{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T03:09:16Z","timestamp":1725764956602},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,8,19]],"date-time":"2016-08-19T00:00:00Z","timestamp":1471564800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1007\/s11042-016-3862-8","type":"journal-article","created":{"date-parts":[[2016,8,19]],"date-time":"2016-08-19T06:41:21Z","timestamp":1471588881000},"page":"4863-4882","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":207,"title":["A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine"],"prefix":"10.1007","volume":"77","author":[{"given":"Aditi","family":"Zear","sequence":"first","affiliation":[]},{"given":"Amit Kumar","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Pardeep","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,19]]},"reference":[{"key":"3862_CR1","doi-asserted-by":"crossref","unstructured":"Agbaje MO, Awodele O, Ogbonna AC (2015) Applications of digital watermarking to cyber security (Cyber Watermarking), Proceedings of Informing Science & IT Education Conference (InSITE), pp 1\u201311","DOI":"10.28945\/2138"},{"key":"3862_CR2","unstructured":"Ahmad R, Nilchi N, Taheri A (2008) A new robust digital image watermarking technique based on the discrete cosine transformation and neural network. International Symposium on Biometrics and Security Technologies, Islamabad, pp 1\u20137"},{"key":"3862_CR3","doi-asserted-by":"crossref","unstructured":"Ahmed KA, Ahmad HA, Gaydecki P (2009) A blind block based DCT watermarking technique for gray level images using one dimensional Walsh coding. International conference on Current Trends in Information Technology, Dubai, pp 1\u20136","DOI":"10.1109\/CTIT.2009.5423140"},{"key":"3862_CR4","first-page":"709","volume":"2","author":"N Ahmidi","year":"2004","unstructured":"Ahmidi N, Safabakhsh R (2004) A novel DCT-based approach for secure color image watermarking. Proc Int Conf Inf Technol: Coding Comput (ITCC) 2:709\u2013713","journal-title":"Proc Int Conf Inf Technol: Coding Comput (ITCC)"},{"key":"3862_CR5","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.engappai.2013.07.009","volume":"31","author":"M Ali","year":"2014","unstructured":"Ali M, WookAhn C, Siarry P (2014) Differential evolution algorithm for the selection of optimal scaling factors in image watermarking, Special issue on Advances in Evolutionary Optimization Based Image Processing. Eng Appl Artif Intell 31:15\u201326","journal-title":"Eng Appl Artif Intell"},{"issue":"5","key":"3862_CR6","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1016\/j.optcom.2008.11.024","volume":"282","author":"V Aslantas","year":"2009","unstructured":"Aslantas V (2009) An optimal robust digital image watermarking based on SVD using differential evolution algorithm. Opt Commun 282(5):769\u2013777","journal-title":"Opt Commun"},{"key":"3862_CR7","first-page":"241","volume-title":"DWT-SVD based image watermarking using particle swarm optimizer","author":"V Aslantas","year":"2008","unstructured":"Aslantas V, Dogan AL, Ozturk S (2008) DWT-SVD based image watermarking using particle swarm optimizer. IEEE International Conference on Multimedia and Expo, Hannover, pp 241\u2013244"},{"issue":"14","key":"3862_CR8","doi-asserted-by":"crossref","first-page":"2806","DOI":"10.1016\/j.optcom.2009.04.034","volume":"282","author":"V Aslantas","year":"2009","unstructured":"Aslantas V, Ozer S, Ozturk S (2009) Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms. Opt Commun 282(14):2806\u20132817","journal-title":"Opt Commun"},{"issue":"5","key":"3862_CR9","doi-asserted-by":"crossref","first-page":"783","DOI":"10.1109\/83.918570","volume":"10","author":"M Barni","year":"2001","unstructured":"Barni M, Bartolini F (2001) Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans Image Process 10(5):783\u2013791","journal-title":"IEEE Trans Image Process"},{"issue":"3&4","key":"3862_CR10","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1147\/sj.353.0313","volume":"35","author":"W Bender","year":"1996","unstructured":"Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3&4):313\u2013336","journal-title":"IBM Syst J"},{"key":"3862_CR11","unstructured":"Bowman D (2012) http:\/\/www.fiercehealthit.com\/story\/researchers-use-digital-watermarks-protect-medical-images"},{"issue":"10","key":"3862_CR12","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1016\/j.patrec.2005.01.004","volume":"26","author":"CC