{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T00:29:58Z","timestamp":1777508998316,"version":"3.51.4"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,5,19]],"date-time":"2016-05-19T00:00:00Z","timestamp":1463616000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pattern Anal Applic"],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1007\/s10044-016-0552-0","type":"journal-article","created":{"date-parts":[[2016,5,20]],"date-time":"2016-05-20T02:05:52Z","timestamp":1463709952000},"page":"1129-1144","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Numbering with spiral pattern to prove authenticity and integrity in medical images"],"prefix":"10.1007","volume":"20","author":[{"given":"Syifak Izhar","family":"Hisham","sequence":"first","affiliation":[]},{"given":"Afifah Nailah","family":"Muhammad","sequence":"additional","affiliation":[]},{"given":"Gran","family":"Badshah","sequence":"additional","affiliation":[]},{"given":"Nasrul Hadi","family":"Johari","sequence":"additional","affiliation":[]},{"given":"Jasni","family":"Mohamad Zain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,19]]},"reference":[{"key":"552_CR1","doi-asserted-by":"publisher","unstructured":"Coatrieux G, Lecornu L, Sankur B, Roux C (2006) A review of image watermarking applications in healthcare. In: Annual international conference of the IEEE engineering in medicine and biology\u2014proceedings, pp 4691\u20134694. doi: 10.1109\/IEMBS.2006.259305","DOI":"10.1109\/IEMBS.2006.259305"},{"issue":"1","key":"552_CR2","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1049\/iet-cvi.2012.0109","volume":"7","author":"E Walia","year":"2013","unstructured":"Walia E, Suneja A (2013) Fragile and blind watermarking technique based on Weber\u2019s law for medical image authentication. IET Comput Vis 7(1):9\u201319. doi: 10.1049\/iet-cvi.2012.0109","journal-title":"IET Comput Vis"},{"issue":"5","key":"552_CR3","doi-asserted-by":"crossref","first-page":"891","DOI":"10.1109\/TITB.2012.2207730","volume":"16","author":"D Bouslimi","year":"2012","unstructured":"Bouslimi D, Coatrieux G, Cozic M, Roux CH (2012) A Joint Encryption\/Watermarking System for Verifying the Reliability of Medical Images. IEEE Trans Inf Technol Biomed 16(5):891\u2013899","journal-title":"IEEE Trans Inf Technol Biomed"},{"issue":"3","key":"552_CR4","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1109\/JSTSP.2010.2049222","volume":"4","author":"M Chen","year":"2010","unstructured":"Chen M, Chen Z, Zeng X, Xiong Z (2010) Model order selection in reversible image watermarking. IEEE J Select Top Sig Process 4(3):592\u2013604. doi: 10.1109\/JSTSP.2010.2049222","journal-title":"IEEE J Select Top Sig Process"},{"issue":"1","key":"552_CR5","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/TIFS.2012.2224108","volume":"8","author":"G Coatrieux","year":"2013","unstructured":"Coatrieux G, Pan W, Cuppens-Boulahia N, Cuppens F, Roux Ch (2013) Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Trans Inf Forensics Secur 8(1):111\u2013120","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"552_CR6","first-page":"111","volume":"17","author":"G Coatrieux","year":"2013","unstructured":"Coatrieux G, Huang H, Shu H, Luo L, Roux Ch (2013) A watermarking based medical image integrity control and an image moment signature for tampering characterization. IEEE J Biomed Health Inf 17(6):111\u2013120","journal-title":"IEEE J Biomed Health Inf"},{"issue":"6","key":"552_CR7","doi-asserted-by":"crossref","first-page":"1122","DOI":"10.1109\/TITB.2012.2207435","volume":"16","author":"H Huang","year":"2012","unstructured":"Huang H, Coatrieux G, Shu H, Luo L, Roux Ch (2012) Blind integrity verification of medical images. IEEE Trans Inf Technol Biomed 16(6):1122\u20131126","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"552_CR8","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1080\/19393555.2011.561154","volume":"20","author":"NV