{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T19:41:02Z","timestamp":1771962062768,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11042-020-09941-z","type":"journal-article","created":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T18:02:27Z","timestamp":1601316147000},"page":"4307-4325","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["Multi-level security of medical images based on encryption and watermarking for telemedicine applications"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0645-6266","authenticated-orcid":false,"given":"Rohit","family":"Thanki","sequence":"first","affiliation":[]},{"given":"Ashish","family":"Kothari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,28]]},"reference":[{"key":"9941_CR1","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.measurement.2019.02.069","volume":"139","author":"S Arunkumar","year":"2019","unstructured":"Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N, Logesh R (2019) SVD-based robust image Steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement. 139:426\u2013437","journal-title":"Measurement."},{"key":"9941_CR2","doi-asserted-by":"crossref","unstructured":"Ashour AS, Dey N (2017) Security of multimedia contents: A brief. In Intelligent Techniques in Signal Processing for Multimedia Security (pp. 3\u201314). Springer, Cham","DOI":"10.1007\/978-3-319-44790-2_1"},{"issue":"4","key":"9941_CR3","doi-asserted-by":"publisher","first-page":"38","DOI":"10.11648\/j.ijiis.20180704.11","volume":"7","author":"S Babu","year":"2019","unstructured":"Babu S, Kapinaiah V (2019) Medical image authentication using quartic digital signature algorithm. International Journal of Intelligent Information Systems 7(4):38\u201341","journal-title":"International Journal of Intelligent Information Systems"},{"key":"9941_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijigsp.2015.03.01","volume":"3","author":"S Banerjee","year":"2015","unstructured":"Banerjee S, Chakraborty S, Dey N, Pal AK, Ray R (2015) High payload watermarking using a residue number system. International Journal of Image, Graphics and Signal Processing 3:1\u20138","journal-title":"International Journal of Image, Graphics and Signal Processing"},{"key":"9941_CR5","doi-asserted-by":"crossref","unstructured":"Borra S, Lakshmi HR (2015) Visual cryptography based lossless watermarking for sensitive images. In International Conference on Swarm, evolutionary, and memetic computing (pp. 29-39). Springer, Cham","DOI":"10.1007\/978-3-319-48959-9_3"},{"key":"9941_CR6","doi-asserted-by":"crossref","unstructured":"Borra S, Thanki R (2019) Crypto-watermarking scheme for tamper detection of medical images. Computer Methods in Biomechanics and Biomedical Engineering: Imaging & Visualization, 1\u201311","DOI":"10.1080\/21681163.2019.1595730"},{"issue":"2","key":"9941_CR7","doi-asserted-by":"publisher","first-page":"13","DOI":"10.4018\/IJDCF.2019040102","volume":"11","author":"S Borra","year":"2019","unstructured":"Borra S, Thanki R (2019) A FRT-SVD based blind medical watermarking technique for telemedicine applications. Int J Digit Crime Foren (IJDCF) 11(2):13\u201333","journal-title":"Int J Digit Crime Foren (IJDCF)"},{"key":"9941_CR8","unstructured":"Cox IJ, Miller ML, Bloom JA (2000) Watermarking applications and their properties. In Information Technology: Coding and Computing, 2000. Proceedings. International Conference on (pp. 6-10). IEEE"},{"key":"9941_CR9","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.displa.2018.04.002","volume":"55","author":"C Kim","year":"2018","unstructured":"Kim C, Shin D, Leng L, Yang CN (2018) Separable reversible data hiding in encrypted halftone image. Displays 55:71\u201379","journal-title":"Displays"},{"issue":"1","key":"9941_CR10","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11554-016-0641-8","volume":"14","author":"C Kim","year":"2018","unstructured":"Kim C, Shin D, Leng L, Yang CN (2018) Lossless data hiding for absolute moment block truncation coding using histogram modification. J Real-Time Image Proc 14(1):101\u2013114","journal-title":"J Real-Time Image Proc"},{"key":"9941_CR11","doi-asserted-by":"crossref","unstructured":"Kutter M, Petitcolas FA (1999) Fair benchmark for image watermarking systems. In Security and Watermarking of Multimedia Contents (Vol. 3657, pp. 226-240). International Society for Optics and Photonics","DOI":"10.1117\/12.344672"},{"issue":"17","key":"9941_CR12","first-page":"2543","volume":"5","author":"L Leng","year":"2010","unstructured":"Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain. Int J Phys Sci 5(17):2543\u20132554","journal-title":"Int J Phys Sci"},{"key":"9941_CR13","doi-asserted-by":"crossref","unstructured":"Leng L, Zhang J, Chen G, Khan MK, Alghathbar K (2011) Two-directional two-dimensional random projection and its variations for face and palmprint recognition. In International conference on computational science and its applications (pp. 458-470). Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-21934-4_37"},{"key":"9941_CR14","doi-asserted-by":"crossref","unstructured":"Leng L, Zhang S, Bi X, Khan MK (2012) Two-dimensional cancelable biometric scheme. In 2012 International Conference on Wavelet Analysis and Pattern Recognition (pp. 164-169). IEEE","DOI":"10.1109\/ICWAPR.2012.6294772"},{"issue":"1","key":"9941_CR15","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s11042-015-3058-7","volume":"76","author":"L Leng","year":"2017","unstructured":"Leng L, Li M, Kim C, Bi X (2017) Dual-source discrimination power analysis for multi-instance contactless palmprint recognition. Multimed Tools Appl 76(1):333\u2013354","journal-title":"Multimed Tools Appl"},{"key":"9941_CR16","unstructured":"Li M, Liang T, He YJ (2013) Arnold transform based image scrambling method. In: 3rd International Conference on Multimedia Technology. Atlantis Press, China,\u00a0pp 1302\u20131309"},{"key":"9941_CR17","unstructured":"Medical Image Database. Available: https:\/\/medpix.nlm.nih.gov\/. Last Access Year: 2017"},{"issue":"9","key":"9941_CR18","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1109\/LGRS.2016.2581172","volume":"13","author":"V Menon","year":"2016","unstructured":"Menon V, Du Q, Fowler JE (2016) Fast SVD with random Hadamard projection for hyperspectral dimensionality reduction. IEEE Geosci Remote Sens Lett 13(9):1275\u20131279","journal-title":"IEEE Geosci Remote Sens Lett"},{"key":"9941_CR19","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1016\/j.future.2019.01.008","volume":"95","author":"S Pirbhulal","year":"2019","unstructured":"Pirbhulal S, Samuel OW, Wu W, Sangaiah AK, Li G (2019) A joint resource-aware and medical data security framework for wearable healthcare systems. Futur Gener Comput Syst 95:382\u2013391","journal-title":"Futur Gener Comput Syst"},{"key":"9941_CR20","doi-asserted-by":"crossref","unstructured":"Priya S, Santhi B (2019) A novel visual medical image encryption for secure transmission of authenticated watermarked medical images. Mobile Networks and Applications, 1\u20138","DOI":"10.1007\/s11036-019-01213-x"},{"issue":"3","key":"9941_CR21","doi-asserted-by":"publisher","first-page":"3577","DOI":"10.1007\/s11042-016-3902-4","volume":"76","author":"S Roy","year":"2017","unstructured":"Roy S, Pal AK (2017) A robust blind hybrid image watermarking scheme in RDWT-DCT domain using Arnold scrambling. Multimed Tools Appl 76(3):3577\u20133616","journal-title":"Multimed Tools Appl"},{"key":"9941_CR22","doi-asserted-by":"crossref","unstructured":"Singh, A. K., Kumar, B., Singh, G., & Mohan, A. (Eds.). (2017). Medical image watermarking: techniques and applications. Springer","DOI":"10.1007\/978-3-319-57699-2"},{"key":"9941_CR23","doi-asserted-by":"crossref","unstructured":"Singh S, Singh R, Singh AK, Siddiqui TJ (2018) SVD-DCT based medical image watermarking in NSCT domain. In Quantum Computing: An Environment for Intelligent Large-Scale Real Application (pp. 467\u2013488). Springer, Cham","DOI":"10.1007\/978-3-319-63639-9_20"},{"issue":"1069","key":"9941_CR24","first-page":"375","volume":"24","author":"J Suckling","year":"1994","unstructured":"Suckling J (1994) The mammographic image analysis society digital mammogram database. Exerpta Medica. Int Congr Ser 24(1069):375\u2013378","journal-title":"Int Congr Ser"},{"issue":"1","key":"9941_CR25","first-page":"1","volume":"5","author":"B Surekha","year":"2011","unstructured":"Surekha B, Swamy GN (2011) A spatial domain public image watermarking. International Journal of Security and Its Applications 5(1):1\u201312","journal-title":"International Journal of Security and Its Applications"},{"key":"9941_CR26","unstructured":"Thakur S, Singh AK, Ghrera SP, Mohan A (2018) Chaotic based secure watermarking approach for medical images. Multimedia Tools and Applications, 1\u201314"},{"issue":"3","key":"9941_CR27","doi-asserted-by":"publisher","first-page":"3457","DOI":"10.1007\/s11042-018-6263-3","volume":"78","author":"S Thakur","year":"2019","unstructured":"Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 78(3):3457\u20133470","journal-title":"Multimed Tools Appl"},{"key":"9941_CR28","first-page":"92","volume":"40","author":"R Thanki","year":"2018","unstructured":"Thanki R, Borra S (2018) A color image steganography in hybrid FRT\u2013DWT domain. J inform secur appl 40:92\u2013102","journal-title":"J inform secur appl"},{"key":"9941_CR29","doi-asserted-by":"crossref","unstructured":"Thanki R, Borra S (2018) Fragile watermarking for copyright authentication and tamper detection of medical images using compressive sensing (CS) based encryption and contourlet domain processing. Multimedia Tools and Applications, 1\u201320","DOI":"10.1007\/s11042-018-6746-2"},{"key":"9941_CR30","doi-asserted-by":"crossref","unstructured":"Thanki, R., & Borra, S. (2019). Medical imaging and its security in telemedicine applications. Springer International Publishing","DOI":"10.1007\/978-3-319-93311-5"},{"key":"9941_CR31","doi-asserted-by":"crossref","unstructured":"Thanki RM, Kothari AM (2017) Digital watermarking: technical art of hiding a message. Intelligent analysis of multimedia information (pp. 431\u2013466). IGI global","DOI":"10.4018\/978-1-5225-0498-6.ch016"},{"issue":"4","key":"9941_CR32","first-page":"1366","volume":"20","author":"R Thanki","year":"2017","unstructured":"Thanki R, Borra S, Dwivedi V, Borisagar K (2017) An efficient medical image watermarking scheme based on FDCuT\u2013DCT. Eng Sci Technol Int J 20(4):1366\u20131379","journal-title":"Eng Sci Technol Int J"},{"key":"9941_CR33","unstructured":"University of South Carolina SIPI Image Database: http:\/\/sipi.usc.edu\/database\/database.php, Last Access Year: 2017"},{"issue":"2","key":"9941_CR34","first-page":"31","volume":"1","author":"Y Wu","year":"2011","unstructured":"Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT) 1(2):31\u201338","journal-title":"Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT)"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09941-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09941-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09941-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T23:55:07Z","timestamp":1632786907000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09941-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9941"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09941-z","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,28]]},"assertion":[{"value":"30 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}