Abstract
In order to aim for diagnosis of disease and decision making, the medical imaging plays an important role in health science. Clinical pictures are portrayals of profoundly vulnerable computerized images, those can be tampered without leaving any visual clues. Hence it is challenging to keep up its credibility. However, as there are numerous ways to manipulate an image, correspondingly various strategies have also been proposed to safeguard the genuineness of medical images. This survey paper presents different techniques used for medical image authentication viz. watermarking, signature and hybrid techniques. The state-of-the-art techniques have attained promising results for authentication and tampering detection, but an efficient tampering localization and recovery have remained still as a challenge. This review article can be considered as a benchmark survey paper as it gives a complete comprehensive overview commencing from the evolution of medical image formats, types of medical imaging modalities and also provides an elaborative comparison over 40 research works in terms of prominent factors like type of medical image used, embedded region, embedded data, about the coverage of tampering localization and recovery along with the discussion on limitations and future works of each one.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study'.
References
Acharya R, Bhat PS, Kumar S, Min LC (2003) Transmission and storage of medical images with patient information. Comput Biol Med 33(4):303–310
Nayak J, Bhat PS, Kumar MS, Acharya UR (2004) Reliable transmission and storage of medical images with patient information using error control codes. In: Proceedings of the IEEE INDICON 2004 First India Annual Conference. IEEE, Kharagpur, pp 147–150. https://doi.org/10.1109/INDICO.2004.1497726
Zain JM, Fauzi AR (2006) Medical image watermarking with tamper detection and recovery. In: 2006 International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE, New York, pp 3270–3273. https://doi.org/10.1109/IEMBS.2006.260767
Fotopoulos V, Stavrinou ML, Skodras AN (2008) Medical image authentication and self-correction through an adaptive reversible watermarking technique. In: 2008 8th IEEE International Conference on BioInformatics and BioEngineering, (Athens, Greece). IEEE, pp 1–5. https://doi.org/10.1109/BIBE.2008.4696803
Wu JH, Chang RF, Chen CJ, Wang CL, Kuo TH, Moon WK, Chen DR (2008) Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21(1):59–76
Memon NA, Gilani SAM (2011) Watermarking of chest CT scan medical images for content authentication. Int J Comput Math 88(2):265–280
Al-Qershi OM, Khoo BE (2010) ROI-based tamper detection and recovery for medical images using reversible watermarking technique. In: 2010 IEEE international conference on information theory and information security. IEEE, Beijing, pp 151–155. https://doi.org/10.1109/ICITIS.2010.5688743
Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13:890–896
Kundu MK, Das S (2010) Lossless ROI medical image watermarking technique with enhanced security and high payload embedding. In: 2010 20th International Conference on Pattern Recognition. IEEE, Istanbul, 1457–1460
Tan CK, Ng JC, Xu X, Poh CL, Guan YL, Sheah K (2011) Security protection of DICOM medical images using dual- layer reversible watermarking with tamper detection capability. J Digit Imaging 24(3):528–540
Hajjaji MA, Mtibaa A, Bourennane EB (2011) A watermarking of medical image: method based “LSB”. International Journal of Computer Science Issues. https://hal.science/hal-00822806v1/document
Naheed T, Usman I, Khan TM, Dar AH, Shafique MF (2014) Intelligent reversible watermarking technique in medical images using GA and PSO. Optik 125(11):2515–2525
Badshah G, Liew SC, Zain JM, Ali M (2016) Watermark compression in medical image watermarking using Lempel-Ziv- Welch (LZW) lossless compression technique. J Digit Imaging 29(2):216–225
Ansari IA, Pant M, Ahn CW (2016) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225–1239
Khor HL, Liew SC, Zain JM (2017) Region of interest-based tamper detection and lossless recovery watermarking scheme (ROI-DR) on ultrasound medical images. J Digit Imaging 30(3):328–349
Liew SC, Liew SW, Zain JM (2013) Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication. J Digit Imaging 26(2):316–325
