{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T03:54:03Z","timestamp":1776311643150,"version":"3.50.1"},"reference-count":54,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T00:00:00Z","timestamp":1762041600000},"content-version":"vor","delay-in-days":305,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.068885","type":"journal-article","created":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T02:03:02Z","timestamp":1761271382000},"page":"5789-5822","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["Secure and Invisible Dual Watermarking for Digital Content Based on Optimized Octonion Moments and Chaotic Metaheuristics"],"prefix":"10.32604","volume":"85","author":[{"given":"Ahmed El","family":"Maloufy","sequence":"first","affiliation":[]},{"given":"Mohamed Amine","family":"Tahiri","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Bencherqui","sequence":"additional","affiliation":[]},{"given":"Hicham","family":"Karmouni","sequence":"additional","affiliation":[]},{"given":"Mhamed","family":"Sayyouri","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","first-page":"273","article-title":"Architectural drawings new uses in the architectural design process","volume":"6","author":"Bar-Eli","year":"2020","journal-title":"Athens J Archit"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"6223","DOI":"10.3390\/su13116223","article-title":"The drawing and perception of architectural spaces through immersive virtual reality","volume":"13","author":"G\u00f3mez-Tone","year":"2021","journal-title":"Sustainability"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1177\/1357034X20949934","article-title":"Drawing atmosphere: a case study of architectural design for care in later life","volume":"26","author":"Martin","year":"2020","journal-title":"Body Soc"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"6395","DOI":"10.1007\/s00371-022-02736-3","article-title":"New color image encryption using hybrid optimization algorithm and Krawtchouk fractional transformations","volume":"39","author":"Tahiri","year":"2023","journal-title":"Vis Comput"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/S1361-3723(21)00130-5","article-title":"Zero-width text steganography in cybercrime attacks","volume":"2021","author":"Kaushik","year":"2021","journal-title":"Comput Fraud Secur"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"107618","DOI":"10.1016\/j.asoc.2021.107618","article-title":"Image steganography based on style transfer and quaternion exponent moments","volume":"110","author":"Li","year":"2021","journal-title":"Appl Soft Comput"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"167167","DOI":"10.1016\/j.ijleo.2021.167167","article-title":"Secure and covert communication using steganography by wavelet transform","volume":"242","author":"Lingamallu","year":"2021","journal-title":"Optik"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"101604","DOI":"10.1016\/j.jksuci.2023.101604","article-title":"Implementation of a steganography system based on hybrid square quaternion moment compression in IoMT","volume":"35","author":"Tahiri","year":"2023","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"ref9","first-page":"103855","article-title":"A robust medical image zero-watermarking algorithm using Collatz and Fresnelet transforms","volume":"85","author":"Meesala","year":"2024","journal-title":"J Inf Secur Appl"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"100153","DOI":"10.1016\/j.hcc.2023.100153","article-title":"An effective digital audio watermarking using a deep convolutional neural network with a search location optimization algorithm for improvement in robustness and imperceptibility","volume":"3","author":"Patil","year":"2023","journal-title":"High Confid Comput"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"105655","DOI":"10.1016\/j.cageo.2024.105655","article-title":"A dual watermarking algorithm for trajectory data based on robust watermarking and fragile watermarking","volume":"191","author":"Hu","year":"2024","journal-title":"Comput Geosci"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"122547","DOI":"10.1016\/j.eswa.2023.122547","article-title":"Blind watermarking scheme for medical and non-medical images copyright protection using the QZ algorithm","volume":"241","author":"Shen","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"105530","DOI":"10.1016\/j.cageo.2024.105530","article-title":"Commutative encryption and watermarking algorithm based on compound chaotic systems and zero-watermarking for vector map","volume":"184","author":"Tan","year":"2024","journal-title":"Comput Geosci"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"108971","DOI":"10.1016\/j.sigpro.2023.108971","article-title":"Color image watermarking based on a fast structure-preserving algorithm of quaternion singular value decomposition","volume":"208","author":"Zhang","year":"2023","journal-title":"Signal Process"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.procs.2010.11.028","article-title":"High speed VLSI architectures for DWT in biometric image compression: a study","volume":"2","author":"Bala","year":"2010","journal-title":"Procedia Comput Sci"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1016\/j.sysarc.2006.11.009","article-title":"Efficient FPGA implementation of DWT and modified SPIHT for lossless image compression","volume":"53","author":"Jyotheswar","year":"2007","journal-title":"J