{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T19:41:02Z","timestamp":1771962062191,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T00:00:00Z","timestamp":1584057600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T00:00:00Z","timestamp":1584057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-020-08814-9","type":"journal-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T21:02:47Z","timestamp":1584133367000},"page":"16549-16564","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":84,"title":["Medical image watermarking for ownership &amp; tamper detection"],"prefix":"10.1007","volume":"80","author":[{"given":"Hanan S.","family":"Alshanbari","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,13]]},"reference":[{"issue":"2","key":"8814_CR1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.4018\/IJAEC.2015040104","volume":"6","author":"NR Nayak","year":"2015","unstructured":"Nayak NR, Mishra BK, Rath AK, Swain S (2015) Improving the efficiency of color image segmentation using an enhanced clustering methodology. International Journal of Applied Evolutionary Computation (IJAEC) 6(2):50\u201362","journal-title":"International Journal of Applied Evolutionary Computation (IJAEC)"},{"issue":"1","key":"8814_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-007-0154-3","volume":"39","author":"A Haouzia","year":"2008","unstructured":"Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. Multimed Tools Appl 39(1):1\u201346","journal-title":"Multimed Tools Appl"},{"key":"8814_CR3","doi-asserted-by":"crossref","unstructured":"Fatema, M., Maheshkar, V., Maheshkar, S., & Agarwal, G. (2018, August). Tamper detection using fragile image watermarking based on chaotic system. In international conference on wireless intelligent and distributed environment for communication (pp. 1-11). Springer, Cham.","DOI":"10.1007\/978-3-319-75626-4_1"},{"issue":"1","key":"8814_CR4","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1016\/j.ijleo.2013.06.082","volume":"125","author":"M Ali","year":"2014","unstructured":"Ali M, Ahn CW, Pant M (2014) A robust image watermarking technique using SVD and differential evolution in DCT domain. Optik-International Journal for Light and Electron Optics 125(1):428\u2013434","journal-title":"Optik-International Journal for Light and Electron Optics"},{"issue":"4","key":"8814_CR5","doi-asserted-by":"publisher","first-page":"043004","DOI":"10.1117\/1.2137650","volume":"14","author":"E Ganic","year":"2005","unstructured":"Ganic E, Eskicioglu AM (2005) Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition. Journal of electronic imaging 14(4):043004\u2013043004","journal-title":"Journal of electronic imaging"},{"key":"8814_CR6","doi-asserted-by":"crossref","unstructured":"Rastegar, S., Namazi, F., Yaghmaie, K., & Aliabadian, A. (2011). Hybrid watermarking algorithm based on singular value decomposition and radon transform. AEU-international journal of electronics and Communications,65(7), 658-663.","DOI":"10.1016\/j.aeue.2010.09.008"},{"issue":"1","key":"8814_CR7","first-page":"274","volume":"9","author":"IA Ansari","year":"2018","unstructured":"Ansari IA, Pant M (2018) Quality assured and optimized image watermarking using artificial bee colony. International Journal of System Assurance Engineering and Management 9(1):274\u2013286","journal-title":"International Journal of System Assurance Engineering and Management"},{"issue":"2","key":"8814_CR8","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/s10278-015-9822-4","volume":"29","author":"G Badshah","year":"2016","unstructured":"Badshah G, Liew SC, Zain JM, Ali M (2016) Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique. J Digit Imaging 29(2):216\u2013225","journal-title":"J Digit Imaging"},{"key":"8814_CR9","doi-asserted-by":"crossref","unstructured":"Dugad, R., Ratakonda, K., & Ahuja, N. (1998). A new wavelet-based scheme for watermarking images. In image processing, 1998. ICIP 98. Proceedings. 