{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T10:37:33Z","timestamp":1768473453731,"version":"3.49.0"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T00:00:00Z","timestamp":1557273600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Image Video Proc."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13640-019-0462-3","type":"journal-article","created":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T13:24:15Z","timestamp":1557321855000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":55,"title":["A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability"],"prefix":"10.1186","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2325-1465","authenticated-orcid":false,"given":"Lusia","family":"Rakhmawati","sequence":"first","affiliation":[]},{"given":"Wirawan","family":"Wirawan","sequence":"additional","affiliation":[]},{"given":"Suwadi","family":"Suwadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,8]]},"reference":[{"key":"462_CR1","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1016\/j.jvcir.2016.04.023","volume":"38","author":"D Singh","year":"2016","unstructured":"D. Singh, S.K. Singh, Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J. Vis. Commun. Image Represent. 38, 775\u2013789 (2016). \n                    https:\/\/doi.org\/10.1016\/j.jvcir.2016.04.023","journal-title":"J. Vis. Commun. Image Represent."},{"key":"462_CR2","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1016\/j.sigpro.2011.11.013","volume":"92","author":"C Qin","year":"2012","unstructured":"C. Qin, C. Chang, P. Chen, Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Process. 92, 1137\u20131150 (2012). \n                    https:\/\/doi.org\/10.1016\/j.sigpro.2011.11.013","journal-title":"Signal Process."},{"key":"462_CR3","doi-asserted-by":"publisher","unstructured":"J. Chang, B. Chen, C. Tsai, \u201cLBP-based fragile watermarking scheme for image tamper detection and recovery,\u201d 2013 International Symposium on Next-Generation Electronics (Kaohsiung, 2013), pp. 173\u2013176. \n                    https:\/\/doi.org\/10.1109\/ISNE.2013.6512330","DOI":"10.1109\/ISNE.2013.6512330"},{"key":"462_CR4","doi-asserted-by":"publisher","unstructured":"R. Chamlawi, I. Usman, A. Khan, \u201cDual watermarking method for secure image authentication and recovery,\u201d 2009 IEEE 13th International Multitopic Conference (Islamabad, 2009), pp. 1\u20134. \n                    https:\/\/doi.org\/10.1109\/INMIC.2009.5383118","DOI":"10.1109\/INMIC.2009.5383118"},{"key":"462_CR5","doi-asserted-by":"publisher","unstructured":"S. Kiatpapan, T. Kondo, in 2015 12th International Conference on Electrical Engineering\/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON). An image tamper detection and recovery method based on self-embedding dual watermarking (Hua Hin, 2015), pp. 1\u20136. \n                    https:\/\/doi.org\/10.1109\/ECTICon.2015.7206973","DOI":"10.1109\/ECTICon.2015.7206973"},{"issue":"2","key":"462_CR6","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/TIP.2010.2066981","volume":"20","author":"X Zhang","year":"2011","unstructured":"X. Zhang, S. Wang, Z. Qian, G. Feng, Reference sharing mechanism for watermark self-embedding. IEEE Trans. Image Process. 20(2), 485\u2013495 (2011). \n                    https:\/\/doi.org\/10.1109\/TIP.2010.2066981","journal-title":"IEEE Trans. Image Process."},{"key":"462_CR7","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.displa.2017.01.001","volume":"46","author":"F Cao","year":"2017","unstructured":"F. Cao, B. An, J. Wang, D. Ye, H. Wang, Hierarchical recovery for tampered images based on watermark self-embedding correspondence. Displays. 46, 52\u201360 (2017). \n                    https:\/\/doi.org\/10.1016\/j.displa.2017.01.001","journal-title":"Displays."