{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T11:10:26Z","timestamp":1774264226693,"version":"3.50.1"},"reference-count":82,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,8,29]],"date-time":"2014-08-29T00:00:00Z","timestamp":1409270400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. Adv. Signal Process."],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1186\/1687-6180-2014-135","type":"journal-article","created":{"date-parts":[[2014,8,29]],"date-time":"2014-08-29T03:01:22Z","timestamp":1409281282000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":54,"title":["Digital image watermarking: its formal model, fundamental properties and possible attacks"],"prefix":"10.1186","volume":"2014","author":[{"given":"Hussain","family":"Nyeem","sequence":"first","affiliation":[]},{"given":"Wageeh","family":"Boles","sequence":"additional","affiliation":[]},{"given":"Colin","family":"Boyd","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,29]]},"reference":[{"key":"698_CR1","first-page":"23","volume-title":"Proceedings of MCPS","author":"Q Li","year":"2007","unstructured":"Li Q, Memon N, Sencar HT: Security issues in watermarking applications - a deeper look. In Proceedings of MCPS. ACM,, New York; 2007:23-28."},{"key":"698_CR2","first-page":"468","volume-title":"Proceedings of DICTA","author":"H Nyeem","year":"2011","unstructured":"Nyeem H, Boles W, Boyd C: Developing a digital image watermarking model. In Proceedings of DICTA. IEEE,, Piscataway; 2011:468-473."},{"key":"698_CR3","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/2523514.2523530","volume-title":"Proceedings of the 6th International Conference on Security of Information and Networks","author":"H Nyeem","year":"2013","unstructured":"Nyeem H, Boles W, Boyd C: Counterfeiting attacks on block-wise dependent fragile watermarking schemes. In Proceedings of the 6th International Conference on Security of Information and Networks. ACM,, New York; 2013:86-93."},{"key":"698_CR4","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"FAP Petitcolas","year":"1999","unstructured":"Petitcolas FAP, Anderson RJ, Kuhn MG: Information hiding - a survey. Proc. IEEE 1999, 87: 1062-1078. 10.1109\/5.771065","journal-title":"Proc. IEEE"},{"issue":"4","key":"698_CR5","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1016\/S0097-8493(98)00029-6","volume":"22","author":"Z Jian","year":"1998","unstructured":"Jian Z, Koch E: A generic digital watermarking model. Comput. Graph 1998, 22(4):397-403. 10.1016\/S0097-8493(98)00029-6","journal-title":"Comput. Graph"},{"key":"698_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/10719724_1","volume-title":"Proceedings of Information Hiding","author":"T Mittelholzer","year":"2000","unstructured":"Mittelholzer T: An information-theoretic approach to steganography and watermarking. In Proceedings of Information Hiding. Springer,, Heidelberg; 2000:1-16."},{"key":"698_CR7","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-74124-4_10","volume-title":"Proceedings of Information Hiding. LNCS","author":"A Adelsbach","year":"2007","unstructured":"Adelsbach A, Katzenbeisser S, Sadeghi A-R: A computational model for watermark robustness. In Proceedings of Information Hiding. LNCS. Springer, Heidelberg,; 2007:145-160."},{"key":"698_CR8","volume-title":"Proceedings of the International Symposium on Information Theory","author":"JA O\u2019Sullivan","year":"1998","unstructured":"O\u2019Sullivan JA, Moulin P, Ettinger JM: Information theoretic analysis of steganography. In Proceedings of the International Symposium on Information Theory. IEEE,, Piscataway; 1998."