{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T17:11:45Z","timestamp":1771521105033,"version":"3.50.1"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:00:00Z","timestamp":1771459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:00:00Z","timestamp":1771459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The majority of existing face image authentication (FIA) techniques are made for single face image and do not safeguard the multi-face images (MFIs) that are being utilized more and more in biometrics, AI, and surveillance, in addition, the available FIA techniques suffer from limited embedding capacity. Harmonized attacks and manipulations are possible with these MFIs, therefore, this paper draws attention to this research gap and suggests a novel authentication technique. To protect MFIs, a new high-capacity watermarking scheme has been introduced using 2D lazy lifting integer wavelet transform (LL-IWT) and chaotic-based embedding strategy to securely embed authentication and recovery data into non-interest blocks (NIB) of the face image, preserving the integrity of the facial regions. The proposed block-wise segmentation, LL-IWT employment, and the secure embedding strategy guided by chaotic sequences contributed in obtaining significantly high embedding capacity of 1.5 bpp, outperforming prior FIA techniques. Experimental results on diverse datasets of face images demonstrate superior visual quality, achieving an average PSNR of 54\u00a0dB and SSIM of 0.997, indicating imperceptibility of the watermark. Moreover, the scheme effectively detects tampering and enables recovery of altered facial regions. These results confirm the scheme\u2019s applicability to real-world scenarios requiring both scalability and security in FIA where it can be used for authenticating single and multiple face images.<\/jats:p>","DOI":"10.1186\/s42400-025-00525-8","type":"journal-article","created":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:30:13Z","timestamp":1771518613000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An efficient watermarking framework for multi-face image authentication using chaotic maps and 2D lazy IWT"],"prefix":"10.1186","volume":"9","author":[{"given":"Ali Tariq","family":"Al-Tamimi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4141-5723","authenticated-orcid":false,"given":"Rasha","family":"Thabit","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,19]]},"reference":[{"issue":"2","key":"525_CR1","doi-asserted-by":"publisher","first-page":"1274","DOI":"10.1007\/s00034-024-02881-1","volume":"44","author":"AT Abbasi","year":"2025","unstructured":"Abbasi AT, Miao F, Islam MS (2025) A secure and robust audio watermarking scheme using secret sharing in the transform-domain. Circuits Syst Signal Process 44(2):1274\u20131307. https:\/\/doi.org\/10.1007\/s00034-024-02881-1","journal-title":"Circuits Syst Signal Process"},{"key":"525_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.prime.2024.100834","volume":"10","author":"O Abd Qasim","year":"2024","unstructured":"Abd Qasim O, Golshannavaz S (2024) Data protection enhancement in smart grid communication: an efficient multi-layer encrypting approach based on chaotic techniques and steganography. e-Prime Adv Electr Eng Electron Energy 10:100834. https:\/\/doi.org\/10.1016\/j.prime.2024.100834","journal-title":"e-Prime Adv Electr Eng Electron Energy"},{"issue":"2","key":"525_CR3","doi-asserted-by":"publisher","first-page":"65","DOI":"10.58564\/IJSER.1.2.2022.53","volume":"1","author":"MH Abood","year":"2022","unstructured":"Abood MH, Abdulmajeed SW (2022) High security image cryptographic algorithm using chaotic encryption algorithm with Hash-LSB steganography. Al-Iraqia J Sci Eng Res 1(2):65\u201374. https:\/\/doi.org\/10.58564\/IJSER.1.2.2022.53","journal-title":"Al-Iraqia J Sci Eng Res"},{"issue":"2","key":"525_CR4","doi-asserted-by":"publisher","first-page":"29","DOI":"10.58564\/IJSER.2.2.2023.68","volume":"2","author":"MH