{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:27:48Z","timestamp":1740122868246,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T00:00:00Z","timestamp":1609804800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T00:00:00Z","timestamp":1609804800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100006769","name":"Russian Science Foundation","doi-asserted-by":"publisher","award":["19-71-00106"],"id":[{"id":"10.13039\/501100006769","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10316-7","type":"journal-article","created":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T10:04:41Z","timestamp":1609841081000},"page":"11217-11238","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An algorithm for embedding information in digital images based on discrete wavelet transform and learning automata"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8257-2082","authenticated-orcid":false,"given":"Oleg","family":"Evsutin","sequence":"first","affiliation":[]},{"given":"Pavel","family":"Kultaev","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,5]]},"reference":[{"key":"10316_CR1","doi-asserted-by":"publisher","first-page":"18001","DOI":"10.1007\/s11042-016-3680-z","volume":"76","author":"IA Ansari","year":"2017","unstructured":"Ansari IA, Pant M, Ahn CW (2017) Artificial bee colony optimized robust-reversible image watermarking. Multimed Tools Appl 76:18001\u201318025","journal-title":"Multimed Tools Appl"},{"key":"10316_CR2","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.measurement.2019.02.069","volume":"139","author":"S Arunkumar","year":"2019","unstructured":"Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N, Logesh R (2019) SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139:426\u2013437","journal-title":"Measurement"},{"key":"10316_CR3","doi-asserted-by":"publisher","first-page":"8375","DOI":"10.1007\/s11042-017-4738-2","volume":"77","author":"R Bakthula","year":"2018","unstructured":"Bakthula R, Shivani S, Agarwal S (2018) Self authenticating medical X-ray images for telemedicine applications. Multimed Tools Appl 77:8375\u20138392","journal-title":"Multimed Tools Appl"},{"key":"10316_CR4","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1142\/S0219525904000202","volume":"7","author":"H Beigy","year":"2004","unstructured":"Beigy H, Meybodi MR (2004) A mathematical framework for cellular learning automata. Adv Complex Syst 7:295\u2013319","journal-title":"Adv Complex Syst"},{"key":"10316_CR5","unstructured":"BOWS-2 Web page: https:\/\/bows2.ec-lille.fr\/Accessed 10 Aug 2020"},{"key":"10316_CR6","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.amc.2007.05.063","volume":"196","author":"W-Y Chen","year":"2008","unstructured":"Chen W-Y (2008) Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques. Appl Math Comput 196:40\u201354","journal-title":"Appl Math Comput"},{"key":"10316_CR7","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B Chen","year":"2001","unstructured":"Chen B, Wornell GW (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47:1423\u20131443","journal-title":"IEEE Trans Inf Theory"},{"key":"10316_CR8","doi-asserted-by":"publisher","first-page":"5493","DOI":"10.1007\/s11042-015-2522-8","volume":"75","author":"S-T Chen","year":"2016","unstructured":"Chen S-T, Huang H-N, Kung W-M, Hsu C-Y (2016) Optimization-based image watermarking with integrated quantization embedding in the wavelet-domain. Multimed Tools Appl 75:5493\u20135511","journal-title":"Multimed Tools Appl"},{"key":"10316_CR9","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1007\/s11042-013-1377-0","volume":"73","author":"N Ejaz","year":"2014","unstructured":"Ejaz N, Anwar J, Ishtiaq M, Baik SW (2014) Adaptive image data hiding using transformation and error replacement. Multimed Tools Appl 73:825\u2013840","journal-title":"Multimed Tools Appl"},{"key":"10316_CR10","doi-asserted-by":"crossref","unstructured":"Evsutin O, Kokurina A, Mescheryakov R, Shumskaya O (2016) An adaptive algorithm for the steganographic embedding information into the discrete fourier transform phase spectrum. In: Proceedings of the first international scientific conference \u201cintelligent information technologies for industry\u201d(IITI\u201916). Springer, pp 47\u201356","DOI":"10.1007\/978-3-319-33816-3_5"},{"key":"10316_CR11","doi-asserted-by":"crossref","unstructured":"Evsutin O, Meshcheryakov R, Genrikh V et al (2017) An improved algorithm of digital watermarking based on wavelet transform using learning automata. In: 2017 Second Russia and Pacific conference on computer technology and applications (RPC). IEEE, pp 49\u201353","DOI":"10.1109\/RPC.2017.8168066"},{"key":"10316_CR12","doi-asserted-by":"publisher","first-page":"28567","DOI":"10.1007\/s11042-018-6055-9","volume":"77","author":"O Evsutin","year":"2018","unstructured":"Evsutin O, Kokurina A, Meshcheryakov R, Shumskaya O (2018) The adaptive algorithm of information unmistakable embedding into