{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T12:09:34Z","timestamp":1772107774197,"version":"3.50.1"},"reference-count":60,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063866","type":"journal-article","created":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T05:18:58Z","timestamp":1748236738000},"page":"887-918","source":"Crossref","is-referenced-by-count":2,"title":["A Robust Image Watermarking Based on DWT and RDWT Combined with M\u00f6bius Transformations"],"prefix":"10.32604","volume":"84","author":[{"given":"Atheer","family":"Alrammahi","sequence":"first","affiliation":[]},{"given":"Hedieh","family":"Sajedi","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"2012 International Conference on Informatics, Electronics & Vision (ICIEV)","first-page":"1136","article-title":"On the robustness and security of digital image watermarking","author":"Nyeem","year":"2012 May 18\u201319"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"164562","DOI":"10.1016\/j.ijleo.2020.164562","article-title":"A robust blind color image watermarking based on Fourier transform domain","volume":"208","author":"Fares","year":"2020","journal-title":"Optik"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1007\/s11042-013-1405-0","article-title":"Feature extraction and local Zernike moments based geometric invariant watermarking","volume":"72","author":"Yuan","year":"2014","journal-title":"Multimed Tools Appl"},{"key":"ref4","first-page":"807","author":"Araghi","year":"2021","journal-title":"Innovative systems for intelligent health informatics"},{"key":"ref5","first-page":"20","article-title":"Taxonomy and performance evaluation of feature-based extraction techniques in digital image watermarking","volume":"3","author":"Araghi","year":"2016","journal-title":"Int J Image Process Tech"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1186\/1687-6180-2012-97","article-title":"Local distortion resistant image watermarking relying on salient feature extraction","volume":"2012","author":"Nikolaidis","year":"2012","journal-title":"EURASIP J Adv Signal Process"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"37479","DOI":"10.1007\/s11042-023-15001-z","article-title":"A robust and secure fusion-based hybrid medical image watermarking approach using RDWT-DWT-MSVD with hyperchaotic system-Fibonacci Q matrix encryption","volume":"82","author":"Sajeer","year":"2023","journal-title":"Multimed Tools Appl"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/j.ins.2017.07.026","article-title":"A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection","volume":"417","author":"Makbol","year":"2017","journal-title":"Inf Sci"},{"key":"ref9","series-title":"2024 10th International Conference on Artificial Intelligence and Robotics (QICAR)","first-page":"208","article-title":"Robust and secure watermarking of medical images using M\u00f6bius transforms","author":"Al-Rammahi","year":"2024 Feb 29"},{"key":"ref10","first-page":"1921","article-title":"Enhancing image watermarking: an innovative multi-objective genetic algorithm-based DWT-SVD approach for robustness and imperceptibility","volume":"14","author":"Al-Khafaji","year":"2024","journal-title":"Int J Saf Secur Eng"},{"key":"ref11","series-title":"2017 25th Signal Processing and Communications Applications Conference (SIU)","first-page":"1","article-title":"Colour image watermarking based on wavelet and QR decomposition","author":"Rasti","year":"2017 May 15\u201318"},{"key":"ref12","first-page":"911","article-title":"A secure and robust block-based DWT-SVD image watermarking approach","volume":"38","author":"Singh","year":"2017","journal-title":"J Inf Optim Sci"},{"key":"ref13","first-page":"144","article-title":"Hybrid secure and robust image watermarking scheme based on SVD and sharp frequency localized contourlet transform","volume":"44","author":"Najafi","year":"2019","journal-title":"J Inf Secur Appl"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"77","DOI":"10.3390\/sym10030077","article-title":"A robust image watermarking technique based on DWT, APDCBT, and SVD","volume":"10","author":"Zhou","year":"2018","journal-title":"Symmetry"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"80849","DOI":"10.1109\/ACCESS.2019.2915596","article-title":"An optimized image watermarking method based on HD and SVD in DWT domain","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"5856","DOI":"10.1016\/j.jksuci.2021.07.012","article-title":"A hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition","volume":"34","author":"Begum","year":"2022","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"310","DOI":"10.3390\/info12080310","article-title":"Image watermarking approach using a hybrid domain based on performance parameter analysis","volume":"12","author":"Srivastava","year":"2021","journal-title":"Information"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"e223","DOI":"10.1002\/spy2.223","article-title":"Blind watermarking algorithm combining NSCT, DWT, SVD, and HVS","volume":"5","author":"Zeng","year":"2022","journal-title":"Secur Priv"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.cag.2020.09.011","article-title":"Bounded biharmonic blending of M\u00f6bius transformations for flexible omnidirectional image rectification","volume":"93","author":"Souto Ferreira","year":"2020","journal-title":"Comput