{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T20:54:06Z","timestamp":1725656046261},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"30","license":[{"start":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T00:00:00Z","timestamp":1653436800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T00:00:00Z","timestamp":1653436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s11042-021-11791-2","type":"journal-article","created":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T18:03:47Z","timestamp":1653501827000},"page":"43613-43638","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Secure transmission and integrity verification for color medical images in telemedicine applications"],"prefix":"10.1007","volume":"81","author":[{"given":"Moad Med","family":"Sayah","sequence":"first","affiliation":[]},{"given":"Kafi Med","family":"Redouane","sequence":"additional","affiliation":[]},{"given":"Khaldi","family":"Amine","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,25]]},"reference":[{"key":"11791_CR1","unstructured":"A. A. Abdulla, \u201cExploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography,\u201d doctoral, University of Buckingham, 2015. Accessed: Jun. 26, 2021. [Online]. Available: http:\/\/bear.buckingham.ac.uk\/149\/"},{"key":"11791_CR2","doi-asserted-by":"crossref","unstructured":"A. A. Abdulla, \u201cEfficient computer-aided diagnosis technique for leukaemia cancer detection,\u201d IET Image Processing, vol. 14, no. 17, pp. 4435\u20134440, Dec. 2020, https:\/\/doi.org\/10.1049\/iet-ipr.2020.0978.","DOI":"10.1049\/iet-ipr.2020.0978"},{"key":"11791_CR3","doi-asserted-by":"crossref","unstructured":"A. A. Abdulla, H. Sellahewa, and S. A. Jassim, \u201cSteganography based on pixel intensity value decomposition.\u201d Mobile Multimedia\/Image Processing, Security, and Applications 2014, vol. 9120, p. 912005, May 2014, 10.1117\/12.2050518.","DOI":"10.1117\/12.2050518"},{"issue":"13","key":"11791_CR4","doi-asserted-by":"publisher","first-page":"17799","DOI":"10.1007\/s11042-019-7166-7","volume":"78","author":"AA Abdulla","year":"2019","unstructured":"Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78(13):17799\u201317823. https:\/\/doi.org\/10.1007\/s11042-019-7166-7","journal-title":"Multimed Tools Appl"},{"key":"11791_CR5","doi-asserted-by":"crossref","unstructured":"S. B. B. Ahmadi, G. Zhang and H. Jelodar, \"A robust hybrid SVD-based image watermarking scheme for color images,\" 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 2019, pp. 0682-0688, https:\/\/doi.org\/10.1109\/IEMCON.2019.8936229","DOI":"10.1109\/IEMCON.2019.8936229"},{"key":"11791_CR6","doi-asserted-by":"publisher","unstructured":"S. B. B. Ahmadi, G. Zhang, M. Rabbani, L. Boukela, and H. Jelodar, \u201cAn intelligent and blind dual color image watermarking for authentication and copyright protection,\u201d Appl Intell, Oct. 2020, https:\/\/doi.org\/10.1007\/s10489-020-01903-0.","DOI":"10.1007\/s10489-020-01903-0"},{"key":"11791_CR7","doi-asserted-by":"publisher","unstructured":"S. B. B. Ahmadi, G. Zhang, S. Wei, and L. Boukela, \u201cAn intelligent and blind image watermarking scheme based on hybrid SVD transforms using human visual system characteristics,\u201d Vis Comput, Feb. 2020, https:\/\/doi.org\/10.1007\/s00371-020-01808-6.","DOI":"10.1007\/s00371-020-01808-6"},{"key":"11791_CR8","doi-asserted-by":"publisher","unstructured":"S. B. B. Ahmadi, G. Zhang, and