Al-Hadaad","year":"2023","unstructured":"Al-Hadaad MH, Thabit R, Zidan KA (2023a) A new face image authentication scheme based on bicubic interpolation. Al-Iraqia J Sci Eng Res 2(2):29\u201336. https:\/\/doi.org\/10.58564\/IJSER.2.2.2023.68","journal-title":"Al-Iraqia J Sci Eng Res"},{"issue":"3","key":"525_CR5","doi-asserted-by":"publisher","first-page":"1000","DOI":"10.30630\/joiv.7.3.1671","volume":"7","author":"MHMH Al-Hadaad","year":"2023","unstructured":"Al-Hadaad MHMH, Thabit R, Zidan KA (2023b) A new face region recovery algorithm based on bicubic interpolation. JOIV Int J Inf vis 7(3):1000\u20131006. https:\/\/doi.org\/10.30630\/joiv.7.3.1671","journal-title":"JOIV Int J Inf vis"},{"key":"525_CR6","doi-asserted-by":"crossref","unstructured":"Al-Hadaad MH, Thabit R, Zidan KA, Khoo BE (2024) Face image authentication scheme based on Cohen\u2013Daubechies\u2013Feauveau wavelets. In: Proceedings of the 12th international conference on robotics, vision, signal processing and power applications, pp 553\u2013564","DOI":"10.1007\/978-981-99-9005-4_70"},{"key":"525_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08814-9","author":"HS Alshanbari","year":"2020","unstructured":"Alshanbari HS (2020) Medical image watermarking for ownership & tamper detection. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-020-08814-9","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"525_CR8","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-90317-4","volume":"15","author":"MN Arrington","year":"2025","unstructured":"Arrington MN, Scherf KS (2025) Investigating the stability of individual differences in face recognition behavior. Sci Rep 15(1):9425. https:\/\/doi.org\/10.1038\/s41598-025-90317-4","journal-title":"Sci Rep"},{"issue":"7","key":"525_CR9","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/s10586-025-05436-4","volume":"28","author":"D Awasthi","year":"2025","unstructured":"Awasthi D, Srivastava VK (2025) Roi-based optimized image watermarking with real-time authentication. Cluster Comput 28(7):463. https:\/\/doi.org\/10.1007\/s10586-025-05436-4","journal-title":"Cluster Comput"},{"key":"525_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.prime.2024.100524","volume":"8","author":"HT Baby","year":"2024","unstructured":"Baby HT, Raghu ME (2024) Chaotic neural network for information security. e-Prime Adv Electr Eng Electron Energy 8:100524. https:\/\/doi.org\/10.1016\/j.prime.2024.100524","journal-title":"e-Prime Adv Electr Eng Electron Energy"},{"issue":"8","key":"525_CR11","doi-asserted-by":"publisher","first-page":"21849","DOI":"10.1007\/s11042-023-14737-y","volume":"83","author":"R Bamal","year":"2024","unstructured":"Bamal R, Kasana SS (2024) Reversible medical image watermarking for tamper detection using ANN and SLT. Multimed Tools Appl 83(8):21849\u201321882. https:\/\/doi.org\/10.1007\/s11042-023-14737-y","journal-title":"Multimed Tools Appl"},{"key":"525_CR12","doi-asserted-by":"publisher","DOI":"10.3390\/a17010032","author":"M Begum","year":"2024","unstructured":"Begum M et al (2024) Image watermarking using discrete wavelet transform and singular value decomposition for enhanced imperceptibility and robustness. Algorithms. https:\/\/doi.org\/10.3390\/a17010032","journal-title":"Algorithms"},{"key":"525_CR13","doi-asserted-by":"crossref","unstructured":"Chai Y (2025) Security challenges in wireless multimedia communications: a current overview BT\u2014information processing and network provisioning. pp 134\u2013144","DOI":"10.1007\/978-981-96-6468-9_12"},{"key":"525_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.prime.2024.100642","volume":"9","author":"M Dua","year":"2024","unstructured":"Dua M, Bhogal R (2024) Medical image encryption using novel sine-tangent chaotic map. e-Prime Adv Electr Eng Electron Energy 9:100642. https:\/\/doi.org\/10.1016\/j.prime.2024.100642","journal-title":"e-Prime Adv Electr Eng Electron Energy"},{"key":"525_CR15","doi-asserted-by":"publisher","DOI":"10.3390\/fractalfract9070426","author":"W