Chang","year":"2005","unstructured":"Chang CC, Tsai P, Lin CC (2005) SVD-based digital image watermarking scheme. Pattern Recogn Lett 26(10):1577\u20131586","journal-title":"Pattern Recogn Lett"},{"issue":"3","key":"3862_CR13","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A, Condell J, Curran K, McKevitt P (2010) Digital image steganography : survey and analyses of current methods. Signal Process 90(3):727\u2013752","journal-title":"Signal Process"},{"issue":"1","key":"3862_CR14","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.amc.2006.09.117","volume":"188","author":"KL Chung","year":"2007","unstructured":"Chung KL, Yang WN, Huang YH, Wu ST, Hsu YC (2007) On SVD-based watermarking algorithm. Appl Math Comput 188(1):54\u201357","journal-title":"Appl Math Comput"},{"key":"3862_CR15","doi-asserted-by":"crossref","unstructured":"Elmisery AM, Rho S, Botvich D (2015) A distributed collaborative platform for personal health profiles in patient-driven health social network. International Journal of Distributed Sensor Networks (IJDSN), Hindawi Publishing Corporation, Vol. 2015, pp 1\u201312","DOI":"10.1155\/2015\/406940"},{"issue":"2","key":"3862_CR16","doi-asserted-by":"crossref","first-page":"926","DOI":"10.1016\/j.amc.2008.05.003","volume":"203","author":"MQ Fan","year":"2008","unstructured":"Fan MQ, Wang HX, Li SK (2008) Restudy on SVD based watermarking scheme. Appl Math Comput 203(2):926\u2013930","journal-title":"Appl Math Comput"},{"key":"3862_CR17","doi-asserted-by":"crossref","unstructured":"Ganic E, Eskicioglu AM (2004) Robust DWT-SVD domain image watermarking: embedding data in all frequencies. Proceedings of the 2004 Workshop on Multimedia and Security, ACM, pp 166\u2013174","DOI":"10.1145\/1022431.1022461"},{"key":"3862_CR18","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1007\/s11517-006-0081-x","volume":"44","author":"A Giakoumaki","year":"2006","unstructured":"Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Secure and efficient health data management through multiple watermarking on medical images. Med Biol Eng Comput 44:619\u2013631","journal-title":"Med Biol Eng Comput"},{"issue":"5","key":"3862_CR19","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1016\/j.jvcir.2014.03.012","volume":"25","author":"J-M Guo","year":"2014","unstructured":"Guo J-M, Prasetyo H (2014) False-positive-free SVD-based image watermarking. J Vis Commun Image Represent 25(5):1149\u20131163","journal-title":"J Vis Commun Image Represent"},{"issue":"6","key":"3862_CR20","doi-asserted-by":"crossref","first-page":"989","DOI":"10.1109\/72.329697","volume":"5","author":"MT Hagan","year":"1994","unstructured":"Hagan MT, Menhaj MB (1994) Training feed forward networks with the Marquardt algorithm. IEEE Trans Neural Netw 5(6):989\u2013993","journal-title":"IEEE Trans Neural Netw"},{"issue":"4","key":"3862_CR21","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/0893-6080(88)90003-2","volume":"1","author":"RA Jacobs","year":"1988","unstructured":"Jacobs RA (1988) Increased rates of convergence through learning rate adaptation. Neural Netw 1(4):295\u2013308","journal-title":"Neural Netw"},{"issue":"11","key":"3862_CR22","doi-asserted-by":"crossref","first-page":"3060","DOI":"10.1109\/TIM.2010.2066770","volume":"59","author":"C-C Lai","year":"2010","unstructured":"Lai C-C, Tsai C-C (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59(11):3060\u20133063","journal-title":"IEEE Trans Instrum Meas"},{"issue":"1","key":"3862_CR23","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1049\/iet-ipr.2014.0965","volume":"10","author":"NM Makbol","year":"2016","unstructured":"Makbol NM, Khoo BE, Rassem TH (2016) Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Process 10(1):34\u201352","journal-title":"IET Image Process"},{"key":"3862_CR24","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.procs.2016.02.015","volume":"78","author":"A Mehto","year":"2016","unstructured":"Mehto A, Mehra N (2016) Adaptive lossless medical image watermarking algorithm based on DCT & DWT. Proced Comput Sci 78:88\u201394","journal-title":"Proced Comput Sci"},{"key":"3862_CR25","unstructured":"Mei S-c, Li R-h, Dang H-m, Wang Y-k (2002) Decision of image watermarking strength based on artificial neural-networks. Proceedings