{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:38:58Z","timestamp":1776926338910,"version":"3.51.2"},"reference-count":32,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065206","type":"journal-article","created":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T03:57:09Z","timestamp":1750996629000},"page":"5021-5046","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Tamper Detection in Multimodal Biometric Templates Using Fragile Watermarking and Artificial Intelligence"],"prefix":"10.32604","volume":"84","author":[{"given":"Fatima Abu","family":"Siryeh","sequence":"first","affiliation":[]},{"given":"Hussein","family":"Alrammahi","sequence":"additional","affiliation":[]},{"given":"Abdullahi","family":"Abdu \u0130brahim","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"166589","DOI":"10.1109\/ACCESS.2020.3022779","article-title":"Digital steganography and watermarking for digital images: a review of current research directions","volume":"8","author":"Evsutin","year":"2020","journal-title":"IEEE Access"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1186\/s13640-019-0462-3","article-title":"A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability","volume":"2019","author":"Rakhmawati","year":"2019","journal-title":"EURASIP J Image Video Process"},{"key":"ref3","first-page":"21","article-title":"Techniques of digital image watermarking: a review","volume":"128","author":"Mehto","year":"2015","journal-title":"Int J Comput Appl"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"101702","DOI":"10.1016\/j.cose.2019.101702","article-title":"ANiTW: a Novel Intelligent Text Watermarking technique for forensic identification of spurious information on social media","volume":"90","author":"Taleby Ahvanooey","year":"2020","journal-title":"Comput Secur"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"74","DOI":"10.3390\/electronics12010074","article-title":"Image watermarking between conventional and learning-based techniques: a literature review","volume":"12","author":"Boujerfaoui","year":"2022","journal-title":"Electronics"},{"key":"ref6","first-page":"632","article-title":"A FRT\u2014SVD based blind medical watermarking technique for telemedicine applications","volume":"296","author":"Borra","year":"2021","journal-title":"Res Anthol Telemed Effic Adopt Impact Healthc Deliv"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"85677","DOI":"10.1109\/ACCESS.2022.3198963","article-title":"A novel multipurpose watermarking scheme capable of protecting and authenticating images with tamper detection and localisation abilities","volume":"10","author":"Sharma","year":"2022","journal-title":"IEEE Access"},{"key":"ref8","series-title":"Proceedings of the 19th International Conference on Evaluation of Novel Approaches to Software Engineering","first-page":"743","article-title":"Secure audio watermarking for multipurpose defensive applications","author":"Masmoudi","year":"2024 Apr 28\u201329"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1540","DOI":"10.1166\/jctn.2021.9614","article-title":"E-passport advanced security technique using biometric information watermarking","volume":"18","author":"Lee","year":"2021","journal-title":"J Comput Theor Nanosci"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"31829","DOI":"10.1007\/s11042-023-16843-3","article-title":"A review of image watermarking for identity protection and verification","volume":"83","author":"Sharma","year":"2023","journal-title":"Multimed Tools Appl"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"30165","DOI":"10.1007\/s11042-020-08801-0","article-title":"Watermarking techniques for medical data authentication: a survey","volume":"80","author":"Anand","year":"2020","journal-title":"Multimed Tools Appl"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1016\/j.patrec.2020.07.009","article-title":"Security in smart cities: a brief review of digital forensic schemes for biometric data","volume":"138","author":"Ross","year":"2020","journal-title":"Pattern Recognit Lett"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1016\/j.ins.2018.02.060","article-title":"A novel CNN based security guaranteed image watermarking generation scenario for smart city applications","volume":"479","author":"Li","year":"2019","journal-title":"Inf Sci"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.neucom.2022.02.083","article-title":"A comprehensive survey on robust image watermarking","volume":"488","author":"Wan","year":"2022","journal-title":"Neurocomputing"},{"key":"ref15","series-title":"2013 IEEE 9th International Colloquium on Signal Processing and its Applications","first-page":"235","article-title":"Properties of digital image watermarking","author":"Abdullatif","year":"2013 Mar 8\u201310"},{"key":"ref16","series-title":"Proceedings