{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T02:11:03Z","timestamp":1774404663903,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Digit Imaging"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s10278-021-00524-4","type":"journal-article","created":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T21:04:31Z","timestamp":1635800671000},"page":"1447-1462","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Fragile Watermark in Medical Image Based on Prime Number Distribution Theory"],"prefix":"10.1007","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8748-3871","authenticated-orcid":false,"given":"Xiuyuan","family":"Wei","sequence":"first","affiliation":[]},{"given":"Wenyin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jiuru","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ziyun","family":"Xia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,1]]},"reference":[{"key":"524_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S42979-021-00729-Y","volume":"2","author":"Asem Khmag","year":"2021","unstructured":"Asem Khmag, \u201cA Robust Watermarking Technique for High-Efficiency Video Coding (HEVC) Based on Blind Extraction Scheme,\u201d SN Computer Science, vol. 2, pp. 1 - 12, Jun 2021, https:\/\/doi.org\/10.1007\/S42979-021-00729-Y.","journal-title":"SN Computer Science"},{"key":"524_CR2","doi-asserted-by":"publisher","first-page":"33","DOI":"10.5815\/IJIGSP.2021.03.03","volume":"13","author":"Nicodemus Songose Awarayi","year":"2021","unstructured":"Nicodemus Songose Awarayi, Obed Appiah, Benjamin Asubam Weyori and Christopher Bombie Ninfaakang, \u201cA Digital Image Watermarking Using Dwt and L-shaped Tromino Fractal Encryption,\u201d International Journal of Image, Graphics and Signal Processing, vol. 13, pp. 33 - 43, Jun 2021, https:\/\/doi.org\/10.5815\/IJIGSP.2021.03.03.","journal-title":"International Journal of Image, Graphics and Signal Processing"},{"key":"524_CR3","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-981-10-5427-3_15","volume":"721","author":"Anuj Rani","year":"2017","unstructured":"Anuj Rani, Manoj Kumar and Payel Goel, \u201cImage Modelling: A Feature Detection Approach for Steganalysis,\u201d in International Conference on Advances in Computing and Data Sciences, vol 721, pp. 140-148, Jul 2017, https:\/\/doi.org\/10.1007\/978-981-10-5427-3_15.","journal-title":"International Conference on Advances in Computing and Data Sciences"},{"key":"524_CR4","unstructured":"Abdulla, Alan Anwer . \u201cExploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography,\u201d [D]. Britain: University of Buckingham, 2015."},{"key":"524_CR5","unstructured":"Turner L F, \u201cDigital data security system,\u201d U.S. Patent EP19890904115, Mar. 20, 1989."},{"key":"524_CR6","doi-asserted-by":"crossref","unstructured":"R.G. van Schyndel, A. Z. Tirkel, and C.F. Osborne, \u201cA Digital Watermark,\u201d in The IEEE International Conference on Image Processing, Austin, Texas, USA, 1994, pp.86\u201390.","DOI":"10.1109\/ICIP.1994.413536"},{"key":"524_CR7","unstructured":"Ping Wah Wong, \u201cA public key watermark for image verification and authentication,\u201d in Internet conference on Image Processing, Chicago, Illinois, USA, 1998, pp. 425\u2013429."