of the 9th International Conference on Neural Information Processing, pp 2430\u20132434"},{"key":"3862_CR26","unstructured":"Mohananthini N, Yamuna G (2012) Watermarking for images using wavelet domain in Back- Propagation neural network. Adv Eng Sci Manag 100\u2013105"},{"key":"3862_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2671-9","author":"K Muhammad","year":"2015","unstructured":"Muhammad K, Sajjad M, Irfan M, Rho S, Baik SW (2015) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimed Tools Appl: Int J. doi: 10.1007\/s11042-015-2671-9","journal-title":"Multimed Tools Appl: Int J"},{"issue":"8","key":"3862_CR28","doi-asserted-by":"crossref","first-page":"1055","DOI":"10.1016\/j.aeue.2016.05.003","volume":"70","author":"TS Nguyen","year":"2016","unstructured":"Nguyen TS, Chang CC, Yang XQ (2016) A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. AEU-Int J Electron Commun 70(8):1055\u20131061","journal-title":"AEU-Int J Electron Commun"},{"key":"3862_CR29","doi-asserted-by":"crossref","unstructured":"Niu Y, Cui X, Li Q, Ding J (2016) A SVD-based color image watermark algorithm in DWT domain. Adv Graph Commun Packaging Technol Mater, pp 303\u2013309","DOI":"10.1007\/978-981-10-0072-0_39"},{"issue":"2","key":"3862_CR30","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/s10278-012-9527-x","volume":"26","author":"H Nyeem","year":"2013","unstructured":"Nyeem H, Boles W, Boyd C (2013) A review of medical image watermarking requirements for teleradiology. J Digit Imaging 26(2):326\u2013343","journal-title":"J Digit Imaging"},{"key":"3862_CR31","unstructured":"Ollove M (2014) www.usatoday.com\/story\/\u2026\/stateline-identity-thefts-medical\u2026\/5279351"},{"issue":"6","key":"3862_CR32","first-page":"111","volume":"7","author":"P Parashar","year":"2014","unstructured":"Parashar P, Singh RK (2014) A survey: digital image watermarking techniques. Int J Signal Process Image Process Pattern Recognit 7(6):111\u2013124","journal-title":"Int J Signal Process Image Process Pattern Recognit"},{"key":"3862_CR33","doi-asserted-by":"crossref","unstructured":"Potdar VM, Han S, Chang E (2005) A survey of digital image watermarking techniques. 3rd IEEE International Conference on Industrial Informatics, pp 709\u2013716","DOI":"10.1109\/INDIN.2005.1560462"},{"issue":"1","key":"3862_CR34","first-page":"103","volume":"65","author":"RL Priya","year":"2014","unstructured":"Priya RL, Sadasivam V (2014) A survey on watermarking techniques, requirements, applications for medical images. J Theor Appl Inf Technol 65(1):103\u2013120","journal-title":"J Theor Appl Inf Technol"},{"issue":"3","key":"3862_CR35","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N Provos","year":"2003","unstructured":"Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 1(3):32\u201344","journal-title":"IEEE Secur Priv"},{"key":"3862_CR36","unstructured":"Rumelhart DE, Hinton GE, Williams RJ (1986) Learning internal representations by error propagation, Parallel distributed processing: explorations in the microstructure of cognition. Vol. 1, Chapter 8, the M.I.T. Press, Cambridge, pp 318\u2013362"},{"issue":"05","key":"3862_CR37","first-page":"1087","volume":"2","author":"R Singh","year":"2015","unstructured":"Singh R (2015) Digital image watermarking: an overview. Int J Res (IJR) 2(05):1087\u20131094","journal-title":"Int J Res (IJR)"},{"key":"3862_CR38","doi-asserted-by":"publisher","unstructured":"Singh AK (2016) Improved hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimedia Tools and Applications: An International Journal, Springer, 10.1007\/s11042-016-3514-z","DOI":"10.1007\/s11042-016-3514-z"},{"issue":"9","key":"3862_CR39","first-page":"165","volume":"2","author":"P Singh","year":"2013","unstructured":"Singh P, Chadha RS (2013) A survey of digital watermarking techniques, applications and attacks. Int J Eng Innov Technol 2(9):165\u2013175","journal-title":"Int J Eng Innov Technol"},{"issue":"2","key":"3862_CR40","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1166\/jmihi.2015.1407","volume":"5","author":"AK Singh","year":"2015","unstructured":"Singh AK, Dave M, Mohan A (2015) Robust and secure multiple watermarking in wavelet domain, A Special Issue on Advanced Signal Processing Technologies and Systems for Healthcare Applications(ASPTSHA). J Med Imaging Health Inform 5(2):406\u2013414","journal-title":"J