{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T05:09:42Z","timestamp":1772168982347,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2024,5,28]],"date-time":"2024-05-28T00:00:00Z","timestamp":1716854400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,28]],"date-time":"2024-05-28T00:00:00Z","timestamp":1716854400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s00034-024-02684-4","type":"journal-article","created":{"date-parts":[[2024,5,28]],"date-time":"2024-05-28T20:36:11Z","timestamp":1716928571000},"page":"5711-5726","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["A Blind and High-Capacity Data Hiding Scheme for Medical Information Security"],"prefix":"10.1007","volume":"43","author":[{"given":"Moad Med","family":"Sayah","sequence":"first","affiliation":[]},{"given":"Zermi","family":"Narima","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1637-9129","authenticated-orcid":false,"given":"Khaldi","family":"Amine","sequence":"additional","affiliation":[]},{"given":"Kafi Med","family":"Redouane","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,28]]},"reference":[{"key":"2684_CR1","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1007\/s11042-016-3862-8","volume":"77","author":"Z Aditi","year":"2018","unstructured":"Z. Aditi, A.K. Singh, P. Kumar, A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed. Tools Appl. 77, 4863\u20134882 (2018). https:\/\/doi.org\/10.1007\/s11042-016-3862-8","journal-title":"Multimed. Tools Appl."},{"key":"2684_CR2","doi-asserted-by":"publisher","first-page":"43391","DOI":"10.1109\/ACCESS.2020.2978186","volume":"8","author":"WH Alshoura","year":"2020","unstructured":"W.H. Alshoura, Z. Zainol, J.S. Teh, M.A. Alawida, A new chaotic image watermarking scheme based on SVD and IWT. IEEE Access 8, 43391\u201343406 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2978186","journal-title":"IEEE Access"},{"key":"2684_CR3","doi-asserted-by":"publisher","first-page":"2250097","DOI":"10.1142\/S0218126622500979","volume":"31","author":"K Amine","year":"2022","unstructured":"K. Amine, K. Fares, K.M. Redouane, E. Salah, Medical image watermarking for telemedicine application security. J. Circ. Syst. Comp. 31, 2250097 (2022). https:\/\/doi.org\/10.1142\/S0218126622500979","journal-title":"J. Circ. Syst. Comp."},{"key":"2684_CR4","doi-asserted-by":"publisher","first-page":"7901","DOI":"10.1007\/s11042-022-13649-7","volume":"82","author":"K Amine","year":"2023","unstructured":"K. Amine, K. Redouane, M. Bilel, A redundant wavelet based medical image watermarking scheme for secure transmission in telemedicine applications. Multimed. Tools Appl. 82, 7901\u20137915 (2023). https:\/\/doi.org\/10.1007\/s11042-022-13649-7","journal-title":"Multimed. Tools Appl."},{"key":"2684_CR5","doi-asserted-by":"publisher","first-page":"5856","DOI":"10.1007\/s00034-022-02063-x","volume":"41","author":"K Amine","year":"2022","unstructured":"K. Amine, K.M. Redouane, Z. Narima, ECG signal protection for telemedicine applications. Circuits Syst. Signal Process. 41, 5856 (2022). https:\/\/doi.org\/10.1007\/s00034-022-02063-x","journal-title":"Circuits Syst. Signal Process."},{"key":"2684_CR6","doi-asserted-by":"publisher","first-page":"35401","DOI":"10.1007\/s11042-023-14792-5","volume":"82","author":"K Amine","year":"2023","unstructured":"K. Amine, K.M. Redouane, M.M. Sayah, A wavelet-based watermarking for secure medical image transmission in telemedicine application. Multimed. Tools Appl. 82, 35401 (2023). https:\/\/doi.org\/10.1007\/s11042-023-14792-5","journal-title":"Multimed. Tools Appl."},{"key":"2684_CR7","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1007\/s10462-020-09877-8","volume":"54","author":"P Ayubi","year":"2020","unstructured":"P. Ayubi, M. Jafari Barani, M. Yousefi Valandar, B. Yosefnezhad Irani, R. Sedagheh Maskan Sadigh, A new chaotic complex map for robust video watermarking. Artif. Intell. Rev.. Intell. Rev. 54, 1237 (2020). https:\/\/doi.org\/10.1007\/s10462-020-09877-8","journal-title":"Artif. Intell. Rev.. Intell. Rev."