{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T04:19:12Z","timestamp":1745554752786,"version":"3.40.4"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T00:00:00Z","timestamp":1745452800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T00:00:00Z","timestamp":1745452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-025-03948-9","type":"journal-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T11:36:40Z","timestamp":1745494600000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fuzzifier Point Estimation Using the Genetic Algorithm to Improve Image Watermarking"],"prefix":"10.1007","volume":"6","author":[{"given":"Fatemeh","family":"Nassaj","sequence":"first","affiliation":[]},{"given":"Mohammad","family":"Amin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6058-7083","authenticated-orcid":false,"given":"Ehsan","family":"Amiri","sequence":"additional","affiliation":[]},{"given":"Erta","family":"Bahmani","sequence":"additional","affiliation":[]},{"given":"Parisa","family":"Ahmadi","sequence":"additional","affiliation":[]},{"given":"Zahra","family":"Farsi","sequence":"additional","affiliation":[]},{"given":"Maryam","family":"Khodaei","sequence":"additional","affiliation":[]},{"given":"Samira","family":"Mirzaei","sequence":"additional","affiliation":[]},{"given":"Zahra","family":"Roostae","sequence":"additional","affiliation":[]},{"given":"Zahra","family":"Salehi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,24]]},"reference":[{"key":"3948_CR1","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1016\/j.future.2018.12.032","volume":"99","author":"D Wu","year":"2019","unstructured":"Wu D, Deng L, Wang H, Liu K, Wang R. Similarity aware safety multimedia data transmission mechanism for Internet of vehicles. Futur Gener Comput Syst. 2019;99:609\u201323.","journal-title":"Futur Gener Comput Syst"},{"key":"3948_CR2","doi-asserted-by":"publisher","first-page":"3221","DOI":"10.1007\/s12652-019-01500-1","volume":"11","author":"A Mohanarathinam","year":"2020","unstructured":"Mohanarathinam A, Kamalraj S, Prasanna Venkatesan GKD, Ravi RV, Manikandababu CS. Digital watermarking techniques for image security: a review. J Ambient Intell Human Comput. 2020;11:3221\u20139.","journal-title":"J Ambient Intell Human Comput"},{"issue":"19\u201320","key":"3948_CR3","doi-asserted-by":"publisher","first-page":"13161","DOI":"10.1007\/s11042-020-08639-6","volume":"79","author":"AK Chaturvedi","year":"2020","unstructured":"Chaturvedi AK, Shukla PK. Effective watermarking technique using optimal discrete wavelet transform and sanitization technique. Multimedia Tools Appl. 2020;79(19\u201320):13161\u201377.","journal-title":"Multimedia Tools Appl"},{"issue":"4","key":"3948_CR4","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/s42979-021-00729-y","volume":"2","author":"A Khmag","year":"2021","unstructured":"Khmag A. A robust watermarking technique for high-efficiency video coding (HEVC) based on blind extraction scheme. SN Comput Sci. 2021;2(4):329.","journal-title":"SN Comput Sci"},{"issue":"2","key":"3948_CR5","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s42979-022-01046-8","volume":"3","author":"S Roy","year":"2022","unstructured":"Roy S, Islam MM. A hybrid secured approach combining LSB steganography and AES using mosaic images for ensuring data security. SN Comput Sci. 2022;3(2):153.","journal-title":"SN Comput Sci"},{"key":"3948_CR6","doi-asserted-by":"publisher","first-page":"100520","DOI":"10.1016\/j.measen.2022.100520","volume":"24","author":"S Gupta","year":"2022","unstructured":"Gupta S, Saluja K, Solanki V, Kaur K, Singla P, Shahid M. Efficient methods for digital image watermarking and information embedding. Meas Sens. 2022;24:100520.","journal-title":"Meas Sens"},{"issue":"2","key":"3948_CR7","doi-asserted-by":"publisher","first-page":"5531","DOI":"10.1007\/s11042-023-15806-y","volume":"83","author":"P Aberna","year":"2024","unstructured":"Aberna P, Agilandeeswari L. Digital image and video watermarking: methodologies, attacks, applications, and future directions. Multimedia Tools Appl. 2024;83(2):5531\u201391.","journal-title":"Multimedia Tools Appl"},{"issue":"3","key":"3948_CR8","doi-asserted-by":"publisher","first-page":"1210","DOI":"10.3390\/s23031210","volume":"23","author":"ZB Faheem","year":"2023","unstructured":"Faheem ZB, Ishaq A, Rustam F, de la Torre D\u00edez I, Gavilanes D, Vergara MM, Ashraf I. Image watermarking using least significant bit and canny edge detection. Sensors. 