},{"issue":"6","key":"698_CR9","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1109\/TIT.2002.1003844","volume":"48","author":"AS Cohen","year":"2002","unstructured":"Cohen AS, Lapidoth A: The Gaussian watermarking game. IEEE Trans. Inform. Theor 2002, 48(6):1639-1667. 10.1109\/TIT.2002.1003844","journal-title":"IEEE Trans. Inform. Theor"},{"issue":"1","key":"698_CR10","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.ic.2004.02.003","volume":"192","author":"C Cachin","year":"2004","unstructured":"Cachin C: An information-theoretic model for steganography. Inform. Comput 2004, 192(1):41-56. 10.1016\/j.ic.2004.02.003","journal-title":"Inform. Comput"},{"key":"698_CR11","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.1109\/5.771068","volume":"87","author":"IJ Cox","year":"1999","unstructured":"Cox IJ, Miller ML, McKellips AL: Watermarking as communications with side information. Proc. IEEE 1999, 87: 1127-1141. 10.1109\/5.771068","journal-title":"Proc. IEEE"},{"key":"698_CR12","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1145\/947380.947395","volume-title":"Proceedings of Workshop on Digital Rights Management","author":"A Adelsbach","year":"2003","unstructured":"Adelsbach A, Katzenbeisser S, Veith H: Watermarking schemes provably secure against copy and ambiguity attacks. In Proceedings of Workshop on Digital Rights Management. ACM,, New York; 2003:111-119."},{"issue":"10","key":"698_CR13","doi-asserted-by":"publisher","first-page":"2069","DOI":"10.1016\/S0165-1684(03)00168-3","volume":"83","author":"M Barni","year":"2003","unstructured":"Barni M, Bartolini F, Furon T: A general framework for robust watermarking security. Signal Process 2003, 83(10):2069-2084. 10.1016\/S0165-1684(03)00168-3","journal-title":"Signal Process"},{"key":"698_CR14","first-page":"667","volume-title":"Proceedings of ICIP","author":"P Moulin","year":"2000","unstructured":"Moulin P, Mihcak MK, Lin G-I: An information-theoretic model for image watermarking and data hiding. In Proceedings of ICIP. IEEE,, Piscataway; 2000:667-670."},{"issue":"3","key":"698_CR15","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/TIT.2002.808134","volume":"49","author":"P Moulin","year":"2003","unstructured":"Moulin P, O\u2019Sullivan JA: Information-theoretic analysis of information hiding. IEEE Trans. Inform. Theor 2003, 49(3):563-593. 10.1109\/TIT.2002.808134","journal-title":"IEEE Trans. Inform. Theor"},{"key":"698_CR16","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1109\/83.826780","volume":"9","author":"M Holliman","year":"2000","unstructured":"Holliman M, Memon N: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Process 2000, 9: 432-441. 10.1109\/83.826780","journal-title":"IEEE Trans. Image Process"},{"key":"698_CR17","first-page":"1","volume-title":"Proceedings of DICTA","author":"H Nyeem","year":"2013","unstructured":"Nyeem H, Boles W, Boyd C: Utilizing least significant bit-planes of RONI pixels for medical image watermarking. In Proceedings of DICTA. IEEE,, Piscataway; 2013:1-8."},{"key":"698_CR18","first-page":"57","volume-title":"Proceedings of Vision, Image and Signal Processing","author":"PSLM Barreto","year":"2002","unstructured":"Barreto PSLM, Kim HY, Rijmen V: Toward secure public-key blockwise fragile authentication watermarking. In Proceedings of Vision, Image and Signal Processing. IEEE,, Piscataway; 2002:57-62."},{"key":"698_CR19","first-page":"937","volume-title":"Proceedings of ICCSA","author":"HK Dai","year":"2007","unstructured":"Dai HK, Yeh CT: Content-based image watermarking via public-key cryptosystems. In Proceedings of ICCSA. Springer,, Heidelberg; 2007:937-950."