Syst Archit"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"103463","DOI":"10.1109\/ACCESS.2019.2929244","article-title":"A selective image encryption scheme based on 2D DWT, henon map and 4D qi hyper-chaos","volume":"7","author":"Oteko Tresor","year":"2019","journal-title":"IEEE Access"},{"key":"ref18","first-page":"103255","article-title":"Secure sparse watermarking on DWT-SVD for digital images","volume":"68","author":"Bose","year":"2022","journal-title":"J Inf Secur Appl"},{"key":"ref19","first-page":"187","author":"Ambadekar","year":"2018","journal-title":"Recent trends in signal and image processing"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"17027","DOI":"10.1007\/s11042-018-7085-z","article-title":"A novel hybrid DCT and DWT based robust watermarking algorithm for color images","volume":"78","author":"Abdulrahman","year":"2019","journal-title":"Multimed Tools Appl"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"109021","DOI":"10.1016\/j.aml.2024.109021","article-title":"Dual quaternion singular value decomposition based on bidiagonalization to a dual number matrix using dual quaternion householder transformations","volume":"152","author":"Ding","year":"2024","journal-title":"Appl Math Lett"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"127490","DOI":"10.1016\/j.neucom.2024.127490","article-title":"Fixed-precision randomized quaternion singular value decomposition algorithm for low-rank quaternion matrix approximations","volume":"580","author":"Liu","year":"2024","journal-title":"Neurocomputing"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"780","DOI":"10.1016\/j.apm.2024.02.019","article-title":"Neural network models for the quaternion singular value decompositions","volume":"129","author":"Huang","year":"2024","journal-title":"Appl Math Model"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"114165","DOI":"10.1016\/j.measurement.2024.114165","article-title":"A novel joint denoising method for gear fault diagnosis with improved quaternion singular value decomposition","volume":"226","author":"Ma","year":"2024","journal-title":"Measurement"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"8453","DOI":"10.3390\/app15158453","article-title":"Mobile robot path planning based on fused multi-strategy white shark optimisation algorithm","volume":"15","author":"You","year":"2025","journal-title":"Appl Sci"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"108457","DOI":"10.1016\/j.knosys.2022.108457","article-title":"White shark optimizer: a novel bio-inspired meta-heuristic algorithm for global optimization problems","volume":"243","author":"Braik","year":"2022","journal-title":"Knowl Based Syst"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"7370","DOI":"10.3390\/s23177370","article-title":"A white shark equilibrium optimizer with a hybrid deep-learning-based cybersecurity solution for a smart city environment","volume":"23","author":"Almuqren","year":"2023","journal-title":"Sensors"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"124973","DOI":"10.1016\/j.eswa.2024.124973","article-title":"Applications of dynamic feature selection based on augmented white shark optimizer for medical diagnosis","volume":"257","author":"Braik","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"5667","DOI":"10.3390\/su15075667","article-title":"A new hybrid white shark and whale optimization approach for estimating the Li-ion battery model parameters","volume":"15","author":"Fathy","year":"2023","journal-title":"Sustainability"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"406","DOI":"10.3390\/pr12020406","article-title":"Chaos-enhanced archimede algorithm for global optimization of real-world engineering problems and signal feature extraction","volume":"12","author":"Bencherqui","year":"2024","journal-title":"Processes"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/s10462-024-10857-5","article-title":"Improving the Kepler optimization algorithm with chaotic maps: comprehensive performance evaluation and engineering applications","volume":"57","author":"El Ghouate","year":"2024","journal-title":"Artif Intell Rev"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"3493","DOI":"10.1007\/s40747-023-01337-4","article-title":"Octonion-based transform moments for innovative stereo image classification with deep learning","volume":"10","author":"Tahiri","year":"2024","journal-title":"Complex Intell Syst"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"18485","DOI":"10.1038\/s41598-024-69511-3","article-title":"An improved reversible watermarking scheme using embedding optimization and quaternion moments","volume":"14","author":"Tahiri","year":"2024","journal-title":"Sci Rep"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"121247","DOI":"10.1016\/j.eswa.2023.121247","article-title":"Secure and optimized satellite image sharing based on chaotic e\u03c0 map and Racah moments","volume":"236","author":"Karmouni","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"101723","DOI":"10.1016\/j.swevo.2024.101723","article-title":"An optimized watermarking scheme based on genetic algorithm and elliptic curve","volume":"91","author":"Azam","year":"2024","journal-title":"Swarm Evol Comput"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"106554","DOI":"10.1016\/j.bspc.2024.106554","article-title":"Join security and block watermarking-based