{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:27:31Z","timestamp":1743049651793,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030442880"},{"type":"electronic","value":"9783030442897"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-44289-7_70","type":"book-chapter","created":{"date-parts":[[2020,3,23]],"date-time":"2020-03-23T11:03:35Z","timestamp":1584961415000},"page":"750-761","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Reversible Watermarking for Protecting Patient\u2019s Data Privacy Using an EPR-Generated QR Code"],"prefix":"10.1007","author":[{"given":"Alaa H.","family":"ElSaadawy","sequence":"first","affiliation":[]},{"given":"Ahmed S.","family":"ELSayed","sequence":"additional","affiliation":[]},{"given":"M. N.","family":"Al-Berry","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Roushdy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,24]]},"reference":[{"key":"70_CR1","doi-asserted-by":"crossref","unstructured":"Abbasi, F., Memon, N.A.: Reversible watermarking for the security of medical image databases. In: IEEE (2018)","DOI":"10.1109\/NCG.2018.8593009"},{"key":"70_CR2","doi-asserted-by":"crossref","unstructured":"Memon, N.A., Gilani, S.A.M.: NROI watermarking of medical images for content authentication. In: Proceedings of 12th International IEEE Multi-topic Conference (INMIC 2008), pp. 106\u2013110 (2008)","DOI":"10.1109\/INMIC.2008.4777717"},{"key":"70_CR3","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1007\/s10278-014-9700-5","volume":"27","author":"SM Mousavi","year":"2014","unstructured":"Mousavi, S.M., Naghsh, A., Abu-Bakar, S.A.R.: Watermarking techniques used in medical images: a survey. J. Digit. Imaging 27, 714\u2013729 (2014)","journal-title":"J. Digit. Imaging"},{"key":"70_CR4","doi-asserted-by":"crossref","unstructured":"Coatrieux, G., Montanger, J., Huang, H., Roux, Ch.: Mixed reversible and RONI watermarking for medical image reliability protection. In: 29th IEEE International Conference of EMBS, Lyon (2007)","DOI":"10.1109\/IEMBS.2007.4353629"},{"key":"70_CR5","doi-asserted-by":"crossref","unstructured":"Kuang, L.Q., Zhang, Y., Han, X.: A medical image authentication system based on reversible digital watermarking. In: 2009 1st International Conference, pp. 1047\u20131050 (2009)","DOI":"10.1109\/ICISE.2009.60"},{"key":"70_CR6","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.future.2012.05.021","volume":"29","author":"G Bhatnagar","year":"2013","unstructured":"Bhatnagar, G., Jonathan, W.U.Q.M.: Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform. Future Gen. Comput. Syst. 29, 182\u2013195 (2013)","journal-title":"Future Gen. Comput. Syst."},{"key":"70_CR7","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-642-11207-2_12","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"W Pan","year":"2010","unstructured":"Pan, W., Coatrieux, G., Cuppens-Boulahia, N., Cuppens, F., Roux, C.: Medical image integrity control combining digital signature and lossless watermarking. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., Roudier, Y. (eds.) Data Privacy Management and Autonomous Spontaneous Security, pp. 153\u2013162. Springer, Heidelberg (2010)"},{"issue":"9","key":"70_CR8","first-page":"5","volume":"5","author":"R Agrawal","year":"2016","unstructured":"Agrawal, R., Sharma, M.: Patient record data hiding in medical images using M-ary modulation. Res. J. Eng. Sci. 5(9), 5\u201310 (2016)","journal-title":"Res. J. Eng. Sci."},{"key":"70_CR9","doi-asserted-by":"crossref","unstructured":"Chang, Y.J., Wang, R.Z., Lin, J.C.: Sharing based fragile watermarking method for authentication and self recovery of image tampering. EURASIP J. Adv. Signal Process. (2008)","DOI":"10.1155\/2008\/846967"},{"key":"70_CR10","doi-asserted-by":"crossref","unstructured":"Memon, N.A., Keerio, Z.A., Abbasi, F.: Dual watermarking of CT scan medical images for content authentication and copyright protection. In: Shaikh, F.K., et. al. (eds.) IMTIC 2013, Communications in Computer and Information Science, vol. 14, pp. 173\u2013183. Springer (2014)","DOI":"10.1007\/978-3-319-10987-9_16"},{"issue":"9","key":"70_CR11","first-page":"19","volume":"7","author":"JM Zain","year":"2007","unstructured":"Zain, J.M., Clarke, M.: Reversible region of non-interest (RONI) watermarking for authentication of DICOM images. Int. J. Comput. Sci. Netw. Secur. 