{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T01:41:52Z","timestamp":1768441312943,"version":"3.49.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["EURASIP J. Adv. Signal Process."],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1155\/2010\/851920","type":"journal-article","created":{"date-parts":[[2010,4,8]],"date-time":"2010-04-08T11:30:10Z","timestamp":1270726210000},"source":"Crossref","is-referenced-by-count":26,"title":["Estimating Watermarking Capacity in Gray Scale Images Based on Image Complexity"],"prefix":"10.1186","volume":"2010","author":[{"given":"Farzin","family":"Yaghmaee","sequence":"first","affiliation":[]},{"given":"Mansour","family":"Jamzad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,4,8]]},"reference":[{"key":"2956_CR1","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1109\/ICIP.2000.899542","volume":"3","author":"P Moulin","year":"2000","unstructured":"Moulin P, Mihcak MK, Gen-Iu L: An information-theoretic model for image watermarking and data hiding. Proceedings of the IEEE International Conference on Image Processing, 2000 3: 667-670.","journal-title":"Proceedings of the IEEE International Conference on Image Processing"},{"issue":"7","key":"2956_CR2","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.1109\/5.771068","volume":"87","author":"J Cox","year":"1999","unstructured":"Cox J, Milller ML, McKellips A: Watermarking as communications with side information. Proceedings of the IEEE 1999, 87(7):1127-1141. 10.1109\/5.771068","journal-title":"Proceedings of the IEEE"},{"key":"2956_CR3","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1117\/12.344694","volume":"3657","author":"M Barni","year":"1999","unstructured":"Barni M, Bartolini F, De Rosa A, Piva A: Capacity of the watermark channel: how many bits can be hidden within a digital image? Security and Watermarking of Multimedia Contents, 1999, Proceedings of SPIE 3657: 437-448.","journal-title":"Security and Watermarking of Multimedia Contents"},{"key":"2956_CR4","doi-asserted-by":"crossref","unstructured":"Barni M, Bartolini F, De Rosa A, Piva A: Capacity of full frame DCT image watermarks. IEEE Transactions on Image Processing 2000., 9(8):","DOI":"10.1109\/83.855442"},{"key":"2956_CR5","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/10719724_16","volume":"1768","author":"S Voloshynovsky","year":"1999","unstructured":"Voloshynovsky S, Herrigel A, Baum N: A stochastic approach to content adaptive digital image watermarking. Proceedings of the 3rd International Workshop on Information Hiding, 1999, Lecture Notes in Computer Science 1768: 211-236.","journal-title":"Proceedings of the 3rd International Workshop on Information Hiding"},{"issue":"6","key":"2956_CR6","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1016\/S0165-1684(01)00042-1","volume":"81","author":"S Pereira","year":"2001","unstructured":"Pereira S, Voloshynoskiy S, Pun T: Optimal transform domain watermark embedding via linear programming. Signal Processing 2001, 81(6):1251-1260. 10.1016\/S0165-1684(01)00042-1","journal-title":"Signal Processing"},{"key":"2956_CR7","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1117\/12.570628","volume":"5637","author":"F Zhang","year":"2005","unstructured":"Zhang F, Zhang H: Wavelet domain watermarking capacity analysis. Electronic Imaging and Multimedia Technology IV, February 2005, Beijing, China, Proceedings of SPIE 5637: 657-664.","journal-title":"Electronic Imaging and Multimedia Technology IV"},{"key":"2956_CR8","volume-title":"Proceedings of the International Symposium on Neural Networks","author":"F Zhang","year":"2005","unstructured":"Zhang F, Zhang H: Watermarking capacity analysis based on neural network. Proceedings of the International Symposium on Neural Networks, 2005, Chongqing, China, Lecture Notes in Computer Science"},{"issue":"1","key":"2956_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.patrec.2006.04.020","volume":"28","author":"F Zhang","year":"2007","unstructured":"Zhang F, Zhang X, Zhang H: Digital image watermarking capacity and detection error rate. Pattern Recognition Letters 2007, 28(1):1-10. 10.1016\/j.patrec.2006.04.020","journal-title":"Pattern Recognition Letters"},{"key":"2956_CR10","volume-title":"Proceedings of the 5th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT '05)","author":"F Yaghmaee","year":"2005","unstructured":"Yaghmaee F, Jamzad M: Computing watermark capacity in images according to their quad tree. Proceedings of the 5th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT '05), December 2005, Athens, Greece"},{"key":"2956_CR11","volume-title":"Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing","author":"F Yaghmaee","year":"2008","unstructured":"Yaghmaee F, Jamzad M: Estimating data hiding capacity of gray scale images based on its bitplanes structure. Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, August 2008, Harbin, China"},{"issue":"11","key":"2956_CR12","doi-asserted-by":"publisher","first-page":"3820","DOI":"10.1109\/TIT.2005.856935","volume":"51","author":"U Erez","year":"2005","unstructured":"Erez U, Shamai S, Zamir R: Capacity and lattice strategies for canceling known interference. IEEE Transactions on Information Theory 2005, 51(11):3820-3833. 10.1109\/TIT.2005.856935","journal-title":"IEEE Transactions on Information Theory"},{"key":"2956_CR13","doi-asserted-by":"publisher","DOI":"10.1117\/12.644908","volume-title":"Security, Steganography, and Watermarking of Multimedia Contents VIII","author":"Y Yang","year":"2006","unstructured":"Yang Y, Sun Y, Stankovi V, Xiong Z: Image data hiding based on capacity-approaching dirty-paper coding. Security, Steganography, and Watermarking of Multimedia Contents VIII, January 2006, San Jose, Calif, USA, Proceedings of SPIE 6072:"},{"key":"2956_CR14","first-page":"1","volume-title":"Proceedings of the Automatic Target Recognizer System and Technology Conference","author":"RA Peters","year":"1990","unstructured":"Peters RA, Strickland RN: Image complexity metrics for automatic target recognizers. Proceedings of the Automatic Target Recognizer System and Technology Conference, October 1990 1-17."},{"key":"2956_CR15","volume-title":"Proceedings of the Eurographics Workshop on Computational Aesthetics in Graphics, Visualization and Imaging","author":"J Rigau","year":"2005","unstructured":"Rigau J, Feixas M, Sbert M: An information-theoretic framework for image complexity. Proceedings of the Eurographics Workshop on Computational Aesthetics in Graphics, Visualization and Imaging, 2005"},{"key":"2956_CR16","first-page":"241","volume-title":"Proceedings of the Annual Meeting of the North American Fuzzy Information Processing Society (NAFIPS '05)","author":"M Mario","year":"2005","unstructured":"Mario M, Chacon D, Corral S: Image complexity measure: a human criterion free approach. Proceedings of the Annual Meeting of the North American Fuzzy Information Processing Society (NAFIPS '05), June 2005 241-246."},{"issue":"1","key":"2956_CR17","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.ins.2007.08.007","volume":"178","author":"Q Liu","year":"2008","unstructured":"Liu Q, Sung AH: Image complexity and feature mining for steganalysis of least significant bit matching steganography. Information Sciences 2008, 178(1):21-36. 10.1016\/j.ins.2007.08.007","journal-title":"Information Sciences"},{"issue":"10","key":"2956_CR18","doi-asserted-by":"publisher","first-page":"1474","DOI":"10.1016\/j.fss.2008.11.017","volume":"160","author":"M Cardaci","year":"2009","unstructured":"Cardaci M, Di Ges\u00f9 V, Petrou M, Tabacchi ME: A fuzzy approach to the evaluation of image complexity. Fuzzy Sets and Systems 2009, 160(10):1474-1484. 10.1016\/j.fss.2008.11.017","journal-title":"Fuzzy Sets and Systems"},{"issue":"4","key":"2956_CR19","first-page":"404","volume":"13","author":"M Jamzad","year":"2006","unstructured":"Jamzad M, Yaghmaee F: Achieving higher stability in watermarking according to image complexity. Scientia Iranica Journal 2006, 13(4):404-412.","journal-title":"Scientia Iranica Journal"},{"key":"2956_CR20","volume-title":"Proceedings of the 3rd International Workshop in Signal and Image Processing (IWSIP '96)","author":"S Morgan","year":"1996","unstructured":"Morgan S, Bouridane A: Application of shape recognition to fractal based image compression. In Proceedings of the 3rd International Workshop in Signal and Image Processing (IWSIP '96), January 1996, Manchester, UK. Elsevier Science;"},{"issue":"1","key":"2956_CR21","first-page":"83","volume":"24","author":"A Conci","year":"2005","unstructured":"Conci A, Aquino FR: Fractal coding based on image local fractal dimension. Computational and Applied Mathematics Journal 2005, 24(1):83-98.","journal-title":"Computational and Applied Mathematics Journal"},{"key":"2956_CR22","first-page":"207","volume-title":"Handbook of Pattern Recognition and Computer Vision","author":"CH Chen","year":"1998","unstructured":"Chen CH, Pau LF: Texture analysis. Handbook of Pattern Recognition and Computer Vision 1998, 207-248."