{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T16:00:45Z","timestamp":1772121645722,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2017,1,3]],"date-time":"2017-01-03T00:00:00Z","timestamp":1483401600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1007\/s11042-016-4215-3","type":"journal-article","created":{"date-parts":[[2017,1,3]],"date-time":"2017-01-03T06:42:31Z","timestamp":1483425751000},"page":"18605-18618","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["SVM based robust watermarking for enhanced medical image security"],"prefix":"10.1007","volume":"76","author":[{"given":"Ankur","family":"Rai","sequence":"first","affiliation":[]},{"given":"Harsh Vikram","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,3]]},"reference":[{"key":"4215_CR1","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1023\/A:1009715923555","volume":"2","author":"CJC Burges","year":"1998","unstructured":"Burges CJC (1998) A tutorial on support vector machines for pattern recognition. Data Min Knowl Disc 2:121\u2013167","journal-title":"Data Min Knowl Disc"},{"issue":"8","key":"4215_CR2","doi-asserted-by":"crossref","first-page":"1070","DOI":"10.1016\/j.ins.2008.10.020","volume":"179","author":"XB Cao","year":"2009","unstructured":"Cao XB, Xu YW, Chen D, Qiao H (2009) Associated evolution of a support vector machine-based classifier for pedestrian detection. Inf Sci 179(8):1070\u20131077","journal-title":"Inf Sci"},{"key":"4215_CR3","first-page":"421","volume":"2","author":"M Chandra","year":"2010","unstructured":"Chandra M, Pandey S (2010) A dwt domain visible watermarking techniques for digital images. International Conference on Electronics and Information Engineering 2:421\u2013427","journal-title":"International Conference on Electronics and Information Engineering"},{"key":"4215_CR4","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/s10278-007-9012-0","volume":"21","author":"KH Chiang","year":"2008","unstructured":"Chiang KH, Chien KCC, Chang RF, Yen HY (2008) Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. J Digit Imaging 21:77\u201390","journal-title":"J Digit Imaging"},{"key":"4215_CR5","doi-asserted-by":"publisher","unstructured":"Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R (2000) Relevance of watermarking in medical imaging. Proceedings 2000 I.E. EMBS International Conference on Information Technology Applications in Biomedicine. ITAB-ITIS 2000. Joint Meeting Third IEEE EMBS International Conference on Information Technology, pp 250\u2013255. doi: 10.1109\/ITAB.2000.892396","DOI":"10.1109\/ITAB.2000.892396"},{"key":"4215_CR6","doi-asserted-by":"publisher","unstructured":"Colin RR, Claudia FU, Blas GJT (2007) Data hiding scheme for medical images. 17th International Conference on Electronics. Comput Commun 32\u201332. doi: 10.1109\/CONIELECOMP.2007.14","DOI":"10.1109\/CONIELECOMP.2007.14"},{"issue":"5","key":"4215_CR7","first-page":"0975","volume":"36","author":"N Dey","year":"2013","unstructured":"Dey N, Roy AB, Dey S (2013) A novel approach of color image hiding using RGB color planes and DWT. International Journal of Computer Applications 36(5):0975\u20138887","journal-title":"International Journal of Computer Applications"},{"key":"4215_CR8","unstructured":"Divecha NH, Jani NN (2012) Image watermarking algorithm using dct, dwt and svd. IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology"},{"key":"4215_CR9","doi-asserted-by":"crossref","unstructured":"Eswaraiah R, Reddy ES (2014) A fragile ROI-based medical image watermarking technique with tamper detection and recovery. Fourth International Conference on Communication Systems and Network Technologies","DOI":"10.1109\/CSNT.2014.184"},{"key":"4215_CR10","doi-asserted-by":"crossref","unstructured":"Fernandes