Graph"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"025016","DOI":"10.1088\/2632-2153\/abd615","article-title":"Data augmentation with M\u00f6bius transformations","volume":"2","author":"Zhou","year":"2021","journal-title":"Mach Learn Sci Technol"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1016\/j.aej.2023.07.068","article-title":"Robust watermarking method for securing color medical images using Slant-SVD-QFT transforms and OTP encryption","volume":"78","author":"Eltoukhy","year":"2023","journal-title":"Alex Eng J"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s40747-024-01723-6","article-title":"Dual medical image watermarking using SRU-enhanced network and EICC chaotic map","volume":"11","author":"Yan","year":"2024","journal-title":"Complex Intell Syst"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.neucom.2022.02.083","article-title":"A comprehensive survey on robust image watermarking","volume":"488","author":"Wan","year":"2022","journal-title":"Neurocomputing"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"154998","DOI":"10.1016\/j.aeue.2023.154998","article-title":"Secure blind watermarking using fractional-order Lorenz system in the frequency domain","volume":"173","author":"AbdElHaleem","year":"2024","journal-title":"AEU Int J Electron Commun"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1016\/j.patrec.2021.08.015","article-title":"A fast and efficient image watermarking scheme based on deep neural network","volume":"151","author":"Mellimi","year":"2021","journal-title":"Pattern Recognit Lett"},{"key":"ref26","first-page":"4691","article-title":"Robust blind DWT-based digital image watermarking using singular value decomposition","volume":"8","author":"Danyali","year":"2012","journal-title":"Int J Innov Comput Inf Control"},{"key":"ref27","first-page":"147","article-title":"Comparison of digital image watermarking methods DWT & DWT-DCT on the basis of PSNR","volume":"1","author":"Chaturvedi","year":"2012","journal-title":"Int J Innov Res Sci Eng Technol"},{"key":"ref28","first-page":"15","article-title":"Blind wavelet-based image watermarking","volume":"4","author":"Abdallah","year":"2011","journal-title":"Int J Signal Process Image Process Pattern Recognit"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1080\/18756891.2015.1001958","article-title":"Discrete wavelet transform-based color image watermarking using uncorrelated color space and artificial bee colony","volume":"8","author":"Gupta","year":"2015","journal-title":"Int J Comput Intell Syst"},{"key":"ref30","first-page":"361","author":"Araghi","year":"2018","journal-title":"Proceedings of the 2nd International Conference of Reliable Information and Communication Technology (IRICT 2017). Lecture Notes in Data Engineering and Communications Technologies"},{"key":"ref31","first-page":"211","article-title":"A RDWT and block-SVD based dual watermarking scheme for digital images","volume":"8","author":"Gaur","year":"2017","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref32","series-title":"Proceedings of the 2006 International Conference on Image Processing, Computer Vision & Pattern Recognition (IPCV 2006)","first-page":"191","article-title":"Redundant wavelet transform in video signal processing","author":"Cui","year":"2006 Jun 26\u201319"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/s42979-023-02136-x","article-title":"An adaptive block-based watermarking scheme using RDWT-SVD and particle swarm optimization","volume":"4","author":"Gaur","year":"2023","journal-title":"SN Comput Sci"},{"key":"ref34","first-page":"291","author":"Zimmermann","year":"2006","journal-title":"Topics in multivariate approximation and interpolation"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1145\/2766916","article-title":"Close-to-conformal deformations of volumes","volume":"34","author":"Chern","year":"2015","journal-title":"ACM Trans Graph"},{"key":"ref36","first-page":"779","article-title":"How conics govern M\u00f6bius transformations","volume":"111","author":"Frantz","year":"2004","journal-title":"Am Math Mon"},{"key":"ref37","first-page":"409","article-title":"The fixed points of M\u00f6bius transformation","volume":"72","author":"Pawar","year":"2023","journal-title":"Math Stat Eng Appl"},{"key":"ref38","unstructured":"SIPI (USC Signal and Image Processing Institute). The USC-SIPI image database 2005 [Internet]. [cited 2025 Jan 5]. Available from: http:\/\/sipi.usc.edu\/services\/database\/database.html."},{"key":"ref39","doi-asserted-by":"crossref","first-page":"1395","DOI":"10.1016\/j.jksuci.2019.07.004","article-title":"High fidelity-based reversible data hiding using modified LSB matching and pixel difference","volume":"34","author":"Sahu","year":"2022","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"72465","DOI":"10.1109\/ACCESS.2021.3079319","article-title":"Robust and secure digital image watermarking technique using Arnold transform and memristive chaotic oscillators","volume":"9","author":"Sehra","year":"2021","journal-title":"IEEE Access"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"103062","DOI":"10.1016\/j.dsp.2021.103062","article-title":"Blind and safety-enhanced dual watermarking algorithm with chaotic system encryption based on RHFM and DWT-DCT","volume":"115","author":"Li","year":"2021","journal-title":"Digit