},{"key":"698_CR20","first-page":"143","volume-title":"Proceedings of IH","author":"J Fridrich","year":"1998","unstructured":"Fridrich J, Baldoza AC, Simard RJ: Robust digital watermarking based on key-dependent basis functions. In Proceedings of IH. Springer,, Heidelberg; 1998:143-57."},{"key":"698_CR21","doi-asserted-by":"publisher","first-page":"1593","DOI":"10.1109\/83.951543","volume":"10","author":"PW Wong","year":"2001","unstructured":"Wong PW, Memon N: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process 2001, 10: 1593-1601. 10.1109\/83.951543","journal-title":"IEEE Trans. Image Process"},{"key":"698_CR22","first-page":"1","volume-title":"Proceedings of WiCOM","author":"D Yu-Wen","year":"2008","unstructured":"Yu-Wen D, Zi L, Li W: A multipurpose public-key cryptosystem based image watermarking. In Proceedings of WiCOM. IEEE,, Piscataway; 2008:1-4."},{"key":"698_CR23","first-page":"214","volume-title":"Proceedings of SPIE","author":"J Fridrich","year":"1999","unstructured":"Fridrich J, Goljan M: Comparing robustness of watermarking techniques. In Proceedings of SPIE. SPIE,, Bellingham; 1999:214-225."},{"key":"698_CR24","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1016\/B978-0-12-374457-9.00022-6","volume-title":"The Essential Guide to Image Processing (Second Edition)","author":"A Tefas","year":"2009","unstructured":"Tefas A, Nikolaidis N, Pitas I: Image watermarking: techniques and applications. In The Essential Guide to Image Processing (Second Edition). Edited by: Al B. Academic Press,, Boston; 2009:597-648."},{"issue":"4","key":"698_CR25","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B Chen","year":"2001","unstructured":"Chen B, Wornell GW: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inform. Theor 2001, 47(4):1423-1443. 10.1109\/18.923725","journal-title":"IEEE Trans. Inform. Theor"},{"issue":"5","key":"698_CR26","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1109\/83.918570","volume":"10","author":"M Barni","year":"2001","unstructured":"Barni M, Bartolini F, Piva A: Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans. Image Process 2001, 10(5):783-791. 10.1109\/83.918570","journal-title":"IEEE Trans. Image Process"},{"issue":"5","key":"698_CR27","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/83.918569","volume":"10","author":"C-Y Lin","year":"2001","unstructured":"Lin C-Y, Wu M, Bloom JA, Cox IJ, Miller ML, Lui YM: Rotation, scale, and translation resilient watermarking for images. IEEE Trans. Image Process 2001, 10(5):767-782. 10.1109\/83.918569","journal-title":"IEEE Trans. Image Process"},{"issue":"9","key":"698_CR28","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.1109\/TIP.2002.801587","volume":"11","author":"J-M P Chassery","year":"2002","unstructured":"P Chassery J-M, Macq B, Bas: Geometrically invariant watermarking using feature points. IEEE Trans. Image Process 2002, 11(9):1014-1028. 10.1109\/TIP.2002.801587","journal-title":"IEEE Trans. Image Process"},{"issue":"1","key":"698_CR29","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/TIFS.2009.2035975","volume":"5","author":"L Luo","year":"2010","unstructured":"Luo L, Chen Z, Chen M, Zeng X, Xiong Z: Reversible image watermarking using interpolation technique. IEEE Trans. Inform. Forensics Secur 2010, 5(1):187-193.","journal-title":"IEEE Trans. Inform. Forensics Secur"},{"issue":"12","key":"698_CR30","doi-asserted-by":"publisher","first-page":"3582","DOI":"10.1016\/j.patcog.2008.05.015","volume":"41","author":"C-C Lin","year":"2008","unstructured":"Lin C-C, Tai W-L, Chang C-C: Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn 2008, 41(12):3582-3591. 