2023;23(3):1210.","journal-title":"Sensors"},{"issue":"6","key":"3948_CR9","doi-asserted-by":"publisher","first-page":"16447","DOI":"10.1007\/s11042-023-16109-y","volume":"83","author":"A Tiwari","year":"2024","unstructured":"Tiwari A, Srivastava VK. Image watermarking techniques based on Schur decomposition and various image invariant moments: a review. Multimedia Tools Appl. 2024;83(6):16447\u201383.","journal-title":"Multimedia Tools Appl"},{"issue":"1","key":"3948_CR10","doi-asserted-by":"publisher","first-page":"1407","DOI":"10.1007\/s11042-023-15396-9","volume":"83","author":"S Gull","year":"2024","unstructured":"Gull S, Parah SA. Advances in medical image watermarking: a state of the art review. Multimedia Tools Appl. 2024;83(1):1407\u201347.","journal-title":"Multimedia Tools Appl"},{"issue":"11","key":"3948_CR11","doi-asserted-by":"publisher","first-page":"31829","DOI":"10.1007\/s11042-023-16843-3","volume":"83","author":"S Sharma","year":"2024","unstructured":"Sharma S, Zou JJ, Fang G, Shukla P, Cai W. A review of image watermarking for identity protection and verification. Multimedia Tools Appl. 2024;83(11):31829\u201391.","journal-title":"Multimedia Tools Appl"},{"issue":"2","key":"3948_CR12","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/s42979-021-00478-y","volume":"2","author":"F Yasmeen","year":"2021","unstructured":"Yasmeen F, Uddin MS. An efficient watermarking approach based on LL and HH edges of DWT\u2013SVD. SN Comput Sci. 2021;2(2):82.","journal-title":"SN Comput Sci"},{"issue":"3","key":"3948_CR13","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s42979-021-00608-6","volume":"2","author":"M Begum","year":"2021","unstructured":"Begum M, Uddin MS. Implementation of secured and robust DFT-based image watermark through hybridization with decomposition algorithm. SN Comput Sci. 2021;2(3):221.","journal-title":"SN Comput Sci"},{"issue":"2","key":"3948_CR14","first-page":"750","volume":"15","author":"SN Prajwalasimha","year":"2019","unstructured":"Prajwalasimha SN, Chethan Suputhra S, Mohan CS. Performance analysis of DCT and successive division based digital image watermarking scheme. Indones J Electr Eng Comput Sci. 2019;15(2):750\u20137.","journal-title":"Indones J Electr Eng Comput Sci"},{"key":"3948_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-35781-0","volume-title":"Introduction to fuzzy logic using MATLAB","author":"SN Sivanandam","year":"2007","unstructured":"Sivanandam SN, Sumathi S, Deepa SN. Introduction to fuzzy logic using MATLAB, vol. 1. Berlin: Springer; 2007."},{"issue":"4-I","key":"3948_CR16","first-page":"35","volume":"12","author":"MY Ali","year":"2016","unstructured":"Ali MY, Sultana A, Khan AFMK. Comparison of fuzzy multiplication operation on triangular fuzzy number. IOSR J Math. 2016;12(4\u2013I):35\u201341.","journal-title":"IOSR J Math"},{"issue":"1","key":"3948_CR17","doi-asserted-by":"publisher","first-page":"012003","DOI":"10.1088\/1742-6596\/1970\/1\/012003","volume":"1970","author":"KAB Nigm","year":"2021","unstructured":"Nigm KAB, Elsherif AK, Ismail AS. Error analysis between two different fuzzy multiplication operations on triangular fuzzy number. J Phys Conf Ser. 2021;1970(1):012003.","journal-title":"J Phys Conf Ser"},{"issue":"10","key":"3948_CR18","first-page":"34","volume":"162","author":"P Kora","year":"2017","unstructured":"Kora P, Yadlapalli P. Crossover operators in genetic algorithms: a review. Int J Comput Appl. 2017;162(10):34\u20136.","journal-title":"Int J Comput Appl"},{"key":"3948_CR19","doi-asserted-by":"crossref","unstructured":"Patel KN, Patel KN (2021) Path to digital watermarking. robust and secured digital audio watermarking: using a DWT-SVD-DSSS hybrid approach, pp. 7\u201321.","DOI":"10.1007\/978-3-030-53911-5_2"},{"issue":"2","key":"3948_CR20","first-page":"1132","volume":"29","author":"M Zairi","year":"2023","unstructured":"Zairi M, Boujiha T, Ouelli A. Secure fragile watermarking based on Huffman encoding and optimal embedding strategy. Indones J Electr Eng Comput Sci. 2023;29(2):1132\u20139.","journal-title":"Indones J Electr Eng Comput Sci"},{"key":"3948_CR21","doi-asserted-by":"publisher","first-page":"5617","DOI":"10.1007\/s11042-019-08023-z","volume":"79","author":"KM Abdelwahab","year":"2020","unstructured":"Abdelwahab KM, Abd El-atty SM, El-Shafai W, El-Rabaie S, Abd El-Samie FE. Efficient SVD-based audio watermarking technique in FRT domain. Multimedia Tools Appl. 2020;79:5617\u201348.","journal-title":"Multimedia Tools Appl"},{"key":"3948_CR22","doi-asserted-by":"crossref","unstructured":"Gao L, Gao T, Sheng G, Cao Y, Fan L. A new reversible watermarking scheme based on integer DCT for medical images. In: 2012 International