{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T12:58:42Z","timestamp":1775912322064,"version":"3.50.1"},"reference-count":37,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.asoc.2026.114837","type":"journal-article","created":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T16:29:16Z","timestamp":1771086556000},"page":"114837","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["SECURENet: Secure encoder-decoder based multiple watermarking for the protection of digital images"],"prefix":"10.1016","volume":"193","author":[{"given":"Roopkamal K.","family":"Thind","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ashima","family":"Anand","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1342-3523","authenticated-orcid":false,"given":"Anamika","family":"Sharma","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.asoc.2026.114837_bib0005","first-page":"1","article-title":"The visual turn in social media marketing","volume":"12","author":"Gretzel","year":"2017","journal-title":"Tourismos"},{"key":"10.1016\/j.asoc.2026.114837_bib0010","author":"Dootson"},{"issue":"5","key":"10.1016\/j.asoc.2026.114837_bib0015","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1257\/aer.p20161017","article-title":"Copyright infringement in the market for digital images","volume":"106","author":"Luo","year":"2016","journal-title":"Am. Econ. Rev."},{"key":"10.1016\/j.asoc.2026.114837_bib0020","series-title":"Deepfakes and Synthetic Media in the Financial System: Assessing Threat Scenarios","author":"Bateman","year":"2022"},{"key":"10.1016\/j.asoc.2026.114837_bib0025","series-title":"Cybersecurity Issues and Challenges: in Brief","author":"Fischer","year":"2014"},{"key":"10.1016\/j.asoc.2026.114837_bib0030","author":"Security"},{"key":"10.1016\/j.asoc.2026.114837_bib0035","author":"Downs"},{"issue":"2","key":"10.1016\/j.asoc.2026.114837_bib0040","doi-asserted-by":"crossref","first-page":"110","DOI":"10.3390\/info11020110","article-title":"Digital image watermarking techniques: a review","volume":"11","author":"Begum","year":"2020","journal-title":"Information"},{"key":"10.1016\/j.asoc.2026.114837_bib0045","series-title":"Data Hiding and Its Applications: Digital Watermarking and Steganography","author":"Meg\u00edas","year":"2021"},{"key":"10.1016\/j.asoc.2026.114837_bib0050","series-title":"Digital Watermarking and Steganography","author":"Cox","year":"2008"},{"key":"10.1016\/j.asoc.2026.114837_bib0055","first-page":"1","article-title":"Deep learning-based watermarking techniques challenges: a review of current and future trends","author":"Ben Jabra","year":"2024","journal-title":"Circ. Syst. Signal Process."},{"issue":"25","key":"10.1016\/j.asoc.2026.114837_bib0060","doi-asserted-by":"crossref","first-page":"38589","DOI":"10.1007\/s11042-023-15048-y","article-title":"A robust document image watermarking scheme using deep neural network","volume":"82","author":"Ge","year":"2023","journal-title":"Multim. Tools Appl."},{"issue":"2","key":"10.1016\/j.asoc.2026.114837_bib0065","doi-asserted-by":"crossref","DOI":"10.1117\/1.JEI.32.2.021604","article-title":"Autoencoder-convolutional neural network-based embedding and extraction model for image watermarking","volume":"32","author":"Mahapatra","year":"2023","journal-title":"J. Electron. Imaging"},{"issue":"2s","key":"10.1016\/j.asoc.2026.114837_bib0070","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3508365","article-title":"A comprehensive study of deep learning-based covert communication","volume":"18","author":"Anand","year":"2022","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"issue":"8","key":"10.1016\/j.asoc.2026.114837_bib0075","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1109\/TCSVT.2003.815948","article-title":"Novel blind multiple watermarking technique for images","volume":"13","author":"Wong","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"1","key":"10.1016\/j.asoc.2026.114837_bib0080","doi-asserted-by":"crossref","first-page":"2979","DOI":"10.1007\/s11042-023-15750-x","article-title":"Digital image watermarking using deep learning","volume":"83","author":"Singh","year":"2024","journal-title":"Multimed. Tools Appl."},{"issue":"11","key":"10.1016\/j.asoc.2026.114837_bib0085","doi-asserted-by":"crossref","first-page":"15961","DOI":"10.1007\/s11042-022-12566-z","article-title":"Copyright protection of deep neural network models using digital watermarking: a comparative study","volume":"81","author":"Fkirin","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.asoc.2026.114837_bib0090","doi-asserted-by":"crossref","first-page":"1951","DOI":"10.1109\/TMM.2020.3006415","article-title":"An automated and robust image watermarking scheme based on deep neural networks","volume":"23","author":"Zhong","year":"2020","journal-title":"IEEE Trans. Multimed."},{"issue":"19","key":"10.1016\/j.asoc.2026.114837_bib0095","doi-asserted-by":"crossref","first-page":"6854","DOI":"10.3390\/app10196854","article-title":"Convolutional neural network-based digital image watermarking adaptive to the resolution of image and watermark","volume":"10","author":"Lee","year":"2020","journal-title":"Appl. Sci."},{"issue":"1","key":"10.1016\/j.asoc.2026.114837_bib0100","doi-asserted-by":"crossref","first-page":"3056","DOI":"10.1109\/TCE.2023.3286487","article-title":"Using deep learning to embed dual marks with encryption through 3-d chaotic map","volume":"70","author":"Singh","year":"2023","journal-title":"IEEE Trans. Consum. Electron."