{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:43:17Z","timestamp":1774719797970,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T00:00:00Z","timestamp":1696464000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T00:00:00Z","timestamp":1696464000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s00034-023-02519-8","type":"journal-article","created":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T10:01:38Z","timestamp":1696500098000},"page":"1270-1297","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["An Optimized and Secured Image Watermarking and Its Dual Authentication for Internet of Medical Things"],"prefix":"10.1007","volume":"43","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1764-772X","authenticated-orcid":false,"given":"Divyanshu","family":"Awasthi","sequence":"first","affiliation":[]},{"given":"Vinay Kumar","family":"Srivastava","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,5]]},"reference":[{"key":"2519_CR1","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.comcom.2020.01.038","volume":"152","author":"A Anand","year":"2020","unstructured":"A. Anand, A.K. Singh, An improved DWT-SVD domain watermarking for medical information security. Comput. Commun. 152, 72\u201380 (2020). https:\/\/doi.org\/10.1016\/j.comcom.2020.01.038","journal-title":"Comput. Commun."},{"key":"2519_CR2","doi-asserted-by":"publisher","first-page":"103398","DOI":"10.1016\/j.scs.2021.103398","volume":"75","author":"A Anand","year":"2021","unstructured":"A. Anand, A.K. Singh, Cloud based secure watermarking using IWT-Schur-RSVD with fuzzy inference system for smart healthcare applications. Sustain. Cities Soc. 75, 103398 (2021)","journal-title":"Sustain. Cities Soc."},{"issue":"4","key":"2519_CR3","doi-asserted-by":"publisher","first-page":"2033","DOI":"10.1109\/TCSS.2022.3140862","volume":"10","author":"A Anand","year":"2023","unstructured":"A. Anand, A.K. Singh, Hybrid nature-inspired optimization and encryption-based watermarking for E-healthcare. IEEE Trans. Comput. Social Syst. 10(4), 2033\u20132040 (2023). https:\/\/doi.org\/10.1109\/TCSS.2022.3140862","journal-title":"IEEE Trans. Comput. Social Syst."},{"issue":"1","key":"2519_CR4","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1109\/TII.2022.3172622","volume":"19","author":"A Anand","year":"2023","unstructured":"A. Anand, A.K. Singh, H. Zhou, ViMDH: visible-imperceptible medical data hiding for internet of medical things. IEEE Trans. Ind. Inf. 19(1), 849\u2013856 (2023). https:\/\/doi.org\/10.1109\/TII.2022.3172622","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"4","key":"2519_CR5","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/MMUL.2020.2993269","volume":"27","author":"A Anand","year":"2020","unstructured":"A. Anand, A.K. Singh, Z. Lv, G. Bhatnagar, Compression-then-encryption-based secure watermarking technique for smart healthcare system. IEEE MultiMed. 27(4), 133\u2013143 (2020). https:\/\/doi.org\/10.1109\/MMUL.2020.2993269","journal-title":"IEEE MultiMed."},{"issue":"18","key":"2519_CR6","doi-asserted-by":"publisher","first-page":"25075","DOI":"10.1007\/s11042-022-12456-4","volume":"81","author":"D Awasthi","year":"2022","unstructured":"D. Awasthi, V.K. Srivastava, LWT-DCT-SVD and DWT-DCT-SVD based watermarking schemes with their performance enhancement using Jaya and Particle swarm optimization and comparison of results under various attacks. Multimed. Tools Appl. 81(18), 25075\u201325099 (2022). https:\/\/doi.org\/10.1007\/s11042-022-12456-4","journal-title":"Multimed. Tools Appl."},{"issue":"11","key":"2519_CR7","doi-asserted-by":"publisher","first-page":"16555","DOI":"10.1007\/s11042-022-14002-8","volume":"82","author":"D Awasthi","year":"2022","unstructured":"D. Awasthi, V.K. Srivastava, Robust, imperceptible and optimized watermarking of DICOM image using Schur decomposition, LWT-DCT-SVD and its authentication using SURF. Multimed. Tools Appl. 82(11), 16555\u201316589 (2022). https:\/\/doi.org\/10.1007\/s11042-022-14002-8","journal-title":"Multimed. Tools Appl."},{"issue":"8","key":"2519_CR8","doi-asserted-by":"publisher","first-page":"4953","DOI":"10.1007\/s00034-023-02344-z","volume":"42","author":"D Awasthi","year":"2023","unstructured":"D. Awasthi, V.K. Srivastava, hessenberg decomposition-based medical image watermarking with its performance comparison by particle swarm and JAYA optimization algorithms for different wavelets and its authentication using AES. Circuits Syst. Signal Process. 42(8), 4953\u20134984 (2023). https:\/\/doi.org\/10.1007\/s00034-023-02344-z","journal-title":"Circuits Syst. Signal Process."