{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:13:11Z","timestamp":1772043191305,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T00:00:00Z","timestamp":1603670400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T00:00:00Z","timestamp":1603670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11042-020-09981-5","type":"journal-article","created":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T14:03:06Z","timestamp":1603720986000},"page":"7167-7186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":88,"title":["A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0973-5698","authenticated-orcid":false,"given":"Balasamy","family":"K","sequence":"first","affiliation":[]},{"given":"Suganyadevi","family":"S","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,26]]},"reference":[{"key":"9981_CR1","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1109\/42.996338","volume":"21","author":"MN Ahmed","year":"2012","unstructured":"Ahmed MN, Yamany SM, Mohamed N, Farag AA, Moriarty T (2012) A modified fuzzy C-means algorithm for Bias field estimation and segmentation of MRI data. IEEE Trans Med Imaging 21:193\u2013199","journal-title":"IEEE Trans Med Imaging"},{"key":"9981_CR2","doi-asserted-by":"crossref","unstructured":"A Al-Haj and A. Amer (2014) Secured telemedicine using region-based watermarking with tamper localization, J Digit Imaging, 27(6):pp.737\u2013750","DOI":"10.1007\/s10278-014-9709-9"},{"key":"9981_CR3","doi-asserted-by":"crossref","unstructured":"Balasamy K, et al (2019). An intelligent reversible watermarking system for authenticating medical images using wavelet and PSO, Cluster Computing, Springer, pp. 4431\u20134442","DOI":"10.1007\/s10586-018-1991-8"},{"key":"9981_CR4","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1016\/0031-3203(95)00120-4","volume":"29","author":"AM Bensaid","year":"2006","unstructured":"Bensaid AM, Hall LO, Bezdek JC, Clarke LP (2006) Partially supervised clustering for image segmentation. Pattern Recogn 29:859\u2013871","journal-title":"Pattern Recogn"},{"issue":"1","key":"9981_CR5","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cmpb.2011.09.015","volume":"106","author":"D Bouslimi","year":"2012","unstructured":"Bouslimi D, Coatrieux G, Roux C (2012) A joint encryption\/watermarking algorithm for verifying the reliability of medical images: application to echographic images. Comput Methods Prog Biomed 106(1):47\u201354","journal-title":"Comput Methods Prog Biomed"},{"issue":"10","key":"9981_CR6","first-page":"826","volume":"11","author":"P Campisi","year":"2004","unstructured":"Campisi P, Kundur D, Neri A (2004) Robust digital watermarking in the ridgelet domain, IEEE signal process. Lett. 11(10):826\u2013830","journal-title":"Lett."},{"key":"9981_CR7","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/S0895-6111(02)00073-3","volume":"27","author":"F Cao","year":"2003","unstructured":"Cao F, Huang HK, Zhou XQ (2003) Medical image security in a HIPAA mandated PACS environment. Comput Med Imaging Graph 27:185\u2013196","journal-title":"Comput Med Imaging Graph"},{"key":"9981_CR8","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1016\/j.future.2019.07.064","volume":"101","author":"M Cedillo-Hernandez","year":"2019","unstructured":"Cedillo-Hernandez M, Cedillo-Hernandez A, Nakano-Miyatake M, Perez-Meana H (2019) An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD. Futur Gener Comput Syst 101:1223\u20131246","journal-title":"Futur Gener Comput Syst"},{"key":"9981_CR9","doi-asserted-by":"crossref","unstructured":"S Das, MK Kundu (2011). Hybrid contourlet-DCT based robust image watermarking technique applied to medical data management, in: Proceedings of 4th International Conference on Pattern Recognition and Machine Intelligence, pp. 286\u2013292","DOI":"10.1007\/978-3-642-21786-9_47"},{"key":"9981_CR10","doi-asserted-by":"crossref","unstructured":"Eswaraiah R, Reddy ES (2014). Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. Int J Telemed Appl ,1\u201310","DOI":"10.1155\/2014\/984646"},{"key":"9981_CR11","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1016\/j.procs.2019.09.296","volume":"159","author":"M Favorskaya","year":"2019","unstructured":"Favorskaya M, Savchina E, Gusev K (2019) Feature-based synchronization correction for multilevel watermarking of medical images. Procedia Computer Science 159:1267\u20131276","journal-title":"Procedia Computer Science"},{"key":"9981_CR12","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.bspc.2018.02.007","volume":"43","author":"Y Gangadhar","year":"2018","unstructured":"Gangadhar Y, Giridhar Akula VS, Chenna Reddy P (2018) An evolutionary programming approach for ecuring medical images using watermarking scheme in invariant discrete wavelet transformation. Biomedical Signal Processing and Control 43:31\u201340","journal-title":"Biomedical Signal Processing and Control"},{"issue":"4","key":"9981_CR13","doi-asserted-by":"publisher","first-page":"043004","DOI":"10.1117\/1.2137650","volume":"14","author":"E Ganic","year":"2005","unstructured":"Ganic E, Eskicioglu AM (2005) Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition. J Electron Imaging 14(4):043004\u2013043004","journal-title":"J Electron Imaging"},{"key":"9981_CR14","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.ins.2017.01.009","volume":"385","author":"G Gao","year":"2017","unstructured":"Gao G, Wan X, Yao S, Cui Z, Zhou C, Sun X (2017) Reversible data hiding with contrast enhancement and tamper localization for medical images. Inf Sci 385:250\u2013265","journal-title":"Inf Sci"},{"issue":"4","key":"9981_CR15","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1109\/TITB.2006.875655","volume":"10","author":"A Giakoumaki","year":"2006","unstructured":"Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 10(4):722\u2013732","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"9981_CR16","unstructured":"Gunjal BL, Mali SN (2012). ROI based embedded watermarking of medical images for secured communication in telemedicine. Int J Comput Commun Eng: 293\u2013298"},{"issue":"1","key":"9981_CR17","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s10278-007-9043-6","volume":"22","author":"X Guo","year":"2009","unstructured":"Guo X, Zhuang T (2009) A region-based lossless watermarking scheme for enhancing security of medical data. J Digit Imaging 22(1):53\u201364","journal-title":"J Digit Imaging"},{"issue":"6","key":"9981_CR18","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1007\/s10278-008-9120-5","volume":"22","author":"X Guo","year":"2009","unstructured":"Guo X, Zhuang T (2009) Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digit Imaging 22(6):620\u2013628","journal-title":"J Digit Imaging"},{"issue":"4","key":"9981_CR19","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong W, Chen TS, Wu HY (2012) An improved reversible data hiding in encryptedimages using side match. IEEE Signal Process Lett 19(4):199\u2013202. https:\/\/doi.org\/10.1109\/LSP.2012.2187334","journal-title":"IEEE Signal Process Lett"},{"key":"9981_CR20","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.ins.2015.01.006","volume":"301","author":"Z Ji","year":"2015","unstructured":"Ji Z, Xia Y, Sun Q, Cao G, Chen Q (2015) Active contours driven by local likelihood image fitting energy for image segmentation. Inf Sci 301:285\u2013304","journal-title":"Inf Sci"},{"key":"9981_CR21","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1002\/mrm.21757","volume":"61","author":"H Jung","year":"2009","unstructured":"Jung H, Sung K, Nayak KS, Kim EY, Ye JC (2009) K-t focuss: a general compressed sensing framework for high resolution dynamic MRI. Magn Reson Med 61:103\u2013116","journal-title":"Magn Reson Med"},{"key":"9981_CR22","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.aeue.2015.12.003","volume":"70","author":"R Keshavarzian","year":"2016","unstructured":"Keshavarzian R, Aghagolzadeh A (2016) ROI based robust and secure image watermarking using DWT and Arnold map. Int.J.Electron.Commun.