},{"key":"462_CR8","first-page":"383","volume":"4","author":"VC Shruthy","year":"2015","unstructured":"V.C. Shruthy, S. Varghese, An efficient self-embedding watermarking scheme for colour image tamper detection and recovery. Int. J. Comput. Sci. Mob. Comput. 4, 383\u2013390 (2015)","journal-title":"Int. J. Comput. Sci. Mob. Comput."},{"key":"462_CR9","doi-asserted-by":"publisher","unstructured":"T. Chen, H. Lu, in 2012 IEEE Fifth International Conference on Advanced Computational Intelligence (ICACI). Robust spatial LSB watermarking of color images against JPEG compression (Nanjing, 2012), pp. 872\u2013875. \n                    https:\/\/doi.org\/10.1109\/ICACI.2012.6463294","DOI":"10.1109\/ICACI.2012.6463294"},{"key":"462_CR10","doi-asserted-by":"publisher","unstructured":"N. Wang, C. Kim, in 2009 9th International Symposium on Communications and Information Technology. Tamper detection and self-recovery algorithm of color image based on robust embedding of dual visual watermarks using DWT-SVD (Icheon, 2009), pp. 157\u2013162. \n                    https:\/\/doi.org\/10.1109\/ISCIT.2009.5341268","DOI":"10.1109\/ISCIT.2009.5341268"},{"issue":"2","key":"462_CR11","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.image.2012.12.003","volume":"28","author":"X Tong","year":"2013","unstructured":"X. Tong, Y. Liu, M. Zhang, Y. Chen, A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process. Image Commun. 28(2), 301\u2013308 (2013)","journal-title":"Signal Process. Image Commun."},{"issue":"1","key":"462_CR12","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.aeue.2014.10.006","volume":"69","author":"M Yu","year":"2015","unstructured":"M. Yu, J. Wang, G. Jiang, Z. Peng, F. Shao, T. Luo, New fragile watermarking method for stereo image authentication with localization and recovery. AEU Int. J. Electron. Commun. 69(1), 361\u2013370 (2015). \n                    https:\/\/doi.org\/10.1016\/j.aeue.2014.10.006","journal-title":"AEU Int. J. Electron. Commun."},{"key":"462_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32498-7_49","volume-title":"Multidisciplinary research and practice for information systems","author":"M Doyoddorj","year":"2012","unstructured":"M. Doyoddorj, K.H. Rhee, in Multidisciplinary research and practice for information systems. CD-ARES 2012. Lecture notes in computer science, ed. by G. Quirchmayr, J. Basl, I. You, L. Xu, E. Weippl. Design and analysis of a fragile watermarking scheme based on block-mapping, vol 7465 (Springer, Berlin, 2012). \n                    https:\/\/doi.org\/10.1007\/978-3-642-32498-7_49"},{"key":"462_CR14","doi-asserted-by":"publisher","unstructured":"S.D. Lin, Y.-C. Kuo, Y.-H. Huang, in First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC\u201906). An image watermarking scheme with tamper detection and recovery (Beijing, 2006), pp. 74\u201377. \n                    https:\/\/doi.org\/10.1109\/ICICIC.2006.414","DOI":"10.1109\/ICICIC.2006.414"},{"issue":"7","key":"462_CR15","doi-asserted-by":"publisher","first-page":"1759","DOI":"10.1016\/j.optcom.2011.12.044","volume":"285","author":"Y Huo","year":"2012","unstructured":"Y. Huo, H. He, F. Chen, Alterable-capacity fragile watermarking scheme with restoration capability. Opt. Commun. 285(7), 1759\u20131766 (2012). \n                    https:\/\/doi.org\/10.1016\/j.optcom.2011.12.044","journal-title":"Opt. Commun."},{"issue":"1","key":"462_CR16","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/TIFS.2011.2162950","volume":"7","author":"H He","year":"2012","unstructured":"H. He, F. Chen, H. Tai, S. Member, T. Kalker, J. Zhang, Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. Ieee Trans. Inf. Forensics Secur. 7(1), 185\u2013196 (2012)","journal-title":"Ieee Trans. Inf. Forensics Secur."},{"issue":"8","key":"462_CR17","doi-asserted-by":"publisher","first-page":"1490","DOI":"10.1109\/TMM.2008.2007334","volume":"10","author":"X Zhang","year":"2008","unstructured":"X. Zhang, S. Wang, Fragile watermarking with error free restoration capability. IEEE Trans. Multimed. 