Liew SC (2011) Tamper Localization and recovery watermarking schemes for medical images in PACS Ph D Thesis, Universitiy Malayisa Pahang, Malayisa
Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269–10278
Dhole VS, Patil NN (2015) Self embedding fragile watermarking for image tampering detection and image recovery using self recovery blocks. In: 2015 International Conference on Computing Communication Control and Automation. IEEE, Pune, pp 752–757. https://doi.org/10.1109/ICCUBEA.2015.150
Patra B, Patra JC (2012) CRT-based fragile self-recovery watermarking scheme for image authentication and recovery. In: 2012 International Symposium on Intelligent Signal Processing and Communications Systems. IEEE, Tamsui, pp 430–435. https://doi.org/10.1109/ISPACS.2012.6473528
Preda RO (2014) Self-recovery of unauthentic images using a new digital watermarking approach in the wavelet domain. In: 2014 10th International Conference on Communications (Bucharest, Romania). IEEE, pp 1–4. https://doi.org/10.1109/ICComm.2014.6866744
Kelkar V, Mehta JH, Tuckley K (2018) A novel robust reversible watermarking technique based on prediction error expansion for medical images. In: Proceedings of 2nd International Conference on Computer Vision and Image Processing, vol 703. Springer, Singapore. https://doi.org/10.1007/978-981-10-7895-8_11
Iskandar MW (2019) An implementation of text hiding in medical images based on graph coloring for android devices. In: Journal of Physics: Conference Series, The 2nd International Conference on Data and Information Science, 15–16 November 2018, Bandung, Indonesia, vol 1192. https://doi.org/10.1088/1742-6596/1192/1/012008. https://iopscience.iop.org/article/10.1088/1742-6596/1192/1/012008/pdf
Parah SA, Bashir A, Manzoor M, Gulzar A, Firdous M, Loan NA, Sheikh JA (2019) Secure and reversible data hiding scheme for healthcare system using magic rectangle and a new interpolation technique. In: Healthcare data analytics and management. Academic Press, pp 267–309. https://doi.org/10.1016/B978-0-12-815368-0.00011-7
Jung KH, Yoo KY (2009) Data hiding method using image interpolation. Comput Stand Interfaces 31(2):465–470
Ou B, Zhao Y, Ni R (2012) Reversible watermarking using optional prediction error histogram modification. Neurocomputing 93:67–76
Wang XT, Chang CC, Nguyen TS, Li MC (2013) Reversible data hiding for high quality images exploiting interpolation and direction order mechanism. Digital Signal Process 23(2):569–577
Lee HY (2019) Adaptive reversible watermarking for authentication and privacy protection of medical records. Multimedia Tools Appl 78(14):19663–19680
Gull S, Loan NA, Parah SA, Sheikh JA, Bhat GM (2020) An efficient watermarking technique for tamper detection and localization of medical images. J Ambient Intell Humanized Comput 11(5):1799–1808
Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 30:312–327
Singh D, Singh SK (2017) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimedia Tools Appl 76(1):953–977
Singh D, Singh SK (2016) Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J Vis Commun Image Represent 38:775–789
Wakatani A (2002) Digital watermarking for ROI medical images by using compressed signature image. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences. IEEE, Big Island, pp 2043–2048. https://doi.org/10.1109/HICSS.2002.994129
Giakoumaki A, Pavlopoulos S, Koutouris D (2003) A medical image watermarking scheme based on wavelet transform. In: Proceedings of the 25th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, vol 1. IEEE, Cancun, pp 856–859. https://doi.org/10.1109/IEMBS.2003.1279900
Ustubioglu A, Ulutas G (2017) A new medical image watermarking technique with finer tamper localization. J Digit Imaging 30(6):665–680
Shih FY, Wu YT (2005) Robust watermarking and compression for medical images based on genetic algorithms. Inf Sci 175(3):200–216
Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Secure and efficient health data management through multiple watermarking on medical images. Med Biol Eng Comput 44(8):619–631
Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 10(4):722–732
Kumar B, Singh HV, Singh SP, Mohan A (2011) Secure spread-spectrum watermarking for telemedicine applications. J Inf Secur 2(02):91
Soliman MM, Hassanien AE, Ghali NI, Onsi HM (2012) An adaptive watermarking approach for medical imaging using swarm intelligent. Int J Smart Home 6(1):37–50
