{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T02:23:58Z","timestamp":1773800638303,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T00:00:00Z","timestamp":1529280000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1007\/s11042-018-6263-3","type":"journal-article","created":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T07:11:46Z","timestamp":1529305906000},"page":"3457-3470","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":185,"title":["Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications"],"prefix":"10.1007","volume":"78","author":[{"given":"Sriti","family":"Thakur","sequence":"first","affiliation":[]},{"given":"Amit Kumar","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Satya Prakash","family":"Ghrera","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Elhoseny","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,18]]},"reference":[{"key":"6263_CR1","doi-asserted-by":"publisher","DOI":"10.1201\/b16309","volume-title":"Image encryption: a communication perspective","author":"FE Abd El-Samie","year":"2013","unstructured":"Abd El-Samie FE, Ahmed HEH, Elashry IF, Shahieen MH, Faragallah OS, El-Rabaie ESM, Alshebeili SA (2013) Image encryption: a communication perspective. CRC Press, Boca Raton"},{"issue":"2","key":"6263_CR2","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1166\/jmihi.2015.1407","volume":"5","author":"M AK Singh","year":"2015","unstructured":"AK Singh M, Dave AM (2015) Robust and secure multiple watermarking in wavelet domain. Journal of Medical Imaging and Health Informatics 5(2):406\u2013414","journal-title":"Journal of Medical Imaging and Health Informatics"},{"issue":"3","key":"6263_CR3","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1166\/jmihi.2015.1432","volume":"5","author":"B AK Singh","year":"2015","unstructured":"AK Singh B, Kumar MD, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. Journal of Medical Imaging and Health Informatics 5(3):607\u2013614","journal-title":"Journal of Medical Imaging and Health Informatics"},{"issue":"5","key":"6263_CR4","doi-asserted-by":"publisher","first-page":"7563","DOI":"10.1007\/s11042-017-4507-2","volume":"76","author":"BK AK Singh","year":"2017","unstructured":"AK Singh BK, Singh SK, Dave M, VK Singh PK, Ghrera SP, PK Gupta AM (2017) Guest Editorial: Robust and Secure Data Hiding Techniques for Telemedicine Applications. Multimedia Tools and Applications 76(5):7563\u20137573","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"6263_CR5","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/s10278-014-9709-9","volume":"27","author":"A Al-Haj","year":"2014","unstructured":"Al-Haj A (2014) Secured telemedicine using region-based watermarking with tamper localization. J Digit Imaging 27(6):737\u2013750","journal-title":"J Digit Imaging"},{"issue":"1","key":"6263_CR6","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/s10278-016-9901-1","volume":"30","author":"A Al-Haj","year":"2017","unstructured":"Al-Haj A, Mohammad A (2017) Crypto-Watermarking of Transmitted Medical Images. J Digit Imaging 30(1):26\u201338","journal-title":"J Digit Imaging"},{"issue":"7","key":"6263_CR7","doi-asserted-by":"publisher","first-page":"8375","DOI":"10.1007\/s11042-017-4738-2","volume":"77","author":"R Bakthula","year":"2018","unstructured":"Bakthula R, Shivani S, Agarwal S (2018) Self authenticating medical X-ray images for telemedicine applications. Multimedia Tools and Applications 77(7):8375\u20138392","journal-title":"Multimedia Tools and Applications"},{"issue":"9","key":"6263_CR8","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1016\/j.jss.2011.02.029","volume":"84","author":"CC Chang","year":"2011","unstructured":"Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462\u20131470","journal-title":"J Syst Softw"},{"key":"6263_CR9","unstructured":"Chauhan DS, Singh AK, Kumar B, JP Saini (2017) Quantization based multiple medical information watermarking for secure e-Health. Multimedia Tools and Applications, pp. 1\u201313"},{"key":"6263_CR10","unstructured":"Dhole VS, Patil NN (2015) Self embedding fragile watermarking for image tampering detection and image recovery using self recovery blocks. In: Proc. International Conference on Computing Communication Control and Automation (ICCUBEA), pp. 752\u2013757"},{"issue":"11","key":"6263_CR11","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1049\/iet-ipr.2013.0646","volume":"8","author":"M El\u2019Arbi","year":"2014","unstructured":"El\u2019Arbi M, Ben Amar C (2014) Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain. IET Image Process 8(11):619\u2013626","journal-title":"IET Image Process"},{"key":"6263_CR12","doi-asserted-by":"publisher","unstructured":"Elhoseny M, Ram\u00edrez-Gonz\u00e1lez G, Abu-Elnasr OM, Shawkat SA, Arunkumar N (2018) Secure Medical Data Transmission Model for IoT-based Healthcare Systems. IEEE Access. \n                    https:\/\/doi.org\/10.1109\/ACCESS.2018.2817615","DOI":"10.1109\/ACCESS.2018.2817615"},{"key":"6263_CR13","doi-asserted-by":"crossref","unstructured":"Eswaraiah R, Reddy ES (2014) Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. International