1007\/s12652-020-02456-3","journal-title":"J Ambient Intell Hum Comput"},{"issue":"1","key":"4101_CR2","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1007\/s11042-019-08197-6","volume":"79","author":"SBB Ahmadi","year":"2020","unstructured":"Ahmadi SBB, Zhang G, Wei S (2020) Robust and hybrid SVD-based image watermarking schemes. Multimedia Tools Appl 79(1):1075\u20131117. https:\/\/doi.org\/10.1007\/s11042-019-08197-6","journal-title":"Multimedia Tools Appl"},{"issue":"3","key":"4101_CR3","doi-asserted-by":"publisher","first-page":"1701","DOI":"10.1007\/s10489-020-01903-0","volume":"51","author":"SBB Ahmadi","year":"2021","unstructured":"Ahmadi SBB, Zhang G, Rabbani M, Boukela L, Jelodar H (2021) An intelligent and blind dual color image watermarking for authentication and copyright protection. Appl Intell 51(3):1701\u20131732. https:\/\/doi.org\/10.1007\/s10489-020-01903-0","journal-title":"Appl Intell"},{"key":"4101_CR4","doi-asserted-by":"publisher","first-page":"128548","DOI":"10.1109\/ACCESS.2020.3008644","volume":"8","author":"A Alarifi","year":"2020","unstructured":"Alarifi A, Sankar S, Altameem T, Jithin KC, Amoon M, El-Shafai W (2020) A novel hybrid cryptosystem for secure streaming of high efficiency H.265 compressed videos in IoT multimedia applications. IEEE Access 8:128548\u2013128573. https:\/\/doi.org\/10.1109\/ACCESS.2020.3008644","journal-title":"IEEE Access"},{"issue":"7","key":"4101_CR5","doi-asserted-by":"publisher","first-page":"2783","DOI":"10.1007\/s00521-020-05157-2","volume":"33","author":"L Ali","year":"2021","unstructured":"Ali L, Wajahat I, AmiriGolilarz N, Keshtkar F, Bukhari SAC (2021) LDA\u2013GA\u2013SVM: improved hepatocellular carcinoma prediction through dimensionality reduction and genetically optimized support vector machine. Neural Comput Appl 33(7):2783\u20132792. https:\/\/doi.org\/10.1007\/s00521-020-05157-2","journal-title":"Neural Comput Appl"},{"issue":"2","key":"4101_CR6","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.aci.2018.06.003","volume":"15","author":"RA Alotaibi","year":"2019","unstructured":"Alotaibi RA, Elrefaei LA (2019) Text-image watermarking based on integer wavelet transform (IWT) and discrete cosine transform (DCT). Appl Comput Inf 15(2):191\u2013202. https:\/\/doi.org\/10.1016\/j.aci.2018.06.003","journal-title":"Appl Comput Inf"},{"issue":"05","key":"4101_CR7","doi-asserted-by":"publisher","first-page":"2250097","DOI":"10.1142\/S0218126622500979s","volume":"31","author":"K Amine","year":"2022","unstructured":"Amine K, Fares K, Redouane KM, Salah E (2022) Medical image watermarking for telemedicine application security. J Circ Syst Comput 31(05):2250097. https:\/\/doi.org\/10.1142\/S0218126622500979s","journal-title":"J Circ Syst Comput"},{"key":"4101_CR8","doi-asserted-by":"publisher","unstructured":"Baba Ahmadi SB, Zhang G, Jelodar H (2019) A robust hybrid SVD-based image watermarking scheme for color images. In: 2019 IEEE 10th annual information technology, electronics and mobile communication conference (IEMCON), pp 0682\u20130688. https:\/\/doi.org\/10.1109\/IEMCON.2019.8936229","DOI":"10.1109\/IEMCON.2019.8936229"},{"issue":"2","key":"4101_CR9","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s00371-020-01808-6","volume":"37","author":"S Bagheri Baba Ahmadi","year":"2021","unstructured":"Bagheri Baba Ahmadi S, Zhang G, Wei S, Boukela L (2021) An intelligent and blind image watermarking scheme based on hybrid SVD transforms using human visual system characteristics. Vis Comput 37(2):385\u2013409. https:\/\/doi.org\/10.1007\/s00371-020-01808-6","journal-title":"Vis Comput"},{"key":"4101_CR10","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1016\/j.patrec.2019.06.004","volume":"125","author":"S Bhalerao","year":"2019","unstructured":"Bhalerao S, Ansari IA, Kumar A, Jain DK (2019) A reversible and multipurpose ECG data hiding technique for telemedicine applications. Pattern Recogn Lett 