1998 international conference on (Vol. 2, pp. 419-423). IEEE.","DOI":"10.1109\/ICIP.1998.723406"},{"issue":"5","key":"8814_CR10","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1109\/41.954550","volume":"48","author":"MS Hsieh","year":"2001","unstructured":"Hsieh MS, Tseng DC, Huang YH (2001) Hiding digital watermarks using multiresolution wavelet transform. IEEE Trans Ind Electron 48(5):875\u2013882","journal-title":"IEEE Trans Ind Electron"},{"issue":"10","key":"8814_CR11","first-page":"1620","volume":"26","author":"N Shao-Zhang","year":"2004","unstructured":"Shao-Zhang N, Xin-Xin N, Yi-Xian Y (2004) Digital watermarking algorithm based on LU decomposition. Journal of Electronics & Information Technology 26(10):1620\u20131625","journal-title":"Journal of Electronics & Information Technology"},{"issue":"5","key":"8814_CR12","doi-asserted-by":"publisher","first-page":"1354","DOI":"10.3906\/elk-1212-75","volume":"22","author":"O Jane","year":"2014","unstructured":"Jane O, ELBA\u015eI E (2014) A new approach of nonblind watermarking methods based on DWT and SVD via LU decomposition. Turkish Journal of Electrical Engineering & Computer Sciences 22(5):1354\u20131366","journal-title":"Turkish Journal of Electrical Engineering & Computer Sciences"},{"issue":"4","key":"8814_CR13","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1109\/TIFS.2008.2004288","volume":"3","author":"C Zhang","year":"2008","unstructured":"Zhang C, Cheng LL, Qiu Z, Cheng LM (2008) Multipurpose watermarking based on multiscale curvelet transform. IEEE Transactions on Information Forensics and Security 3(4):611\u2013619","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"8814_CR14","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/TIFS.2009.2035975","volume":"5","author":"L Luo","year":"2010","unstructured":"Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010 Mar) Reversible image watermarking using interpolation technique. IEEE Transactions on information forensics and security 5(1):187\u2013193","journal-title":"IEEE Transactions on information forensics and security"},{"key":"8814_CR15","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.dsp.2014.12.005","volume":"38","author":"R Thabit","year":"2015","unstructured":"Thabit R, Khoo BE (2015) A new robust lossless data hiding scheme and its application to color medical images. Digital Signal Processing 38:77\u201394","journal-title":"Digital Signal Processing"},{"issue":"3","key":"8814_CR16","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1166\/jmihi.2015.1432","volume":"5","author":"AK Singh","year":"2015","unstructured":"Singh AK, Kumar B, Dave M, Mohan A (2015) Multiple watermarking on medical images using selective discrete wavelet transform coefficients. Journal of Medical Imaging and Health Informatics 5(3):607\u2013614","journal-title":"Journal of Medical Imaging and Health Informatics"},{"key":"8814_CR17","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.bspc.2016.05.005","volume":"29","author":"A Ro\u010dek","year":"2016","unstructured":"Ro\u010dek A, Slav\u00ed\u010dek K, Dost\u00e1l O, Javorn\u00edk M (2016) A new approach to fully-reversible watermarking in medical imaging with breakthrough visibility parameters. Biomedical Signal Processing and Control 29:44\u201352","journal-title":"Biomedical Signal Processing and Control"},{"issue":"17","key":"8814_CR18","doi-asserted-by":"publisher","first-page":"18001","DOI":"10.1007\/s11042-016-3680-z","volume":"76","author":"IA Ansari","year":"2017","unstructured":"Ansari IA, Pant M, Ahn CW (2017) Artificial bee colony optimized robust-reversible image watermarking. Multimed Tools Appl 76(17):18001\u201318025","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"8814_CR19","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1007\/s13369-017-2898-z","volume":"43","author":"Z Zhang","year":"2018","unstructured":"Zhang Z, Wu L, Gao S, Sun H, Yan Y (2018) Robust reversible watermarking algorithm based on RIWT and compressed sensing. Arab J Sci Eng 43(2):979\u2013992","journal-title":"Arab J Sci Eng"},{"key":"8814_CR20","doi-asserted-by":"publisher","first-page":"13213","DOI":"10.1109\/ACCESS.2018.2803301","volume":"6","author":"M Ishtiaq","year":"2018","unstructured":"Ishtiaq M, Ali W, Shahzad W, Jaffar MA, Nam Y (2018) Hybrid predictor based four-phase adaptive reversible watermarking. IEEE Access 6:13213\u201313230","journal-title":"IEEE Access"},{"key":"8814_CR21","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.image.2017.10.003","volume":"60","author":"C Qin","year":"2018","unstructured":"Qin C, He Z, Yao H, Cao F, Gao L (2018) Visible watermark removal scheme based on reversible data hiding