10(8), 1490\u20131499 (2008)","journal-title":"IEEE Trans. Multimed."},{"issue":"1","key":"462_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/a10010027","volume":"10","author":"H Zhang","year":"2017","unstructured":"H. Zhang, C. Wang, X. Zhou, Fragile watermarking for image authentication using the characteristic of SVD. Algorithms. 10(1), 1\u201312 (2017)","journal-title":"Algorithms."},{"issue":"6","key":"462_CR19","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1016\/j.compeleceng.2011.09.007","volume":"37","author":"C Li","year":"2011","unstructured":"C. Li, Y. Wang, B. Ma, Z. Zhang, A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure q. Comput. Electr. Eng. 37(6), 927\u2013940 (2011)","journal-title":"Comput. Electr. Eng."},{"issue":"4","key":"462_CR20","doi-asserted-by":"publisher","first-page":"728","DOI":"10.1016\/j.sigpro.2010.07.019","volume":"91","author":"S Bravo-Solorio","year":"2011","unstructured":"S. Bravo-Solorio, A.K. Nandi, Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Sign. Proces 91(4), 728\u2013739 (2011)","journal-title":"Sign. Proces"},{"key":"462_CR21","doi-asserted-by":"publisher","unstructured":"W. Wang, A. Men, B. Yang, in 2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content. A feature-based semi-fragile watermarking scheme in DWT domain (Beijing, 2010), pp. 768\u2013772. \n                    https:\/\/doi.org\/10.1109\/ICNIDC.2010.5657886","DOI":"10.1109\/ICNIDC.2010.5657886"},{"key":"462_CR22","doi-asserted-by":"publisher","unstructured":"R. Eswaraiah, E.S. Reddy, in 2014 Seventh International Conference on Contemporary Computing (IC3). ROI-based fragile medical image watermarking technique for tamper detection and recovery using variance (Noida, 2014), pp. 553\u2013558. \n                    https:\/\/doi.org\/10.1109\/IC3.2014.6897233","DOI":"10.1109\/IC3.2014.6897233"},{"key":"462_CR23","doi-asserted-by":"publisher","unstructured":"P.-L. Lin, P.-W. Huang, A.-W. Peng, in IEEE Sixth International Symposium on Multimedia Software Engineering. A fragile watermarking scheme for image authentication with localization and recovery (Miami, 2004), pp. 146\u2013153. \n                    https:\/\/doi.org\/10.1109\/MMSE.2004.9","DOI":"10.1109\/MMSE.2004.9"},{"key":"462_CR24","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.sigpro.2017.03.033","volume":"138","author":"C Qin","year":"2017","unstructured":"C. Qin, P. Ji, X. Zhang, J. Dong, J. Wang, Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process. 138, 280\u2013293 (2017)","journal-title":"Signal Process."},{"key":"462_CR25","doi-asserted-by":"publisher","unstructured":"Y. Huo, H. He, F. Chen, in 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference. Semi-fragile watermarking scheme with discriminating general tampering from collage attack (Kaohsiung, 2013), pp. 1\u20136. \n                    https:\/\/doi.org\/10.1109\/APSIPA.2013.6694260","DOI":"10.1109\/APSIPA.2013.6694260"},{"key":"462_CR26","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.jvcir.2015.05.006","volume":"30","author":"X Qi","year":"2015","unstructured":"X. Qi, X. Xin, A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J. Vis. Commun. Image Represent. 30, 312\u2013327 (2015)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"462_CR27","doi-asserted-by":"publisher","unstructured":"Y. Li, L. Du, in Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC). Semi-fragile watermarking for image tamper localization and self-recovery (Wuhan, 2014), pp. 328\u2013333. \n                    https:\/\/doi.org\/10.1109\/SPAC.2014.6982711","DOI":"10.1109\/SPAC.2014.6982711"},{"issue":"1","key":"462_CR28","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1117\/1.1633285","volume":"13","author":"O Ekici","year":"2004","unstructured":"O. Ekici, B. Sankur, B. Co\u015fkun, U. Naci, M. Akcay, Comparative evaluation of semifragile watermarking algorithms. J. Electron. Imaging. 