{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:32:24Z","timestamp":1775838744095,"version":"3.50.1"},"reference-count":45,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064971","type":"journal-article","created":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T04:23:46Z","timestamp":1747369426000},"page":"491-512","source":"Crossref","is-referenced-by-count":2,"title":["Image Watermarking Algorithm Base on the Second Order Derivative and Discrete Wavelet Transform"],"prefix":"10.32604","volume":"84","author":[{"given":"Maazen","family":"Alsabaan","sequence":"first","affiliation":[]},{"given":"Zaid Bin","family":"Faheem","sequence":"additional","affiliation":[]},{"given":"Yuanyuan","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Jehad","family":"Ali","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"108979","DOI":"10.1016\/j.compeleceng.2023.108979","article-title":"An edge inspired image watermarking approach using compass edge detector and LSB in cybersecurity","volume":"111","author":"Faheem","year":"2023","journal-title":"Comput Electr Eng"},{"key":"ref2","first-page":"331","article-title":"Artificial intelligence based watermarking in hybrid DDS domain for security of colour images","volume":"8","author":"Sharma","year":"2020","journal-title":"Int J Intell Eng Inform"},{"key":"ref3","first-page":"691","article-title":"An adaptive image watermarking method combining SVD and Wang-Landau sampling in DWT domain","volume":"8","author":"Wang","year":"2020","journal-title":"Mathmatics"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"117134","DOI":"10.1016\/j.eswa.2022.117134","article-title":"A high-capacity QRD-based blind color image watermarking algorithm incorporated with AI technologies","volume":"199","author":"Hsu","year":"2022","journal-title":"Expert Syst Appl"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"20","DOI":"10.3390\/cryptography7020020","article-title":"Protecting digital images using keys enhanced by 2D chaotic logistic maps","volume":"7","author":"Abu-Faraj","year":"2023","journal-title":"Cryptography"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"2374","DOI":"10.3390\/math9192374","article-title":"Imperceptible-visible watermarking to information security tasks in color imaging","volume":"9","author":"Juarez-Sandoval","year":"2021","journal-title":"Mathematics"},{"key":"ref7","first-page":"101790","article-title":"TCBR and TCBD: evaluation metrics for tamper coincidence problem in fragile image watermarking","volume":"56","author":"Aminuddin","year":"2024","journal-title":"Eng Sci Technol"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"8724","DOI":"10.3390\/app12178724","article-title":"Digital watermarking system for copyright protection and authentication of images using cryptographic techniques","volume":"12","author":"Sanivarapu","year":"2022","journal-title":"Appl Sci"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1210","DOI":"10.3390\/s23031210","article-title":"Image watermarking using least significant bit and canny edge detection","volume":"23","author":"Faheem","year":"2023","journal-title":"Sensors"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1795","DOI":"10.3390\/math9151795","article-title":"Improving DFT-based image watermarking using particle swarm optimization algorithm","volume":"9","author":"Cedillo-Hernandez","year":"2021","journal-title":"Mathematics"},{"key":"ref11","first-page":"116523","article-title":"Watermarking schemes for digital images: robustness overview","volume":"100","author":"Evsutin","year":"2022","journal-title":"Signal Processing: Image Commun"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"30365","DOI":"10.1007\/s11042-022-12756-9","article-title":"Robust DFT watermarking method with gray component replacement masking","volume":"81","author":"Poljicak","year":"2022","journal-title":"Multimed Tools Appl"},{"key":"ref13","first-page":"102424","article-title":"Red-cyan anaglyph image watermarking using DWT, Hadamard transform and singular value decomposition for copyright protection","volume":"50","author":"Devi","year":"2020","journal-title":"J Inf Secur Appl"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1016\/j.ins.2021.06.032","article-title":"A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT","volume":"574","author":"Wang","year":"2021","journal-title":"Inf Scis"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"435","DOI":"10.3390\/electronics13020435","article-title":"A robust zero-watermarking scheme in spatial domain by achieving features similar to frequency domain","volume":"13","author":"Ali","year":"2024","journal-title":"Electronics"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"886","DOI":"10.1109\/TPAMI.2007.1027","article-title":"Laplacian operator-based edge detectors","volume":"29","author":"Wang","year":"2007","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1951","DOI":"10.1109\/TMM.2020.3006415","article-title":"An automated and robust image watermarking scheme based on deep neural networks","volume":"23","author":"Zhong","year":"2020","journal-title":"IEEE Trans Multimed"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"8974","DOI":"10.1109\/ACCESS.2022.3143801","article-title":"Region-based hybrid medical image watermarking scheme for robust and secured transmission in IoMT","volume":"10","author":"Singh","year":"2022","journal-title":"IEEE Access"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.jksuci.2016.12.004","article-title":"An imperceptible spatial domain color image watermarking scheme","volume":"31","author":"Abraham","year":"2019","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"13001","DOI":"10.1007\/s11042-016-3706-6","article-title":"DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection","volume":"76","author":"Singh","year":"2017","journal-title":"Multimed Tools Appl"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"25709","DOI":"10.1007\/s11042-018-5814-y","article-title":"Robust hybrid watermarking techniques for different color imaging systems","volume":"77","author":"Al-Afandy","year":"2018","journal-title":"Multimed Tools Appl"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/j.patrec.2021.02.011","article-title":"Machine learning based blind color image watermarking scheme for copyright protection","volume":"145","author":"Sinhal","year":"2021","journal-title":"Pattern Recognit Lett"},{"key":"ref23","first-page":"28","article-title":"A