and image inpainting. Signal Process Image Commun 60:160\u2013172","journal-title":"Signal Process Image Commun"},{"issue":"3","key":"8814_CR22","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/s10278-016-9930-9","volume":"30","author":"HL Khor","year":"2017","unstructured":"Khor HL, Liew SC, Zain JM (2017) Region of interest-based tamper detection and lossless recovery watermarking scheme (ROI-DR) on ultrasound medical images. J Digit Imaging 30(3):328\u2013349","journal-title":"J Digit Imaging"},{"key":"8814_CR23","doi-asserted-by":"publisher","first-page":"28031","DOI":"10.1109\/ACCESS.2018.2875923","volume":"7","author":"B Feng","year":"2019","unstructured":"Feng B, Yu B, Bei Y, Duan X (2019) A reversible watermark with a new overflow solution. IEEE Access 7:28031\u201328043. https:\/\/doi.org\/10.1109\/ACCESS.2018.2875923","journal-title":"IEEE Access"},{"issue":"4","key":"8814_CR24","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1007\/s11042-016-3862-8","volume":"77","author":"A Zear","year":"2018","unstructured":"Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863\u20134882","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"8814_CR25","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1109\/TCSVT.2016.2633878","volume":"28","author":"XL Liu","year":"2016","unstructured":"Liu XL, Lin CC, Yuan SM (2016) Blind dual watermarking for color images authentication and copyright protection. IEEE Transactions on Circuits and Systems for Video Technology 28(5):1047\u20131055","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"3","key":"8814_CR26","first-page":"598","volume":"4","author":"D Gupta","year":"2015","unstructured":"Gupta D, Choubey S (2015) Discrete wavelet transform for image processing. International Journal of Emerging Technology and Advanced Engineering 4(3):598\u2013602","journal-title":"International Journal of Emerging Technology and Advanced Engineering"},{"issue":"3","key":"8814_CR27","first-page":"449","volume":"8","author":"AA Blessie","year":"2011","unstructured":"Blessie AA, Nalini J, Ramesh SC (2011) Image compression using wavelet transform based on the lifting scheme and its implementation. International Journal of Computer Science Issues (IJCSI) 8(3):449","journal-title":"International Journal of Computer Science Issues (IJCSI)"},{"issue":"3","key":"8814_CR28","first-page":"1","volume":"1","author":"YS Bute","year":"2012","unstructured":"Bute YS, Jasutkar RW (2012) Implementation of discrete wavelet transform processor for image compression. Int J Comp Sci Netw 1(3):1\u20135","journal-title":"Int J Comp Sci Netw"},{"issue":"2","key":"8814_CR29","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/TAC.1980.1102314","volume":"25","author":"V Klema","year":"1980","unstructured":"Klema V, Laub A (1980) The singular value decomposition: its computation and some applications. IEEE Trans Autom Control 25(2):164\u2013176","journal-title":"IEEE Trans Autom Control"},{"issue":"1","key":"8814_CR30","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/TASSP.1976.1162766","volume":"24","author":"H Andrews","year":"1976","unstructured":"Andrews H, Patterson C (1976) Singular value decompositions and digital image processing. IEEE Trans Acoust Speech Signal Process 24(1):26\u201353","journal-title":"IEEE Trans Acoust Speech Signal Process"},{"key":"8814_CR31","doi-asserted-by":"crossref","unstructured":"Mendel, F., Pramstaller, N., Rechberger, C., & Rijmen, V. (2006). Analysis of step-reduced SHA-256. In international workshop on fast software encryption (pp. 126-143). Springer, Berlin, Heidelberg","DOI":"10.1007\/11799313_9"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08814-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-08814-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-08814-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,19]],"date-time":"2021-05-19T15:51:14Z","timestamp":1621439474000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-08814-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,13]]},"references-count":31,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["8814"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-08814-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,13]]},"assertion":[{"value":"19 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}