{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T17:39:40Z","timestamp":1770917980656,"version":"3.50.1"},"reference-count":43,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T00:00:00Z","timestamp":1743984000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62201233"],"award-info":[{"award-number":["62201233"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100022957","name":"Double Thousand Plan of Jiangxi Province","doi-asserted-by":"crossref","award":["jxsq2023201118"],"award-info":[{"award-number":["jxsq2023201118"]}],"id":[{"id":"10.13039\/100022957","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Outstanding Youth Fund Program of Jiangxi Province","award":["20232ACB212004"],"award-info":[{"award-number":["20232ACB212004"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2025,4,30]]},"abstract":"<jats:p>Light field (LF) image data potentially involves a lot of sensitive information about users. Its transmission channel breaches could compromise user privacy and implicate illegal activities. Therefore, the confidentiality and integrity of LF image data transmission are crucial. However, most of the existing watermarking techniques may not adequately consider the confidentiality and integrity authentication of LF image data transmission. To address this problem, this article employs Generic Radial Harmonic Fourier Moments in Radon space (GRHFMR) to propose a robust zero-watermarking scheme of the LF image, called LFIZW-GRHFMR. Specifically, the radial harmonic Fourier coefficients of sub-aperture images (SAIs) of LF image are calculated by taking into full consideration the characteristics of the GRHFMR variable weight basis function, and then the corresponding watermarks are combined to generate zero-watermarks with stronger robustness. For yielding more watermarking information and enhancing security authentication, the 32 key SAIs of LF image at a sampling rate of 0.5 are selected to act with GRHFMR. Meanwhile, the key SAIs are converted as video streaming with high efficiency video coding for transmission to improve the data transmission efficiency. Extensive experimental results demonstrate that the proposed LFIZW-GRHFMR outperforms the latest watermarking methods.<\/jats:p>","DOI":"10.1145\/3717066","type":"journal-article","created":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T17:25:42Z","timestamp":1739467542000},"page":"1-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["LFIZW-GRHFMR: Robust Zero-Watermarking with GRHFMR for Light Field Image"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3098-4640","authenticated-orcid":false,"given":"Wenying","family":"Wen","sequence":"first","affiliation":[{"name":"School of Computing and Artificial Intelligence, Jiangxi University of Finance and Economics, Nanchang, China, and Jiangxi Provincial Key Laboratory of Multimedia Intelligent Processing, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3191-8307","authenticated-orcid":false,"given":"Yu","family":"Ye","sequence":"additional","affiliation":[{"name":"School of Computing and Artificial Intelligence, Jiangxi University of Finance and Economics, Nanchang, China, and Jiangxi Provincial Key Laboratory of Multimedia Intelligent Processing, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5590-8584","authenticated-orcid":false,"given":"Ziye","family":"Yuan","sequence":"additional","affiliation":[{"name":"School of Computing and Artificial Intelligence, Jiangxi University of Finance and Economics, Nanchang, China, and Jiangxi Provincial Key Laboratory of Multimedia Intelligent Processing, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5762-272X","authenticated-orcid":false,"given":"Baolin","family":"Qiu","sequence":"additional","affiliation":[{"name":"School of Computing and Artificial Intelligence, Jiangxi University of Finance and Economics, Nanchang, China, and Jiangxi Provincial Key Laboratory of Multimedia Intelligent Processing, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3300-4932","authenticated-orcid":false,"given":"Dingli","family":"Hua","sequence":"additional","affiliation":[{"name":"School of Computing and Artificial Intelligence, Jiangxi University of Finance and Economics, Nanchang, China, and Jiangxi Provincial Key Laboratory of Multimedia Intelligent Processing, Nanchang, China"}]}],"member":"320","published-online":{"date-parts":[[2025,4,7]]},"reference":[{"issue":"11","key":"e_1_3_1_2_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3633203","article-title":"A comprehensive survey on methods for image integrity","volume":"20","author":"Capasso P.","year":"2023","unstructured":"P. Capasso, G. Cattaneo, and M. De Marsico. 