new DCT-based robust image watermarking method using teaching-learning-based optimization","volume":"47","author":"Moosazadeh","year":"2019","journal-title":"J Inf Secur Appl"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1701","DOI":"10.1007\/s10489-020-01903-0","article-title":"An intelligent and blind dual color image watermarking for authentication and copyright protection","volume":"51","author":"Ahmadi","year":"2021","journal-title":"Appl Intell"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"119284","DOI":"10.1109\/ACCESS.2023.3326848","article-title":"R3\u2014rescale, rotate, and randomize: a novel image cryptosystem utilizing chaotic and hyper-chaotic systems","volume":"11","author":"Gabr","year":"2023","journal-title":"IEEE Access"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.3390\/sym15051081","article-title":"Hyperchaotic maps and the single neuron model: a novel framework for chaos-based image encryption","volume":"15","author":"Alexan","year":"2023","journal-title":"Symmetry"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"51018","DOI":"10.1109\/ACCESS.2023.3279028","article-title":"A hybrid SVD-based image watermarking scheme utilizing both U and V orthogonal vectors for robustness and imperceptibility","volume":"11","author":"Teoh","year":"2023","journal-title":"IEEE Access"},{"key":"ref28","first-page":"1900","article-title":"A robust watermarking scheme based on DWT and DCT using image gradient","volume":"13","author":"Mokhnache","year":"2018","journal-title":"Int J Appl Eng Res"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s12530-021-09369-2","article-title":"Neural network based CT-Canny edge detector considering watermarking framework","volume":"13","author":"Kazemi","year":"2022","journal-title":"Evolv Syst"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"619","DOI":"10.4218\/etrij.2019-0138","article-title":"Highly dispersive substitution box (S-box) design using chaos","volume":"42","author":"Bin Faheem","year":"2020","journal-title":"ETRI J"},{"key":"ref31","series-title":"2010 20th International Conference on Pattern Recognition","first-page":"2366","article-title":"Image quality metrics: PSNR vs. SSIM","author":"Hore","year":"2010"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"1888","DOI":"10.1109\/TMM.2014.2340695","article-title":"Normalized correlation-based quantization modulation for robust watermarking","volume":"16","author":"Zhu","year":"2014","journal-title":"IEEE Trans Multimed"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"32","DOI":"10.3390\/a17010032","article-title":"Image watermarking using discrete wavelet transform and singular value decomposition for enhanced imperceptibility and robustness","volume":"17","author":"Begum","year":"2024","journal-title":"Algorithms"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.ins.2020.11.020","article-title":"Double-encrypted watermarking algorithm based on cosine transform and fractional Fourier transform in invariant wavelet domain","volume":"551","author":"Li","year":"2021","journal-title":"Inf Sci"},{"key":"ref35","first-page":"103312","article-title":"Statistical image watermark decoder using NSM-HMT in NSCT-FGPCET magnitude domain","volume":"69","author":"Wang","year":"2022","journal-title":"J Inf Secur Appl"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1007\/s11082-023-04784-y","article-title":"A novel robust and more secure blind image watermarking for optical remote sensing using DWT-SVD and chaotic maps","volume":"55","author":"Heidari","year":"2023","journal-title":"Opt Quantum Electron"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"9710","DOI":"10.1038\/s41598-025-94080-4","article-title":"Enhanced medical image watermarking using hybrid DWT-HMD-SVD and Arnold scrambling","volume":"15","author":"Chaudhary","year":"2025","journal-title":"Sci Rep"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"969","DOI":"10.3390\/sym16080969","article-title":"Chebyshev chaotic mapping and DWT-SVD-based dual watermarking scheme for copyright and integrity authentication of remote sensing images","volume":"16","author":"Zhang","year":"2024","journal-title":"Symmetry"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11042-024-18907-4","article-title":"A robust blockchain-based watermarking using edge detection and wavelet transform","volume":"84","author":"Mannepalli","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"ref40","doi-asserted-by":"crossref","unstructured":"Ahtesham M, Zhong X. Text-guided image invariant feature learning for robust image watermarking. arXiv:2503.13805. 2025. doi:10.1109\/csci62032.2023.00185.","DOI":"10.1109\/MIPR67560.2025.00033"},{"key":"ref41","series-title":"Proceedings of the 31st ACM International Conference on Multimedia","first-page":"7922","article-title":"Practical deep dispersed watermarking with synchronization and fusion","author":"Guo","year":"2023"},{"key":"ref42","series-title":"2024 IEEE 7th International Conference on Multimedia Information Processing and Retrieval (MIPR)","first-page":"376","article-title":"Deep learning-based text-in-image watermarking","author":"Karki","year":"2024"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"1859","DOI":"10.3390\/math12121859","article-title":"A hybrid domain color image watermarking scheme based on hyperchaotic mapping","volume":"12","author":"Dong","year":"2024","journal-title":"Mathematics"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"1755","DOI":"10.1016\/j.jfranklin.2021.11.027","article-title":"Robust image watermarking algorithm based on QWT and QSVD using 2D Chebyshev-Logistic map","volume":"359","author":"Zhang","year":"2022","journal-title":"Franklin Inst"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"29969","DOI":"10.1007\/s11042-023-16649-3","article-title":"Convolutional neural network and 2D logistic-adjusted-Chebyshev-based zero-watermarking of color images","volume":"83","author":"Darwish","year":"2024","journal-title":"Multimed Tools Appl"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-1\/TSP_CMC_64971\/TSP_CMC_64971.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:36:39Z","timestamp":1763343399000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n1\/61774"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":45,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064971","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}