},{"issue":"23","key":"2519_CR9","doi-asserted-by":"publisher","first-page":"35685","DOI":"10.1007\/s11042-023-14723-4","volume":"82","author":"D Awasthi","year":"2023","unstructured":"D. Awasthi, V.K. Srivastava, Performance enhancement of SVD based dual image watermarking in wavelet domain using PSO and JAYA optimization and their comparison under hybrid attacks. Multimed. Tools Appl. 82(23), 35685\u201335717 (2023). https:\/\/doi.org\/10.1007\/s11042-023-14723-4","journal-title":"Multimed. Tools Appl."},{"issue":"4","key":"2519_CR10","doi-asserted-by":"publisher","first-page":"042107","DOI":"10.1117\/1.JEI.32.4.042107","volume":"32","author":"D Awasthi","year":"2023","unstructured":"D. Awasthi, P. Khare, V.K. Srivastava, BacterialWmark: telemedicine watermarking technique using bacterial foraging for smart healthcare system. J. Electron. Imaging 32(4), 042107\u2013042107 (2023)","journal-title":"J. Electron. Imaging"},{"key":"2519_CR11","doi-asserted-by":"publisher","first-page":"108457","DOI":"10.1016\/j.knosys.2022.108457","volume":"243","author":"M Braik","year":"2022","unstructured":"M. Braik, A. Hammouri, J. Atwan, M.A. Al-Betar, M.A. Awadallah, White shark optimizer: a novel bio-inspired meta-heuristic algorithm for global optimization problems. Knowl.-Based Syst. 243, 108457 (2022)","journal-title":"Knowl.-Based Syst."},{"key":"2519_CR12","unstructured":"A. Budai, J. Odstrcilik J, High resolution fundus image database (2013)"},{"issue":"6","key":"2519_CR13","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1007\/s10278-013-9622-7","volume":"26","author":"K Clark","year":"2013","unstructured":"K. Clark, B. Vendt, K. Smith, J. Freymann, J. Kirby, P. Koppel, S. Moore, S. Phillips, D. Maffitt, M. Pringle, L. Tarbox, F. Prior, The Cancer imaging archive (TCIA): maintaining and operating a public information repository. J. Digit. Imaging 26(6), 1045\u20131057 (2013)","journal-title":"J. Digit. Imaging"},{"key":"2519_CR14","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-540-24654-1_13","volume-title":"Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003. Revised Papers","author":"H Gilbert","year":"2004","unstructured":"H. Gilbert, H. Handschuh, Security analysis of SHA-256 and sisters, in Selected Areas in Cryptography: 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003. Revised Papers. ed. by M. Matsui, R.J. Zuccherato (Springer, Heidelberg, 2004), pp.175\u2013193"},{"key":"2519_CR15","unstructured":"https:\/\/thingspeak.com\/"},{"key":"2519_CR16","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1016\/j.future.2018.12.036","volume":"94","author":"N Hurrah","year":"2018","unstructured":"N. Hurrah, S. Parah, N. Loan, J. Sheikh, M. Elhoseny, K. Muhammad, Dual watermarking framework for privacy protection and content authentication of multimedia. Futur. Gener. Comput. Syst. 94, 654\u2013673 (2018). https:\/\/doi.org\/10.1016\/j.future.2018.12.036","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"7","key":"2519_CR17","doi-asserted-by":"publisher","first-page":"4090","DOI":"10.1007\/s00034-022-01975-y","volume":"41","author":"HT Hu","year":"2022","unstructured":"H.T. Hu, T.T. Lee, Robust complementary dual image watermarking in subbands derived from the laplacian pyramid, discrete wavelet transform, and directional filter bank. Circuits Syst. Signal Process 41(7), 4090\u20134116 (2022)","journal-title":"Circuits Syst. Signal Process"},{"key":"2519_CR18","unstructured":"H. Ji, W. Yu, Y. Li, A rank revealing randomized singular value decomposition (R3SVD) algorithm for low-rank matrix approximations (2016). arXiv:1605.08134"},{"key":"2519_CR19","doi-asserted-by":"crossref","unstructured":"P. Khare, V. K. Srivastava Robust digital image watermarking scheme based on RDWT-DCT-SVD. In: 2018 5th international conference on signal processing and integrated networks (SPIN) (pp. 88\u201393). IEEE (2018)","DOI":"10.1109\/SPIN.2018.8474125"},{"issue":"1","key":"2519_CR20","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1515\/jisys-2019-0046","volume":"30","author":"P Khare","year":"2021","unstructured":"P. Khare, V.K. Srivastava, A novel dual image watermarking technique using homomorphic transform and DWT. J. Intell. Syst. 30(1), 297\u2013311 (2021). https:\/\/doi.org\/10.1515\/jisys-2019-0046","journal-title":"J. Intell. Syst."},{"key":"2519_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13454-2","author":"DK Mahto","year":"2022","unstructured":"D.K. Mahto, O.P. Singh, A.K. Singh, FuSIW: fusion-based secure RGB image watermarking using hashing. Multimed. Tools Appl. (2022). https:\/\/doi.org\/10.1007\/s11042-022-13454-2","journal-title":"Multimed. Tools Appl."},{"key":"2519_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13795-y","author":"DK Mahto","year":"2022","unstructured":"D.K. Mahto, A.K. Singh, Firefly optimization-based dual watermarking for colour images with improved capacity. Multimed. Tools Appl. (2022). https:\/\/doi.org\/10.1007\/s11042-022-13795-y","journal-title":"Multimed. Tools Appl."