Rao","year":"2011","unstructured":"Rao NV, Kumari VM (2011) Watermarking in medical imaging for security and authentication. Inf Secur J A Glob Perspect 20:148\u2013155. doi: 10.1080\/19393555.2011.561154","journal-title":"Inf Secur J A Glob Perspect"},{"issue":"1","key":"552_CR9","first-page":"555","volume":"179","author":"SC Liew","year":"2011","unstructured":"Liew SC, Zain JM (2011) Tamper localization and lossless recovery watermarking scheme. Commun Comput Inf Sci 179(1):555\u2013566","journal-title":"Commun Comput Inf Sci"},{"key":"552_CR10","doi-asserted-by":"publisher","unstructured":"Liew SC, Zain JM (2011) The usage of block average intensity in tamper localization for image watermarking. In: 4th International congress on image and signal processing, pp 1044\u20131048. doi: 10.1109\/CISP.2011.6100301","DOI":"10.1109\/CISP.2011.6100301"},{"issue":"6","key":"552_CR11","doi-asserted-by":"publisher","first-page":"728","DOI":"10.1049\/iet-ipr.2011.0160","volume":"6","author":"R Naskar","year":"2012","unstructured":"Naskar R, Chakraborty RS (2012) Performance of reversible digital image watermarking under error-prone data communication: a simulation-based study. IET Image Process 6(6):728\u2013737. doi: 10.1049\/iet-ipr.2011.0160","journal-title":"IET Image Process"},{"issue":"2","key":"552_CR12","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1109\/TIP.2008.2008733","volume":"18","author":"S He","year":"2009","unstructured":"He S, Kirovski D, Wu M (2009) High-fidelity data embedding for image annotation. IEEE Trans Image Process 18(2):429\u2013435. doi: 10.1109\/TIP.2008.2008733","journal-title":"IEEE Trans Image Process"},{"key":"552_CR13","unstructured":"Macq B, Deweyand F (1999) Trusted headers for medical images. In: DFG VIII-DII watermarking workshop, Erlangen, Germany"},{"issue":"3","key":"552_CR14","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1109\/JBHI.2013.2281322","volume":"18","author":"P Viswanathan","year":"2014","unstructured":"Viswanathan P, Krishna PV (2014) A joint FED watermarking system using spatial fusion for verifying the security issues of teleradiology. IEEE J Biomed Health Inf 18(3):753\u2013764. doi: 10.1109\/JBHI.2013.2281322","journal-title":"IEEE J Biomed Health Inf"},{"issue":"2","key":"552_CR15","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/TITB.2008.2007199","volume":"13","author":"G Coatrieux","year":"2009","unstructured":"Coatrieux G, Le Guillou C, Cauvin J-M, Roux Ch (2009) Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans Inf Technol Biomed 13(2):158\u2013165. doi: 10.1109\/TITB.2008.2007199","journal-title":"IEEE Trans Inf Technol Biomed"},{"issue":"2","key":"552_CR16","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/s10278-012-9484-4","volume":"26","author":"SC Liew","year":"2012","unstructured":"Liew SC, Zain JM (2012) Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication. J Digit Imaging 26(2):316\u2013325. doi: 10.1007\/s10278-012-9484-4","journal-title":"J Digit Imaging"},{"key":"552_CR17","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1201\/9781482276046-17","volume-title":"Digital signal processing for multimedia systems","author":"IJ Cox","year":"1999","unstructured":"Cox IJ, Miller ML, Linnartz JMG, Kalker T (1999) A review of watermarking principles and practices. In: Parhi KK, Nishitani T (eds) Digital signal processing for multimedia systems. Marcel Dekker, New York, pp 461\u2013482"},{"key":"552_CR18","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1109\/TCSVT.2003.815957","volume":"13","author":"X Kang","year":"2003","unstructured":"Kang X, Huang J, Shi YQ, Lin Y (2003) A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE Trans Circuits Syst Video Technol 13:776\u2013786","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"10","key":"552_CR19","doi-asserted-by":"crossref","first-page":"1593","DOI":"10.1109\/83.951543","volume":"10","author":"PW