{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:02:47Z","timestamp":1740135767055,"version":"3.37.3"},"reference-count":71,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T00:00:00Z","timestamp":1723507200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T00:00:00Z","timestamp":1723507200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s00034-024-02802-2","type":"journal-article","created":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T14:59:27Z","timestamp":1723561167000},"page":"7750-7780","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploring Discrete Haar Wavelet and Cosine Transforms for Accuracy-and Energy-Quality VLSI Watermarking Systems Design"],"prefix":"10.1007","volume":"43","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9582-9011","authenticated-orcid":false,"given":"Morgana M. A.","family":"da Rosa","sequence":"first","affiliation":[]},{"given":"Eduardo A. C.","family":"da Costa","sequence":"additional","affiliation":[]},{"given":"Rafael","family":"Soares","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Bampi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,13]]},"reference":[{"issue":"12","key":"2802_CR1","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"IJ Cox","year":"1997","unstructured":"I.J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. Image Process."},{"key":"2802_CR2","doi-asserted-by":"publisher","first-page":"19876","DOI":"10.1109\/ACCESS.2018.2808172","volume":"6","author":"NA Loan","year":"2018","unstructured":"N.A. Loan, N.N. Hurrah, S.A. Parah, J.W. Lee, J.A. Sheikh, G.M. Bhat, Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE Access 6, 19876\u201319897 (2018)","journal-title":"IEEE Access"},{"key":"2802_CR3","doi-asserted-by":"publisher","first-page":"76580","DOI":"10.1109\/ACCESS.2019.2921894","volume":"7","author":"X Liu","year":"2019","unstructured":"X. Liu, J. Lou, H. Fang, Y. Chen, P. Ouyang, Y. Wang, B. Zou, L. Wang, A novel robust reversible watermarking scheme for protecting authenticity and integrity of medical images. IEEE Access 7, 76580\u201376598 (2019)","journal-title":"IEEE Access"},{"issue":"3","key":"2802_CR4","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/S0165-1684(98)00017-6","volume":"66","author":"N Nikolaidis","year":"1998","unstructured":"N. Nikolaidis, I. Pitas, Robust image watermarking in the spatial domain. Signal Process. 66(3), 385\u2013403 (1998)","journal-title":"Signal Process."},{"key":"2802_CR5","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.proeng.2011.12.708","volume":"29","author":"J Song","year":"2012","unstructured":"J. Song, J. Song, Y. Bao, A blind digital watermark method based on SVD and chaos. Procedia Eng. 29, 285\u2013289 (2012)","journal-title":"Procedia Eng."},{"key":"2802_CR6","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.optcom.2015.07.073","volume":"356","author":"X Li","year":"2015","unstructured":"X. Li, S.-T. Kim, I.-K. Lee, Robustness enhancement for image hiding algorithm in cellular automata domain. Opt. Commun. 356, 186\u2013194 (2015)","journal-title":"Opt. Commun."},{"key":"2802_CR7","doi-asserted-by":"publisher","first-page":"76386","DOI":"10.1109\/ACCESS.2020.2988298","volume":"8","author":"UA Bhatti","year":"2020","unstructured":"U.A. Bhatti, Z. Yu, J. Li, S.A. Nawaz, A. Mehmood, K. Zhang, L. Yuan, Hybrid watermarking algorithm using Clifford algebra with Arnold scrambling and chaotic encryption. IEEE Access 8, 76386\u201376398 (2020)","journal-title":"IEEE Access"},{"key":"2802_CR8","doi-asserted-by":"publisher","first-page":"20464","DOI":"10.1109\/ACCESS.2018.2819424","volume":"6","author":"F Ernawan","year":"2018","unstructured":"F. Ernawan, M.N. Kabir, A robust image watermarking technique with an optimal DCT-psychovisual threshold. IEEE Access 6, 20464\u201320480 (2018)","journal-title":"IEEE