10.1016\/j.patcog.2008.05.015","journal-title":"Pattern Recogn"},{"issue":"8","key":"698_CR31","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1016\/j.sigpro.2009.02.005","volume":"89","author":"C Deng","year":"2009","unstructured":"Deng C, Gao X, Li X, Tao D: A local Tchebichef moments-based robust image watermarking. Signal Process 2009, 89(8):1531-1539. 10.1016\/j.sigpro.2009.02.005","journal-title":"Signal Process"},{"issue":"Compendex","key":"698_CR32","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s10278-007-9043-6","volume":"22","author":"X Guo","year":"2009","unstructured":"Guo X, Zhuang T-G: A region-based lossless watermarking scheme for enhancing security of medical data. J. Digit. Imag 2009, 22(Compendex):53-64.","journal-title":"J. Digit. Imag"},{"issue":"3","key":"698_CR33","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/S0165-1684(98)00017-6","volume":"66","author":"N Nikolaidis","year":"1998","unstructured":"Nikolaidis N, Pitas I: Robust image watermarking in the spatial domain. Signal Process 1998, 66(3):385-403. 10.1016\/S0165-1684(98)00017-6","journal-title":"Signal Process"},{"key":"698_CR34","first-page":"4740","volume-title":"Proceedings of EMBC","author":"W Pan","year":"2010","unstructured":"Pan W, Coatrieux G, Cuppens N, Cuppens F, Roux C: An additive and lossless watermarking method based on invariant image approximation and haar wavelet transform. In Proceedings of EMBC. IEEE,, Piscataway; 2010:4740-4743."},{"issue":"6","key":"698_CR35","doi-asserted-by":"publisher","first-page":"1264","DOI":"10.1016\/j.sigpro.2006.11.002","volume":"87","author":"X Qi","year":"2007","unstructured":"Qi X, Qi J: A robust content-based digital image watermarking scheme. Signal Process 2007, 87(6):1264-1280. 10.1016\/j.sigpro.2006.11.002","journal-title":"Signal Process"},{"key":"698_CR36","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1049\/ic:20000218","volume-title":"Proceedings of the Seminar on Secure Images and Image Authentication","author":"C Rey","year":"2000","unstructured":"Rey C, Dugelay J-L: Blind detection of malicious alterations on still images using robust watermarks. In Proceedings of the Seminar on Secure Images and Image Authentication. IET,, Hertsfordshire; 2000:7-11."},{"issue":"3","key":"698_CR37","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.ins.2005.01.013","volume":"175","author":"FY Shih","year":"2005","unstructured":"Shih FY, Wu Y-T: Robust watermarking and compression for medical images based on genetic algorithms. Inform. Sci 2005, 175(3):200-216. 10.1016\/j.ins.2005.01.013","journal-title":"Inform. Sci"},{"issue":"6","key":"698_CR38","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","volume":"89","author":"P Tsai","year":"2009","unstructured":"Tsai P, Hu Y-C, Yeh H-L: Reversible image hiding scheme using predictive coding and histogram shifting. Signal Process 2009, 89(6):1129-1143. 10.1016\/j.sigpro.2008.12.017","journal-title":"Signal Process"},{"issue":"3","key":"698_CR39","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1109\/TIFS.2007.905146","volume":"2","author":"S Lee","year":"2007","unstructured":"Lee S, Yoo CD, Kalker T: Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans. Inform. Forensics Secur 2007, 2(3):321-330.","journal-title":"IEEE Trans. Inform. Forensics Secur"},{"issue":"2","key":"698_CR40","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.ins.2010.09.022","volume":"181","author":"H Luo","year":"2011","unstructured":"Luo H, Yu F-X, Chen H, Huang Z-L, Li H, Wang P-H: Reversible data hiding based on block median preservation. Inform. Sci 2011, 181(2):308-328. 