{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T12:44:04Z","timestamp":1755693844078,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T00:00:00Z","timestamp":1475107200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s11042-016-3978-x","type":"journal-article","created":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T05:04:34Z","timestamp":1475125474000},"page":"3783-3807","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Robust covert communication using high capacity watermarking"],"prefix":"10.1007","volume":"76","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0282-3372","authenticated-orcid":false,"given":"Gaurav","family":"Bhatnagar","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,29]]},"reference":[{"issue":"23","key":"3978_CR1","doi-asserted-by":"crossref","first-page":"10883","DOI":"10.1007\/s11042-014-2212-y","volume":"74","author":"H Agarwal","year":"2015","unstructured":"Agarwal H, Atrey PK, Raman B (2015) Image watermarking in real oriented wavelet transform domain. Multimedia Tools and Applications 74(23):10883\u201310921","journal-title":"Multimedia Tools and Applications"},{"key":"3978_CR2","doi-asserted-by":"crossref","DOI":"10.1201\/9780203913512","volume-title":"Watermarking systems engineering: enabling digital assets security and other applications","author":"M Barni","year":"2004","unstructured":"Barni M, Bartolini F (2004) Watermarking systems engineering: enabling digital assets security and other applications. Marcel Dekker Inc., New York"},{"key":"3978_CR3","doi-asserted-by":"crossref","unstructured":"Bhatnagar G, Raman B (2009a) Robust encryption based watermarking in fractional wavelet domain. Recent advances in multimedia signal processing and communications in the series studies in computational intelligence, vol 231. Springer, pp 375\u2013416","DOI":"10.1007\/978-3-642-02900-4_15"},{"key":"3978_CR4","doi-asserted-by":"crossref","unstructured":"Bhatnagar G, Raman B (2009b) A new reference watermarking scheme based on DWT-SVD. Computer Standards and Interfaces 31(5):1002\u20131013","DOI":"10.1016\/j.csi.2008.09.031"},{"issue":"1","key":"3978_CR5","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/j.future.2012.05.021","volume":"29","author":"G Bhatnagar","year":"2013","unstructured":"Bhatnagar G, Wu QMJ (2013) Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform. Futur Gener Comput Syst 29(1):182\u2013195","journal-title":"Futur Gener Comput Syst"},{"issue":"1","key":"3978_CR6","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1134\/S1054661815040045","volume":"26","author":"A Chitla","year":"2016","unstructured":"Chitla A, Mohan MC (2016) An adaptive quin-tree decomposition (AQTD) technique in image authentication through Lossless Watermarking (LWM). Pattern Recognition and Image Analysis 26(1):69\u201381","journal-title":"Pattern Recognition and Image Analysis"},{"issue":"8","key":"3978_CR7","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1016\/j.sigpro.2009.02.005","volume":"89","author":"C Deng","year":"2009","unstructured":"Deng C, Gao X, Li X, Tao D (2009) A local Tchebichef moments-based robust image watermarking. Signal Process 89(8):1531\u20131539","journal-title":"Signal Process"},{"key":"3978_CR8","doi-asserted-by":"crossref","DOI":"10.1002\/9780470684757","volume-title":"Moments and moment invariants in pattern recognition","author":"J Flusser","year":"2009","unstructured":"Flusser J, Zitova B, Suk T (2009) Moments and moment invariants in pattern recognition. Wiley, UK"},{"issue":"3","key":"3978_CR9","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1561\/0100000006","volume":"2","author":"RM Gray","year":"2006","unstructured":"Gray RM (2006) Toeplitz and circulant matrices: a review. Foundations and Trends in Communications and Information Theory 2(3):155\u2013239","journal-title":"Foundations and Trends in Communications and Information Theory"},{"issue":"12","key":"3978_CR10","doi-asserted-by":"crossref","first-page":"4808","DOI":"10.1109\/TIP.2012.2210236","volume":"21","author":"J-M Guo","year":"2012","unstructured":"Guo J-M, Liu Y-F (2012) High capacity data hiding for Error-Diffused block truncation coding. IEEE Trans Image Process 21(12):4808\u20134818","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"3978_CR11","first-page":"463","volume":"E85-A","author":"SC Hsia","year":"2002","unstructured":"Hsia SC, Jou IC, Hwang SM (2002) A gray level watermarking algorithm using double layer hidden approach. IEICE Trans Fundam E85-A(2):463\u2013471","journal-title":"IEICE Trans Fundam"},{"key":"3978_CR12","first-page":"179","volume":"IT-8","author":"M Hu","year":"1962","unstructured":"Hu M (1962) Visual pattern recognition by moment invariants. IRE Transcations on Information Theory