{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:36:21Z","timestamp":1725510981246},"reference-count":59,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1016\/j.jisa.2023.103547","type":"journal-article","created":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T22:41:34Z","timestamp":1688078494000},"page":"103547","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":8,"special_numbering":"C","title":["An end-to-end screen shooting resilient blind watermarking scheme for medical images"],"prefix":"10.1016","volume":"76","author":[{"given":"Zongwei","family":"Tang","sequence":"first","affiliation":[]},{"given":"Xiuli","family":"Chai","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Binjie","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Tan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jisa.2023.103547_bib0001","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JPHOT.2021.3059703","article-title":"Advanced color edge detection using clifford algebra in satellite images","volume":"13","author":"Bhatti","year":"2021","journal-title":"IEEE Photonics J"},{"key":"10.1016\/j.jisa.2023.103547_bib0002","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2023\/8342104","article-title":"Deep learning with graph convolutional networks: an overview and latest applications in computational intelligence","volume":"2023","author":"Bhatti","year":"2023","journal-title":"Int J Intell Syst"},{"key":"10.1016\/j.jisa.2023.103547_bib0003","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TGRS.2021.3090410","article-title":"Local similarity-based spatial\u2013spectral fusion hyperspectral image classification with deep CNN and Gabor filtering","volume":"60","author":"Bhatti","year":"2021","journal-title":"IEEE Trans Geosci Remote Sens"},{"key":"10.1016\/j.jisa.2023.103547_bib0004","doi-asserted-by":"crossref","first-page":"41019","DOI":"10.1109\/ACCESS.2021.3060744","article-title":"Time series analysis and forecasting of air pollution particulate matter (PM 2.5): an SARIMA and factor analysis approach","volume":"9","author":"Bhatti","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.jisa.2023.103547_bib0005","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11432-020-3062-8","article-title":"Jupiter: a modern federated learning platform for regional medical care","volume":"64","author":"Xing","year":"2021","journal-title":"Sci China Inf Sci"},{"key":"10.1016\/j.jisa.2023.103547_bib0006","article-title":"A lossless self-recovery watermarking scheme with JPEG-LS compression","volume":"58","author":"Zhaoning","year":"2021","journal-title":"J Info Secur Applic"},{"key":"10.1016\/j.jisa.2023.103547_bib0007","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1109\/MMUL.2020.2993269","article-title":"Compression-then-encryption-based secure watermarking technique for smart healthcare system","volume":"27","author":"Anand","year":"2020","journal-title":"IEEE Multimedia"},{"key":"10.1016\/j.jisa.2023.103547_bib0008","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2022.02.083","article-title":"A comprehensive survey on robust image watermarking","author":"Wan","year":"2022","journal-title":"Neurocomputing"},{"key":"10.1016\/j.jisa.2023.103547_bib0009","first-page":"1","article-title":"A survey on healthcare data: a security perspective","volume":"17","author":"Singh","year":"2021","journal-title":"ACM Trans Multimidia Comput Commun Applic"},{"key":"10.1016\/j.jisa.2023.103547_bib0010","series-title":"Advances in Artificial Intelligence and Security: 8th International Conference on Artificial Intelligence and Security, ICAIS 2022","first-page":"350","article-title":"Robust zero watermarking algorithm for medical images using local binary pattern and discrete cosine transform","author":"Liu","year":"2022"},{"key":"10.1016\/j.jisa.2023.103547_bib0011","doi-asserted-by":"crossref","DOI":"10.1109\/JBHI.2021.3123936","article-title":"Application of zero-watermarking scheme based on swin transformer for securing the Metaverse Healthcare Data","author":"Han","year":"2023","journal-title":"IEEE J Biomed Health Inf"},{"key":"10.1016\/j.jisa.2023.103547_bib0012","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/j.cmpb.2018.02.021","article-title":"Encryption and watermark-treated medical image against hacking disease\u2014an immune convention in spatial and frequency domains","volume":"159","author":"Lakshmi","year":"2018","journal-title":"Comput Methods Programs Biomed"},{"key":"10.1016\/j.jisa.2023.103547_bib0013","article-title":"An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine","volume":"55","author":"Swaraja","year":"2020","journal-title":"Biomed