Wong","year":"2001","unstructured":"Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593\u20131601","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"552_CR20","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1016\/j.sigpro.2008.10.001","volume":"89","author":"X Zhang","year":"2009","unstructured":"Zhang X, Wang S (2009) Fragile watermarking scheme using a hierarchical mechanism. Sig Process 89(4):675\u2013679","journal-title":"Sig Process"},{"issue":"12","key":"552_CR21","doi-asserted-by":"crossref","first-page":"3026","DOI":"10.1016\/j.sigpro.2010.04.027","volume":"90","author":"X Zhang","year":"2010","unstructured":"Zhang X, Wang S, Qian Z, Feng G (2010) Reversible fragile watermarking for locating tampered blocks in JPEG images. Sig Process 90(12):3026\u20133036","journal-title":"Sig Process"},{"issue":"3","key":"552_CR22","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1109\/TIFS.2013.2294240","volume":"9","author":"J Franco-Contreras","year":"2014","unstructured":"Franco-Contreras J, Coatrieux G, Cuppens F, Cuppens-Boulahia N, Roux C (2014) Robust lossless watermarking of relational databases based on circular histogram modulation. IEEE Trans Inf Forensics Secur 9(3):397\u2013410. doi: 10.1109\/TIFS.2013.2294240","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"552_CR23","unstructured":"Zain JM (2014) Strict authentication watermarking with JPEG compression (SAW-JPEG) for medical images. Eur J Sci Res 42(2): 232\u2013241. http:\/\/arxiv.org\/ftp\/arxiv\/papers\/1101\/1101.5188.pdf . Accessed Oct 23 2014"},{"key":"552_CR24","doi-asserted-by":"publisher","unstructured":"Qiang S, Hongbin Z (2010) Image tamper detection and recovery using dual watermark. In: 2010 6th International conference on wireless communications, networking and mobile computing, WiCOM. doi: 10.1109\/WICOM.2010.5600689","DOI":"10.1109\/WICOM.2010.5600689"},{"issue":"4","key":"552_CR25","doi-asserted-by":"publisher","first-page":"728","DOI":"10.1016\/j.sigpro.2010.07.019","volume":"91","author":"S Bravo-Solorio","year":"2011","unstructured":"Bravo-Solorio S, Nandi AK (2011) Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Sig Process 91(4):728\u2013739. doi: 10.1016\/j.sigpro.2010.07.019","journal-title":"Sig Process"},{"key":"552_CR26","doi-asserted-by":"publisher","unstructured":"Lin H, Yang S, Xu L (2011) Watermark algorithm for color image authentication and restoration. In: 2011 International conference on electronic and mechanical engineering and information technology watermark, pp 2773\u20132776. doi: 10.1109\/EMEIT.2011.6023677","DOI":"10.1109\/EMEIT.2011.6023677"},{"issue":"4","key":"552_CR27","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.csi.2012.01.003","volume":"34","author":"C Li","year":"2012","unstructured":"Li C, Wang Y, Ma B, Zhang Z (2012) Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme. Comput Stand Interfaces 34(4):367\u2013379. doi: 10.1016\/j.csi.2012.01.003","journal-title":"Comput Stand Interfaces"},{"key":"552_CR28","doi-asserted-by":"publisher","unstructured":"Tjokorda ABW, Adiwijaya FP, Permana FP (2012) Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and run length encoding (RLE) compression. In: COMNETSAT 2012, pp 167\u2013171. doi: 10.1109\/ComNetSat.2012.6380799","DOI":"10.1109\/ComNetSat.2012.6380799"},{"key":"552_CR29","doi-asserted-by":"publisher","unstructured":"Naseem MT, Qureshi IM, Muzaffar MZ (2013) Chaos based invertible authentication of medical images. In: 2013 IEEE 9th international conference on emerging technologies (ICET), pp 1\u20135. doi: 10.1109\/ICET.2013.6743549","DOI":"10.1109\/ICET.2013.6743549"},{"key":"552_CR30","doi-asserted-by":"publisher","unstructured":"Bourbakis NG (1997) Image data compression-encryption using G-scan patterns. In: IEEE international conference on systems, man, and cybernetics. Computational Cybernetics and