13(1), 209 (2004)","journal-title":"J. Electron. Imaging."},{"issue":"4","key":"462_CR29","doi-asserted-by":"publisher","first-page":"56","DOI":"10.3390\/fi9040056","volume":"9","author":"X Yu","year":"2017","unstructured":"X. Yu, C. Wang, X. Zhou, Review on semi-fragile watermarking algorithms for content authentication of digital images. Future Internet. 9(4), 56 (2017)","journal-title":"Future Internet."},{"key":"462_CR30","doi-asserted-by":"publisher","unstructured":"B. Cheng, R. Ni, Y. Zhao, in 2012 IEEE 11th International Conference on Signal Processing. A refining localization watermarking for image tamper detection and recovery (Beijing, 2012), pp. 984\u2013988. \n                    https:\/\/doi.org\/10.1109\/ICoSP.2012.6491744","DOI":"10.1109\/ICoSP.2012.6491744"},{"key":"462_CR31","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.ins.2014.03.118","volume":"279","author":"A Khan","year":"2014","unstructured":"A. Khan, A. Siddiqa, S. Munib, S.A. Malik, A recent survey of reversible watermarking techniques. Inf. Sci. 279, 251\u2013271 (2014). \n                    https:\/\/doi.org\/10.1016\/j.ins.2014.03.118","journal-title":"Inf. Sci."},{"key":"462_CR32","doi-asserted-by":"publisher","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","volume":"4","author":"Y Shi","year":"2016","unstructured":"Y. Shi, X. Li, X. Zhang, H. Wu, B. Ma, Reversible data hiding: advances in the past two decades. IEEE Access. 4, 3210\u20133237 (2016). \n                    https:\/\/doi.org\/10.1109\/ACCESS.2016.2573308","journal-title":"IEEE Access."},{"issue":"6","key":"462_CR33","first-page":"1282","volume":"7","author":"X-L Liu","year":"2016","unstructured":"X.-L. Liu, C.-C. Lin, C.-C. Chang, S.-M. Yuan, A survey of fragile watermarking-based image authentication techniques. J. Inform. Hiding Multimedia Signal Process. 7(6), 1282\u20131292 (2016)","journal-title":"J. Inform. Hiding Multimedia Signal Process."},{"key":"462_CR34","doi-asserted-by":"publisher","unstructured":"C. K. R, N. Shivananda, in 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI). A new fragile watermarking approach for tamper detection and recovery of document images (New Delhi, 2014), pp. 1494\u20131498. \n                    https:\/\/doi.org\/10.1109\/ICACCI.2014.6968624","DOI":"10.1109\/ICACCI.2014.6968624"},{"issue":"2","key":"462_CR35","doi-asserted-by":"publisher","first-page":"103","DOI":"10.4236\/opj.2013.32B026","volume":"3","author":"C-M Wu","year":"2013","unstructured":"C.-M. Wu, Y.-S. Shih, A simple image tamper detection and recovery based on fragile watermark with one parity section and two restoration sections. Opt. Photonics J. 3(2), 103\u2013107 (2013)","journal-title":"Opt. Photonics J."},{"issue":"10\u201311","key":"462_CR36","doi-asserted-by":"publisher","first-page":"2596","DOI":"10.1016\/j.optcom.2012.02.002","volume":"285","author":"D Xiao","year":"2012","unstructured":"D. Xiao, F.Y. Shih, An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post-processing. Opt. Commun. 285(10\u201311), 2596\u20132606 (2012). \n                    https:\/\/doi.org\/10.1016\/j.optcom.2012.02.002","journal-title":"Opt. Commun."},{"key":"462_CR37","doi-asserted-by":"publisher","unstructured":"O. Hemida, Y. Huo, F. Chen, H. He, in 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC). Block-DCT based alterable-coding restorable fragile watermarking scheme with superior localization (Kuala Lumpur, 2017), pp. 846\u2013851. \n                    https:\/\/doi.org\/10.1109\/APSIPA.2017.8282151","DOI":"10.1109\/APSIPA.2017.8282151"},{"key":"462_CR38","doi-asserted-by":"publisher","unstructured":"K. Sreenivas, V.K. Prasad, in 2016 International Conference on Information Communication and Embedded Systems (ICICES). Improved block encoding method for an image self-recovery approach (Chennai, 2016), pp. 1\u20135. \n                    