conference on wavelet analysis and pattern recognition. IEEE; 2012. pp. 33\u201337.","DOI":"10.1109\/ICWAPR.2012.6294751"},{"issue":"3","key":"3948_CR23","first-page":"275","volume":"4","author":"PY Chen","year":"2006","unstructured":"Chen PY, Lin HJ. A DWT based approach for image steganography. Int J Appl Sci Eng. 2006;4(3):275\u201390.","journal-title":"Int J Appl Sci Eng"},{"issue":"8","key":"3948_CR24","doi-asserted-by":"publisher","first-page":"11055","DOI":"10.1007\/s11063-023-11364-4","volume":"55","author":"T Radhika","year":"2023","unstructured":"Radhika T, Chandrasekar A, Vijayakumar V, Zhu Q. Analysis of Markovian jump stochastic Cohen\u2013Grossberg BAM neural networks with time delays for exponential input-to-state stability. Neural Process Lett. 2023;55(8):11055\u201372.","journal-title":"Neural Process Lett"},{"key":"3948_CR25","doi-asserted-by":"publisher","DOI":"10.1002\/mma.8774","author":"M Tamil Thendral","year":"2022","unstructured":"Tamil Thendral M, Ganesh Babu TR, Chandrasekar A, Cao Y. Synchronization of Markovian jump neural networks for sampled data control systems with additive delay components: analysis of image encryption technique. Math Methods Appl Sci. 2022. https:\/\/doi.org\/10.1002\/mma.8774.","journal-title":"Math Methods Appl Sci"},{"key":"3948_CR26","doi-asserted-by":"crossref","unstructured":"Tu SF, Hsu CS. Digital watermarking method based on image size invariant visual cryptographic scheme. In: 2009 Symposia and workshops on ubiquitous, autonomic and trusted computing. IEEE; 2009. pp. 362\u2013366.","DOI":"10.1109\/UIC-ATC.2009.33"},{"key":"3948_CR27","doi-asserted-by":"crossref","unstructured":"Pulgam ND, Shinde SK. Analysis of different encryption techniques used in watermarking algorithm for the security of medical image. In: 2022 10th International conference on emerging trends in engineering and technology-signal and information processing (ICETET-SIP-22). IEEE; 2022. pp. 1\u20136.","DOI":"10.1109\/ICETET-SIP-2254415.2022.9791814"},{"issue":"5","key":"3948_CR28","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1109\/TITB.2012.2207730","volume":"16","author":"D Bouslimi","year":"2012","unstructured":"Bouslimi D, Coatrieux G, Cozic M, Roux C. A joint encryption\/watermarking system for verifying the reliability of medical images. IEEE Trans Inf Technol Biomed. 2012;16(5):891\u20139.","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"3948_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-82327-6","volume-title":"Remote sensing digital image analysis","author":"JA Richards","year":"2022","unstructured":"Richards JA, Richards JA. Remote sensing digital image analysis, vol. 5. New York: Springer; 2022."},{"issue":"21","key":"3948_CR30","doi-asserted-by":"publisher","first-page":"32855","DOI":"10.1007\/s11042-023-14797-0","volume":"82","author":"AO Mohammed","year":"2023","unstructured":"Mohammed AO, Hussein HI, Mstafa RJ, Abdulazeez AM. A blind and robust color image watermarking scheme based on DCT and DWT domains. Multimedia Tools Appl. 2023;82(21):32855\u201381.","journal-title":"Multimedia Tools Appl"},{"key":"3948_CR31","unstructured":"Liu Z, Luo P, Wang X, Tang X. Large-scale celebfaces attributes (CelebA) dataset. 2018; 15(2018):11."},{"key":"3948_CR32","unstructured":"Rahim R, Nadeem S. End-to-end trained CNN encoder-decoder networks for image steganography. In: Proceedings of the European conference on computer vision (ECCV) workshops. 2018."},{"issue":"1","key":"3948_CR33","first-page":"8869096","volume":"2020","author":"Q Wei","year":"2020","unstructured":"Wei Q, Wang H, Zhang G. A robust image watermarking approach using cycle variational autoencoder. Secur Commun Netw. 2020;2020(1):8869096.","journal-title":"Secur Commun Netw"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03948-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-025-03948-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-025-03948-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T11:36:48Z","timestamp":1745494608000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-025-03948-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,24]]},"references-count":33,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["3948"],"URL":"https:\/\/doi.org\/10.1007\/s42979-025-03948-9","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,24]]},"assertion":[{"value":"31 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human and \/or animals"}},{"value":"All authors are aware of the text of the article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}],"article-number":"419"}}