{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:24:04Z","timestamp":1774538644047,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T00:00:00Z","timestamp":1744156800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T00:00:00Z","timestamp":1744156800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100007102","name":"Zagazig University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007102","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2025,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The transmission of medical images via medical agencies raises security concerns, necessitating increased security measures to ensure integrity and security. However, many watermarking algorithms overlook equipoise; the relation between robustness, invisibility, and payload capacity results in a less satisfactory performance. To bridge this gap, we propose a new blind watermarking method for securing medical images based on a convolutional neural network in a fusion domain. First, we transmute the host color image using a phase-only transform (PHOT) to detect the surface pattern. We feed the detected surface pattern into a pre-trained VGG19 model to impeccably extract the stable feature vector. We encrypt the extracted image features using a hybrid Chirikov map to enhance their robustness and reliability. The synergy between the pre-trained VGG19 model and PHOT in an integrated domain effectively captures additional native and localized image features. A hybrid Fibonacci Q-matrix method scrambles the binary watermark to enhance security. Integrating double encryption into the proposed method markedly enhances its resistance against diverse countermeasures. Experimental outcomes indicate that the proposed scheme performs efficiently in robustness and invisibility. The obtained PSNR value was up to 60.15\u00a0dB, which is optimal for human perception. The embedded watermark can be retrieved without any warping. The retrieved watermark seems to be authentic, exhibiting ideal BER and NC values. In almost all attack circumstances, the BER values approached zero while the NC values got closer. The proposed method demonstrates notable enhancements in robustness and invisibility compared to prior methods.<\/jats:p>","DOI":"10.1007\/s00521-025-11056-1","type":"journal-article","created":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T12:23:47Z","timestamp":1744201427000},"page":"12611-12629","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A new CNN-based watermarking method for color medical images in a fusion domain"],"prefix":"10.1007","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8065-8977","authenticated-orcid":false,"given":"Khalid M.","family":"Hosny","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8932-3513","authenticated-orcid":false,"given":"Mostafa M.","family":"Abdel-Aziz","sequence":"additional","affiliation":[]},{"given":"Nabil A.","family":"Lashin","sequence":"additional","affiliation":[]},{"given":"Hanaa M.","family":"Hamza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,9]]},"reference":[{"key":"11056_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-16843-3","author":"S Sharma","year":"2023","unstructured":"Sharma S, Zou JJ, Fang G et al (2023) A review of image watermarking for identity protection and verification. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-023-16843-3","journal-title":"Multimed Tools Appl"},{"key":"11056_CR2","doi-asserted-by":"publisher","first-page":"13125","DOI":"10.1007\/s11042-020-08652-9","volume":"79","author":"SS Roy","year":"2020","unstructured":"Roy SS, Basu A, Chattopadhyay A (2020) On the implementation of a copyright protection scheme using digital image watermarking. Multimedia Tools Appl 79:13125\u201313138. https:\/\/doi.org\/10.1007\/s11042-020-08652-9","journal-title":"Multimedia Tools Appl"},{"key":"11056_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-14479-x","author":"X Zhang","year":"2023","unstructured":"Zhang X, Su Q, Sun Y et al (2023) A robust and high-efficiency blind watermarking method for color images in the spatial domain. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-023-14479-x","journal-title":"Multimed Tools Appl"},{"key":"11056_CR4","doi-asserted-by":"publisher","first-page":"40937","DOI":"10.1007\/s11042-023-15125-2","volume":"82","author":"T Shah","year":"2023","unstructured":"Shah T, Batool A (2023) Triple byte nonlinear component of block cipher and its application in frequency domain watermarking. Multimed Tools Appl 82:40937\u201340952. https:\/\/doi.org\/10.1007\/s11042-023-15125-2","journal-title":"Multimed Tools Appl"},{"key":"11056_CR5","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1016\/j.aej.2023.07.068","volume":"78","author":"MM Eltoukhy","year":"2023","unstructured":"Eltoukhy MM, Khedr AE, Abdel-Aziz MM, Hosny KM (2023) Robust watermarking method for securing color medical images using Slant-SVD-QFT transforms and OTP encryption. Alexandria Eng J 78:517\u2013529. https:\/\/doi.org\/10.1016\/j.aej.2023.07.068","journal-title":"Alexandria Eng J"},{"issue":"23","key":"11056_CR6","doi-asserted-by":"publisher","first-page":"7845","DOI":"10.3390\/s21237845","volume":"21","author":"MM Abdel-Aziz","year":"2021","unstructured":"Abdel-Aziz MM, Hosny KM, Lashin NA, Fouda MM (2021) Blind watermarking of color medical images using hadamard transform and fractional-order moments. Sensors 21(23):7845. https:\/\/doi.org\/10.3390\/s21237845","journal-title":"Sensors"},{"issue":"3","key":"11056_CR7","doi-asserted-by":"publisher","first-page":"031804","DOI":"10.1117\/1.JEI.32.3.031804","volume":"32","author":"HK Singh","year":"2022","unstructured":"Singh HK, Singh AK (2022) Comprehensive review of watermarking techniques in deep-learning environments. J Electron Imag 32(3):031804. https:\/\/doi.org\/10.1117\/1.JEI.32.3.031804","journal-title":"J Electron Imag"},{"key":"11056_CR8","doi-asserted-by":"publisher","first-page":"103830","DOI":"10.1016\/j.csi.2023.103830","volume":"89","author":"H Chen","year":"2024","unstructured":"Chen H, Liu C, Zhu T, Zhou W (2024) When deep learning meets watermarking: a survey of application, attacks, and defenses. Comput Stand Interface 89:103830. https:\/\/doi.org\/10.1016\/j.csi.2023.103830","journal-title":"Comput Stand Interface"},{"key":"11056_CR9","doi-asserted-by":"publisher","first-page":"105127","DOI":"10.1016\/j.bspc.2023.105127","volume":"86","author":"R Xiang","year":"2023","unstructured":"Xiang R, Liu G, Li Ke, Liu J, Zhang Z, Dang M (2023) Zero-watermark scheme for medical image protection based on style feature and ResNet. Biomed Signal Proc Control 86:105127. https:\/\/doi.org\/10.1016\/j.bspc.2023.105127","journal-title":"Biomed Signal Proc Control"},{"key":"11056_CR10","doi-asserted-by":"publisher","first-page":"104478","DOI":"10.1016\/j.bspc.2022.104478","volume":"81","author":"T Huang","year":"2023","unstructured":"Huang T, Jia Xu, Shixin Tu, Han B (2023) Robust zero-watermarking scheme based on a depthwise overparameterized VGG network in healthcare information security. Biomed Signal Proc Control 81:104478. https:\/\/doi.org\/10.1016\/j.bspc.2022.104478","journal-title":"Biomed Signal Proc Control"},{"key":"11056_CR11","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.cose.2016.11.016","volume":"65","author":"H Kandi","year":"2017","unstructured":"Kandi H, Mishra D, Sai SRK, Gorthi, (2017) Exploring the learning capabilities of convolutional neural networks for robust image watermarking. Comput Secur 65:247\u2013268. https:\/\/doi.org\/10.1016\/j.cose.2016.11.016","journal-title":"Comput Secur"},{"key":"11056_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-16809-5","author":"X Guo","year":"2023","unstructured":"Guo X, Yang W, Zhang L et al (2023) Deep image watermarking with loss-driven modification. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-023-16809-5","journal-title":"Multimed Tools Appl"},{"key":"11056_CR13","doi-asserted-by":"publisher","first-page":"117134","DOI":"10.1016\/j.eswa.2022.117134.1","volume":"199","author":"L-Y Hsu","year":"2022","unstructured":"Hsu L-Y, Hwai-Tsu Hu, Chou H-H (2022) A high-capacity QRD-based blind color image watermarking algorithm incorporated with AI technologies. Exp Syst Appl 199:117134. https:\/\/doi.org\/10.1016\/j.eswa.2022.117134.1","journal-title":"Exp Syst Appl"},{"issue":"19","key":"11056_CR14","doi-asserted-by":"publisher","first-page":"6854","DOI":"10.3390\/app10196854","volume":"10","author":"J-E Lee","year":"2020","unstructured":"Lee J-E, Seo Y-H, Kim D-W (2020) Convolutional neural network-based digital image watermarking adaptive to the resolution of image and watermark. Appl Sci 10(19):6854. https:\/\/doi.org\/10.3390\/app10196854","journal-title":"Appl Sci"},{"key":"11056_CR15","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.neucom.2019.01.067","volume":"337","author":"S-M Mun","year":"2019","unstructured":"Mun S-M, Nam S-H, Jang H, Kim D, Lee H-K (2019) Finding robust domain from attacks: A learning framework for blind watermarking. Neurocomputing 337:191\u2013202. https:\/\/doi.org\/10.1016\/j.neucom.2019.01.067","journal-title":"Neurocomputing"},{"issue":"2","key":"11056_CR16","doi-asserted-by":"publisher","first-page":"021604","DOI":"10.1117\/1.JEI.32.2.021604","volume":"32","author":"D Mahapatra","year":"2022","unstructured":"Mahapatra D, Amrit P, Singh OP, Singh AK, Agrawal AK (2022) Autoencoder-convolutional neural network-based embedding and extraction model for image watermarking. J Electron Imag 32(2):021604. https:\/\/doi.org\/10.1117\/1.JEI.32.2.021604","journal-title":"J Electron Imag"},{"issue":"1","key":"11056_CR17","doi-asserted-by":"publisher","first-page":"1279","DOI":"10.32604\/cmc.2023.031445","volume":"74","author":"Y Fan","year":"2023","unstructured":"Fan Y, Li J, Bhatti UA, Shao C, Gong C et al (2023) A multi-watermarking algorithm for medical images using inception v3 and DCT. Computers, Materials & Continua 74(1):1279\u20131302","journal-title":"Computers, Materials & Continua"},{"key":"11056_CR18","doi-asserted-by":"publisher","first-page":"119810","DOI":"10.1016\/j.ins.2023.119810","volume":"653","author":"SA Nawaz","year":"2024","unstructured":"Nawaz SA, Li J, Bhatti UA, Shoukat MU, Li D, Raza MA (2024) Hybrid watermarking algorithm for medical images based on digital transformation and MobileNetV2. Inf Sci 653:119810. https:\/\/doi.org\/10.1016\/j.ins.2023.119810","journal-title":"Inf Sci"},{"key":"11056_CR19","doi-asserted-by":"crossref","unstructured":"Li, D., Li, J., & Bhatti, U. A. (2024). Robust multi-watermarking algorithm based on darknet53. In deep learning for multimedia processing applications (pp. 74\u201391). CRC Press.","DOI":"10.1201\/9781003427674-6"},{"issue":"1","key":"11056_CR20","doi-asserted-by":"publisher","first-page":"565","DOI":"10.32604\/cmc.2023.036317","volume":"75","author":"W Zhang","year":"2023","unstructured":"Zhang W, Li J, Bhatti UA, Liu J, Zheng J et al (2023) Robust multi-watermarking algorithm for medical images based on Googlenet and Henon map. Comput Mater Continua 75(1):565\u2013586","journal-title":"Comput Mater Continua"},{"key":"11056_CR21","doi-asserted-by":"publisher","unstructured":"D. Aiger and H. Talbot, The phase only transform for unsupervised surface defect detection, (2010) IEEE computer society conference on computer vision and pattern recognition, San Francisco, CA, USA, 2010, pp. 295\u2013302, https:\/\/doi.org\/10.1109\/CVPR.2010.5540198.","DOI":"10.1109\/CVPR.2010.5540198"},{"key":"11056_CR22","doi-asserted-by":"crossref","unstructured":"Fierro-Radilla A, Nakano-Miyatake M, Cedillo-Hernandez M, Cleofas-Sanchez L, Perez-Meana H (2019) A robust image zero-watermarking using convolutional neural networks. In: 2019 7th international workshop on biometrics and forensics, IWBF. Cancun, Mexico, pp 1\u20135.","DOI":"10.1109\/IWBF.2019.8739245"},{"key":"11056_CR23","doi-asserted-by":"publisher","unstructured":"C. J. Ramakrishna, D. B. K. Reddy, B. V. Bharadwaj, S. Agrawal and G. Hegde, \"A Novel Image Encryption using 3D Logistic Map and Improved Chirikov Map,\" (2022) International conference on advances in computing, communication and materials (ICACCM), Dehradun, India, 2022, pp. 