10.1016\/j.ins.2010.09.022","journal-title":"Inform. Sci"},{"issue":"2","key":"698_CR41","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/s10278-012-9527-x","volume":"26","author":"H Nyeem","year":"2013","unstructured":"Nyeem H, Boles W, Boyd C: A review of medical image watermarking requirements for teleradiology. J. Digit. Imag 2013, 26(2):326-343. doi:10.1007\/s10278-012-9527-x 10.1007\/s10278-012-9527-x","journal-title":"J. Digit. Imag"},{"key":"698_CR42","volume-title":"Digital Watermarking and, Steganography","author":"I Cox","year":"2007","unstructured":"Cox I, Miller M, Bloom J, Fridrich J, Kalker T: Digital Watermarking and, Steganography. Elsevier, Burlington; 2007."},{"key":"698_CR43","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1155\/S1110865702000537","volume":"2002","author":"J Fridrich","year":"2002","unstructured":"Fridrich J, Goljan M, Du R: Lossless data embedding-new paradigm in digital watermarking. EURASIP J. Appl. Signal Process 2002, 2002: 185-196. 10.1155\/S1110865702000537","journal-title":"EURASIP J. Appl. Signal Process"},{"issue":"1","key":"698_CR44","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TMM.2003.809729","volume":"5","author":"C De Vleeschouwer","year":"2003","unstructured":"De Vleeschouwer C, Delaigle J-F, Macq B: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans. Multimedia 2003, 5(1):97-105. 10.1109\/TMM.2003.809729","journal-title":"IEEE Trans. Multimedia"},{"issue":"2","key":"698_CR45","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"MU Celik","year":"2005","unstructured":"Celik MU, Sharma G, Tekalp AM, Saber E: Lossless generalized-LSB data embedding. IEEE Trans. Image Process 2005, 14(2):253-266.","journal-title":"IEEE Trans. Image Process"},{"issue":"8","key":"698_CR46","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J: Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Video Tech 2003, 13(8):890-896. 10.1109\/TCSVT.2003.815962","journal-title":"IEEE Trans. Circ. Syst. Video Tech"},{"issue":"3","key":"698_CR47","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi Y-Q, Ansari N, Su W: Reversible data hiding. IEEE Trans. Circ. Syst. Video Tech 2006, 16(3):354-362.","journal-title":"IEEE Trans. Circ. Syst. Video Tech"},{"issue":"8","key":"698_CR48","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"AM Alattar","year":"2004","unstructured":"Alattar AM: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process 2004, 13(8):1147-1156. 10.1109\/TIP.2004.828418","journal-title":"IEEE Trans. Image Process"},{"issue":"12","key":"698_CR49","doi-asserted-by":"publisher","first-page":"2082","DOI":"10.1109\/TIP.2005.859373","volume":"14","author":"L Kamstra","year":"2005","unstructured":"Kamstra L, Heijmans HJ: Reversible data embedding into images using wavelet techniques and sorting. IEEE Trans. Image Process 2005, 14(12):2082-2090.","journal-title":"IEEE Trans. Image Process"},{"key":"698_CR50","first-page":"223","volume-title":"Proceedings of WIFS","author":"I Caciula","year":"2012","unstructured":"Caciula I, Coltuc D: Capacity control of reversible watermarking by two-thresholds embedding. In Proceedings of WIFS. IEEE,, Piscataway; 2012:223-227."},{"issue":"3","key":"698_CR51","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1109\/TIFS.2008.924600","volume":"3","author":"HJ Kim","year":"2008","unstructured":"Kim HJ, Sachnev V, Shi YQ, Nam J, Choo H-G: A novel difference expansion transform for reversible data embedding. IEEE Trans. Informa. Forensics Secur 2008, 3(3):456-465.","journal-title":"IEEE Trans. Informa. Forensics Secur"},{"issue":"2","key":"698_CR52","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1109\/TCSVT.2008.2009252","volume":"19","author":"Y Hu","year":"2009","unstructured":"Hu Y, Lee H-K, Li J: DE-based reversible data hiding with improved overflow location map. IEEE Trans. Circ. Syst. Video Tech 2009, 19(2):250-260.","journal-title":"IEEE Trans. Circ. Syst. Video Tech"},{"issue":"11","key":"698_CR53","doi-asserted-by":"publisher","first-page":"3083","DOI":"10.1016\/j.patcog.2009.04.004","volume":"42","author":"K-S Kim","year":"2009","unstructured":"Kim K-S, Lee M-J, Lee H-Y, Lee H-K: Reversible data hiding exploiting spatial correlation between sub-sampled images. Pattern Recognit 2009, 42(11):3083-3096. 