{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T16:10:57Z","timestamp":1725811857084},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T00:00:00Z","timestamp":1618185600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T00:00:00Z","timestamp":1618185600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-021-10712-7","type":"journal-article","created":{"date-parts":[[2021,4,12]],"date-time":"2021-04-12T09:03:30Z","timestamp":1618218210000},"page":"24823-24841","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["A lossless DWT-SVD domain watermarking for medical information security"],"prefix":"10.1007","volume":"80","author":[{"given":"Narima","family":"Zermi","sequence":"first","affiliation":[]},{"given":"Amine","family":"Khaldi","sequence":"additional","affiliation":[]},{"given":"Med Redouane","family":"Kafi","sequence":"additional","affiliation":[]},{"given":"Fares","family":"Kahlessenane","sequence":"additional","affiliation":[]},{"given":"Salah","family":"Euschi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,12]]},"reference":[{"key":"10712_CR1","doi-asserted-by":"publisher","unstructured":"Albertina B, Watson M, Holback C, Jarosz R, Kirk S, Lee Y Lemmerman J (2016) Radiology data from the Cancer genome atlas lung adenocarcinoma collection. The Cancer Imaging Archive. https:\/\/doi.org\/10.7937\/K9\/TCIA.2016.JGNIHEP5","DOI":"10.7937\/K9\/TCIA.2016.JGNIHEP5"},{"key":"10712_CR2","doi-asserted-by":"publisher","unstructured":"Alshanbari S (2020) Medical image watermarking for ownership & tamper detection, Multimed Tools Appl, https:\/\/doi.org\/10.1007\/s11042-020-08814-9","DOI":"10.1007\/s11042-020-08814-9"},{"key":"10712_CR3","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.comcom.2020.01.038","volume":"152","author":"A Anand","year":"2020","unstructured":"Anand A, Kumar Singh A (2020) An improved DWT-SVD domain watermarking for medical information security. Comput Commun 152:72\u201380","journal-title":"Comput Commun"},{"key":"10712_CR4","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1049\/iet-ipr.2018.5288","volume":"13","author":"P Aparna","year":"2019","unstructured":"Aparna P, Kishore P (2019) Biometric-based efficient medical image watermarking in E-healthcare application. IET Image Process 13:421\u2013428","journal-title":"IET Image Process"},{"key":"10712_CR5","doi-asserted-by":"publisher","unstructured":"Assini I, Badri A, Safi K, Sahel A, Baghdad A (2018) A robust hybrid watermarking technique for securing medical image. Int J Intell. Eng Syst 11:169\u2013176. https:\/\/doi.org\/10.22266\/ijies2018.0630.18","DOI":"10.22266\/ijies2018.0630.18"},{"key":"10712_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1117\/1.JMI.3.1.017001","volume":"3","author":"G Badshah","year":"2016","unstructured":"Badshah G, Liew S, Zain J, Ali M (2016) Watermarking of ultrasound medical images in teleradiology using compressed watermark. J Med Imaging 3:1\u20139","journal-title":"J Med Imaging"},{"key":"10712_CR7","doi-asserted-by":"publisher","first-page":"2127","DOI":"10.1007\/s11042-019-08225-5","volume":"79","author":"M Barania","year":"2020","unstructured":"Barania M, Peyman A, Valandar M, Irani B (2020) A blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform. Multimed Tools Appl 79:2127\u20132159","journal-title":"Multimed Tools Appl"},{"key":"10712_CR8","doi-asserted-by":"publisher","unstructured":"Barani MJ, Ayubi P, Yousefi Valandar M, Irani BY (2020) A new Pseudo random number generator based on generalized Newton complex map with dynamic key. J Inf Secur Appl 53:102509. https:\/\/doi.org\/10.1016\/j.jisa.2020.102509","DOI":"10.1016\/j.jisa.2020.102509"},{"key":"10712_CR9","doi-asserted-by":"publisher","unstructured":"Cedillo-Hernandez M, Cedillo-Hernandez A, Nakano-Miyatake M, Perez-Meana H (2020) Improving the management of medical imaging by using robust and secure dual watermarking. Biomed Signal Process Control 56:101695. https:\/\/doi.org\/10.1016\/j.bspc.2019.101695","DOI":"10.1016\/j.bspc.2019.101695"},{"key":"10712_CR10","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.procs.2020.03.198","volume":"167","author":"D Degadwala","year":"2020","unstructured":"Degadwala D, Kulkarni M, Vyas D, Mahajan A (2020) Novel image watermarking approach against noise