Seenivasagam V, Velumani R (2013) A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud. Comput Math Methods Med 2013:516465. https://doi.org/10.1155/2013/516465
Umamageswari A, Suresh GR (2013) Security in medical image communication with Arnold and cat map method and reversible watermarking. In: 2013 International Conference on Circuits, Power and Computing Technologies. IEEE, Nagercoil, pp 1116–1121. https://doi.org/10.1109/ICCPCT.2013.6528904
Umamageswari A, Suresh GR (2014) Novel algorithm for secure medical image communication using roi based digital lossless watermarking and ds. Int J Appl Eng Res 9(22):12163–12176
Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and imperceptible dual watermarking for telemedicine applications. Wireless Pers Commun 80(4):1415–1433
Singh AK, Dave M, Mohan A (2016) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimedia Tools Appl 75(14):8381–8401
Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. J Med Imaging Health Informatics 5(3):607–614
Kumar B, Anand A, Singh SP, Mohan A (2011) High capacity spread-spectrum watermarking for telemedicine applications World Academy of Science. Eng Technol 79:2011
Singh AK, Dave M, Mohan A (2015) Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain. Wireless Pers Commun 83(3):2133–2150
Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools Appl 77(4):4863–4882
Ganic E, Eskiciogl AM (2004) Robust DWT-SVD domain image watermarking: embedding data in all frequencies. In: Proceedings of the 2004 Workshop on Multimedia and Security. USA, pp 166–174. https://doi.org/10.1145/1022431.1022461
Shih FY, Zhong X (2016) High-capacity multiple regions of interest watermarking for medical images. Inf Sci 367:648–659
Zear A, Singh AK, Kumar P (2018) Multiple watermarking for healthcare applications. J Intell Syst 27(1):5–18
Sharma A, Singh AK, Ghrera SP (2017) Robust and secure multiple watermarking for medical images. Wireless Pers Commun 92(4):1611–1624
Bamal R, Kasana SS (2018) Slantlet based hybrid watermarking technique for medical images. Multimedia Tools Appl 77(10):12493–12518
Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156
Wang ZH, Lee CF, Chang CY (2013) Histogram-shifting-imitated reversible data hiding. J Syst Softw 86(2):315–323
Zain JM, Clarke M (2011) Reversible region of non-interest (roni) watermarking for authentication of dicom images. arXiv:1101.1603
Zhao Z, Luo H, Lu ZM, Pan JS (2011) Reversible data hiding based on multilevel histogram modification and sequential recovery. AEU-Int J Electron Commun 65(10):814–826
Al-qdah M (2018) Secure watermarking technique for medical images with visual evaluation. Signal & Image Processing: An International Journal (SIPIJ) 9(1). https://doi.org/10.2139/ssrn.3409803
Singh AK (2019) Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimedia Tools Appl 78(21):30523–30533
Bamal R, Kasana SS (2019) Dual hybrid medical watermarking using walsh-slantlet transform. Multimedia Tools and Applications 78(13):17899–17927
Thodi DM, Rodríguez JJ (2007) Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16(3):721–730
Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimedia Tools Appl 78(3):3457–3470
Singh AK (2017) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimedia Tools Appl 76(6):8881–8900
Thakur S, Singh AK, Ghrera SP, Mohan A (2020) Chaotic based secure watermarking approach for medical images. Multimedia Tools Appl 79(7):4263–4276
Parah SA, Ahmad I, Loan NA, Muhammad K, Sheikh JA, Bhat GM (2019) Realization of an adaptive data hiding system for electronic patient record, embedding in medical images. In: Security in smart cities: models, applications, and challenges. Springer, Cham. https://doi.org/10.1007/978-3-030-01560-2
Liu J, Li J, Ma J, Sadiq N, Bhatti UA, Ai Y (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon map. Appl Sci 9(4):700
Al-Shayea TK, Mavromoustakis CX, Batalla JM, Mastorakis G (2019) A hybridized methodology of different wavelet transformations targeting medical images in IoT infrastructure. Measurement 148:106813
Al-Qershi OM, Khoo BE (2011) Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging 24(1):114–125
Das S, Kundu MK (2013) Effective management of medical information through ROI-lossless fragile image watermarking technique. Comput Methods Programs Biomed 111(3):662–675
