{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T00:16:14Z","timestamp":1722557774909},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2018,12,15]],"date-time":"2018-12-15T00:00:00Z","timestamp":1544832000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100010055","name":"University of Salford","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100010055","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11042-018-7029-7","type":"journal-article","created":{"date-parts":[[2018,12,15]],"date-time":"2018-12-15T12:02:21Z","timestamp":1544875341000},"page":"16433-16463","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["ROI-based reversible watermarking scheme for ensuring the integrity and authenticity of DICOM MR images"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-2451-2871","authenticated-orcid":false,"given":"Asaad F.","family":"Qasim","sequence":"first","affiliation":[]},{"given":"Rob","family":"Aspin","sequence":"additional","affiliation":[]},{"given":"Farid","family":"Meziane","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Hogg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,15]]},"reference":[{"key":"7029_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eij.2012.11.002","volume":"14","author":"MM Abd-Eldayem","year":"2013","unstructured":"Abd-Eldayem MM (2013) A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine. Egypt Inform J 14:1\u201313","journal-title":"Egypt Inform J"},{"key":"7029_CR2","doi-asserted-by":"crossref","unstructured":"Alattar AM (2003) Reversible watermark using difference expansion of triplets. In: International Conference on Image Processing (Cat. No.03CH37429), Barcelona, Spain, p 501\u2013504","DOI":"10.1109\/ICIP.2003.1247008"},{"key":"7029_CR3","doi-asserted-by":"crossref","unstructured":"AM Alattar (2004) Reversible watermark using difference expansion of quads. In: International Conference on Acoustics, Speech, and Signal Processing (ICASSP'04), Montreal, Que., Canada, p 377\u2013380","DOI":"10.1109\/ICASSP.2004.1326560"},{"key":"7029_CR4","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"AM Alattar","year":"2004","unstructured":"Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13:1147\u20131156","journal-title":"IEEE Trans Image Process"},{"key":"7029_CR5","doi-asserted-by":"publisher","first-page":"31487","DOI":"10.1007\/s11042-018-6213-0","volume":"77","author":"AH Ali","year":"2018","unstructured":"Ali AH, George LE, Zaidan A, Mokhtar MR (2018) High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain. Multimed Tools Appl 77:31487\u201331516","journal-title":"Multimed Tools Appl"},{"key":"7029_CR6","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.jss.2010.08.055","volume":"84","author":"OM Al-Qershi","year":"2011","unstructured":"Al-Qershi OM, Khoo BE (2011) High capacity data hiding schemes for medical images based on difference expansion. J Syst Softw 84:105\u2013112","journal-title":"J Syst Softw"},{"key":"7029_CR7","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1016\/j.jss.2011.11.005","volume":"85","author":"M Arsalan","year":"2012","unstructured":"Arsalan M, Malik SA, Khan A (2012) Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw 85:883\u2013894","journal-title":"J Syst Softw"},{"key":"7029_CR8","doi-asserted-by":"crossref","unstructured":"Atta-ur-Rahman, Sultan K, Aldhafferi N, Alqahtani A, Mahmud M (2018) Reversible and fragile watermarking for medical images. Comput Math Methods Med 2018:1\u20137","DOI":"10.1155\/2018\/3461382"},{"key":"7029_CR9","unstructured":"Balasamy K, Ramakrishnan S (2018) An intelligent reversible watermarking system for authenticating medical images using wavelet and PSO. Cluster Comput:1\u201312"},{"key":"7029_CR10","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"MU Celik","year":"2005","unstructured":"Celik MU, Sharma G, Tekalp AM, Saber E (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14:253\u2013266","journal-title":"IEEE Trans Image Process"},{"key":"7029_CR11","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10278-007-9012-0","volume":"21","author":"KH Chiang","year":"2008","unstructured":"Chiang