{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T22:41:54Z","timestamp":1768344114010,"version":"3.49.0"},"reference-count":30,"publisher":"Association for Computing Machinery (ACM)","issue":"11","license":[{"start":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T00:00:00Z","timestamp":1726099200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DLRL, Hyderabad, India","award":["DLRL\/21CR0003\/SWCC&ENT\/GN\/LP"],"award-info":[{"award-number":["DLRL\/21CR0003\/SWCC&ENT\/GN\/LP"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2024,11,30]]},"abstract":"<jats:p>\n            Copyright violation issues have a growing impact on applications of the digital era, especially images. It is not easy to guarantee the copyright protection of essential information. This paper presents a robust copyright protection technique with high embedding capacity for color images. The technique first fuses the multi-focus images using\n            <jats:bold>non-subsampled contourlet transform (NSCT)<\/jats:bold>\n            to ensure that the fused images have more rich information than a single image. Further, hash value of the cover media is computed for authentication purposes. The fused image and hash value of the cover is then embedded into the cover media with the help of transformed-domain schemes. To achieve higher security, we apply an encryption scheme on a fused media watermark before embedding it into the cover. Lastly, a hybrid optimization algorithm is employed to compute an optimal factor, which makes a good imperceptibility and robustness at the same time. We demonstrate that the proposed technique is effective and resistant to common attacks on image datasets. Compared to existing works, this work increases the 9.5% robustness and 8.8% quality with high embedding capacity.\n          <\/jats:p>","DOI":"10.1145\/3580502","type":"journal-article","created":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T11:05:52Z","timestamp":1674212752000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Robust Copyright Protection Technique with High-embedding Capacity for Color Images"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5637-7240","authenticated-orcid":false,"given":"D. K.","family":"Mahto","sequence":"first","affiliation":[{"name":"Department of CSE, NIT Patna, Patna, Bihar, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7359-2068","authenticated-orcid":false,"given":"A. K.","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of CSE, NIT Patna, Patna, Bihar, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7857-5945","authenticated-orcid":false,"given":"K. N.","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of CSE, NIET, Greater Noida, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2582-5669","authenticated-orcid":false,"given":"O. P.","family":"Singh","sequence":"additional","affiliation":[{"name":"School of Computer Engineering, KIIT, Bhubaneswar, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1176-1716","authenticated-orcid":false,"given":"A. K.","family":"Agrawal","sequence":"additional","affiliation":[{"name":"Department of CSE, School of Engineering and Technology, Sharda University, Greater Noida, India"}]}],"member":"320","published-online":{"date-parts":[[2024,9,12]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3498342"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107255"},{"issue":"2","key":"e_1_3_1_4_2","first-page":"1","article-title":"A survey on healthcare data: A security perspective","volume":"17","author":"Singh A. K.","year":"2021","unstructured":"A. K. Singh, A. Anand, Z. Lv, H. Ko, and A. Mohan. 2021. A survey on healthcare data: A security perspective. ACM Trans. Multimedia Comput. Commun. 17, 2s (2021), 1\u201326.","journal-title":"ACM Trans. Multimedia Comput. Commun."},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3382772"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114540"},{"key":"e_1_3_1_7_2","first-page":"1","article-title":"Hybrid optimisation-based robust watermarking using denoising convolutional neural network","author":"Mahto D. K.","year":"2022","unstructured":"D. K. Mahto, A. Anand, and A. K. Singh. 