{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T13:09:56Z","timestamp":1776690596871,"version":"3.51.2"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811391835","type":"print"},{"value":"9789811391842","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-9184-2_30","type":"book-chapter","created":{"date-parts":[[2019,7,15]],"date-time":"2019-07-15T10:51:47Z","timestamp":1563187907000},"page":"332-340","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Imperceptible Secure Transfer of Medical Images for Telemedicine Applications"],"prefix":"10.1007","author":[{"given":"B.","family":"Madhu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ganga","family":"Holi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,7,16]]},"reference":[{"key":"30_CR1","unstructured":"Ruff, E.: System and method for generating storing and accessing secured medical imagery. United States Patent Application Publication. Pub. No.: US 2017\/0277831 A1, pp. 1\u20134, 18 September 2017"},{"issue":"3","key":"30_CR2","first-page":"281","volume":"29","author":"P Deshmukh","year":"2017","unstructured":"Deshmukh, P.: Design of cloud security in the EHR for Indian healthcare services. J. King Saud Univ. Comput. Inf. Sci. 29(3), 281\u2013287 (2017)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"2","key":"30_CR3","doi-asserted-by":"publisher","first-page":"e26","DOI":"10.1016\/j.ijmedinf.2010.10.001","volume":"80","author":"S Haasa","year":"2011","unstructured":"Haasa, S., Wohlgemuthb, S., Echizenb, I., Soneharab, N., M\u00fcller, G.: Aspects of privacy for electronic health records. Int. J. Med. Inform. 80(2), e26\u2013e31 (2011)","journal-title":"Int. J. Med. Inform."},{"key":"30_CR4","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.ijmedinf.2017.10.010","volume":"108","author":"A Singh","year":"2017","unstructured":"Singh, A., Dutta, M.K.: Imperceptible watermarking for security of fundus images in tele-ophthalmology of retina diseases. Int. J. Med. Inform. 108, 110\u2013124 (2017). ISSN 1386\u20135056","journal-title":"Int. J. Med. Inform."},{"key":"30_CR5","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1016\/j.procs.2015.10.117","volume":"70","author":"Abhilasha Sharma","year":"2015","unstructured":"Sharma, A., Singh, A.K., Ghrera, S.P.: Secure hybrid robust watermarking technique for medical images. In: 4th International Conference on Eco-Friendly Computing and Communication Systems, ICECCS 2015 (2015). Procedia Comput. Sci. (ScienceDirect) 70, 778\u2013784, 1877\u20130509","journal-title":"Procedia Computer Science"},{"key":"30_CR6","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.protcy.2012.10.033","volume":"6","author":"HK Maitya","year":"2012","unstructured":"Maitya, H.K., Maityb, S.P.: Joint robust and reversible - watermarking for medical images. Sci. Direct Procedia Technol. 6, 275\u2013282 (2012). 2212\u20130173","journal-title":"Sci. Direct Procedia Technol."},{"key":"30_CR7","first-page":"92","volume":"40","author":"R Thanki","year":"2018","unstructured":"Thanki, R., Borra, S.: A color image steganography in hybrid FRT-DWT domain. J. Inf. Secur. Appl. 40, 92\u2013102 (2018). 2214\u20132126","journal-title":"J. Inf. Secur. Appl."},{"issue":"2","key":"30_CR8","first-page":"61","volume":"6","author":"VM Mousami","year":"2018","unstructured":"Mousami, V.M., Mousami, P.T.: An efficient contourlet based multiple watermarking scheme for health information system. Int. J. Comput. Sci. Eng. Res. Pap. 6(2), 61\u201365 (2018). E-ISSN 2347\u20132693","journal-title":"Int. J. Comput. Sci. Eng. Res. Pap."},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Liu, X., Lou, J., Wang, Y., Du, J., Zou, B., Chen, Y.: Discriminative and robust zero-watermarking scheme based on completed local binary pattern for authentication and copyright identification of medical images. In: Proceedings of SPIE 10579, Medical Imaging 2018: Imaging Informatics for Healthcare, Research, and Applications (2018)","DOI":"10.1117\/12.2292852"},{"key":"30_CR10","unstructured":"Dinesh Kumar, G., Teja, D.P., Reddy, S.S., Sasikaladevi, N.: An efficient watermarking technique for biometric images. In: 7th International Conference on Advances in Computing & Communications (ICACC 2017). Proc. Comput. Sci. 115, 423\u2013430 (2017). ISSN: 1877-0509"},{"key":"30_CR11","first-page":"200","volume":"10","author":"N Venkatram","year":"2014","unstructured":"Venkatram, N., Reddy, L.S.S., Kishore, P.V.V.: Blind medical image watermarking with LWT-SVD for telemedicine applications. WSEAS Trans. Sig. Process. 