and RST attacks. Procedia Comput Sci 167:213\u2013223","journal-title":"Procedia Comput Sci"},{"key":"10712_CR11","doi-asserted-by":"crossref","unstructured":"Devi H, Singh K (2020) Red-cyan anaglyph image watermarking using DWT, Hadamard transform and singular value decomposition for copyright protection, J Inf Secur Appl, Volume 50","DOI":"10.1016\/j.jisa.2019.102424"},{"key":"10712_CR12","doi-asserted-by":"publisher","unstructured":"Du L, Ho ATS, Cong R (2020) Perceptual hashing for image authentication: a survey. Signal Process Image Commun 81:115713. https:\/\/doi.org\/10.1016\/j.image.2019.115713","DOI":"10.1016\/j.image.2019.115713"},{"key":"10712_CR13","doi-asserted-by":"publisher","first-page":"107652","DOI":"10.1016\/j.apacoust.2020.107652","volume":"172","author":"S Euschi","year":"2021","unstructured":"Euschi S, Khaldi A, Kafi R, Kahlessenane F (2021) A Fourier transform based audio watermarking algorithm, applied acoustics. Volume 172:107652. https:\/\/doi.org\/10.1016\/j.apacoust.2020.107652","journal-title":"Volume"},{"key":"10712_CR14","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.image.2018.09.015","volume":"70","author":"T Fan","year":"2019","unstructured":"Fan T, Chao H, Chieu B (2019) Lossless medical image watermarking method based on significant difference of cellular automata transform coefficient. Signal Process Image Commun 70:174\u2013183","journal-title":"Signal Process Image Commun"},{"key":"10712_CR15","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1016\/j.procs.2019.09.296","volume":"159","author":"M Favorskaya","year":"2019","unstructured":"Favorskaya M, Savchina E, Gusev K (2019) Feature-based synchronization correction for multilevel watermarking of medical images. Procedia Comput Sci 159:1267\u20131276","journal-title":"Procedia Comput Sci"},{"key":"10712_CR16","first-page":"285","volume":"117","author":"S Gajula","year":"2017","unstructured":"Gajula S, Rajesh V (2017) Medical image watermarking scheme with DWT & SVD transforms. Int J Pure Appl Math 117:285\u2013290","journal-title":"Int J Pure Appl Math"},{"key":"10712_CR17","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.bspc.2018.02.007","volume":"43","author":"Y Gangadhar","year":"2018","unstructured":"Gangadhar Y, Giridhar Akula VS, Chenna Reddy P (2018) An evolutionary programming approach for securing medical images using watermarking scheme in invariant discrete wavelet transformation. Biomed Signal Process Control 43:31\u201340","journal-title":"Biomed Signal Process Control"},{"key":"10712_CR18","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.neunet.2014.09.005","volume":"64","author":"IJ Goodfellow","year":"2015","unstructured":"Goodfellow IJ, Erhan D, Carrier PL, Courville A, Mirza M, Hamner B, Cukierski W, Tang Y, Thaler D, Lee D-H, Zhou Y, Ramaiah C, Feng F, Li R, Wang X, Athanasakis D, Shawe-Taylor J, Milakov M, Park J, Ionescu R, Popescu M, Grozea C, Bergstra J, Xie J, Romaszko L, Xu B, Chuang Z, Bengio Y (2015) Challenges inrepresentation learning: A report on three machine learning contests. Neural Netw 64:59\u201363","journal-title":"Neural Netw"},{"issue":"4","key":"10712_CR19","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.irbm.2017.06.007","volume":"38","author":"S Haddad","year":"2017","unstructured":"Haddad S, Coatrieux G, Cozic M, Bouslimi D (August 2017) Joint watermarking and lossless JPEG-LS compression for medical image security. IRBM 38(4):198\u2013206","journal-title":"IRBM"},{"key":"10712_CR20","doi-asserted-by":"publisher","first-page":"2556","DOI":"10.1109\/TIFS.2020.2972159","volume":"15","author":"S Haddad","year":"2020","unstructured":"Haddad S, Coatrieux G, Moreau-Gaudry A, Cozic M (February 2020) Joint watermarking-encryption-JPEG-LS for medical image reliability control in encrypted and compressed domains. IEEE Trans Inf Forensics Secur 15:2556\u20132569","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10712_CR21","first-page":"3505","volume":"7","author":"M Hashim","year":"2018","unstructured":"Hashim M, Rahim M, Johi F, Taha M, Hamad H (2018) Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats. Int J Eng Technol 7:3505\u20133514","journal-title":"Int J Eng Technol"},{"key":"10712_CR22","doi-asserted-by":"publisher","first-page":"69758","DOI":"10.1109\/ACCESS.2019.2919381","volume":"7","author":"B