125:463\u2013473. https:\/\/doi.org\/10.1016\/j.patrec.2019.06.004","journal-title":"Pattern Recogn Lett"},{"key":"4101_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2020.164562","volume":"208","author":"K Fares","year":"2020","unstructured":"Fares K, Amine K, Salah E (2020) A robust blind color image watermarking based on Fourier transform domain. Optik 208:164562. https:\/\/doi.org\/10.1016\/j.ijleo.2020.164562","journal-title":"Optik"},{"key":"4101_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2020.102403","volume":"66","author":"K Fares","year":"2021","unstructured":"Fares K, Khaldi A, Redouane K, Salah E (2021) DCT & DWT based watermarking scheme for medical information security. Biomed Signal Process Control 66:102403. https:\/\/doi.org\/10.1016\/j.bspc.2020.102403","journal-title":"Biomed Signal Process Control"},{"issue":"10","key":"4101_CR13","doi-asserted-by":"publisher","first-page":"2941","DOI":"10.3390\/s20102941","volume":"20","author":"LM Goyal","year":"2020","unstructured":"Goyal LM, Mittal M, Kaushik R, Verma A, Kaur I, Roy S, Kim T (2020) Improved ECG watermarking technique using curvelet transform. Sensors 20(10):2941. https:\/\/doi.org\/10.3390\/s20102941","journal-title":"Sensors"},{"issue":"3","key":"4101_CR14","doi-asserted-by":"publisher","first-page":"2127","DOI":"10.1007\/s11042-019-08225-5","volume":"79","author":"M JafariBarani","year":"2020","unstructured":"JafariBarani M, Ayubi P, YousefiValandar M, YosefnezhadIrani B (2020) A blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform. Multimedia Tools Appl 79(3):2127\u20132159. https:\/\/doi.org\/10.1007\/s11042-019-08225-5","journal-title":"Multimedia Tools Appl"},{"key":"4101_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102428","volume":"50","author":"KC Jithin","year":"2020","unstructured":"Jithin KC, Sankar S (2020) Colour image encryption algorithm combining Arnold map, DNA sequence operation, and a Mandelbrot set. J Inf Secur Appl 50:102428. https:\/\/doi.org\/10.1016\/j.jisa.2019.102428","journal-title":"J Inf Secur Appl"},{"key":"4101_CR16","doi-asserted-by":"publisher","unstructured":"Kadry S, Nam Y, Rauf HT, Rajinikanth V, Lawal IA (2021) Automated Detection Of Brain Abnormality Using Deep-Learning-Scheme\u202f: a study. In: 2021 seventh international conference on bio signals, images, and instrumentation (ICBSII), pp 1\u20115. https:\/\/doi.org\/10.1109\/ICBSII51839.2021.9445122","DOI":"10.1109\/ICBSII51839.2021.9445122"},{"issue":"13","key":"4101_CR17","doi-asserted-by":"publisher","first-page":"19827","DOI":"10.1007\/s11042-021-10713-6","volume":"80","author":"F Kahlessenane","year":"2021","unstructured":"Kahlessenane F, Khaldi A, Kafi MR, Euschi S (2021a) A color value differentiation scheme for blind digital image watermarking. Multimedia Tools Appl 80(13):19827\u201319844. https:\/\/doi.org\/10.1007\/s11042-021-10713-6","journal-title":"Multimedia Tools Appl"},{"issue":"3","key":"4101_CR18","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s11082-021-02793-3","volume":"53","author":"F Kahlessenane","year":"2021","unstructured":"Kahlessenane F, Khaldi A, Kafi MR, Zermi N, Euschi S (2021b) A value parity combination based scheme for retinal images watermarking. Opt Quant Electron 53(3):161. https:\/\/doi.org\/10.1007\/s11082-021-02793-3","journal-title":"Opt Quant Electron"},{"issue":"2","key":"4101_CR19","doi-asserted-by":"publisher","first-page":"2931","DOI":"10.1007\/s12652-020-02450-9","volume":"12","author":"F Kahlessenane","year":"2021","unstructured":"Kahlessenane F, Khaldi A, Kafi R, Euschi S (2021c) A DWT based watermarking approach for medical image protection. J Ambient Intell Hum Comput 12(2):2931\u20132938. https:\/\/doi.org\/10.1007\/s12652-020-02450-9","journal-title":"J Ambient Intell Hum Comput"},{"issue":"3","key":"4101_CR20","doi-asserted-by":"publisher","first-page":"2069","DOI":"10.1007\/s10586-020-03215-x","volume":"24","author":"F Kahlessenane","year":"2021","unstructured":"Kahlessenane