{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:00:02Z","timestamp":1773615602651,"version":"3.50.1"},"reference-count":19,"publisher":"Allerton Press","issue":"3","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.3103\/s0146411624700202","type":"journal-article","created":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T08:02:01Z","timestamp":1719475321000},"page":"326-335","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Binary Wavelet Transform-Based Financial Text Image Authentication Algorithm"],"prefix":"10.3103","volume":"58","author":[{"family":"Wenjin Wang","sequence":"first","affiliation":[]},{"given":"Miaomiao","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Xuanling","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2024,6,27]]},"reference":[{"key":"7706_CR1","doi-asserted-by":"publisher","unstructured":"Kota, S. and Pal, R., Detecting tampered cheque images in cheque truncation system using difference expansion based watermarking, 2014 IEEE Int. Advance Computing Conf. (IACC), Gurgaon, India, 2014, IEEE, 2014, pp.\u00a01041\u20131047. https:\/\/doi.org\/10.1109\/iadcc.2014.6779469","DOI":"10.1109\/iadcc.2014.6779469"},{"key":"7706_CR2","doi-asserted-by":"publisher","unstructured":"Gonge, S.S. and Ghatol, A., A robust and secure DWT-SVD digital image watermarking using encrypted watermark for copyright protection of cheque image, Security in Computing and Communications. SSCC 2015, Abawajy, J., Mukherjea, S., Thampi, S., and Ruiz-Mart\u00ednez, A., Eds., Communications in Computer and Information Science, vol. 536, Springer, 2015, pp. 290\u2013303. https:\/\/doi.org\/10.1007\/978-3-319-22915-7_28","DOI":"10.1007\/978-3-319-22915-7_28"},{"key":"7706_CR3","doi-asserted-by":"publisher","first-page":"3221","DOI":"10.1007\/s12652-019-01500-1","volume":"11","author":"A. Mohanarathinam","year":"2020","unstructured":"Mohanarathinam, A., Kamalraj, S., Prasanna Venkatesan, G.K.D., Ravi, R.V., and Manikandababu, C.S., Digital watermarking techniques for image security: A review, J. Ambient Intell. Hum.ized Comput., 2020, vol. 11, no. 8, pp. 3221\u20133229. https:\/\/doi.org\/10.1007\/s12652-019-01500-1","journal-title":"J. Ambient Intell. Hum.ized Comput."},{"key":"7706_CR4","doi-asserted-by":"publisher","first-page":"3597","DOI":"10.1007\/s11042-017-5222-8","volume":"77","author":"C. Kumar","year":"2018","unstructured":"Kumar, C., Singh, A.K., and Kumar, P., A recent survey on image watermarking techniques and its application in e-governance, Multimedia Tools Appl., 2018, vol. 77, no. 3, pp. 3597\u20133622. https:\/\/doi.org\/10.1007\/s11042-017-5222-8","journal-title":"Multimedia Tools Appl."},{"key":"7706_CR5","doi-asserted-by":"publisher","first-page":"115725","DOI":"10.1016\/j.image.2019.115725","volume":"81","author":"J. Molina-Garcia","year":"2020","unstructured":"Molina-Garcia, J., Garcia-Salgado, B.P., Ponomaryov, V., Reyes-Reyes, R., Sadovnychiy, S., and Cruz-Ramos, C., An effective fragile watermarking scheme for color image tampering detection and self-recovery, Signal Process.: Image Commun., 2020, vol. 81, p. 115725. https:\/\/doi.org\/10.1016\/j.image.2019.115725","journal-title":"Signal Process.: Image Commun."},{"key":"7706_CR6","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/tcsvt.2019.2903432","volume":"30","author":"Yu. Yeung","year":"2019","unstructured":"Yeung, Yu., Lu, W., Xue, Yi., Huang, J., and Shi, Yu.-Q., Secure binary image steganography with distortion measurement based on prediction, IEEE Trans. Circuits Syst. Video Technol., 2019, vol. 30, no. 5, pp. 1423\u20131434. https:\/\/doi.org\/10.1109\/tcsvt.2019.2903432","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"7706_CR7","doi-asserted-by":"publisher","first-page":"1608","DOI":"10.1109\/tcsvt.2018.2852702","volume":"29","author":"W. Lu","year":"2018","unstructured":"Lu, W., He, L., Yeung, Yu., Xue, Yi., Liu, H., and Feng, B., Secure binary image steganography based on fused distortion measurement, IEEE Trans. Circuits Syst. Video Technol., 2018, vol. 29, no. 6, pp. 1608\u20131618. https:\/\/doi.org\/10.1109\/tcsvt.2018.2852702","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"7706_CR8","doi-asserted-by":"publisher","first-page":"25079","DOI":"10.1007\/s11042-019-7731-0","volume":"78","author":"Yu. Yeung","year":"2019","unstructured":"Yeung, Yu., Lu, W., Xue, Yi., Chen, J., and Li, R., Secure binary image steganography based on LTP distortion minimization, Multimedia Tools Appl., 2019, vol. 78, no. 17, pp. 25079\u201325100. https:\/\/doi.org\/10.1007\/s11042-019-7731-0","journal-title":"Multimedia Tools Appl."