},{"key":"10.1016\/j.asoc.2026.114837_bib0105","doi-asserted-by":"crossref","DOI":"10.1109\/MMUL.2024.3423370","article-title":"Convnet-Hide: deep learning-based dual watermarking for healthcare images","volume":"31","author":"Amrit","year":"2024","journal-title":"IEEE MultiMedia"},{"key":"10.1016\/j.asoc.2026.114837_bib0110","author":"Das"},{"issue":"7","key":"10.1016\/j.asoc.2026.114837_bib0115","doi-asserted-by":"crossref","first-page":"1685","DOI":"10.1109\/TPAMI.2019.2901877","article-title":"Hiding images within images","volume":"42","author":"Baluja","year":"2019","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.asoc.2026.114837_bib0120","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.future.2016.11.023","article-title":"Multiple watermarking technique for securing online social network contents using back propagation neural network","volume":"86","author":"Singh","year":"2018","journal-title":"Futur. Gener. Comput. Syst."},{"key":"10.1016\/j.asoc.2026.114837_bib0125","doi-asserted-by":"crossref","first-page":"6189","DOI":"10.1109\/TCE.2024.3406956","article-title":"Ganmarked: using secure GAN for information hiding in digital images","volume":"70","author":"Singh","year":"2024","journal-title":"IEEE Trans. Consum. Electron."},{"key":"10.1016\/j.asoc.2026.114837_bib0130","series-title":"Proceedings of the 6th ACM International Conference on Multimedia in Asia","first-page":"1","article-title":"SLIC: secure learned image codec through compressed domain watermarking to defend image manipulation","author":"Huang","year":"2024"},{"key":"10.1016\/j.asoc.2026.114837_bib0135","doi-asserted-by":"crossref","DOI":"10.1111\/exsy.13469","article-title":"Secure transmission of ocean images using deep learning-based data hiding","author":"Singh","year":"2025","journal-title":"Expert Systems"},{"key":"10.1016\/j.asoc.2026.114837_bib0140","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2022.108842","article-title":"Hiding multiple images into a single image via joint compressive autoencoders","volume":"131","author":"Liu","year":"2022","journal-title":"Pattern Recognition"},{"issue":"1","key":"10.1016\/j.asoc.2026.114837_bib0145","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1109\/TPAMI.2022.3141725","article-title":"Deepmih: deep invertible network for multiple image hiding","volume":"45","author":"Guan","year":"2022","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.asoc.2026.114837_bib0150","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1109\/TSUSC.2024.3492290","article-title":"Evade: targeted adversarial false data injection attacks for state estimation in smart grid","volume":"10","author":"Tian","year":"2024","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"10.1016\/j.asoc.2026.114837_bib0155","series-title":"Digital watermarking: a technical overview","author":"Sur","year":"2011"},{"issue":"1","key":"10.1016\/j.asoc.2026.114837_bib0160","doi-asserted-by":"crossref","DOI":"10.1111\/exsy.12793","article-title":"Image super resolution model enabled by wavelet lifting with optimized deep convolutional neural network","volume":"39","author":"Valli Bhasha","year":"2022","journal-title":"Expert Systems"},{"issue":"3","key":"10.1016\/j.asoc.2026.114837_bib0165","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1109\/TETCI.2021.3055520","article-title":"A generalized deep neural network approach for digital watermarking analysis","volume":"6","author":"Ding","year":"2021","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"10.1016\/j.asoc.2026.114837_bib0170","doi-asserted-by":"crossref","first-page":"6134","DOI":"10.1109\/TAI.2024.3485519","article-title":"Deep learning-based dual watermarking for image copyright protection and authentication","volume":"5","author":"Padhi","year":"2024","journal-title":"IEEE Trans. Artif. Intell."},{"key":"10.1016\/j.asoc.2026.114837_bib0175","series-title":"Advances in VLSI, Communication, and Signal Processing: Select Proceedings of VCAS 2018","first-page":"897","article-title":"Improved dwt-svd-based medical image watermarking through hamming code and chaotic encryption","author":"Thakur","year":"2020"},{"issue":"1","key":"10.1016\/j.asoc.2026.114837_bib0180","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1109\/TDSC.2022.3144657","article-title":"Dual watermarking for security of Covid-19 patient record","volume":"20","author":"Anand","year":"2022","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.asoc.2026.114837_bib0185","unstructured":"Tiny ImageNet Challenge, Tiny Imagenet Challenge, available at:, 2015, http:\/\/tiny-imagenet.herokuapp.com (Accessed: 27 January 2025)."}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626002851?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626002851?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T12:19:26Z","timestamp":1775909966000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494626002851"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":37,"alternative-id":["S1568494626002851"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2026.114837","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"SECURENet: Secure encoder-decoder based multiple watermarking for the protection of digital images","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2026.114837","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"114837"}}