https:\/\/doi.org\/10.1109\/ICICES.2016.7518879","DOI":"10.1109\/ICICES.2016.7518879"},{"key":"462_CR39","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-319-59870-3_18","volume-title":"Information Security and Privacy","author":"Yang-Wai Chow","year":"2017","unstructured":"W. Susilo, J. Tonien, A QR code watermarking approach based on the DWT-DCT technique. Lect. Notes Comput. Sci (2017). \n                    https:\/\/doi.org\/10.1007\/978-3-319-59870-3_18"},{"key":"462_CR40","doi-asserted-by":"publisher","unstructured":"A. Kunhu, H. Al-Ahmad, S.A. Mansoori, in 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA). A reversible watermarking scheme for ownership protection and authentication of medical Images (Ras Al Khaimah, 2017), pp. 1\u20134. \n                    https:\/\/doi.org\/10.1109\/ICECTA.2017.8251971","DOI":"10.1109\/ICECTA.2017.8251971"},{"key":"462_CR41","doi-asserted-by":"publisher","unstructured":"Q. Han, L. Han, E. Wang, J. Yang, in 2013 Ninth international conference on intelligent information hiding and multimedia signal processing. Dual watermarking for image tamper detection and self-recovery (Beijing, 2013), pp. 33\u201336. \n                    https:\/\/doi.org\/10.1109\/IIH-MSP.2013.17","DOI":"10.1109\/IIH-MSP.2013.17"},{"key":"462_CR42","doi-asserted-by":"publisher","unstructured":"V.S. Dhole, N.N. Patil, in 2015 International conference on computing communication control and automation. Self embedding fragile watermarking for image tampering detection and image recovery using self recovery blocks (Pune, 2015), pp. 752\u2013757. \n                    https:\/\/doi.org\/10.1109\/ICCUBEA.2015.150","DOI":"10.1109\/ICCUBEA.2015.150"},{"issue":"4","key":"462_CR43","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1179\/1743131X11Y.0000000018","volume":"60","author":"T-Y Chen","year":"2012","unstructured":"T.-Y. Chen, M.-S. Hwang, J.-K. Jan, A secure image authentication scheme for tamper detection and recovery. Imaging Sci. J. 60(4), 219\u2013233 (2012). \n                    https:\/\/doi.org\/10.1179\/1743131X11Y.0000000018","journal-title":"Imaging Sci. J."},{"key":"462_CR44","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1109\/TIFS.2011.2159208","volume":"6","author":"X Zhang","year":"2011","unstructured":"X. Zhang, Z. Qian, Y. Ren, G. Feng, Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans. Inf. Forensics Secur. 6, 1223\u20131232 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"462_CR45","doi-asserted-by":"publisher","unstructured":"S. Sarreshtedari, M.A. Akhaee, A. Abbasfar, in 2015 23rd European Signal Processing Conference (EUSIPCO). Digital image self-recovery using unequal error protection (Nice, 2015), pp. 71\u201375. \n                    https:\/\/doi.org\/10.1109\/EUSIPCO.2015.7362347","DOI":"10.1109\/EUSIPCO.2015.7362347"},{"key":"462_CR46","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.jvcir.2017.09.017","volume":"50","author":"BB Haghighi","year":"2018","unstructured":"B.B. Haghighi, A.H. Taherinia, A. Harati, TRLH: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique. J. Vis. Commun. Image Represent. 50, 49\u201364 (2018)","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"3","key":"462_CR47","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MMUL.2018.112142509","volume":"25","author":"Chuan Qin","year":"2018","unstructured":"C. Qin, P. Ji, C. Chang, J. Dong, X. Sun, Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE MultiMedia. 25(3), 36-48 (2018).","journal-title":"IEEE MultiMedia"},{"key":"462_CR48","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.ins.2016.09.001","volume":"373","author":"C Qin","year":"2016","unstructured":"C. Qin, H. Wang, X. Zhang, X. Sun, Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of emb e dding mode. J.Inf. Sci. 373, 233\u2013250 (2016)","journal-title":"J.Inf. Sci."