{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T02:11:01Z","timestamp":1774404661142,"version":"3.50.1"},"reference-count":97,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2014,5,29]],"date-time":"2014-05-29T00:00:00Z","timestamp":1401321600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Digit Imaging"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s10278-014-9700-5","type":"journal-article","created":{"date-parts":[[2014,5,28]],"date-time":"2014-05-28T17:28:01Z","timestamp":1401298081000},"page":"714-729","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":160,"title":["Watermarking Techniques used in Medical Images: a Survey"],"prefix":"10.1007","volume":"27","author":[{"given":"Seyed Mojtaba","family":"Mousavi","sequence":"first","affiliation":[]},{"given":"Alireza","family":"Naghsh","sequence":"additional","affiliation":[]},{"given":"S. A. R.","family":"Abu-Bakar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,29]]},"reference":[{"key":"9700_CR1","doi-asserted-by":"crossref","unstructured":"Kuang LQ, Zhang Y, Han X: A Medical image authentication system based on reversible digital watermarking, in Information Science and Engineering (ICISE), 2009 1st International Conference. pp 1047\u20131050, 2009.","DOI":"10.1109\/ICISE.2009.60"},{"issue":"1","key":"9700_CR2","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/j.future.2012.05.021","volume":"29","author":"G Bhatnagar","year":"2013","unstructured":"Bhatnagar G, Jonathan WU QM: Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform. Futur Gener Comput Syst 29(1):182\u2013195, 2013","journal-title":"Futur Gener Comput Syst"},{"key":"9700_CR3","doi-asserted-by":"crossref","unstructured":"Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux C: Medical image integrity control combining digital signature and lossless watermarking, in Data Privacy Management and Autonomous Spontaneous Security In: Garcia-Alfaro J, et al Eds. Springer Berlin: Heidelberg, 2010, pp 153\u2013162.","DOI":"10.1007\/978-3-642-11207-2_12"},{"issue":"9","key":"9700_CR4","first-page":"19","volume":"7","author":"JM Zain","year":"2007","unstructured":"Zain JM, Clarke M: Reversible region of non-interest (RONI) watermarking for authentication of DICOM images. Int J Comput Sci Netw Secur 7(9):19\u201328, 2007","journal-title":"Int J Comput Sci Netw Secur"},{"issue":"1","key":"9700_CR5","first-page":"1","volume":"4","author":"N-I Wu","year":"2007","unstructured":"Wu N-I, Hwang M-S: Data hiding current status and key issues. Int J Netw Secur 4(1):1\u20139, 2007","journal-title":"Int J Netw Secur"},{"key":"9700_CR6","doi-asserted-by":"crossref","unstructured":"Heylena K, Dams T: An image watermarking tutorial tool using matlab. Mathematics of Data\/Image Pattern Recognition, Compression, and Encryption with Applications XI, Proc. of SPIE 2008. 7075, 70750D: p. 1\u201312.","DOI":"10.1117\/12.793308"},{"key":"9700_CR7","doi-asserted-by":"crossref","unstructured":"Mohanty SP, Ramakrishnan KR: A dual watermarking technique for images, in Proceedings of the 7th ACM International Multimedia. ACM Press, 1999, pp 49\u201351.","DOI":"10.1145\/319878.319891"},{"issue":"10","key":"9700_CR8","doi-asserted-by":"crossref","first-page":"2057","DOI":"10.1080\/00207160.2010.543677","volume":"88","author":"NA Memon","year":"2011","unstructured":"Memon NA, Chaudhry A, Ahmad M, Keerio ZA: Hybrid watermarking of medical images for ROI authentication and recovery. Int J Comput Math 88(10):2057\u20132071, 2011","journal-title":"Int J Comput Math"},{"issue":"1","key":"9700_CR9","first-page":"28","volume":"31","author":"VS Jabade","year":"2011","unstructured":"Jabade VS, Gengaje SR: Literature review of wavelet based digital image watermarking techniques. Int J Comp Appl 31(1):28\u201335, 2011","journal-title":"Int J Comp Appl"},{"issue":"2","key":"9700_CR10","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1080\/00207161003596690","volume":"88","author":"NA