Feng","year":"2025","unstructured":"Feng W et al (2025) Integrating fractional-order Hopfield neural network with differentiated encryption: achieving high-performance privacy protection for medical images. Fractal Fract. https:\/\/doi.org\/10.3390\/fractalfract9070426","journal-title":"Fractal Fract"},{"issue":"3","key":"525_CR16","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/s10462-023-10679-x","volume":"57","author":"\u00c1F Gamb\u00edn","year":"2024","unstructured":"Gamb\u00edn \u00c1F, Yazidi A, Vasilakos A, Haugerud H, Djenouri Y (2024) Deepfakes: current and future trends. Artif Intell Rev 57(3):64. https:\/\/doi.org\/10.1007\/s10462-023-10679-x","journal-title":"Artif Intell Rev"},{"issue":"1","key":"525_CR17","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1007\/s10586-021-03446-6","volume":"25","author":"H Gao","year":"2022","unstructured":"Gao H, Gao T (2022) A secure lossless recovery for medical images based on image encoding and data self-embedding. Cluster Comput 25(1):707\u2013725. https:\/\/doi.org\/10.1007\/s10586-021-03446-6","journal-title":"Cluster Comput"},{"issue":"7","key":"525_CR18","doi-asserted-by":"publisher","first-page":"862","DOI":"10.1007\/s42979-024-03225-1","volume":"5","author":"S Gaur","year":"2024","unstructured":"Gaur S, Pandey M, Himanshu (2024) Realization of facial recognition technology for attendance monitoring through biometric modalities employing MTCNN integration. SN Comput Sci 5(7):862. https:\/\/doi.org\/10.1007\/s42979-024-03225-1","journal-title":"SN Comput Sci"},{"key":"525_CR19","doi-asserted-by":"publisher","unstructured":"Gavrovska AM, Paska\u0161 MP, Reljin IS (2011) An example of wavelet denoising using lazy transform and the lifting scheme. In: 2011 19th telecommunications forum (TELFOR) proceedings of papers, pp 615\u2013618. https:\/\/doi.org\/10.1109\/TELFOR.2011.6143623","DOI":"10.1109\/TELFOR.2011.6143623"},{"issue":"16","key":"525_CR20","doi-asserted-by":"publisher","first-page":"11295","DOI":"10.1007\/s00500-023-08605-y","volume":"27","author":"R Gil","year":"2023","unstructured":"Gil R, Virgili-Gom\u00e0 J, L\u00f3pez-Gil J-M, Garc\u00eda R (2023) Deepfakes: evolution and trends. Soft Comput 27(16):11295\u201311318. https:\/\/doi.org\/10.1007\/s00500-023-08605-y","journal-title":"Soft Comput"},{"issue":"3","key":"525_CR21","doi-asserted-by":"publisher","first-page":"202","DOI":"10.58564\/IJSER.3.3.2024.236","volume":"3","author":"A Hatem Jawad","year":"2024","unstructured":"Hatem Jawad A, Thabit R, Zidan KA (2024) Review of recent trends in face image authentication (FIA) techniques and their limitations. Al-Iraqia J Sci Eng Res 3(3):202\u2013214. https:\/\/doi.org\/10.58564\/IJSER.3.3.2024.236","journal-title":"Al-Iraqia J Sci Eng Res"},{"issue":"3","key":"525_CR22","doi-asserted-by":"publisher","first-page":"1126","DOI":"10.62527\/joiv.8.3.2488","volume":"8","author":"AH Jawad","year":"2024","unstructured":"Jawad AH, Thabit R, Zidan KA (2024a) Improved face image authentication scheme based on embedding in adjacent coefficients. JOIV Int J Inf vis 8(3):1126\u20131133. https:\/\/doi.org\/10.62527\/joiv.8.3.2488","journal-title":"JOIV Int J Inf vis"},{"issue":"9","key":"525_CR23","doi-asserted-by":"publisher","first-page":"2483","DOI":"10.18280\/MMEP.110920","volume":"11","author":"AH Jawad","year":"2024","unstructured":"Jawad AH, Thabit R, Al-Hadaad MH, Zidan KA (2024b) A new face image manipulation localization and recovery algorithm using image watermarking and integer wavelet transform. Math Model Eng Probl 11(9):2483\u20132496. https:\/\/doi.org\/10.18280\/MMEP.110920","journal-title":"Math Model Eng Probl"},{"issue":"11","key":"525_CR24","doi-asserted-by":"publisher","first-page":"13197","DOI":"10.1007\/s11042-017-4941-1","volume":"77","author":"X Kang","year":"2018","unstructured":"Kang X, Zhao F, Lin G, Chen Y (2018) A novel hybrid of DCT and SVD in DWT domain for robust and invisible blind image watermarking with optimal embedding strength. Multimed Tools Appl 