Access"},{"key":"2802_CR9","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.future.2016.11.023","volume":"86","author":"AK Singh","year":"2018","unstructured":"A.K. Singh, B. Kumar, S.K. Singh, S. Ghrera, A. Mohan, Multiple watermarking techniques for securing online social network contents using back propagation neural network. Futur. Gener. Comput. Syst. 86, 926\u2013939 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"6","key":"2802_CR10","doi-asserted-by":"publisher","first-page":"8881","DOI":"10.1007\/s11042-016-3514-z","volume":"76","author":"AK Singh","year":"2017","unstructured":"A.K. Singh, Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multim. Tools Appl. 76(6), 8881\u20138900 (2017)","journal-title":"Multim. Tools Appl."},{"issue":"1","key":"2802_CR11","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TIFS.2007.916275","volume":"3","author":"TK Tsui","year":"2008","unstructured":"T.K. Tsui, X.-P. Zhang, D. Androutsos, Color image watermarking using multidimensional Fourier transform. IEEE Trans. Inf. Forens. Secur. 3(1), 16\u201328 (2008)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"issue":"2","key":"2802_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/83.982816","volume":"11","author":"Y Wang","year":"2002","unstructured":"Y. Wang, J.F. Doherty, R.E. Van Dyck, A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans. Image Process. 11(2), 77\u201388 (2002)","journal-title":"IEEE Trans. Image Process."},{"key":"2802_CR13","unstructured":"M. Rosa, G. Paim, R. Soares, E. Costa, S. Bampi, Discrete Haar wavelet transform hardware design for energy-efficient image watermarking, in 29th IEEE International Conference on Electronics Circuits and Systems (ICECS) (2022)"},{"issue":"2","key":"2802_CR14","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5108","volume":"33","author":"S Thakur","year":"2021","unstructured":"S. Thakur, A.K. Singh, S.P. Ghrera, NSCT domain-based secure multiple-watermarking technique through lightweight encryption for medical images. Concurr. Comput.: Pract. Exp. 33(2), e5108 (2021)","journal-title":"Concurr. Comput.: Pract. Exp."},{"issue":"9","key":"2802_CR15","doi-asserted-by":"publisher","first-page":"795","DOI":"10.1049\/iet-ipr.2014.0395","volume":"9","author":"N Muhammad","year":"2015","unstructured":"N. Muhammad, N. Bibi, Digital image watermarking using partial pivoting lower and upper triangular decomposition into the wavelet domain. IET Image Proc. 9(9), 795\u2013803 (2015)","journal-title":"IET Image Proc."},{"key":"2802_CR16","doi-asserted-by":"crossref","unstructured":"A. Susanto, D.R. Ignatius Moses Setiadi, E.H. Rachmawanto, C. Atika Sari, A robust non-blind image watermarking method using 2-Level HWT-DCT, in 2018 International Seminar on Application for Technology of Information and Communication (2018), pp. 304\u2013308","DOI":"10.1109\/ISEMANTIC.2018.8549712"},{"key":"2802_CR17","doi-asserted-by":"crossref","unstructured":"Y. He, Y. Hu, A proposed digital image watermarking based on DWT-DCT-SVD, in 2nd IEEE Advanced Information Management, Communicates. Electronic and Automation Control Conference (IMCEC) vol. 2018 (2018), pp. 1214\u20131218","DOI":"10.1109\/IMCEC.2018.8469626"},{"key":"2802_CR18","doi-asserted-by":"crossref","unstructured":"S.A. Kasmani, A. Naghsh-Nilchi, A new robust digital image watermarking technique based on joint DWT-DCT transformation, in 2008 Third International Conference on Convergence and Hybrid Information Technology, vol. 2 (2008), pp. 539\u2013544","DOI":"10.1109\/ICCIT.2008.139"},{"key":"2802_CR19","doi-asserted-by":"crossref","unstructured":"P.H. Vo, T.S. Nguyen, V.T. Huynh, T.N. Do, A robust hybrid watermarking scheme based on DCT and SVD for copyright protection of stereo images, in 2017 4th NAFOSTED Conference on Information and Computer Science (IEEE, 2017), pp. 331\u2013335","DOI":"10.1109\/NAFOSTED.2017.8108087"},{"key":"2802_CR20","doi-asserted-by":"crossref","unstructured":"Y. He, Y. Hu, A proposed digital image watermarking based on DWT-DCT-SVD, in 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), vol. 2018 (IEEE, 2018), pp. 1214\u20131218","DOI":"10.1109\/IMCEC.2018.8469626"},{"issue":"2","key":"2802_CR21","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.ijleo.2015.09.205","volume":"127","author":"S Fazli","year":"2016","unstructured":"S. Fazli, M. Moeini, A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks. Optik 127(2), 964\u2013972 (2016)","journal-title":"Optik"},{"issue":"4","key":"2802_CR22","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1007\/s11554-019-00882-x","volume":"16","author":"H Ge","year":"2019","unstructured":"H. Ge, J. Sha, FPGA-based low-complexity high-throughput real-time hardware accelerator for robust watermarking. J. Real-Time Image Proc. 16(4), 813\u2013820 (2019)","journal-title":"J. Real-Time Image Proc."},{"key":"2802_CR23","doi-asserted-by":"crossref","unstructured":"D. Singh, M. Agarwal, C. Singh, Dual scrambled image watermarking algorithm in DWT-SVD composite domain, in Routing Protocols and Architectural Solutions for Optimal Wireless Networks and Security (IGI Global, 2017), pp. 30\u201342","DOI":"10.4018\/978-1-5225-2342-0.ch002"},{"issue":"20","key":"2802_CR24","doi-asserted-by":"publisher","first-page":"27181","DOI":"10.1007\/s11042-018-5913-9","volume":"77","author":"M Hamidi","year":"2018","unstructured":"M. Hamidi, M.E. Haziti, H. Cherifi, M.E. Hassouni, Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform. Multim. Tools Appl. 77(20), 27181\u201327214 (2018)","journal-title":"Multim. Tools Appl."},{"issue":"4","key":"2802_CR25","doi-asserted-by":"publisher","first-page":"1955","DOI":"10.1109\/TCSVT.2021.3092004","volume":"32","author":"W Huan","year":"2022","unstructured":"W. Huan, S. Li, Z. Qian, X. Zhang, Exploring stable coefficients on joint sub-bands for robust video watermarking in DT CWT domain. IEEE Trans. Circuits Syst. Video Technol. 32(4), 1955\u20131965 (2022)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2802_CR26","doi-asserted-by":"publisher","first-page":"45474","DOI":"10.1109\/ACCESS.2021.3067245","volume":"9","author":"F Ernawan","year":"2021","unstructured":"F. Ernawan, D. Ariatmanto, A. Firdaus, An improved image watermarking by modifying selected DWT-DCT coefficients. IEEE Access 9, 45474\u201345485 (2021)","journal-title":"IEEE Access"},{"key":"2802_CR27","doi-asserted-by":"crossref","unstructured":"M. Gafsi, N. Abbassi, R. Amdouni, M.A. Hajjaji, A. Mtibaa, Hardware implementation of the Haar 2D discrete wavelet transform with an application to image watermarking, in 5th International Conference on Advanced Systems and Emergent Technologies (ICASET) (2022), pp. 324\u2013329","DOI":"10.1109\/IC_ASET53395.2022.9765864"},{"key":"2802_CR28","doi-asserted-by":"publisher","first-page":"93939","DOI":"10.1109\/ACCESS.2020.2995015","volume":"8","author":"J Liu","year":"2020","unstructured":"J. Liu, J. Ma, J. Li, M. Huang, N. Sadiq, Y. Ai, Robust watermarking algorithm for medical volume data in internet of medical things. IEEE Access 8, 93939\u201393961 (2020)","journal-title":"IEEE Access"},{"key":"2802_CR29","doi-asserted-by":"crossref","unstructured":"C. Iwendi, Z. Jalil, A. R. Javed, T. Reddy G., R. Kaluri, G. Srivastava, O. Jo, KeySplitWatermark: Zero watermarking algorithm for software protection against cyber-attacks. IEEE Access 8, 72650\u201372660 (2020)","DOI":"10.1109\/ACCESS.2020.2988160"},{"issue":"6","key":"2802_CR30","doi-asserted-by":"publisher","first-page":"2088","DOI":"10.1109\/TCSI.2019.2907191","volume":"66","author":"K Pexaras","year":"2019","unstructured":"K. Pexaras, I.G. Karybali, E. Kalligeros, Optimization and hardware implementation of image and video watermarking for Low Cost applications. IEEE Trans. Circuits Syst. I Regul. Pap. 66(6), 2088\u20132101 (2019)","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"issue":"12","key":"2802_CR31","doi-asserted-by":"publisher","first-page":"4826","DOI":"10.1109\/TCSVT.2021.3055255","volume":"31","author":"Z Ma","year":"2021","unstructured":"Z. Ma, W. Zhang, H. Fang, X. Dong, L. Geng, N. Yu, Local geometric distortions resilient watermarking scheme based on symmetry. IEEE Trans. Circuits Syst. Video Technol. 