(AEU) 70:278\u2013288","journal-title":"Int.J.Electron.Commun.(AEU)"},{"key":"9981_CR23","doi-asserted-by":"publisher","unstructured":"Balasamy Krishnasamy, Balakrishnan M, Christopher A (2021). A Genetic Algorithm Based Medical Image Watermarking for Improving Robustness and Fidelity in Wavelet Domain. Intelligent Data Engineering and Analytics. Advances in Intelligent Systems and Computing, vol 1177. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-15-5679-1_27","DOI":"10.1007\/978-981-15-5679-1_27"},{"key":"9981_CR24","doi-asserted-by":"crossref","unstructured":"MK Kundu, S Das (2010). Lossless ROI medical image watermarking technique with enhanced security and high payload embedding, in: Proc. of 2010 Int. Conf. on Pattern Recognition, IEEE Computer Society, pp. 1457\u20131460","DOI":"10.1109\/ICPR.2010.360"},{"issue":"6","key":"9981_CR25","first-page":"723","volume":"37","author":"A Lavanya","year":"2012","unstructured":"Lavanya A, Natarajan V (2012) Watermarking patient data in encrypted medical images. Sadhana-Acad Proc Eng Sci 37(6):723\u2013729","journal-title":"Sadhana-Acad Proc Eng Sci"},{"key":"9981_CR26","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1016\/j.sigpro.2010.09.014","volume":"91","author":"C Li","year":"2011","unstructured":"Li C, Lo K-T (2011) Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process 91:949\u2013954","journal-title":"Signal Process"},{"key":"9981_CR27","first-page":"278","volume":"6422","author":"C-H Lin","year":"2010","unstructured":"Lin C-H, Yang C-Y, Chang C-W (2010) Authentication and protection for medical image. Berlin: Springer-Verlag 6422:278\u2013287","journal-title":"Berlin: Springer-Verlag"},{"key":"9981_CR28","doi-asserted-by":"crossref","unstructured":"X. Liu, J. Lou, H. Fang, H, Fang, L. Wang (2019) A novel robust reversible watermarking scheme for protecting authenticity and integrity of medical images, IEEE Access, vol. 7, pp. 76580\u201376598","DOI":"10.1109\/ACCESS.2019.2921894"},{"issue":"4","key":"9981_CR29","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1587\/transinf.2014ICP0001","volume":"E98-D","author":"YL Liu","year":"2015","unstructured":"Liu YL, Qu XX, Xin GJ (2015) ROI-based reversible data hiding scheme for medical images with tamper detection. IEICE Trans Inf Syst E98-D(4):769\u2013774","journal-title":"IEICE Trans Inf Syst"},{"key":"9981_CR30","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.measurement.2018.12.030","volume":"136","author":"R Mothi","year":"2019","unstructured":"Mothi R, Karthikeyan M (2019) Protection of bio medical iris image using watermarking and cryptography with WPT. Measurement 136:67\u201373","journal-title":"Measurement"},{"key":"9981_CR31","doi-asserted-by":"publisher","unstructured":"Seyed Mojtaba Mousavi & Alireza Naghsh & SAR Abu-Bakar (2015). A Heuristic Automatic and Robust ROI Detection Method for Medical Image Warermarking, J Digit Imaging, https:\/\/doi.org\/10.1007\/s10278-015-9770-z","DOI":"10.1007\/s10278-015-9770-z"},{"issue":"3","key":"9981_CR32","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1016\/j.cmpb.2010.08.016","volume":"104","author":"MS Nambakhsh","year":"2011","unstructured":"Nambakhsh MS, Ahmadian A, Zaidi H (2011) A contextual based double watermarking of PET images by patient ID and ECG signal. Comput Methods Prog Biomed 104(3):418\u2013425","journal-title":"Comput Methods Prog Biomed"},{"key":"9981_CR33","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.cmpb.2018.03.011","volume":"160","author":"W Pan","year":"2018","unstructured":"Pan W, Bouslimi D, Karasad M, Cozic M, Coatrieux G (2018) Imperceptible reversible watermarking of radiographic images