},{"key":"2684_CR8","doi-asserted-by":"publisher","first-page":"13","DOI":"10.4018\/IJDCF.2019040102","volume":"11","author":"S Borra","year":"2019","unstructured":"S. Borra, R. Thanki, A FRT-SVD based blind medical watermarking technique for telemedicine applications. Int. J. Digit. Crime Forensics (IJDCF) 11, 13\u201333 (2019). https:\/\/doi.org\/10.4018\/IJDCF.2019040102","journal-title":"Int. J. Digit. Crime Forensics (IJDCF)"},{"key":"2684_CR9","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1080\/21681163.2019.1595730","volume":"8","author":"S Borra","year":"2020","unstructured":"S. Borra, R. Thanki, Crypto-watermarking scheme for tamper detection of medical images. Comput. Methods Biomech. Biomed. Eng. Imaging Vis. 8, 345\u2013355 (2020). https:\/\/doi.org\/10.1080\/21681163.2019.1595730","journal-title":"Comput. Methods Biomech. Biomed. Eng. Imaging Vis."},{"key":"2684_CR10","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.smhl.2018.02.001","volume":"12","author":"S Borra","year":"2019","unstructured":"S. Borra, R. Thanki, N. Dey, K. Borisagar, Secure transmission and integrity verification of color radiological images using fast discrete curvelet transform and compressive sensing. Smart Health 12, 35\u201348 (2019). https:\/\/doi.org\/10.1016\/j.smhl.2018.02.001","journal-title":"Smart Health"},{"key":"2684_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2021.106881","volume":"150","author":"CF Duan","year":"2022","unstructured":"C.F. Duan, J. Zhou, L.H. Gong, J.Y. Wu, N.R. Zhou, New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method. Opt. Lasers Eng. 150, 106881 (2022). https:\/\/doi.org\/10.1016\/j.optlaseng.2021.106881","journal-title":"Opt. Lasers Eng."},{"key":"2684_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2020.164562","volume":"208","author":"K Fares","year":"2020","unstructured":"K. Fares, K. Amine, E. Salah, A robust blind color image watermarking based on Fourier transform domain. Optik 208, 164562 (2020). https:\/\/doi.org\/10.1016\/j.ijleo.2020.164562","journal-title":"Optik"},{"key":"2684_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2020.102403","volume":"66","author":"K Fares","year":"2021","unstructured":"K. Fares, A. Khaldi, K. Redouane, E. Salah, DCT & DWT based watermarking scheme for medical information security. Biomed. Signal Process. Control 66, 102403 (2021). https:\/\/doi.org\/10.1016\/j.bspc.2020.102403","journal-title":"Biomed. Signal Process. Control"},{"key":"2684_CR14","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/684824","author":"AK Gulve","year":"2015","unstructured":"A.K. Gulve, M.S. Joshi, An image steganography method hiding secret data into coefficients of integer wavelet transform using pixel value differencing approach. Math. Probl. Eng.Probl. Eng. (2015). https:\/\/doi.org\/10.1155\/2015\/684824","journal-title":"Math. Probl. Eng.Probl. Eng."},{"key":"2684_CR15","doi-asserted-by":"publisher","first-page":"47425","DOI":"10.1109\/ACCESS.2021.3068211","volume":"9","author":"KM Hosny","year":"2021","unstructured":"K.M. Hosny, M.M. Darwish, M.M. Fouda, Robust color images watermarking using new fractional-order exponent moments. IEEE Access 9, 47425\u201347435 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3068211","journal-title":"IEEE Access"},{"key":"2684_CR16","doi-asserted-by":"publisher","unstructured":"Q. Hu, M.D. Abr\u00e0moff, M.K. Garvin, in Automated Separation of Binary Overlapping Trees in Low-Contrast Color Retinal Images, Medical Image Computing and Computer-Assisted Intervention \u2013 MICCAI 2013, pp. 436\u2013443 (2013). https:\/\/doi.org\/10.1007\/978-3-642-40763-5_54","DOI":"10.1007\/978-3-642-40763-5_54"},{"key":"2684_CR17","doi-asserted-by":"publisher","first-page":"2127","DOI":"10.1007\/s11042-019-08225-5","volume":"79","author":"M Jafari Barani","year":"2020","unstructured":"M. Jafari Barani, P. Ayubi, M. Yousefi Valandar, B. Yosefnezhad Irani, A blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform. Multimed. Tools Appl. 79, 2127\u20132159 (2020). https:\/\/doi.org\/10.1007\/s11042-019-08225-5","journal-title":"Multimed. Tools Appl."