},{"key":"524_CR8","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.sigpro.2019.05.035","volume":"164","author":"Hongchang Zheng","year":"2019","unstructured":"Hongchang Zheng, Chuntao Wang, Junxiang Wang, and Shijun Xiang, \u201cA new reversible watermarking scheme using the content-adaptive block size for prediction,\u201d Signal Processing, vol. 164, pp. 74 \u2013 83, May 2019, https:\/\/doi.org\/10.1016\/j.sigpro.2019.05.035.","journal-title":"Signal Processing"},{"key":"524_CR9","doi-asserted-by":"publisher","unstructured":"Thai-Son Nguyen, \u201cFragile watermarking for image authentication based on DWT-SVD-DCT techniques,\u201d Multimedia Tools and Applications, pp. 1\u201313, Apr 2021, https:\/\/doi.org\/10.1007\/S11042-021-10879-Z.","DOI":"10.1007\/S11042-021-10879-Z"},{"key":"524_CR10","doi-asserted-by":"publisher","unstructured":"ReyesReyes Rogelio, CruzRamos Clara, Ponomaryov Volodymyr, GarciaSalgado Beatriz P. and MolinaGarcia Javier \u201cColor Image Self-Recovery and Tampering Detection Scheme Based on Fragile Watermarking with High Recovery Capability,\u201d Applied Sciences, vol. 11, pp. 3187\u20133187, Apr 2021, https:\/\/doi.org\/10.3390\/APP11073187.","DOI":"10.3390\/APP11073187"},{"key":"524_CR11","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1016\/j.ijleo.2019.04.038","volume":"185","author":"T\u00fcrker Tuncer","year":"2019","unstructured":"T\u00fcrker Tuncer and Mustafa Kaya, \u201cA novel image watermarking method based on center symmetric local binary pattern with minimum distortion,\u201d Optik - International Journal for Light and Electron Optics, vol. 185, pp. 972\u2013984, Apr 2019, https:\/\/doi.org\/10.1016\/j.ijleo.2019.04.038.","journal-title":"Optik - International Journal for Light and Electron Optics"},{"key":"524_CR12","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.ins.2019.06.059","volume":"503","author":"Xiang-yang Wang","year":"2019","unstructured":"Xiang-yang Wang, Si-yu Zhang, Tao-tao Wen, Hong-ying Yang, and Pan-pan Niu, \u201cCoefficient difference based watermark detector in nonsubsampled contourlet transform domain,\u201d Information Sciences, vol. 503, pp. 274\u2013290, Jul 2019, https:\/\/doi.org\/10.1016\/j.ins.2019.06.059.","journal-title":"Information Sciences"},{"key":"524_CR13","doi-asserted-by":"publisher","unstructured":"Archana Tiwari, Manisha Sharma, and Raunak Kumar Tamrakar, \u201cWatermarking based image authentication and tamper detection algorithm using vector quantization approach,\u201d Int. J. Electron. Commun. (AE\u00dc), vol. 78, pp. 114\u2013123, 2019, https:\/\/doi.org\/10.1016\/j.aeue.2017.05.027.","DOI":"10.1016\/j.aeue.2017.05.027"},{"key":"524_CR14","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.ijleo.2019.04.091","volume":"186","author":"Yifeng Zhang","year":"2019","unstructured":"Yifeng Zhang and Yibo Sun, \u201cAn image watermarking method based on visual saliency and contourlet transform,\u201d Optik - International Journal for Light and Electron Optics, vol. 186, pp. 379\u2013389, Apr 2019, https:\/\/doi.org\/10.1016\/j.ijleo.2019.04.091.","journal-title":"Optik - International Journal for Light and Electron Optics"},{"key":"524_CR15","doi-asserted-by":"publisher","first-page":"1024","DOI":"10.3390\/ELECTRONICS10091024","volume":"10","author":"Zhou Xiaoyi","year":"2021","unstructured":"Zhou Xiaoyi, Ma Yue, Zhang Qingquan, Mohammed Mazin Abed and Dama\u0161evi\u010dius Robertas, \u201cA Reversible Watermarking System for Medical Color Images: Balancing Capacity, Imperceptibility, and Robustness,\u201d Electronics, vol. 10, pp. 1024-1024, Apr 2021, https:\/\/doi.org\/10.3390\/ELECTRONICS10091024.","journal-title":"Electronics"},{"key":"524_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113225","volume":"149","author":"Ling-Yuan Hsu","year":"2020","unstructured":"Ling-Yuan Hsu and Hwai-Tsu Hu, \u201cBlind watermarking for color images using EMMQ based on QDFT,\u201d Expert