Simulation 2: 1117\u20131120. doi: 10.1109\/ICSMC.1997.638099","DOI":"10.1109\/ICSMC.1997.638099"},{"key":"552_CR31","doi-asserted-by":"publisher","unstructured":"Hung PA, Sooraksa P, Klomkarn K (2013) Extended baker map using scan patterns for image encryption. In: 2013 International conference on information technology and electrical engineering, vol 1. pp. 119\u2013123. doi: 10.1109\/ICITEED.2013.6676223","DOI":"10.1109\/ICITEED.2013.6676223"},{"issue":"6","key":"552_CR32","doi-asserted-by":"crossref","first-page":"1229","DOI":"10.1016\/S0031-3203(00)00062-5","volume":"34","author":"SS Maniccam","year":"2001","unstructured":"Maniccam SS, Bourbakis NG (2001) Lossless image compression and encryption using SCAN. Pattern Recogn 34(6):1229\u20131245","journal-title":"Pattern Recogn"},{"key":"552_CR33","doi-asserted-by":"publisher","unstructured":"Mahmood IA, Moheimani SOR (2010) Spiral scanning: an alternative to conventional raster scanning in high-speed scanning probe microscopes. American control conference (ACC), 2010, pp 5757\u20135762. doi: 10.1109\/ACC.2010.5530444","DOI":"10.1109\/ACC.2010.5530444"},{"issue":"3","key":"552_CR34","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TNANO.2014.2309653","volume":"13","author":"MS Rana","year":"2014","unstructured":"Rana MS, Pota HR, Petersen IR (2014) Spiral scanning with improved control for faster imaging of AFM. IEEE Trans Nanotechnol 13(3):541\u2013550. doi: 10.1109\/TNANO.2014.2309653","journal-title":"IEEE Trans Nanotechnol"},{"key":"552_CR35","doi-asserted-by":"publisher","unstructured":"Zain JM, Fauzi ARM (2006) Medical image watermarking with tamper detection and recovery. The 28th annual international conference of the IEEE Engineering in Medicine and Biology Society, New York, USA. doi: 10.1109\/IEMBS.2006.260767","DOI":"10.1109\/IEMBS.2006.260767"},{"key":"552_CR36","doi-asserted-by":"publisher","unstructured":"Fridrich J, Goljan M, Baldoza AC (2000) New fragile authentication watermark for images. International conference on image processing (ICIP 2000). IEEE Computer Society, Vancouver, BC, pp 446\u2013449. doi: 10.1109\/ICIP.2000.900991","DOI":"10.1109\/ICIP.2000.900991"},{"issue":"2","key":"552_CR37","first-page":"153","volume":"11","author":"C Lin","year":"2001","unstructured":"Lin C, Chang S (2001) A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol 11(2):153\u2013168. doi: 10.1109\/76.905982","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"6","key":"552_CR38","first-page":"585","volume":"11","author":"MU Celik","year":"2002","unstructured":"Celik MU, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11(6):585\u2013595. doi: 10.1109\/TIP.2002.1014990","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"552_CR39","first-page":"31","volume":"46","author":"DC Lou","year":"2000","unstructured":"Lou DC, Liu JL (2000) Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans Consum Electron 46(1):31\u201339. doi: 10.1109\/30.826378","journal-title":"IEEE Trans Consum Electron"},{"key":"552_CR40","unstructured":"Zain JM, Clarke M, Baldwin P (2004) The effect of reversible LSB manipulation to the quality of image. In: PREP2004, University of Hertfordshire"},{"key":"552_CR41","doi-asserted-by":"publisher","unstructured":"Hisham SI, Muhammad AN, Zain JM, Badshah G, Arshad NW (2013) Digital watermarking for recovering attack areas of medical images using spiral numbering. In: The 10th international conference on electronics, computer and computation, ICECCO, Ankara, Turkey, pp 285\u2013288 (doi: 10.1109\/ICECCO.2013.6718284 )","DOI":"10.1109\/ICECCO.2013.6718284"},{"key":"552_CR42","doi-asserted-by":"crossref","unstructured":"Hisham SI, Muhammad AN, Zain JM, Badshah G (2013) Localization watermarking for authentication of text images in quran with spiral manner numbering. In: Proceedings in the Taibah University International Conference on Advances in Information Technology