journal of telemedicine and applications, pp. 13","DOI":"10.1155\/2014\/984646"},{"key":"6263_CR14","doi-asserted-by":"crossref","unstructured":"Giakoumaki A, Perakis K, Tagaris A, Koutsouris D (2006) Digital watermarking in telemedicine applications - towards enhanced data security and accessibility. In: Proceedings of the 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, New York City, pp. 6328\u20136331","DOI":"10.1109\/IEMBS.2006.260283"},{"issue":"9","key":"6263_CR15","doi-asserted-by":"publisher","first-page":"1737","DOI":"10.1016\/j.optcom.2009.12.073","volume":"283","author":"CS Hsu","year":"2010","unstructured":"Hsu CS, SF T (2010) Probability-based tampering detection scheme for digital images. Opt Commun 283(9):1737\u20131743","journal-title":"Opt Commun"},{"issue":"1","key":"6263_CR16","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s10278-007-9011-1","volume":"21","author":"W JH","year":"2008","unstructured":"JH W, Chang RF, Chen CJ, Wang CL, Kuo TH, Moon TH, Chen DR (2008) Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21(1):59\u201376","journal-title":"J Digit Imaging"},{"issue":"1","key":"6263_CR17","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1002\/ima.22086","volume":"24","author":"A Kannammal","year":"2014","unstructured":"Kannammal A, Subha Rani S (2014) Two level security for medical images using watermarking\/encryption algorithms. Int J Imaging Syst Technol 24(1):111\u2013120","journal-title":"Int J Imaging Syst Technol"},{"issue":"5","key":"6263_CR18","first-page":"223","volume":"10","author":"MI Khan","year":"2013","unstructured":"Khan MI, Rahman M, Sarker M, Hasan I (2013) Digital watermarking for image authentication based on combined DCT, DWT and SVD Transformation. Int J Comput Sci Issues 10(5):223\u2013230","journal-title":"Int J Comput Sci Issues"},{"issue":"10","key":"6263_CR19","doi-asserted-by":"publisher","first-page":"2057","DOI":"10.1080\/00207160.2010.543677","volume":"88","author":"NA Memon","year":"2011","unstructured":"Memon NA, Chaudhry A, Ahmad M, Keerio ZA (2011) Hybrid watermarking of medical images for ROI authentication and recovery. Int J Comput Math 88(10):2057\u20132071","journal-title":"Int J Comput Math"},{"key":"6263_CR20","unstructured":"NIST Releases Report on Securing Medical Records: \n                    https:\/\/cltc.berkeley.edu\/2015\/06\/30\/nist_mobile_medical_records\/"},{"issue":"22","key":"6263_CR21","doi-asserted-by":"publisher","first-page":"14381","DOI":"10.1007\/s11042-016-3536-6","volume":"75","author":"R Pandey","year":"2016","unstructured":"Pandey R, Singh AK, Kumar B, Mohan A (2016) Iris based secure NROI multiple eye image watermarking for tele-ophthalmology. Multimedia Tools and Applications 75(22):14381\u201314397","journal-title":"Multimedia Tools and Applications"},{"issue":"76","key":"6263_CR22","first-page":"10599","volume":"8","author":"SA Parah","year":"2015","unstructured":"Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2015) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimedia Tools and Applications 8(76):10599\u201310633","journal-title":"Multimedia Tools and Applications"},{"issue":"C","key":"6263_CR23","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.jbi.2017.01.006","volume":"66","author":"SA Parah","year":"2017","unstructured":"Parah SA, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: A new high capacity and reversible data hiding technique. J Biomed Inform 66(C):214\u2013230","journal-title":"J Biomed Inform"},{"key":"6263_CR24","first-page":"430","volume-title":"Crt-based fragile self-recovery watermarking scheme for image authentication and recovery","author":"B Patra","year":"2012","unstructured":"Patra B, Patra JC (2012) Crt-based fragile self-recovery watermarking scheme for image authentication and recovery. IEEE International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS), Taipei, pp 430\u2013435"},{"key":"6263_CR25","unstructured":"Pavelin A, Klapan I, Kova\u010d M, Kati\u0107 M, Stevanovi\u0107 R, Raki\u0107 M, Klapan N (2006) A Functional Telemedicine Environment in the Framework of the Croatian. Healthcare Information System. In Remote Cardiology Consultations Using Advanced Medical Technology (Applications for NATO Operations), Vol. 372, pp. 79\u201393"},{"key":"6263_CR26","doi-asserted-by":"crossref","unstructured":"Preda RO (2014) Self-recovery of unauthentic images using a new digital watermarking approach in the wavelet domain. 