F, Khaldi A, Kafi R, Euschi S (2021d) A robust blind medical image watermarking approach for telemedicine applications. Clust Comput 24(3):2069\u20132082. https:\/\/doi.org\/10.1007\/s10586-020-03215-x","journal-title":"Clust Comput"},{"issue":"8","key":"4101_CR21","doi-asserted-by":"publisher","first-page":"E565","DOI":"10.3390\/diagnostics10080565","volume":"10","author":"MA Khan","year":"2020","unstructured":"Khan MA, Ashraf I, Alhaisoni M, Dama\u0161evi\u010dius R, Scherer R, Rehman A, Bukhari SAC (2020) Multimodal brain tumor classification using deep learning and robust feature selection: a machine learning application for radiologists. Diagn (Basel, Switz) 10(8):E565. https:\/\/doi.org\/10.3390\/diagnostics10080565","journal-title":"Diagn (Basel, Switz)"},{"key":"4101_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114272","volume":"168","author":"Y Luo","year":"2021","unstructured":"Luo Y, Li L, Liu J, Tang S, Cao L, Zhang S, Qiu S, Cao Y (2021) A multi-scale image watermarking based on integer wavelet transform and singular value decomposition. Expert Syst Appl 168:114272. https:\/\/doi.org\/10.1016\/j.eswa.2020.114272","journal-title":"Expert Syst Appl"},{"key":"4101_CR23","first-page":"8","volume":"29","author":"RG Mark","year":"1982","unstructured":"Mark RG, Schluter PS, Moody GB, Devlin PH, Chernoff D (1982) An annotated ECG database for evaluating arrhythmia detectors. IEEE Trans Biomed Eng 29:8","journal-title":"IEEE Trans Biomed Eng"},{"issue":"1","key":"4101_CR24","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1007\/s11042-020-09686-9","volume":"80","author":"L Meng","year":"2021","unstructured":"Meng L, Liu L, Tian G, Wang X (2021) An adaptive reversible watermarking in IWT domain. Multimedia Tools Appl 80(1):711\u2013735. https:\/\/doi.org\/10.1007\/s11042-020-09686-9","journal-title":"Multimedia Tools Appl"},{"issue":"17","key":"4101_CR25","doi-asserted-by":"publisher","first-page":"10737","DOI":"10.1007\/s00521-020-04870-2","volume":"33","author":"T Meraj","year":"2021","unstructured":"Meraj T, Rauf HT, Zahoor S, Hassan A, Lali MI, Ali L, Bukhari SAC, Shoaib U (2021) Lung nodules detection using semantic segmentation and classification with optimal features. Neural Comput Appl 33(17):10737\u201310750. https:\/\/doi.org\/10.1007\/s00521-020-04870-2","journal-title":"Neural Comput Appl"},{"key":"4101_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2021.103114","volume":"71","author":"MS Moad","year":"2022","unstructured":"Moad MS, Kafi MR, Khaldi A (2022) A non-subsampled Shearlet transform based approach for heartbeat sound watermarking. Biomed Signal Process Control 71:103114. https:\/\/doi.org\/10.1016\/j.bspc.2021.103114","journal-title":"Biomed Signal Process Control"},{"key":"4101_CR27","doi-asserted-by":"publisher","first-page":"181233","DOI":"10.1109\/ACCESS.2020.3025533","volume":"8","author":"I Natgunanathan","year":"2020","unstructured":"Natgunanathan I, Karmakar C, Rajasegarar S, Zong T, Habib A (2020) Robust patient information embedding and retrieval mechanism for ECG signals. IEEE Access 8:181233\u2013181245. https:\/\/doi.org\/10.1109\/ACCESS.2020.3025533","journal-title":"IEEE Access"},{"issue":"7","key":"4101_CR28","doi-asserted-by":"publisher","first-page":"10615","DOI":"10.1007\/s11042-020-10032-2","volume":"80","author":"M Nazari","year":"2021","unstructured":"Nazari M, Mehrabian M (2021) A novel chaotic IWT-LSB blind watermarking approach with flexible capacity for secure transmission of authenticated medical images. Multimedia Tools Appl 80(7):10615\u201310655. https:\/\/doi.org\/10.1007\/s11042-020-10032-2","journal-title":"Multimedia Tools Appl"},{"key":"4101_CR29","doi-asserted-by":"publisher","unstructured":"Rajinikanth V, Kadry S, Dama\u0161evi\u010dius R, Taniar D, Rauf HT (2021) Machine-learning-scheme to detect choroidal-neovascularization in retinal OCT image. In: 2021 seventh international conference on bio