{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T16:13:02Z","timestamp":1744215182046,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T00:00:00Z","timestamp":1599696000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T00:00:00Z","timestamp":1599696000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001843","name":"Science and Engineering Research Board","doi-asserted-by":"publisher","award":["XXX"],"award-info":[{"award-number":["XXX"]}],"id":[{"id":"10.13039\/501100001843","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11042-020-09732-6","type":"journal-article","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T21:02:22Z","timestamp":1599771742000},"page":"2009-2030","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Embedding in medical images with contrast enhancement and tamper detection capability"],"prefix":"10.1007","volume":"80","author":[{"given":"Shifa","family":"Showkat","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5983-0912","authenticated-orcid":false,"given":"Shabir A.","family":"Parah","sequence":"additional","affiliation":[]},{"given":"Solihah","family":"Gull","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,10]]},"reference":[{"key":"9732_CR1","doi-asserted-by":"crossref","unstructured":"AM Alattar (2003). \u201cReversible watermark using difference expansion of triplets\u201d, in: Proceedings IEEE International Conference on Image Processing. Barcelona, Spain, pp.501\u2013504","DOI":"10.1109\/ICIP.2003.1247008"},{"key":"9732_CR2","unstructured":"AM Alattar (2004). \u201cReversible watermark using difference expansion of quads\u201d, IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP\u201904), vol. 3, pp. iii \u2212377"},{"issue":"8","key":"9732_CR3","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"AM Alattar","year":"2004","unstructured":"Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147\u20131156","journal-title":"IEEE Trans Image Process"},{"key":"9732_CR4","unstructured":"JM Barton (1997). \u201cMethod and apparatus for embedding authentication information within digital data,\u201d U.S. Patent No. 5,646,997"},{"key":"9732_CR5","doi-asserted-by":"crossref","unstructured":"Y Fang, K Ma, Z Wang, W Lin (2014). \u201cNo-Reference Quality Assessment of Contrast-Distorted Images Based on Natural Scene Statistics\u201d, IEEE Signal Processing Letters 22, no.7, pp. 838\u2013842","DOI":"10.1109\/LSP.2014.2372333"},{"issue":"11","key":"9732_CR6","doi-asserted-by":"publisher","first-page":"2078","DOI":"10.1109\/LSP.2015.2459055","volume":"22","author":"G Gao","year":"2015","unstructured":"Gao G, Shi YQ (2015) Reversible data hiding using controlled contrast enhancement and integer wavelet transform. IEEE Signal Processing Letters 22(11):2078\u20132082","journal-title":"IEEE Signal Processing Letters"},{"key":"9732_CR7","doi-asserted-by":"crossref","unstructured":"S Gull, NA Loan, SA Parah, JA Sheikh and GM Bhat (2018). \u201cAn efficient watermarking technique for tamper detection and localization of medical images\u201d, J Ambient Intell Humaniz Comput, pp.1\u201310","DOI":"10.1007\/s12652-018-1158-8"},{"key":"9732_CR8","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/j.compeleceng.2015.04.014","volume":"46","author":"J Hu","year":"2015","unstructured":"Hu J, Li T (2015) Reversible steganography using extended image interpolation technique. Comput Electr Eng 46:447\u2013455","journal-title":"Comput Electr Eng"},{"key":"9732_CR9","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.ins.2014.03.118","volume":"279","author":"A Khan","year":"2014","unstructured":"Khan A, Siddiqa A, Munib S, Malik SA (2014) A recent survey of reversible watermarking techniques. Inf Sci 279:251\u2013272","journal-title":"Inf Sci"},{"issue":"12","key":"9732_CR10","doi-asserted-by":"publisher","first-page":"3582","DOI":"10.1016\/j.patcog.2008.05.015","volume":"41","author":"CC Lin","year":"2008","unstructured":"Lin CC, Tai WL, Chang CC (2008) Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recogn 41(12):3582\u20133591","journal-title":"Pattern Recogn"},{"issue":"1","key":"9732_CR11","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/TIFS.2009.2035975","volume":"5","author":"L Luo","year":"2010","unstructured":"Luo L, Chen Z, Chen M, Zeng X, Xiong Z (2010) Reversible image watermarking using interpolation technique. IEEE Transactions on Information Forensics and Security 5(1):187\u2013193","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9732_CR12","doi-asserted-by":"crossref","unstructured":"Z Ni, YQ Shi, N Ansari and W Su (2006). \u201cReversible data hiding,\u201d IEEE Transactions on circuits and systems for video technology, IEEE, vol. 16,no. 3,pp. 