7(9), 19\u201328 (2007)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"issue":"1","key":"70_CR12","first-page":"1","volume":"4","author":"N-I Wu","year":"2007","unstructured":"Wu, N.-I., Hwang, M.-S.: Data hiding current status and key issues. Int. J. Netw. Secur. 4(1), 1\u20139 (2007)","journal-title":"Int. J. Netw. Secur."},{"issue":"23","key":"70_CR13","first-page":"295","volume":"116","author":"R Punidha","year":"2017","unstructured":"Punidha, R., Sivaram, M.: Integer wavelet transform based approach for high robustness of audio signal transmission. Int. J. Pure Appl. Math. 116(23), 295\u2013303 (2017)","journal-title":"Int. J. Pure Appl. Math."},{"key":"70_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/7925404","volume":"2017","author":"R Ramos","year":"2017","unstructured":"Ramos, R., Valdez-Salas, B., Zlatev, R., Wiener, M.S., Rull, J.M.B.: The discrete wavelet transform and its application for noise removal in localized corrosion measurements. Hindawi Int. J. Corros. 2017, 1\u20137 (2017)","journal-title":"Hindawi Int. J. Corros."},{"issue":"1","key":"70_CR15","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/T-C.1974.223784","volume":"C-23","author":"N Ahmed","year":"1974","unstructured":"Ahmed, N., Natarajan, T., Rao, K.R.: Discrete cosine transform. IEEE Trans. Comput. C-23(1), 90\u201393 (1974)","journal-title":"IEEE Trans. Comput."},{"key":"70_CR16","doi-asserted-by":"crossref","unstructured":"Heylena, K., Dams, T.: An image watermarking tutorial tool using matlab. In: Mathematics of Data\/Image Pattern Recognition, Compression, and Encryption with Applications XI, Proceedings of SPIE, pp. 1\u201312 (2008)","DOI":"10.1117\/12.793308"},{"key":"70_CR17","doi-asserted-by":"crossref","unstructured":"Mohanty, S.P., Ramakrishnan, K.R.: A dual watermarking technique for images. In: Proceedings of the 7th ACM International Multimedia. ACM Press (1999)","DOI":"10.1145\/319878.319891"},{"issue":"10","key":"70_CR18","doi-asserted-by":"publisher","first-page":"2057","DOI":"10.1080\/00207160.2010.543677","volume":"88","author":"NA Memon","year":"2011","unstructured":"Memon, N.A., Chaudhry, A., Ahmad, M., Keerio, Z.A.: Hybrid watermarking of medical images for ROI authentication and recovery. Int. J. Comput. Math. 88(10), 2057\u20132071 (2011)","journal-title":"Int. J. Comput. Math."},{"issue":"1","key":"70_CR19","first-page":"28","volume":"31","author":"VS Jabade","year":"2011","unstructured":"Jabade, V.S., Gengaje, S.R.: Literature review of wavelet-based digital image watermarking techniques. Int. J. Comput. Appl. 31(1), 28\u201335 (2011)","journal-title":"Int. J. Comput. Appl."},{"issue":"2","key":"70_CR20","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1080\/00207161003596690","volume":"88","author":"NA Memon","year":"2010","unstructured":"Memon, N.A., Gilani, S.A.M.: Watermarking of chest CT scan medical images for content authentication. Int. J. Comput. Math. 88(2), 265\u2013280 (2010)","journal-title":"Int. J. Comput. Math."},{"issue":"1","key":"70_CR21","first-page":"241","volume":"39","author":"M Kaur","year":"2012","unstructured":"Kaur, M., Kaur, R.: Reversible watermarking of medical images authentication and recovery-a survey. J. Inf. Oper. Manag. 39(1), 241\u2013244 (2012)","journal-title":"J. Inf. Oper. Manag."},{"key":"70_CR22","doi-asserted-by":"crossref","unstructured":"Kaya, V., Elbasi, E.: Robust medical image watermarking using frequency domain and least significant bits algorithms. In: IEEE (2018)","DOI":"10.1109\/ICCSE1.2018.8374221"},{"issue":"5","key":"70_CR23","first-page":"1354","volume":"22","author":"O Jane","year":"2013","unstructured":"Jane, O., Elbasi, E.: A new approach in non-blind watermarking method based on DWT and SVD via LU decomposition. Turkish J. Electr. Eng. Comput. Sci. 22(5), 1354\u20131366 (2013)","journal-title":"Turkish J. Electr. Eng. Comput. Sci."