{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:30:27Z","timestamp":1767339027888},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T00:00:00Z","timestamp":1615248000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T00:00:00Z","timestamp":1615248000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This paper introduces a robust and secure data hiding scheme to transmit grayscale image in encryption-then-compression domain. First, host image is transformed using lifting wavelet transform, Hessenberg decomposition and redundant singular value decomposition. Then, we use appropriate scaling factor to invisibly embed the singular value of watermark data into the lower frequency sub-band of the host image. We also use suitable encryption-then-compression scheme to improve the security of the image. Additionally, de-noising convolutional neural network is performed at extracted mark data to enhance the robustness of the scheme. Experimental results verify the effectiveness of our scheme, including embedding capacity, robustness, invisibility, and security. Further, it is established that our scheme has a better ability to recover concealed mark than conventional ones at low cost.<\/jats:p>","DOI":"10.1007\/s40747-021-00309-w","type":"journal-article","created":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T12:58:49Z","timestamp":1615294729000},"page":"2759-2772","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Data hiding in encryption\u2013compression domain"],"prefix":"10.1007","volume":"9","author":[{"given":"O. P.","family":"Singh","sequence":"first","affiliation":[]},{"given":"A. K.","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,9]]},"reference":[{"key":"309_CR1","first-page":"1","volume-title":"Digital image watermarking: concepts and applications, medical image watermarking","author":"A Singh","year":"2017","unstructured":"Singh A, Kumar B, Singh G, Mohan A (2017) Digital image watermarking: concepts and applications, medical image watermarking. Springer, pp 1\u201312 (ISBN: 978-3319576985)"},{"issue":"11","key":"309_CR2","doi-asserted-by":"publisher","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594\u20132608","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"309_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09606-x","author":"O Singh","year":"2020","unstructured":"Singh O, Singh A, Srivastava G, Kumar N (2020) Image watermarking using soft computing techniques: a comprehensive survey. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-020-09606-x","journal-title":"Multimed Tools Appl"},{"key":"309_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3382772","volume":"16","author":"A Singh","year":"2020","unstructured":"Singh A (2020) Data hiding: current trends, innovation and potential challenges. ACM Trans Multimed Comput Commun Appl 16:1\u201316","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"issue":"6","key":"309_CR5","doi-asserted-by":"publisher","first-page":"8881","DOI":"10.1007\/s11042-016-3514-z","volume":"76","author":"A Singh","year":"2016","unstructured":"Singh A (2016) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed Tools Appl 76(6):8881\u20138900","journal-title":"Multimed Tools Appl"},{"key":"309_CR6","doi-asserted-by":"publisher","first-page":"20149","DOI":"10.1007\/s11042-020-08881-y","volume":"79","author":"S Kumar","year":"2020","unstructured":"Kumar S, Singh B, Yadav M (2020) A recent survey on multimedia and database watermarking. Multimed Tools Appl 79:20149\u201320197","journal-title":"Multimed Tools Appl"},{"key":"309_CR7","doi-asserted-by":"crossref","unstructured":"Park J, Jeong S, Kim C (2001) Robust and fragile watermarking techniques for documents using bi-directional diagonal profiles. Information and communications security, pp 483\u2013494","DOI":"10.1007\/3-540-45600-7_55"},{"issue":"1","key":"309_CR8","doi-asserted-by":"crossref","first-page":"14","DOI":"10.3390\/sym10010014","volume":"10","author":"X Zhou","year":"2018","unstructured":"Zhou X, Zhang H, Wang C (2018) A robust image watermarking technique based on DWT, APDCBT, and SVD. Symmetry 10(3):1\u201314","journal-title":"Symmetry"},{"issue":"3","key":"309_CR9","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MCE.2017.2684980","volume":"6","author":"S