Memon","year":"2010","unstructured":"Memon NA, Gilani SAM: Watermarking of chest CT scan medical images for content authentication. Int J Comput Math 88(2):265\u2013280, 2010","journal-title":"Int J Comput Math"},{"issue":"1","key":"9700_CR11","first-page":"241","volume":"3","author":"M Kaur","year":"2012","unstructured":"Kaur M, KAUR R: Reversible watermarking of medical images authentication and recovery-a survey. J Inf Oper Manag 3(1):241\u2013244, 2012","journal-title":"J Inf Oper Manag"},{"issue":"3","key":"9700_CR12","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad A, Condell J, Curran K, Mc Kevitt P: Digital image steganography: Survey and analysis of current methods. Signal Process 90(3):727\u2013752, 2010","journal-title":"Signal Process"},{"key":"9700_CR13","unstructured":"Mohanty SP: Digital Watermarking : A Tutorial Review. 1999."},{"key":"9700_CR14","unstructured":"Adnan WAW, Hitarn S, Abdul-Karim S, TamJis MR: A review of image watermarking, in Research and Development, 2003. SCORED 2003. Proceedings. Student Conference. pp 381\u2013384, 2003."},{"key":"9700_CR15","unstructured":"Memon NA: Watermarking of medical images for content authentication and copyright protection, in Computer Science and Engineering. 2010, GIK Institute of Engineering Sciences and Technology Topi: Swabi, pp 1\u2013166."},{"issue":"4","key":"9700_CR16","first-page":"33","volume":"8","author":"MA Hajjaji","year":"2011","unstructured":"Hajjaji MA, Mtibaa A, Bourennane E-B: A watermarking of medical image : new approach based on \u201cmulti-layer\u201d method. Int J Comp Sci Issues (IJCSI) 8(4):33\u201341, 2011","journal-title":"Int J Comp Sci Issues (IJCSI)"},{"key":"9700_CR17","doi-asserted-by":"crossref","unstructured":"Le THN, Nguyen KH, Le HB: Literature survey on image watermarking tools, watermark attacks, and benchmarking tools, in Second International Conferences on Advances in Multimedia, IEEE Computer Society, 2010, pp 67\u201373.","DOI":"10.1109\/MMEDIA.2010.37"},{"key":"9700_CR18","unstructured":"Hanhan AHAM: Digital image watermarking, in Faculty of Engineering Electrical Engineering Department. AN-Najah National University, 2011."},{"key":"9700_CR19","doi-asserted-by":"crossref","unstructured":"Navas KA, Sasikumar M: Survey of medical image watermarking algorithms, in International Conference: Sciences of Electronic Technologies of Information and Telecommunications. TUNISIA, 2007, pp 1\u20136.","DOI":"10.1109\/IWSSIP.2007.4381197"},{"issue":"16\u201317","key":"9700_CR20","doi-asserted-by":"crossref","first-page":"3904","DOI":"10.1016\/j.optcom.2011.04.004","volume":"284","author":"Z Wenyin","year":"2011","unstructured":"Wenyin Z, Shih FY: Semi-fragile spatial watermarking based on local binary pattern operators. Opt Commun 284(16\u201317):3904\u20133912, 2011","journal-title":"Opt Commun"},{"key":"9700_CR21","doi-asserted-by":"crossref","unstructured":"Van Schyndel RG, Tirkel AZ, Osborne CF: A digital watermark, in Image Processing Proceedings. (ICIP), IEEE Int Conf 86\u201390,1994.","DOI":"10.1109\/ICIP.1994.413536"},{"key":"9700_CR22","unstructured":"Badran EF, Sharkas MA, Attallah OA: Multiple watermark embedding scheme in wavelet-spatial domains based on ROI of medical images, in Radio Science Conference, NRSC, National, 2009, pp 1\u20138."},{"issue":"2","key":"9700_CR23","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"MU Celik","year":"2005","unstructured":"Celik MU, Sharma G, Tekalp AM, Saber E: Lossless gneralized-LSB data embedding. IEEE Trans Image Process 14(2):253\u2013266, 2005","journal-title":"IEEE Trans Image Process"},{"key":"9700_CR24","doi-asserted-by":"crossref","unstructured":"Agung BWR, Adiwijaya, Permana FP: Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and run length encoding (RLE) compression, in Communication, Networks and Satellite (ComNetSat), 2012 IEEE International Conference. pp 167\u2013171, 2012.","DOI":"10.1109\/ComNetSat.2012.6380799"},{"key":"9700_CR25","unstructured":"Dehkordi AB, Esfahani SN, Avanaki AN: Robust LSB watermarking optimized for local structural similarity, in Electrical Engineering (ICEE), 19th Iranian Conference. pp 1\u20131, 2011."