for the Holy Quran and Its Sciences (NOORIC 2013), Madinah, 22\u201325 Dec 2013","DOI":"10.1109\/NOORIC.2013.17"},{"key":"552_CR43","doi-asserted-by":"publisher","unstructured":"Wong PW (1998) A public key watermark for image verification and authentication. In: Proceedings of IEEE International conference on image processing (ICIP), NY, USA, Oct 4\u20137, pp 425\u2013429. doi: 10.1109\/ICIP.1998.723526","DOI":"10.1109\/ICIP.1998.723526"},{"issue":"12","key":"552_CR44","doi-asserted-by":"publisher","first-page":"718","DOI":"10.1049\/iet-ipr.2013.0558","volume":"8","author":"S Vellaisamy","year":"2014","unstructured":"Vellaisamy S, Ramesh V (2014) Inversion attack resilient zero-watermarking scheme for medical image authentication. IET Image Process 8(12):718\u2013727. doi: 10.1049\/iet-ipr.2013.0558","journal-title":"IET Image Process"},{"issue":"13","key":"552_CR45","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1049\/el:20080522","volume":"44","author":"Q Huynh-Thu","year":"2008","unstructured":"Huynh-Thu Q, Ghanbari M (2008) Scope of validity of PSNR in image\/video quality assessment. Electron Lett 44(13):800\u2013801. doi: 10.1049\/el:20080522","journal-title":"Electron Lett"},{"issue":"2","key":"552_CR46","first-page":"79","volume":"2","author":"IH Syifak","year":"2013","unstructured":"Syifak IH, Zain JM, Liew SC (2013) A quick glance at digital watermarking in medical images. Biomed Eng Res J 2(2):79\u201387","journal-title":"Biomed Eng Res J"},{"key":"552_CR47","first-page":"154","volume":"93","author":"OM Al-Qershi","year":"2013","unstructured":"Al-Qershi OM, Ee B (2013) Khoo. Two-dimensional difference expansion (2D-DE) scheme with a characteristics-based threshold. Sig Process 93:154\u2013162. doi: 10.1016\/j.sigpro.2012.07.012","journal-title":"Sig Process"},{"key":"552_CR48","doi-asserted-by":"publisher","unstructured":"Velumani R, Seenivasagam V (2010) A reversible blind medical image watermarking scheme for patient identification, improved telediagnosis and tamper detection with a facial image watermark. IEEE international conference computational intelligence and computing research (ICCIC), 28\u201329 Dec 2010, pp 1\u20138. doi: 10.1109\/ICCIC.2010.5705832 )","DOI":"10.1109\/ICCIC.2010.5705832"},{"issue":"4","key":"552_CR49","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/TITB.2009.2014751","volume":"13","author":"LOM Kobayashi","year":"2009","unstructured":"Kobayashi LOM, Furuie SS, Barreto PSLM (2009) Providing integrity and authenticity in DICOM images: a novel approach. IEEE Trans Inf Technol Biomed 13(4):582\u2013589. doi: 10.1109\/TITB.2009.2014751","journal-title":"IEEE Trans Inf Technol Biomed"},{"issue":"5","key":"552_CR50","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1049\/iet-ipr.2011.0244","volume":"6","author":"R Naskar","year":"2012","unstructured":"Naskar R, Chakraborty RS (2012) Reversible watermarking utilising weighted median-based prediction. IET Image Process 6(5):507\u2013520. doi: 10.1049\/iet-ipr.2011.0244","journal-title":"IET Image Process"}],"container-title":["Pattern Analysis and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10044-016-0552-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-016-0552-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-016-0552-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10044-016-0552-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T01:46:56Z","timestamp":1567907216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10044-016-0552-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,19]]},"references-count":50,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,11]]}},"alternative-id":["552"],"URL":"https:\/\/doi.org\/10.1007\/s10044-016-0552-0","relation":{},"ISSN":["1433-7541","1433-755X"],"issn-type":[{"value":"1433-7541","type":"print"},{"value":"1433-755X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,19]]}}}