31(12), 4826\u20134839 (2021)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"2","key":"2802_CR32","first-page":"597","volume":"68","author":"MM da Rosa","year":"2021","unstructured":"M.M. da Rosa, H.B. Seidel, G. Paim, E.A.C. da Costa, S. Almeida, S. Bampi, An energy-efficient Haar wavelet transform architecture for respiratory signal processing. IEEE Trans. Circuits Syst. II Express Briefs 68(2), 597\u2013601 (2021)","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"2802_CR33","doi-asserted-by":"crossref","unstructured":"H. Seidel, M. d. Rosa, G. Paim, E. Costa, S. Almeida, S. Bampi, Energy-efficient Haar transform architectures using efficient addition schemes, in 2020 IEEE 11th Latin American Symposium on Circuits Systems (LASCAS) (2020), pp. 1\u20134","DOI":"10.1109\/LASCAS45839.2020.9068951"},{"issue":"5","key":"2802_CR34","doi-asserted-by":"publisher","first-page":"1814","DOI":"10.1109\/TCSI.2021.3057584","volume":"68","author":"HB Seidel","year":"2021","unstructured":"H.B. Seidel, M.M.A. da Rosa, G. Paim, E.A.C. da Costa, S.J.M. Almeida, S. Bampi, Approximate pruned and truncated Haar discrete wavelet transform VLSI hardware for energy-efficient ECG signal processing. IEEE Trans. Circuits Syst. I Regul. Pap. 68(5), 1814\u20131826 (2021)","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"2802_CR35","doi-asserted-by":"crossref","unstructured":"G. Paim, L.B. Soares, R. Ferreira, E. Costa, S. Bampi, Pruning and approximation of coefficients for power-efficient 2-D Discrete Tchebichef Transform, in 2017 15th IEEE International New Circuits and Systems Conference (NEWCAS) (2017), pp. 25\u201328","DOI":"10.1109\/NEWCAS.2017.8010096"},{"issue":"2","key":"2802_CR36","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1109\/TCSI.2018.2868513","volume":"66","author":"G Paim","year":"2019","unstructured":"G. Paim, L.M.G. Rocha, G.M. Santana, L.B. Soares, E.A.C. da Costa, S. Bampi, Power-, area-, and compression-efficient eight-point approximate 2-D discrete Tchebichef transform hardware design combining truncation pruning and efficient transposition buffers. IEEE Trans. Circuits Syst. I Regul. Pap. 66(2), 680\u2013693 (2019)","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"2802_CR37","volume-title":"Discrete Cosine and Sine Transforms General Properties, Fast Algorithms and Integer Approximations","author":"V Britanak","year":"2010","unstructured":"V. Britanak, P.C. Yip, K.R. Rao, Discrete Cosine and Sine Transforms General Properties, Fast Algorithms and Integer Approximations (Elsevier, Amsterdam, 2010)"},{"issue":"10","key":"2802_CR38","doi-asserted-by":"publisher","first-page":"3814","DOI":"10.1109\/TCSVT.2019.2945763","volume":"30","author":"G Paim","year":"2020","unstructured":"G. Paim, L.M.G. Rocha, H. Amrouch, E.A.C. da Costa, S. Bampi, J. Henkel, A cross-layer gate-level-to-application co-simulation for design space exploration of approximate circuits in HEVC video encoders. IEEE Trans. Circuits Syst. Video Technol. 