Med Imaging Health Inform"},{"issue":"3","key":"3862_CR41","doi-asserted-by":"crossref","first-page":"2133","DOI":"10.1007\/s11277-015-2505-0","volume":"83","author":"AK Singh","year":"2015","unstructured":"Singh AK, Dave M, Mohan A (2015) Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain. Wirel Pers Commun: Int J 83(3):2133\u20132150","journal-title":"Wirel Pers Commun: Int J"},{"key":"3862_CR42","doi-asserted-by":"publisher","unstructured":"Singh AK, Dave M, Mohan A (2015) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl: Int J. doi: 10.1007\/s11042-015-2754-7 . Springer","DOI":"10.1007\/s11042-015-2754-7"},{"key":"3862_CR43","doi-asserted-by":"publisher","unstructured":"Singh AK, B Kumar, M Dave, Ghrera SP, Mohan A (2016) Digital image watermarking: techniques and emerging applications. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, IGI Global, USA, pp 246\u2013272, 2016. DOI: 10.4018\/978-1-5225-0105-3.ch011","DOI":"10.4018\/978-1-5225-0105-3.ch011"},{"issue":"3","key":"3862_CR44","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1166\/jmihi.2015.1432","volume":"5","author":"AK Singh","year":"2015","unstructured":"Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective DWT Coefficients. J Med Imaging Health Inform 5(3):607\u2013614","journal-title":"J Med Imaging Health Inform"},{"issue":"10","key":"3862_CR45","doi-asserted-by":"crossref","first-page":"928","DOI":"10.1089\/tmj.2009.9932","volume":"15","author":"M Terry","year":"2009","unstructured":"Terry M (2009) Medical identity theft and telemedicine security. Telemed e-Health 15(10):928\u2013932","journal-title":"Telemed e-Health"},{"key":"3862_CR46","unstructured":"Terzjia N, Repges M, Luck K, Geisselhardt W (2002) Digital image watermarking using discrete wavelet transform: performance comparison of error correction codes. International Association of Science and Technology for Development"},{"issue":"11","key":"3862_CR47","first-page":"1572","volume":"22","author":"M Vafaei","year":"2013","unstructured":"Vafaei M, Mahdavi-Nasab H, Pourghassem H (2013) A new robust blind watermarking method based on neural networks in wavelet transform domain. World Appl Sci J 22(11):1572\u20131580","journal-title":"World Appl Sci J"},{"issue":"4","key":"3862_CR48","first-page":"256","volume":"59","author":"TP Vogl","year":"1998","unstructured":"Vogl TP, Mangis JK, Zigler AK, Zink WT, Alkon DL (1998) Accelerating the convergence of the backpropagation method. Biol Cybern 59(4):256\u2013264","journal-title":"Biol Cybern"},{"key":"3862_CR49","doi-asserted-by":"crossref","unstructured":"Wei Z, Li H, Dai J, Wang S (2006) Image watermarking based on Genetic algorithm. IEEE International Conference on Multimedia and Expo, Toronto, Ont., pp 1117\u20131120","DOI":"10.1109\/ICME.2006.262731"},{"key":"3862_CR50","unstructured":"Yang Q-t, Gao T-g, Fan L (2010) A novel robust watermarking scheme based on neural network. International Conference on Intelligent Computing and Integrated Systems (ICISS), IEEE, pp 71\u201375"},{"key":"3862_CR51","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2718-y","author":"CT Yen","year":"2015","unstructured":"Yen CT, Huang YJ (2015) Frequency domain digital watermark recognition using image code sequences with a back-propagation neural network. Multimed Tools Appl: Int J. doi: 10.1007\/s11042-015-2718-y","journal-title":"Multimed Tools Appl: Int J"},{"issue":"2","key":"3862_CR52","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/S0165-1684(99)00094-8","volume":"79","author":"B Zeng","year":"1999","unstructured":"Zeng B (1999) Reduction of blocking effect in DCT-coded images using zero-masking techniques. Signal Process 79(2):205\u2013211","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3862-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3862-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3862-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3862-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,25]],"date-time":"2020-09-25T08:05:19Z","timestamp":1601021119000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3862-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,19]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["3862"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3862-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,19]]}}}