of the 2021 IEEE International Conference on Computing (ICOCO)","first-page":"186","article-title":"Real-time behavioral biometric information security system for assessment fraud detection","author":"Subash","year":"2021 Nov 17\u201319"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.comcom.2022.02.023","article-title":"Survey on watermarking methods in the artificial intelligence domain and beyond","volume":"188","author":"Amrit","year":"2022","journal-title":"Comput Commun"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"1744","DOI":"10.3390\/electronics10141744","article-title":"Secure watermarking schemes and their approaches in the IoT technology: an overview","volume":"10","author":"Wazirali","year":"2021","journal-title":"Electronics"},{"key":"ref19","first-page":"102820","article-title":"Mapping based residual convolution neural network for non-embedding and blind image watermarking","volume":"59","author":"Wang","year":"2021","journal-title":"J Inf Secur Appl"},{"key":"ref20","series-title":"Proceedings of the 2017 International Conference on Inventive Systems and Control (ICISC)","first-page":"1","article-title":"A literature survey on various watermarking techniques","author":"Usha Nandini","year":"2017 Jan 19\u201320"},{"key":"ref21","series-title":"Proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET 2015)","first-page":"1","article-title":"Literature review on digital image watermarking","author":"Rani","year":"2015 Mar 6"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"110","DOI":"10.3390\/info11020110","article-title":"Digital image watermarking techniques: a review","volume":"11","author":"Begum","year":"2020","journal-title":"Information"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1891","DOI":"10.3390\/app8101891","article-title":"A survey on robust video watermarking algorithms for copyright protection","volume":"8","author":"Yu","year":"2018","journal-title":"Appl Sci"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"8011","DOI":"10.1109\/ACCESS.2018.2796585","article-title":"A review of text watermarking: theory, methods, and applications","volume":"6","author":"Kamaruddin","year":"2018","journal-title":"IEEE Access"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"102805","DOI":"10.1016\/j.dsp.2020.102805","article-title":"Robust and reliable image copyright protection scheme using downsampling and block transform in integer wavelet domain","volume":"106","author":"Zhang","year":"2020","journal-title":"Digit Signal Process"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"116523","DOI":"10.1016\/j.image.2021.116523","article-title":"Watermarking schemes for digital images: robustness overview","volume":"100","author":"Evsutin","year":"2022","journal-title":"Signal Process Image Commun"},{"key":"ref27","first-page":"23","article-title":"Attacking image watermarking and steganography\u2014a survey","volume":"11","author":"Hosam","year":"2019","journal-title":"Int J Inf Technol Comput Sci"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1673","DOI":"10.1109\/83.650120","article-title":"Secure spread spectrum watermarking for multimedia","author":"Cox","year":"1997","journal-title":"IEEE Trans Image Process"},{"key":"ref29","doi-asserted-by":"crossref","unstructured":"Ramakrishnan S. Introductory chapter: digital image and video watermarking and steganography [Internet]. London, UK: IntechOpen; 2019. doi:10.5772\/intechopen.84984.","DOI":"10.5772\/intechopen.84984"},{"key":"ref30","series-title":"Proceedings of the 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery","first-page":"437","article-title":"Robust image watermarking scheme based on 3D-DCT","author":"Fu","year":"2009 Aug 14\u201316"},{"key":"ref31","series-title":"Proceedings of the 5th International Conference on Computer Sciences and Convergence Information Technology","first-page":"1011","article-title":"A recoverable watermarking for authentication using Singular Value Decomposition","author":"Kil-Sang","year":"2010 Nov 30\u2013Dec 2"},{"key":"ref32","first-page":"28","article-title":"FTG: score-based black-box watermarking by fragile trigger generation for deep model integrity verification","volume":"2","author":"Yin","year":"2024","journal-title":"J Inf Intell"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_65206\/TSP_CMC_65206.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:26Z","timestamp":1776923126000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63154"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":32,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065206","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-03-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-28","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}