KH, Chang-Chien KC, Chang RF, Yen HY (2008) Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. J Digit Imaging 21:77\u201390","journal-title":"J Digit Imaging"},{"key":"7029_CR12","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1007\/s10278-013-9622-7","volume":"26","author":"K Clark","year":"2013","unstructured":"Clark K, Vendt B, Smith K, Freymann J, Kirby J, Koppel P et al (2013) The Cancer imaging archive (TCIA): maintaining and operating a public information repository. J Digit Imaging 26:1045\u20131057","journal-title":"J Digit Imaging"},{"key":"7029_CR13","doi-asserted-by":"crossref","unstructured":"Coatrieux G, Lecornu L, Sankur B, Roux C (2006) A review of image watermarking applications in healthcare. In: International Conference of the IEEE Engineering in Medicine and Biology Society, New York, USA, p 4691\u20134694","DOI":"10.1109\/IEMBS.2006.259305"},{"key":"7029_CR14","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1016\/j.cmpb.2013.05.027","volume":"111","author":"S Das","year":"2013","unstructured":"Das S, Kundu MK (2013) Effective management of medical information through ROI-lossless fragile image watermarking technique. Comput Methods Prog Biomed 111:662\u2013675","journal-title":"Comput Methods Prog Biomed"},{"key":"7029_CR15","doi-asserted-by":"crossref","unstructured":"Eswaraiah R, Reddy ES (2014) Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. International Journal of Telemedicine and Applications 2014:1\u201310","DOI":"10.1155\/2014\/984646"},{"key":"7029_CR16","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.ins.2017.01.009","volume":"385","author":"G Gao","year":"2017","unstructured":"Gao G, Wan X, Yao S, Cui Z, Zhou C, Sun X (2017) Reversible data hiding with contrast enhancement and tamper localization for medical images. Inf Sci 385:250\u2013265","journal-title":"Inf Sci"},{"key":"7029_CR17","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1016\/j.compeleceng.2016.03.008","volume":"53","author":"AM Hasan","year":"2016","unstructured":"Hasan AM, Meziane F (2016) Automated screening of MRI brain scanning using grey level statistics. Comput Electr Eng 53:276\u2013291","journal-title":"Comput Electr Eng"},{"key":"7029_CR18","doi-asserted-by":"crossref","unstructured":"Hasan AM, Meziane F, Kadhim MA (2016) Automated segmentation of tumours in MRI brain scans. In: Proceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC), Rome, Italy, p 55\u201362","DOI":"10.5220\/0005625900550062"},{"key":"7029_CR19","doi-asserted-by":"publisher","first-page":"132","DOI":"10.3390\/sym8110132","volume":"8","author":"AM Hasan","year":"2016","unstructured":"Hasan AM, Meziane F, Aspin R, Jalab HA (2016) Segmentation of brain tumors in MRI images using three-dimensional active contour without edge. Symmetry 8:132","journal-title":"Symmetry"},{"key":"7029_CR20","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.jvcir.2017.10.001","volume":"49","author":"W He","year":"2017","unstructured":"He W, Zhou K, Cai J, Wang L, Xiong G (2017) Reversible data hiding using multi-pass pixel value ordering and prediction-error expansion. J Vis Commun Image Represent 49:351\u2013360","journal-title":"J Vis Commun Image Represent"},{"key":"7029_CR21","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.ins.2013.07.035","volume":"256","author":"A Khan","year":"2014","unstructured":"Khan A, Malik SA (2014) A high capacity reversible watermarking approach for authenticating images: exploiting down-sampling, histogram processing, and block selection. Inf Sci 256:162\u2013183","journal-title":"Inf Sci"},{"key":"7029_CR22","unstructured":"Ko LT, Chen JE, Shieh YS, Scalia M, Sung TY (2012) \"A novel fractional-discrete-cosine-transform-based reversible watermarking for healthcare information management systems. Math Probl Eng 2012:1\u20137"},{"key":"7029_CR23","unstructured":"Ko LT, Chen JE, Shieh YS, Hsin HC, Sung TY (2012) Nested quantization index modulation for reversible watermarking and its application to healthcare information management systems. Comput Math Methods Med 2012:1\u20138"},{"key":"7029_CR24","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/TITB.2009.2014751","volume":"13","author":"LOM