77(11):13197\u201313224","journal-title":"Multimed Tools Appl"},{"key":"525_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.prime.2025.101015","volume":"12","author":"RH Khobragade","year":"2025","unstructured":"Khobragade RH, Bhoyar DB, Paithane A, Kurumbanshi S (2025) Occluded face recognition using optimum features based on efficient preprocessing and machine learning. e-Prime Adv Electr Eng Electron Energy 12:101015. https:\/\/doi.org\/10.1016\/j.prime.2025.101015","journal-title":"e-Prime Adv Electr Eng Electron Energy"},{"key":"525_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.prime.2024.100446","volume":"7","author":"M Kumar","year":"2024","unstructured":"Kumar M, Khaladkar VP (2024) Secure communication using an adaptable multilevel RGB image encryption algorithm for wireless sensor networks. e-Prime Adv Electr Eng Electron Energy 7:100446. https:\/\/doi.org\/10.1016\/j.prime.2024.100446","journal-title":"e-Prime Adv Electr Eng Electron Energy"},{"key":"525_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.prime.2023.100241","volume":"5","author":"A Kumar","year":"2023","unstructured":"Kumar A, Yadav RK, Saini DJB (2023) Create and implement a new method for robust video face recognition using convolutional neural network algorithm. e-Prime Adv Electr Eng Electron Energy 5:100241. https:\/\/doi.org\/10.1016\/j.prime.2023.100241","journal-title":"e-Prime Adv Electr Eng Electron Energy"},{"key":"525_CR28","unstructured":"J. Li, \u201cCelebFaces Attributes (CelebA) Dataset,\u201d kaggle, 2018. https:\/\/www.kaggle.com\/datasets\/jessicali9530\/celeba-dataset"},{"key":"525_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109628","volume":"141","author":"K Liu","year":"2023","unstructured":"Liu K, Perov I, Gao D, Chervoniy N, Zhou W, Zhang W (2023) Deepfacelab: integrated, flexible and extensible face-swapping framework. Pattern Recogn 141:109628. https:\/\/doi.org\/10.1016\/j.patcog.2023.109628","journal-title":"Pattern Recogn"},{"issue":"20","key":"525_CR30","doi-asserted-by":"publisher","first-page":"22121","DOI":"10.1007\/s11042-024-19954-7","volume":"84","author":"P Mehta","year":"2025","unstructured":"Mehta P, Singh MK, Singha N (2025) Screen-camera robust watermarking using arnold transform and double-density dual-tree discrete wavelet transform. Multimed Tools Appl 84(20):22121\u201322137. https:\/\/doi.org\/10.1007\/s11042-024-19954-7","journal-title":"Multimed Tools Appl"},{"key":"525_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/s00034-025-03202-w","author":"P Niu","year":"2025","unstructured":"Niu P, Wang D, Xu X, Zhang X, Wang X (2025) Robust domain image watermarking using WBIB distribution. Circuits Syst Signal Process. https:\/\/doi.org\/10.1007\/s00034-025-03202-w","journal-title":"Circuits Syst Signal Process"},{"issue":"1","key":"525_CR32","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/s10559-024-00655-w","volume":"60","author":"VM Opanasenko","year":"2024","unstructured":"Opanasenko VM, Fazilov SK, Radjabov SS, Kakharov SS (2024) Multilevel face recognition system. Cybern Syst Anal 60(1):146\u2013151. https:\/\/doi.org\/10.1007\/s10559-024-00655-w","journal-title":"Cybern Syst Anal"},{"key":"525_CR33","doi-asserted-by":"publisher","unstructured":"Patel K, Rora KK, Singh K, Verma S (2013) Lazy wavelet transform based steganography in video. In: 2013 international conference on communication systems and network technologies, pp 497\u2013500. https:\/\/doi.org\/10.1109\/CSNT.2013.109.","DOI":"10.1109\/CSNT.2013.109"},{"key":"525_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.prime.2025.100961","volume":"12","author":"P Prabha","year":"2025","unstructured":"Prabha P, Chatterjee K (2025) Towards a robust data privacy framework for IoT based health monitoring system. E-Prime Adv Electr Eng Electron Energy 12:100961. https:\/\/doi.org\/10.1016\/j.prime.2025.100961","journal-title":"E-Prime Adv Electr Eng Electron Energy"},{"key":"525_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-024-02177-2","author":"N