S. Wei, \u201cRobust and hybrid SVD-based image watermarking schemes:,\u201d Multimed Tools Appl, vol. 79, no. 1, pp. 1075\u20131117, Jan. 2020, https:\/\/doi.org\/10.1007\/s11042-019-08197-6.","DOI":"10.1007\/s11042-019-08197-6"},{"key":"11791_CR9","doi-asserted-by":"publisher","unstructured":"A. Anand and A. K. Singh, \u201cAn improved DWT-SVD domain watermarking for medical information security,\u201d Computer Communications, vol. 152, pp. 72\u201380, Feb. 2020, https:\/\/doi.org\/10.1016\/j.comcom.2020.01.038.","DOI":"10.1016\/j.comcom.2020.01.038"},{"key":"11791_CR10","doi-asserted-by":"publisher","first-page":"102472","DOI":"10.1016\/j.jisa.2020.102472","volume":"52","author":"P Ayubi","year":"2020","unstructured":"Ayubi P, Setayeshi S, Rahmani AM (2020) Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application. J Inf Sec Appl 52:102472. https:\/\/doi.org\/10.1016\/j.jisa.2020.102472","journal-title":"J Inf Sec Appl"},{"key":"11791_CR11","doi-asserted-by":"publisher","unstructured":"M. Jafari Barani, P. Ayubi, M. Yousefi Valandar, and B. Yosefnezhad Irani, \u201cA blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform,\u201d Multimed Tools Appl, vol. 79, no. 3, pp. 2127\u20132159, Jan. 2020, https:\/\/doi.org\/10.1007\/s11042-019-08225-5.","DOI":"10.1007\/s11042-019-08225-5"},{"issue":"2","key":"11791_CR12","doi-asserted-by":"publisher","first-page":"13","DOI":"10.4018\/IJDCF.2019040102","volume":"11","author":"S Borra","year":"2019","unstructured":"Borra S, Thanki R (2019) A FRT - SVD Based Blind Medical Watermarking Technique for Telemedicine Applications. International Journal of Digital Crime and Forensics (IJDCF) 11(2):13\u201333. https:\/\/doi.org\/10.4018\/IJDCF.2019040102","journal-title":"International Journal of Digital Crime and Forensics (IJDCF)"},{"key":"11791_CR13","doi-asserted-by":"publisher","unstructured":"S. Borra and R. Thanki, \u201cCrypto-watermarking scheme for tamper detection of medical images,\u201d Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization, vol. 8, no. 4, pp. 345\u2013355, Jul. 2020, https:\/\/doi.org\/10.1080\/21681163.2019.1595730.","DOI":"10.1080\/21681163.2019.1595730"},{"key":"11791_CR14","doi-asserted-by":"publisher","unstructured":"S. Borra, R. Thanki, N. Dey, and K. Borisagar, \u201cSecure transmission and integrity verification of color radiological images using fast discrete curvelet transform and compressive sensing,\u201d Smart Health, vol. 12, pp. 35\u201348, Apr. 2019, https:\/\/doi.org\/10.1016\/j.smhl.2018.02.001.","DOI":"10.1016\/j.smhl.2018.02.001"},{"key":"11791_CR15","doi-asserted-by":"publisher","unstructured":"D. S. Chauhan, A. K. Singh, A. Adarsh, B. Kumar, and J. P. Saini, \u201cCombining Mexican hat wavelet and spread spectrum for adaptive watermarking and its statistical detection using medical images,\u201d Multimed Tools Appl, vol. 78, no. 10, pp. 12647\u201312661, May 2019, https:\/\/doi.org\/10.1007\/s11042-017-5348-8.","DOI":"10.1007\/s11042-017-5348-8"},{"key":"11791_CR16","doi-asserted-by":"crossref","unstructured":"Changbing Chen, Ju Liu, Jiande Sun, Zhenfeng Ren, and Huibo Hu, \u201cA robust watermarking scheme based on Non-Subsampled Contourlet Transform,\u201d in 2010 8th World Congress on Intelligent Control and Automation, Jinan, China, Jul. 2010, pp. 