Kobayashi","year":"2009","unstructured":"Kobayashi LOM, Furuie SS, Barreto PSLM (2009) Providing integrity and authenticity in DICOM images: a novel approach. IEEE Trans Inf Technol Biomed 13:582\u2013589","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"7029_CR25","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.compeleceng.2015.11.033","volume":"53","author":"V Kumar","year":"2016","unstructured":"Kumar V, Natarajan V (2016) Hybrid local prediction error-based difference expansion reversible watermarking for medical images. Comput Electr Eng 53:333\u2013345","journal-title":"Comput Electr Eng"},{"key":"7029_CR26","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/s10278-013-9657-9","volume":"27","author":"M Larobina","year":"2014","unstructured":"Larobina M, Murino L (2014) Medical image file formats. J Digit Imaging 27:200\u2013206","journal-title":"J Digit Imaging"},{"key":"7029_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-015-3011-9","volume":"77","author":"S-H Lee","year":"2017","unstructured":"Lee S-H, Lee E-J, Hwang W-J, Kwon K-R (2017) Reversible DNA data hiding using multiple difference expansions for DNA authentication and storage. Multimed Tools Appl 77:1\u201328","journal-title":"Multimed Tools Appl"},{"key":"7029_CR28","doi-asserted-by":"publisher","first-page":"3178","DOI":"10.1016\/j.eswa.2013.11.019","volume":"41","author":"B Lei","year":"2014","unstructured":"Lei B, Tan EL, Chen S, Ni D, Wang T, Lei H (2014) Reversible watermarking scheme for medical image based on differential evolution. Expert Syst Appl 41:3178\u20133188","journal-title":"Expert Syst Appl"},{"key":"7029_CR29","doi-asserted-by":"publisher","first-page":"5149","DOI":"10.1007\/s11042-017-4388-4","volume":"77","author":"F Li","year":"2018","unstructured":"Li F, Mao Q, Chang C-C (2018) Reversible data hiding scheme based on the Haar discrete wavelet transform and interleaving prediction method. Multimed Tools Appl 77:5149\u20135168","journal-title":"Multimed Tools Appl"},{"key":"7029_CR30","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/s10278-012-9484-4","volume":"26","author":"SC Liew","year":"2013","unstructured":"Liew SC, Liew SW, Zain JM (2013) Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication. J Digit Imaging 26:316\u2013325","journal-title":"J Digit Imaging"},{"key":"7029_CR31","doi-asserted-by":"publisher","first-page":"83","DOI":"10.5121\/ijma.2012.4408","volume":"4","author":"HK Maity","year":"2012","unstructured":"Maity HK, Maity SP (2012) Intelligent modified difference expansion for reversible watermarking. The International Journal of Multimedia & Its Applications (IJMA) 4:83\u201395","journal-title":"The International Journal of Multimedia & Its Applications (IJMA)"},{"key":"7029_CR32","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1007\/s10278-014-9700-5","volume":"27","author":"SM Mousavi","year":"2014","unstructured":"Mousavi SM, Naghsh A, Abu-Bakar S (2014) Watermarking techniques used in medical images: a survey. J Digit Imaging 27:714\u2013729","journal-title":"J Digit Imaging"},{"key":"7029_CR33","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.jvcir.2015.10.008","volume":"33","author":"T-S Nguyen","year":"2015","unstructured":"Nguyen T-S, Chang C-C, Huynh N-T (2015) A novel reversible data hiding scheme based on difference-histogram modification and optimal EMD algorithm. J Vis Commun Image Represent 33:389\u2013397","journal-title":"J Vis Commun Image Represent"},{"key":"7029_CR34","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.cmpb.2018.03.011","volume":"160","author":"W Pan","year":"2018","unstructured":"Pan W, Bouslimi D, Karasad M, Cozic M, Coatrieux G (2018) Imperceptible reversible watermarking of radiographic images based on quantum noise masking. Comput Methods Prog Biomed 160:119\u2013128","journal-title":"Comput Methods Prog Biomed"},{"key":"7029_CR35","doi-asserted-by":"publisher","first-page":"10599","DOI":"10.1007\/s11042-015-3127-y","volume":"76","author":"SA Parah","year":"2017","unstructured":"Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimed Tools Appl 76:10599\u201310633","journal-title":"Multimed Tools Appl"},{"key":"7029_CR36","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.jbi.2017.01.006","volume":"66","author":"SA Parah","year":"2017","unstructured":"Parah SA, Ahad F, Sheikh JA, Bhat G (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Inform 66:214\u2013230","journal-title":"J Biomed Inform"},{"key":"7029_CR37","unstructured":"Pianykh OS (2009) Digital imaging and communications in medicine (DICOM): a practical introduction and survival guide. 