FCA, Spaendonck RLV, Burrus CS (2002) Shiftable, projection-based complex wavelet transforms. Acoustics, speech, and signal processing (ICASSP) on IEEE International Conference","DOI":"10.1109\/ICASSP.2002.5744029"},{"key":"4215_CR11","doi-asserted-by":"crossref","unstructured":"Ganic E, Eskicioglu A M (2004) Robust DWT-SVD domain image watermarking: Embedding data in all frequencies. In: Proc. Workshop Multimedia Security, Magdeburg, Germany, pp 166\u2013174","DOI":"10.1145\/1022431.1022461"},{"key":"4215_CR12","doi-asserted-by":"crossref","unstructured":"Giakoumaki A, Pavlopoulos S, Koutsouris D (2003) A medical image watermarking scheme based on wavelet transform. In: Proc. of the 25th Annual Int. Conf. of the IEEE-EMBS, Cancun, Mexico, pp 856\u2013859","DOI":"10.1109\/IEMBS.2003.1279900"},{"key":"4215_CR13","doi-asserted-by":"publisher","unstructured":"Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 10(4):722\u2013732. doi: 10.1109\/TITB.2006.875655","DOI":"10.1109\/TITB.2006.875655"},{"key":"4215_CR14","unstructured":"Hyung KL, Hee JK, Ki RK, Jong KL (2005) ROI medical image watermarking using dwt and bit-plane. In: Asia-Pacific Conference, Communications, pp. 512\u2013515"},{"key":"4215_CR15","doi-asserted-by":"crossref","unstructured":"Lai CC, Tsai CC (2010) Digital image watermarking using discrete wavelet transform and singular value decomposition. IEEE Trans Instrum Meas 59 (11)","DOI":"10.1109\/TIM.2010.2066770"},{"key":"4215_CR16","first-page":"3","volume-title":"ROI medical image watermarking using dwt and bit-plane","author":"HK Lee","year":"2005","unstructured":"Lee HK, Kim HJ, Kwon KR, Lee JK (2005) ROI medical image watermarking using dwt and bit-plane. Asia-Pacific Conference on Communications, Perth, Western Australia, pp. 3\u20135"},{"issue":"19, 9","key":"4215_CR17","doi-asserted-by":"crossref","first-page":"3349","DOI":"10.1016\/j.ins.2009.05.022","volume":"179","author":"TC Lin","year":"2009","unstructured":"Lin TC, Lin CM (2009) Wavelet-based copyright-protection scheme for digital images based on local features. Inf Sci 179(19, 9):3349\u20133358","journal-title":"Inf Sci"},{"issue":"4","key":"4215_CR18","doi-asserted-by":"crossref","first-page":"898","DOI":"10.1109\/TSP.2003.809385","volume":"51","author":"R Malvar","year":"2003","unstructured":"Malvar R, Florencio D (2003) Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans Signal Process 51(4):898\u2013905","journal-title":"IEEE Trans Signal Process"},{"key":"4215_CR19","doi-asserted-by":"crossref","unstructured":"Memon NA, Gilani SAM, Ali A (2009a) Watermarking of chest CT scan medical images for content authentication. In: ICICT, pp 175\u2013180","DOI":"10.1109\/ICICT.2009.5268167"},{"key":"4215_CR20","doi-asserted-by":"crossref","unstructured":"Memon NA, Gilani SAM, Qayoom S (2009b) Multiple watermarking of medical images for content authentication and recovery. In: IEEE:13th International, INMIC. pp. 1\u20136 14\u201315","DOI":"10.1109\/INMIC.2009.5383112"},{"key":"4215_CR21","doi-asserted-by":"crossref","unstructured":"Planitz BM, Maeder AJ (2005) A study of block-based medical image watermarking using a perceptual similarity metric. In: Proceedings in DICTA","DOI":"10.1109\/DICTA.2005.7"},{"key":"4215_CR22","first-page":"372","volume":"194","author":"S Ramly","year":"2011","unstructured":"Ramly S, Aljunid SA, Hussain HS (2011) SVM-SS watermarking model for medical images. CCIS 194:372\u2013386","journal-title":"CCIS"},{"key":"4215_CR23","unstructured":"Rathi SC, Inamdar VS (2012) Medical images authentication through watermarking preserving ROI. Health Informatics-An Int J (HIIJ) 1(1):27\u201342"},{"issue":"3","key":"4215_CR24","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1016\/S0165-1684(98)00012-7","volume":"66","author":"JJKO