{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:31:44Z","timestamp":1722472304878},"reference-count":43,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Digital Signal Processing"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1016\/j.dsp.2024.104638","type":"journal-article","created":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T13:50:43Z","timestamp":1718286643000},"page":"104638","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Security analysis and improvement of DWFCAT"],"prefix":"10.1016","volume":"153","author":[{"given":"Kang","family":"An","sequence":"first","affiliation":[]},{"given":"Yange","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Xin","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3385-8364","authenticated-orcid":false,"given":"Ming","family":"Li","sequence":"additional","affiliation":[]},{"given":"Huiping","family":"Duanmu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.dsp.2024.104638_bib0012","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1109\/COMST.2018.2863942","article-title":"Security data collection and data analytics in the internet: a survey","volume":"21","author":"Jing","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"10.1016\/j.dsp.2024.104638_bib0005","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1007\/s12652-020-02135-3","article-title":"A secure image watermarking for tamper detection and localization","volume":"12","author":"Bhalerao","year":"2021","journal-title":"J. Amb Intel Hum. Comp."},{"key":"10.1016\/j.dsp.2024.104638_bib0041","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1016\/j.neucom.2015.09.082","article-title":"Robust image watermarking approach using polar harmonic transforms based geometric correction","volume":"174","author":"Wang","year":"2016","journal-title":"Neurocomputing."},{"issue":"2","key":"10.1016\/j.dsp.2024.104638_bib0004","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TIFS.2010.2046985","article-title":"A method for automatic identification of signatures of steganography software","volume":"5","author":"Bell","year":"2010","journal-title":"IEEE Transact. Inf. Forens. Secur."},{"issue":"8","key":"10.1016\/j.dsp.2024.104638_bib0018","doi-asserted-by":"crossref","DOI":"10.1007\/s11432-016-9061-4","article-title":"An efficient quantum blind digital signature scheme","volume":"60","author":"Lai","year":"2017","journal-title":"Sci. China Inform. Sci."},{"issue":"12","key":"10.1016\/j.dsp.2024.104638_bib0029","doi-asserted-by":"crossref","first-page":"6541","DOI":"10.1109\/TII.2019.2921652","article-title":"Robust image hashing based efficient authentication for smart industrial environment","volume":"15","author":"Sajjad","year":"2019","journal-title":"IEEE Transac. Ind. Inform."},{"key":"10.1016\/j.dsp.2024.104638_bib0031","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.ins.2013.03.031","article-title":"A reversible watermarking authentication scheme for wireless sensor networks","volume":"240","author":"Shi","year":"2013","journal-title":"Inform. Sci."},{"issue":"4","key":"10.1016\/j.dsp.2024.104638_bib0013","doi-asserted-by":"crossref","first-page":"3225","DOI":"10.1007\/s11277-021-08177-w","article-title":"Robust digital watermarking techniques for copyright protection of digital data: a survey","volume":"118","author":"Kadian","year":"2021","journal-title":"Wireless Pers Commun."},{"issue":"3","key":"10.1016\/j.dsp.2024.104638_bib0002","doi-asserted-by":"crossref","first-page":"1701","DOI":"10.1007\/s10489-020-01903-0","article-title":"An intelligent and blind dual color image watermarking for authentication and copyright protection","volume":"51","author":"Ahmadi","year":"2021","journal-title":"Appl. Intell."},{"issue":"25-26","key":"10.1016\/j.dsp.2024.104638_bib0009","doi-asserted-by":"crossref","first-page":"18071","DOI":"10.1007\/s11042-019-08594-x","article-title":"A secure image authentication scheme based on dual fragile watermark","volume":"79","author":"Gong","year":"2020","journal-title":"Multimed. Tools. Appl."},{"issue":"14","key":"10.1016\/j.dsp.2024.104638_bib0019","doi-asserted-by":"crossref","first-page":"2371","DOI":"10.1002\/sec.1504","article-title":"A recoverable chaos-based fragile watermarking with high PSNR preservation","volume":"9","author":"Li","year":"2016","journal-title":"Secur. Commun. Netw."},{"issue":"5","key":"10.1016\/j.dsp.2024.104638_bib0022","doi-asserted-by":"crossref","first-page":"1047","DOI":"10.1109\/TCSVT.2016.2633878","article-title":"Blind dual watermarking for color images' authentication and copyright protection","volume":"28","author":"Liu","year":"2018","journal-title":"IEEE Transac. Circ. Syst. Vid."