Mohanty","year":"2017","unstructured":"Mohanty S, Sengupta A, Guturu P, Kougianos E (2017) Everything you want to know about watermarking: from paper marks to hardware protection: from paper marks to hardware protection. IEEE Consum Electron Mag 6(3):83\u201391","journal-title":"IEEE Consum Electron Mag"},{"key":"309_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-020-01945-y","author":"Z Yuan","year":"2020","unstructured":"Yuan Z, Su Q, Liu D, Zhang X (2020) A blind image watermarking scheme combining spatial domain and frequency domain. Vis Comput. https:\/\/doi.org\/10.1007\/s00371-020-01945-y","journal-title":"Vis Comput"},{"key":"309_CR11","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.eswa.2018.06.024","volume":"112","author":"T Araghi","year":"2018","unstructured":"Araghi T, Manaf A, Araghi S (2018) A secure blind discrete wavelet transform based watermarking scheme using two-level singular value decomposition. Expert Syst Appl 112:208\u2013228","journal-title":"Expert Syst Appl"},{"key":"309_CR12","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/978-981-15-0339-9_7","volume":"1064","author":"S Naaz","year":"2019","unstructured":"Naaz S, Sana E, Ansari I (2019) Comparative analysis of digital image watermarking based on lifting wavelet transform and singular value decomposition. Adv Intell Syst Comput 1064:65\u201381","journal-title":"Adv Intell Syst Comput"},{"key":"309_CR13","doi-asserted-by":"publisher","first-page":"80849","DOI":"10.1109\/ACCESS.2019.2915596","volume":"7","author":"J Liu","year":"2019","unstructured":"Liu J et al (2019) An optimized image watermarking method based on HD and SVD in DWT domain. IEEE Access 7:80849\u201380860","journal-title":"IEEE Access"},{"key":"309_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2012\/409357","volume":"2012","author":"J Zhang","year":"2012","unstructured":"Zhang J, Erway J, Hu X, Zhang Q, Plemmons R (2012) Randomized SVD methods in hyperspectral imaging. J Electr Comput Eng 2012:1\u201315","journal-title":"J Electr Comput Eng"},{"key":"309_CR15","first-page":"1","volume":"2012","author":"S Al-Maadeed","year":"2012","unstructured":"Al-Maadeed S, Al-Ali A, Abdalla T (2012) A new chaos-based image-encryption and compression algorithm. J Electr Comput Eng 2012:1\u201311","journal-title":"J Electr Comput Eng"},{"issue":"6","key":"309_CR16","doi-asserted-by":"publisher","first-page":"1515","DOI":"10.1109\/TIFS.2018.2881677","volume":"14","author":"T Chuman","year":"2019","unstructured":"Chuman T, Sirichotedumrong W, Kiya H (2019) Encryption-then-compression systems using grayscale-based image encryption for JPEG images. IEEE Trans Inf Forensics Secur 14(6):1515\u20131525","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"309_CR17","doi-asserted-by":"publisher","first-page":"8781","DOI":"10.1007\/s11042-016-3522-z","volume":"76","author":"Q Su","year":"2016","unstructured":"Su Q, Wang G, Lv G, Zhang X, Deng G, Chen B (2016) A novel blind color image watermarking based on Contourlet transform and Hessenberg decomposition. Multimed Tools Appl 76(6):8781\u20138801","journal-title":"Multimed Tools Appl"},{"key":"309_CR18","doi-asserted-by":"crossref","unstructured":"Chakraborty S, Chatterjee S, Dey N, Ashour A, Hassanien A (2016) Comparative approach between singular value decomposition and randomized singular value decomposition-based watermarking. Intelligent techniques in signal processing for multimedia security, pp 133\u2013149","DOI":"10.1007\/978-3-319-44790-2_7"},{"issue":"14","key":"309_CR19","doi-asserted-by":"publisher","first-page":"8381","DOI":"10.1007\/s11042-015-2754-7","volume":"75","author":"A Singh","year":"2015","unstructured":"Singh A, Dave M, Mohan A (2015) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl 75(14):8381\u20138401","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"309_CR20","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/MMUL.2020.2993269","volume":"27","author":"A Anand","year":"2020","unstructured":"Anand A, Singh A, Lv Z, Bhatnagar G (2020) Compression-then-encryption-based secure watermarking technique for smart healthcare system. IEEE Multimed 27(4):133\u2013143","journal-title":"IEEE