1022\u20131026, https:\/\/doi.org\/10.1109\/WCICA.2010.5554703.","DOI":"10.1109\/WCICA.2010.5554703"},{"key":"11791_CR17","doi-asserted-by":"publisher","first-page":"107652","DOI":"10.1016\/j.apacoust.2020.107652","volume":"172","author":"S Euschi","year":"2021","unstructured":"Euschi S, Khaldi A, Kafi R, Kahlessenane F (2021) A Fourier transform based audio watermarking algorithm. Applied Acoustics 172:107652. https:\/\/doi.org\/10.1016\/j.apacoust.2020.107652","journal-title":"Applied Acoustics"},{"key":"11791_CR18","doi-asserted-by":"publisher","unstructured":"K. Fares, A. Khaldi, K. Redouane, and E. Salah, \u201cDCT & DWT based watermarking scheme for medical information security,\u201d Biomedical Signal Processing and Control, vol. 66, p. 102403, Apr. 2021, https:\/\/doi.org\/10.1016\/j.bspc.2020.102403.","DOI":"10.1016\/j.bspc.2020.102403"},{"key":"11791_CR19","doi-asserted-by":"publisher","unstructured":"E. Farri and P. Ayubi, \u201cA blind and robust video watermarking based on IWT and new 3D generalized chaotic sine map,\u201d Nonlinear Dyn, vol. 93, no. 4, pp. 1875\u20131897, Sep. 2018, https:\/\/doi.org\/10.1007\/s11071-018-4295-x.","DOI":"10.1007\/s11071-018-4295-x"},{"key":"11791_CR20","doi-asserted-by":"publisher","unstructured":"M. Favorskaya, E. Savchina, and K. Gusev, \u201cFeature-based synchronization correction for multilevel watermarking of medical images,\u201d Procedia Computer Sci, vol. 159, pp. 1267\u20131276, Jan. 2019, https:\/\/doi.org\/10.1016\/j.procs.2019.09.296.","DOI":"10.1016\/j.procs.2019.09.296"},{"issue":"1","key":"11791_CR21","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/s11042-020-09677-w","volume":"80","author":"L-H Gong","year":"2021","unstructured":"Gong L-H, Tian C, Zou W-P, Zhou N-R (2021) Robust and imperceptible watermarking scheme based on Canny edge detection and SVD in the contourlet domain. Multimed Tools Appl 80(1):439\u2013461. https:\/\/doi.org\/10.1007\/s11042-020-09677-w","journal-title":"Multimed Tools Appl"},{"key":"11791_CR22","doi-asserted-by":"publisher","unstructured":"E. E.-D. Hemdan, \u201cAn efficient and robust watermarking approach based on single value decompression, multi-level DWT, and wavelet fusion with scrambled medical images,\u201d Multimed Tools Appl, Sep. 2020, https:\/\/doi.org\/10.1007\/s11042-020-09769-7.","DOI":"10.1007\/s11042-020-09769-7"},{"issue":"24","key":"11791_CR23","doi-asserted-by":"publisher","first-page":"8153","DOI":"10.3923\/itj.2013.8153.8158","volume":"12","author":"Z Jie","year":"2013","unstructured":"Jie Z (2013) Digital Watermarking Method Based on Nonsubsampled Contourlet Transform. Information Technology Journal 12(24):8153\u20138158. https:\/\/doi.org\/10.3923\/itj.2013.8153.8158","journal-title":"Information Technology Journal"},{"key":"11791_CR24","doi-asserted-by":"publisher","unstructured":"F. Kahlessenane, A. Khaldi, and S. Euschi, \u201cA robust blind color image watermarking based on Fourier transform domain,\u201d Optik, vol. 208, p. 164562, Apr. 2020, https:\/\/doi.org\/10.1016\/j.ijleo.2020.164562.","DOI":"10.1016\/j.ijleo.2020.164562"},{"key":"11791_CR25","doi-asserted-by":"publisher","unstructured":"F. Kahlessenane, A. Khaldi, R. Kafi, and S. Euschi, \u201cA DWT based watermarking approach for medical image protection,\u201d J Ambient Intell Human Comput, Aug. 2020, https:\/\/doi.org\/10.1007\/s12652-020-02450-9.","DOI":"10.1007\/s12652-020-02450-9"},{"key":"11791_CR26","doi-asserted-by":"publisher","unstructured":"F. Kahlessenane, A. Khaldi, R. Kafi, and