},{"key":"2684_CR18","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.ijleo.2019.04.074","volume":"187","author":"M Jafari Barani","year":"2019","unstructured":"M. Jafari Barani, M. Yousefi Valandar, P. Ayubi, A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map. Optik 187, 205\u2013222 (2019). https:\/\/doi.org\/10.1016\/j.ijleo.2019.04.074","journal-title":"Optik"},{"key":"2684_CR19","doi-asserted-by":"publisher","first-page":"19827","DOI":"10.1007\/s11042-021-10713-6","volume":"80","author":"F Kahlessenane","year":"2021","unstructured":"F. Kahlessenane, A. Khaldi, M.R. Kafi, S. Euschi, A color value differentiation scheme for blind digital image watermarking. Multimed. Tools Appl. 80, 19827\u201319844 (2021). https:\/\/doi.org\/10.1007\/s11042-021-10713-6","journal-title":"Multimed. Tools Appl."},{"key":"2684_CR20","doi-asserted-by":"publisher","first-page":"2069","DOI":"10.1007\/s10586-020-03215-x","volume":"24","author":"F Kahlessenane","year":"2021","unstructured":"F. Kahlessenane, A. Khaldi, R. Kafi, S. Euschi, A robust blind medical image watermarking approach for telemedicine applications. Clust. Comput.. Comput. 24, 2069\u20132082 (2021). https:\/\/doi.org\/10.1007\/s10586-020-03215-x","journal-title":"Clust. Comput.. Comput."},{"key":"2684_CR21","doi-asserted-by":"publisher","first-page":"2931","DOI":"10.1007\/s12652-020-02450-9","volume":"12","author":"F Kahlessenane","year":"2021","unstructured":"F. Kahlessenane, A. Khaldi, R. Kafi, S. Euschi, A DWT based watermarking approach for medical image protection. J. Ambient Intell. Human Comput. 12, 2931\u20132938 (2021). https:\/\/doi.org\/10.1007\/s12652-020-02450-9","journal-title":"J. Ambient Intell. Human Comput."},{"key":"2684_CR22","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s11082-021-02793-3","volume":"53","author":"F Kahlessenane","year":"2021","unstructured":"F. Kahlessenane, A. Khaldi, M.R. Kafi, N. Zermi, S. Euschi, A value parity combination based scheme for retinal images watermarking. Opt. Quant. Electron. 53, 161 (2021). https:\/\/doi.org\/10.1007\/s11082-021-02793-3","journal-title":"Opt. Quant. Electron."},{"key":"2684_CR23","doi-asserted-by":"publisher","first-page":"6123","DOI":"10.1016\/j.eswa.2014.04.022","volume":"41","author":"HR Kanan","year":"2014","unstructured":"H.R. Kanan, B. Nazeri, A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst. Appl. 41, 6123\u20136130 (2014). https:\/\/doi.org\/10.1016\/j.eswa.2014.04.022","journal-title":"Expert Syst. Appl."},{"key":"2684_CR24","doi-asserted-by":"publisher","first-page":"12211","DOI":"10.1007\/s11042-022-13724-z","volume":"82","author":"A Khaldi","year":"2023","unstructured":"A. Khaldi, M.R. Kafi, A.Z.E. Boukhamla, Deformable model segmentation for range image watermarking. Multimed. Tools Appl. 82, 12211\u201312227 (2023). https:\/\/doi.org\/10.1007\/s11042-022-13724-z","journal-title":"Multimed. Tools Appl."},{"key":"2684_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-022-04101-7","author":"A Khaldi","year":"2022","unstructured":"A. Khaldi, M.R. Kafi, B. Meghni, Electrocardiogram signal security by digital watermarking. J. Ambient Intell. Human Comput. (2022). https:\/\/doi.org\/10.1007\/s12652-022-04101-7","journal-title":"J. Ambient Intell. Human Comput."