{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T10:43:02Z","timestamp":1742640182499},"reference-count":80,"publisher":"Springer Science and Business Media LLC","issue":"23-24","license":[{"start":{"date-parts":[[2018,8,10]],"date-time":"2018-08-10T00:00:00Z","timestamp":1533859200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,8,10]],"date-time":"2018-08-10T00:00:00Z","timestamp":1533859200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s11042-018-6407-5","type":"journal-article","created":{"date-parts":[[2018,8,10]],"date-time":"2018-08-10T01:58:21Z","timestamp":1533866301000},"page":"15901-15921","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":66,"title":["Secure data hiding techniques: a survey"],"prefix":"10.1007","volume":"79","author":[{"given":"Laxmanika","family":"Singh","sequence":"first","affiliation":[]},{"given":"A. K.","family":"Singh","sequence":"additional","affiliation":[]},{"given":"P. K.","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,10]]},"reference":[{"key":"6407_CR1","doi-asserted-by":"crossref","unstructured":"Ahmad S, Lu ZM. (2007) A joint biometrics and watermarking based framework for fingerprinting, copyright protection, proof of ownership, and security applications. In Computational Intelligence and Security Workshops, IEEE CISW; 676\u2013679","DOI":"10.1109\/CISW.2007.4425586"},{"key":"6407_CR2","doi-asserted-by":"crossref","unstructured":"Ahmad S, Mirza SM, Qamar S. (2004) A spread spectrum based scalable blind digital watermarking technique for multi-purpose multimedia applications. In: E-Tech 2004, Karachi, Pakistan 10\u201316","DOI":"10.1109\/ETECH.2004.1353837"},{"key":"6407_CR3","doi-asserted-by":"crossref","unstructured":"Bartlow N, Kalka N, Cukic B, Ross A. (2007) Protecting iris images through asymmetric digital watermarking. 2007 IEEE Workshop on Automatic Identification Advanced Technologies; 192\u2013197","DOI":"10.1109\/AUTOID.2007.380618"},{"key":"6407_CR4","doi-asserted-by":"crossref","first-page":"8002","DOI":"10.1109\/ACCESS.2016.2627241","volume":"4","author":"D Bhowmik","year":"2016","unstructured":"Bhowmik D, Oakes M, Abhayaratne C (2016) Visual attention-based image watermarking. IEEE Access 4:8002\u20138018","journal-title":"IEEE Access"},{"issue":"2","key":"6407_CR5","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/MSP.2012.2228342","volume":"30","author":"T Bianchi","year":"2013","unstructured":"Bianchi T, Piva A (2013) Secure watermarking for multimedia content protection: a review of its benefits and open issues. IEEE Signal Process Mag 30(2):87\u201396","journal-title":"IEEE Signal Process Mag"},{"issue":"1","key":"6407_CR6","doi-asserted-by":"crossref","first-page":"716357","DOI":"10.1186\/1687-417X-2009-716357","volume":"2009","author":"T Bianchi","year":"2009","unstructured":"Bianchi T, Piva A, Barni M (2009) Encrypted domain DCT based on homomorphic cryptosystems. EURASIP J Inf Secur 2009(1):716357","journal-title":"EURASIP J Inf Secur"},{"issue":"10","key":"6407_CR7","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1016\/j.image.2006.08.006","volume":"21","author":"R Caldelli","year":"2006","unstructured":"Caldelli R, Filippini F, Barni M (2006) Joint near-lossless compression and watermarking of still images for authentication and tamper localization. Signal Process Image Commun 21(10):890\u2013903","journal-title":"Signal Process Image Commun"},{"key":"6407_CR8","doi-asserted-by":"crossref","unstructured":"Cao X, Fu Z, Sun X. (2016) A privacy-preserving outsourcing data storage scheme with fragile digital watermarking-based data auditing. Journal of Electrical and Computer Engineering (2016), Article ID: 3219042;1\u20137","DOI":"10.1155\/2016\/3219042"},{"issue":"10","key":"6407_CR9","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1016\/j.patrec.2005.01.004","volume":"26","author":"CC Chang","year":"2005","unstructured":"Chang CC, Tsai P, Lin CC (2005) SVD-based digital image watermarking scheme. Pattern Recogn Lett 