S. Euschi, \u201cA robust blind medical image watermarking approach for telemedicine applications,\u201d Cluster Comput, Feb. 2021, https:\/\/doi.org\/10.1007\/s10586-020-03215-x.","DOI":"10.1007\/s10586-020-03215-x"},{"key":"11791_CR27","doi-asserted-by":"publisher","unstructured":"F. Kahlessenane, A. Khaldi, M. R. Kafi, and S. Euschi, \u201cA color value differentiation scheme for blind digital image watermarking,\u201d Multimed Tools Appl, Mar. 2021, https:\/\/doi.org\/10.1007\/s11042-021-10713-6.","DOI":"10.1007\/s11042-021-10713-6"},{"key":"11791_CR28","doi-asserted-by":"publisher","unstructured":"F. Kahlessenane, A. Khaldi, M. R. Kafi, N. Zermi, and S. Euschi, \u201cA value parity combination based scheme for retinal images watermarking,\u201d Opt Quant Electron, vol. 53, no. 3, p. 161, Mar. 2021, https:\/\/doi.org\/10.1007\/s11082-021-02793-3.","DOI":"10.1007\/s11082-021-02793-3"},{"key":"11791_CR29","doi-asserted-by":"publisher","unstructured":"P. Khare and V. K. Srivastava, \u201cA reliable and secure image watermarking algorithm using homomorphic transform in DWT domain,\u201d Multidim Syst Sign Process, Jun. 2020, https:\/\/doi.org\/10.1007\/s11045-020-00732-1.","DOI":"10.1007\/s11045-020-00732-1"},{"key":"11791_CR30","doi-asserted-by":"publisher","unstructured":"C. Kumar, A. K. Singh, and P. Kumar, \u201cDual watermarking: An approach for securing digital documents,\u201d Multimed Tools Appl, vol. 79, no. 11, pp. 7339\u20137354, Mar. 2020, https:\/\/doi.org\/10.1007\/s11042-019-08314-5.","DOI":"10.1007\/s11042-019-08314-5"},{"key":"11791_CR31","doi-asserted-by":"publisher","unstructured":"C. Kumar, A. K. Singh, and P. Kumar, \u201cImproved wavelet-based image watermarking through SPIHT,\u201d Multimed Tools Appl, vol. 79, no. 15, pp. 11069\u201311082, Apr. 2020, https:\/\/doi.org\/10.1007\/s11042-018-6177-0.","DOI":"10.1007\/s11042-018-6177-0"},{"key":"11791_CR32","doi-asserted-by":"publisher","unstructured":"J.-Y. Li and C.-Z. Zhang, \u201cBlind watermarking scheme based on Schur decomposition and non-subsampled contourlet transform,\u201d Multimed Tools Appl, vol. 79, no. 39, pp. 30007\u201330021, Oct. 2020, https:\/\/doi.org\/10.1007\/s11042-020-09389-1.","DOI":"10.1007\/s11042-020-09389-1"},{"key":"11791_CR33","doi-asserted-by":"publisher","unstructured":"X. Liao, K. Li, and J. Yin, \u201cSeparable data hiding in encrypted image based on compressive sensing and discrete fourier transform,\u201d Multimed Tools Appl, vol. 76, no. 20, pp. 20739\u201320753, Oct. 2017, https:\/\/doi.org\/10.1007\/s11042-016-3971-4.","DOI":"10.1007\/s11042-016-3971-4"},{"key":"11791_CR34","doi-asserted-by":"publisher","unstructured":"X. Liao, J. Yin, S. Guo, X. Li, and A. K. Sangaiah, \u201cMedical JPEG image steganography based on preserving inter-block dependencies,\u201d Comput Electr Eng, vol. 67, pp. 320\u2013329, Apr. 2018, https:\/\/doi.org\/10.1016\/j.compeleceng.2017.08.020.","DOI":"10.1016\/j.compeleceng.2017.08.020"},{"key":"11791_CR35","doi-asserted-by":"publisher","unstructured":"X. Liao, S. Guo, J. Yin, H. Wang, X. Li, and A. K. Sangaiah, \u201cNew cubic reference table based image steganography,\u201d Multimed Tools Appl, vol. 77, no. 8, pp. 10033\u201310050, Apr. 2018, https:\/\/doi.org\/10.1007\/s11042-017-4946-9.","DOI":"10.1007\/s11042-017-4946-9"},{"key":"11791_CR36","doi-asserted-by":"publisher","unstructured":"X. Liao, J. Yin, M. Chen, and Z. Qin, \u201cAdaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features,\u201d IEEE Transactions on Dependable and Secure Computing, pp. 1\u20131, 2020, https:\/\/doi.org\/10.1109\/TDSC.2020.3004708.","DOI":"10.1109\/TDSC.2020.3004708"},{"key":"11791_CR37","doi-asserted-by":"publisher","unstructured":"A.