{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:46:53Z","timestamp":1762004813529,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2016,6,1]],"date-time":"2016-06-01T00:00:00Z","timestamp":1464739200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100005417","name":"Universiti Teknologi Malaysia","doi-asserted-by":"publisher","award":["R.K130000.7838.4F643"],"award-info":[{"award-number":["R.K130000.7838.4F643"]}],"id":[{"id":"10.13039\/501100005417","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1007\/s11042-016-3622-9","type":"journal-article","created":{"date-parts":[[2016,6,1]],"date-time":"2016-06-01T05:52:20Z","timestamp":1464760340000},"page":"10313-10342","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":53,"title":["A robust medical image watermarking against salt and pepper noise for brain MRI images"],"prefix":"10.1007","volume":"76","author":[{"given":"Seyed Mojtaba","family":"Mousavi","sequence":"first","affiliation":[]},{"given":"Alireza","family":"Naghsh","sequence":"additional","affiliation":[]},{"given":"Azizah A.","family":"Manaf","sequence":"additional","affiliation":[]},{"given":"S. A. R.","family":"Abu-Bakar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,1]]},"reference":[{"issue":"1","key":"3622_CR1","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/s10278-009-9253-1","volume":"24","author":"OM Al-Qershi","year":"2011","unstructured":"Al-Qershi OM, Khoo BE (2011) Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging 24(1):114\u2013125","journal-title":"J Digit Imaging"},{"key":"3622_CR2","doi-asserted-by":"crossref","unstructured":"Anithadevi D, Perumal K (2015) Novel approach for noise removal of brain tumor mri images. J Biomed Eng Med Imaging 2 (3). doi: http:\/\/dx.doi.org\/10.14738\/jbemi.23.1142","DOI":"10.14738\/jbemi.23.1142"},{"key":"3622_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2800-5","author":"F Arab","year":"2015","unstructured":"Arab F, Abdullah SM, Hashim SZM, Manaf AA, Zamani M (2015) A robust video watermarking technique for the tamper detection of surveillance systems. Multimed Tools Appl. doi: 10.1007\/s11042-015-2800-5","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"3622_CR4","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.future.2012.05.021","volume":"29","author":"G Bhatnagar","year":"2013","unstructured":"Bhatnagar G, Wu QMJ (2013) Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform. Futur Gener Comput Syst 29(1):182\u2013195. doi: 10.1016\/j.future.2012.05.021","journal-title":"Futur Gener Comput Syst"},{"issue":"8","key":"3622_CR5","doi-asserted-by":"publisher","first-page":"1956","DOI":"10.1109\/tip.2007.901206","volume":"16","author":"N Bi","year":"2007","unstructured":"Bi N, Sun Q, Huang D, Yang Z, Huang J (2007) Robust image watermarking based on multiband wavelets and empirical mode decomposition. Trans Image Process 16(8):1956\u20131966. doi: 10.1109\/tip.2007.901206","journal-title":"Trans Image Process"},{"key":"3622_CR6","doi-asserted-by":"publisher","unstructured":"Cedillo-Hernandez M, Garcia-Ugalde F, Nakano-Miyatake M, Perez-Meana H (2013) Robust watermarking method in DFT domain for effective management of medical imaging. SIViP 1\u201316. doi: 10.1007\/s11760-013-0555-x","DOI":"10.1007\/s11760-013-0555-x"},{"issue":"3","key":"3622_CR7","doi-asserted-by":"crossref","first-page":"862","DOI":"10.1093\/ietisy\/e91-d.3.862","volume":"91","author":"RR Colin","year":"2008","unstructured":"Colin RR, Uribe CF, Villanueva J-AM (2008) Robust watermarking scheme applied to radiological medical images. IEICE Trans Inf Syst 91(3):862\u2013864","journal-title":"IEICE Trans Inf Syst"},{"issue":"10","key":"3622_CR8","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1016\/j.image.2014.09.001","volume":"29","author":"S Dadkhah","year":"2014","unstructured":"Dadkhah S, Abd Manaf A, Hori Y, Ella Hassanien A, Sadeghi S (2014) An effective SVD-based image tampering detection and self-recovery using active watermarking. Signal Process Image Commun 