{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:26:36Z","timestamp":1767338796940},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2024,4,11]],"date-time":"2024-04-11T00:00:00Z","timestamp":1712793600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,11]],"date-time":"2024-04-11T00:00:00Z","timestamp":1712793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s00034-024-02661-x","type":"journal-article","created":{"date-parts":[[2024,4,11]],"date-time":"2024-04-11T12:01:56Z","timestamp":1712836916000},"page":"4439-4459","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["HIDDEn: Robust Data Hiding for Medical Images with Encryption and Local Binary Pattern"],"prefix":"10.1007","volume":"43","author":[{"family":"Priyanka","sequence":"first","affiliation":[]},{"given":"Naman","family":"Baranwal","sequence":"additional","affiliation":[]},{"given":"K. N.","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Om Prakash","family":"Singh","sequence":"additional","affiliation":[]},{"given":"A. K.","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,11]]},"reference":[{"issue":"1","key":"2661_CR1","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1109\/TDSC.2022.3144657","volume":"20","author":"A Anand","year":"2022","unstructured":"A. Anand, A.K. Singh, Dual watermarking for security of COVID-19 patient record. IEEE Trans. Depend. Secure Comput. 20(1), 859\u2013866 (2022)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"6","key":"2661_CR2","doi-asserted-by":"publisher","first-page":"1594","DOI":"10.1109\/TCSS.2021.3126628","volume":"9","author":"A Anand","year":"2021","unstructured":"A. Anand, A.K. Singh, Health record security through multiple watermarking on fused medical images. IEEE Trans. Comput. Soc. Syst. 9(6), 1594\u20131603 (2021)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"3","key":"2661_CR3","doi-asserted-by":"publisher","first-page":"2817","DOI":"10.1007\/s11277-021-09031-9","volume":"122","author":"K Balasamy","year":"2022","unstructured":"K. Balasamy, N. Krishnaraj, K. Vijayalakshmi, An adaptive neuro-fuzzy based region selection and authenticating medical image through watermarking for secure communication. Wireless Pers. Commun. 122(3), 2817\u20132837 (2022)","journal-title":"Wireless Pers. Commun."},{"key":"2661_CR4","doi-asserted-by":"publisher","first-page":"101695","DOI":"10.1016\/j.bspc.2019.101695","volume":"56","author":"M Cedillo-Hernandez","year":"2020","unstructured":"M. Cedillo-Hernandez, A. Cedillo-Hernandez, M. Nakano-Miyatake, H. Perez-Meana, Improving the management of medical imaging by using robust and secure dual watermarking. Biomed. Signal Process. Control 56, 101695 (2020)","journal-title":"Biomed. Signal Process. Control"},{"key":"2661_CR5","unstructured":"COVID-19 Image Repository: https:\/\/github.com\/ml-workgroup\/covid-19-image-repository. Accessed: 9 Feb, 2023."},{"key":"2661_CR6","doi-asserted-by":"publisher","first-page":"10979","DOI":"10.1007\/s00521-018-3801-x","volume":"32","author":"M Elhoseny","year":"2020","unstructured":"M. Elhoseny, K. Shankar, S.K. Lakshmanaprabu, A. Maseleno, N. Arunkumar, Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Comput. Appl. 32, 10979\u201310993 (2020)","journal-title":"Neural Comput. Appl."},{"key":"2661_CR7","doi-asserted-by":"publisher","first-page":"4521","DOI":"10.1007\/s00500-023-07818-5","volume":"27","author":"AA Elsadany","year":"2023","unstructured":"A.A. Elsadany, A. Elsonbaty, E.A. Hagras, Image encryption and watermarking in ACO-OFDM-VLC system employing novel memristive hyperchaotic map. Soft. Comput. 27, 4521\u20134542 (2023)","journal-title":"Soft. Comput."},{"key":"2661_CR8","doi-asserted-by":"crossref","unstructured":"S. Karanwal, Improved Local Binary Pattern for Face Recognition. In:\u00a0Progresses in Artificial Intelligence & Robotics: Algorithms & Applications: Proceedings of 3rd International Conference on Deep Learning, Artificial Intelligence and Robotics, (ICDLAIR) 2021. (Springer International Publishing, Cham, 2022), pp. 86\u201396","DOI":"10.1007\/978-3-030-98531-8_9"},{"key":"2661_CR9","doi-asserted-by":"publisher","first-page":"109033","DOI":"10.1016\/j.optlastec.2022.109033","volume":"160","author":"Q Liang","year":"2023","unstructured":"Q. Liang, C. Zhu, A new one-dimensional chaotic map for image encryption scheme based on random DNA coding. Opt. Laser Technol. 160, 109033 (2023)","journal-title":"Opt. Laser Technol."},{"issue":"1","key":"2661_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42979-020-00382-x","volume":"2","author":"N Mahendiran","year":"2021","unstructured":"N. Mahendiran, C. Deepa, A comprehensive analysis on image encryption and compression techniques with the assessment of performance evaluation metrics. SN Comp. Sci. 2(1), 1\u201312 (2021)","journal-title":"SN Comp. Sci."},{"issue":"6","key":"2661_CR11","doi-asserted-by":"publisher","first-page":"2073","DOI":"10.1007\/s00371-021-02267-3","volume":"38","author":"D Mata-Mendoza","year":"2022","unstructured":"D. Mata-Mendoza, M. Cedillo-Hernandez, F. Garcia-Ugalde, A. Cedillo-Hernandez, M. Nakano-Miyatake, H. Perez-Meana, Secured telemedicine of medical imaging based on dual robust watermarking. Vis. Comput. 38(6), 2073\u20132090 (2022)","journal-title":"Vis. Comput."