10th International Conference on Communications, IEEE, Bucharest, pp. 1\u20134","DOI":"10.1109\/ICComm.2014.6866744"},{"issue":"1","key":"6263_CR27","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.compeleceng.2013.10.016","volume":"40","author":"S Serikawa","year":"2014","unstructured":"Serikawa S, H L (2014) Underwater Image Dehazing Using Joint Trilateral Filter. Comput Electr Eng 40(1):41\u201350","journal-title":"Comput Electr Eng"},{"issue":"4","key":"6263_CR28","doi-asserted-by":"publisher","first-page":"1611","DOI":"10.1007\/s11277-016-3625-x","volume":"92","author":"A Sharma","year":"2017","unstructured":"Sharma A, Singh AK, Ghrera SP (2017) Robust and Secure Multiple Watermarking Technique for Medical Images. Wirel Pers Commun 92(4):1611\u20131624","journal-title":"Wirel Pers Commun"},{"issue":"1","key":"6263_CR29","doi-asserted-by":"publisher","first-page":"10269","DOI":"10.1109\/ACCESS.2018.2799240","volume":"6","author":"A Shehab","year":"2018","unstructured":"Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and Robust Fragile Watermarking Scheme for Medical Images. IEEE Access 6(1):10269\u201310278","journal-title":"IEEE Access"},{"issue":"2","key":"6263_CR30","doi-asserted-by":"publisher","first-page":"1623","DOI":"10.1007\/s11042-017-4367-9","volume":"77","author":"FY Shih","year":"2018","unstructured":"Shih FY, Zhong X, Chang IC, Satoh SI (2018) An adjustable-purpose image watermarking technique by particle swarm optimization. Multimedia Tools and Applications 77(2):1623\u20131642","journal-title":"Multimedia Tools and Applications"},{"key":"6263_CR31","unstructured":"Singh AK (2015) Some new techniques of improved wavelet domain watermarking for medical images. PhD thesis, Department of Computer Engineering, NIT Kurukshetra, Haryana, India"},{"issue":"4","key":"6263_CR32","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s40009-014-0241-8","volume":"37","author":"AK Singh","year":"2014","unstructured":"Singh AK, Dave M, Mohan A (2014) Hybrid technique for robust and imperceptible image watermarking in DWT\u2013DCT\u2013SVD domain. Natl Acad Sci Lett 37(4):351\u2013358","journal-title":"Natl Acad Sci Lett"},{"issue":"4","key":"6263_CR33","doi-asserted-by":"publisher","first-page":"1415","DOI":"10.1007\/s11277-014-2091-6","volume":"80","author":"AK Singh","year":"2015","unstructured":"Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and imperceptible dual watermarking for telemedicine applications. Wirel Pers Commun 80(4):1415\u20131433","journal-title":"Wirel Pers Commun"},{"key":"6263_CR34","doi-asserted-by":"publisher","unstructured":"Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2016) Multiple watermarking technique for securing online social network contents using back propagation neural network. Futur Gener Comput Syst:1\u201316. \n                    https:\/\/doi.org\/10.1016\/j.future.2016.11.023","DOI":"10.1016\/j.future.2016.11.023"},{"key":"6263_CR35","doi-asserted-by":"crossref","unstructured":"Singh AK, Kumar B, Singh G, Mohan A (2017) Medical Image Watermarking: Techniques and Applications\u201d, book series on Multimedia Systems and Applications, ISBN: 978\u20133319576985","DOI":"10.1007\/978-3-319-57699-2_1"},{"issue":"3","key":"6263_CR36","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/s10278-010-9295-4","volume":"24","author":"CK Tan","year":"2011","unstructured":"Tan CK, Ng JC, X X, Poh CL, Guan YL, Sheah K (2011) Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24(3):528\u2013540","journal-title":"J Digit Imaging"},{"issue":"76","key":"6263_CR37","first-page":"3669","volume":"3","author":"FN Thakkar","year":"2016","unstructured":"Thakkar FN, Srivastava VK (2016) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimedia Tools and Applications 3(76):3669\u20133697","journal-title":"Multimedia Tools and Applications"},{"issue":"2","key":"6263_CR38","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s40998-017-0021-9","volume":"41","author":"S Trivedy","year":"2017","unstructured":"Trivedy S, Pal AK (2017) A Logistic Map-Based Fragile Watermarking Scheme of Digital Images with Tamper Detection. Iranian Journal of Science and Technology, Trans Electrical Engineering 41(2):103\u2013113","journal-title":"Iranian Journal of Science and Technology, Trans Electrical Engineering"},{"key":"6263_CR39","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), pp. 31\u201338"},{"key":"6263_CR40","doi-asserted-by":"publisher","unstructured":"Y W, JP Noonan G, Yang HJ (2012) Image encryption using the two-dimensional logistic chaotic map. J Electron Imaging 21(1). \n                    https:\/\/doi.org\/10.1117\/1.JEI.21.1.013014","DOI":"10.1117\/1.JEI.21.1.013014"},{"issue":"4","key":"6263_CR41","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1007\/s11042-016-3862-8","volume":"77","author":"A Zear","year":"2018","unstructured":"Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools and Applications 77(4):4863\u20134882","journal-title":"Multimedia Tools and Applications"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6263-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6263-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6263-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T19:17:26Z","timestamp":1560799046000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6263-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,18]]},"references-count":41,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["6263"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6263-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,18]]},"assertion":[{"value":"9 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 May 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 June 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}