Hassan","year":"2019","unstructured":"Hassan B, Ahmed R, Li B, Hassan O (2019) An imperceptible medical image watermarking framework for automated diagnosis of retinal pathologies in an eHealth arrangement. IEEE Access 7:69758\u201369775","journal-title":"IEEE Access"},{"key":"10712_CR23","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.ins.2020.01.019","volume":"519","author":"H Hu","year":"2020","unstructured":"Hu H, Hsu L, Chou H (2020) An improved SVD-based blind color image watermarking algorithm with mixed modulation incorporated. Inf Sci 519:161\u2013182","journal-title":"Inf Sci"},{"key":"10712_CR24","doi-asserted-by":"crossref","unstructured":"Kahlessenane F, Khaldi A, Euschi S (2020) A robust blind color image watermarking based on Fourier transform domain, Optik, Volume 208","DOI":"10.1016\/j.ijleo.2020.164562"},{"key":"10712_CR25","doi-asserted-by":"publisher","unstructured":"Kahlessenane F, Khaldi A, Kafi R, Euschi S, A DWT based watermarking approach for medical image protection, J Ambient Intell Humaniz Comput, (2020). https:\/\/doi.org\/10.1007\/s12652-020-02450-9","DOI":"10.1007\/s12652-020-02450-9"},{"key":"10712_CR26","first-page":"147","volume":"10","author":"A Khaldi","year":"2018","unstructured":"Khaldi A (2018) Diffie-Hellman key exchange through Steganographied images. Revista de Direito Estado e Telecomunica\u00e7\u00f5es 10:147\u2013160","journal-title":"Revista de Direito Estado e Telecomunica\u00e7\u00f5es"},{"key":"10712_CR27","doi-asserted-by":"publisher","first-page":"143","DOI":"10.21467\/ias.8.1.143-149","volume":"8","author":"A Khaldi","year":"2019","unstructured":"Khaldi A (2019) Steganographic techniques classification according to image format. Int Ann Sci 8:143\u2013149","journal-title":"Int Ann Sci"},{"key":"10712_CR28","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1504\/IJCVR.2020.10029218","volume":"10","author":"A Khaldi","year":"2020","unstructured":"Khaldi A (2020) A lossless blind image data hiding scheme for semi-fragile image watermark. Int J Comput Vis Robot 10:373. https:\/\/doi.org\/10.1504\/IJCVR.2020.10029218","journal-title":"Int J Comput Vis Robot"},{"key":"10712_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2016\/9583727","volume":"2016","author":"HL Khor","year":"2016","unstructured":"Khor HL, Liew S, Zain J (2016) Parallel digital watermarking process on ultrasound medical images in multicores environment. Int J Biomed Imaging 2016:1\u201314","journal-title":"Int J Biomed Imaging"},{"key":"10712_CR30","doi-asserted-by":"publisher","unstructured":"Kishore PVV, Venkatram N, Sarvya C, Reddy LSS (2014) Medical image watermarking using RSA encryption in wavelet domain, In 2014 First International Conference on Networks Soft Computing (ICNSC2014), pp. 258\u2013262, doi: https:\/\/doi.org\/10.1109\/CNSC.2014.6906662.","DOI":"10.1109\/CNSC.2014.6906662"},{"key":"10712_CR31","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1016\/j.future.2019.07.064","volume":"101","author":"T Koohpayeh Araghi","year":"2019","unstructured":"Koohpayeh Araghi T, Abd Manaf A (2019) An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD. Futur Gener Comput Syst 101:1223\u20131246","journal-title":"Futur Gener Comput Syst"},{"key":"10712_CR32","doi-asserted-by":"publisher","unstructured":"Liu X, Lin C, Yuan S (2018) Blind dual watermarking for color images\u2019 authentication and copyright protection. IEEE Trans Circuits Syst Video Technol 28:1047\u20131055. https:\/\/doi.org\/10.1109\/TCSVT.2016.2633878","DOI":"10.1109\/TCSVT.2016.2633878"},{"key":"10712_CR33","doi-asserted-by":"publisher","unstructured":"Memon NA, Gilani SAM, Ali A (2009) Watermarking of chest CT scan medical images for content authentication, In 2009 International Conference on Information and Communication Technologies, pp. 175\u2013180, doi: https:\/\/doi.org\/10.1109\/ICICT.2009.5268167.","DOI":"10.1109\/ICICT.2009.5268167"},{"issue":"14","key":"10712_CR34","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.neucom.2019.01.067","volume":"337","author":"S Mun","year":"2019","unstructured":"Mun S, Nam S, Jang H, Kim D, Lee H (2019) Finding robust domain from attacks: a learning framework for blind watermarking. Neurocomputing, Volume 