},{"issue":"5","key":"10.1016\/j.dsp.2024.104638_bib0030","doi-asserted-by":"crossref","first-page":"1310","DOI":"10.1016\/j.compeleceng.2011.11.012","article-title":"From single watermark to dual watermark: a new approach for image watermarking","volume":"38","author":"Shen","year":"2012","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.dsp.2024.104638_bib0032","first-page":"64","article-title":"A novel blind color image watermarking using upper Hessenberg matrix","volume":"78","author":"Su","year":"2017","journal-title":"AEU- AEU-Int. J. Electron. C"},{"key":"10.1016\/j.dsp.2024.104638_bib0037","article-title":"Hierarchical multilevel framework using RDWT-QR optimized watermarking in telemedicine","volume":"68","author":"Swaraja","year":"2021","journal-title":"Biomed. Signal Process."},{"key":"10.1016\/j.dsp.2024.104638_bib0008","article-title":"Encoded feature enhancement in watermarking network for distortion in real scenes[J]","author":"Fang","year":"2022","journal-title":"IEEE Transact. Multim."},{"issue":"7","key":"10.1016\/j.dsp.2024.104638_bib0010","doi-asserted-by":"crossref","first-page":"7094","DOI":"10.1109\/TCYB.2020.3037208","article-title":"RIHOOP: robust invisible hyperlinks in offline and online photographs[J]","volume":"52","author":"Jia","year":"2022","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.dsp.2024.104638_bib0011","series-title":"CVPR","first-page":"2263","article-title":"Learning invisible markers for hidden codes in offline-to-online photography[C]","author":"Jia","year":"2022"},{"key":"10.1016\/j.dsp.2024.104638_bib0024","series-title":"CVPR","first-page":"13548","article-title":"Distortion agnostic deep watermarking[C]","author":"Luo","year":"2020"},{"key":"10.1016\/j.dsp.2024.104638_bib0038","series-title":"CVPR","first-page":"2117","article-title":"StegaStamp: invisible hyperlinks in physical photographs[C]","author":"Tancik","year":"2020"},{"key":"10.1016\/j.dsp.2024.104638_bib0016","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.ins.2019.11.005","article-title":"Robust and blind image watermarking in DCT domain using inter-block coefficient correlation","volume":"517","author":"Ko","year":"2020","journal-title":"Inform. Sci."},{"key":"10.1016\/j.dsp.2024.104638_bib0027","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.dsp.2016.02.005","article-title":"Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing","volume":"53","author":"Parah","year":"2016","journal-title":"Digit. Signal. Process."},{"key":"10.1016\/j.dsp.2024.104638_bib0043","doi-asserted-by":"crossref","DOI":"10.1016\/j.dsp.2020.102805","article-title":"Robust and reliable image copyright protection scheme using downsampling and block transform in integer wavelet domain","volume":"106","author":"Zhang","year":"2020","journal-title":"Digit. Signal. Process."},{"issue":"8","key":"10.1016\/j.dsp.2024.104638_bib0003","first-page":"5822","article-title":"AuSR1: Authentication and self-recovery using a new image inpainting technique with LSB shifting in fragile image watermarking[J]","volume":"34","author":"Aminuddin","year":"2022","journal-title":"J. King Saud Univ.-Comp Inf. Sci."},{"issue":"10","key":"10.1016\/j.dsp.2024.104638_bib0023","doi-asserted-by":"crossref","first-page":"1579","DOI":"10.1109\/83.951542","article-title":"Multipurpose watermarking for image authentication and protection","volume":"10","author":"Lu","year":"2001","journal-title":"IEEE Transac. Image Process."},{"key":"10.1016\/j.dsp.2024.104638_bib0033","first-page":"14047","article-title":"A deep learning based no-reference quality assessment model for ugc videos[J]","author":"Sun","year":"2022","journal-title":"CoRR abs\/2204"},{"key":"10.1016\/j.dsp.2024.104638_bib0034","first-page":"1","article-title":"Blind quality assessment for in-the-wild images via hierarchical feature fusion and iterative mixed database training[J]","author":"Sun","year":"2022","journal-title":"BMSB"},{"key":"10.1016\/j.dsp.2024.104638_bib0035","series-title":"ICMEW","first-page":"1","article-title":"Deep learning based full-reference and no- reference quality assessment models for compressed UGC videos[J]","author":"Sun","year":"2021"},{"issue":"4","key":"10.1016\/j.dsp.2024.104638_bib0042","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3457905","article-title":"Perceptual quality assessment of low-light image enhancement[J]","volume":"17","author":"Zhai","year":"2021","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"issue":"10","key":"10.1016\/j.dsp.2024.104638_bib0006","doi-asserted-by":"crossref","first-page":"3976","DOI":"10.1109\/TSP.2005.855418","article-title":"Watermarking security: theory and practice","volume":"53","author":"Cayre","year":"2005","journal-title":"IEEE Transact. Signal Process."