26(10):1577\u20131586","journal-title":"Pattern Recogn Lett"},{"issue":"9","key":"6407_CR10","doi-asserted-by":"crossref","first-page":"1462","DOI":"10.1016\/j.jss.2011.02.029","volume":"84","author":"CC Chang","year":"2011","unstructured":"Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462\u20131470","journal-title":"J Syst Softw"},{"key":"6407_CR11","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1016\/j.sigpro.2014.09.036","volume":"108","author":"IC Chang","year":"2015","unstructured":"Chang IC, Hu YC, Chen WL, Lo CC (2015) High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding. Signal Process 108:376\u2013388","journal-title":"Signal Process"},{"key":"6407_CR12","doi-asserted-by":"publisher","unstructured":"Chen YY, Chi KY (2017) Cloud image watermarking: high quality data hiding and blind decoding scheme based on block truncation coding. Multimedia Systems :1\u20133.\u00a0 https:\/\/doi.org\/10.1007\/s00530-017-0560-y","DOI":"10.1007\/s00530-017-0560-y"},{"issue":"4","key":"6407_CR13","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1179\/136821910X12651933390629","volume":"58","author":"J Chen","year":"2010","unstructured":"Chen J, Hong W, Chen TS, Shiu CW (2010) Steganography for BTC compressed images using no distortion technique. The Imaging Science Journal 58(4):177\u2013185","journal-title":"The Imaging Science Journal"},{"key":"6407_CR14","unstructured":"Dagadu JC, Li J (2018) Context-based watermarking cum chaotic encryption for medical images in telemedicine applications. Multimedia Tools and Applications; 1\u201324"},{"issue":"3","key":"6407_CR15","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.aeue.2013.08.018","volume":"68","author":"C Das","year":"2014","unstructured":"Das C, Panigrahi S, Sharma VK, Mahapatra KK (2014) A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation. AEU-International Journal of Electronics and Communications 68(3):244\u2013253","journal-title":"AEU-International Journal of Electronics and Communications"},{"issue":"2","key":"6407_CR16","first-page":"93","volume":"6","author":"NV Dharwadkar","year":"2010","unstructured":"Dharwadkar NV, Amberker BB (2010) Watermarking scheme for color images using wavelet transform based texture properties and secret sharing. International Journal of Signal Processing 6(2):93\u2013100","journal-title":"International Journal of Signal Processing"},{"key":"6407_CR17","doi-asserted-by":"crossref","unstructured":"Fridrich J, Goljan M, Chen Q, Pathak V. (2004) Lossless data embedding with file size preservation. In Security, Steganography, and Watermarking of Multimedia Contents VI 2004 International Society for Optics and Photonics; 5306: 354\u2013365","DOI":"10.1117\/12.525418"},{"key":"6407_CR18","unstructured":"Golea NE, Seghir R, Benzid R. (2010) A bind RGB color image watermarking based on singular value decomposition. 2010 IEEE\/ACS International Conference on Computer Systems and Applications, Hammamet, Tunisia; 1\u20135"},{"key":"6407_CR19","doi-asserted-by":"crossref","unstructured":"Gordy JD, Bruton LT. (2000) Performance evaluation of digital audio watermarking algorithms In: Proc. of the 43rd IEEE Midwest Symposium on Circuits and Systems, 1; 456\u2013459","DOI":"10.1109\/MWSCAS.2000.951682"},{"issue":"9","key":"6407_CR20","first-page":"1","volume":"5","author":"BL Gunjal","year":"2015","unstructured":"Gunjal BL, Mali SN (2015) MEO based secured, robust, high capacity and perceptual quality image watermarking in DWT-SVD domain. Springer Plus 5(9):1\u201316","journal-title":"Springer Plus"},{"key":"6407_CR21","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.jvcir.2015.03.009","volume":"30","author":"J Guo","year":"2015","unstructured":"Guo J, Zheng P, Huang J (2015) Secure watermarking scheme against watermark attacks in the encrypted domain. J Vis Commun Image Represent 30:125\u2013135","journal-title":"J Vis Commun Image Represent"},{"key":"6407_CR22","doi-asserted-by":"crossref","unstructured":"Gupta R, Jain S, Mishra A. (2015) Watermarking system for encrypted images at cloud to check reliability of images. 