1\u20137, https:\/\/doi.org\/10.1109\/ICACCM56405.2022.10009076.","DOI":"10.1109\/ICACCM56405.2022.10009076"},{"issue":"9","key":"11056_CR24","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.3390\/electronics10091066","volume":"10","author":"KM Hosny","year":"2021","unstructured":"Hosny KM, Kamal ST, Darwish MM, Papakostas GA (2021) New image encryption algorithm using hyperchaotic system and Fibonacci Q-matrix. Electronics 10(9):1066. https:\/\/doi.org\/10.3390\/electronics10091066","journal-title":"Electronics"},{"key":"11056_CR25","unstructured":"The Tissue Image Analytics Centre Dataset. Available at: https:\/\/warwick.ac.uk\/fac\/cross_fac\/tia\/data (Accessed on March 2024)."},{"key":"11056_CR26","unstructured":"The CASIA V4 data set. Available at: http:\/\/www.cbsr.ia.ac.cn (Accessed on March 2024)."},{"key":"11056_CR27","unstructured":"The UBIRIS V1 data set. Available at: http:\/ \/iris.di.ubi.pt (Accessed on March 2024)."},{"key":"11056_CR28","doi-asserted-by":"publisher","first-page":"2021","DOI":"10.1007\/s41870-023-01232-8","volume":"15","author":"A Tavakoli","year":"2023","unstructured":"Tavakoli A, Honjani Z, Sajedi H (2023) Convolutional neural network-based image watermarking using discrete wavelet transform. Int j inf tecnol 15:2021\u20132029. https:\/\/doi.org\/10.1007\/s41870-023-01232-8","journal-title":"Int j inf tecnol"},{"key":"11056_CR29","doi-asserted-by":"publisher","first-page":"675","DOI":"10.18178\/ijmlc.2020.10.5.990","volume":"10","author":"Sy Nguyen","year":"2020","unstructured":"Nguyen Sy, Ha K, Ho\u00e0ng N (2020) An efficient robust blind watermarking method based on convolution neural networks in wavelet transform domain. Int J Mach Learn Comput. 10:675\u2013684. https:\/\/doi.org\/10.18178\/ijmlc.2020.10.5.990","journal-title":"Int J Mach Learn Comput."},{"issue":"7","key":"11056_CR30","doi-asserted-by":"publisher","first-page":"1554","DOI":"10.3390\/electronics12071554","volume":"12","author":"D Li","year":"2023","unstructured":"Li D, Li J, Bhatti UA, Nawaz SA, Liu J, Chen Y-W, Cao L (2023) Hybrid encrypted watermarking algorithm for medical images based on DCT and improved DarkNet53. Electronics 12(7):1554. https:\/\/doi.org\/10.3390\/electronics12071554","journal-title":"Electronics"},{"issue":"Suppl 1","key":"11056_CR31","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1007\/s11760-024-03182-5","volume":"18","author":"A Amiri","year":"2024","unstructured":"Amiri A, Kimiaghalam B (2024) Robust watermarking with PSO and DnCNN. SIViP 18(Suppl 1):663\u2013676. https:\/\/doi.org\/10.1007\/s11760-024-03182-5","journal-title":"SIViP"},{"issue":"3","key":"11056_CR32","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1016\/j.jksuci.2019.03.009","volume":"34","author":"VK Sharma","year":"2022","unstructured":"Sharma VK, Mir RN (2022) An enhanced time-efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm. J King Saud Univ - Comput Inf Sci 34(3):615\u2013626. https:\/\/doi.org\/10.1016\/j.jksuci.2019.03.009","journal-title":"J King Saud Univ - Comput Inf Sci"},{"key":"11056_CR33","doi-asserted-by":"publisher","first-page":"29969","DOI":"10.1007\/s11042-023-16649-3","volume":"83","author":"MM Darwish","year":"2024","unstructured":"Darwish MM, Farhat AA, El-Gindy TM (2024) Convolutional neural network and 2D logistic-adjusted-Chebyshev-based zero-watermarking of color images. Multimed Tools Appl 83:29969\u201329995. https:\/\/doi.org\/10.1007\/s11042-023-16649-3","journal-title":"Multimed Tools Appl"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-025-11056-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-025-11056-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-025-11056-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T14:54:21Z","timestamp":1750172061000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-025-11056-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,9]]},"references-count":33,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["11056"],"URL":"https:\/\/doi.org\/10.1007\/s00521-025-11056-1","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,9]]},"assertion":[{"value":"1 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}