Signal Process Control"},{"key":"10.1016\/j.jisa.2023.103547_bib0014","doi-asserted-by":"crossref","first-page":"1701","DOI":"10.1007\/s10489-020-01903-0","article-title":"An intelligent and blind dual color image watermarking for authentication and copyright protection","volume":"51","author":"Ahmadi","year":"2021","journal-title":"Appl Intell"},{"key":"10.1016\/j.jisa.2023.103547_bib0015","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1016\/j.measurement.2019.02.069","article-title":"SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images","volume":"139","author":"Arunkumar","year":"2019","journal-title":"Measurement"},{"key":"10.1016\/j.jisa.2023.103547_bib0016","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.neucom.2019.01.067","article-title":"Finding robust domain from attacks: a learning framework for blind watermarking","volume":"337","author":"Mun","year":"2019","journal-title":"Neurocomputing"},{"key":"10.1016\/j.jisa.2023.103547_bib0017","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.117134","article-title":"A high-capacity QRD-based blind color image watermarking algorithm incorporated with AI technologies","volume":"199","author":"Hsu","year":"2022","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.jisa.2023.103547_bib0018","doi-asserted-by":"crossref","first-page":"4810","DOI":"10.1002\/int.22742","article-title":"Deep learning-based robust medical image watermarking exploiting DCT and Harris hawks optimization","volume":"37","author":"Chacko","year":"2022","journal-title":"Int J Intell Syst"},{"key":"10.1016\/j.jisa.2023.103547_bib0019","first-page":"1","article-title":"Multi-watermarking algorithm for medical image based on KAZE-DCT","author":"Zeng","year":"2022","journal-title":"J Ambient Intell Humanized Comput"},{"key":"10.1016\/j.jisa.2023.103547_bib0020","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.118730","article-title":"Contourlet and discrete cosine transform based quality guaranteed robust image watermarking method using artificial bee colony algorithm","volume":"212","author":"Gul","year":"2023","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.jisa.2023.103547_bib0021","series-title":"Neural Computing and Applications","first-page":"1","article-title":"Machine learning based multipurpose medical image watermarking","author":"Sinhal","year":"2023"},{"key":"10.1016\/j.jisa.2023.103547_bib0022","unstructured":"University of Granada, Computer Vision Group. CVG-UGR Image Database; 2002. Accessed December 20, 2021. http:\/\/decsai.ugr.es\/cvg\/dbimagenes\/c512.php."},{"key":"10.1016\/j.jisa.2023.103547_bib0023","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/s11263-014-0733-5","article-title":"The pascal visual object classes challenge: a retrospective","volume":"111","author":"Everingham","year":"2015","journal-title":"Int J Comput Vision"},{"key":"10.1016\/j.jisa.2023.103547_bib0024","series-title":"Proceedings of the IEEE conference on computer vision and pattern recognition","first-page":"2097","article-title":"Chestx-ray8: hospital-scale chest x-ray database and benchmarks on weakly-supervised classification and localization of common thorax diseases","author":"Wang","year":"2017"},{"key":"10.1016\/j.jisa.2023.103547_bib0025","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1109\/TMI.2004.825627","article-title":"Ridge-based vessel segmentation in color images of the retina","volume":"23","author":"Staal","year":"2004","journal-title":"IEEE Trans Med Imaging"},{"key":"10.1016\/j.jisa.2023.103547_bib0026","series-title":"arXiv preprint","author":"Yang","year":"2020"},{"key":"10.1016\/j.jisa.2023.103547_bib0027","doi-asserted-by":"crossref","first-page":"3221","DOI":"10.1007\/s12652-019-01500-1","article-title":"Digital watermarking techniques for image security: a review","volume":"11","author":"Mohanarathinam","year":"2020","journal-title":"J Ambient Intell Humanized Comput"},{"key":"10.1016\/j.jisa.2023.103547_bib0028","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1049\/ipr2.12653","article-title":"A screen-shooting resilient document image watermarking scheme using deep neural network","volume":"17","author":"Ge","year":"2023","journal-title":"IET Image Proc"},{"key":"10.1016\/j.jisa.2023.103547_bib0029","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1109\/TIFS.2018.2878541","article-title":"Screen-shooting resilient watermarking","volume":"14","author":"Fang","year":"2018","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10.1016\/j.jisa.2023.103547_bib0030","doi-asserted-by":"crossref","first-page":"4075","DOI":"10.1109\/TCSVT.2019.2953720","article-title":"A