{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T20:58:21Z","timestamp":1774040301197,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"DST, Government of India","award":["DST\/TDT\/SHRI-33\/2018"],"award-info":[{"award-number":["DST\/TDT\/SHRI-33\/2018"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s12652-022-04445-0","type":"journal-article","created":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T05:02:45Z","timestamp":1667278965000},"page":"7367-7380","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A robust watermarking scheme for hybrid attacks on heritage images"],"prefix":"10.1007","volume":"14","author":[{"given":"Samrah","family":"Mehraj","sequence":"first","affiliation":[]},{"given":"Subreena","family":"Mushtaq","sequence":"additional","affiliation":[]},{"given":"Shabir A.","family":"Parah","sequence":"additional","affiliation":[]},{"given":"Kaiser J.","family":"Giri","sequence":"additional","affiliation":[]},{"given":"Javaid A.","family":"Sheikh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,1]]},"reference":[{"issue":"1","key":"4445_CR1","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.jksuci.2016.12.004","volume":"31","author":"J Abraham","year":"2019","unstructured":"Abraham J, Paul V (2019) An imperceptible spatial domain color image watermarking scheme. J King Saud Univ Comput Inf Sci 31(1):125\u2013133. https:\/\/doi.org\/10.1016\/j.jksuci.2016.12.004","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"4445_CR2","doi-asserted-by":"publisher","unstructured":"Cappellini V, Bartolini V, Caldelli R, Rosa AD, Piva A, Barni M, Wada M (2000) Copyright protection of heritage multimedia data through digital watermarking techniques. In: Proceedings of the 11th International workshop on database and expert systems applications. https:\/\/doi.org\/10.1109\/DEXA.2000.875138","DOI":"10.1109\/DEXA.2000.875138"},{"issue":"7","key":"4445_CR3","doi-asserted-by":"publisher","first-page":"1502","DOI":"10.1109\/TNNLS.2015.2441735","volume":"27","author":"X Chang","year":"2016","unstructured":"Chang X, Nie F, Wang S, Yang Y, Zhou X, Zhang C (2016) Compound rank-k projections for bilinear analysis. IEEE Trans Neural Netw Learn Syst 27(7):1502\u20131513","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"5","key":"4445_CR4","doi-asserted-by":"publisher","first-page":"1747","DOI":"10.1109\/TNNLS.2019.2927224","volume":"31","author":"K Chen","year":"2020","unstructured":"Chen K, Yao L, Zhang D, Wang X, Chang X, Nie F (2020) A semisupervised recurrent convolutional attention model for human activity recognition. IEEE Trans Neural Netw Learn Syst 31(5):1747\u20131756","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"4445_CR5","doi-asserted-by":"crossref","unstructured":"Choi Y, Aizawa K (2000) Digital watermarking using inter-block correlation: extension to JPEG coded domain. In: Proceedings international conference on information technology: coding and computing, pp 133\u2013138","DOI":"10.1109\/ITCC.2000.844196"},{"key":"4445_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2020.164562","author":"K Fares","year":"2020","unstructured":"Fares K, Amine K, Salah E (2020) A robust blind color image watermarking based on Fourier transform domain. Int J Light Electron Optics. https:\/\/doi.org\/10.1016\/j.ijleo.2020.164562","journal-title":"Int J Light Electron Optics"},{"key":"4445_CR7","unstructured":"Feng LP, Zheng LB, Cao P (2010) A DWT-DCT based blind watermarking algorithm for copyright protection. In: 2010 3rd international conference on computer science and information technology, pp 455\u2013458"},{"key":"4445_CR8","doi-asserted-by":"publisher","first-page":"5108","DOI":"10.1109\/TII.2020.3028612","volume":"17","author":"A Kamili","year":"2021","unstructured":"Kamili A, Hurrah NN, Parah SA, Bhat GM, Muhammad K (2021) DWFCAT: dual watermarking framework for industrial image authentication and tamper localization. IEEE Trans Indus Inform 17:5108\u20135117","journal-title":"IEEE Trans Indus Inform"},{"issue":"8","key":"4445_CR9","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1109\/TCSVT.2003.815957","volume":"13","author":"X Kang","year":"2003","unstructured":"Kang X, Huang J, Shi YQ, Lin Y (2003) A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans Circuits Syst Video Technol 13(8):776\u2013786","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"4445_CR10","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ins.2019.11.005","volume":"517","author":"HJ Ko","year":"2020","unstructured":"Ko HJ, Huang CT, Horng G, Wang SJ (2020) Robust and blind