signals, images, and instrumentation (ICBSII), pp 1\u20115. https:\/\/doi.org\/10.1109\/ICBSII51839.2021.9445134","DOI":"10.1109\/ICBSII51839.2021.9445134"},{"issue":"1","key":"4101_CR30","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s11277-019-06393-z","volume":"108","author":"AK Sahu","year":"2019","unstructured":"Sahu AK, Swain G (2019) An optimal information hiding approach based on pixel value differencing and modulus function. Wirel Pers Commun 108(1):159\u2013174. https:\/\/doi.org\/10.1007\/s11277-019-06393-z","journal-title":"Wirel Pers Commun"},{"issue":"4","key":"4101_CR31","doi-asserted-by":"publisher","first-page":"1395","DOI":"10.1016\/j.jksuci.2019.07.004","volume":"34","author":"AK Sahu","year":"2022","unstructured":"Sahu AK, Swain G (2022) High fidelity based reversible data hiding using modified LSB matching and pixel difference. J King Saud Univ Comput Inf Sci 34(4):1395\u20131409. https:\/\/doi.org\/10.1016\/j.jksuci.2019.07.004","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"1","key":"4101_CR32","doi-asserted-by":"publisher","first-page":"69","DOI":"10.2478\/cait-2018-0006","volume":"18","author":"AK Sahu","year":"2018","unstructured":"Sahu AK, Swain G, Babu ES (2018) Digital image steganography using bit flipping. Cybern Inf Technol 18(1):69\u201380. https:\/\/doi.org\/10.2478\/cait-2018-0006","journal-title":"Cybern Inf Technol"},{"issue":"1","key":"4101_CR33","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s11220-020-00328-w","volume":"22","author":"M Sahu","year":"2021","unstructured":"Sahu M, Padhy N, Gantayat SS, Sahu AK (2021) Shadow image based reversible data hiding using addition and subtraction logic on the LSB planes. Sens Imaging 22(1):7. https:\/\/doi.org\/10.1007\/s11220-020-00328-w","journal-title":"Sens Imaging"},{"issue":"12","key":"4101_CR34","doi-asserted-by":"publisher","first-page":"2150210","DOI":"10.1142\/S0218126621502108","volume":"30","author":"E Salah","year":"2021","unstructured":"Salah E, Amine K, Redouane KM, Fares K (2021a) Spatial and frequency approaches for audio file protection. J Circ Syst Comput 30(12):2150210. https:\/\/doi.org\/10.1142\/S0218126621502108","journal-title":"J Circ Syst Comput"},{"key":"4101_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.apacoust.2020.107652","volume":"172","author":"E Salah","year":"2021","unstructured":"Salah E, Amine K, Redouane K, Fares K (2021b) A Fourier transform based audio watermarking algorithm. Appl Acoust 172:107652. https:\/\/doi.org\/10.1016\/j.apacoust.2020.107652","journal-title":"Appl Acoust"},{"issue":"3","key":"4101_CR36","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1007\/s12652-019-01385-0","volume":"11","author":"PS Sneha","year":"2020","unstructured":"Sneha PS, Sankar S, Kumar AS (2020) A chaotic colour image encryption scheme combining Walsh-Hadamard transform and Arnold-Tent maps. J Ambient Intell Hum Comput 11(3):1289\u20131308. https:\/\/doi.org\/10.1007\/s12652-019-01385-0","journal-title":"J Ambient Intell Hum Comput"},{"key":"4101_CR37","doi-asserted-by":"publisher","first-page":"137731","DOI":"10.1109\/ACCESS.2020.3010794","volume":"8","author":"N Tsafack","year":"2020","unstructured":"Tsafack N, Sankar S, Abd-El-Atty B, Kengne JCK, Belazi A, Mehmood I, Bashir AK, Song O-Y, El-Latif AAA (2020) A new chaotic map with dynamic analysis and encryption application in internet of health things. IEEE Access 8:137731\u2013137744. https:\/\/doi.org\/10.1109\/ACCESS.2020.3010794","journal-title":"IEEE Access"},{"key":"4101_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2019.06.021","volume":"193","author":"MY Valandar","year":"2019","unstructured":"Valandar MY, Barani MJ, Ayubi P (2019) A fast color image encryption technique based on three dimensional chaotic map. Optik 193:162921. https:\/\/doi.org\/10.1016\/j.ijleo.2019.06.021","journal-title":"Optik"},{"issue":"2","key":"4101_CR39","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1007\/s00500-019-04524-z","volume":"24","author":"M