Systems With Applications, vol. 149, pp. 113225, Jan 2020, https:\/\/doi.org\/10.1016\/j.eswa.2020.113225.","journal-title":"Expert Systems With Applications"},{"key":"524_CR17","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.jvcir.2018.03.006","volume":"53","author":"Satendra Pal Singh and Gaurav Bhatnagar","year":"2018","unstructured":"Satendra Pal Singh and Gaurav Bhatnagar, \u201cA new robust watermarking system in integer DCT domain,\u201d Journal of Visual Communication and Image Representation, vol. 53, pp. 86 - 101, Mar 2018, https:\/\/doi.org\/10.1016\/j.jvcir.2018.03.006.","journal-title":"Journal of Visual Communication and Image Representation"},{"key":"524_CR18","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.image.2018.12.015","volume":"74","author":"Pascal Lef\u00e8vre","year":"2019","unstructured":"Pascal Lef\u00e8vre, Philippe Carr\u00e9, and Philippe Gaborit, \u201cApplication of rank metric codes in digital image watermarking,\u201d Signal Processing: Image Communication, vol. 74, pp. 119 - 128, Jan 2019, https:\/\/doi.org\/10.1016\/j.image.2018.12.015.","journal-title":"Signal Processing: Image Communication"},{"key":"524_CR19","doi-asserted-by":"publisher","unstructured":"Mohammadreza Sadeghi, Ramin Toosi, and Mohammad Ali Akhaee, \u201cBlind gain invariant image watermarking using random projection approach,\u201d Signal Processing, vol. 163, pp. 213 - 224, 2019, https:\/\/doi.org\/10.1016\/j.sigpro.2019.05.026.","DOI":"10.1016\/j.sigpro.2019.05.026"},{"key":"524_CR20","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.comcom.2020.01.038","volume":"152","author":"Ashima Anand and Amit Kumar Singh","year":"2020","unstructured":"Ashima Anand and Amit Kumar Singh, \u201cAn improved DWT-SVD domain watermarking for medical information security,\u201d ComputerCommunications, vol. 152, pp. 72 - 80, Feb 2020, https:\/\/doi.org\/10.1016\/j.comcom.2020.01.038.","journal-title":"ComputerCommunications"},{"key":"524_CR21","doi-asserted-by":"crossref","unstructured":"N.E.H. Golea, R. Seghir, and R. Benzid, \u201cA bind RGB color image watermarking based on singular value decomposition,\u201d in ACS\/IEEE International Conference on Computer Systems and Applications - AICCSA 2010, Hammamet, Tunisia, May 16\u201319, 2010, pp.1\u20135.","DOI":"10.1109\/AICCSA.2010.5586967"},{"key":"524_CR22","doi-asserted-by":"publisher","unstructured":"N. Mohananthini, and G. Yamuna., \u201cComparison of multiple watermarking techniques using genetic algorithms,\u201d Journal of Electrical Systems and Information Technology, vol. 3, pp. 68\u201380, 2016, https:\/\/doi.org\/10.1016\/j.jesit.2015.11.009.","DOI":"10.1016\/j.jesit.2015.11.009"},{"key":"524_CR23","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.eswa.2018.07.004","volume":"114","author":"Mohammad Hassan Vali","year":"2018","unstructured":"Mohammad Hassan Vali, Ali Aghagolzadeh, and Yasser Baleghi, \u201cOptimized watermarking technique using self-adaptive differential evolution based on redundant discrete wavelet transform and singular value decomposition,\u201d Expert Systems with Applications, vol. 114, pp. 296-312, Jul 2018, https:\/\/doi.org\/10.1016\/j.eswa.2018.07.004.","journal-title":"Expert Systems with Applications"},{"key":"524_CR24","doi-asserted-by":"publisher","unstructured":"Yasmeen Fauzia and Uddin Mohammad Shorif \u201cAn Efficient Watermarking Approach Based on LL and HH Edges of DWT\u2013SVD,\u201d SN Computer Science, vol. 2, pp. 3\u201316, Feb 2021, https:\/\/doi.org\/10.1007\/S42979-021-00478-Y.","DOI":"10.1007\/S42979-021-00478-Y"},{"key":"524_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113157","volume":"146","author":"Mahdi