Signal Process"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"109626","DOI":"10.1016\/j.optlastec.2023.109626","article-title":"A new image encryption method based on memristive hyperchaos","volume":"166","author":"Lai","year":"2023","journal-title":"Opt Laser Technol"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.matcom.2022.07.030","article-title":"A cluster of 1D quadratic chaotic map and its applications in image encryption","volume":"204","author":"Liu","year":"2023","journal-title":"Math Comput Simul"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"37855","DOI":"10.1109\/ACCESS.2021.3063237","article-title":"A new image encryption algorithm for grey and color medical images","volume":"9","author":"Kamal","year":"2021","journal-title":"IEEE Access"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"3877","DOI":"10.3390\/e17063877","article-title":"A colour image encryption scheme using permutation-substitution based on chaos","volume":"17","author":"Wang","year":"2015","journal-title":"Entropy"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"100487","DOI":"10.1016\/j.eij.2024.100487","article-title":"Efficient and secure color image encryption system with enhanced speed and robustness based on binary tree","volume":"27","author":"Elmenyawi","year":"2024","journal-title":"Egypt Inform J"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"3895","DOI":"10.1007\/s11042-023-15554-z","article-title":"Analysis and effectiveness of deeper levels of SVD on performance of hybrid DWT and SVD watermarking","volume":"83","author":"Araghi","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"6618382","DOI":"10.1155\/2024\/6618382","article-title":"Image robust watermarking method based on DWT-SVD transform and chaotic map","volume":"2024","author":"Wu","year":"2024","journal-title":"Complexity"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"24823","DOI":"10.1007\/s11042-021-10712-7","article-title":"A lossless DWT-SVD domain watermarking for medical information security","volume":"80","author":"Zermi","year":"2021","journal-title":"Multimed Tools Appl"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"35231","DOI":"10.1109\/ACCESS.2024.3368528","article-title":"Towards achieving a trade-off for SVD-based image watermarking using Mojette transform","volume":"12","author":"Marjuni","year":"2024","journal-title":"IEEE Access"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"3249","DOI":"10.1007\/s00371-023-03028-0","article-title":"Robust watermarking based on Schur decomposition and dynamic weighting factors","volume":"40","author":"Nasser","year":"2024","journal-title":"Vis Comput"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1007\/s11760-024-03182-5","article-title":"Robust watermarking with PSO and DnCNN","volume":"18","author":"Amiri","year":"2024","journal-title":"Signal Image Video Process"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"2802","DOI":"10.1007\/s00034-024-02946-1","article-title":"Robust image watermarking based on hybrid transform and position-adaptive selection","volume":"44","author":"Liu","year":"2025","journal-title":"Circuits Syst Signal Process"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"74","DOI":"10.3390\/electronics12010074","article-title":"Image watermarking between conventional and learning-based techniques: a literature review","volume":"12","author":"Boujerfaoui","year":"2023","journal-title":"Electronics"},{"key":"ref55","first-page":"103312","article-title":"Statistical image watermark decoder using NSM-HMT in NSCT-FGPCET magnitude domain","volume":"69","author":"Wang","year":"2022","journal-title":"J Inf Secur Appl"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.ins.2020.11.020","article-title":"Double-encrypted watermarking algorithm based on cosine transform and fractional Fourier transform in invariant wavelet domain","volume":"551","author":"Li","year":"2021","journal-title":"Inf Sci"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1016\/j.aeue.2015.12.003","article-title":"ROI-based robust and secure image watermarking using DWT and Arnold map","volume":"70","author":"Keshavarzian","year":"2016","journal-title":"AEU Int J Electron Commun"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1016\/j.neucom.2015.09.082","article-title":"Robust image watermarking approach using polar harmonic transforms-based geometric correction","volume":"174","author":"Wang","year":"2016","journal-title":"Neurocomputing"},{"key":"ref59","first-page":"103840","article-title":"ZIRCON: zero-watermarking-based approach for data integrity and secure provenance in IoT networks","volume":"85","author":"Faraj","year":"2024","journal-title":"J Inf Secur Appl"},{"key":"ref60","unstructured":"Gao G, Xu T, Hua F. Robust image watermarking based on generative adversarial networks for copyright protection. [cited 2025 Jan 5]. Available from: 10.21203\/rs.3.rs-4039149\/v1."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-1\/TSP_CMC_63866\/TSP_CMC_63866.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:34:41Z","timestamp":1763343281000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n1\/61751"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":60,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063866","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}