{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T19:53:36Z","timestamp":1720641216716},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2018,10,30]],"date-time":"2018-10-30T00:00:00Z","timestamp":1540857600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s11042-018-6767-x","type":"journal-article","created":{"date-parts":[[2018,10,30]],"date-time":"2018-10-30T11:33:18Z","timestamp":1540899198000},"page":"29229-29270","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Hyperchaos permutation on false-positive-free SVD-based image watermarking"],"prefix":"10.1007","volume":"78","author":[{"given":"Jing-Ming","family":"Guo","sequence":"first","affiliation":[]},{"given":"Dwi","family":"Riyono","sequence":"additional","affiliation":[]},{"given":"Heri","family":"Prasetyo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,30]]},"reference":[{"issue":"4","key":"6767_CR1","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.aeue.2011.08.005","volume":"66","author":"G Bhatnagar","year":"2012","unstructured":"Bhatnagar G (2012) A new facet in robust digital watermarking framework. AEU-International Journal of Electronics and Communications 66(4):275\u2013285","journal-title":"AEU-International Journal of Electronics and Communications"},{"issue":"4","key":"6767_CR2","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1049\/iet-ipr.2010.0400","volume":"6","author":"G Bhatnagar","year":"2012","unstructured":"Bhatnagar G, Raman B, Wu QMJ (2012) Robust watermarking using fractional wavelet packet transform. IET Image Process 6(4):386\u2013397","journal-title":"IET Image Process"},{"issue":"1","key":"6767_CR3","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.future.2012.05.021","volume":"29","author":"G Bhatnagar","year":"2013","unstructured":"Bhatnagar G, Wu QMJ (2013) Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform. Futur Gener Comput Syst 29(1):182\u2013195","journal-title":"Futur Gener Comput Syst"},{"issue":"19","key":"6767_CR4","doi-asserted-by":"publisher","first-page":"8421","DOI":"10.1007\/s11042-013-1681-8","volume":"74","author":"G Bhatnagar","year":"2015","unstructured":"Bhatnagar G, Wu QMJ (2015) A new robust and efficient multiple watermarking scheme. Multimedia Tools and Applications 74(19):8421\u20138444","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"6767_CR5","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.cose.2011.11.003","volume":"31","author":"G Bhatnagar","year":"2012","unstructured":"Bhatnagar G, Wu QMJ, Raman B (2012) A new robust adjustable logo watermarking scheme. Computer and Security 31(1):40\u201358","journal-title":"Computer and Security"},{"key":"6767_CR6","doi-asserted-by":"publisher","unstructured":"El-Shafai W, El-Rabaie EM, El-Halawany M, El-Samie FEA (2018) Efficient multi-level security for robust 3D color-plus-depth HEVC. Multimedia Tools and Applications. \n https:\/\/doi.org\/10.1007\/s11042-018-6036-z","DOI":"10.1007\/s11042-018-6036-z"},{"issue":"9","key":"6767_CR7","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1016\/j.aeue.2014.03.008","volume":"68","author":"JM Guo","year":"2014","unstructured":"Guo JM, Prasetyo H (2014) Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU-International Journal of Electronics and Communications 68(9):816\u2013834","journal-title":"AEU-International Journal of Electronics and Communications"},{"issue":"5","key":"6767_CR8","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1016\/j.jvcir.2014.03.012","volume":"25","author":"JM Guo","year":"2014","unstructured":"Guo JM, Prasetyo H (2014) False-positive-free SVD-based image watermarking. J Vis Commun Image Represent 25(5):1149\u20131163","journal-title":"J Vis Commun Image Represent"},{"issue":"4","key":"6767_CR9","doi-asserted-by":"publisher","first-page":"1989","DOI":"10.1109\/TITS.2014.2386535","volume":"16","author":"JM Guo","year":"2015","unstructured":"Guo JM, Prasetyo H, Farfoura ME, Lee H (2015) Vehicle verification using features from Curvelet transform and generalized Gaussian distribution modeling. IEEE Trans Intell Transp Syst 16(4):1989\u20131998","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"9","key":"6767_CR10","doi-asserted-by":"publisher","first-page":"1576","DOI":"10.1109\/TMM.2015.2449234","volume":"17","author":"JM Guo","year":"2015","unstructured":"Guo JM, Prasetyo H, Wang NJ (2015) Effective image retrieval system using dot-diffused block truncation coding. IEEE Transactions on Multimedia 17(9):1576\u20131590","journal-title":"IEEE Transactions on Multimedia"},{"key":"6767_CR11","first-page":"193","volume":"35","author":"JM Guo","year":"2016","unstructured":"Guo JM, Prasetyo H, Wong H (2016) Halftoning-based block truncation coding image restoration. Journal of Visual Communication 35:193\u2013197","journal-title":"Journal of Visual Communication"},{"key":"6767_CR12","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1016\/j.aeue.2016.03.004","volume":"70","author":"M Mardanpour","year":"2016","unstructured":"Mardanpour