337(14):191\u2013202","journal-title":"Neurocomputing, Volume"},{"key":"10712_CR35","unstructured":"Paul Cohen J, Morrison P, Dao L (2020) COVID-19 image data collection. https:\/\/github.com\/ieee8023\/covid-chestxray-dataset"},{"key":"10712_CR36","doi-asserted-by":"crossref","unstructured":"Peyman A, Setayeshi S, Rahmani A (2020) Deterministic chaos game: a new fractal based pseudo-random number generator and its cryptographic application, J Inf Secur Appl Volume 52","DOI":"10.1016\/j.jisa.2020.102472"},{"key":"10712_CR37","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.cosrev.2017.11.003","volume":"27","author":"F Qasim","year":"2018","unstructured":"Qasim F, Meziane F, Aspin R (2018) Digital watermarking: applicability for developing trust in medical imaging workflows state of the art review. Comput Sci Rev 27:45\u201360","journal-title":"Comput Sci Rev"},{"key":"10712_CR38","unstructured":"Sakthidasan K, Abhi Rayna H, Mangu V, Prakash VR, Vasudevan N (2019) Image water marking using DWT to encapsulate data in medical image, international conference on communication and signal processing, India"},{"key":"10712_CR39","doi-asserted-by":"publisher","unstructured":"Sankaran KS, Rayna HA, Mangu V, Prakash VR, Vasudevan N (2019) Image water marking using DWT to encapsulate data in medical image. In: 2019 presented at the 2019 International Conference on Communication and Signal Processing (ICCSP), pp 0568\u20130571. https:\/\/doi.org\/10.1109\/ICCSP.2019.8698057","DOI":"10.1109\/ICCSP.2019.8698057"},{"key":"10712_CR40","doi-asserted-by":"publisher","unstructured":"Thakkar FN, Srivastava VK (2017) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed Tools Appl 76:3669\u20133697. https:\/\/doi.org\/10.1007\/s11042-016-3928-7","DOI":"10.1007\/s11042-016-3928-7"},{"key":"10712_CR41","doi-asserted-by":"publisher","first-page":"13905","DOI":"10.1007\/s11042-018-6746-2","volume":"78","author":"R Thanki","year":"2019","unstructured":"Thanki R, Borra S (2019) Fragile watermarking for copyright authentication and tamper detection of medical images using compressive sensing (CS) based encryption and contourlet domain processing. Multimed Tools Appl 78:13905\u201313924 13905","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"10712_CR42","doi-asserted-by":"publisher","first-page":"1366","DOI":"10.1016\/j.jestch.2017.06.001","volume":"20","author":"R Thanki","year":"2017","unstructured":"Thanki R, Borra S, Dwivedi V, Borisagar K (Aug. 2017) An efficient medical image watermarking scheme based on FDCuT\u2013DCT. Eng Sci Technol Int J 20(4):1366\u20131379. https:\/\/doi.org\/10.1016\/j.jestch.2017.06.001","journal-title":"Eng Sci Technol Int J"},{"key":"10712_CR43","doi-asserted-by":"crossref","first-page":"351","DOI":"10.35940\/ijitee.A4126.119119","volume":"9","author":"U Verma","year":"2019","unstructured":"Verma U, Sharma N (2019) Hybrid mode of medical image watermarking to enhance robustness and imperceptibility. Int J Innovative Technol Exploring Eng 9:351\u2013359","journal-title":"Int J Innovative Technol Exploring Eng"},{"key":"10712_CR44","doi-asserted-by":"crossref","unstructured":"Zhang L, Wei D (2020) Image watermarking based on matrix decomposition and gyrator transform in invariant integer wavelet domain, Signal Process Volume 169","DOI":"10.1016\/j.sigpro.2019.107421"},{"key":"10712_CR45","unstructured":"Zukal M, Bene\u0161 R, \u010c\u00edka P, \u0158\u00edha K (2011) Ultrasound image database. Department of Telecommunications, Brno University of Technology. http:\/\/splab.cz\/en\/download\/databaze\/ultrasound"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10712-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10712-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10712-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,24]],"date-time":"2022-12-24T02:14:21Z","timestamp":1671848061000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10712-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,12]]},"references-count":45,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["10712"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10712-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,12]]},"assertion":[{"value":"1 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}