},{"key":"2661_CR12","doi-asserted-by":"crossref","unstructured":"P. T. Nha, T. M. Thanh, A Novel Image Watermarking Scheme Using LU Decomposition. In:\u00a02021 International Conference on Computing and Communication Technologies (RIVF),  IEEE, pp. 1\u20136 (2021).","DOI":"10.1109\/RIVF51545.2021.9642085"},{"issue":"2","key":"2661_CR13","doi-asserted-by":"publisher","first-page":"334","DOI":"10.3390\/electronics12020334","volume":"12","author":"VK Pallaw","year":"2023","unstructured":"V.K. Pallaw, K.U. Singh, A. Kumar, T. Singh, C. Swarup, A. Goswami, A robust medical image watermarking scheme based on nature-inspired optimization for telemedicine applications. Electronics 12(2), 334 (2023)","journal-title":"Electronics"},{"key":"2661_CR14","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1007\/s12065-021-00683-x","volume":"16","author":"Priyanka","year":"2023","unstructured":"A.K. Singh, 2023 A survey of image encryption for healthcare applications. Evol. Intel. 16, 801\u2013818 (2023)","journal-title":"Evol. Intel."},{"key":"2661_CR15","doi-asserted-by":"publisher","first-page":"111175","DOI":"10.1016\/j.measurement.2022.111175","volume":"196","author":"Priyanka","year":"2022","unstructured":"A.K. Singh, FastMIE: faster medical image encryption without compromising security. Measurement 196, 111175 (2022)","journal-title":"Measurement"},{"key":"2661_CR16","doi-asserted-by":"publisher","first-page":"2207","DOI":"10.1007\/s11042-022-13207-1","volume":"82","author":"S Sharma","year":"2023","unstructured":"S. Sharma, J.J. Zou, G. Fang, A dual watermarking scheme for identity protection. Multimed. Tools Appl. 82, 2207\u20132236 (2023)","journal-title":"Multimed. Tools Appl."},{"key":"2661_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00138-021-01227-0","volume":"32","author":"OP Singh","year":"2021","unstructured":"O.P. Singh, A.K. Singh, A robust information hiding algorithm based on lossless encryption and NSCT-HD-SVD. Mach. Vis. Appl. 32, 1\u201313 (2021)","journal-title":"Mach. Vis. Appl."},{"key":"2661_CR18","doi-asserted-by":"publisher","first-page":"2759","DOI":"10.1007\/s40747-021-00309-w","volume":"9","author":"OP Singh","year":"2023","unstructured":"O.P. Singh, A.K. Singh, Data hiding in encryption-compression domain. Complex Intell. Syst. 9, 2759\u20132772 (2023)","journal-title":"Complex Intell. Syst."},{"key":"2661_CR19","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.comcom.2022.05.010","volume":"191","author":"OP Singh","year":"2022","unstructured":"O.P. Singh, A.K. Singh, A.K. Agrawal, H. Zhou, SecDH: security of COVID-19 images based on data hiding with PCA. Comput. Commun. 191, 368\u2013377 (2022)","journal-title":"Comput. Commun."},{"issue":"4","key":"2661_CR20","doi-asserted-by":"publisher","first-page":"862","DOI":"10.1109\/TCE.2022.3227401","volume":"69","author":"KN Singh","year":"2023","unstructured":"K.N. Singh, N. Baranwal, O.P. Singh, A.K. Singh, SIELNet: 3D chaotic-map-based secure image encryption using customized residual dense spatial network. IEEE Trans. Consum. Electron. 69(4), 862\u2013868 (2023)","journal-title":"IEEE Trans. Consum. Electron."},{"key":"2661_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-022-10040-4","author":"KN Singh","year":"2023","unstructured":"K. N. Singh, O. P. Singh, A. K. Singh, A. K. Agrawal, Watmif: Multimodal medical image fusion-based watermarking for telehealth applications.\u00a0Cognit. Comput. (2022). https:\/\/doi.org\/10.1007\/s12559-022-10040-4","journal-title":"Cognit. Comput."},{"key":"2661_CR22","unstructured":"SIPI Image Database: http:\/\/sipi.usc.edu\/database\/database.php?volume=misc, Accessed: 9 Feb, 2023."},{"key":"2661_CR23","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/s00034-021-01773-y","volume":"41","author":"P Sivananthamaitrey","year":"2022","unstructured":"P. Sivananthamaitrey, P.R. Kumar, Optimal dual watermarking of color images with SWT and SVD through genetic algorithm. Circuits Syst. Sig. Process. 41, 224\u2013248 (2022)","journal-title":"Circuits Syst. Sig. Process."},{"key":"2661_CR24","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/j.neucom.2012.10.032","volume":"120","author":"B Yang","year":"2013","unstructured":"B. Yang, S. Chen, A comparative study on local binary pattern (LBP) based face recognition: LBP histogram versus LBP image. Neurocomputing 120, 365\u2013379 (2013)","journal-title":"Neurocomputing"},{"key":"2661_CR25","doi-asserted-by":"publisher","first-page":"170342","DOI":"10.1016\/j.ijleo.2022.170342","volume":"273","author":"Y Zhao","year":"2023","unstructured":"Y. Zhao, R. Meng, Y. Zhang, Q. Yang, Image encryption algorithm based on a new chaotic system with Rubik\u2019s cube transform and Brownian motion model. Optik 273, 170342 (2023)","journal-title":"Optik"}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-024-02661-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-024-02661-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-024-02661-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T11:14:22Z","timestamp":1721128462000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-024-02661-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,11]]},"references-count":25,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["2661"],"URL":"https:\/\/doi.org\/10.1007\/s00034-024-02661-x","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,11]]},"assertion":[{"value":"19 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"My manuscript has no associated data.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Data Availability"}}]}}