M, Chahooki MAZ (2016) Robust transparent image watermarking with shearlet transform and bidiagonal singular value decomposition. AEU-International Journal of Electronics and Communications 70:790\u2013798","journal-title":"AEU-International Journal of Electronics and Communications"},{"issue":"2","key":"6767_CR13","doi-asserted-by":"publisher","first-page":"2011","DOI":"10.1007\/s11277-018-5252-1","volume":"102","author":"S Ponni","year":"2018","unstructured":"Ponni S, Ramakrishnan S (2018) Fibonacci based key frame selection and scrambling for video watermarking in DWT-SVD domain. Wirel Pers Commun 102(2):2011\u20132031","journal-title":"Wirel Pers Commun"},{"issue":"7","key":"6767_CR14","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1016\/j.aeue.2010.09.008","volume":"65","author":"S Rastegar","year":"2011","unstructured":"Rastegar S, Namazi F, Yaghmaie K, Aliabadian A (2011) Hybrid watermarking based on singular value decomposition and Radon transform. AEU-International Journal of Electronics and Communications 65(7):658\u2013663","journal-title":"AEU-International Journal of Electronics and Communications"},{"key":"6767_CR15","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.jvcir.2018.03.006","volume":"53","author":"SP Singh","year":"2018","unstructured":"Singh SP, Bhatnagar G (2018) A new robust watermarking system in integer DCT domain. J Vis Commun Image Represent 53:86\u2013101","journal-title":"J Vis Commun Image Represent"},{"key":"6767_CR16","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.ins.2017.08.077","volume":"422","author":"P Singh","year":"2018","unstructured":"Singh P, Raman B (2018) Reversible data hiding based on Shamir\u2019s secret sharing for color images over cloud. Inf Sci 422:77\u201397","journal-title":"Inf Sci"},{"key":"6767_CR17","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.image.2017.04.012","volume":"57","author":"P Singh","year":"2017","unstructured":"Singh P, Raman B, Misra M (2017) A secure image sharing based on SVD and fractional fourier. Signal Process Image Commun 57:46\u201359","journal-title":"Signal Process Image Commun"},{"issue":"3","key":"6767_CR18","doi-asserted-by":"publisher","first-page":"3871","DOI":"10.1007\/s11042-016-4048-0","volume":"76","author":"P Singh","year":"2017","unstructured":"Singh P, Raman B, Roy PP (2017) A multimodal biometric watermarking system for digital images in redundant discrete wavelet transform. Multimedia Tools and Applications 76(3):3871\u20133897","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"6767_CR19","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1016\/j.jvcir.2012.01.017","volume":"23","author":"C Song","year":"2012","unstructured":"Song C, Sudirman S, Merabti M (2012) A robust region-adaptive dual image watermarking technique. J Vis Commun Image Represent 23(3):549\u2013568","journal-title":"J Vis Commun Image Represent"},{"issue":"24","key":"6767_CR20","doi-asserted-by":"publisher","first-page":"25623","DOI":"10.1007\/s11042-017-4355-0","volume":"76","author":"P Vaidya","year":"2017","unstructured":"Vaidya P, Mouli C (2017) A robust semi-blind watermarking for color images based on multiple decompositions. Multimedia Tools and Applications 76(24):25623\u201325656","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"6767_CR21","doi-asserted-by":"publisher","first-page":"4033","DOI":"10.1016\/j.eswa.2009.09.032","volume":"37","author":"E Yen","year":"2010","unstructured":"Yen E, Lin LH (2010) Rubik\u2019s cube watermarking technology for grayscale images. Expert Syst Appl 37(6):4033\u20134039","journal-title":"Expert Syst Appl"},{"issue":"4","key":"6767_CR22","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1007\/s11042-016-3862-8","volume":"77","author":"A Zear","year":"2018","unstructured":"Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT, and SVD for application in medicine. Multimedia Tools and Applications 77(4):4863\u20134882","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"6767_CR23","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1016\/j.image.2013.02.004","volume":"28","author":"H Zhu","year":"2013","unstructured":"Zhu H, Zhao C, Zhang X (2013) A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem. Signal Process Image Commun 28(6):670\u2013680","journal-title":"Signal Process Image Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6767-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6767-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6767-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,30]],"date-time":"2019-10-30T21:04:55Z","timestamp":1572469495000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6767-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,30]]},"references-count":23,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["6767"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6767-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,30]]},"assertion":[{"value":"2 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}