camera shooting resilient watermarking scheme for underpainting documents","volume":"30","author":"Fang","year":"2019","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10.1016\/j.jisa.2023.103547_bib0031","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"1515","article-title":"Light field messaging with deep photographic steganography","author":"Wengrowski","year":"2019"},{"key":"10.1016\/j.jisa.2023.103547_bib0032","doi-asserted-by":"crossref","first-page":"955","DOI":"10.1109\/TMM.2021.3061801","article-title":"Tera: Screen-to-camera image code with transparency, efficiency, robustness and adaptability","volume":"24","author":"Fang","year":"2021","journal-title":"IEEE Trans Multimedia"},{"key":"10.1016\/j.jisa.2023.103547_bib0033","doi-asserted-by":"crossref","first-page":"7094","DOI":"10.1109\/TCYB.2020.3037208","article-title":"RIHOOP: robust invisible hyperlinks in offline and online photographs","volume":"52","author":"Jia","year":"2020","journal-title":"IEEE Trans Cybernetics"},{"key":"10.1016\/j.jisa.2023.103547_bib0034","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2020.107657","article-title":"A general framework for partial reversible data hiding using hamming code","volume":"175","author":"Wu","year":"2020","journal-title":"Signal Process"},{"key":"10.1016\/j.jisa.2023.103547_bib0035","first-page":"16","article-title":"Photon, Poisson noise","volume":"4","author":"Hasinoff","year":"2014","journal-title":"Comput Vis Ref Guide"},{"key":"10.1016\/j.jisa.2023.103547_bib0036","series-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition","first-page":"2117","article-title":"Stegastamp: invisible hyperlinks in physical photographs","author":"Tancik","year":"2020"},{"key":"10.1016\/j.jisa.2023.103547_bib0037","series-title":"NIPS 2017 workshop on machine learning and computer security","first-page":"8","article-title":"Jpeg-resistant adversarial images","author":"Shin","year":"2017"},{"key":"10.1016\/j.jisa.2023.103547_bib0038","series-title":"Computer Vision\u2013ECCV 2016: 14th European Conference","first-page":"694","article-title":"Perceptual losses for real-time style transfer and super-resolution","author":"Johnson","year":"2016"},{"key":"10.1016\/j.jisa.2023.103547_bib0039","doi-asserted-by":"crossref","first-page":"2931","DOI":"10.1007\/s12652-020-02450-9","article-title":"A DWT based watermarking approach for medical image protection","volume":"12","author":"Kahlessenane","year":"2021","journal-title":"J Ambient Intell Humanized Comput"},{"key":"10.1016\/j.jisa.2023.103547_bib0040","doi-asserted-by":"crossref","first-page":"1055","DOI":"10.1007\/s11045-017-0487-7","article-title":"A new algorithm of blind color image watermarking based on LU decomposition","volume":"29","author":"Su","year":"2018","journal-title":"Multidimension Syst Signal Process"},{"key":"10.1016\/j.jisa.2023.103547_bib0041","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijleo.2019.164152","article-title":"New image blind watermarking method based on two-dimensional discrete cosine transform","volume":"204","author":"Yuan","year":"2020","journal-title":"Optik"},{"key":"10.1016\/j.jisa.2023.103547_bib0042","doi-asserted-by":"crossref","first-page":"7491","DOI":"10.1007\/s11042-019-08423-1","article-title":"A blind color image watermarking scheme with variable steps based on Schur decomposition","volume":"79","author":"Liu","year":"2020","journal-title":"Multimedia Tools Applic"},{"key":"10.1016\/j.jisa.2023.103547_bib0043","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2020.114540","article-title":"A fusion-domain color image watermarking based on Haar transform and image correction","volume":"170","author":"Liu","year":"2021","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.jisa.2023.103547_bib0044","doi-asserted-by":"crossref","first-page":"4747","DOI":"10.1002\/int.22738","article-title":"A blind color image watermarking algorithm combined spatial domain and SVD","volume":"37","author":"Su","year":"2022","journal-title":"Int J Intell Syst"},{"key":"10.1016\/j.jisa.2023.103547_bib0045","first-page":"10223","article-title":"Udh: universal deep hiding for steganography, watermarking, and light field messaging","volume":"33","author":"Zhang","year":"2020","journal-title":"Adv Neural Inf Process Syst"},{"key":"10.1016\/j.jisa.2023.103547_bib0046","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijleo.2022.169931","article-title":"A hierarchical protection scheme for intellectual property of semi-open source datasets based on double