},{"key":"9700_CR26","doi-asserted-by":"crossref","unstructured":"Bamatraf A, Ibrahim R, Salleh MNBM: Digital watermarking algorithm using LSB, in Computer Applications and Industrial Electronics (ICCAIE), 2010 International Conference. pp 155\u2013159, 2010.","DOI":"10.1109\/ICCAIE.2010.5735066"},{"key":"9700_CR27","doi-asserted-by":"crossref","unstructured":"Chang JD, Chen BH, Tsai CS: LBP-based fragile watermarking scheme for image tamper detection and recovery, in Next-Generation Electronics (ISNE), 2013 IEEE International Symposium. pp 173\u2013176, 2013.","DOI":"10.1109\/ISNE.2013.6512330"},{"key":"9700_CR28","doi-asserted-by":"crossref","unstructured":"Shu, L., F. Wei, A.C.S. Chung, and Y. Dit-Yan, Facial expression recognition using advanced local binary patterns, yallis entropies and global appearance features, in Image Processing, 2006 I.E. Int Conf 665\u2013668, 2006.","DOI":"10.1109\/ICIP.2006.312418"},{"key":"9700_CR29","doi-asserted-by":"crossref","unstructured":"Ahonen T, Hadid A, Pietik\u00e4inen M: Face recognition with local binary patterns. In T. Pajdla, J. Matas (Eds.) Computer Vision - ECCV 2004, Springer Berlin Heidelberg. pp 469\u2013481, 2004.","DOI":"10.1007\/978-3-540-24670-1_36"},{"key":"9700_CR30","unstructured":"Wenhua M, Lei H, Changping L: Advanced local binary pattern descriptors for crowd estimation. in Computational Intelligence and Industrial Application, 2008. PACIIA \u201908. Pacific-Asia Workshop on. 2008."},{"issue":"3","key":"9700_CR31","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi Y-Q, Ansari N, Su W: Reversible data hiding. IEEE Trans Circ Syst V Technol 16(3):354\u2013362, 2006","journal-title":"IEEE Trans Circ Syst V Technol"},{"issue":"11","key":"9700_CR32","doi-asserted-by":"crossref","first-page":"1741","DOI":"10.1109\/83.967401","volume":"10","author":"V Solachidis","year":"2001","unstructured":"Solachidis V, Pitas L: Circularly symmetric watermark embedding in 2-D DFT domain. Image Process IEEE Trans 10(11):1741\u20131753, 2001","journal-title":"Image Process IEEE Trans"},{"issue":"1","key":"9700_CR33","first-page":"35","volume":"1","author":"AK Kaushik","year":"2012","unstructured":"Kaushik AK: A novel approach for digital watermarking of an image using DFT. Int JElectronComp Sci Eng 1(1):35\u201341, 2012","journal-title":"Int JElectronComp Sci Eng"},{"key":"9700_CR34","doi-asserted-by":"crossref","unstructured":"Cedillo-Hernandez M, Garcia-Ugalde F, Nakano-Miyatake M, Perez-Meana H: Robust watermarking method in DFT domain for effective management of medical imaging. SIViP pp 1\u201316, 2013.","DOI":"10.1007\/s11760-013-0555-x"},{"key":"9700_CR35","doi-asserted-by":"crossref","unstructured":"Ramkumar M, Akansu AN, Alatan AA: A robust data hiding scheme for images using DFT, in Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference. pp 211\u2013215, 1999","DOI":"10.1109\/ICIP.1999.822886"},{"key":"9700_CR36","doi-asserted-by":"crossref","unstructured":"Ruanaidh JJKO, Dowling WJ, Boland FM: Phase watermarking of digital images, in Image Processing, 1996. Proc Int Conf pp. 239\u2013242,1996.","DOI":"10.1109\/ICIP.1996.560428"},{"key":"9700_CR37","unstructured":"Das S. Kundu M: Hybrid Contourlet-DCT Based Robust Image Watermarking Technique Applied to Medical Data Management. In: Kuznetsov S, Mandal D, Kundu M, Pal S (Eds.) Pattern Recognition and Machine Intelligence, Springer Berlin Heidelberg. pp 286\u2013292, 2011."