},{"key":"7706_CR9","doi-asserted-by":"publisher","first-page":"3081","DOI":"10.1109\/tcsvt.2019.2936028","volume":"30","author":"W. Lu","year":"2019","unstructured":"Lu, W., Li, R., Zeng, L., Chen, J., Huang, J., and Shi, Yu.-Q., Binary image steganalysis based on histogram of structuring elements, IEEE Trans. Circuits Syst. Video Technol., 2019, vol. 30, no. 9, pp. 3081\u20133094. https:\/\/doi.org\/10.1109\/tcsvt.2019.2936028","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"7706_CR10","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.aci.2018.06.003","volume":"15","author":"R.A. Alotaibi","year":"2019","unstructured":"Alotaibi, R.A. and Elrefaei, L.A., Text-image watermarking based on integer wavelet transform (IWT) and discrete cosine transform (DCT), Appl. Comput. Inf., 2019, vol. 15, no. 2, pp. 191\u2013202. https:\/\/doi.org\/10.1016\/j.aci.2018.06.003","journal-title":"Appl. Comput. Inf."},{"key":"7706_CR11","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1007\/s13369-015-1596-y","volume":"40","author":"L. Laouamer","year":"2015","unstructured":"Laouamer, L. and Tayan, O., A semi-blind robust DCT watermarking approach for sensitive text images, Arabian J. Sci. Eng., 2015, vol. 40, no. 4, pp. 1097\u20131109. https:\/\/doi.org\/10.1007\/s13369-015-1596-y","journal-title":"Arabian J. Sci. Eng."},{"key":"7706_CR12","unstructured":"Kwon, O.-J., Kim, W.-G., and Kim, Yo., Binary image watermarking with tampering localization in binary wavelet transform domain, Int. J. Multimedia Ubiquitous Eng., 2012, vol. 7, no. 2, pp. 341\u2013346. https:\/\/www.earticle.net\/Article\/A202156."},{"key":"7706_CR13","doi-asserted-by":"crossref","unstructured":"Li, J. and Wu, F., Robust watermarking for text images based on Arnold scrambling and DWT-DFT, Proc. 2013 Int. Conf. on Mechatronic Sciences, Electric Engineering and Computer (MEC), Shengyang, China, 2013, IEEE, 2013, pp. 1182\u20131186.","DOI":"10.1109\/MEC.2013.6885244"},{"key":"7706_CR14","unstructured":"Cao, H. and Kot, A.C., EAG: Edge adaptive grid data hiding for binary image authentication, Proc. 2012 Asia Pacific Signal and Information Processing Assoc. Annu. Summit and Conf., Hollywood, Calif., 2012, IEEE, 2012, pp. 1\u20136."},{"key":"7706_CR15","doi-asserted-by":"publisher","unstructured":"Chen, F., Qin, Ya., and He, H., Multi-block dependency based watermarking scheme for binary-text image authentication, Signal and Information Processing Assoc. Annu. Summit and Conf. (APSIPA), \n               2014 \n               Asia-Pacific, Siem Reap, Cambodia, 2014, IEEE, 2014, pp. 1\u20135. https:\/\/doi.org\/10.1109\/apsipa.2014.7041611","DOI":"10.1109\/apsipa.2014.7041611"},{"key":"7706_CR16","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.3934\/mbe.2019110","volume":"16","author":"W. Qi","year":"2019","unstructured":"Qi, W., Guo, W., Zhang, T., Liu, Yu., Guo, Z., and Fang, X., Robust authentication for paper-based text documents based on text watermarking technology, Math. Biosci. Eng., 2019, vol. 16, no. 4, pp. 2233\u20132249. https:\/\/doi.org\/10.3934\/mbe.2019110","journal-title":"Math. Biosci. Eng."},{"key":"7706_CR17","doi-asserted-by":"publisher","first-page":"13189","DOI":"10.1007\/s11042-018-5771-5","volume":"78","author":"L. Tan","year":"2019","unstructured":"Tan, L., Hu, K., Zhou, X., Chen, R., and Jiang, W., Print-scan invariant text image watermarking for hardcopy document authentication, Multimedia Tools Appl., 2019, vol. 78, no. 10, pp. 13189\u201313211. https:\/\/doi.org\/10.1007\/s11042-018-5771-5","journal-title":"Multimedia Tools Appl."},{"key":"7706_CR18","doi-asserted-by":"publisher","unstructured":"Dubey, P., Kanumuri, T., and Vyas, R., Palmprint recognition using binary wavelet transform and LBP representation, 2017 Int. Conf. on Recent Innovations in Signal processing and Embedded Systems (RISE), Bhopal, India, 2017, IEEE, 2017, pp. 201\u2013205. https:\/\/doi.org\/10.1109\/rise.2017.8378154","DOI":"10.1109\/rise.2017.8378154"},{"key":"7706_CR19","unstructured":"Li, Q. and Xu, X., Fast target detection of surface ship based on improved YOLOV3-tiny, Comput. Eng., 2021, vol. 47, no. 10, pp. 283\u2013289, 297."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700202.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700202","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700202.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:02:06Z","timestamp":1773612126000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["7706"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700202","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]},"assertion":[{"value":"20 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"We all declare that we have no conflict of interest in this paper.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}