IT-8:179\u2013187","journal-title":"IRE Transcations on Information Theory"},{"key":"3978_CR13","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s11235-009-9262-x","volume":"44","author":"HC Huang","year":"2010","unstructured":"Huang HC, Fang WC (2010) Techniques and applications of intelligent multimedia data hiding. Telecommun Syst 44:241\u201351","journal-title":"Telecommun Syst"},{"key":"3978_CR14","doi-asserted-by":"crossref","unstructured":"Irany BM, Guo XC, Hatzinakos D (2011) A high capacity reversible multiple watermarking scheme for medical images. Proc Int Conf Digital Signal Processing:1\u20136","DOI":"10.1109\/ICDSP.2011.6004968"},{"key":"3978_CR15","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1016\/S0024-3795(02)00664-X","volume":"367","author":"H Karner","year":"2003","unstructured":"Karner H, Schneid J, Ueberhuber CW (2003) Spectral decomposition of real circulant matrices. Linear Algebra Appl 367:301\u2013311","journal-title":"Linear Algebra Appl"},{"issue":"1","key":"3978_CR16","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/s11042-011-0986-8","volume":"68","author":"P Korus","year":"2014","unstructured":"Korus P, Bialas J, Dziech A (2014) A new approach to high-capacity annotation watermarking based on digital fountain codes. Multimedia Tools and Applications 68 (1):59\u201377","journal-title":"Multimedia Tools and Applications"},{"key":"3978_CR17","first-page":"185","volume":"6","author":"D Kundur","year":"2004","unstructured":"Kundur D, Hatzinakos D (2004) Towards robust logo watermarking using meltiresolution image fusion. IEEE Trans Math 6:185\u2013197","journal-title":"IEEE Trans Math"},{"issue":"2","key":"3978_CR18","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1587\/transfun.E94.A.889","volume":"E94-A","author":"L Li","year":"2001","unstructured":"Li L, Pan JS, Yuan X (2001) High-capacity Watermark Embedding Based on Invariant Regions of Visual Saliency. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E94-A(2):889\u2013893","journal-title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"},{"issue":"5","key":"3978_CR19","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1016\/j.aeue.2010.06.001","volume":"65","author":"L Li","year":"2011","unstructured":"Li L, Qian J, Pan JS (2011) Characteristic region based watermark embedding with RST invariance and high-capacity. AEU-International Journal of Electronics and Communications 65(5):435\u2013442","journal-title":"AEU-International Journal of Electronics and Communications"},{"key":"3978_CR20","doi-asserted-by":"crossref","DOI":"10.1201\/9781420065282","volume-title":"Multimedia content encryption: techniques and applications","author":"S Lian","year":"2008","unstructured":"Lian S (2008) Multimedia content encryption: techniques and applications. Auerbach Publications, boston"},{"issue":"5","key":"3978_CR21","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1109\/TMM.2008.922795","volume":"10","author":"WH Lin","year":"2008","unstructured":"Lin WH, Horng SJ, Kao TW, Fan P, Lee CL, Pan Y (2008) An efficient watermarking method based on significant difference of wavelet coefficient quantization. IEEE Trans Multimed 10(5):746\u2013757","journal-title":"IEEE Trans Multimed"},{"key":"3978_CR22","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1090\/conm\/323\/05702","volume":"323","author":"FT Luk","year":"2003","unstructured":"Luk FT, Qiao S (2003) A fast singular value algorithm for Hankel matrices. Fast Algorithms for Structured Matrices: Theory and Applications, Contemporary Mathematics, American Mathematical Society 323:169\u2013177","journal-title":"Fast Algorithms for Structured Matrices: Theory and Applications, Contemporary Mathematics, American Mathematical Society"},{"key":"3978_CR23","doi-asserted-by":"crossref","first-page":"2653","DOI":"10.1007\/s11042-013-1577-7","volume":"72","author":"P Pandey","year":"2014","unstructured":"Pandey P, Kumar S, Singh SK (2014) A robust logo watermarking technique in divisive normalization transform domain. Multimedia Tools and Applications 72:2653\u20132677","journal-title":"Multimedia Tools and Applications"},{"issue":"1","key":"3978_CR24","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1016\/j.eswa.2011.07.059","volume":"39","author":"R-S Run","year":"2012","unstructured":"Run R-S, Horng S-J, Lai J-L, Kao T-W, Chen R-J (2012) An improved SVD-based watermarking technique for copyright protection. Expert Syst Appl 39 (1):673\u2013689","journal-title":"Expert Syst Appl"},{"issue":"2","key":"3978_CR25","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1109\/TCE.2004.1309431","volume":"50","author":"K Satish","year":"2004","unstructured":"Satish K, Jayakar T, Tobin C, Madhavi K, Murali K (2004) Chaos based spread spectrum image steganography. IEEE