2015 1st International Conference on Next Generation Computing Technologies, Dehradun, India 46\u201349","DOI":"10.1109\/NGCT.2015.7375080"},{"key":"6407_CR23","unstructured":"Gupta R, Mishra A, Jain S. (2017) A semi-blind HVS based image watermarking scheme using elliptic curve cryptography. Multimedia Tools and Applications 1\u201326"},{"issue":"4","key":"6407_CR24","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.irbm.2017.06.007","volume":"38","author":"S Haddad","year":"2017","unstructured":"Haddad S, Coatrieux G, Cozic M, Bouslimi D (2017) Joint watermarking and lossless JPEG-LS compression for medical image security. IRBM 38(4):198\u2013206","journal-title":"IRBM"},{"issue":"10","key":"6407_CR25","doi-asserted-by":"crossref","first-page":"2981","DOI":"10.1016\/j.sigpro.2005.12.003","volume":"86","author":"TD Hien","year":"2006","unstructured":"Hien TD, Nakao Z, Chen YW (2006) Robust multi-logo watermarking by RDWT and ICA. Signal Processing Elsevier 86(10):2981\u20132993","journal-title":"Signal Processing Elsevier"},{"key":"6407_CR26","doi-asserted-by":"crossref","unstructured":"Hong W, Chen TS, Shiu CW (2008) Lossless steganography for AMBTC-compressed images. In Image and Signal Processing. CISP '08. Congress on Image and Signal Processing, 2008. 2:13\u201317","DOI":"10.1109\/CISP.2008.638"},{"issue":"4","key":"6407_CR27","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.comnet.2016.01.009","volume":"101","author":"MS Hossain","year":"2016","unstructured":"Hossain MS, Muhammad G (2016) Cloud-assisted industrial internet of things (iiot)\u2013enabled framework for health monitoring. Comput Netw 101(4):192\u2013202","journal-title":"Comput Netw"},{"issue":"4","key":"6407_CR28","doi-asserted-by":"crossref","first-page":"42","DOI":"10.4304\/jmm.3.4.42-49","volume":"3","author":"SL Hsieh","year":"2008","unstructured":"Hsieh SL, Tsai IJ, Huang BY, Jian JJ (2008) Protecting copyrights of color images using a watermarking scheme based on secret sharing and wavelet transform. J Multimed 3(4):42\u201349","journal-title":"J Multimed"},{"issue":"7","key":"6407_CR29","volume":"44","author":"CS Hsu","year":"2005","unstructured":"Hsu CS, Hou YC (2005) Copyright protection scheme for digital images using visual cryptography and sampling methods. Opt Eng 44(7):077003","journal-title":"Opt Eng"},{"issue":"9","key":"6407_CR30","doi-asserted-by":"crossref","first-page":"1737","DOI":"10.1016\/j.optcom.2009.12.073","volume":"283","author":"CS Hsu","year":"2010","unstructured":"Hsu CS, Tu SF (2010) Probability-based tampering detection scheme for digital images. Opt Commun 283(9):1737\u20131743","journal-title":"Opt Commun"},{"issue":"2","key":"6407_CR31","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1109\/TIFS.2009.2020778","volume":"4","author":"CH Huang","year":"2009","unstructured":"Huang CH, Chuang SC, Huang YL, Wu JL (2009) Unseen visible watermarking: a novel methodology for auxiliary information delivery via visual contents. IEEE Transactions on Information Forensics and Security 4(2):193\u2013206","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"6407_CR32","doi-asserted-by":"publisher","unstructured":"Jiang L (2018) The identical operands commutative encryption and watermarking based on homomorphism. Multimedia Tools and Applications. Springer, 1\u201320. https:\/\/doi.org\/10.1007\/s11042-018-6142-y","DOI":"10.1007\/s11042-018-6142-y"},{"key":"6407_CR33","doi-asserted-by":"crossref","unstructured":"Juarez-Sandoval O, Fragoso-Navarro E, Cedillo-Hernandez M, Nakano M, Perez-Meana H and Cedillo-Hernandez A. (2017) Improved unseen-visible watermarking for copyrigth protection of digital image. 