-W. Luo, L.-H. Gong, N.-R. Zhou, and W.-P. Zou, \u201cAdaptive and blind watermarking scheme based on optimal SVD blocks selection,\u201d Multimed Tools Appl, vol. 79, no. 1, pp. 243\u2013261, Jan. 2020, https:\/\/doi.org\/10.1007\/s11042-019-08074-2.","DOI":"10.1007\/s11042-019-08074-2"},{"key":"11791_CR38","unstructured":"Mardanpour M, Chahooki MZ (2016) Robust Hybrid Image Watermarking based on Discrete Wavelet and Shearlet Transforms. ArXiv"},{"key":"11791_CR39","doi-asserted-by":"publisher","unstructured":"Z. F. Mohammed and A. A. Abdulla, \u201cAn efficient CAD system for ALL cell identification from microscopic blood images,\u201d Multimed Tools Appl, vol. 80, no. 4, pp. 6355\u20136368, Feb. 2021, https:\/\/doi.org\/10.1007\/s11042-020-10066-6.","DOI":"10.1007\/s11042-020-10066-6"},{"key":"11791_CR40","doi-asserted-by":"publisher","unstructured":"A. A. Mohammed, D. A. Salih, A. M. Saeed, and M. Q. Kheder, \u201cAn imperceptible semi-blind image watermarking scheme in DWT-SVD domain using a zigzag embedding technique,\u201d Multimed Tools Appl, vol. 79, no. 43, pp. 32095\u201332118, Nov. 2020, https:\/\/doi.org\/10.1007\/s11042-020-09694-9.","DOI":"10.1007\/s11042-020-09694-9"},{"key":"11791_CR41","doi-asserted-by":"publisher","unstructured":"Z. Narima, A. Khaldi, K. Redouane, K. Fares, and E. Salah, \u201cA DWT-SVD based robust digital watermarking for medical image security,\u201d Forensic Science International, p. 110691, 2021, https:\/\/doi.org\/10.1016\/j.forsciint.2021.110691.","DOI":"10.1016\/j.forsciint.2021.110691"},{"key":"11791_CR42","doi-asserted-by":"publisher","unstructured":"V. Ramakrishnan and D. J. Pete, \u201cNon Subsampled Shearlet Transform Based Fusion of Multiple Exposure Images,\u201d SN COMPUT. SCI., vol. 1, no. 6, p. 326, Oct. 2020, https:\/\/doi.org\/10.1007\/s42979-020-00343-4.","DOI":"10.1007\/s42979-020-00343-4"},{"key":"11791_CR43","doi-asserted-by":"publisher","unstructured":"E. Salah, K. Amine, K. M. Redouane, and K. Fares, \u201cSpatial and Frequency Approaches for Audio File Protection,\u201d J CIRCUIT SYST COMP, p. 2150210, 2021, https:\/\/doi.org\/10.1142\/S0218126621502108.","DOI":"10.1142\/S0218126621502108"},{"issue":"21","key":"11791_CR44","doi-asserted-by":"publisher","first-page":"30523","DOI":"10.1007\/s11042-018-7115-x","volume":"78","author":"AK Singh","year":"2019","unstructured":"Singh AK (2019) Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimed Tools Appl 78(21):30523\u201330533. https:\/\/doi.org\/10.1007\/s11042-018-7115-x","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"11791_CR45","doi-asserted-by":"publisher","first-page":"3457","DOI":"10.1007\/s11042-018-6263-3","volume":"78","author":"S Thakur","year":"2019","unstructured":"Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 78(3):3457\u20133470. https:\/\/doi.org\/10.1007\/s11042-018-6263-3","journal-title":"Multimed Tools Appl"},{"key":"11791_CR46","doi-asserted-by":"publisher","unstructured":"S. Thakur, A. K. Singh, and S. P. Ghrera, \u201cNSCT domain\u2013based secure multiple-watermarking technique through lightweight encryption for medical images,\u201d Concurrency and Computation: Practice and Experience, vol. n\/a, no. n\/a, p. e5108, https:\/\/doi.org\/10.1002\/cpe.5108.","DOI":"10.1002\/cpe.5108"},{"key":"11791_CR47","doi-asserted-by":"publisher","unstructured":"Thanki R, Kothari A (2020) Multi-level security of medical images based on encryption and watermarking for telemedicine applications. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-020-09941-z","DOI":"10.1007\/s11042-020-09941-z"},{"key":"11791_CR48","doi-asserted-by":"publisher","unstructured":"R. M. Thanki and A. M. Kothari, \u201cHybrid domain watermarking technique for copyright protection of images using speech watermarks,\u201d J Ambient Intell Human Comput, vol. 11, no. 5, pp. 1835\u20131857, May 2020, https:\/\/doi.org\/10.1007\/s12652-019-01295-1.","DOI":"10.1007\/s12652-019-01295-1"},{"key":"11791_CR49","doi-asserted-by":"publisher","unstructured":"R. Thanki, S. Borra, V. Dwivedi, and K. Borisagar, \u201cAn efficient medical image watermarking scheme based on FDCuT\u2013DCT,\u201d Engineering Science and Technology, an International Journal, vol. 20, no. 4, pp. 1366\u20131379, Aug. 2017, https:\/\/doi.org\/10.1016\/j.jestch.2017.06.001.","DOI":"10.1016\/j.jestch.2017.06.001"},{"key":"11791_CR50","doi-asserted-by":"publisher","unstructured":"R. Thanki, S. Borra, V. Dwivedi, and K. Borisagar, \u201cA RONI Based Visible Watermarking Approach for Medical Image Authentication,\u201d J Med Syst, vol. 41, no. 9, p. 143, Aug. 2017, https:\/\/doi.org\/10.1007\/s10916-017-0795-3.","DOI":"10.1007\/s10916-017-0795-3"},{"key":"11791_CR51","doi-asserted-by":"publisher","unstructured":"R. Thanki, A. Kothari, and D. Trivedi, \u201cHybrid and blind watermarking scheme in DCuT \u2013 RDWT domain,\u201d J Inf Sec Appl, vol. 46, pp. 231\u2013249, Jun. 2019, https:\/\/doi.org\/10.1016\/j.jisa.2019.03.017.","DOI":"10.1016\/j.jisa.2019.03.017"},{"key":"11791_CR52","doi-asserted-by":"publisher","unstructured":"M. Y. Valandar, P. Ayubi, and M. J. Barani, \u201cA new transform domain steganography based on modified logistic chaotic map for color images,\u201d Journal of Information Security and Applications, vol. 34, pp. 142\u2013151, Jun. 2017, https:\/\/doi.org\/10.1016\/j.jisa.2017.04.004.","DOI":"10.1016\/j.jisa.2017.04.004"},{"key":"11791_CR53","doi-asserted-by":"publisher","unstructured":"M. Y. Valandar, M. J. Barani, P. Ayubi, and M. Aghazadeh, \u201cAn integer wavelet transform image steganography method based on 3D sine chaotic map,\u201d Multimed Tools Appl, vol. 78, no. 8, pp. 9971\u20139989, Apr. 2019, https:\/\/doi.org\/10.1007\/s11042-018-6584-2.","DOI":"10.1007\/s11042-018-6584-2"},{"key":"11791_CR54","doi-asserted-by":"publisher","unstructured":"M. Y. Valandar, M. J. Barani, and P. Ayubi, \u201cA fast color image encryption technique based on three dimensional chaotic map,\u201d Optik, vol. 193, p. 162921, Sep. 2019, https:\/\/doi.org\/10.1016\/j.ijleo.2019.06.021.","DOI":"10.1016\/j.ijleo.2019.06.021"},{"key":"11791_CR55","doi-asserted-by":"publisher","unstructured":"M. Yousefi Valandar, M. Jafari Barani, and P. Ayubi, \u201cA blind and robust color images watermarking method based on block transform and secured by modified 3-dimensional H\u00e9non map,\u201d Soft Comput, vol. 24, no. 2, pp. 