},{"key":"70_CR24","doi-asserted-by":"crossref","unstructured":"Gull, S., Loan, N.A., Parah, S.A., Sheikh, J.A., Bhat, G.M.: An efficient watermarking technique for tamper detection and localization of medical images. J. Ambient Intell. Humaniz. Comput. (2018)","DOI":"10.1007\/s12652-018-1158-8"},{"key":"70_CR25","first-page":"10269","volume":"6","author":"A Shehab","year":"2018","unstructured":"Shehab, A., Elhoseny, M., Muhammad, K., Sangaiah, A.K., Yang, P., Huang, H., Hou, G.: Secure and robust fragile watermarking scheme for medical images. Digit. Object Identifier 6, 10269\u201310278 (2018)","journal-title":"Digit. Object Identifier"},{"key":"70_CR26","unstructured":"Li, M., Liang, T., He, Y.: Arnold transform based image scrambling method. In: 2013, 3rd International Conference on Multimedia Technology (ICMT 2013) (2013)"},{"key":"70_CR27","doi-asserted-by":"publisher","first-page":"1611","DOI":"10.1007\/s11277-016-3625-x","volume":"92","author":"A Sharma","year":"2016","unstructured":"Sharma, A., Singh, A.K., Ghrera, S.P.: Robust and secure multiple watermarking for medical images. Wireless Pers. Commun. 92, 1611\u20131624 (2016)","journal-title":"Wireless Pers. Commun."},{"issue":"3","key":"70_CR28","first-page":"271","volume":"18","author":"KJ Kavitha","year":"2019","unstructured":"Kavitha, K.J., Shan, P.B.: An efficient medical image watermarking technique using integer wavelet transform and quick\/fast response codes. Int. J. Intell. Syst. Technol. Appl. 18(3), 271\u2013280 (2019)","journal-title":"Int. J. Intell. Syst. Technol. Appl."},{"issue":"5","key":"70_CR29","first-page":"22","volume":"8","author":"RP Singh","year":"2018","unstructured":"Singh, R.P., Dwivedi, S.S.: Advanced medical image watermarking technique of hiding patient information for medical image authentication. Int. J. Eng. Tech. Res. (IJETR) 8(5), 22\u201329 (2018)","journal-title":"Int. J. Eng. Tech. Res. (IJETR)"},{"key":"70_CR30","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.optlastec.2013.05.016","volume":"54","author":"C Singh","year":"2013","unstructured":"Singh, C., Ranade, S.K.: Geometrically invariant and high capacity image watermarking scheme using accurate radial transform. Opt. Laser Technol. 54, 176\u2013184 (2013)","journal-title":"Opt. Laser Technol."},{"key":"70_CR31","doi-asserted-by":"publisher","first-page":"77212","DOI":"10.1109\/ACCESS.2018.2879919","volume":"6","author":"KM Hosny","year":"2018","unstructured":"Hosny, K.M., Darwish, M.M., Li, K., Salah, A.: Parallel multi-core CPU and GPU for fast and robust medical image watermarking. IEEE Access 6, 77212\u201377225 (2018)","journal-title":"IEEE Access"},{"issue":"8","key":"70_CR32","doi-asserted-by":"publisher","first-page":"2189","DOI":"10.1109\/TIP.2011.2118216","volume":"20","author":"H Zhangetal","year":"2011","unstructured":"Zhangetal, H.: Affine Legendre moment invariants for image watermarking robust to geometric distortions. IEEE Trans. Image Process. 20(8), 2189\u20132199 (2011)","journal-title":"IEEE Trans. Image Process."},{"issue":"8","key":"70_CR33","doi-asserted-by":"publisher","first-page":"1864","DOI":"10.1016\/j.jss.2012.02.045","volume":"85","author":"ED Tsougenis","year":"2013","unstructured":"Tsougenis, E.D., Papakostas, G.A., Koulouriotis, D.E., Tourassis, V.D.: Performance evaluation of moment-based watermarking methods: a review. J. Syst. Softw. 85(8), 1864\u20131884 (2013)","journal-title":"J. Syst. Softw."},{"key":"70_CR34","unstructured":"https:\/\/openi.nlm.nih.gov\/\n\n. Accessed 31 Aug 2019"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the International Conference on Artificial Intelligence and Computer Vision (AICV2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-44289-7_70","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T01:09:26Z","timestamp":1587085766000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-44289-7_70"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030442880","9783030442897"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-44289-7_70","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"24 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}