Ruanaidh","year":"1997","unstructured":"Ruanaidh JJKO, Pun T (1997) Rotation, scale and translation invariant digital image watermarking. Signal Process 66(3) 28 May 1998:303\u2013317","journal-title":"Signal Process"},{"issue":"3","key":"4215_CR25","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1109\/TIM.2007.911585","volume":"57","author":"J Sang","year":"2008","unstructured":"Sang J, Alam MS (2008) Fragility and robustness of binary-phase-only filter-based fragile\/semifragile digital image watermarking. IEEE Trans on Instrum Meas 57(3):595\u2013606","journal-title":"IEEE Trans on Instrum Meas"},{"key":"4215_CR26","unstructured":"Seetha M, MuraliKrishna IV, Deekshatulu BL (2007) Comparison of advanced techniques of image classification. Map World Forum"},{"key":"4215_CR27","unstructured":"Shao Y, Chen W, Liu C (2008) Multiwavelet-based digital watermarking with support vector machine technique. In: CCDC"},{"key":"4215_CR28","doi-asserted-by":"crossref","unstructured":"Sharma A, Singh AK, Ghrera SP (2016) Robust and Secure Multiple Watermarking for Medical Images. Wirel Pers Commun","DOI":"10.1007\/s11277-016-3625-x"},{"key":"4215_CR29","unstructured":"Singh AP, Mishra A (2011) Wavelet Based Watermarking on Digital Image. Indian J Comput Sci Eng"},{"key":"4215_CR30","first-page":"591","volume":"2","author":"HV Singh","year":"2010","unstructured":"Singh HV, Gangwar SP, Yadav R (2010) Emerging trends in transformed based image compression-a review. International Journal of Information Science & Application 2:591\u2013595","journal-title":"International Journal of Information Science & Application"},{"key":"4215_CR31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.7763\/IJET.2012.V4.309","volume":"4","author":"HV Singh","year":"2012","unstructured":"Singh HV, Gangwar SP, Yadav R (2012) Study and analysis of wavelet based image compression techniques. Int J Eng Sci Technol 4:1\u20137","journal-title":"Int J Eng Sci Technol"},{"key":"4215_CR32","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1504\/IJESDF.2013.058655","volume":"5","author":"HV Singh","year":"2013","unstructured":"Singh HV, Yadav S, Mohan A (2013) Intellectual property right protection of image data using DCT and spread Spectrum-based watermarking. International Journal of Electronic Security and Digital Forensics 5:218\u2013228","journal-title":"International Journal of Electronic Security and Digital Forensics"},{"key":"4215_CR33","doi-asserted-by":"crossref","first-page":"1415","DOI":"10.1007\/s11277-014-2091-6","volume":"80","author":"AK Singh","year":"2014","unstructured":"Singh AK, Kumar B, Dave M, Mohan A (2014a) Robust and imperceptible dual watermarking for telemedicine applications. Wirel Pers Commun 80:1415\u20131433","journal-title":"Wirel Pers Commun"},{"key":"4215_CR34","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/s40012-014-0052-6","volume":"2","author":"HV Singh","year":"2014","unstructured":"Singh HV, Singh AK, Yadav S, Mohan A (2014b) DCT based secure data hiding for intellectual property right protection. CSI Transactions on ICT 2:163\u2013168","journal-title":"CSI Transactions on ICT"},{"key":"4215_CR35","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1166\/jmihi.2015.1407","volume":"5","author":"AK Singh","year":"2015","unstructured":"Singh AK, Dave M, Mohan A (2015a) Robust and secure multiple watermarking in wavelet domain. Journal of Medical Imaging and Health Informatics 5:406\u2013414","journal-title":"Journal of Medical Imaging and Health Informatics"},{"key":"4215_CR36","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1166\/jmihi.2015.1432","volume":"5","author":"AK Singh","year":"2015","unstructured":"Singh