10.1016\/j.patcog.2009.04.004","journal-title":"Pattern Recognit"},{"key":"698_CR54","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V Sachnev","year":"2009","unstructured":"Sachnev V, Kim HJ, Nam J, Suresh S, Shi YQ: Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circ. Syst. Video Tech 2009, 19: 989-999.","journal-title":"IEEE Trans. Circ. Syst. Video Tech"},{"issue":"3","key":"698_CR55","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"DM Thodi","year":"2007","unstructured":"Thodi DM, Rodr\u00edguez JJ: Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process 2007, 16(3):721-730.","journal-title":"IEEE Trans. Image Process"},{"issue":"12","key":"698_CR56","doi-asserted-by":"publisher","first-page":"3524","DOI":"10.1109\/TIP.2011.2150233","volume":"20","author":"X Li","year":"2011","unstructured":"Li X, Yang B, Zeng T: Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection. IEEE Trans. Image Process 2011, 20(12):3524-3533.","journal-title":"IEEE Trans. Image Process"},{"key":"698_CR57","doi-asserted-by":"crossref","unstructured":"Coltuc D, Bolon P, Chassery JM: Fragile and robust watermarking by histogram specification. Proceedings of SPIE: Security and Watermarking of Multimedia Contents IV 701-710.","DOI":"10.1117\/12.465331"},{"issue":"10","key":"698_CR58","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1016\/j.aeue.2011.01.014","volume":"65","author":"Z Zhao","year":"2011","unstructured":"Zhao Z, Luo H, Lu Z-M, Pan J-S: Reversible data hiding based on multilevel histogram modification and sequential recovery. AEU-Int J. Electron. Commun 2011, 65(10):814-826. 10.1016\/j.aeue.2011.01.014","journal-title":"AEU-Int J. Electron. Commun"},{"key":"698_CR59","first-page":"5653","volume-title":"Proceedings of EMBC","author":"G Coatrieux","year":"2007","unstructured":"Coatrieux G, Montagner J, Huang H, Roux C: Mixed reversible and RONI watermarking for medical image reliability protection. In Proceedings of EMBC. IEEE,, Piscataway; 2007:5653-5656."},{"issue":"2","key":"698_CR60","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/TITB.2008.2007199","volume":"13","author":"G Coatrieux","year":"2009","unstructured":"Coatrieux G, Le Guillou C, Cauvin JM, Roux C: Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans. Inform. Tech. Biomed 2009, 13(2):158-165.","journal-title":"IEEE Trans. Inform. Tech. Biomed"},{"key":"698_CR61","first-page":"1136","volume-title":"Proceedings of ICIEV","author":"H Nyeem","year":"2012","unstructured":"Nyeem H, Boles W, Boyd C: On the robustness and security of digital image watermarking. In Proceedings of ICIEV. IEEE,, Piscataway; 2012:1136-1141."},{"key":"698_CR62","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-01757-5_1","volume":"5510","author":"A Piper","year":"2009","unstructured":"Piper A, Safavi-Naini R: How to compare image watermarking algorithms. Trans. Data Hiding Multimedia Secur 2009, 5510: 1-28. Springer","journal-title":"Trans. Data Hiding Multimedia Secur"},{"key":"698_CR63","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-374457-9.00022-6","volume-title":"Image Watermarking: Techniques and, Applications (Chapter 22)","author":"A Tefas","year":"2009","unstructured":"Tefas A, Nikolaidis N, Pitas I: Image Watermarking: Techniques and, Applications (Chapter 22). Academic Press, Boston; 2009."