Multimed"},{"issue":"4","key":"309_CR21","doi-asserted-by":"publisher","first-page":"1415","DOI":"10.1007\/s11277-014-2091-6","volume":"80","author":"A Singh","year":"2014","unstructured":"Singh A, Kumar B, Dave M, Mohan A (2014) Robust and imperceptible dual watermarking for telemedicine applications. Wirel Pers Commun 80(4):1415\u20131433","journal-title":"Wirel Pers Commun"},{"issue":"4","key":"309_CR22","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1007\/s11042-016-3862-8","volume":"77","author":"A Zear","year":"2016","unstructured":"Zear A, Singh A, Kumar P (2016) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863\u20134882","journal-title":"Multimed Tools Appl"},{"issue":"11\u201312","key":"309_CR23","first-page":"7339","volume":"79","author":"C Kumar","year":"2019","unstructured":"Kumar C, Singh A, Kumar P (2019) Dual watermarking: an approach for securing digital documents. Multimed Tools Appl 79(11\u201312):7339\u20137354","journal-title":"Multimed Tools Appl"},{"key":"309_CR24","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.comcom.2020.01.038","volume":"152","author":"A Anand","year":"2020","unstructured":"Anand A, Singh A (2020) An improved DWT-SVD domain watermarking for medical information security. Comput Commun 152:72\u201380","journal-title":"Comput Commun"},{"key":"309_CR25","doi-asserted-by":"publisher","first-page":"102805","DOI":"10.1016\/j.dsp.2020.102805","volume":"106","author":"L Zhang","year":"2020","unstructured":"Zhang L, Wei D (2020) Robust and reliable image copyright protection scheme using down sampling and block transform in integer wavelet domain. Digit Signal Process 106:102805","journal-title":"Digit Signal Process"},{"issue":"25\u201326","key":"309_CR26","doi-asserted-by":"publisher","first-page":"18343","DOI":"10.1007\/s11042-019-08490-4","volume":"79","author":"P Zheng","year":"2020","unstructured":"Zheng P, Zhang Y (2020) A robust image watermarking scheme in hybrid transform domains resisting to rotation attacks. Multimed Tools Appl 79(25\u201326):18343\u201318365","journal-title":"Multimed Tools Appl"},{"key":"309_CR27","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1007\/978-981-32-9775-3_80","volume":"587","author":"S Thakur","year":"2020","unstructured":"Thakur S, Singh AK, Kumar B, Ghrera SP (2020) Improved DWT-SVD-based medical image watermarking through hamming code and chaotic encryption. Commun Signal Process Lect Notes Electr Eng 587:897\u2013905","journal-title":"Commun Signal Process Lect Notes Electr Eng"},{"key":"309_CR28","doi-asserted-by":"publisher","first-page":"102403","DOI":"10.1016\/j.bspc.2020.102403","volume":"66","author":"K Fares","year":"2021","unstructured":"Fares K, Khaldi A, Redouane K, Salah E (2021) DCT and DWT based watermarking scheme for medical information security. Biomed Signal Process Control 66:102403","journal-title":"Biomed Signal Process Control"},{"key":"309_CR29","unstructured":"http:\/\/sipi.usc.edu\/database\/database.php?volume=misc. Accessed 25 Nov 2020"},{"key":"309_CR30","doi-asserted-by":"crossref","unstructured":"Thakur S, Singh A, Ghrera S, Dave M (2018) Watermarking techniques and its applications in Tele-health: a technical survey. Cryptographic and information security, pp 467\u2013508","DOI":"10.1201\/9780429435461-17"},{"issue":"2","key":"309_CR31","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1007\/s13369-013-0713-z","volume":"39","author":"H Khanzadi","year":"2013","unstructured":"Khanzadi H, Eshghi M, Borujeni S (2013) Image encryption using random bit sequence based on chaotic maps. Arab J Sci Eng 39(2):1039\u20131047","journal-title":"Arab J Sci Eng"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00309-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-021-00309-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00309-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,22]],"date-time":"2023-10-22T19:32:07Z","timestamp":1698003127000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-021-00309-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,9]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["309"],"URL":"https:\/\/doi.org\/10.1007\/s40747-021-00309-w","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,9]]},"assertion":[{"value":"2 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}