{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T23:41:07Z","timestamp":1721864467982},"reference-count":26,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2021,3,17]],"date-time":"2021-03-17T00:00:00Z","timestamp":1615939200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002387","61872448","184200510018"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,3,17]]},"abstract":"Zero-watermarking is one of the solutions for image copyright protection without tampering with images, and thus it is suitable for medical images, which commonly do not allow any distortion. Moment-based zero-watermarking is robust against both image processing and geometric attacks, but the discrimination of watermarks is often ignored by researchers, resulting in the high possibility that host images and fake host images cannot be distinguished by verifier. To this end, this paper proposes a PCET- (polar complex exponential transform-) based zero-watermarking scheme based on the stability of the relationships between moment magnitudes of the same order and stability of the relationships between moment magnitudes of the same repetition, which can handle multiple medical images simultaneously. The scheme first calculates the PCET moment magnitudes for each image in an image group. Then, the magnitudes of the same order and the magnitudes of the same repetition are compared to obtain the content-related features. All the image features are added together to obtain the features for the image group. Finally, the scheme extracts a robust feature vector with the chaos system and takes the bitwise XOR of the robust feature and a scrambled watermark to generate a zero-watermark. The scheme produces robust features with both resistance to various attacks and low similarity among different images. In addition, the one-to-many mapping between magnitudes and robust feature bits reduces the number of moments involved, which not only reduces the computation time but also further improves the robustness. The experimental results show that the proposed scheme meets the performance requirements of zero-watermarking on the robustness, discrimination, and capacity, and it outperforms the state-of-the-art methods in terms of robustness, discrimination, and computational time under the same payloads.<\/jats:p>","DOI":"10.1155\/2021\/6615678","type":"journal-article","created":{"date-parts":[[2021,3,17]],"date-time":"2021-03-17T20:50:07Z","timestamp":1616014207000},"page":"1-13","source":"Crossref","is-referenced-by-count":5,"title":["A Polar Complex Exponential Transform-Based Zero-Watermarking for Multiple Medical Images with High Discrimination"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-7613-6807","authenticated-orcid":true,"given":"Wenbing","family":"Wang","sequence":"first","affiliation":[{"name":"School of Cyberspace Security, P. L. A. Strategic Support Force Information Engineering University, Zhengzhou 450001, China"},{"name":"Software Engineering College, Zhengzhou University of Light Industry, Zhengzhou 450001, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1208-1226","authenticated-orcid":true,"given":"Yan","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, P. L. A. Strategic Support Force Information Engineering University, Zhengzhou 450001, China"},{"name":"Software Engineering College, Zhengzhou University, Zhengzhou 450001, China"}]},{"given":"Shengli","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Security, P. L. A. Strategic Support Force Information Engineering University, Zhengzhou 450001, China"}]}],"member":"98","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5222-8"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.038"},{"issue":"2","key":"3","first-page":"214","article-title":"Concept and application of zero-watermark","volume":"31","author":"Q. Wen","year":"2003","journal-title":"Acta Electronica Sinica"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.08.040"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.09.015"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.12.006"},{"key":"7","doi-asserted-by":"crossref","article-title":"An efficient and robust zero-bit watermarking technique for biometric image protection","author":"A. Dwivedi","DOI":"10.1109\/TSP.2019.8768881"},{"key":"8","article-title":"Color image zero-watermarking based on SVD and visual cryptography in DWT domain","author":"X. L. Liu"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.09.028"},{"issue":"11","key":"10","doi-asserted-by":"crossref","first-page":"13455","DOI":"10.1007\/s11042-016-3750-2","article-title":"An image zero-watermarking scheme based on the encryption of visual map feature with watermark information","volume":"76","author":"T. M. Thanh","year":"2017","journal-title":"Multimedia Tools and Applications"},{"key":"11","doi-asserted-by":"crossref","first-page":"1169","DOI":"10.1007\/s11042-019-08191-y","article-title":"Robust and secure zero-watermarking scheme for color images based on majority voting pattern and hyper-chaotic encryption","volume":"79","author":"X. B. Kang","year":"2020","journal-title":"Multimedia Tools and Applications"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-1905-9"},{"issue":"2","key":"13","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1007\/s11042-016-3287-4","article-title":"An image copyright protection system using chaotic maps","volume":"76","author":"A. Rani","year":"2016","journal-title":"Multimedia Tools and Applications"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1701-8"},{"issue":"7","key":"15","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1109\/TPAMI.2009.119","article-title":"Two-dimensional polar harmonic transforms for invariant image representation","volume":"32","author":"P. T. Yap","year":"2010","journal-title":"IEEE Transactions on Pattern Analysis & Machine Intelligence"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/3331167"},{"issue":"8","key":"17","first-page":"1468","article-title":"Image-analysis via the general-theory of moments","volume":"69","author":"M. R. Teague","year":"1980","journal-title":"Journal of the Optical Society of America"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2015.10.005"},{"key":"19","doi-asserted-by":"crossref","first-page":"26355","DOI":"10.1007\/s11042-016-4130-7","article-title":"Robust zero-watermarking scheme based on polar complex exponential transform and logistic mapping","volume":"76","author":"C. P. Wang","year":"2017","journal-title":"Multimedia Tools and Applications"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.06.025"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.11.011"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.10.004"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2935174"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2019.115747"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2016.09.001"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-013-9622-7"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6615678.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6615678.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/6615678.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,17]],"date-time":"2021-03-17T20:50:16Z","timestamp":1616014216000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/6615678\/"}},"subtitle":[],"editor":[{"given":"Jinwei","family":"Wang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,3,17]]},"references-count":26,"alternative-id":["6615678","6615678"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6615678","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2021,3,17]]}}}