},{"issue":"8","key":"10.1016\/j.dsp.2024.104638_bib0040","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/35.940053","article-title":"Attacks on digital watermarks: classification, estimation-based attacks, and benchmarks","volume":"39","author":"Voloshynovskiy","year":"2001","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"10.1016\/j.dsp.2024.104638_bib0025","first-page":"841","article-title":"Counterfeiting attacks on two robust watermarking schemes","volume":"2","author":"Lu","year":"2006","journal-title":"Int. J. Innov. Comput. I"},{"issue":"10","key":"10.1016\/j.dsp.2024.104638_bib0028","first-page":"840","article-title":"A chaotic system based fragile watermarking scheme for image tamper detection","volume":"65","author":"Rawat","year":"2011","journal-title":"AEU-Int. J. Electron. C"},{"issue":"6","key":"10.1016\/j.dsp.2024.104638_bib0039","first-page":"540","article-title":"Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme","volume":"67","author":"Teng","year":"2013","journal-title":"AEU-Int. J. Electron. C"},{"issue":"24","key":"10.1016\/j.dsp.2024.104638_bib0021","doi-asserted-by":"crossref","first-page":"7231","DOI":"10.1016\/j.ijleo.2014.07.130","article-title":"Cryptanalysis and improvement of a binary watermark-based copyright protection scheme for remote sensing images","volume":"125","author":"Li","year":"2014","journal-title":"Optik. (Stuttg)"},{"issue":"20","key":"10.1016\/j.dsp.2024.104638_bib0044","doi-asserted-by":"crossref","first-page":"4177","DOI":"10.1016\/j.ijleo.2012.12.049","article-title":"A copyright protection watermarking algorithm for remote sensing image based on binary image watermark","volume":"124","author":"Zhu","year":"2013","journal-title":"Optik. (Stuttg)"},{"key":"10.1016\/j.dsp.2024.104638_bib0026","doi-asserted-by":"crossref","DOI":"10.1155\/2015\/526174","article-title":"Cryptanalysis and improvement of the robust and blind watermarking scheme for dual color image","author":"Nan","year":"2015","journal-title":"Math. Probl. Eng."},{"issue":"18","key":"10.1016\/j.dsp.2024.104638_bib0036","doi-asserted-by":"crossref","first-page":"3254","DOI":"10.1016\/j.ijleo.2012.10.005","article-title":"A novel blind digital watermarking algorithm for embedding color image into color image","volume":"124","author":"Su","year":"2013","journal-title":"Optik. (Stuttg)"},{"issue":"3","key":"10.1016\/j.dsp.2024.104638_bib0020","doi-asserted-by":"crossref","first-page":"941","DOI":"10.1007\/s13369-015-1941-1","article-title":"Attack and improvement of the fidelity preserved fragile watermarking of digital images","volume":"41","author":"Li","year":"2016","journal-title":"Arab. J. Sci. Eng."},{"issue":"7","key":"10.1016\/j.dsp.2024.104638_bib0014","doi-asserted-by":"crossref","first-page":"5108","DOI":"10.1109\/TII.2020.3028612","article-title":"DWFCAT: dual watermarking framework for industrial image authentication and tamper localization","volume":"17","author":"Kamili","year":"2021","journal-title":"IEEE Transac. Ind. Inform."},{"issue":"3","key":"10.1016\/j.dsp.2024.104638_bib0007","first-page":"244","article-title":"A novel blind robust image watermarking in DCT domain using. inter-block coefficient correlation","volume":"68","author":"Das","year":"2014","journal-title":"AEU-Int. J. Electron. C"},{"issue":"1","key":"10.1016\/j.dsp.2024.104638_bib0001","first-page":"125","article-title":"An imperceptible spatial domain color image watermarking scheme","volume":"31","author":"Abraham","year":"2019","journal-title":"J. King Saud Univ.-Comp. Inf. Sci."},{"issue":"5","key":"10.1016\/j.dsp.2024.104638_bib0017","doi-asserted-by":"crossref","first-page":"6755","DOI":"10.1007\/s11042-020-09918-y","article-title":"Visual attention model based dual watermarking for simultaneous image copyright protection and authentication","volume":"80","author":"Koley","year":"2021","journal-title":"Multimed. Tools. Appl."}],"container-title":["Digital Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S105120042400263X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S105120042400263X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T02:46:20Z","timestamp":1722393980000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S105120042400263X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10]]},"references-count":43,"alternative-id":["S105120042400263X"],"URL":"https:\/\/doi.org\/10.1016\/j.dsp.2024.104638","relation":{},"ISSN":["1051-2004"],"issn-type":[{"type":"print","value":"1051-2004"}],"subject":[],"published":{"date-parts":[[2024,10]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Security analysis and improvement of DWFCAT","name":"articletitle","label":"Article Title"},{"value":"Digital Signal Processing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.dsp.2024.104638","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104638"}}