Guo X, Zhuang TG (2009) A region-based lossless watermarking scheme for enhancing security of medical data. J Digit Imaging 22(1):53–64
Liu Y, Qu X, Xin G (2016) A ROI-based reversible data hiding scheme in encrypted medical images. J Vis Commun Image Represent 39:51–57
Zain JM, Baldwin LP, Clarke M (2004) Reversible watermarking for authentication of DICOM images. In: The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE, San Francisco, pp 3237–3240. https://doi.org/10.1109/IEMBS.2004.1403911
Borra S, Thanki R (2020) Crypto-watermarking scheme for tamper detection of medical images. Comput Methods Biomech Biomed Eng: Imaging Visualization 8(4):345–355
Arumugham S, Rajagopalan S, Rayappan JBB, Amirtharajan R (2019) Tamper-resistant secure medical image carrier: an IWT–SVD–Chaos–FPGA combination. Arab J Sci Eng 44(11):9561–9580
Chen YC, Chen LK, Tsai MD, Chiu HC, Chiu JS, Chong CF (2008) Fingerprint verification on medical image reporting system. Comput Methods Programs Biomed 89(3):282–288
Coatrieux G, Huang H, Shu H, Luo L, Roux C (2013) A watermarking-based medical image integrity control system and an image moment signature for tampering characterization. IEEE J Biomed Health Inform 17(6):1057–1067
Umamageswari A, Suresh GR (2014) A new cryptographic digital signature for secure medical image communication in telemedicine. Int J Comput Appl 86(11)
Babu S, Kapinaiah V (2019) Medical image authentication using quartic digital signature algorithm. Int J Intell Inf Syst 7(4):38–41
Ali TS, Ali R (2020) A novel medical image signcryption scheme using TLTS and Henon chaotic map. IEEE Access 8:71974–71992
Cao F, Huang HK, Zhou XQ (2003) Medical image security in a HIPAA mandated PACS environment. Comput Med Imaging Graph 27(2–3):185–196
Guo X, Zhuang TG (2003) Lossless watermarking scheme for enhancing security of medical data in PACS. In: Medical Imaging 2003: PACS and Integrated Medical Information Systems: Design and Evaluation 27(2–3):350–359. https://doi.org/10.1016/S0895-6111(02)00073-3
Guo X, Zhuang TG (2009) Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digit Imaging 22(6):620–628
Piao CR, Woo DM, Park DC, Han SS (2008) Medical image authentication using hash function and integer wavelet transform. In: 2008 Congress on Image and Signal Processing. IEEE, Sanya, 1, 7-10
Wong P (1998) A public key watermark for image verification and authentication. Proceedings 1998 International Conference on Image Processing 1:455–459. https://doi.org/10.1109/ICIP.1998.723526
Kuang LQ, Zhang Y, Han X (2009) A medical image authentication system based on reversible digital watermarking. In: 2009 First International Conference on Information Science and Engineering. IEEE, Nanjing, pp 1047–1050. https://doi.org/10.1109/ICISE.2009.60
Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux C (2009) Medical image integrity control combining digital signature and lossless watermarking. In: Data privacy management and autonomous spontaneous security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11207-2_12
Umamageswari A, Suresh GR (2013) Performance analysis of secure medical image communication with digital signature and reversible watermarking. ICTACT Journal on Image and Video Processing 04(01)
Eswaraiah R, Sreenivasa Reddy E (2014) Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. Int J Telemed Appl 2014:13
Umamageswari A, Suresh GR (2014) Secure medical image communication using ROI based lossless watermarking and novel digital signature. J Eng Res 2(3):1–22
Al-Haj A, Hussein N, Abandah G (2016) Combining cryptography and digital watermarking for secured transmission of medical images. In: 2016 2nd International Conference on Information Management. IEEE, London, pp 40–46. https://doi.org/10.1109/INFOMAN.2016.7477531
Ranjani JJ, Babu M (2018) Medical image reliability verification using hash signatures and sequential square encoding. J Intell Syst 27(1):19–30
Jabbar AK, Hashim AT, Hassan QF (2021) Medical image authentication by combining hash signature and watermarking based on frequency domains. In: 2nd International Conference on Physics and Applied Sciences Ser:1963, Baghdad. https://doi.org/10.1088/1742-6596/1963/1/012039
Balamurugan G, Jayabharathy J (2020) A Hybrid based robust watermarking technique using SVM. AIJR Abstracts 24, July 29, 2020
Kaissis GA, Makowski MR, Rückert D, Braren RF (2020) Secure, privacy-preserving and federated machine learning in medical imaging. Nat Mach Intell 2(6):305–311
