{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:30:44Z","timestamp":1763346644720,"version":"3.45.0"},"reference-count":25,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"vor","delay-in-days":298,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.066160","type":"journal-article","created":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T14:31:34Z","timestamp":1759933894000},"page":"5595-5624","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Modified Watermarking Scheme Using Informed Embedding and Fuzzy c-Means\u2013Based Informed Coding"],"prefix":"10.32604","volume":"85","author":[{"given":"Jyun-Jie","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yin-Chen","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Chi-Chun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"2083","DOI":"10.1109\/JPROC.2005.859599","article-title":"Data-hiding codes","volume":"93","author":"Moulin","year":"2005","journal-title":"Proc IEEE"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"7069","DOI":"10.1109\/TCSVT.2024.3349678","article-title":"Perceptive self-supervised learning network for noisy image watermark removal","volume":"34","author":"Tian","year":"2024","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/LSP.2024.3501285","article-title":"Robust audio watermarking against manipulation attacks based on deep learning","volume":"32","author":"Wen","year":"2024","journal-title":"IEEE Signal Process Lett"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1951","DOI":"10.1109\/TMM.2020.3006415","article-title":"An automated and robust image watermarking scheme based on deep neural networks","volume":"23","author":"Zhong","year":"2020","journal-title":"IEEE Trans Multimed"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MMUL.2024.3423370","article-title":"ConvNet-HIDE: deep-learning-based dual watermarking for health-care images","volume":"31","author":"Amrit","year":"2024","journal-title":"IEEE Multimed"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"804","DOI":"10.1109\/JBHI.2021.3123936","article-title":"Application of robust zero-watermarking scheme based on federated learning for securing the healthcare data","volume":"27","author":"Han","year":"2023","journal-title":"IEEE J Biomed Health Inform"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1594","DOI":"10.1109\/TCSS.2021.3126628","article-title":"Health record security through multiple watermarking on fused medical images","volume":"9","author":"Anand","year":"2022","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"819","DOI":"10.1049\/cje.2020.07.003","article-title":"A secure and privacy-preserving watermark based medical image sharing method","volume":"29","author":"Chen","year":"2020","journal-title":"Chin J Electron"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"121154","DOI":"10.1109\/ACCESS.2021.3108196","article-title":"A residual chaotic system for image security and digital video watermarking","volume":"9","author":"Tong","year":"2021","journal-title":"IEEE Access"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"22378","DOI":"10.1109\/ACCESS.2021.3055771","article-title":"Data authentication and anonymization in IoT scenarios and future 5G networks using chaotic digital watermarking","volume":"9","author":"Bordel","year":"2021","journal-title":"IEEE Access"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"38785","DOI":"10.1109\/ACCESS.2022.3166475","article-title":"Digital watermarking technology based on LDPC code and chaotic sequence","volume":"10","author":"Wang","year":"2022","journal-title":"IEEE Access"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"3056","DOI":"10.1109\/TCE.2023.3286487","article-title":"Using deep learning to embed dual marks with encryption through 3-D chaotic map","volume":"70","author":"Singh","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/MSP.2007.904816","article-title":"Sparse graph codes for side information and binning","volume":"24","author":"Wainwright","year":"2007","journal-title":"IEEE Signal Process Mag"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"792","DOI":"10.1109\/TIP.2003.821551","article-title":"Applying informed coding and embedding to design a robust high-capacity watermark","volume":"13","author":"Miller","year":"2004","journal-title":"IEEE Trans Image Process"},{"key":"ref15","first-page":"6849","article-title":"A robust informed embedding with low complexity of digital watermarking","volume":"8","author":"Wang","year":"2012","journal-title":"Int J Innov Comput Inf Control"},{"author":"Wang","article-title":"A trellis-based informed embedding with linear codes for digital watermarking","series-title":"2011 IEEE 15th International Symposium on Consumer Electronics (ISCE); 2011 Jun 14\u201317; Singapore","key":"ref16"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1109\/TSMC.1987.6499296","article-title":"Convergence theory for fuzzy c-means: counterexamples and repairs","volume":"17","author":"Bezdek","year":"1987","journal-title":"IEEE Trans Syst Man Cybern"},{"year":"2013","author":"Bezdek","journal-title":"Pattern recognition with fuzzy objective function algorithms","key":"ref18"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1016\/j.patrec.2009.09.011","article-title":"Data clustering: 50 years beyond K-means","volume":"31","author":"Jain","year":"2010","journal-title":"Pattern Recognit Lett"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.csda.2006.04.030","article-title":"Data analysis with fuzzy clustering methods","volume":"51","author":"D\u00f6ring","year":"2006","journal-title":"Comput Stat Data Anal"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1109\/TFUZZ.2008.2009458","article-title":"Density-weighted fuzzy c-means clustering","volume":"17","author":"Hathaway","year":"2009","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1109\/TFUZZ.2002.805901","article-title":"Fuzzy clustering with volume prototypes and adaptive cluster merging","volume":"10","author":"Kaymak","year":"2002","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1016\/S0923-5965(02)00010-3","article-title":"Block error-correcting codes for systems with a very high BER: theoretical analysis and application to the protection of watermarks","volume":"17","author":"Desset","year":"2002","journal-title":"Signal Process Image Commun"},{"author":"Lin","article-title":"An efficient algorithm for informed embedding of dirty-paper trellis codes for watermarking","series-title":"IEEE International Conference on Image Processing 2005; 2005 Sep 14; Genova, Italy","key":"ref24"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1109\/PROC.1973.9030","article-title":"The viterbi algorithm","volume":"61","author":"Forney","year":"1973","journal-title":"Proc IEEE"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-3\/TSP_CMC_66160\/TSP_CMC_66160.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:27:15Z","timestamp":1763346435000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n3\/64137"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":25,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.066160","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-03-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-03","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-23","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}