},{"key":"2684_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2022.103540","volume":"75","author":"A Khaldi","year":"2022","unstructured":"A. Khaldi, M.R. Kafi, M.S. Moad, Wrapping based curvelet transform approach for ECG watermarking in telemedicine application. Biomed. Signal Process. Control 75, 103540 (2022). https:\/\/doi.org\/10.1016\/j.bspc.2022.103540","journal-title":"Biomed. Signal Process. Control"},{"key":"2684_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2021.167804","volume":"247","author":"PC Mandal","year":"2021","unstructured":"P.C. Mandal, I. Mukherjee, B.N. Chatterji, High capacity steganography based on IWT using eight-way CVD and n-LSB ensuring secure communication. Optik 247, 167804 (2021). https:\/\/doi.org\/10.1016\/j.ijleo.2021.167804","journal-title":"Optik"},{"key":"2684_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2021.103114","volume":"71","author":"MS Moad","year":"2022","unstructured":"M.S. Moad, M.R. Kafi, A. Khaldi, A non-subsampled Shearlet transform based approach for heartbeat sound watermarking. Biomed. Signal Process. Control 71, 103114 (2022). https:\/\/doi.org\/10.1016\/j.bspc.2021.103114","journal-title":"Biomed. Signal Process. Control"},{"key":"2684_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104490","volume":"90","author":"MS Moad","year":"2022","unstructured":"M.S. Moad, M.R. Kafi, A. Khaldi, A wavelet based medical image watermarking scheme for secure transmission in telemedicine applications. Microprocess. Microsyst. 90, 104490 (2022). https:\/\/doi.org\/10.1016\/j.micpro.2022.104490","journal-title":"Microprocess. Microsyst."},{"key":"2684_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-12004-0","author":"MS Moad","year":"2022","unstructured":"M.S. Moad, M.R. Kafi, A. Khaldi, Medical image watermarking for secure e-healthcare applications. Multimed. Tools Appl. (2022). https:\/\/doi.org\/10.1007\/s11042-022-12004-0","journal-title":"Multimed. Tools Appl."},{"key":"2684_CR31","doi-asserted-by":"publisher","DOI":"10.1080\/01969722.2023.2166253","author":"MS Moad","year":"2023","unstructured":"M.S. Moad, N. Zermi, A. Khaldi, M.R. Kafi, Stationary wavelet-based image watermarking for E-healthcare applications. Cybern. Syst.. Syst. (2023). https:\/\/doi.org\/10.1080\/01969722.2023.2166253","journal-title":"Cybern. Syst.. Syst."},{"key":"2684_CR32","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s11220-020-00328-w","volume":"22","author":"M Sahu","year":"2021","unstructured":"M. Sahu, N. Padhy, S.S. Gantayat, A.K. Sahu, Shadow image based reversible data hiding using addition and subtraction logic on the LSB planes. Sens Imaging 22, 7 (2021). https:\/\/doi.org\/10.1007\/s11220-020-00328-w","journal-title":"Sens Imaging"},{"key":"2684_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11220-019-0262-y","volume":"21","author":"AK Sahu","year":"2019","unstructured":"A.K. Sahu, G. Swain, Reversible image steganography using dual-layer LSB matching. Sens Imaging 21, 1 (2019). https:\/\/doi.org\/10.1007\/s11220-019-0262-y","journal-title":"Sens Imaging"},{"key":"2684_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.07.004","author":"AK Sahu","year":"2019","unstructured":"A.K. Sahu, G. Swain, High fidelity based reversible data hiding using modified LSB matching and pixel difference. J. King Saud Univ. Comput. Inf. Sci. (2019). https:\/\/doi.org\/10.1016\/j.jksuci.2019.07.004","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"2684_CR35","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1504\/IJESDF.2019.102567","volume":"11","author":"K Sahu","year":"2019","unstructured":"K. Sahu, G. Swain, Data hiding using adaptive LSB and PVD technique resisting PDH and RS analysis. Int. J. Electron. Security Digit. Forensics 11, 458 (2019). https:\/\/doi.org\/10.1504\/IJESDF.2019.102567","journal-title":"Int. J. Electron. Security Digit. Forensics"},{"key":"2684_CR36","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s11277-019-06393-z","volume":"108","author":"AK Sahu","year":"2019","unstructured":"A.K. Sahu, G. Swain, An optimal information hiding approach based on pixel value differencing and modulus function. Wireless Pers. Commun. 108, 159\u2013174 (2019). https:\/\/doi.org\/10.1007\/s11277-019-06393-z","journal-title":"Wireless Pers. Commun."},{"key":"2684_CR37","doi-asserted-by":"publisher","first-page":"69","DOI":"10.2478\/cait-2018-0006","volume":"18","author":"AK Sahu","year":"2018","unstructured":"A.K. Sahu, G. Swain, E.S. Babu, Digital image steganography using bit flipping. Cybern. Inf. Technol. 