},{"key":"2956_CR23","volume-title":"Proceeding of the 14th IEEE Conference on Pattern Recognition","author":"W Osberger","year":"1998","unstructured":"Osberger W, Maeder A: Automatic identification of perceptually important regions in image. Proceeding of the 14th IEEE Conference on Pattern Recognition, 1998"},{"key":"2956_CR24","volume-title":"Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing","author":"F Yaghmaee","year":"2008","unstructured":"Yaghmaee F, Jamzad M: Estimating data hiding capacity of gray scale images based image complexity. Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, August 2008, Harbin, China"},{"key":"2956_CR25","volume-title":"Eye movement while viewing NTSC format television","author":"G Elias","year":"1984","unstructured":"Elias G, Shervin G, Wise J: Eye movement while viewing NTSC format television. SMPTE Psychophysics Subcommittee white paper, March 1984"},{"key":"2956_CR26","doi-asserted-by":"crossref","DOI":"10.21236\/ADA083283","volume-title":"Textured image segmentation, Ph.D. dissertation","author":"K Laws","year":"1980","unstructured":"Laws K: Textured image segmentation, Ph.D. dissertation. University of Southern California; January 1980."},{"issue":"6","key":"2956_CR27","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1109\/TSMC.1978.4309999","volume":"8","author":"H Tamura","year":"1978","unstructured":"Tamura H, Mori S, Yamawaki T: Texture features corresponding to visual perception. IEEE Transactions on Systems, Man, and Cybernetics 1978, 8(6):460-473.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"2956_CR28","first-page":"153","volume-title":"Proceedings of the 8th IEEE International Symposium on Multimedia","author":"S Mohanty","year":"2006","unstructured":"Mohanty S, Guturu P, Kougianos E, Pati N: A novel invisible color image watermarking scheme using image adaptive watermark creation and robust insertion-extraction. Proceedings of the 8th IEEE International Symposium on Multimedia, 2006 153-160."},{"issue":"2","key":"2956_CR29","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1117\/1.482648","volume":"7","author":"M Kutter","year":"1998","unstructured":"Kutter M, Jordan F, Bossen F: Digital watermarking of color images using amplitude modulation. Journal of Electronic Imaging 1998, 7(2):326-332. 10.1117\/1.482648","journal-title":"Journal of Electronic Imaging"},{"issue":"12","key":"2956_CR30","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"J Cox","year":"1997","unstructured":"Cox J, Kilian J, Leighton T, Shamoon T: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 1997, 6(12):1673-1687. 10.1109\/83.650120","journal-title":"IEEE Transactions on Image Processing"},{"key":"2956_CR31","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1109\/ICIP.1997.647970","volume":"1","author":"D Kundur","year":"1997","unstructured":"Kundur D, Hatzinakos D: A robust digital image watermarking method using wavelet-based fusion. Proceedings of the IEEE International Conference on Image Processing, October 1997, Santa Barbara, Calif, USA 1: 544-547.","journal-title":"Proceedings of the IEEE International Conference on Image Processing"},{"key":"2956_CR32","doi-asserted-by":"crossref","unstructured":"Wang Z, Bovik A, Sheikh H: Image quality assessment: from error visibility to structural similarity. IEEE Transaction on Image Processing 2004., 13(4):","DOI":"10.1109\/TIP.2003.819861"},{"key":"2956_CR33","first-page":"381","volume":"1913","author":"A Watson","year":"1993","unstructured":"Watson A: DCT quantization matrices visually optimized for individual images. Human Vision, Visual Processing, and Digital Display IV, February 1993, San Jose, Calif, USA, Proceedings of SPIE 1913: 381-392.","journal-title":"Human Vision, Visual Processing, and Digital Display IV"},{"key":"2956_CR34","doi-asserted-by":"crossref","unstructured":"Sheikh HR, Sabir M, Bovik AC: A statistical evaluation of recent full reference image quality assessment algorithms. IEEE Transaction on Image Processing 2006., 15(11):","DOI":"10.1109\/TIP.2006.881959"}],"container-title":["EURASIP Journal on Advances in Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1155\/2010\/851920.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T03:38:53Z","timestamp":1511840333000},"score":1,"resource":{"primary":{"URL":"https:\/\/asp-eurasipjournals.springeropen.com\/articles\/10.1155\/2010\/851920"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4,8]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,12]]}},"alternative-id":["2956"],"URL":"https:\/\/doi.org\/10.1155\/2010\/851920","relation":{},"ISSN":["1687-6180"],"issn-type":[{"value":"1687-6180","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,4,8]]},"article-number":"851920"}}