Trans Consum Electron 50(2):587\u2013590","journal-title":"IEEE Trans Consum Electron"},{"issue":"4","key":"3978_CR26","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/s40009-014-0241-8","volume":"37","author":"AK Singh","year":"2014","unstructured":"Singh AK, Dave M, Mohan A (2014) Hybrid technique for robust and imperceptible image watermarking in DWT-DCT-SVD domain. National Academy Science Letters 37(4):351\u2013358","journal-title":"National Academy Science Letters"},{"issue":"4","key":"3978_CR27","doi-asserted-by":"crossref","first-page":"1415","DOI":"10.1007\/s11277-014-2091-6","volume":"80","author":"AK Singh","year":"2014","unstructured":"Singh AK, Kumar B, Dave M, Mohan A (2014) Robust and imperceptible dual watermarking for telemedicine applications. Wirel Pers Commun 80(4):1415\u20131433","journal-title":"Wirel Pers Commun"},{"issue":"2","key":"3978_CR28","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1166\/jmihi.2015.1407","volume":"5","author":"AK Singh","year":"2015","unstructured":"Singh AK, Dave M, Mohan A (2015) Robust and secure multiple watermarking in wavelet domain. Journal of Medical Imaging and Health Informatics 5(2):406\u2013414","journal-title":"Journal of Medical Imaging and Health Informatics"},{"issue":"3","key":"3978_CR29","doi-asserted-by":"crossref","first-page":"2133","DOI":"10.1007\/s11277-015-2505-0","volume":"83","author":"AK Singh","year":"2015","unstructured":"Singh AK, Dave M, Mohan A (2015) Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain. Wireless Personal Communications: An International Journal 83(3):2133\u20132150","journal-title":"Wireless Personal Communications: An International Journal"},{"key":"3978_CR30","doi-asserted-by":"crossref","first-page":"8381","DOI":"10.1007\/s11042-015-2754-7","volume":"75","author":"AK Singh","year":"2016","unstructured":"Singh AK, Dave M, Mohan A (2016) Improved Hybrid Technique for Robust and Imperceptible Multiple Watermarking using Medical Images. Multimedia Tools and Applications 75:8381\u20138401","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"3978_CR31","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1016\/j.jvcir.2012.01.017","volume":"23","author":"C Song","year":"2012","unstructured":"Song C, Sudirman S, Merabti M (2012) A robust region-adaptive dual image watermarking technique. J Vis Commun Image Represent 23(3):549\u2013568","journal-title":"J Vis Commun Image Represent"},{"key":"3978_CR32","unstructured":"Strang G (1993). Wellesley-Cambridge Press, Introduction to Linear Algebra"},{"issue":"12","key":"3978_CR33","doi-asserted-by":"crossref","first-page":"4397","DOI":"10.1007\/s11042-013-1531-8","volume":"74","author":"L-L Tang","year":"2015","unstructured":"Tang L-L, Huang CT, Pan J-S, Liu C-Y (2015) Dual watermarking algorithm based on the Fractional Fourier Transform. Multimedia Tools and Applications 74 (12):4397\u20134413","journal-title":"Multimedia Tools and Applications"},{"issue":"4","key":"3978_CR34","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/s00530-013-0338-9","volume":"21","author":"J Wang","year":"2015","unstructured":"Wang J, Lian S, Wang J (2015) Hybrid additive multi-watermarking and decoding. Multimedia Systems 21(4):345\u2013361","journal-title":"Multimedia Systems"},{"issue":"4","key":"3978_CR35","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1109\/TMM.2005.846774","volume":"7","author":"Y Wu","year":"2005","unstructured":"Wu Y (2005) On the security of an SVD-based ownership watermarking. IEEE Transactions on Multimedia 7(4):624\u2013627","journal-title":"IEEE Transactions on Multimedia"},{"key":"3978_CR36","doi-asserted-by":"crossref","unstructured":"Zabih R, Woodfill J (1994) Non-parametric local transforms for computing visual correspondence. Proc European Conf Computer Vision:151\u2013158","DOI":"10.1007\/BFb0028345"},{"issue":"3","key":"3978_CR37","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1109\/TMM.2005.843357","volume":"7","author":"X Zhang","year":"2005","unstructured":"Zhang X, Li K (2005) Comments on an SVD-based watermarking scheme for protecting rightful ownership. IEEE Transactions Multimedia 7(3):593\u2013594","journal-title":"IEEE Transactions Multimedia"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3978-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3978-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3978-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T10:51:39Z","timestamp":1657363899000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3978-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,29]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["3978"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3978-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2016,9,29]]}}}