},{"issue":"7","key":"9700_CR38","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1109\/5.771070","volume":"87","author":"D Kundur","year":"1999","unstructured":"Kundur D, Hatzinakos D: Digital watermarking for telltale tamper proofing and authentication. Proc IEEE 87(7):1167\u20131180, 1999","journal-title":"Proc IEEE"},{"issue":"1","key":"9700_CR39","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/83.817598","volume":"9","author":"JR Hernandez","year":"2000","unstructured":"Hernandez JR, Amado M, Perez-Gonzalez F: DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Trans Image Process 9(1):55\u201368, 2000","journal-title":"IEEE Trans Image Process"},{"key":"9700_CR40","unstructured":"Yang B, Schmucker M, XiaMu N, Busch C, Sun S: Reversible image watermarking by histogram modification for integer DCT coefficients, in Multimedia Signal Processing, IEEE 6th Workshop pp 143\u2013146, 2004."},{"key":"9700_CR41","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1117\/12.527216","volume":"5306","author":"B Yang","year":"2004","unstructured":"Yang B, Schmucker M, Funk W, Busch C, Sun S: Integer DCT-based reversible watermarking for images using compounding technique. Proc SPIE 5306:405\u2013415, 2004","journal-title":"Proc SPIE"},{"key":"9700_CR42","doi-asserted-by":"crossref","unstructured":"Rohani M, Avanaki AN: A watermarking method based on optimizing SSIM index by using PSO in DCT domain, in Computer Conference, 2009. CSICC 2009. 14th International CSI pp 418\u2013422,2009.","DOI":"10.1109\/CSICC.2009.5349616"},{"issue":"5","key":"9700_CR43","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/79.879337","volume":"17","author":"GC Langelaar","year":"2000","unstructured":"Langelaar GC, Setyawan I, Lagendijk RL: Watermarking digital image and video data. A state-of-the-art overview. Signal Proc Mag IEEE 17(5):20\u201346, 2000","journal-title":"Signal Proc Mag IEEE"},{"issue":"1","key":"9700_CR44","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1016\/j.ijleo.2013.06.082","volume":"125","author":"M Ali","year":"2014","unstructured":"Ali M, Ahn CW, Pant M: A robust image watermarking technique using SVD and differential evolution in DCT domain. Opt Int J Light Electron Opt 125(1):428\u2013434, 2014","journal-title":"Opt Int J Light Electron Opt"},{"key":"9700_CR45","unstructured":"Li J, Du W, Bai Y, Chen YW: 3D-DCT based zero-watermarking for medical volume data robust to geometrical attacks, in Wireless Communications and Applications. In: S\u00e9nac P, Ott M, Seneviratne A Eds. Springer Berlin: Heidelberg, 2012, pp 433\u2013444."},{"key":"9700_CR46","doi-asserted-by":"crossref","unstructured":"Hyung-Kyo L, Hee-Jung K, Ki-Ryong K, Jong-Keuk L: ROI medical image watermarking using DWT and bit-plane, in Asia-Pacific Conference on Communications, Perth, Western Australia p. 512\u2013515,2005.","DOI":"10.1109\/APCC.2005.1554112"},{"key":"9700_CR47","doi-asserted-by":"crossref","unstructured":"Long M, Changjun L, Shuni S: Digital watermarking of spectral images using DWT-SVD, in Communications, Circuits and Systems Proceedings, 2006 International Conference on p. 15\u201318,2006.","DOI":"10.1109\/ICCCAS.2006.284576"},{"key":"9700_CR48","doi-asserted-by":"crossref","unstructured":"Kasmani SA, Naghsh-Nilchi A: A new robust digital image watermarking technique based on joint DWT-DCT transformation, in Convergence and Hybrid Information Technology, 2008. ICCIT \u201908. Third International Conference on, 2008, pp 539\u2013544.","DOI":"10.1109\/ICCIT.2008.139"},{"issue":"4","key":"9700_CR49","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1016\/j.csi.2008.09.003","volume":"31","author":"M-S Wang","year":"2009","unstructured":"Wang M-S, Chen W-C: A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. Comp Stand Interfaces 31(4):757\u2013762, 2009","journal-title":"Comp Stand Interfaces"},{"key":"9700_CR50","doi-asserted-by":"crossref","unstructured":"Kalra GS, Talwar R, Sadawarti H: Robust blind digital image watermarking using