Balasamy K, Shamia D (2021) Feature extraction-based medical image watermarking using fuzzy-based median filter. IETE J Res:1–9
Ouahi H, Mazoul A (2021) Adaptive image watermarking based on K-NN clustering. American Scientific Research Journal for Engineering Technology and Sciences 76(1):253–263
Wong YL, Loh JC, Li CZ, Tan CW (2021) A comparative study on medical image watermarking using hybrid approach and rivagan. In: International Conference on Digital Transformation and Applications (ICDXA), vol 25, pp 26
Madhu B, Holi G (2021) CNN approach for medical image authentication. Indian J Sci Technol 14(4):351–360
Han B, Du J, Jia Y, Zhu H (2021) Zero-watermarking algorithm for medical image based on VGG19 deep convolution neural network. J Healthc Eng. https://doi.org/10.1155/2021/5551520
Chen YP, Fan TY, Chao HC (2021) Wmnet: a lossless watermarking technique using deep learning for medical image authentication. Electronics 10(8):932
Ali Z, Hussain M (2022) A novel fragile zero-watermarking algorithm for digital medical images. Electronics 11(5):710
Apostolidis KD, Papakostas GA (2022) Digital watermarking as an adversarial attack on medical image analysis with deep learning. J Imaging 8(6):155
Singh A, Raghuvanshi N, Dutta MK, Burget R, Masek J (2016) An SVD based zero watermarking scheme for authentication of medical images for tele-medicine applications. In: 39th International Conference on Telecommunications and Signal Processing (TSP), Vienna, pp 511–514. https://doi.org/10.1109/TSP.2016.7760932
Rai A, Singh HV (2017) SVM based robust watermarking for enhanced medical image security. Multimedia Tools Appl 76(18):18605–18618
Liao X, Li K, Zhu X, Liu KR (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Sel Top Signal Process 14(5):955–968
Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Dependable Secure Comput 19(2):897–911
Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Video Technol 30(3):685–696
KamilKhudhair S, Sahu M, R KR, Sahu AK (2023) Secure reversible data hiding using block-wise histogram shifting. Electronics 12(5):1222
Sahu AK, Umachandran K, Biradar VD, Comfort O, Sri VignaHema V, Odimegwu F, Saifullah MA (2023) A study on content tampering in multimedia watermarking. SN Comput Sci 4(3):222
Sayah MM, Redouane KM, Amine K (2023) Stationary, continuous, and discrete wavelet-based approach for secure medical image transmission. Res Biomed Eng 39(1):167–178
Moad MS, Zermi N, Khaldi A, Kafi MR (2023) Stationary wavelet-based image watermarking for e-healthcare applications. Cybernetics and Systems, pp 1–16. https://doi.org/10.1080/01969722.2023.2166253
Ayubi P, JafariBarani M, Yousefi Valandar M, YosefnezhadIrani B, SedaghehMaskan Sadigh R (2021) A new chaotic complex map for robust video watermarking. Artif Intell Rev 54:1237–1280
Amine K, Redouane KM, Sayah MM (2023) A wavelet-based watermarking for secure medical image transmission in telemedicine application. Multimed Tools Appl 1–17
Kumar V, Sharma S, Kumar C, Sahu AK (2023) Latest trends in deep learning techniques for image steganography. Int J Digit Crime Forensics (IJDCF) 15(1):1–14
Khaldi A, Kafi MR, Boukhamla AZE (2023) Deformable model segmentation for range image watermarking. Multimedia Tools Appl 82(8):12211–12227
Amine K, Redouane K, Bilel M (2023) A redundant wavelet based medical image watermarking scheme for secure transmission in telemedicine applications. Multimedia Tools Appl 82(5):7901–7915
Farri E, Ayubi P (2022) A robust digital video watermarking based on CT-SVD domain and chaotic DNA sequences for copyright protection. J Ambient Intell Humaniz Comput 1–25
Khaldi A, Kafi MR, Meghni B (2022) Electrocardiogram signal security by digital watermarking. J Ambient Intell Humaniz Comput 14(10):13901–13913
Valandar MY, Ayubi P, Barani MJ, Irani BY (2022) A chaotic video steganography technique for carrying different types of secret messages. J Inf Security Appl 66:103160
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Madhushree, B., Basanth Kumar, H.B. & Chennamma, H.R. An exhaustive review of authentication, tamper detection with localization and recovery techniques for medical images. Multimed Tools Appl 83, 39779–39821 (2024). https://doi.org/10.1007/s11042-023-16706-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-16706-x