evolutionary algorithm and Racah moments for medical imaging","volume":"96","author":"Chekira","year":"2024","journal-title":"Biomed Signal Process Control"},{"key":"ref37","first-page":"103503","article-title":"A robust and lossless commutative encryption and watermarking algorithm for vector geographic data","volume":"75","author":"Guo","year":"2023","journal-title":"J Inf Secur Appl"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"110271","DOI":"10.1016\/j.asoc.2023.110271","article-title":"Robust color image watermarking algorithm based on synchronization correction with multi-layer perceptron and Cauchy distribution model","volume":"140","author":"Jiang","year":"2023","journal-title":"Appl Soft Comput"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"102228","DOI":"10.1016\/j.datak.2023.102228","article-title":"LBP feature and hash function based dual watermarking algorithm for database","volume":"148","author":"Li","year":"2023","journal-title":"Data Knowl Eng"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"1851","DOI":"10.1016\/j.dcan.2022.12.015","article-title":"Consistency preserving database watermarking algorithm for decision trees","volume":"10","author":"Li","year":"2024","journal-title":"Digit Commun Netw"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"106557","DOI":"10.1016\/j.bspc.2024.106557","article-title":"Robust zero-watermarking algorithm for multi-medical images based on FFST-Schur and Tent mapping","volume":"96","author":"Lu","year":"2024","journal-title":"Biomed Signal Process Control"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"119810","DOI":"10.1016\/j.ins.2023.119810","article-title":"Hybrid watermarking algorithm for medical images based on digital transformation and MobileNetV2","volume":"653","author":"Ali Nawaz","year":"2024","journal-title":"Inf Sci"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"1689","DOI":"10.3390\/math11071689","article-title":"Security analysis and improvement of dual watermarking framework for multimedia privacy protection and content authentication","volume":"11","author":"Li","year":"2023","journal-title":"Mathematics"},{"key":"ref44","series-title":"2017 International Conference on Recent Advances in Electronics and Communication Technology (ICRAECT); 2017 Mar 16\u201317; Bangalore, India","first-page":"126","article-title":"A robust double watermarking technique for medical images with semi-fragility","author":"Venkateswarlu"},{"key":"ref45","first-page":"3135","article-title":"Cat swarm algorithm generated based on genetic programming framework applied in digital watermarking","volume":"83","author":"Chu","year":"2025","journal-title":"Comput Mater Contin"},{"key":"ref46","first-page":"2927","article-title":"Joint watermarking and encryption for social image sharing","volume":"83","author":"Ye","year":"2025","journal-title":"Comput Mater Contin"},{"key":"ref47","first-page":"1027","article-title":"CSRWA: covert and severe attacks resistant watermarking algorithm","volume":"82","author":"Majeed","year":"2025","journal-title":"Comput Mater Contin"},{"key":"ref48","first-page":"2457","article-title":"Adaptive video dual domain watermarking scheme based on PHT moment and optimized spread transform dither modulation","volume":"81","author":"Liang","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"128834","DOI":"10.1016\/j.neucom.2024.128834","article-title":"Invisible and robust watermarking model based on hierarchical residual fusion multi-scale convolution","volume":"614","author":"Zou","year":"2025","journal-title":"Neurocomputing"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.apm.2024.04.012","article-title":"Optical image encryption and authentication scheme with computational ghost imaging","volume":"131","author":"Guo","year":"2024","journal-title":"Appl Math Model"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"38821","DOI":"10.1109\/ACCESS.2022.3165813","article-title":"Multiple zero-watermarking of medical images for Internet of medical things","volume":"10","author":"Magdy","year":"2022","journal-title":"IEEE Access"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/j.compeleceng.2017.05.015","article-title":"Invariant image watermarking using accurate polar harmonic transforms","volume":"62","author":"Hosny","year":"2017","journal-title":"Comput Electr Eng"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"1122","DOI":"10.3758\/s13428-014-0532-5","article-title":"The Chicago face database: a free stimulus set of faces and norming data","volume":"47","author":"Ma","year":"2015","journal-title":"Behav Res Meth"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.3758\/s13428-020-01482-5","article-title":"Chicago face database: multiracial expansion","volume":"53","author":"Ma","year":"2021","journal-title":"Behav Res Meth"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-3\/TSP_CMC_68885\/TSP_CMC_68885.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:23:23Z","timestamp":1763346203000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n3\/64187"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":54,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.068885","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-06-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-12","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-23","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}