Radha","year":"2024","unstructured":"Radha N, Meenakshi K (2024) Hybrid domain watermarking approach for authenticated data protection. Int J Inf Technol. https:\/\/doi.org\/10.1007\/s41870-024-02177-2","journal-title":"Int J Inf Technol"},{"key":"525_CR36","doi-asserted-by":"crossref","unstructured":"Rani J, Nath R (2025) Image integrity checking using watermarking in cloud computing: a review. In: Proceedings of third international conference on computing and communication networks, pp 85\u201393","DOI":"10.1007\/978-981-97-2671-4_7"},{"key":"525_CR37","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.compbiomed.2016.03.020","volume":"72","author":"D Ravichandran","year":"2016","unstructured":"Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170\u2013184","journal-title":"Comput Biol Med"},{"issue":"8","key":"525_CR38","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1109\/TNB.2017.2780881","volume":"16","author":"D Ravichandran","year":"2017","unstructured":"Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA chaos blend to secure medical privacy. IEEE Trans Nanobioscience 16(8):850\u2013858","journal-title":"IEEE Trans Nanobioscience"},{"issue":"6","key":"525_CR39","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1007\/s11517-021-02374-2","volume":"59","author":"D Ravichandran","year":"2021","unstructured":"Ravichandran D, Praveenkumar P, Rajagopalan S, Rayappan JBB, Amirtharajan R (2021) Roi-based medical image watermarking for accurate tamper detection, localisation and recovery. Med Biol Eng Comput 59(6):1355\u20131372. https:\/\/doi.org\/10.1007\/s11517-021-02374-2","journal-title":"Med Biol Eng Comput"},{"key":"525_CR40","doi-asserted-by":"publisher","unstructured":"R\u00f6ssler A, Cozzolino D, Verdoliva L, Riess C, Thies J, Niessner M (2019) FaceForensics++: learning to detect manipulated facial images. In: 2019 IEEE\/CVF international conference on computer vision (ICCV), pp 1\u201311. https:\/\/doi.org\/10.1109\/ICCV.2019.00009.","DOI":"10.1109\/ICCV.2019.00009"},{"key":"525_CR41","unstructured":"SAEID (2023) Human faces. https:\/\/www.kaggle.com\/datasets\/sbaghbidi\/human-faces-object-detection"},{"issue":"2","key":"525_CR42","first-page":"1164","volume":"14","author":"ZA Salih","year":"2023","unstructured":"Salih ZA, Thabit R, Zidan KA (2023) A new manipulation detection and localization scheme for digital face images. J Eng Sci Technol 14(2):1164\u20131183","journal-title":"J Eng Sci Technol"},{"key":"525_CR43","doi-asserted-by":"publisher","unstructured":"Salih ZAA, Thabit R, Zidan KAA, Khoo BEE (2022) Challenges of face image authentication and suggested solutions. In: 2022 international conference on information technology systems and innovation (ICITSI), pp 189\u2013193. https:\/\/doi.org\/10.1109\/ICITSI56531.2022.9970797","DOI":"10.1109\/ICITSI56531.2022.9970797"},{"key":"525_CR44","doi-asserted-by":"publisher","unstructured":"Salih ZAZA, Thabit R, Zidan KA, Khoo BEBE (2022) A new face image manipulation reveal scheme based on face detection and image watermarking. In: 2022 IEEE international conference on artificial intelligence in engineering and technology (IICAIET), no. 1001, pp 1\u20136. https:\/\/doi.org\/10.1109\/iicaiet55139.2022.9936838","DOI":"10.1109\/iicaiet55139.2022.9936838"},{"issue":"11","key":"525_CR45","doi-asserted-by":"publisher","first-page":"31829","DOI":"10.1007\/s11042-023-16843-3","volume":"83","author":"S Sharma","year":"2024","unstructured":"Sharma S, Zou JJ, Fang G, Shukla P, Cai W (2024) A review of image watermarking for identity protection and verification. Multimed Tools Appl 83(11):31829\u201331891. https:\/\/doi.org\/10.1007\/s11042-023-16843-3","journal-title":"Multimed Tools Appl"},{"issue":"24","key":"525_CR46","doi-asserted-by":"publisher","first-page":"27647","DOI":"10.1007\/s11042-024-20157-3","volume":"84","author":"K Shrestha","year":"2025","unstructured":"Shrestha K, Alsadoon A, Al-Naymat G, Jerew OD (2025) Modified feature