AK, Kumar B, Dave M, Mohan A (2015b) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. Journal of Medical Imaging and Health Informatics 5:607\u2013614","journal-title":"Journal of Medical Imaging and Health Informatics"},{"key":"4215_CR37","doi-asserted-by":"crossref","unstructured":"Singh A K, Dave M, Mohan A (2015c) Multilevel Encrypted Text Watermarking on Medical Images Using Spread-Spectrum in DWT Domain. Wirel Pers Commun","DOI":"10.1007\/s11277-015-2505-0"},{"key":"4215_CR38","doi-asserted-by":"crossref","unstructured":"Tiwari N, Ramaiya MK, Sharma M (2013) Digital watermarking using DWT and DES. Advance Computing Conference (IACC), IEEE 3rd International","DOI":"10.1109\/IAdCC.2013.6514380"},{"issue":"2","key":"4215_CR39","doi-asserted-by":"crossref","first-page":"550","DOI":"10.1016\/j.ins.2006.05.002","volume":"177","author":"HH Tsai","year":"2007","unstructured":"Tsai HH, Sun DW (2007) Color image watermark extraction based on support vector machines. Inf Sci 177(2):550\u2013569","journal-title":"Inf Sci"},{"key":"4215_CR40","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","volume":"34","author":"RZ Wang","year":"2003","unstructured":"Wang RZ, Lin CF, Lin JC (2003) Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recogn 34:671\u2013683","journal-title":"Pattern Recogn"},{"issue":"4","key":"4215_CR41","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Processing 13(4):600\u2013612","journal-title":"IEEE Trans Image Processing"},{"issue":"1","key":"4215_CR42","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/TIM.2009.2022453","volume":"59","author":"HT Wu","year":"2010","unstructured":"Wu HT, Cheung YM (2010) Reversible watermarking by modulation and security enhancement. IEEE Trans Instrum Meas 59(1):221\u2013228","journal-title":"IEEE Trans Instrum Meas"},{"issue":"2","key":"4215_CR43","first-page":"141","volume":"9","author":"SH Yen","year":"2006","unstructured":"Yen SH, Wang CJ (2006) SVM based watermarking technique. Tamkang Journal of Science and Engineering 9(2):141\u2013150","journal-title":"Tamkang Journal of Science and Engineering"},{"key":"4215_CR44","unstructured":"Zain J, Clarke M (2005) Security in telemedicine: issues in watermarking medical images. In: 3rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications, Tunisia"},{"key":"4215_CR45","doi-asserted-by":"crossref","unstructured":"Zear A, Singh A K, Kumar P (2016a) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools and Applications","DOI":"10.1007\/s11042-016-3862-8"},{"key":"4215_CR46","unstructured":"Zear A, Singh AK, Kumar P (2016b) Multiple Watermarking for Healthcare Applications. J Intell Syst"},{"key":"4215_CR47","doi-asserted-by":"crossref","unstructured":"Zhou Y, Jin W (2012) A robust digital image multi-watermarking scheme in the dwt domain. International Conference on Techniques and Informatics (ICSAI 2012)","DOI":"10.1109\/ICSAI.2012.6223407"},{"key":"4215_CR48","unstructured":"Zhou Z, Tang B, Liu X (2006) A block svd based image watermarking method. Proceedings of the 6th World Congress on Intelligent Control and Automation, Dalian, China"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-4215-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-4215-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-4215-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T03:32:11Z","timestamp":1568691131000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-4215-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,3]]},"references-count":48,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2017,9]]}},"alternative-id":["4215"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-4215-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,3]]}}}