10, 200\u2013300 (2014). E-ISSN 2224\u20133488","journal-title":"WSEAS Trans. Sig. Process."},{"key":"30_CR12","unstructured":"Madhu, B., Holi, G., Srikanta Murthy, K.: Secure digital image watermarking technique using stationary wavelet transform and singular value decomposition based on scaling factor. In: International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC), 28th and 29th January 2018 (2018). IEEE Conference Proceedings, pp. 84\u201388. ISBN: CFP18037-PRT:978-1-5386-4303-7"},{"issue":"6","key":"30_CR13","first-page":"37","volume":"154","author":"B Madhu","year":"2016","unstructured":"Madhu, B., Holi, G., Murthy, K.S.: An overview of image security techiques. Int. J. Comput. Appl. 154(6), 37\u201346 (2016)","journal-title":"Int. J. Comput. Appl."},{"key":"30_CR14","first-page":"18","volume":"2","author":"N Venkatram","year":"2014","unstructured":"Venkatram, N., Reddy, L.S.S., Kishore, V.: DWT-BAT based medical image watermarking for telemedicine applications. J. Eng. Technol. 2, 18\u201337 (2014)","journal-title":"J. Eng. Technol."},{"issue":"5","key":"30_CR15","first-page":"3273","volume":"3","author":"S Jaiswal","year":"2015","unstructured":"Jaiswal, S., Agrawal, H.: Encryption and secure transmission of telemedicinal image in watermarking using DWT HAAR Wavelet Algorithm. Int. J. Recent Innov. Trends Comput. Commun. 3(5), 3273\u20133277 (2015). ISSN 2321\u20138169","journal-title":"Int. J. Recent Innov. Trends Comput. Commun."},{"issue":"7","key":"30_CR16","first-page":"11","volume":"136","author":"K Pratibha","year":"2016","unstructured":"Pratibha, K., Bhatia, S.K.: Security in telemedicine using DWT-CDCS. Int. J. Comput. Appl. 136(7), 11\u201315 (2016). ISSN 0975\u20138887","journal-title":"Int. J. Comput. Appl."},{"key":"30_CR17","unstructured":"Mehto, A., Mehra, N.: Adaptive lossless medical image watermarking algorithm based on DCT and DWT. In: International Conference on Information Security and Privacy (ICISP 2015) (2016). Procedia Comput. Sci. (ScienceDirect) 88\u201394 (2016)"},{"issue":"3","key":"30_CR18","first-page":"265","volume":"9","author":"K Swaraja","year":"2017","unstructured":"Swaraja, K.: A hybrid secure watermarking technique in telemedicine. Int. J. Eng. Technol. (IJET) 9(3), 265\u2013270 (2017). ISSN (Print) 2319\u20138613, ISSN (Online) 0975\u20134024","journal-title":"Int. J. Eng. Technol. (IJET)"},{"issue":"3","key":"30_CR19","first-page":"169","volume":"11","author":"I Assini","year":"2018","unstructured":"Assini, I., Badri, A., Safi, K., Sahel, A., Baghdad, A.: A robust hybrid watermarking technique for securing medical image. Int. J. Intell. Eng. Syst. 11(3), 169\u2013176 (2018)","journal-title":"Int. J. Intell. Eng. Syst."},{"issue":"1","key":"30_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eij.2012.11.002","volume":"14","author":"MM Abd-Eldayem","year":"2013","unstructured":"Abd-Eldayem, M.M.: A proposed security technique based on watermarking and encryption for digital imaging and communications in Medicine. Egypt. Inform. J. 14(1), 1\u201313 (2013)","journal-title":"Egypt. Inform. J."},{"key":"30_CR21","unstructured":"Suckling, J.: The mammographic image analysis society digital mammogram database exerpta medica. In: International Congress Series vol. 1069, pp. 375-378 (1994). \n                    http:\/\/peipa.essex.ac.uk\/info\/mias.html"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Image Processing and Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-9184-2_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,15]],"date-time":"2019-07-15T10:58:20Z","timestamp":1563188300000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-9184-2_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811391835","9789811391842"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-9184-2_30","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"16 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RTIP2R","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Recent Trends in Image Processing and Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Solapur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rtip2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/rtip2r.org\/2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"374","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"173","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"-","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}