18, 69\u201380 (2018). https:\/\/doi.org\/10.2478\/cait-2018-0006","journal-title":"Cybern. Inf. Technol."},{"key":"2684_CR38","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.asoc.2015.01.032","volume":"30","author":"S Sajasi","year":"2015","unstructured":"S. Sajasi, A.M. Eftekhari Moghadam, An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method. Appl. Soft Comput.Comput. 30, 375\u2013389 (2015). https:\/\/doi.org\/10.1016\/j.asoc.2015.01.032","journal-title":"Appl. Soft Comput.Comput."},{"key":"2684_CR39","doi-asserted-by":"publisher","first-page":"2150210","DOI":"10.1142\/S0218126621502108","volume":"30","author":"E Salah","year":"2021","unstructured":"E. Salah, K. Amine, K.M. Redouane, K. Fares, Spatial and frequency approaches for audio file protection. J. Circuit Syst. Comput. 30, 2150210 (2021). https:\/\/doi.org\/10.1142\/S0218126621502108","journal-title":"J. Circuit Syst. Comput."},{"key":"2684_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.apacoust.2020.107652","volume":"172","author":"E Salah","year":"2021","unstructured":"E. Salah, K. Amine, K.M. Redouane, K. Fares, A Fourier transform based audio watermarking algorithm. Appl. Acoust. 172, 107652 (2021). https:\/\/doi.org\/10.1016\/j.apacoust.2020.107652","journal-title":"Appl. Acoust."},{"key":"2684_CR41","doi-asserted-by":"publisher","first-page":"43613","DOI":"10.1007\/s11042-021-11791-2","volume":"8","author":"MM Sayah","year":"2022","unstructured":"M.M. Sayah, K.M. Redouane, K. Amine, Secure transmission and integrity verification for color medical images in telemedicine applications. Multimed. Tools Appl. 8, 43613\u201343638 (2022). https:\/\/doi.org\/10.1007\/s11042-021-11791-2","journal-title":"Multimed. Tools Appl."},{"key":"2684_CR42","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.dsp.2014.12.005","volume":"38","author":"R Thabit","year":"2015","unstructured":"R. Thabit, B.E. Khoo, A new robust lossless data hiding scheme and its application to color medical images. Digit. Signal Process. 38, 77\u201394 (2015). https:\/\/doi.org\/10.1016\/j.dsp.2014.12.005","journal-title":"Digit. Signal Process."},{"key":"2684_CR43","doi-asserted-by":"publisher","first-page":"13905","DOI":"10.1007\/s11042-018-6746-2","volume":"78","author":"R Thanki","year":"2019","unstructured":"R. Thanki, S. Borra, Fragile watermarking for copyright authentication and tamper detection of medical images using compressive sensing (CS) based encryption and contourlet domain processing. Multimed. Tools Appl. 78, 13905\u201313924 (2019). https:\/\/doi.org\/10.1007\/s11042-018-6746-2","journal-title":"Multimed. Tools Appl."},{"key":"2684_CR44","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1080\/13682199.2017.1367129","volume":"65","author":"R Thanki","year":"2017","unstructured":"R. Thanki, S. Borra, V. Dwivedi, K. Borisagar, A steganographic approach for secure communication of medical images based on the DCT-SVD and the compressed sensing (CS) theory. Imaging Sci. J. 65, 457\u2013467 (2017). https:\/\/doi.org\/10.1080\/13682199.2017.1367129","journal-title":"Imaging Sci. J."},{"key":"2684_CR45","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.jisa.2019.03.017","volume":"46","author":"R Thanki","year":"2019","unstructured":"R. Thanki, A. Kothari, D. Trivedi, Hybrid and blind watermarking scheme in DCuT \u2013 RDWT domain. J. Inf. Security Appl. 46, 231\u2013249 (2019). https:\/\/doi.org\/10.1016\/j.jisa.2019.03.017","journal-title":"J. Inf. Security Appl."},{"key":"2684_CR46","first-page":"214","volume":"31","author":"Q Wen","year":"2003","unstructured":"Q. Wen, T.-F. Sun, S.-X. Wang, Concept and application of zero-watermark. Acta Electron. Sin. 31, 214\u2013216 (2003)","journal-title":"Acta Electron. Sin."