30(10), 3814\u20133828 (2020)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2802_CR39","unstructured":"C.V. Group, Test Images, 2022. [Online]. Available https:\/\/ccia.ugr.es\/cvg\/index2.php"},{"key":"2802_CR40","unstructured":"256 x 256 iWildCam 2021 - Starter Notebook. [Online]. Available https:\/\/www.kaggle.com\/competitions\/iwildcam2021-fgvc8"},{"key":"2802_CR41","unstructured":"The USC-SIPI image database. [Online]. Available https:\/\/sipi.usc.edu\/database\/"},{"key":"2802_CR42","unstructured":"BOSSBase Database. [Online]. Available http:\/\/agents.fel.cvut.cz\/boss\/"},{"issue":"5","key":"2802_CR43","doi-asserted-by":"publisher","first-page":"1268","DOI":"10.1016\/j.sigpro.2012.10.018","volume":"93","author":"F Lusson","year":"2013","unstructured":"F. Lusson, K. Bailey, M. Leeney, K. Curran, A novel approach to digital watermarking, exploiting colour spaces. Signal Processing 93(5), 1268\u20131294 (2013). https:\/\/doi.org\/10.1016\/j.sigpro.2012.10.018","journal-title":"Signal Processing"},{"issue":"16","key":"2802_CR44","first-page":"8455","volume":"219","author":"Q Su","year":"2013","unstructured":"Q. Su, Y. Niu, H. Zou, X. Liu, A blind dual color images watermarking based on singular value decomposition. Appl. Math. Comput. 219(16), 8455\u20138466 (2013)","journal-title":"Appl. Math. Comput."},{"issue":"5","key":"2802_CR45","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1109\/TCSVT.2016.2633878","volume":"28","author":"X-L Liu","year":"2016","unstructured":"X.-L. Liu, C.-C. Lin, S.-M. Yuan, Blind dual watermarking for color images\u2019 authentication and copyright protection. IEEE Trans. Circuits Syst. Video Technol. 28(5), 1047\u20131055 (2016)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"7","key":"2802_CR46","doi-asserted-by":"publisher","first-page":"5108","DOI":"10.1109\/TII.2020.3028612","volume":"17","author":"A Kamili","year":"2021","unstructured":"A. Kamili, N.N. Hurrah, S.A. Parah, G.M. Bhat, K. Muhammad, DWFCAT: dual watermarking framework for industrial image authentication and tamper localization. IEEE Trans. Ind. Inform. 17(7), 5108\u20135117 (2021). https:\/\/doi.org\/10.1109\/TII.2020.3028612","journal-title":"IEEE Trans. Ind. Inform."},{"key":"2802_CR47","doi-asserted-by":"publisher","first-page":"11800","DOI":"10.1109\/ACCESS.2020.2966251","volume":"8","author":"Y Cao","year":"2020","unstructured":"Y. Cao, F. Yu, Y. Tang, A digital watermarking encryption technique based on FPGA cloud accelerator. IEEE Access 8, 11800\u201311814 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2966251","journal-title":"IEEE Access"},{"issue":"2","key":"2802_CR48","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1109\/TCSVT.2016.2607299","volume":"28","author":"M Amini","year":"2018","unstructured":"M. Amini, M.O. Ahmad, M.N.S. Swamy, A robust multibit multiplicative watermark decoder using a vector-based hidden Markov model in wavelet domain. IEEE Trans. Circ. Syst. Video Technol. 28(2), 402\u2013413 (2018). https:\/\/doi.org\/10.1109\/TCSVT.2016.2607299","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"2802_CR49","doi-asserted-by":"crossref","unstructured":"JANA, Jhilam An area efficient vlsi architecture for 1-d and 2-d discrete wavelet transform (dwt) and inverse discrete wavelet transform (idwt), in Devices for Integrated Circuit (DevIC) (IEEE, 2021), pp. 378\u2013382","DOI":"10.1109\/DevIC50843.2021.9455902"},{"issue":"4","key":"2802_CR50","first-page":"1263","volume":"34","author":"HI Shahadi","year":"2022","unstructured":"H.I. Shahadi, A.T. Thahab, H.R. Farhan, A novel robust approach for image copyright protection based on concentric rectangles. J. King Saud Univ.-Comput. Inform. Sci. 34(4), 1263\u20131274 (2022)","journal-title":"J. King Saud Univ.-Comput. Inform. Sci."