DWT and dual encryption technique, in Computational Intelligence, Communication Systems and Networks (CICSyN), 2011 Third International Conference on 225\u2013230,2011.","DOI":"10.1109\/CICSyN.2011.56"},{"key":"9700_CR51","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.procs.2010.12.040","volume":"3","author":"M-R Keyvanpour","year":"2011","unstructured":"Keyvanpour M-R, Merrikh-Bayat F: Robust dynamic block-based image watermarking in DWT domain. Procedia Comput Sci 3:238\u2013242, 2011","journal-title":"Procedia Comput Sci"},{"key":"9700_CR52","unstructured":"Makhloghi M, Tab FA, Danyali H: A new robust blind DWT-SVD based digital image watermarking, in Electrical Engineering (ICEE), 2011 19th Iranian Conference on. Tehran pp 1\u20135,2011."},{"key":"9700_CR53","doi-asserted-by":"crossref","unstructured":"Giakoumaki A, Pavlopoulos S, Koutouris D: A medical image watermarking scheme based on wavelet transform, in Engineering in Medicine and Biology Society, 2003. Proceedings of the 25th Annual International Conference of the IEEE. pp 856\u2013859, 2003.","DOI":"10.1109\/IEMBS.2003.1279900"},{"key":"9700_CR54","doi-asserted-by":"crossref","unstructured":"Wen-Nung L, Tze-Liang H, Guo-Shiang L: Verification of image content integrity by using dual watermarking on wavelets domain, in Image Processing, 2003. ICIP 2003. Proceedings. Int Conf pp II-487-490,2003.","DOI":"10.1109\/ICIP.2003.1246723"},{"key":"9700_CR55","doi-asserted-by":"crossref","unstructured":"Guorong X, Chengyun Y, Yizhan Z, Shi YQ, Zhicheng N: Reversible data hiding based on wavelet spread spectrum, in Multimedia Signal Processing, 2004 I.E. 6th Workshop on pp 211\u2013214,2004.","DOI":"10.1109\/MMSP.2004.1436530"},{"key":"9700_CR56","unstructured":"Kaarna A, Parkkinen J: Multiwavelets in watermarking spectral images, in Geoscience and Remote Sensing Symposium, 2004. IGARSS \u201904. Proceedings. 2004 I.E. Int pp 3225\u20133228,2004."},{"issue":"12","key":"9700_CR57","doi-asserted-by":"crossref","first-page":"2082","DOI":"10.1109\/TIP.2005.859373","volume":"14","author":"L Kamstra","year":"2005","unstructured":"Kamstra L, Heijmans HJAM: Reversible data embedding into images using wavelet techniques and sorting. Image Process IEEE Trans 14(12):2082\u20132090, 2005","journal-title":"Image Process IEEE Trans"},{"key":"9700_CR58","doi-asserted-by":"crossref","unstructured":"Na L, Xiaoshi Z, Yanling Z, Huimin W, Shifeng L: Robust algorithm of digital image watermarking based on Discrete Wavelet Transform, in Electronic Commerce and Security, 2008 Int Symp 942\u2013945,2008.","DOI":"10.1109\/ISECS.2008.140"},{"issue":"19","key":"9700_CR59","doi-asserted-by":"crossref","first-page":"3349","DOI":"10.1016\/j.ins.2009.05.022","volume":"179","author":"T-C Lin","year":"2009","unstructured":"Lin T-C, Lin C-M: Wavelet-based copyright-protection scheme for digital images based on local features. Inf Sci 179(19):3349\u20133358, 2009","journal-title":"Inf Sci"},{"key":"9700_CR60","unstructured":"Lin WH, Wang YR, Horng SJ: A block-based watermarking method using wavelet coefficient quantization, in Algorithms and Architectures for Parallel Processing. In: Hua A, Chang SL Eds. Springer Berlin: Heidelberg, 2009, pp 156\u2013164."},{"key":"9700_CR61","doi-asserted-by":"crossref","unstructured":"Memon NA, Gilani SAM: Adaptive data hiding scheme for medical images using integer wavelet transform, in Emerging Technologies, 2009. ICET 2009. International Conference on. Islamabad, 2009, pp. 221\u2013224.","DOI":"10.1109\/ICET.2009.5353172"},{"key":"9700_CR62","doi-asserted-by":"crossref","unstructured":"Youngseock L, Jihah N, Jongweon K: Digital image watermarking using bidimensional empirical mode decomposition in wavelet domain, in Multimedia, 2009. ISM \u201909. 