5th International Workshop in Biometrics and Forensics (IWBF). IEEE, Coventry, UK: 1\u20135","DOI":"10.1109\/IWBF.2017.7935084"},{"issue":"17","key":"6407_CR34","doi-asserted-by":"crossref","first-page":"6849","DOI":"10.1007\/s11042-014-1932-3","volume":"74","author":"GS Kalra","year":"2015","unstructured":"Kalra GS, Talwar R, Sadawarti H (2015) Adaptive digital image watermarking for color images in frequency domain. Multimedia Tools and Applications 74(17):6849\u20136869","journal-title":"Multimedia Tools and Applications"},{"key":"6407_CR35","doi-asserted-by":"publisher","unstructured":"Thakur\u00a0S, Singh AK, Ghrera SP, Elhoseny\u00a0Md (2018) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimedia Tools and Applications :1\u201314. https:\/\/doi.org\/10.1007\/s11042-018-6263-3","DOI":"10.1007\/s11042-018-6263-3"},{"issue":"5","key":"6407_CR36","first-page":"181","volume":"2","author":"G Kaur","year":"2013","unstructured":"Kaur G, Kaur K (2013) Digital watermarking and other data hiding techniques. International Journal of Innovative Technology and Exploring Engineering 2(5):181\u2013183","journal-title":"International Journal of Innovative Technology and Exploring Engineering"},{"issue":"12","key":"6407_CR37","doi-asserted-by":"crossref","first-page":"2385","DOI":"10.1016\/j.sigpro.2009.04.014","volume":"89","author":"WG Kim","year":"2009","unstructured":"Kim WG, Lee H (2009, Elsevier) Multimodal biometric image watermarking using two-stage integrity verification. Signal Process 89(12):2385\u20132399","journal-title":"Signal Process"},{"issue":"8","key":"6407_CR38","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1016\/j.image.2010.07.004","volume":"25","author":"J Kim","year":"2010","unstructured":"Kim J, Kim N, Lee D, Park S, Lee S (2010) Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents. Signal Process Image Commun 25(8):559\u2013576","journal-title":"Signal Process Image Commun"},{"key":"6407_CR39","doi-asserted-by":"crossref","unstructured":"Kittawi N, Al-Haj A. (2017) Reversible data hiding in encrypted images. 2017 8th International Conference on Information Technology, Amman, Jordan, 808\u2013813","DOI":"10.1109\/ICITECH.2017.8079951"},{"key":"6407_CR40","doi-asserted-by":"crossref","unstructured":"Komninos N, Dimitriou T. (2007) Protecting biometric templates with image watermarking techniques. In International Conference on Biometrics, Berlin, Heidelberg, 114\u2013123","DOI":"10.1007\/978-3-540-74549-5_13"},{"key":"6407_CR41","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1016\/j.procs.2017.09.101","volume":"115","author":"GD Kumar","year":"2017","unstructured":"Kumar GD, Teja DP, Reddy SS, Sasikaladevi N (2017) An efficient watermarking technique for biometric images. Procedia Computer Science 115:423\u2013430","journal-title":"Procedia Computer Science"},{"issue":"6","key":"6407_CR42","doi-asserted-by":"crossref","first-page":"1638","DOI":"10.1016\/j.jss.2013.02.022","volume":"86","author":"B Lei","year":"2013","unstructured":"Lei B, Song I, Rahman SA (2013) Robust and secure watermarking scheme for breath sound. Journal of Systems and Software Elsevier 86(6):1638\u20131649","journal-title":"Journal of Systems and Software Elsevier"},{"key":"6407_CR43","unstructured":"Lei B, Zhao X, Lei H, Ni D, Chen S, Zhou F, Wang T. (2017) Multipurpose watermarking scheme via intelligent method and chaotic map. Multimedia Tools and Applications, 1\u201323"},{"issue":"12","key":"6407_CR44","doi-asserted-by":"crossref","first-page":"2519","DOI":"10.1016\/j.patcog.2005.02.007","volume":"38","author":"PL Lin","year":"2005","unstructured":"Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tampers detection and recovery. Pattern Recogn 38(12):2519\u20132529","journal-title":"Pattern Recogn"},{"key":"6407_CR45","doi-asserted-by":"crossref","unstructured":"Liu Y, Zhang L, Nie L, Yan Y, Rosenblum DS. Fortune Teller: Predicting Your Career Path. In AAAI 2016; (2016):201\u2013207","DOI":"10.1609\/aaai.v30i1.9969"},{"issue":"1","key":"6407_CR46","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1049\/iet-bmt.2012.0052","volume":"2","author":"S Majumder","year":"2013","unstructured":"Majumder S, Devi KJ, Sarkar SK (2013) Singular