image watermarking in DCT domain using inter-block coefficient correlation. Inf Sc 517:128\u2013147","journal-title":"Inf Sc"},{"key":"4445_CR11","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ins.2019.11.005","volume":"517","author":"HJ Koa","year":"2020","unstructured":"Koa HJ, Huang CT, Hornga G, Wang SJ (2020) Robust and blind image watermarking in DCT domain using inter-block coefficient correlation. Inf Sci 517:128\u2013147","journal-title":"Inf Sci"},{"issue":"12","key":"4445_CR12","doi-asserted-by":"publisher","first-page":"6323","DOI":"10.1109\/TNNLS.2018.2829867","volume":"29","author":"Z Li","year":"2018","unstructured":"Li Z, Nie F, Chang X, Yang Y, Zhang C, Sebe N (2018) Dynamic affinity graph construction for spectral clustering using multiple features. IEEE Trans Neural Netw Learn Syst 29(12):6323\u20136332","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"4445_CR13","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1016\/j.patcog.2018.12.010","volume":"88","author":"Z Li","year":"2019","unstructured":"Li Z, Yao L, Chang X, Zhan K, Sun J, Zhang H (2019) Zero-shot event detection via event-adaptive concept relevance mining. Pattern Recogn 88:595\u2013603","journal-title":"Pattern Recogn"},{"key":"4445_CR14","doi-asserted-by":"publisher","first-page":"1169","DOI":"10.1109\/TCSVT.2009.2020263","volume":"19","author":"PY Lin","year":"2009","unstructured":"Lin PY, Lee JS, Chang CC (2009) Dual digital watermarking for internet media based on hybrid strategies. IEEE Trans Circuits Syst Video Technol 19:1169\u20131177","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"5","key":"4445_CR15","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1109\/TCSVT.2016.2633878","volume":"28","author":"XL Liu","year":"2018","unstructured":"Liu XL, Lin CC, Yuan SM (2018) Blind dual watermarking for color images\u2019 authentication and copyright protection. IEEE Trans Circuits Syst Video Technol 28(5):1047\u20131055","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"4445_CR16","doi-asserted-by":"publisher","first-page":"19876","DOI":"10.1109\/ACCESS.2018.2808172","volume":"6","author":"NA Loan","year":"2018","unstructured":"Loan NA, Hurrah NN, Parah SA, Lee JW, Sheikh JA, Bhat GM (2018) Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6:19876\u201319897","journal-title":"IEEE Access"},{"issue":"2","key":"4445_CR17","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/TCYB.2017.2647904","volume":"48","author":"M Luo","year":"2018","unstructured":"Luo M, Chang X, Nie L, Yang Y, Hauptmann AG, Zheng Q (2018) An adaptive semi supervised feature analysis for video semantic recognition. IEEE Trans Cybern 48(2):648\u2013660","journal-title":"IEEE Trans Cybern"},{"key":"4445_CR18","doi-asserted-by":"publisher","unstructured":"Mastico AD, Cappellini V, Caldelli R, Rosa D, Piva A (2007) Virtual restoration and protection of cultural heritage images. In 2007 15th international conference on digital signal processing. https:\/\/doi.org\/10.1109\/ICDSP.2007.4288621","DOI":"10.1109\/ICDSP.2007.4288621"},{"key":"4445_CR19","doi-asserted-by":"publisher","unstructured":"Mushtaq S, Mehraj S, Parah SA, Giri KJ, Sheikh JA (2022) Cultural heritage copyright protection: a blind and robust watermarking technique for heritage images. In: 2022 7th international conference for convergence in technology. https:\/\/doi.org\/10.1109\/I2CT54291.2022.9825126","DOI":"10.1109\/I2CT54291.2022.9825126"},{"key":"4445_CR20","first-page":"34","volume":"8","author":"A Phadikar","year":"2016","unstructured":"Phadikar A, Jana A, Phadikar BS, Maity GK (2016) Reversible watermarking using channel coding and lifting for cultural heritage and medical image. Int J Inf Comput Security 8:34\u201354","journal-title":"Int J Inf Comput Security"},{"key":"4445_CR21","doi-asserted-by":"publisher","first-page":"172004","DOI":"10.1109\/ACCESS.2019.2956480","volume":"7","author":"X Qiu","year":"2019","unstructured":"Qiu X, Du Z, Sun X (2019) Artificial intelligence-based security authentication: applications in wireless multimedia networks. IEEE Access 7:172004\u2013172011","journal-title":"IEEE Access"},{"key":"4445_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115906","author":"L Rakhmawati","year":"2021","unstructured":"Rakhmawati L, Wirawan W, Suwadi S, Delpha C, Duhamel P (2021) Blind robust image watermarking based on adaptive embedding strength and distribution of quantified coefficients. Expert Syst Appl. https:\/\/doi.org\/10.1016\/j.eswa.2021.115906","journal-title":"Expert Syst