11th IEEE International Symposium on pp. 583\u2013588,2009.","DOI":"10.1109\/ISM.2009.48"},{"issue":"4","key":"9700_CR63","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1016\/j.jss.2011.11.005","volume":"85","author":"M Arsalan","year":"2012","unstructured":"Arsalan M, Malik SA, Khan A: Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw 85(4):883\u2013894, 2012","journal-title":"J Syst Softw"},{"issue":"9","key":"9700_CR64","doi-asserted-by":"crossref","first-page":"1885","DOI":"10.1080\/00207160.2010.502225","volume":"88","author":"S Agreste","year":"2011","unstructured":"Agreste S, Puccio L: Wavelet-based watermarking algorithms: theory, applications and critical aspects. Int J Comput Math 88(9):1885\u20131895, 2011","journal-title":"Int J Comput Math"},{"issue":"4","key":"9700_CR65","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1109\/TITB.2006.875655","volume":"10","author":"A Giakoumaki","year":"2006","unstructured":"Giakoumaki A, Pavlopoulos S, Koutsouris D: Multiple image watermarking applied to health information management. Inf Technol Biomed IEEE Trans 10(4):722\u2013732, 2006","journal-title":"Inf Technol Biomed IEEE Trans"},{"issue":"6","key":"9700_CR66","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1109\/MSP.2005.1550194","volume":"22","author":"IW Selesnick","year":"2005","unstructured":"Selesnick IW, Baraniuk RG, Kingsbury NC: The dual-tree complex wavelet transform. Signal Process Mag IEEE 22(6):123\u2013151, 2005","journal-title":"Signal Process Mag IEEE"},{"key":"9700_CR67","unstructured":"Kingsbury N: The dual-tree complex wavelet transform: a new efficient tool for image restoration and enhancement, in Proc. EUSIPCO pp 319\u2013322,1998."},{"key":"9700_CR68","unstructured":"Kingsbury N: The dual-tree complex wavelet transform: a new technique for shift invariance and directional filters, in Proc. 8th IEEE DSP Workshop: Bryce Canyon, 1998, pp 319\u2013322."},{"issue":"1","key":"9700_CR69","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/1475-925X-10-53","volume":"10","author":"F Rahimi","year":"2011","unstructured":"Rahimi F, Rabbani H: A dual adaptive watermarking scheme in contourlet domain for DICOM images. BioMed Eng OnLine 10(1):1\u201318, 2011","journal-title":"BioMed Eng OnLine"},{"key":"9700_CR70","unstructured":"Do MN, Vetterli M: Contourlets: a directional multiresolution image representation, in Image Processing. 2002. Proceedings. 2002 Int Conf pp I-357-360, 2002."},{"issue":"12","key":"9700_CR71","doi-asserted-by":"crossref","first-page":"2091","DOI":"10.1109\/TIP.2005.859376","volume":"14","author":"MN Do","year":"2005","unstructured":"Do MN, Vetterli M: The contourlet transform: an efficient directional multiresolution image representation. Image Process IEEE Trans 14(12):2091\u20132106, 2005","journal-title":"Image Process IEEE Trans"},{"key":"9700_CR72","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2010\/540723","volume":"2010","author":"S Khalighi","year":"2010","unstructured":"Khalighi S, Tirdad P, Rabiee HR: A contourlet-based image watermarking scheme with high resistance to removal and geometrical attacks. EURASIP J Adv Signal Process 2010:1\u201313, 2010","journal-title":"EURASIP J Adv Signal Process"},{"issue":"5","key":"9700_CR73","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1016\/j.optcom.2008.11.024","volume":"282","author":"V Aslantas","year":"2009","unstructured":"Aslantas V: An optimal robust digital image watermarking based on SVD using differential evolution algorithm. Opt Commun 282(5):769\u2013777, 2009","journal-title":"Opt Commun"},{"key":"9700_CR74","unstructured":"Mansouri A, Mahmoudi A: Aznaveh, and F. Torkamani Azar, Secure Digital Image Watermarking Based on SVD-DCT Advances in Computer Science and Engineering. In: Sarbazi-Azad H, et al Eds. Springer Berlin: Heidelberg, 2009, pp 645\u2013652."