},{"key":"2684_CR47","doi-asserted-by":"publisher","unstructured":"M. Xiao, Z. He, High capacity image steganography method based on framelet and compressive sensing, in Proceedings of SPIE, vol. 9811, p. 98110Y (2015). https:\/\/doi.org\/10.1117\/12.2205279","DOI":"10.1117\/12.2205279"},{"key":"2684_CR48","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.jisa.2017.04.004","volume":"34","author":"MY Yousefi Valandar","year":"2017","unstructured":"M.Y. Yousefi Valandar, M.J. Jafari Barani, P. Ayubi, A new transform domain steganography based on modified logistic chaotic map for color images. J. Inf. Security Appl. 34, 142\u2013151 (2017). https:\/\/doi.org\/10.1016\/j.jisa.2017.04.004","journal-title":"J. Inf. Security Appl."},{"key":"2684_CR49","doi-asserted-by":"publisher","first-page":"9971","DOI":"10.1007\/s11042-018-6584-2","volume":"78","author":"MY Yousefi Valandar","year":"2019","unstructured":"M.Y. Yousefi Valandar, M.J. Jafari Barani, P. Ayubi, An integer wavelet transform image steganography method based on 3D sine chaotic map. Multimed. Tools Appl. 78, 9971\u20139989 (2019). https:\/\/doi.org\/10.1007\/s11042-018-6584-2","journal-title":"Multimed. Tools Appl."},{"key":"2684_CR50","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1007\/s00500-019-04524-z","volume":"24","author":"MY Yousefi Valandar","year":"2020","unstructured":"M.Y. Yousefi Valandar, M.J. Jafari Barani, P. Ayubi, A blind and robust color images watermarking method based on block transform and secured by modified 3-dimensional H\u00e9non map. Soft. Comput.Comput. 24, 771\u2013794 (2020). https:\/\/doi.org\/10.1007\/s00500-019-04524-z","journal-title":"Soft. Comput.Comput."},{"key":"2684_CR51","doi-asserted-by":"publisher","first-page":"24823","DOI":"10.1007\/s11042-021-10712-7","volume":"80","author":"N Zermi","year":"2021","unstructured":"N. Zermi, A. Khaldi, M.R. Kafi, F. Kahlessenane, S. Euschi, A lossless DWT-SVD domain watermarking for medical information security. Multimed. Tools Appl. 80, 24823\u201324841 (2021). https:\/\/doi.org\/10.1007\/s11042-021-10712-7","journal-title":"Multimed. Tools Appl."},{"key":"2684_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.forsciint.2021.110691","volume":"320","author":"N Zermi","year":"2021","unstructured":"N. Zermi, A. Khaldi, R. Kafi, F. Kahlessenane, S. Euschi, A DWT-SVD based robust digital watermarking for medical image security. Forensic Sci. Int. 320, 110691 (2021). https:\/\/doi.org\/10.1016\/j.forsciint.2021.110691","journal-title":"Forensic Sci. Int."},{"key":"2684_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2021.104134","volume":"84","author":"N Zermi","year":"2021","unstructured":"N. Zermi, A. Khaldi, M.R. Kafi, F. Kahlessenane, S. Euschi, Robust SVD-based schemes for medical image watermarking. Microprocess. Microsyst. 84, 104134 (2021). https:\/\/doi.org\/10.1016\/j.micpro.2021.104134","journal-title":"Microprocess. Microsyst."},{"key":"2684_CR54","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1080\/01969722.2021.1983700","volume":"53","author":"N Zermi","year":"2022","unstructured":"N. Zermi, A. Khaldi, M.R. Kafi, F. Kahlessenane, S. Euschi, An SVD values ordering scheme for medical image watermarking. Cybern. Syst.. Syst. 53, 282\u2013297 (2022). https:\/\/doi.org\/10.1080\/01969722.2021.1983700","journal-title":"Cybern. Syst.. Syst."}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-024-02684-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-024-02684-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-024-02684-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T12:05:46Z","timestamp":1723637146000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-024-02684-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,28]]},"references-count":54,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["2684"],"URL":"https:\/\/doi.org\/10.1007\/s00034-024-02684-4","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"value":"0278-081X","type":"print"},{"value":"1531-5878","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,28]]},"assertion":[{"value":"18 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}]}}