watermarking","volume":"269","author":"Lu","year":"2022","journal-title":"Optik"},{"key":"10.1016\/j.jisa.2023.103547_bib0047","doi-asserted-by":"crossref","first-page":"13367","DOI":"10.1007\/s11042-020-10257-1","article-title":"New watermarking algorithm utilizing quaternion Fourier transform with advanced scrambling and secure encryption","volume":"80","author":"Bhatti","year":"2021","journal-title":"Multimedia Tools Applic"},{"key":"10.1016\/j.jisa.2023.103547_bib0048","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2023.108971","article-title":"Color image watermarking based on a fast structure-preserving algorithm of quaternion singular value decomposition","volume":"208","author":"Zhang","year":"2023","journal-title":"Signal Process"},{"key":"10.1016\/j.jisa.2023.103547_bib0049","article-title":"UDTCWT-PHFMs domain statistical image watermarking using vector BW-Type R distribution","author":"Wang","year":"2023","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10.1016\/j.jisa.2023.103547_bib0050","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.120237","article-title":"A perceptual hash based blind-watermarking scheme for image authentication","volume":"227","author":"Roy","year":"2023","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.jisa.2023.103547_bib0051","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.119649","article-title":"Towards perceptual image watermarking with robust texture measurement","volume":"219","author":"Zhang","year":"2023","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.jisa.2023.103547_bib0052","doi-asserted-by":"crossref","first-page":"20133","DOI":"10.1007\/s11042-019-7326-9","article-title":"A novel robust color image watermarking method using RGB correlations","volume":"78","author":"Zhang","year":"2019","journal-title":"Multimedia Tools Applic"},{"key":"10.1016\/j.jisa.2023.103547_bib0053","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1007\/s00500-019-03924-5","article-title":"An improved watermarking algorithm for color image using Schur decomposition","volume":"24","author":"Su","year":"2020","journal-title":"Soft Comput"},{"key":"10.1016\/j.jisa.2023.103547_bib0054","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1016\/j.ins.2022.05.046","article-title":"A robust adaptive blind color image watermarking for resisting geometric attacks","volume":"606","author":"Su","year":"2022","journal-title":"Inf Sci"},{"key":"10.1016\/j.jisa.2023.103547_bib0055","doi-asserted-by":"crossref","DOI":"10.1016\/j.image.2021.116292","article-title":"A blind color digital image watermarking method based on image correction and eigenvalue decomposition","volume":"95","author":"Liu","year":"2021","journal-title":"Signal Process Image Commun"},{"key":"10.1016\/j.jisa.2023.103547_bib0056","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.118133","article-title":"CONCEAL: a robust dual-color image watermarking scheme","volume":"208","author":"Luo","year":"2022","journal-title":"Expert Syst Appl"},{"key":"10.1016\/j.jisa.2023.103547_bib0057","series-title":"Innovation in Medicine and Healthcare: Proceedings of 9th KES-InMed 2021","first-page":"61","article-title":"A novel robust watermarking algorithm for encrypted medical image based on Bandelet-DCT","author":"Fang","year":"2021"},{"key":"10.1016\/j.jisa.2023.103547_bib0058","series-title":"Innovation in Medicine and Healthcare: Proceedings of 9th KES-InMed 2021","first-page":"75","article-title":"Robust zero watermarking algorithm for encrypted medical images based on DWT-Gabor","author":"Xiao","year":"2021"},{"key":"10.1016\/j.jisa.2023.103547_bib0059","series-title":"Innovation in Medicine and Healthcare: Proceedings of 9th KES-InMed 2021","first-page":"101","article-title":"A robust zero-watermarkinging algorithm based on PHTs-DCT for medical images in the encrypted domain","author":"Yi","year":"2021"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S221421262300131X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S221421262300131X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,6,16]],"date-time":"2024-06-16T01:01:03Z","timestamp":1718499663000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S221421262300131X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8]]},"references-count":59,"alternative-id":["S221421262300131X"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103547","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2023,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"An end-to-end screen shooting resilient blind watermarking scheme for medical images","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2023.103547","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103547"}}