value decomposition and wavelet-based iris biometric watermarking. IET biometrics 2(1):21\u201327","journal-title":"IET biometrics"},{"issue":"8","key":"6407_CR47","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1109\/83.777088","volume":"8","author":"LM Marvel","year":"1999","unstructured":"Marvel LM, Boncelet CG, Retter CT (1999) Spread spectrum image steganography. IEEE Trans Image Process 8(8):1075\u20131083","journal-title":"IEEE Trans Image Process"},{"key":"6407_CR48","unstructured":"Mohanty SP (1999) Digital watermarking: A tutorial review"},{"key":"6407_CR49","doi-asserted-by":"crossref","unstructured":"Mohanty SP, Ramakrishnan KR, Kankanhalli M. (1999) A dual watermarking technique for images. In Proceedings of the seventh ACM international conference on Multimedia (Part 2), 49\u201351","DOI":"10.1145\/319878.319891"},{"issue":"3","key":"6407_CR50","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/MCE.2017.2684980","volume":"6","author":"SP Mohanty","year":"2017","unstructured":"Mohanty SP, Sengupta A, Guturu P, Kougianos E (2017) Everything you want to know about watermarking. IEEE Consumer Electronics Magazine 6(3):83\u201391","journal-title":"IEEE Consumer Electronics Magazine"},{"key":"6407_CR51","doi-asserted-by":"crossref","unstructured":"Moon D, Kim T, Jung S, Chung Y, Moon K, Ahn D, Kim SK (2005) Performance evaluation of watermarking techniques for secure multimodal biometric systems. In Proc. of the International Conference on Computational and Information Science. Springer, Berlin, Heidelberg, 635\u2013642","DOI":"10.1007\/11596981_94"},{"key":"6407_CR52","doi-asserted-by":"crossref","unstructured":"Naderahmadian Y, Hosseini-Khayat S. (2010) Fast watermarking based on QR decomposition in wavelet domain. In proc. of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany; 127\u2013130","DOI":"10.1109\/IIHMSP.2010.39"},{"issue":"2","key":"6407_CR53","first-page":"60","volume":"1","author":"S Narayana","year":"2010","unstructured":"Narayana S, Prasad G (2010) Two new approaches for secured image steganography using cryptographic techniques and type conversions. Signal & Image Processing: An International Journal (SIPIJ) 1(2):60\u201373","journal-title":"Signal & Image Processing: An International Journal (SIPIJ)"},{"issue":"21","key":"6407_CR54","doi-asserted-by":"crossref","first-page":"9117","DOI":"10.1007\/s11042-014-2059-2","volume":"74","author":"D Ou","year":"2015","unstructured":"Ou D, Sun W (2015) High payload image steganography with minimum distortion based on absolute moment block truncation coding. Multimedia Tools and Applications 74(21):9117\u20139139","journal-title":"Multimedia Tools and Applications"},{"key":"6407_CR55","doi-asserted-by":"crossref","unstructured":"Park KR, Jeong DS, Kang BJ, Lee EC. (2007) A study on iris feature watermarking on face data. In International Conference on Adaptive and Natural Computing Algorithms. Berlin, Heidelberg; 415\u2013423","DOI":"10.1007\/978-3-540-71629-7_47"},{"issue":"6","key":"6407_CR56","doi-asserted-by":"crossref","first-page":"1597","DOI":"10.1016\/j.dsp.2010.03.010","volume":"20","author":"JC Patra","year":"2010","unstructured":"Patra JC, Phua JE, Bornand C (2010) A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digital Signal Processing 20(6):1597\u20131611","journal-title":"Digital Signal Processing"},{"issue":"2","key":"6407_CR57","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1016\/j.dsp.2009.07.004","volume":"20","author":"JC Patra","year":"2010","unstructured":"Patra JC, Karthik A, Bornand C (2010) A novel CRT-based watermarking technique for authentication of multimedia contents. Digital Signal Processing 20(2):442\u2013453","journal-title":"Digital Signal Processing"},{"issue":"10","key":"6407_CR58","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1016\/j.aeue.2011.01.016","volume":"65","author":"S Rawat","year":"2011","unstructured":"Rawat S, Raman B (2011) A chaotic system based fragile watermarking scheme for