2nd ed. Springer, Berlin"},{"key":"7029_CR38","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.cosrev.2017.11.003","volume":"27","author":"AF Qasim","year":"2018","unstructured":"Qasim AF, Meziane F, Aspin R (2018) Digital watermarking: applicability for developing trust in medical imaging workflows state of the art review. Comput Sci Rev 27:45\u201360","journal-title":"Comput Sci Rev"},{"key":"7029_CR39","doi-asserted-by":"crossref","unstructured":"Qasim AF, Meziane F, Aspin R (2018) A reversible and imperceptible watermarking scheme for MR images authentication. In: Proceedings of the 24th International Conference on Automation and Computing (ICAC'2018), Newcastle University, Newcastle upon Tyne, UK, 6\u20137 September 2018","DOI":"10.23919\/IConAC.2018.8749000"},{"key":"7029_CR40","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.image.2018.10.007","volume":"70","author":"AF Qasim","year":"2019","unstructured":"Qasim AF, Aspin R, Meziane F, Hogg P (2019) Assessment of perceptual distortion boundary through applying reversible watermarking to brain MR images. Signal Process Image Commun 70:246\u2013258","journal-title":"Signal Process Image Commun"},{"key":"7029_CR41","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.bspc.2016.05.005","volume":"29","author":"A Ro\u010dek","year":"2016","unstructured":"Ro\u010dek A, Slav\u00ed\u010dek K, Dost\u00e1l O, Javorn\u00edk M (2016) A new approach to fully-reversible watermarking in medical imaging with breakthrough visibility parameters. Biomed Signal Process Control 29:44\u201352","journal-title":"Biomed Signal Process Control"},{"key":"7029_CR42","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1016\/j.ijleo.2017.07.060","volume":"145","author":"P Selvam","year":"2017","unstructured":"Selvam P, Balachandran S, Iyer SP, Jayabal R (2017) Hybrid transform based reversible watermarking technique for medical images in telemedicine applications. Optik 145:655\u2013671","journal-title":"Optik"},{"key":"7029_CR43","unstructured":"Soille P (2013) Morphological image analysis: principles and applications. 2nd ed. Springer, Berlin"},{"key":"7029_CR44","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/s10278-010-9295-4","volume":"24","author":"CK Tan","year":"2011","unstructured":"Tan CK, Ng JC, Xu X, Poh CL, Guan YL, Sheah K (2011) Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24:528\u2013540","journal-title":"J Digit Imaging"},{"key":"7029_CR45","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13:890\u2013896","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"7029_CR46","doi-asserted-by":"publisher","first-page":"18043","DOI":"10.1007\/s11042-017-4444-0","volume":"77","author":"Y Yang","year":"2018","unstructured":"Yang Y, Zhang W, Liang D, Yu N (2018) A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images. Multimed Tools Appl 77:18043\u201318065","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-7029-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-7029-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-7029-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T12:11:14Z","timestamp":1662639074000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-7029-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,15]]},"references-count":46,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["7029"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-7029-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,15]]},"assertion":[{"value":"26 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 December 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}