Appl"},{"issue":"8","key":"4445_CR23","doi-asserted-by":"publisher","first-page":"2377","DOI":"10.1109\/TCSVT.2019.2911042","volume":"30","author":"A Roy","year":"2019","unstructured":"Roy A, Chakraborty RS (2019) Towards optimal prediction error expansion based reversible image watermarking. IEEE Trans Circuits Syst Video Technol 30(8):2377\u20132390","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"4445_CR24","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.aeue.2016.12.003","volume":"72","author":"S Roy","year":"2017","unstructured":"Roy S, Pal AK (2017) A blind DCT based color watermarking algorithm for embedding multiple watermarks. AEU Int J Electron Commun 72:149\u2013161","journal-title":"AEU Int J Electron Commun"},{"key":"4445_CR25","doi-asserted-by":"publisher","unstructured":"Salerno E (2016) Watermarking information layers in multispectral images of cultural heritage objects. In: 2016 international workshop on computational intelligence for multimedia understanding. https:\/\/doi.org\/10.1109\/IWCIM.2016.7801176","DOI":"10.1109\/IWCIM.2016.7801176"},{"key":"4445_CR26","first-page":"8455","volume":"219","author":"Q Su","year":"2013","unstructured":"Su Q, Niu Y, Zou H, Liu X (2013) A blind dual color images watermarking based on singular value decomposition. Appl Math Comput 219:8455\u20138466","journal-title":"Appl Math Comput"},{"key":"4445_CR27","doi-asserted-by":"publisher","first-page":"1681","DOI":"10.1016\/j.patrec.2004.06.012","volume":"25","author":"Y Wang","year":"2004","unstructured":"Wang Y, Pearmain A (2004) Blind image data hiding based on self reference. Pattern Recogn Lett 25:1681\u20131689","journal-title":"Pattern Recogn Lett"},{"key":"4445_CR28","doi-asserted-by":"publisher","first-page":"3721","DOI":"10.1109\/ACCESS.2017.2684128","volume":"5","author":"J Won","year":"2017","unstructured":"Won J, Seo SH, Bertino E (2017) Certificateless cryptographic protocols for efficient drone-based smart city applications. IEEE Access 5:3721\u20133749","journal-title":"IEEE Access"},{"key":"4445_CR29","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.neucom.2021.11.035","volume":"486","author":"E Yu","year":"2022","unstructured":"Yu E, Ma J, Sun J, Chang X, Zhang H, Hauptmann AG (2022) Deep discrete cross-modal hashing with multiple supervision. Neurocomputing 486:215\u2013224","journal-title":"Neurocomputing"},{"key":"4445_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2019.164152","author":"Z Yuan","year":"2020","unstructured":"Yuan Z, Liu D, Zhang X, Su Q (2020) New image blind watermarking method based on two-dimensional discrete cosine transform. Int J Light Electron Optics. https:\/\/doi.org\/10.1016\/j.ijleo.2019.164152","journal-title":"Int J Light Electron Optics"},{"issue":"2","key":"4445_CR31","doi-asserted-by":"publisher","first-page":"1755","DOI":"10.1016\/j.jfranklin.2021.11.027","volume":"359","author":"H Zhang","year":"2021","unstructured":"Zhang H, Li Z, Liu X, Wang C, Wang X (2021) Robust image watermarking algorithm based on QWT and QSVD using 2DChebyshev-Logistic map. J Franklin Inst 359(2):1755\u20131781","journal-title":"J Franklin Inst"},{"key":"4445_CR32","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1109\/TIP.2003.821552","volume":"13","author":"Y Zhao","year":"2004","unstructured":"Zhao Y (2004) Dual domain watermarking for authentication and compression of cultural heritage images. IEEE Trans Image Process 13:430\u2013448","journal-title":"IEEE Trans Image Process"},{"issue":"5","key":"4445_CR33","doi-asserted-by":"publisher","first-page":"1592","DOI":"10.1109\/TNNLS.2019.2920905","volume":"31","author":"R Zhou","year":"2020","unstructured":"Zhou R, Chang X, Shi L, Shen YD, Yang Y, Nie F (2020) Person reisentification via multi-feature fusion with adaptive graph learning. IEEE Trans Neural Netw Learn Syst 31(5):1592\u20131601","journal-title":"IEEE Trans Neural Netw Learn Syst"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-022-04445-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-022-04445-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-022-04445-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T18:11:00Z","timestamp":1684865460000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-022-04445-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":33,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["4445"],"URL":"https:\/\/doi.org\/10.1007\/s12652-022-04445-0","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,1]]},"assertion":[{"value":"6 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 October 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}