image tamper detection. AEU-International Journal of Electronics and Communications 65(10):840\u2013847","journal-title":"AEU-International Journal of Electronics and Communications"},{"issue":"6","key":"6407_CR59","doi-asserted-by":"crossref","first-page":"1480","DOI":"10.1016\/j.sigpro.2011.12.006","volume":"92","author":"S Rawat","year":"2012","unstructured":"Rawat S, Raman B (2012) A blind watermarking algorithm based on fractional Fourier transform and visual cryptography. Signal Process 92(6):1480\u20131491","journal-title":"Signal Process"},{"key":"6407_CR60","first-page":"1","volume":"516465","author":"V Seenivasagam","year":"2013","unstructured":"Seenivasagam V, Velumani R (2013) A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud. Computational and mathematical methods in medicine. 2013 516465:1\u201316","journal-title":"2013"},{"key":"6407_CR61","doi-asserted-by":"crossref","first-page":"10269","DOI":"10.1109\/ACCESS.2018.2799240","volume":"6","author":"A Shehab","year":"2018","unstructured":"Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269\u201310278","journal-title":"IEEE Access"},{"key":"6407_CR62","unstructured":"Singh AK (2015) Some new techniques of improved wavelet domain watermarking for medical images, PhD thesis, Department of Computer Engineering, NIT Kurukshetra, Haryana, India"},{"key":"6407_CR63","doi-asserted-by":"crossref","unstructured":"Singh AK, Kumar B, Dave M, Ghrera SP and Mohan A (2016) Digital Image Watermarking: Techniques and Emerging Applications. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security.IGI Global, USA; 246\u2013272","DOI":"10.4018\/978-1-5225-0105-3.ch011"},{"key":"6407_CR64","doi-asserted-by":"publisher","unstructured":"Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2018) Multiple watermarking technique for securing online social network contents using back propagation neural network. Futur Gener Comput Syst 86:926\u2013939. https:\/\/doi.org\/10.1016\/j.future.2016.11.023","DOI":"10.1016\/j.future.2016.11.023"},{"key":"6407_CR65","doi-asserted-by":"crossref","unstructured":"Singh AK, Kumar B, Singh G and Mohan A (2017) Medical Image Watermarking: Techniques and Applications. Book series on Multimedia Systems and Applications, Springer, USA","DOI":"10.1007\/978-3-319-57699-2_1"},{"issue":"1","key":"6407_CR66","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1007\/s11771-011-0668-8","volume":"18","author":"W Song","year":"2011","unstructured":"Song W, Hou JJ, Li ZH, Huang L (2011) Chaotic system and QR factorization based robust digital image watermarking algorithm. J Cent S Univ Technol 18(1):116\u2013124","journal-title":"J Cent S Univ Technol"},{"key":"6407_CR67","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.aeue.2017.05.025","volume":"78","author":"Q Su","year":"2017","unstructured":"Su Q, Chen B (2017) A novel blind color image watermarking using upper Hessenberg matrix. AEU-International Journal of Electronics and Communications 78:64\u201371","journal-title":"AEU-International Journal of Electronics and Communications"},{"issue":"1","key":"6407_CR68","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/s00500-017-2489-7","volume":"22","author":"Q Su","year":"2018","unstructured":"Su Q, Chen B (2018) Robust color image watermarking technique in the spatial domain. Soft Comput 22(1):91\u2013106","journal-title":"Soft Comput"},{"issue":"1","key":"6407_CR69","doi-asserted-by":"crossref","first-page":"987","DOI":"10.1007\/s11042-013-1653-z","volume":"72","author":"Q Su","year":"2014","unstructured":"Su Q, Niu Y, Zou H, Zhao Y, Yao T (2014) A blind double color image watermarking algorithm based on QR decomposition. Multimedia tools and applications 72(1):987\u20131009","journal-title":"Multimedia tools and applications"},{"key":"6407_CR70","doi-asserted-by":"crossref","unstructured":"Tanha M, Torshizi SD, Abdullah MT, Hashim F. (2012) An overview of attacks against digital watermarking and their respective countermeasures. In proc. of 