354\u2013362","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"9732_CR13","doi-asserted-by":"crossref","unstructured":"SA Parah, F Ahad, JA Sheikh, NA Loan, GM Bhat (2017). \u201cPixel Repetition Technique: A High Capacity and reversible data hiding method for E-Healthcare applications\u201d. In Intelligent Techniques in Signal Processing for Multimedia Security, pp. 371\u2013398), Springer, Cham","DOI":"10.1007\/978-3-319-44790-2_17"},{"key":"9732_CR14","unstructured":"OS Pianykh (2009). \u201cDigital imaging and Communications in Medicine (DICOM): aPractical Introduction and Survival Guide\u201d, Springer Science & Business Media"},{"key":"9732_CR15","doi-asserted-by":"crossref","unstructured":"AF Qasim, F Meziane, R Aspin (2018). \u201cDigital watermarking: applicability for developing trust in medical imaging workflows state of the art review\u201d, Computer Science Review 27, Elsevier, pp 45-60","DOI":"10.1016\/j.cosrev.2017.11.003"},{"key":"9732_CR16","doi-asserted-by":"crossref","unstructured":"YQ Shi, X Li, X Zhang, HT Wu and B Ma (2016). \u201cReversible data hiding: advances in the past two decades,\u201d IEEE Access, IEEE, vol. 4, pp. 3210\u20133237","DOI":"10.1109\/ACCESS.2016.2573308"},{"key":"9732_CR17","doi-asserted-by":"crossref","unstructured":"DM Thodi and JJ Rodriguez (2004). \u201cPrediction-error based reversible watermarking,\u201d In Image Processing, ICIP\u201904. 2004 International Conference, IEEE, vol 3, pp 1549\u20131552","DOI":"10.1109\/ICIP.2004.1421361"},{"key":"9732_CR18","doi-asserted-by":"crossref","unstructured":"DM Thodi and JJ Rodr\u00edguez (2007). \u201cExpansion embedding techniques for reversible watermarking,\u201d IEEE transactions on image processing, IEEE, vol. 16, no. 3, pp. 721\u2013730","DOI":"10.1109\/TIP.2006.891046"},{"key":"9732_CR19","doi-asserted-by":"crossref","unstructured":"Tian, Jun (2003). \u201cReversible data embedding using a difference expansion,\u201d IEEE transactions on circuits and systems for video technology, IEEE, vol. 13, no. 8, pp. 890\u2013896","DOI":"10.1109\/TCSVT.2003.815962"},{"issue":"6","key":"9732_CR20","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1016\/j.sigpro.2008.12.017","volume":"89","author":"P Tsai","year":"2009","unstructured":"Tsai P, Hu YC, Yeh HL (2009) Reversible image hiding scheme using predictive coding and histogram shifting. Signal Processing 89(6):1129\u20131143","journal-title":"Signal Processing"},{"key":"9732_CR21","doi-asserted-by":"publisher","first-page":"8882","DOI":"10.1109\/ACCESS.2018.2810058","volume":"6","author":"Y Wang","year":"2018","unstructured":"Wang Y, Gong D, Lu B, Xiang F, Liu F (2018) Exception handling-based dynamic software watermarking. IEEE Access 6:8882\u20138889. https:\/\/doi.org\/10.1109\/ACCESS.2018.2810058","journal-title":"IEEE Access"},{"issue":"1","key":"9732_CR22","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/LSP.2014.2346989","volume":"22","author":"HT Wu","year":"2014","unstructured":"Wu HT, Dugelay JL, Shi YQ (2014) Reversible image data hiding with contrast enhancement. IEEE Signal Processing Letters 22(1):81\u201385","journal-title":"IEEE Signal Processing Letters"},{"key":"9732_CR23","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1016\/j.sigpro.2015.03.019","volume":"120","author":"Y Yang","year":"2016","unstructured":"Yang Y, Ming J (2016) Image quality assessment based on the space similarity decomposition model. Signal Process 120:797\u2013805","journal-title":"Signal Process"},{"key":"9732_CR24","doi-asserted-by":"crossref","unstructured":"Y Yang, W Zhang, D Liang, and N Yu (2018). \u201cA ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images,\u201d Multimedia Tools and Applications, Springer, vol. 77, no 14, pp. 18043\u201318065","DOI":"10.1007\/s11042-017-4444-0"},{"key":"9732_CR25","doi-asserted-by":"crossref","unstructured":"W Zhang, X Hu, X Li, and N Yu (2013). \u201cRecursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression,\u201d IEEE transactions on image processing, IEEE, vol. 2, no. 7, pp. 2775\u20132785","DOI":"10.1109\/TIP.2013.2257814"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09732-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09732-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09732-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T00:32:29Z","timestamp":1631233949000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09732-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,10]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9732"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09732-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2020,9,10]]},"assertion":[{"value":"23 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}