},{"issue":"3","key":"2802_CR51","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MMUL.2020.2985973","volume":"27","author":"A Anand","year":"2020","unstructured":"A. Anand, A.K. Singh, Joint watermarking-encryption-ECC for patient record security in wavelet domain. IEEE MultiMedia 27(3), 66\u201375 (2020)","journal-title":"IEEE MultiMedia"},{"key":"2802_CR52","doi-asserted-by":"crossref","unstructured":"M. Soni, D. Kumar, Wavelet based digital watermarking scheme for medical images, in 12th international conference on computational intelligence and communication networks (CICN), vol 2020 (IEEE, 2020), pp. 403\u2013407","DOI":"10.1109\/CICN49253.2020.9242626"},{"key":"2802_CR53","doi-asserted-by":"publisher","first-page":"76580","DOI":"10.1109\/ACCESS.2019.2921894","volume":"7","author":"X Liu","year":"2019","unstructured":"X. Liu et al., A novel robust reversible watermarking scheme for protecting authenticity and integrity of medical images. IEEE Access 7, 76580\u201376598 (2019)","journal-title":"IEEE Access"},{"issue":"5","key":"2802_CR54","first-page":"1814","volume":"68","author":"HB Seidel","year":"2021","unstructured":"H.B. Seidel et al., Approximate pruned and truncated Haar discrete wavelet transform VLSI hardware for energy-efficient ECG signal processing. IEEE Trans. Circ. Syst. I: Regular Papers 68(5), 1814\u20131826 (2021)","journal-title":"IEEE Trans. Circ. Syst. I: Regular Papers"},{"key":"2802_CR55","doi-asserted-by":"crossref","unstructured":"D.A. Rosa, M.A. Morgana, et al., A multiplier-less, Level-3 Haar wavelet transform approximation requiring five additions only, in IEEE 15th Dallas Circuit and System Conference (DCAS) (IEEE, 2022), pp. 1\u20136","DOI":"10.1109\/DCAS53974.2022.9845632"},{"key":"2802_CR56","doi-asserted-by":"crossref","unstructured":"W. Li, L. Yang, Z. Meng, High-precision protein sequence comparison based on principal component analysis and discrete wavelet transform, in 2021 5th Asian Conference on Artificial Intelligence Technology (ACAIT) (IEEE, 2021), pp. 805\u2013809","DOI":"10.1109\/ACAIT53529.2021.9731147"},{"key":"2802_CR57","doi-asserted-by":"crossref","unstructured":"R. Sharma, et al. Robust image watermarking technique using contourlet transform and optimized edge detection algorithm, in 2018 5th International Conference on Signal Processing and Integrated Networks (SPIN) (IEEE, 2018) pp. 513\u2013517","DOI":"10.1109\/SPIN.2018.8474052"},{"key":"2802_CR58","doi-asserted-by":"crossref","unstructured":"P. Jana, G.K. Maity, H. Mandal, A low power hardware implementation of lifting based reversible watermarking for medical image, in Devices for Integrated Circuit (DevIC), vol. 2019 (IEEE, 2019), pp. 489\u2013492","DOI":"10.1109\/DEVIC.2019.8783370"},{"key":"2802_CR59","doi-asserted-by":"crossref","unstructured":"M.A. Hajjaji, et al. FPGA implementation of digital images watermarking system based on discrete Haar wavelet transform. Secur. Commun. Netw. 2019 (2019)","DOI":"10.1155\/2019\/1294267"},{"key":"2802_CR60","doi-asserted-by":"crossref","unstructured":"K. Sultan, et al. Reversible and fragile watermarking for medical images. Comput. Math. Methods Med. 2018 (2018)","DOI":"10.1155\/2018\/3461382"},{"key":"2802_CR61","doi-asserted-by":"publisher","first-page":"30165","DOI":"10.1007\/s11042-020-08801-0","volume":"80","author":"A Anand","year":"2021","unstructured":"A. Anand, A.K. Singh, Watermarking techniques for medical data authentication: a survey. Multim. Tools Appl. 80, 30165\u201330197 (2021)","journal-title":"Multim. Tools Appl."},{"issue":"12","key":"2802_CR62","doi-asserted-by":"publisher","first-page":"8885","DOI":"10.1109\/TII.2022.3159863","volume":"18","author":"F Yan","year":"2022","unstructured":"F. Yan, H. Huang, X. Yu, A multiwatermarking scheme for verifying medical image integrity and authenticity in the internet of medical things. IEEE Trans. Ind. Inform. 18(12), 8885\u20138894 (2022)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"2802_CR63","doi-asserted-by":"publisher","first-page":"1","DOI":"10.9756\/BIJAIP.3096","volume":"2","author":"S Ghosh","year":"2012","unstructured":"S. Ghosh, FPGA based implementation of embedding and decoding architecture for binary watermark by spread spectrum scheme in spatial domain. Bonfring Int. J. Adv. Image Process. 