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) , IEEE, Kuala Lumpur, Malaysia 265\u2013270","DOI":"10.1109\/CyberSec.2012.6246095"},{"issue":"2","key":"6407_CR71","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1587\/elex.3.23","volume":"3","author":"M Vatsa","year":"2006","unstructured":"Vatsa M, Singh R, Noore A, Houck MM, Morris K (2006) Robust biometric image watermarking for fingerprint and face template protection. IEICE Electronics Express 3(2):23\u201328","journal-title":"IEICE Electronics Express"},{"issue":"3","key":"6407_CR72","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/j.imavis.2007.05.003","volume":"27","author":"M Vatsa","year":"2009","unstructured":"Vatsa M, Singh R, Noore A (2009) Feature based RDWT watermarking for multimodal biometric system. Image Vis Comput 27(3):293\u2013304","journal-title":"Image Vis Comput"},{"issue":"4","key":"6407_CR73","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1016\/j.csi.2008.09.003","volume":"31","author":"MS Wang","year":"2009","unstructured":"Wang MS, Chen WC (2009) A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Computer Standards & Interfaces 31(4):757\u2013762","journal-title":"Computer Standards & Interfaces"},{"issue":"9","key":"6407_CR74","doi-asserted-by":"crossref","first-page":"1348","DOI":"10.1109\/5.628669","volume":"85","author":"RP Wildes","year":"1997","unstructured":"Wildes RP (1997) Iris recognition: an emerging biometric technology. Proc IEEE 85(9):1348\u20131363","journal-title":"Proc IEEE"},{"issue":"11","key":"6407_CR75","doi-asserted-by":"crossref","first-page":"2594","DOI":"10.1109\/TIFS.2016.2590944","volume":"11","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security 11(11):2594\u20132608","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"6407_CR76","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1117\/1.482612","volume":"7","author":"MM Yeung","year":"1998","unstructured":"Yeung MM, Mintzer FC (1998) Invisible watermarking for image verification. Journal of Electronic imaging 7(3):578\u2013592","journal-title":"Journal of Electronic imaging"},{"key":"6407_CR77","doi-asserted-by":"crossref","unstructured":"Yin Z, Luo B, Hong W (2014) Separable and error-free reversible data hiding in encrypted image with high payload. The Scientific World Journal, (2014), Article ID: 604876;1\u20138","DOI":"10.1155\/2014\/604876"},{"issue":"4","key":"6407_CR78","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang X (2011) Reversible data hiding in encrypted image. IEEE signal processing letters 18(4):255\u2013258","journal-title":"IEEE signal processing letters"},{"issue":"2","key":"6407_CR79","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"X Zhang","year":"2012","unstructured":"Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE transactions on information forensics and security 7(2):826\u2013832","journal-title":"IEEE transactions on information forensics and security"},{"issue":"10","key":"6407_CR80","doi-asserted-by":"crossref","first-page":"1661","DOI":"10.1093\/comjnl\/bxr078","volume":"54","author":"J Zhang","year":"2011","unstructured":"Zhang J, Xiang Y, Zhou W, Ye L, Mu Y (2011) Secure image retrieval based on visual content and watermarking protocol. Comput J 54(10):1661\u20131674","journal-title":"Comput J"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6407-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6407-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6407-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T00:29:44Z","timestamp":1661732984000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6407-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,10]]},"references-count":80,"journal-issue":{"issue":"23-24","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["6407"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6407-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,10]]},"assertion":[{"value":"12 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}