2022. Hybrid optimisation-based robust watermarking using denoising convolutional neural network. Soft Comput. (May 2022), 1\u201312.","journal-title":"Soft Comput"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2021.02.011"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10322-9"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107385"},{"key":"e_1_3_1_11_2","first-page":"1","article-title":"A color image watermarking method combined QR decomposition and spatial domain","author":"Wang H.","year":"2022","unstructured":"H. Wang and Q. Su. 2022. A color image watermarking method combined QR decomposition and spatial domain. Multimed. Tools Appl. (Apr. 2022), 1\u201322.","journal-title":"Multimed. Tools Appl"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10610-y"},{"key":"e_1_3_1_13_2","first-page":"1","article-title":"Color image watermarking based on singular value decomposition and generalized regression neural network","author":"Liu X.","year":"2022","unstructured":"X. Liu, Y. Wu, P. Gao, J. Ouyang, and Z. Shao. 2022. Color image watermarking based on singular value decomposition and generalized regression neural network. Multimed. Tools Appl. (Apr. 2022), 1\u201319.","journal-title":"Multimed. Tools Appl."},{"key":"e_1_3_1_14_2","first-page":"1","article-title":"SDH: Secure data hiding in fused medical image for smart healthcare","author":"Anand A.","year":"2021","unstructured":"A. Anand and A. K. Singh. 2021. SDH: Secure data hiding in fused medical image for smart healthcare. IEEE Trans. Comput. Soc. Syst. (Nov. 2021), 1\u20139.","journal-title":"IEEE Trans. Comput. Soc. Syst"},{"key":"e_1_3_1_15_2","doi-asserted-by":"crossref","unstructured":"S. Kumar and G. Bhatnagar. 2019. SIE: An application to secure stereo images using encryption. In Handbook of Multimedia Information Security: Techniques and Applications. Springer Cham (2019) 37\u201361.","DOI":"10.1007\/978-3-030-15887-3_3"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3522-z"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.103398"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3974-1"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.02.025"},{"key":"e_1_3_1_20_2","article-title":"A high visual quality color image reversible data hiding scheme based on B-R-G embedding principle and CIEDE2000 assessment metric","author":"Yang Y.","year":"2021","unstructured":"Y. Yang, T. Zou, G. Huang, and W. Zhang. 2021. A high visual quality color image reversible data hiding scheme based on B-R-G embedding principle and CIEDE2000 assessment metric. IEEE Trans. Circuits Syst. Video Technol. (Apr. 2021).","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIPA.2017.8120651"},{"key":"e_1_3_1_22_2","unstructured":"Kodak dataset | Kaggle. [Online]. Available: https:\/\/www.kaggle.com\/datasets\/sherylmehta\/kodak-dataset. [Accessed: 18-Oct-2022]."},{"key":"e_1_3_1_23_2","unstructured":"SIPI Image Database. [Online]. Available: https:\/\/sipi.usc.edu\/database\/. [Accessed: 18-Oct-2022]."},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117134"},{"key":"e_1_3_1_25_2","first-page":"1","article-title":"Secure and effective color image tampering detection and self restoration using a dual watermarking approach\u2729","volume":"262","author":"Al-Otum H. M.","year":"2022","unstructured":"H. M. Al-Otum and A. A. A. Ellubani. 2022. Secure and effective color image tampering detection and self restoration using a dual watermarking approach\u2729. Optik (Stuttg). 262 (Jul. 2022), 1\u201322.","journal-title":"Optik (Stuttg)"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104490"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105696"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2021.11.027"},{"key":"e_1_3_1_29_2","first-page":"1","article-title":"A secure and robust color image watermarking using nature-inspired intelligence","author":"Sharma S.","year":"2021","unstructured":"S. Sharma, H. Sharma, J. B. Sharma, and R. C. Poonia. 2021. A secure and robust color image watermarking using nature-inspired intelligence. Neural Comput. Appl. (Jan. 2021), 1\u201319.","journal-title":"Neural Comput. Appl."},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-7115-x"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11725-y"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580502","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3580502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:42Z","timestamp":1750178262000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580502"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,12]]},"references-count":30,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2024,11,30]]}},"alternative-id":["10.1145\/3580502"],"URL":"https:\/\/doi.org\/10.1145\/3580502","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,12]]},"assertion":[{"value":"2022-11-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-01-12","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}