},{"issue":"6","key":"9700_CR75","doi-asserted-by":"crossref","first-page":"764","DOI":"10.1016\/j.dsp.2011.01.013","volume":"21","author":"W Al-Nuaimy","year":"2011","unstructured":"Al-Nuaimy W, El-Bendary MAM, Shafik A, Shawki F, Abou-El-azm AE, El-Fishawy NA, Elhalafawy SM, Diab SM, Sallam BM, Abd FE: El-Samie, and H.B. Kazemian, An SVD audio watermarking approach using chaotic encrypted images. Digit Signal Proc 21(6):764\u2013779, 2011","journal-title":"Digit Signal Proc"},{"issue":"8","key":"9700_CR76","doi-asserted-by":"crossref","first-page":"2442","DOI":"10.1016\/j.asoc.2012.02.021","volume":"12","author":"H-H Tsai","year":"2012","unstructured":"Tsai H-H, Jhuang Y-J, Lai Y-S: An SVD-based image watermarking in wavelet domain using SVR and PSO. Appl Soft Comput 12(8):2442\u20132453, 2012","journal-title":"Appl Soft Comput"},{"key":"9700_CR77","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1016\/j.sigpro.2013.07.024","volume":"94","author":"M Ali","year":"2014","unstructured":"Ali M, Ahn CW: An optimized watermarking technique based on self-adaptive DE in DWT\u2013SVD transform domain. Signal Process 94:545\u2013556, 2014","journal-title":"Signal Process"},{"issue":"1","key":"9700_CR78","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1109\/6046.985560","volume":"4","author":"R Liu","year":"2002","unstructured":"Liu R, Tan T: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans Multimed 4(1):121\u2013128, 2002","journal-title":"IEEE Trans Multimed"},{"issue":"8","key":"9700_CR79","doi-asserted-by":"crossref","first-page":"1973","DOI":"10.1016\/j.sigpro.2011.03.001","volume":"91","author":"BY Lei","year":"2011","unstructured":"Lei BY, Soon IY, Li Z: Blind and robust audio watermarking scheme based on SVD\u2013DCT. Signal Process 91(8):1973\u20131984, 2011","journal-title":"Signal Process"},{"issue":"4","key":"9700_CR80","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1016\/j.optcom.2010.10.047","volume":"284","author":"C-C Lai","year":"2011","unstructured":"Lai C-C: An improved SVD-based watermarking scheme using human visual characteristics. Opt Commun 284(4):938\u2013944, 2011","journal-title":"Opt Commun"},{"issue":"6","key":"9700_CR81","doi-asserted-by":"crossref","first-page":"1597","DOI":"10.1016\/j.dsp.2010.03.010","volume":"20","author":"JC Patra","year":"2010","unstructured":"Patra JC, Phua JE, Bornand C: A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digit Signal Proc 20(6):1597\u20131611, 2010","journal-title":"Digit Signal Proc"},{"issue":"3","key":"9700_CR82","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/s12046-009-0016-y","volume":"34","author":"A Mansouri","year":"2009","unstructured":"Mansouri A, Mahmoudi Aznaveh A, Torkamani Azar F: SVD-based digital image watermarking using complex wavelet transform. Sadhana 34(3):393\u2013406, 2009","journal-title":"Sadhana"},{"issue":"3","key":"9700_CR83","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1016\/j.aeue.2012.07.010","volume":"67","author":"OS Faragallah","year":"2013","unstructured":"Faragallah OS: Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain. Int J Electron Commun (AEU) 67(3):189\u2013196, 2013","journal-title":"Int J Electron Commun (AEU)"},{"key":"9700_CR84","unstructured":"Gonzalez RC, Woods RE: Digital image processing, 3rd Edition. Prentice-Hall, Inc,2006."},{"key":"9700_CR85","doi-asserted-by":"crossref","unstructured":"Muharemagic E, Furht B: Survey of watermarking techniques and applications. 