771\u2013794, Jan. 2020, https:\/\/doi.org\/10.1007\/s00500-019-04524-z.","DOI":"10.1007\/s00500-019-04524-z"},{"key":"11791_CR56","doi-asserted-by":"publisher","unstructured":"Wang X, Xu H, Zhang S, Liang L, Niu P, Yang H-Y (2018) A Color Image Watermarking Approach Based on Synchronization Correction, Fundam. Informaticae. https:\/\/doi.org\/10.3233\/FI-2018-1654","DOI":"10.3233\/FI-2018-1654"},{"key":"11791_CR57","doi-asserted-by":"publisher","unstructured":"X. Wang, S. Zhang, T. Wen, H. Yang, and P. Niu, \u201cCoefficient difference based watermark detector in nonsubsampled contourlet transform domain,\u201d Inform Sci, vol. 503, pp. 274\u2013290, Nov. 2019, https:\/\/doi.org\/10.1016\/j.ins.2019.06.059.","DOI":"10.1016\/j.ins.2019.06.059"},{"issue":"March","key":"11791_CR58","doi-asserted-by":"publisher","first-page":"126568","DOI":"10.1016\/j.optcom.2020.126568","volume":"482","author":"S Yuan","year":"2021","unstructured":"Yuan S, Sheng D, Magayane X, Liu X, Zhou G, Lu Z, Wang HZ, Li Z (2021) A Blind Watermarking Scheme Based on Computational Ghost Imaging in Wavelet Domain. Optics Communications 482(March):126568. https:\/\/doi.org\/10.1016\/j.optcom.2020.126568","journal-title":"Optics Communications"},{"key":"11791_CR59","doi-asserted-by":"publisher","unstructured":"N. Zermi, A. Khaldi, M. R. Kafi, F. Kahlessenane, and S. Euschi, \u201cRobust SVD-based schemes for medical image watermarking,\u201d Microprocessors and Microsystems, vol. 84, p. 104134, Jul. 2021, https:\/\/doi.org\/10.1016\/j.micpro.2021.104134.","DOI":"10.1016\/j.micpro.2021.104134"},{"key":"11791_CR60","doi-asserted-by":"publisher","unstructured":"Q. Zheng, N. Liu, and F. Wang, \u201cAn Adaptive Embedding Strength Watermarking Algorithm Based on Shearlets\u2019 Capture Directional Features,\u201d Mathematics, vol. 8, no. 8, Art. no. 8, 2020, https:\/\/doi.org\/10.3390\/math8081377.","DOI":"10.3390\/math8081377"},{"key":"11791_CR61","doi-asserted-by":"publisher","unstructured":"N. R. Zhou, W. M. X. Hou, R. H. Wen, and W. P. Zou, \u201cImperceptible digital watermarking scheme in multiple transform domains,\u201d Multimed Tools Appl, vol. 77, no. 23, pp. 30251\u201330267, Dec. 2018, https:\/\/doi.org\/10.1007\/s11042-018-6128-9.","DOI":"10.1007\/s11042-018-6128-9"},{"key":"11791_CR62","doi-asserted-by":"publisher","unstructured":"N. R. Zhou, A. W. Luo, and W. P. Zou, \u201cSecure and robust watermark scheme based on multiple transforms and particle swarm optimization algorithm,\u201d Multimed Tools Appl, vol. 78, no. 2, pp. 2507\u20132523, Jan. 2019, https:\/\/doi.org\/10.1007\/s11042-018-6322-9.","DOI":"10.1007\/s11042-018-6322-9"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11791-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11791-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11791-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T04:42:26Z","timestamp":1669610546000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11791-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,25]]},"references-count":62,"journal-issue":{"issue":"30","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["11791"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11791-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,25]]},"assertion":[{"value":"20 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 May 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}