2023. A comprehensive survey on methods for image integrity. ACM Transactions on Multimedia Computing, Communications, and Applications 20, 11 (2023), 1\u201334.","journal-title":"ACM Transactions on Multimedia Computing, Communications, and Applications"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.07.036"},{"key":"e_1_3_1_4_2","first-page":"217","volume-title":"1st International Symposium on Cyber Worlds (2002)","author":"Chang C. C.","year":"2002","unstructured":"C. C. Chang, J. Y. Hsiao, and C. L. Chiang. 2002. An image copyright protection scheme based on torus automorphism. In 1st International Symposium on Cyber Worlds (2002). IEEE, 217\u2013224."},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2004.841083"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3259899"},{"key":"e_1_3_1_7_2","first-page":"219","volume-title":"International Conference on Electronic Design","author":"Edris K.","year":"2014","unstructured":"K. Edris, M. A. I. Fakhreldin, J. M. Zain, T. A. A. Kadir, and T. A. Abdul. 2014. Robust image zero-watermarking based on complex Zernike moment. In International Conference on Electronic Design, 219\u2013223."},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3279116"},{"key":"e_1_3_1_9_2","first-page":"1","volume-title":"Picture Coding Symposium","author":"H\u00e9riard-Dubreuil B.","year":"2019","unstructured":"B. H\u00e9riard-Dubreuil, I. Viola, and T. Ebrahimi. 2019. Light field compression using translation-assisted view estimation. In Picture Coding Symposium. IEEE, 1\u20135."},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.926994"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2014.2322933"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.3036727"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3304109.3306228"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2022.103437"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2934819"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2020.102804"},{"key":"e_1_3_1_17_2","first-page":"19","volume-title":"Asian Conference on Computer Vision","author":"Katrin H.","year":"2017","unstructured":"H. Katrin, J. Ole, K. Daniel, and G. Bastian. 2017. A dataset and evaluation methodology for depth estimation on 4D light fields (2017). In Asian Conference on Computer Vision, 19\u201334."},{"issue":"4","key":"e_1_3_1_18_2","doi-asserted-by":"crossref","first-page":"574","DOI":"10.1215\/ijm\/1256060993","article-title":"Asymmetric tent map expansions II. Purely periodic points","volume":"38","author":"Lagarias J. C.","year":"1994","unstructured":"J. C. Lagarias, H. A. Porta, and K. B. Stolarsky. 1994. Asymmetric tent map expansions II. Purely periodic points. Illinois Journal of Mathematics 38, 4 (1994), 574\u2013588.","journal-title":"Illinois Journal of Mathematics"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2022.3175023"},{"key":"e_1_3_1_20_2","first-page":"1","volume-title":"IEEE International Conference on Multimedia and Expo Workshops","author":"Liu D.","year":"2016","unstructured":"D. Liu, L. Wang, L. Li, Z. Xiong, F. Wu, and W. Zeng. 2016. Pseudo-sequence-based light field image compression. In IEEE International Conference on Multimedia and Expo Workshops, 1\u20134."},{"issue":"1","key":"e_1_3_1_21_2","first-page":"23","article-title":"360-degree VR video watermarking based on spherical wavelet transform","volume":"17","author":"Liu Y.","year":"2021","unstructured":"Y. Liu, J. Liu, A. Argyriou, S. Ma, L. Wang, and Z. Xu. 2021. 360-degree VR video watermarking based on spherical wavelet transform. ACM Transactions on Multimedia Computing, Communications, and Applications 17, 1 (2021), 23.","journal-title":"ACM Transactions on Multimedia Computing, Communications, and Applications"},{"issue":"11","key":"e_1_3_1_22_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3580502","article-title":"Robust copyright protection technique with high-embedding capacity for color images","volume":"20","author":"Mahto D. K.","year":"2023","unstructured":"D. K. Mahto, A. K. Singh, K. N. Singh, O. P. Singh, and A. K. Agrawal. 2023. Robust copyright protection technique with high-embedding capacity for color images. ACM Transactions on Multimedia Computing, Communications, and Applications 20, 11 (2023), 1\u201312.","journal-title":"ACM Transactions on Multimedia Computing, Communications, and Applications"},{"issue":"10","key":"e_1_3_1_23_2","doi-asserted-by":"crossref","first-page":"6713","DOI":"10.1109\/TPAMI.2024.3386985","article-title":"Representing noisy image without denoising","volume":"46","author":"Qi S.","year":"2023","unstructured":"S. Qi, Y. Zhang, C. Wang, T. Xiang, X. Cao, and Y. Xiang. 2023. Representing noisy image without denoising. IEEE Transactions on Pattern Analysis and Machine Intelligence 46, 10 (2024), 6713\u20136730.