Ahmadi","year":"2019","unstructured":"Mahdi Ahmadi, Alireza Norouzi, Nader Karimi, Shadrokh Samavi, and Ali Emami, \u201cReDMark: Framework for residual diffusion watermarking based on deep networks,\u201d Expert Systems with Applications, vol. 146, pp. 113157, Dec 2019, https:\/\/doi.org\/10.1016\/j.eswa.2019.113157.","journal-title":"Expert Systems with Applications"},{"key":"524_CR26","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/s11771-011-0668-8","volume":"18","author":"W Song","year":"2011","unstructured":"W. Song, J. Hou, Z. Li, and L. Huang, \u201cChaotic system and QR factorization based robust digital image watermarking algorithm,\u201d Central South University of Technology, vol. 18, pp. 116\u2013124, Feb 2011, https:\/\/doi.org\/10.1007\/s11771-011-0668-8.","journal-title":"Central South University of Technology"},{"key":"524_CR27","doi-asserted-by":"publisher","unstructured":"Manoj Kumar and Arnold Hensman, \u201cRobust Digital Video Watermarking using Reversible Data Hiding and Visual Cryptography,\u201d Signals and Systems Conference, 24th IET Irish, 2013, https:\/\/doi.org\/10.1049\/ic.2013.0051","DOI":"10.1049\/ic.2013.0051"},{"key":"524_CR28","doi-asserted-by":"publisher","first-page":"4435","DOI":"10.1049\/iet-ipr.2020.0978","volume":"14","author":"Alan Anwer Abdulla","year":"2020","unstructured":"Alan Anwer Abdulla, \u201cEfficient computer-aided diagnosis technique for leukaemia cancer detection,\u201d IET Image Processing, vol. 14, pp.4435-4440, Dec 2020, https:\/\/doi.org\/10.1049\/iet-ipr.2020.0978.","journal-title":"IET Image Processing"},{"key":"524_CR29","doi-asserted-by":"publisher","unstructured":"Manoj Kumar, Anuj Rani and Sangeet Srivastava, \u201cImage Forensics Based on Lighting Estimation,\u201d International Journal of Image and Graphics, vol. 19, 2019, https:\/\/doi.org\/10.1142\/S0219467819500141.","DOI":"10.1142\/S0219467819500141"},{"key":"524_CR30","doi-asserted-by":"publisher","first-page":"85309","DOI":"10.1109\/ACCESS.2020.2992690","volume":"8","author":"Yu Zhang","year":"2020","unstructured":"Yu Zhang; Sha Wang; Teng Li; Bo Liu; and Dong-Bo Pan, \u201cModulus calculations on prime number algorithm for information hiding with high comprehensive performance,\u201d IEEE Access, vol. 8, pp. 85309-85320, May 2020, https:\/\/doi.org\/10.1109\/ACCESS.2020.2992690.","journal-title":"IEEE Access"},{"key":"524_CR31","doi-asserted-by":"publisher","first-page":"1224","DOI":"10.3390\/MATH9111224","volume":"9","author":"Barbarani Vito","year":"2021","unstructured":"Barbarani Vito, \u201cCombinatorial Models of the Distribution of Prime Numbers,\u201d Mathematics, vol. 9, pp. 1224-1224, May 2021, https:\/\/doi.org\/10.3390\/MATH9111224.","journal-title":"Mathematics"},{"key":"524_CR32","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.209","author":"Akarsh Aggarwal","year":"2020","unstructured":"Akarsh Aggarwal, Anuj Rani, Pavika Sharma, Manoj Kumar, Achyut Shankar and Mamoun Alazab, \u201cPrediction of Landsliding using Univariate Forecasting Models,\u201d Internet Techonlogy Letters, Jul 2020, https:\/\/doi.org\/10.1002\/itl2.209.","journal-title":"Internet Techonlogy Letters"},{"key":"524_CR33","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1007\/S11042-020-09520-2","volume":"80","author":"Akarsh Aggarwal","year":"2020","unstructured":"Akarsh Aggarwal and Manoj Kumar, \u201cImage surface texture analysis and classification using deep learning,\u201d Multimedia Tools and Applications, vol. 80, pp. 