2, 1\u20138 (2012)","journal-title":"Bonfring Int. J. Adv. Image Process."},{"key":"2802_CR64","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.jss.2014.05.079","volume":"96","author":"HK Maity","year":"2014","unstructured":"H.K. Maity, S.P. Maity, FPGA implementation of reversible watermarking in digital images using reversible contrast mapping. J. Syst. Softw. 96, 93\u2013104 (2014)","journal-title":"J. Syst. Softw."},{"key":"2802_CR65","doi-asserted-by":"crossref","unstructured":"A. Vashistha, A.M. Joshi, Fingerprint based biometric watermarking architecture using integer DCT, in Proceeding of IEEE Region 10 Conference (TENCON) (2016), pp. 2818\u20132821","DOI":"10.1109\/TENCON.2016.7848556"},{"issue":"12","key":"2802_CR66","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.3390\/electronics10121465","volume":"10","author":"Y Wang","year":"2021","unstructured":"Y. Wang, Y. Luo, Z. Wang, H. Pan, A hidden DCT-based invisible watermarking method for low-cost hardware implementations. Electronics 10(12), 1465 (2021)","journal-title":"Electronics"},{"key":"2802_CR67","doi-asserted-by":"crossref","unstructured":"Shivdeep, S. Ghosh, H. Rahaman, A new digital color image watermarking algorithm with its FPGA and ASIC implementation, in Proc. Int. Symp. Devices Circuits Syst. (ISDCS) (2020), pp. 1\u20136","DOI":"10.1109\/ISDCS49393.2020.9263003"},{"issue":"12","key":"2802_CR68","doi-asserted-by":"publisher","first-page":"5275","DOI":"10.1109\/TCAD.2022.3164634","volume":"41","author":"Z Mei","year":"2022","unstructured":"Z. Mei, Y. Wang, H. Pan, TEA-Z: a tiny and efficient architecture based on Z channel for image watermarking and its versatile hardware implementation. IEEE Trans. Comput.-Aid. Design Integ. Circ. Syst. 41(12), 5275\u20135287 (2022)","journal-title":"IEEE Trans. Comput.-Aid. Design Integ. Circ. Syst."},{"key":"2802_CR69","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1049\/iet-cdt:20070057","volume":"1","author":"S Mohanty","year":"2007","unstructured":"S. Mohanty, E. Kougianos, N. Ranganathan, VLSI architecture and chip for combined invisible robust and fragile watermarking. IET Comput. Digit. Tech. 1, 600\u2013611 (2007)","journal-title":"IET Comput. Digit. Tech."},{"key":"2802_CR70","unstructured":"T. Tsai, C. Lu, A system level design for embedded watermark technique using DSC system. Proc. IEEE Int. Workshop Intell. Signal Process. Commun. Syst. (2001)"},{"issue":"5","key":"2802_CR71","first-page":"394","volume":"53","author":"SP Mohanty","year":"2006","unstructured":"S.P. Mohanty, N. Ranganathan, K. Balakrishnan, A dual voltage frequency VLSI chip for image watermarking in DCT domain. IEEE Trans. Circuits Syst. II Exp. Briefs 53(5), 394\u2013398 (2006)","journal-title":"IEEE Trans. Circuits Syst. II Exp. Briefs"}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-024-02802-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-024-02802-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-024-02802-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,2]],"date-time":"2024-11-02T18:05:23Z","timestamp":1730570723000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-024-02802-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,13]]},"references-count":71,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["2802"],"URL":"https:\/\/doi.org\/10.1007\/s00034-024-02802-2","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"type":"print","value":"0278-081X"},{"type":"electronic","value":"1531-5878"}],"subject":[],"published":{"date-parts":[[2024,8,13]]},"assertion":[{"value":"4 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 May 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}