},{"issue":"4","key":"2519_CR23","first-page":"1793","volume":"2","author":"BC Mohan","year":"2010","unstructured":"B.C. Mohan, K.V. Swamy, On the use of Schur decomposition for copyright protection of digital images. Int. J. Comput. Electr. Eng. 2(4), 1793\u20138163 (2010)","journal-title":"Int. J. Comput. Electr. Eng."},{"key":"2519_CR24","doi-asserted-by":"publisher","first-page":"22275","DOI":"10.1007\/s11042-021-10719-0","volume":"80","author":"V Rathore","year":"2021","unstructured":"V. Rathore, A.K. Pal, An image encryption scheme in bit plane content using Henon map based generated edge map. Multimed Tools Appl 80, 22275\u201322300 (2021). https:\/\/doi.org\/10.1007\/s11042-021-10719-0","journal-title":"Multimed Tools Appl"},{"key":"2519_CR25","doi-asserted-by":"publisher","first-page":"25223","DOI":"10.1007\/s11042-018-5782-2","volume":"77","author":"SJ Sheela","year":"2018","unstructured":"S.J. Sheela, K.V. Suresh, D. Tandur, Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimed Tools Appl 77, 25223\u201325251 (2018). https:\/\/doi.org\/10.1007\/s11042-018-5782-2","journal-title":"Multimed Tools Appl"},{"issue":"18","key":"2519_CR26","doi-asserted-by":"publisher","first-page":"19113","DOI":"10.1007\/s11042-017-4570-8","volume":"76","author":"S Singh","year":"2017","unstructured":"S. Singh, V.S. Rathore, R. Singh, M.K. Singh, Hybrid semi-blind image watermarking in redundant wavelet domain. Multimed. Tools Appl. 76(18), 19113\u201319137 (2017)","journal-title":"Multimed. Tools Appl."},{"key":"2519_CR27","doi-asserted-by":"publisher","first-page":"30523","DOI":"10.1007\/s11042-018-7115-x","volume":"78","author":"AK Singh","year":"2019","unstructured":"A.K. Singh, Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimed. Tools Appl. 78, 30523\u201330533 (2019)","journal-title":"Multimed. Tools Appl."},{"issue":"4","key":"2519_CR28","doi-asserted-by":"publisher","first-page":"3273","DOI":"10.3906\/elk-1603-17","volume":"25","author":"F Thakkar","year":"2017","unstructured":"F. Thakkar, V.K. Srivastava, A particle swarm optimization and block-SVD-based watermarking for digital images. Turk. J. Electr. Eng. Comput. Sci. 25(4), 3273\u20133288 (2017)","journal-title":"Turk. J. Electr. Eng. Comput. Sci."},{"issue":"7-8","key":"2519_CR29","doi-asserted-by":"publisher","first-page":"4263","DOI":"10.1007\/s11042-018-6691-0","volume":"79","author":"S Thakur","year":"2020","unstructured":"S. Thakur, A.K. Singh, S.P. Ghrera, A. Mohan, Chaotic based secure watermarking approach for medical images. Multimed. Tools Appl. 79(7\u20138), 4263\u20134276 (2020). https:\/\/doi.org\/10.1007\/s11042-018-6691-0","journal-title":"Multimed. Tools Appl."},{"key":"2519_CR30","unstructured":"VPS Naidu (2023). DT CWT based image Fusion\u00a0(https:\/\/ www. mathworks. com\/ matlabcentral \/fileexchange\/32086-dt-cwt-based-image-fusion), MATLAB Central File Exchange. Retrieved January 4, 2023."},{"issue":"5","key":"2519_CR31","doi-asserted-by":"publisher","first-page":"6159","DOI":"10.1007\/s11042-021-11725-y","volume":"81","author":"K Wang","year":"2022","unstructured":"K. Wang, T. Gao, D. You, X. Wu, H. Kan, A secure dual-color image watermarking scheme based 2D DWT, SVD and Chaotic map. Multimed. Tools Appl. 81(5), 6159\u20136190 (2022)","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"2519_CR32","first-page":"5","volume":"27","author":"A Zear","year":"2018","unstructured":"A. Zear, A.K. Singh, P. Kumar, Multiple watermarking for healthcare applications. J. Intell. Syst. 27(1), 5\u201318 (2018)","journal-title":"J. Intell. Syst."},{"issue":"19","key":"2519_CR33","doi-asserted-by":"publisher","first-page":"26721","DOI":"10.1007\/s11042-020-10472-w","volume":"81","author":"A Zear","year":"2022","unstructured":"A. Zear, P.K. Singh, Secure and robust color image dual watermarking based on LWT-DCT-SVD. Multimed. Tools Appl. 81(19), 26721\u201326738 (2022)","journal-title":"Multimed. Tools Appl."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-023-02519-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-023-02519-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-023-02519-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T21:05:23Z","timestamp":1706216723000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-023-02519-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,5]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["2519"],"URL":"https:\/\/doi.org\/10.1007\/s00034-023-02519-8","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,5]]},"assertion":[{"value":"13 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}