1289-1309, Sep 2020, https:\/\/doi.org\/10.1007\/S11042-020-09520-2.","journal-title":"Multimedia Tools and Applications"},{"key":"524_CR34","doi-asserted-by":"publisher","unstructured":"M Kumar, S Sriastava and A Hensman, \u201cA Hybrid Novel Approach of Video Watermarking,\u201d International Journal of Signal Processing, vol. 9, pp. 365\u2013376, Oct 2016, https:\/\/doi.org\/10.14257\/ijsip.2016.9.10.35.","DOI":"10.14257\/ijsip.2016.9.10.35"},{"key":"524_CR35","doi-asserted-by":"publisher","unstructured":"Manoj Kumar and Sangeet Srivastava, \u201cImage Tampering Detection Based on Inherent Lighting Fingerprints,\u201d Computational Vision and Bio Inspired Computing, vol 28, pp.1129\u20131140, 2018, g\/https:\/\/doi.org\/10.1007\/978-3-319-71767-8_4","DOI":"10.1007\/978-3-319-71767-8_4"},{"key":"524_CR36","doi-asserted-by":"publisher","unstructured":"ReyesReyes Rogelio, CruzRamos Clara, Ponomaryov Volodymyr, GarciaSalgado Beatriz P. and MolinaGarcia Javier, \u201cColor Image Self-Recovery and Tampering Detection Scheme Based on Fragile Watermarking with High Recovery Capability,\u201d Applied Sciences, vol. 11, pp. 3187\u20133187, 2021, https:\/\/doi.org\/10.3390\/APP11073187.","DOI":"10.3390\/APP11073187"},{"key":"524_CR37","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1109\/TIFS.2019.2926777","volume":"15","author":"Yue Zheng; Yuan Cao; and Chip-Hong Chang","year":"2019","unstructured":"Yue Zheng; Yuan Cao; and Chip-Hong Chang, \u201cA PUF-based data-device hash for tampered image detection and source camera identification,\u201d IEEE Transactions on Information Forensics and Security, vol. 15, pp. 620-634, Jul 2019, https:\/\/doi.org\/10.1109\/TIFS.2019.2926777.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"524_CR38","doi-asserted-by":"publisher","first-page":"160840","DOI":"10.1109\/ACCESS.2020.3019832","volume":"8","author":"Su Guo-Dong","year":"2020","unstructured":"Guo-Dong Su, Chin-Chen Chang, and Chia-Chen Lin, \u201cEffective self-recovery and tampering localization fragile watermarking for medical images,\u201d IEEE Access, vol. 8, pp. 160840-160857, Aug 2020, https:\/\/doi.org\/10.1109\/ACCESS.2020.3019832.","journal-title":"IEEE Access"}],"container-title":["Journal of Digital Imaging"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10278-021-00524-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10278-021-00524-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10278-021-00524-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:34:34Z","timestamp":1726036474000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10278-021-00524-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,1]]},"references-count":38,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["524"],"URL":"https:\/\/doi.org\/10.1007\/s10278-021-00524-4","relation":{},"ISSN":["0897-1889","1618-727X"],"issn-type":[{"value":"0897-1889","type":"print"},{"value":"1618-727X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,1]]},"assertion":[{"value":"23 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 September 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for Publication"}},{"value":"We declare that we have no financial and personal relationships with other people or organizations that can in appropriately influence our work, there is no professional or other personal interest of any nature or kind in any product, service and\/or company that could be construed as influencing the position presented in, or the review of the manuscript entitled.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest\/Competing Interests"}}]}}