},{"key":"698_CR64","first-page":"2278","volume-title":"Proceedings of ICSP\u201904","author":"F Zhang","year":"2004","unstructured":"Zhang F, Zhang H: Digital watermarking capacity analysis in wavelet domain. In Proceedings of ICSP\u201904. IEEE,, Piscataway; 2004:2278-2281."},{"key":"698_CR65","unstructured":"Yu N, Cao L, Fang W, Li X: Practical analysis of watermarking capacity. Proceedings of the International Conference on Communication Technology 1872-1877."},{"issue":"8","key":"698_CR66","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TCSVT.2003.815949","volume":"13","author":"PHW Wong","year":"2003","unstructured":"Wong PHW, Au OC: A capacity estimation technique for JPEG-to-JPEG image watermarking. IEEE Trans. Circ. Syst. Video Tech 2003, 13(8):746-752. 10.1109\/TCSVT.2003.815949","journal-title":"IEEE Trans. Circ. Syst. Video Tech"},{"issue":"8","key":"698_CR67","doi-asserted-by":"publisher","first-page":"1450","DOI":"10.1109\/83.855442","volume":"9","author":"M Barni","year":"2000","unstructured":"Barni M, Bartolini F, De Rosa A, Piva A: Capacity of full frame DCT image watermarks. IEEE Trans. Image Process 2000, 9(8):1450-1455. 10.1109\/83.855442","journal-title":"IEEE Trans. Image Process"},{"issue":"9","key":"698_CR68","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1109\/TIP.2002.802512","volume":"11","author":"P Moulin","year":"2002","unstructured":"Moulin P, Mihcak MK: A framework for evaluating the data-hiding capacity of image sources. IEEE Trans. Image Process 2002, 11(9):1029-1042. 10.1109\/TIP.2002.802512","journal-title":"IEEE Trans. Image Process"},{"key":"698_CR69","doi-asserted-by":"publisher","first-page":"1775","DOI":"10.1109\/TIT.2009.2012991","volume":"55","author":"JJ Harmsen","year":"2009","unstructured":"Harmsen JJ, Pearlman WA: Capacity of steganographic channels. IEEE Trans. Inform. Theory 2009, 55: 1775-1792.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"698_CR70","first-page":"71","volume-title":"Proceedings of the International Conference on Digital Signal Processing, vol. 1","author":"T Kalker","year":"2002","unstructured":"Kalker T, Willems FM: Capacity bounds and constructions for reversible data-hiding. In Proceedings of the International Conference on Digital Signal Processing, vol. 1. IEEE,, Piscataway; 2002:71-76."},{"issue":"10","key":"698_CR71","doi-asserted-by":"publisher","first-page":"3976","DOI":"10.1109\/TSP.2005.855418","volume":"53","author":"F Cayre","year":"2005","unstructured":"Cayre F, Fontaine C, Furon T: Watermarking security: theory and practice. IEEE Trans. Signal Process 2005, 53(10):3976-3987.","journal-title":"IEEE Trans. Signal Process"},{"key":"698_CR72","first-page":"201","volume-title":"Proceedings of Multimedia Signal Processing Workshop","author":"T Kalker","year":"2001","unstructured":"Kalker T: Considerations on watermarking security. In Proceedings of Multimedia Signal Processing Workshop. IEEE,, Piscataway; 2001:201-206."},{"issue":"6","key":"698_CR73","doi-asserted-by":"publisher","first-page":"1177","DOI":"10.1016\/S0165-1684(01)00039-1","volume":"81","author":"S Voloshynovskiy","year":"2001","unstructured":"Voloshynovskiy S, Pereira S, Iquise V, Pun T: Attack modelling: towards a second generation watermarking benchmark. Signal Process 2001, 81(6):1177-1214. 10.1016\/S0165-1684(01)00039-1","journal-title":"Signal Process"},{"key":"698_CR74","first-page":"691","volume-title":"Proceedings of SPIE- Security and Watermarking of Multimedia Contents, vol. 4675","author":"J Fridrich","year":"2002","unstructured":"Fridrich J: Security of fragile authentication watermarks with localization. In Proceedings of SPIE- Security and Watermarking of Multimedia Contents, vol. 4675. SPIE; 2002:691-700."