29(10):1197\u20131210. doi: 10.1016\/j.image.2014.09.001","journal-title":"Signal Process Image Commun"},{"key":"3622_CR9","doi-asserted-by":"publisher","unstructured":"Das S, Kundu M (2011) Hybrid Contourlet-DCT based robust image watermarking technique applied to medical data management. In: Kuznetsov S, Mandal D, Kundu M, Pal S (eds) Pattern Recognition and Machine Intelligence, vol 6744. Lecture Notes in Computer Science. Springer Berlin Heidelberg, pp 286\u2013292. doi: 10.1007\/978-3-642-21786-9_47","DOI":"10.1007\/978-3-642-21786-9_47"},{"key":"3622_CR10","doi-asserted-by":"crossref","unstructured":"Feng X, Chen Y (2012) Digital image watermarking based on super-resolution image reconstruction. Paper presented at the 9th International Conference on Fuzzy Systems and Knowledge Discovery, Sichuan, 29\u201331 May","DOI":"10.1109\/FSKD.2012.6233979"},{"issue":"1","key":"3622_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-007-0154-3","volume":"39","author":"A Haouzia","year":"2008","unstructured":"Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. Multimed Tools Appl 39(1):1\u201346. doi: 10.1007\/s11042-007-0154-3","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"3622_CR12","first-page":"28","volume":"31","author":"VS Jabade","year":"2011","unstructured":"Jabade VS, Gengaje SR (2011) Literature review of wavelet based digital image watermarking techniques. Int J Comput Appl 31(1):28\u201335","journal-title":"Int J Comput Appl"},{"key":"3622_CR13","unstructured":"Khalid SKA, Deris MM, Mohamad KM (2013) A robust digital image watermarking against salt and pepper using sudoku. In: The Second International Conference on Informatics Engineering & Information Science, 2013. The Society of Digital Information and Wireless Communication, pp 96\u2013106"},{"key":"3622_CR14","unstructured":"Khalili M (2012) A novel effective, secure and robust CDMA digital image watermarking in YUV color space using DWT2. CoRR abs\/1206.4256"},{"key":"3622_CR15","doi-asserted-by":"publisher","unstructured":"Li-Qun K, Yuan Z, Xie H (2009) A medical image authentication system based on reversible digital\u2260 watermarking. In: 1st International Conference on Information Science and Engineering (ICISE), 1047\u20131050. doi: 10.1109\/ICISE.2009.60","DOI":"10.1109\/ICISE.2009.60"},{"key":"3622_CR16","unstructured":"Medical Images Database (2014) http:\/\/www.barre.nom.fr\/medical\/samples\/ . Accessed 18 December 2014"},{"issue":"10","key":"3622_CR17","doi-asserted-by":"publisher","first-page":"2057","DOI":"10.1080\/00207160.2010.543677","volume":"88","author":"NA Memon","year":"2011","unstructured":"Memon NA, Chaudhry A, Ahmad M, Keerio ZA (2011) Hybrid watermarking of medical images for ROI authentication and recovery. Int J Comput Math 88(10):2057\u20132071. doi: 10.1080\/00207160.2010.543677","journal-title":"Int J Comput Math"},{"issue":"6","key":"3622_CR18","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1007\/s10278-014-9700-5","volume":"27","author":"S Mousavi","year":"2014","unstructured":"Mousavi S, Naghsh A, Abu-Bakar SAR (2014) Watermarking techniques used in medical images: a survey. J Digit Imaging 27(6):714\u2013729. doi: 10.1007\/s10278-014-9700-5","journal-title":"J Digit Imaging"},{"issue":"4","key":"3622_CR19","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/s10278-015-9770-z","volume":"28","author":"SM Mousavi","year":"2015","unstructured":"Mousavi SM, Naghsh A, Abu-Bakar SAR (2015) A heuristic automatic and robust ROI detection method for medical image warermarking. J Digit Imaging 28(4):417\u2013427. doi: 10.1007\/s10278-015-9770-z","journal-title":"J Digit Imaging"},{"key":"3622_CR20","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1201\/9781420013467-3","volume-title":"Multimedia watermarking techniques and applications","author":"E Muharemagic","year":"2006","unstructured":"Muharemagic E, Furht B (2006) Survey of watermarking techniques and applications. In: Multimedia watermarking techniques and applications. Auerbach Publication, Boca