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"1","key":"e_1_3_1_24_2","first-page":"35","article-title":"A survey of orthogonal moments for image representation: theory, implementation and evaluation","volume":"55","author":"Qi S.","year":"2021","unstructured":"S. Qi, Y. Zhang, C. Wang, J. Zhou, and X. Cao. 2021. A survey of orthogonal moments for image representation: theory, implementation and evaluation. Computing Surveys 55, 1 (2021), 35.","journal-title":"Computing Surveys"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2023.3247069"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2414878"},{"issue":"2","key":"e_1_3_1_27_2","first-page":"214","article-title":"Concept and application of zero-watermark","volume":"31","author":"Sun T.","year":"2003","unstructured":"T. Sun, S. Wang, and Q. Wen. 2003. Concept and application of zero-watermark. Acta Electronica Sinica 31, 2 (2003), 214\u2013216.","journal-title":"Acta Electronica Sinica"},{"key":"e_1_3_1_28_2","first-page":"308","volume-title":"International Conference on Intelligent Computing and Signal Processing","author":"Sun Y.","year":"2021","unstructured":"Y. Sun, L. Tian, and C. Li. 2021. Robust zero-watermarking algorithm based on audio beats. In International Conference on Intelligent Computing and Signal Processing, 308\u2013312."},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3216849"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3588573"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3157867"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.5555\/3175165.3175188"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.08.028"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.10.004"},{"issue":"6","key":"e_1_3_1_35_2","first-page":"1","article-title":"APCAS: Autonomous privacy control and authentication sharing in social networks","volume":"10","author":"Wen W.","year":"2022","unstructured":"W. Wen, J. Fan, Y. Zhang, and Y. Fang. 2022. APCAS: Autonomous privacy control and authentication sharing in social networks. IEEE Transactions on Computational Social Systems 10, 6 (2022), 1\u201312.","journal-title":"IEEE Transactions on Computational Social Systems"},{"issue":"1","key":"e_1_3_1_36_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3612924","article-title":"Visual security index combining CNN and filter for perceptually encrypted light field images","volume":"20","author":"Wen W.","year":"2023","unstructured":"W. Wen, M. Huang, Y. Zhang, Y. Fang, and Y. Zuo. 2023. Visual security index combining CNN and filter for perceptually encrypted light field images. ACM Transactions on Multimedia Computing, Communications, and Applications 20, 1, (2023), 1\u201315.","journal-title":"ACM Transactions on Multimedia Computing, Communications, and Applications"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.11.011"},{"key":"e_1_3_1_38_2","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1109\/TMM.2021.3127398","article-title":"No-reference light field image quality assessment using four-dimensional sparse transform","author":"Xiang G.","year":"2023","unstructured":"G. Xiang, J. Jiang, M. Yu, Z. Jiang, and Y. S. Ho. 2023. No-reference light field image quality assessment using four-dimensional sparse transform. IEEE Transactions on Multimedia 25 (2023), 457\u2013472.","journal-title":"IEEE Transactions on Multimedia 25"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2015.04.007"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2021.3112338"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2019.115747"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107898"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2022.3154928"},{"key":"e_1_3_1_44_2","first-page":"2385","volume-title":"IEEE International Conference on Image Processing","author":"Zhang Z.","year":"2023","unstructured":"Z. Zhang, S. Tian, W. Zou, Y. Zhang, L. Morin, and L. Zhang. 2023. Blind quality assessment of light field image based on spatio-angular textural variation. In IEEE International Conference on Image Processing, 2385\u20132389."}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3717066","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3717066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:55Z","timestamp":1750295935000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3717066"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,7]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,4,30]]}},"alternative-id":["10.1145\/3717066"],"URL":"https:\/\/doi.org\/10.1145\/3717066","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,7]]},"assertion":[{"value":"2023-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-09","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-04-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}