},{"key":"698_CR75","first-page":"117","volume-title":"Proceedings of ICIP","author":"S Braci","year":"2009","unstructured":"Braci S, Boyer R, Delpha C: Security evaluation of informed watermarking schemes. In Proceedings of ICIP. IEEE; 2009:117-120."},{"key":"698_CR76","first-page":"172","volume-title":"Proceedings of Int. Symposium on Optical Science and Technology","author":"SA Craver","year":"2001","unstructured":"Craver SA, Katzenbeisser S: Security analysis of public key watermarking schemes. In Proceedings of Int. Symposium on Optical Science and Technology. SPIE,, Bellingham; 2001:172-182."},{"key":"698_CR77","first-page":"483","volume-title":"Proceedings of MINES, vol. 1","author":"J Wang","year":"2009","unstructured":"Wang J, Liu G, Lian S: Security analysis of content-based watermarking authentication framework. In Proceedings of MINES, vol. 1. IEEE,, Piscataway; 2009:483-487."},{"issue":"1","key":"698_CR78","doi-asserted-by":"publisher","first-page":"013007","DOI":"10.1117\/1.3327935","volume":"19","author":"K Loukhaoukha","year":"2010","unstructured":"Loukhaoukha K, Chouinard JY: Security of ownership watermarking of digital images based on singular value decomposition. J. Electron. Imag 2010, 19(1):013007-013007. 10.1117\/1.3327935","journal-title":"J. Electron. Imag"},{"key":"698_CR79","first-page":"548","volume-title":"Proceedings of SPIE- Medical Imaging: PACS and Imaging Informatics, vol. 5748","author":"C Xiaomeng","year":"2005","unstructured":"Xiaomeng C, Jie S, Jianguo Z, Huang HK: Evaluation of security algorithms used for security processing on DICOM images. In Proceedings of SPIE- Medical Imaging: PACS and Imaging Informatics, vol. 5748. SPIE,, Bellingham; 2005:548-56."},{"key":"698_CR80","first-page":"445","volume-title":"Proceedings of ICIP","author":"Q Li","year":"2007","unstructured":"Li Q, Memon N: Practical security of non-invertible watermarking schemes. In Proceedings of ICIP. IEEE,, Piscataway; 2007:445-448."},{"issue":"1","key":"698_CR81","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1155\/S1110865702000525","volume":"2002","author":"IJ Cox","year":"2002","unstructured":"Cox IJ, Miller ML: The first 50 years of electronic watermarking. EURASIP J. Appl. Signal Process 2002, 2002(1):126-132.","journal-title":"EURASIP J. Appl. Signal Process"},{"key":"698_CR82","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/5.771066","volume":"87","author":"F Hartung","year":"1999","unstructured":"Hartung F, Kutter M: Multimedia watermarking techniques. Proc. IEEE 1999, 87: 1079-1107. 10.1109\/5.771066","journal-title":"Proc. IEEE"}],"container-title":["EURASIP Journal on Advances in Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-6180-2014-135\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-6180-2014-135.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-6180-2014-135.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T11:32:09Z","timestamp":1746358329000},"score":1,"resource":{"primary":{"URL":"https:\/\/asp-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-6180-2014-135"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,29]]},"references-count":82,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["698"],"URL":"https:\/\/doi.org\/10.1186\/1687-6180-2014-135","relation":{},"ISSN":["1687-6180"],"issn-type":[{"value":"1687-6180","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8,29]]},"assertion":[{"value":"6 November 2013","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"135"}}