extraction techniques to enhance face and expression recognition. Multimed Tools Appl 84(24):27647\u201327669. https:\/\/doi.org\/10.1007\/s11042-024-20157-3","journal-title":"Multimed Tools Appl"},{"key":"525_CR47","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsisyn.2022.100217","volume":"4","author":"SH Silva","year":"2022","unstructured":"Silva SH, Bethany M, Votto AM, Scarff IH, Beebe N, Najafirad P (2022) Deepfake forensics analysis: an explainable hierarchical ensemble of weakly supervised models. Forensic Sci Int Synerg 4:100217. https:\/\/doi.org\/10.1016\/j.fsisyn.2022.100217","journal-title":"Forensic Sci Int Synerg"},{"issue":"3","key":"525_CR48","doi-asserted-by":"publisher","first-page":"3397","DOI":"10.1007\/s11042-022-13286-0","volume":"82","author":"R Singh","year":"2023","unstructured":"Singh R, Ashok A, Saraswat M (2023) High embedding capacity based color image watermarking scheme using SBBO in RDWT domain. Multimed Tools Appl 82(3):3397\u20133432. https:\/\/doi.org\/10.1007\/s11042-022-13286-0","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"525_CR49","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s43926-025-00154-0","volume":"5","author":"LH Singh","year":"2025","unstructured":"Singh LH, Charanarur P, Chaudhary NK (2025) Advancements in detecting deepfakes: AI algorithms and future prospects\u2014a review. Discov Internet Things 5(1):53. https:\/\/doi.org\/10.1007\/s43926-025-00154-0","journal-title":"Discov Internet Things"},{"issue":"10","key":"525_CR50","doi-asserted-by":"publisher","first-page":"14045","DOI":"10.1007\/s11042-022-12082-0","volume":"81","author":"R Sinhal","year":"2022","unstructured":"Sinhal R, Sharma S, Ansari IA, Bajaj V (2022) Multipurpose medical image watermarking for effective security solutions. Multimed Tools Appl 81(10):14045\u201314063. https:\/\/doi.org\/10.1007\/s11042-022-12082-0","journal-title":"Multimed Tools Appl"},{"key":"525_CR51","doi-asserted-by":"publisher","DOI":"10.1007\/s00034-025-03097-7","author":"V Sundhararaj","year":"2025","unstructured":"Sundhararaj V, Meenakshipriya B, Devi PN, Vignesh KE (2025) DWT-DCT-SVD: a hybrid image watermarking algorithm with FPP resistant enhancement. Circuits Syst Signal Process. https:\/\/doi.org\/10.1007\/s00034-025-03097-7","journal-title":"Circuits Syst Signal Process"},{"issue":"2","key":"525_CR52","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1137\/S0036141095289051","volume":"29","author":"W Sweldens","year":"1998","unstructured":"Sweldens W (1998) The lifting scheme: a construction of second generation wavelets. SIAM J Math Anal 29(2):511\u2013546. https:\/\/doi.org\/10.1137\/S0036141095289051","journal-title":"SIAM J Math Anal"},{"issue":"1","key":"525_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-024-67672-9","volume":"14","author":"R Taj","year":"2024","unstructured":"Taj R, Tao F, Kanwal S, Almogren A, Altameem A, Ur Rehman A (2024) A reversible-zero watermarking scheme for medical images. Sci Rep 14(1):1\u201322. https:\/\/doi.org\/10.1038\/s41598-024-67672-9","journal-title":"Sci Rep"},{"key":"525_CR54","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-025-21041-4","author":"KO Tajudeen","year":"2025","unstructured":"Tajudeen KO, Ameen AO, Adeniyi AE (2025) A systematic review on advanced encryption standard cryptography to enhance message security. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-025-21041-4","journal-title":"Multimed Tools Appl"},{"issue":"14","key":"525_CR55","doi-asserted-by":"publisher","first-page":"3938","DOI":"10.1049\/ipr2.12909","volume":"17","author":"R Thabit","year":"2023","unstructured":"Thabit R (2023) A novel blind tamper detection and localization scheme for multiple faces in digital images. IET Image Process 17(14):3938\u20133958. https:\/\/doi.org\/10.1049\/ipr2.12909","journal-title":"IET Image Process"},{"key":"525_CR56","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-025-20684-7","author":"R Thabit","year":"2025","unstructured":"Thabit R et al (2025) Face image authentication scheme based on MTCNN and SLT. