{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:09:10Z","timestamp":1774541350384,"version":"3.50.1"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["41625004 41971404"],"award-info":[{"award-number":["41625004 41971404"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2017YFB0503500"],"award-info":[{"award-number":["2017YFB0503500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2988298","type":"journal-article","created":{"date-parts":[[2020,4,16]],"date-time":"2020-04-16T20:25:51Z","timestamp":1587068751000},"page":"76386-76398","source":"Crossref","is-referenced-by-count":73,"title":["Hybrid Watermarking Algorithm Using Clifford Algebra With Arnold Scrambling and Chaotic Encryption"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8743-2783","authenticated-orcid":false,"given":"Uzair Aslam","family":"Bhatti","sequence":"first","affiliation":[]},{"given":"Zhaoyuan","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jingbing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Saqib Ali","family":"Nawaz","sequence":"additional","affiliation":[]},{"given":"Anum","family":"Mehmood","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9195-8000","authenticated-orcid":false,"given":"Kun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Linwang","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"hamilton","year":"1866","journal-title":"Elements of Quaternions"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2017.0921"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2010.2052261"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.07.147"},{"key":"ref31","first-page":"838","article-title":"Digital image transformation and information hiding and disguising technology","volume":"21","author":"ding","year":"1998","journal-title":"Chin J Comput"},{"key":"ref30","year":"0","journal-title":"The Kodak Color Image Dataset Image"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/B978-0-12-407670-9.00006-8","article-title":"Perspectives on color image processing by linear vector methods using projective geometric transformations","volume":"175","author":"sangwine","year":"2013","journal-title":"Advances in Imaging and Electron Physics"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2906033"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s00006-016-0666-x"},{"key":"ref34","first-page":"19","year":"1986","journal-title":"Colorimetry CIE"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10851-014-0511-6"},{"key":"ref27","article-title":"Template matching on vector fields using clifford algebra","author":"ebling","year":"2006"},{"key":"ref29","first-page":"929","article-title":"Digital steganography utilizing features of JPEG images","volume":"e87 a","author":"iwata","year":"2004","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2808172"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2921894"},{"key":"ref20","article-title":"The theory and application research of color image processing based on hyper-complex","author":"jiang","year":"2008"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3909-x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916275"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2700299"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2687-1"},{"key":"ref26","author":"baylis","year":"2012","journal-title":"Clifford (Geometric) Algebras With Applications to Physics Mathematics and Engineering"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.08.015"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5913-9"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/app9040700"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.1993.325510"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2017.03.091"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2017.04.012"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1117\/1.3609010"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2542205.2542207"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/83.918569"},{"key":"ref17","article-title":"Robust image watermarking against geometric attacks","author":"dong","year":"2013"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815957"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1049\/el:19961331"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3706-6"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2016.0862"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0196306"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0199143"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2015.09.205"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00122-X"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2019.164152"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-2342-0.ch002"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.11.011"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2879919"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.01.019"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3325193"},{"key":"ref42","first-page":"83","article-title":"Cryptanalysis of a hyper-chaotic image encryption algorithm and its improved version","volume":"60","author":"wang","year":"2011","journal-title":"Acta Phys Sinica"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"2287","DOI":"10.17762\/ijritcc2321-8169.1504112","article-title":"Damage detection caused by natural disaster using image processing technique","volume":"3","author":"singh","year":"2015","journal-title":"Int J Recent Innov Trends Comput Commun"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5670-9"},{"key":"ref43","first-page":"216","article-title":"Image encryption algorithms based on chaos through dual scrambling of pixel position and bit","volume":"35","author":"deng","year":"2014","journal-title":"J Commun"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09069210.pdf?arnumber=9069210","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:51:27Z","timestamp":1639770687000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9069210\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2988298","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}