{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:21:25Z","timestamp":1766269285889,"version":"3.44.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"28","license":[{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s00521-023-09151-2","type":"journal-article","created":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T01:01:41Z","timestamp":1700010101000},"page":"23635-23650","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Deep learning-based segmentation for medical data hiding with Galois field"],"prefix":"10.1007","volume":"37","author":[{"given":"P.","family":"Amrit","sequence":"first","affiliation":[]},{"given":"K. N.","family":"Singh","sequence":"additional","affiliation":[]},{"given":"N.","family":"Baranwal","sequence":"additional","affiliation":[]},{"given":"A. K.","family":"Singh","sequence":"additional","affiliation":[]},{"given":"J. P.","family":"Singh","sequence":"additional","affiliation":[]},{"given":"H.","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,15]]},"reference":[{"key":"9151_CR1","doi-asserted-by":"crossref","unstructured":"Singh OP, Singh AK, Zhou H (2022) Multimodal fusion-based image hiding algorithm for secure healthcare system. IEEE Intell Syst","DOI":"10.1109\/MIS.2022.3210331"},{"key":"9151_CR2","doi-asserted-by":"publisher","first-page":"100568","DOI":"10.1016\/j.iot.2022.100568","volume":"19","author":"A Chatterjee","year":"2022","unstructured":"Chatterjee A, Ahmed BS (2022) IoT anomaly detection methods and applications: a survey. Internet Things 19:100568","journal-title":"Internet Things"},{"key":"9151_CR3","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.neucom.2022.10.047","volume":"518","author":"C Fan","year":"2022","unstructured":"Fan C, Hu K, Yuan Y, Li Y (2022) A data-driven analysis of global research trends in medical image: a survey. Neurocomputing 518:308\u2013320","journal-title":"Neurocomputing"},{"issue":"1s","key":"9151_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3505281","volume":"18","author":"MS Hossain","year":"2022","unstructured":"Hossain MS, Cucchiara R, Muhammad G, Tobon DP, Saddik AE (2022) Special section on AI-empowered multimedia data analytics for smart healthcare. ACM Trans Multim Comput Commun Appl TOMM 18(1s):1\u20132","journal-title":"ACM Trans Multim Comput Commun Appl TOMM"},{"issue":"2s","key":"9151_CR5","first-page":"1","volume":"17","author":"AK Singh","year":"2021","unstructured":"Singh AK, Anand A, Lv Z, Ko H, Mohan A (2021) A survey on healthcare data: a security perspective. ACM Trans Multim Comput Commun Appl 17(2s):1\u201326","journal-title":"ACM Trans Multim Comput Commun Appl"},{"key":"9151_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-023-15315-y","volume":"82","author":"J Kumar","year":"2023","unstructured":"Kumar J, Singh AK (2023) Copyright protection of medical images: a view of the state-of-the-art research and current developments. Multim Tools Appl 82:1\u201331","journal-title":"Multim Tools Appl"},{"key":"9151_CR7","first-page":"1","volume":"25","author":"Y Zhang","year":"2022","unstructured":"Zhang Y, Zhou W, Zhao R, Zhang X, Cao X (2022) F-TPE: flexible thumbnail-preserving encryption based on multi-pixel sum-preserving encryption. IEEE Trans Multim 25:1\u201315","journal-title":"IEEE Trans Multim"},{"key":"9151_CR8","doi-asserted-by":"crossref","unstructured":"Verma U, Sharma V (2022) Enhancing the security of medical images in telemedicine using region-based crypto watermarking approach. In: 12th international conference on cloud computing, data science & engineering. IEEE, pp 390\u2013397","DOI":"10.1109\/Confluence52989.2022.9734148"},{"issue":"10","key":"9151_CR9","doi-asserted-by":"publisher","first-page":"14321","DOI":"10.1007\/s11042-022-12367-4","volume":"81","author":"K Balasamy","year":"2022","unstructured":"Balasamy K, Krishnaraj N, Vijayalakshmi K (2022) Improving the security of medical image through neuro-fuzzy based ROI selection for reliable transmission. Multim Tools Appl 81(10):14321\u201314337","journal-title":"Multim Tools Appl"},{"issue":"4","key":"9151_CR10","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1007\/s12553-021-00562-6","volume":"11","author":"DM Mendoza","year":"2021","unstructured":"Mendoza DM, Ramirez DN, Hernandez MC, Miyatake MN (2021) An improved ROI-based reversible data hiding scheme completely separable applied to encrypted medical images. Heal Technol 11(4):835\u2013850","journal-title":"Heal Technol"},{"key":"9151_CR11","doi-asserted-by":"publisher","first-page":"107817","DOI":"10.1016\/j.sigpro.2020.107817","volume":"178","author":"G Gao","year":"2021","unstructured":"Gao G, Tong S, Xia Z, Wu B, Xu L, Zhao Z (2021) Reversible data hiding with automatic contrast enhancement for medical images. Signal Process 178:107817","journal-title":"Signal Process"},{"key":"9151_CR12","doi-asserted-by":"publisher","first-page":"76580","DOI":"10.1109\/ACCESS.2019.2921894","volume":"7","author":"X Liu","year":"2019","unstructured":"Liu X, Lou J, Fang H, Chen Y, Ouyang P, Wang Y, Zou B, Wang L (2019) A novel robust reversible watermarking scheme for protecting authenticity and integrity of medical images. IEEE Access 7:76580\u201376598","journal-title":"IEEE Access"},{"key":"9151_CR13","first-page":"1","volume":"2019","author":"B Ma","year":"2019","unstructured":"Ma B, Li B, Wang XY, Wang CP, Li J, Shi YQ (2019) Code division multiplexing and machine learning based reversible data hiding scheme for medical image. Secur Commun Netw 2019:1\u20139","journal-title":"Secur Commun Netw"},{"key":"9151_CR14","doi-asserted-by":"publisher","first-page":"17899","DOI":"10.1007\/s11042-018-6820-9","volume":"78","author":"R Bamal","year":"2019","unstructured":"Bamal R, Kasana SS (2019) Dual hybrid medical watermarking using walsh-slantlet transform. Multim Tools Appl 78:17899\u201317927","journal-title":"Multim Tools Appl"},{"key":"9151_CR15","doi-asserted-by":"publisher","first-page":"18043","DOI":"10.1007\/s11042-017-4444-0","volume":"77","author":"Y Yang","year":"2018","unstructured":"Yang Y, Zhang W, Liang D, Yu N (2018) A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images. Multim Tools Appl 77:18043\u201318065","journal-title":"Multim Tools Appl"},{"key":"9151_CR16","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.comcom.2022.02.023","volume":"188","author":"P Amrit","year":"2022","unstructured":"Amrit P, Singh AK (2022) Survey on watermarking methods in the artificial intelligence domain and beyond. Comput Commun 188:52\u201365","journal-title":"Comput Commun"},{"issue":"1","key":"9151_CR17","first-page":"1","volume":"1","author":"CJ Benvenuto","year":"2012","unstructured":"Benvenuto CJ (2012) Galois field in cryptography. Univ Wash 1(1):1\u201311","journal-title":"Univ Wash"},{"issue":"4","key":"9151_CR18","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1109\/TPAMI.2017.2699184","volume":"40","author":"LC Chen","year":"2017","unstructured":"Chen LC, Papandreou G, Kokkinos I, Murphy K, Yuille AL (2017) Deeplab: semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected crfs. IEEE Trans Pattern Anal Mach Intell 40(4):834\u2013848","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"5","key":"9151_CR19","doi-asserted-by":"publisher","first-page":"1316","DOI":"10.1109\/TMI.2019.2948320","volume":"39","author":"H Seo","year":"2019","unstructured":"Seo H, Huang C, Bassenne M, Xiao R, Xing L (2019) Modified U-Net (mUNet) with incorporation of object-dependent high-level features for improved liver and liver-tumour segmentation in CT images. IEEE Trans Med Imaging 39(5):1316\u20131325","journal-title":"IEEE Trans Med Imaging"},{"key":"9151_CR20","doi-asserted-by":"crossref","unstructured":"Ronneberger O, Fischer P, Brox T (2015) U-net: convolutional networks for biomedical image segmentation, pp 234\u2013241","DOI":"10.1007\/978-3-319-24574-4_28"},{"issue":"4","key":"9151_CR21","doi-asserted-by":"publisher","first-page":"3175","DOI":"10.1007\/s10586-020-03078-2","volume":"23","author":"E Rayachoti","year":"2020","unstructured":"Rayachoti E, Tirumalasetty S, Prathipati SC (2020) SLT based watermarking system for secure telemedicine. Clust Comput 23(4):3175\u20133184","journal-title":"Clust Comput"},{"key":"9151_CR22","unstructured":"[Online]. https:\/\/www.kaggle.com\/datasets\/tawsifurrahman\/covid19-radiographydatabase"},{"key":"9151_CR23","doi-asserted-by":"crossref","unstructured":"Parkhi OM, Vedaldi A, Zisserman A, Jawahar CV (2012) Cats and dogs. In: IEEE conference on computer vision and pattern recognition. IEEE, pp 3498\u20133505","DOI":"10.1109\/CVPR.2012.6248092"},{"key":"9151_CR24","doi-asserted-by":"publisher","first-page":"3617","DOI":"10.1007\/s11042-016-3913-1","volume":"76","author":"Priyanka","year":"2017","unstructured":"Priyanka, Maheshkar S (2017) Regionbased hybrid medical image watermarking for secure telemedicine applications. Multim Tools Appl 76:3617\u20133647","journal-title":"Multim Tools Appl"},{"key":"9151_CR25","doi-asserted-by":"publisher","first-page":"109781","DOI":"10.1016\/j.asoc.2022.109781","volume":"131","author":"KD Jyothsna","year":"2022","unstructured":"Jyothsna KD, Singh P, Thakkar HK, Kumar N (2022) Robust and secured watermarking using Ja-Fi optimization for digital image transmission in social media. Appl Soft Comput 131:109781","journal-title":"Appl Soft Comput"},{"key":"9151_CR26","doi-asserted-by":"crossref","unstructured":"Singh HK, Singh AK (2023) Using deep learning to embed dual marks with encryption through 3D chaotic map. IEEE Trans Consum Electron","DOI":"10.1109\/TCE.2023.3286487"},{"key":"9151_CR27","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.dsp.2014.12.005","volume":"38","author":"R Thabit","year":"2015","unstructured":"Thabit R, Khoo BE (2015) A new robust lossless data hiding scheme and its application to color medical images. IDigital Signal Process 38:77\u201394","journal-title":"IDigital Signal Process"},{"issue":"08","key":"9151_CR28","doi-asserted-by":"publisher","first-page":"1930023","DOI":"10.1142\/S0218127419300234","volume":"29","author":"C Fan","year":"2019","unstructured":"Fan C, Ding Q, Tse CK (2019) Counteracting the dynamical degradation of digital chaos by applying stochastic jump of chaotic orbits. Int J Bifurc Chaos 29(08):1930023","journal-title":"Int J Bifurc Chaos"},{"key":"9151_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3561513","volume":"19","author":"K Nath Singh","year":"2022","unstructured":"Nath Singh K, Singh OP, Singh AK, Agrawal AK (2022) EiMOL: a secure medical image encryption algorithm based on optimization and the Lorenz system. ACM Trans Multim Comput Commun Appl 19:1\u201319","journal-title":"ACM Trans Multim Comput Commun Appl"},{"key":"9151_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13319-017-0148-5","volume":"8","author":"M Kumari","year":"2017","unstructured":"Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. 3D Res 8:1\u201335","journal-title":"3D Res"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-09151-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-023-09151-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-09151-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T06:03:34Z","timestamp":1759125814000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-023-09151-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":30,"journal-issue":{"issue":"28","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["9151"],"URL":"https:\/\/doi.org\/10.1007\/s00521-023-09151-2","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"1 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}