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-025-20684-7","journal-title":"Multimed Tools Appl"},{"key":"525_CR57","doi-asserted-by":"publisher","unstructured":"Thabit R, Khoo BE (2014) A new robust reversible watermarking method in the transform domain. LNEE 291. https:\/\/doi.org\/10.1007\/978-981-4585-42-2_19.","DOI":"10.1007\/978-981-4585-42-2_19"},{"key":"525_CR58","doi-asserted-by":"publisher","unstructured":"Tiwari AS, Gupta P, Jain A, Panjwani HV, Malathi G (2022) Face recognition with mask using MTCNN and FaceNet BT\u2014artificial intelligence and technologies. In: Lecture notes in electrical engineering, pp 103\u2013109. https:\/\/doi.org\/10.1007\/978-981-16-6448-9_12","DOI":"10.1007\/978-981-16-6448-9_12"},{"issue":"6","key":"525_CR59","doi-asserted-by":"publisher","first-page":"16447","DOI":"10.1007\/s11042-023-16109-y","volume":"83","author":"A Tiwari","year":"2024","unstructured":"Tiwari A, Srivastava VK (2024) Image watermarking techniques based on Schur decomposition and various image invariant moments: a review. Multimed Tools Appl 83(6):16447\u201316483. https:\/\/doi.org\/10.1007\/s11042-023-16109-y","journal-title":"Multimed Tools Appl"},{"key":"525_CR60","doi-asserted-by":"publisher","unstructured":"Viola P, Jones M (2001) Rapid object detection using a boosted cascade of simple features. In: Proceedings of the 2001 IEEE computer society conference on computer vision and pattern recognition. vol. 1, CVPR 2001, pp 1\u20131. https:\/\/doi.org\/10.1109\/CVPR.2001.990517","DOI":"10.1109\/CVPR.2001.990517"},{"issue":"8","key":"525_CR61","doi-asserted-by":"publisher","first-page":"5262","DOI":"10.1007\/s00034-024-02707-0","volume":"43","author":"D Wei","year":"2024","unstructured":"Wei D, Deng Y (2024) An optimized IWT\u2013DCT watermarking scheme based on multiple matrix decomposition and MOWOA2. Circuits Syst Signal Process 43(8):5262\u20135287. https:\/\/doi.org\/10.1007\/s00034-024-02707-0","journal-title":"Circuits Syst Signal Process"},{"key":"525_CR62","doi-asserted-by":"publisher","unstructured":"Yifan W, Xiao C, Wenyi Z, Guangzhou Z, Yuancheng C (2022) Weak and small face target recognition based on MTCNN network in dynamic platform BT\u2014cyber security intelligence and analytics. In: Cyber security intelligence and analytics. CSIA 2022. Lecture notes on data engineering and communications technologies, pp 129\u2013137. https:\/\/doi.org\/10.1007\/978-3-030-97874-7_16","DOI":"10.1007\/978-3-030-97874-7_16"},{"issue":"10","key":"525_CR63","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/LSP.2016.2603342","volume":"23","author":"K Zhang","year":"2016","unstructured":"Zhang K, Zhang Z, Li Z, Qiao Y (2016) Joint face detection and alignment using multitask cascaded convolutional networks. IEEE Signal Process Lett 23(10):1499\u20131503. https:\/\/doi.org\/10.1109\/LSP.2016.2603342","journal-title":"IEEE Signal Process Lett"},{"key":"525_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102733","volume":"58","author":"Y Zhaoning","year":"2021","unstructured":"Zhaoning Y, Yan L, Tiegang G (2021) A lossless self-recovery watermarking scheme with JPEG-LS compression. J Inf Secur Appl 58:102733. https:\/\/doi.org\/10.1016\/j.jisa.2020.102733","journal-title":"J Inf Secur Appl"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00525-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00525-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00525-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:30:15Z","timestamp":1771518615000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s42400-025-00525-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,19]]},"references-count":64,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["525"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00525-8","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,19]]},"assertion":[{"value":"7 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"122"}}