digital images based on the discrete Fourier transformation. Multimed Tools Appl 77:28567\u201328599","journal-title":"Multimed Tools Appl"},{"key":"10316_CR13","doi-asserted-by":"crossref","unstructured":"Fridrich J (2009) Steganography in digital media: principles, algorithms, and applications. Cambridge University Press","DOI":"10.1017\/CBO9781139192903"},{"key":"10316_CR14","unstructured":"Guo C, Ma Q, Zhang L (2008) Spatio-temporal saliency detection using phase spectrum of quaternion fourier transform. In: 2008 IEEE conference on computer vision and pattern recognition. IEEE, pp 1\u20138"},{"key":"10316_CR15","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.image.2018.03.012","volume":"65","author":"M Hussain","year":"2018","unstructured":"Hussain M, Wahab AWA, Idris YIB et al (2018) Image steganography in spatial domain: a survey. Signal Process Image Commun 65:46\u201366","journal-title":"Signal Process Image Commun"},{"key":"10316_CR16","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1049\/el:20000269","volume":"36","author":"N Kaewamnerd","year":"2000","unstructured":"Kaewamnerd N, Rao KR (2000) Wavelet based image adaptive watermarking scheme. Electron Lett 36:312\u2013313","journal-title":"Electron Lett"},{"key":"10316_CR17","doi-asserted-by":"publisher","first-page":"25999","DOI":"10.1007\/s11042-019-7664-7","volume":"78","author":"A Khan","year":"2019","unstructured":"Khan A, Sarfaraz A (2019) FFT-ETM based distortion less and high payload image steganography. Multimed Tools Appl 78:25999\u201326022","journal-title":"Multimed Tools Appl"},{"key":"10316_CR18","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/5.771070","volume":"87","author":"D Kundur","year":"1999","unstructured":"Kundur D, Hatzinakos D (1999) Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87:1167\u20131180","journal-title":"Proc IEEE"},{"key":"10316_CR19","doi-asserted-by":"publisher","first-page":"3060","DOI":"10.1109\/TIM.2010.2066770","volume":"59","author":"C-C Lai","year":"2010","unstructured":"Lai C-C, Tsai C-C (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59:3060\u20133063","journal-title":"IEEE Trans Instrum Meas"},{"key":"10316_CR20","doi-asserted-by":"publisher","first-page":"3178","DOI":"10.1016\/j.eswa.2013.11.019","volume":"41","author":"B Lei","year":"2014","unstructured":"Lei B, Tan E-L, Chen S, Ni D, Wang T, Lei H (2014) Reversible watermarking scheme for medical image based on differential evolution. Expert Syst Appl 41:3178\u20133188","journal-title":"Expert Syst Appl"},{"key":"10316_CR21","doi-asserted-by":"publisher","first-page":"20739","DOI":"10.1007\/s11042-016-3971-4","volume":"76","author":"X Liao","year":"2017","unstructured":"Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete Fourier transform. Multimed Tools Appl 76:20739\u201320753","journal-title":"Multimed Tools Appl"},{"key":"10316_CR22","doi-asserted-by":"publisher","first-page":"76580","DOI":"10.1109\/ACCESS.2019.2921894","volume":"7","author":"X Liu","year":"2019","unstructured":"Liu X, Lou J, Fang H, Chen Y, Ouyang P, Wang Y, Zou B, Wang L (2019) A novel robust reversible watermarking scheme for protecting authenticity and integrity of medical images. IEEE Access 7:76580\u201376598","journal-title":"IEEE Access"},{"key":"10316_CR23","doi-asserted-by":"publisher","first-page":"3617","DOI":"10.1007\/s11042-016-3913-1","volume":"76","author":"S Maheshkar","year":"2017","unstructured":"Maheshkar S (2017) Region-based hybrid medical image watermarking for secure telemedicine applications. Multimed Tools Appl 76:3617\u20133647","journal-title":"Multimed Tools Appl"},{"key":"10316_CR24","doi-asserted-by":"publisher","first-page":"26845","DOI":"10.1007\/s11042-018-5891-y","volume":"77","author":"NM Makbol","year":"2018","unstructured":"Makbol NM, Khoo BE, Rassem TH (2018) Security analyses of false positive problem for the SVD-based hybrid digital image watermarking techniques in the wavelet transform domain. Multimed Tools Appl 77:26845\u201326879","journal-title":"Multimed Tools Appl"},{"key":"10316_CR25","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.ijleo.2017.07.043","volume":"145","author":"A Miri","year":"2017","unstructured":"Miri A, Faez K (2017) Adaptive image steganography based on transform domain via genetic algorithm. Optik 145:158\u2013168","journal-title":"Optik"},{"key":"10316_CR26","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/49.668975","volume":"16","author":"CI Podilchuk","year":"1998","unstructured":"Podilchuk CI, Zeng W (1998) Image-adaptive watermarking using visual models. IEEE J Sel Areas Commun 16:525\u2013539","journal-title":"IEEE J Sel Areas Commun"},{"key":"10316_CR27","doi-asserted-by":"publisher","first-page":"8627","DOI":"10.1007\/s11042-016-3501-4","volume":"76","author":"T Rabie","year":"2017","unstructured":"Rabie T, Kamel I (2017) Toward optimal embedding capacity for transform domain steganography: a quad-tree adaptive-region