},{"key":"462_CR49","doi-asserted-by":"publisher","unstructured":"W.C. Wu, Quantization-based image authentication scheme using QR error correction. J Image Video Proc. 2017(13) (2017). \n                    https:\/\/doi.org\/10.1186\/s13640-017-0163-8","DOI":"10.1186\/s13640-017-0163-8"},{"issue":"12","key":"462_CR50","doi-asserted-by":"publisher","first-page":"2519","DOI":"10.1016\/j.patcog.2005.02.007","volume":"38","author":"PL Lin","year":"2005","unstructured":"P.L. Lin, C.K. Hsieh, P.W. Huang, A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn. 38(12), 2519\u20132529 (2005)","journal-title":"Pattern Recogn."},{"issue":"6","key":"462_CR51","doi-asserted-by":"publisher","first-page":"1597","DOI":"10.1016\/j.dsp.2010.03.010","volume":"20","author":"JC Patra","year":"2010","unstructured":"J.C. Patra, J.E. Phua, C. Bornand, A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digit. Signal Process. 20(6), 1597\u20131611 (2010)","journal-title":"Digit. Signal Process."},{"key":"462_CR52","volume-title":"DCT-based image feature extraction and its application in image self-recovery and image watermarking","author":"M Hamid","year":"2016","unstructured":"M. Hamid, DCT-based image feature extraction and its application in image self-recovery and image watermarking (Thesis Concordia Univesity, Canada, 2016)"},{"issue":"6","key":"462_CR53","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1007\/s10278-014-9700-5","volume":"27","author":"SSM Mousavi","year":"2014","unstructured":"S.S.M. Mousavi, A. Naghsh, Watermarking techniques used in medical images: a survey. J. of Dig. Imag. 27(6), 714\u2013729 (2014)","journal-title":"J. of Dig. Imag."},{"key":"462_CR54","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1155\/2018\/1591206","volume-title":"Security and Communication Networks","author":"R Zhang","year":"2018","unstructured":"R. Zhang, D. Xiao, Y. Chang, in Security and Communication Networks. A novel image authentication with tamper localization and self-recovery in encrypted domain based on compressive sensing, vol 2018, Article ID 1591206 (2018), p. 15. \n                    https:\/\/doi.org\/10.1155\/2018\/1591206"},{"key":"462_CR55","doi-asserted-by":"publisher","unstructured":"J. Molina-Garc\u00eda, R. Reyes-Reyes, V. Ponomaryov, C. Cruz-Ramos, in 2016 9th International Kharkiv Symposium on Physics and Engineering of Microwaves, Millimeter and Submillimeter Waves (MSMW). Watermarking algorithm for authentication and self-recovery of tampered images using DWT (Kharkiv, 2016), pp. 1\u20134. \n                    https:\/\/doi.org\/10.1109\/MSMW.2016.7538148","DOI":"10.1109\/MSMW.2016.7538148"},{"key":"462_CR56","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.aeue.2017.05.027","volume":"78","author":"A Tiwari","year":"2017","unstructured":"A. Tiwari, M. Sharma, R.K. Tamrakar, Watermarking based image authentication and tamper detection algorithm using vector quantization approach. AEU-Int. J. Electron. C. 78, 114\u2013123 (2017). \n                    https:\/\/doi.org\/10.1016\/j.aeue.2017.05.027","journal-title":"AEU-Int. J. Electron. C."}],"container-title":["EURASIP Journal on Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-019-0462-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13640-019-0462-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13640-019-0462-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,6]],"date-time":"2020-05-06T23:14:25Z","timestamp":1588806865000},"score":1,"resource":{"primary":{"URL":"https:\/\/jivp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13640-019-0462-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,8]]},"references-count":56,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["462"],"URL":"https:\/\/doi.org\/10.1186\/s13640-019-0462-3","relation":{},"ISSN":["1687-5281"],"issn-type":[{"value":"1687-5281","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,8]]},"assertion":[{"value":"21 May 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"61"}}