Raton, pp 91\u2013130"},{"key":"3622_CR21","doi-asserted-by":"publisher","unstructured":"Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux C (2010) Medical image integrity control combining digital signature and lossless watermarking. In: Garcia-Alfaro J, Navarro-Arribas G, Cuppens-Boulahia N, Roudier Y (eds) Data Privacy Management and Autonomous Spontaneous Security, vol 5939. Lecture Notes in Computer Science. Springer Berlin Heidelberg, pp 153\u2013162. doi: 10.1007\/978-3-642-11207-2_12","DOI":"10.1007\/978-3-642-11207-2_12"},{"issue":"1","key":"3622_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1475-925X-10-53","volume":"10","author":"F Rahimi","year":"2011","unstructured":"Rahimi F, Rabbani H (2011) A dual adaptive watermarking scheme in Contourlet domain for DICOM images. BioMed Eng OnLine 10(1):1\u201318. doi: 10.1186\/1475-925X-10-53","journal-title":"BioMed Eng OnLine"},{"issue":"5","key":"3622_CR23","first-page":"13","volume":"1","author":"N Ramamurthy","year":"2012","unstructured":"Ramamurthy N, Varadarajan S (2012) The Robust digital image watermarking using quantization and fuzzy logic approach in DWT domain. Int J Comput Sci Netw 1(5):13\u201319","journal-title":"Int J Comput Sci Netw"},{"issue":"10","key":"3622_CR24","doi-asserted-by":"publisher","first-page":"1526","DOI":"10.1016\/j.image.2013.07.002","volume":"28","author":"S Ranjbar","year":"2013","unstructured":"Ranjbar S, Zargari F, Ghanbari M (2013) A highly robust two-stage Contourlet-based digital image watermarking method. Signal Process Image Commun 28(10):1526\u20131536. doi: 10.1016\/j.image.2013.07.002","journal-title":"Signal Process Image Commun"},{"issue":"6","key":"3622_CR25","doi-asserted-by":"publisher","first-page":"55","DOI":"10.14257\/ijbsbt.2015.7.6.07","volume":"7","author":"V Reddy","year":"2015","unstructured":"Reddy V, Siddaiah P (2015) Medical image watermarking schemes against salt and pepper noise attack. Int J BioSci BioTechnol 7(6):55\u201364. doi: 10.14257\/ijbsbt.2015.7.6.07","journal-title":"Int J BioSci BioTechnol"},{"key":"3622_CR26","unstructured":"Rohith S, Bhat KNH (2012) A simple robust digital image watermarking against salt and pepper noise using repetition codes. Int J Signal Image Process 3 (1). doi: http:\/\/doi.searchdl.org\/01.IJSIP.3.1.531"},{"key":"3622_CR27","unstructured":"Shahidan M (2012) Multilayer reversible watermarking using non-underflow difference expansion. Ph.D. Thesis, Universiti Teknologi Malaysia, Malaysia"},{"key":"3622_CR28","doi-asserted-by":"publisher","unstructured":"Singh A, Dave M, Mohan A (2015) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl 1\u201321. doi: 10.1007\/s11042-015-2754-7","DOI":"10.1007\/s11042-015-2754-7"},{"key":"3622_CR29","doi-asserted-by":"publisher","unstructured":"Sumalatha R, Subramanyam MV (2015) Image denoising using Spatial Adaptive Mask Filter for medical images. In: International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), pp 1\u20134. doi: 10.1109\/EESCO.2015.7254039","DOI":"10.1109\/EESCO.2015.7254039"},{"issue":"3","key":"3622_CR30","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s11235-014-9936-x","volume":"59","author":"M Zamani","year":"2015","unstructured":"Zamani M, Manaf A (2015) Genetic algorithm for fragile audio watermarking. Telecommun Syst 59(3):291\u2013304. doi: 10.1007\/s11235-014-9936-x","journal-title":"Telecommun Syst"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3622-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3622-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3622-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3622-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T23:30:20Z","timestamp":1567985420000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3622-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,1]]},"references-count":30,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["3622"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3622-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2016,6,1]]}}}