approach. Multimed Tools Appl 76:8627\u20138650","journal-title":"Multimed Tools Appl"},{"key":"10316_CR28","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1080\/13682199.2019.1620525","volume":"67","author":"M Saidi","year":"2019","unstructured":"Saidi M, Mannai O, Hermassi H, Rhouma R, Belghith S (2019) USAD: undetectable steganographic approach in DCT domain. Imaging Sci J 67:237\u2013253","journal-title":"Imaging Sci J"},{"key":"10316_CR29","doi-asserted-by":"crossref","unstructured":"Salomon D, Motta G (2010) Handbook of data compression. Springer Science & Business Media","DOI":"10.1007\/978-1-84882-903-9"},{"key":"10316_CR30","doi-asserted-by":"publisher","first-page":"1623","DOI":"10.1007\/s11042-017-4367-9","volume":"77","author":"FY Shih","year":"2018","unstructured":"Shih FY, Zhong X, Chang I-C, Satoh S (2018) An adjustable-purpose image watermarking technique by particle swarm optimization. Multimed Tools Appl 77:1623\u20131642","journal-title":"Multimed Tools Appl"},{"key":"10316_CR31","doi-asserted-by":"crossref","unstructured":"Singh L, Singh AK, Singh PK (2020) Secure data hiding techniques: a survey. Multimed Tools Appl 79:15901\u201315921","DOI":"10.1007\/s11042-018-6407-5"},{"key":"10316_CR32","unstructured":"SIPI Image Database: https:\/\/sipi.usc.edu\/database\/. Accessed 10 Aug 2020"},{"key":"10316_CR33","doi-asserted-by":"publisher","first-page":"28249","DOI":"10.1007\/s11042-018-6020-7","volume":"77","author":"K Swaraja","year":"2018","unstructured":"Swaraja K (2018) Medical image region based watermarking for secured telemedicine. Multimed Tools Appl 77:28249\u201328280","journal-title":"Multimed Tools Appl"},{"key":"10316_CR34","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s11042-015-3055-x","volume":"76","author":"R Thabit","year":"2017","unstructured":"Thabit R, Khoo BE (2017) Medical image authentication using SLT and IWT schemes. Multimed Tools Appl 76:309\u2013332","journal-title":"Multimed Tools Appl"},{"key":"10316_CR35","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1080\/13682199.2017.1367129","volume":"65","author":"R Thanki","year":"2017","unstructured":"Thanki R, Borra S, Dwivedi V, Borisagar K (2017) A steganographic approach for secure communication of medical images based on the DCT-SVD and the compressed sensing (CS) theory. Imaging Sci J 65:457\u2013467","journal-title":"Imaging Sci J"},{"key":"10316_CR36","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1109\/30.735826","volume":"44","author":"ZH Wei","year":"1998","unstructured":"Wei ZH, Qin P, Fu YQ (1998) Perceptual digital watermark of images using wavelet transform. IEEE Trans Consum Electron 44:1267\u20131272","journal-title":"IEEE Trans Consum Electron"},{"key":"10316_CR37","doi-asserted-by":"publisher","first-page":"1251","DOI":"10.1016\/j.sigpro.2006.10.014","volume":"87","author":"K Wong","year":"2007","unstructured":"Wong K, Qi X, Tanaka K (2007) A DCT-based Mod4 steganographic method. Signal Process 87:1251\u20131263","journal-title":"Signal Process"},{"key":"10316_CR38","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1364\/OE.3.000497","volume":"3","author":"X-G Xia","year":"1998","unstructured":"Xia X-G, Boncelet CG, Arce GR (1998) Wavelet transform based watermark for digital images. Opt Express 3:497\u2013511","journal-title":"Opt Express"},{"key":"10316_CR39","doi-asserted-by":"publisher","first-page":"43391","DOI":"10.1109\/ACCESS.2020.2978186","volume":"8","author":"Z Zainol","year":"2020","unstructured":"Zainol Z, Teh JS, Alawida M (2020) A new chaotic image watermarking scheme based on SVD and IWT. IEEE Access 8:43391\u201343406","journal-title":"IEEE Access"},{"key":"10316_CR40","doi-asserted-by":"crossref","unstructured":"Zhang L, Wei D (2020) Robust and reliable image copyright protection scheme using downsampling and block transform in integer wavelet domain. Digital Signal Processing 102805","DOI":"10.1016\/j.dsp.2020.102805"},{"key":"10316_CR41","doi-asserted-by":"publisher","first-page":"18343","DOI":"10.1007\/s11042-019-08490-4","volume":"79","author":"P Zheng","year":"2020","unstructured":"Zheng P, Zhang Y (2020) A robust image watermarking scheme in hybrid transform domains resisting to rotation attacks. Multimed Tools Appl 79:18343\u201318365","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10316-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-10316-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10316-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,18]],"date-time":"2021-04-18T19:37:50Z","timestamp":1618774670000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-10316-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,5]]},"references-count":41,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10316"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10316-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,1,5]]},"assertion":[{"value":"27 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}