YousefiValandar","year":"2020","unstructured":"YousefiValandar M, JafariBarani M, Ayubi P (2020) A blind and robust color images watermarking method based on block transform and secured by modified 3-dimensional H\u00e9non map. Soft Comput 24(2):771\u2013794. https:\/\/doi.org\/10.1007\/s00500-019-04524-z","journal-title":"Soft Comput"},{"key":"4101_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2021.104134","volume":"84","author":"N Zermi","year":"2021","unstructured":"Zermi N, Khaldi A, Kafi MR, Kahlessenane F, Euschi S (2021a) Robust SVD-based schemes for medical image watermarking. Microprocess Microsyst 84:104134. https:\/\/doi.org\/10.1016\/j.micpro.2021.104134","journal-title":"Microprocess Microsyst"},{"issue":"16","key":"4101_CR41","doi-asserted-by":"publisher","first-page":"24823","DOI":"10.1007\/s11042-021-10712-7","volume":"80","author":"N Zermi","year":"2021","unstructured":"Zermi N, Khaldi A, Kafi MR, Kahlessenane F, Euschi S (2021b) A lossless DWT-SVD domain watermarking for medical information security. Multimedia Tools Appl 80(16):24823\u201324841. https:\/\/doi.org\/10.1007\/s11042-021-10712-7","journal-title":"Multimedia Tools Appl"},{"key":"4101_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2021.110691","volume":"320","author":"N Zermi","year":"2021","unstructured":"Zermi N, Khaldi A, Kafi R, Kahlessenane F, Euschi S (2021c) A DWT-SVD based robust digital watermarking for medical image security. Forensic Sci Int 320:110691. https:\/\/doi.org\/10.1016\/j.forsciint.2021.110691","journal-title":"Forensic Sci Int"},{"issue":"3","key":"4101_CR43","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1080\/01969722.2021.1983700","volume":"53","author":"N Zermi","year":"2022","unstructured":"Zermi N, Khaldi A, Kafi MR, Kahlessenane F, Euschi S (2022) An SVD values ordering scheme for medical image watermarking. Cybern Syst 53(3):282\u2013297. https:\/\/doi.org\/10.1080\/01969722.2021.1983700","journal-title":"Cybern Syst"},{"key":"4101_CR44","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.image.2019.07.019","volume":"78","author":"H Zhang","year":"2019","unstructured":"Zhang H, Hu L (2019) A data hiding scheme based on multidirectional line encoding and integer wavelet transform. Signal Process Image Commun 78:331\u2013344. https:\/\/doi.org\/10.1016\/j.image.2019.07.019","journal-title":"Signal Process Image Commun"},{"key":"4101_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.107421","volume":"169","author":"L Zhang","year":"2020","unstructured":"Zhang L, Wei D (2020a) Image watermarking based on matrix decomposition and gyrator transform in invariant integer wavelet domain. Signal Process 169:107421. https:\/\/doi.org\/10.1016\/j.sigpro.2019.107421","journal-title":"Signal Process"},{"key":"4101_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2020.102805","volume":"106","author":"L Zhang","year":"2020","unstructured":"Zhang L, Wei D (2020b) Robust and reliable image copyright protection scheme using downsampling and block transform in integer wavelet domain. Digital Signal Process 106:102805. https:\/\/doi.org\/10.1016\/j.dsp.2020.102805","journal-title":"Digital Signal Process"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-022-04101-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-022-04101-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-022-04101-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T18:44:33Z","timestamp":1692729873000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-022-04101-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,22]]},"references-count":46,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["4101"],"URL":"https:\/\/doi.org\/10.1007\/s12652-022-04101-7","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,22]]},"assertion":[{"value":"20 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 June 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}