2006 pp 1\u201330.","DOI":"10.1201\/9781420013467-3"},{"issue":"1","key":"9700_CR86","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/s10278-007-9043-6","volume":"22","author":"X Guo","year":"2009","unstructured":"Guo X, Zhuang TG: A region-based lossless watermarking scheme for enhancing security of medical data. J Digit Imaging 22(1):53\u201364, 2009","journal-title":"J Digit Imaging"},{"issue":"11","key":"9700_CR87","doi-asserted-by":"crossref","first-page":"1906","DOI":"10.1016\/j.jss.2009.06.017","volume":"82","author":"C-Y Chang","year":"2009","unstructured":"Chang C-Y, Wang H-J, Pan S-W: A robust DWT-based copyright verification scheme with Fuzzy ART. J Syst Softw 82(11):1906\u20131915, 2009","journal-title":"J Syst Softw"},{"key":"9700_CR88","unstructured":"Gunjal BL, Mali SN: ROI Based embedded watermarking of medical images for secured communication in telemedicine. Int J Comp Commun Eng pp 293\u2013298,2012"},{"key":"9700_CR89","doi-asserted-by":"crossref","unstructured":"Kutter M, Petitcolas FAP: A fair benchmark for image watermarking systems. Electronic Imaging \u201999. Security and Watermarking of Multimedia Contents: Sans Jose, 1999, 3657:226\u2013239.","DOI":"10.1117\/12.344672"},{"issue":"1","key":"9700_CR90","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/s10278-009-9253-1","volume":"24","author":"OM Al-Qershi","year":"2011","unstructured":"Al-Qershi OM, Khoo BE: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging 24(1):114\u2013125, 2011","journal-title":"J Digit Imaging"},{"key":"9700_CR91","doi-asserted-by":"crossref","unstructured":"Zain J, Baldwin L, Clarke M: Reversible watermarking for authentication of DICOM images, in Proceedings of the 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society pp 3237\u20133240,2004.","DOI":"10.1109\/IEMBS.2004.1403911"},{"key":"9700_CR92","first-page":"278","volume-title":"Authentication and protection for medical image","author":"C-H Lin","year":"2010","unstructured":"Lin C-H, Yang C-Y, Chang C-W: Authentication and protection for medical image, vol. 6422. Springer, Berlin Heidelberg, 2010, pp 278\u2013287"},{"issue":"1","key":"9700_CR93","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.jss.2010.08.055","volume":"84","author":"OM Al-Qershi","year":"2011","unstructured":"Al-Qershi OM, Khoo BE: High capacity data hiding schemes for medical images based on difference expansion. J Syst Softw 84(1):105\u2013112, 2011","journal-title":"J Syst Softw"},{"issue":"8","key":"9700_CR94","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian J: Reversible data embedding using a difference expansion. Circ Syst V Technol IEEE Trans 13(8):890\u2013896, 2003","journal-title":"Circ Syst V Technol IEEE Trans"},{"issue":"1","key":"9700_CR95","doi-asserted-by":"crossref","first-page":"013001","DOI":"10.1117\/1.3532833","volume":"20","author":"D-G Yeo","year":"2011","unstructured":"Yeo D-G, Lee H-Y, Kim BM: High capacity reversible watermarking using differential histogram shifting and predicted error compensation. J Electron Imaging 20(1):013001\u20131-11, 2011","journal-title":"J Electron Imaging"},{"key":"9700_CR96","doi-asserted-by":"crossref","unstructured":"Wakatani A: Digital watermarking for ROI medical images by using compressed signature image, in System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on. pp 2043\u20132048,2002.","DOI":"10.1109\/HICSS.2002.994129"},{"key":"9700_CR97","unstructured":"Viswanathan P, Krishna PV: Fusion of cryptographic watermarking medical image system with reversible property, in Computer Networks and Intelligent Computing.In: Venugopal KR, Patnaik LM Eds. Springer Berlin: Heidelberg, 2011, pp 533\u2013540."}],"container-title":["Journal of Digital Imaging"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10278-014-9700-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10278-014-9700-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10278-014-9700-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:41:14Z","timestamp":1746247274000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10278-014-9700-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,29]]},"references-count":97,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["9700"],"URL":"https:\/\/doi.org\/10.1007\/s10278-014-9700-5","relation":{},"ISSN":["0897-1889","1618-727X"],"issn-type":[{"value":"0897-1889","type":"print"},{"value":"1618-727X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,29]]}}}