based on quantum noise masking. Comput Methods Prog Biomed 160:119\u2013128","journal-title":"Comput Methods Prog Biomed"},{"key":"9981_CR34","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.cosrev.2017.11.003","volume":"27","author":"AF Qasim","year":"2018","unstructured":"Qasim AF, Meziane F, Aspin R (2018) Digital watermarking: applicability for developing trust in medical imaging workflows state of the art review. Computer Science Review 27:45\u201360","journal-title":"Computer Science Review"},{"issue":"2","key":"9981_CR35","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.jare.2015.07.002","volume":"7","author":"AG Radwan","year":"2016","unstructured":"Radwan AG, AbdElHaleem SH, Abd-El-Hafiz SK (2016) Symmetric encryption algorithms using chaotic and non-chaotic generators: a review. J Adv res (JAR) 7(2):193\u2013208","journal-title":"J Adv res (JAR)"},{"key":"9981_CR36","first-page":"155","volume":"02","author":"S Ramakrishnan","year":"2011","unstructured":"Ramakrishnan S, Gopalakrishnan T, Balasamy K (2011) SVD based robust digital watermarking for still images using wavelet transform, CCSEA 2011. CS IT 02:155\u2013167","journal-title":"CS IT"},{"issue":"7","key":"9981_CR37","first-page":"658","volume":"65","author":"S Rastegar","year":"2011","unstructured":"Rastegar S, Namazi F, Yaghmaie K, Aliabadian A (2011) Hybrid watermarking algorithm based on singular value decomposition and radon transform, AEU-Int. J Electron Commun 65(7):658\u2013663","journal-title":"J Electron Commun"},{"key":"9981_CR38","doi-asserted-by":"publisher","unstructured":"E Rayachoti, S Tirumalasetty, SC Prathipat (2020). SLT based watermarking system for secure telemedicine, Clust Comput, https:\/\/doi.org\/10.1007\/s10586-020-03078-2","DOI":"10.1007\/s10586-020-03078-2"},{"issue":"7","key":"9981_CR39","doi-asserted-by":"publisher","first-page":"1887","DOI":"10.1016\/j.cnsns.2009.07.007","volume":"15","author":"R Rhouma","year":"2010","unstructured":"Rhouma R, Solak E, Belghith S (2010) Cryptanalysis of a new substitution-diffusion based image cipher. Commun Nonlinear Sci Numer Simul 15(7):1887\u20131892","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"9981_CR40","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.aeue.2017.03.005","volume":"76","author":"P Singh","year":"2017","unstructured":"Singh P, Raman B (2017) Reversible data hiding for rightful ownership assertion of images in encrypted domain over cloud. Int J Electron Commun (AEU) 76:18\u201335","journal-title":"Int J Electron Commun (AEU)"},{"issue":"3","key":"9981_CR41","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/s10278-010-9295-4","volume":"24","author":"CK Tan","year":"2011","unstructured":"Tan CK, Ng JC, Xu XT et al (2011) Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24(3):528\u2013540","journal-title":"J Digit Imaging"},{"issue":"8","key":"9981_CR42","doi-asserted-by":"publisher","first-page":"1864","DOI":"10.1016\/j.jss.2012.02.045","volume":"85","author":"ED Tsougenis","year":"2012","unstructured":"Tsougenis ED, Papakostas GA, Koulouriotis DE, Tourassis VD (2012) Performance evaluation of moment-based watermarking methods: a review. J Syst Softw 85(8):1864\u20131884","journal-title":"J Syst Softw"},{"issue":"1","key":"9981_CR43","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s10278-009-9253-1","volume":"24","author":"OMA Wershi","year":"2011","unstructured":"Wershi OMA, Khoo BE (2011) Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging 24(1):114\u2013125","journal-title":"J Digit Imaging"},{"issue":"1","key":"9981_CR44","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s10278-007-9011-1","volume":"21","author":"JHK Wu","year":"2008","unstructured":"Wu JHK, Chang RF, Chen CJ, Wang CL, Kuo TH, Moon WK, Chen DR (2008) Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21(1):59\u201376","journal-title":"J Digit Imaging"},{"key":"9981_CR45","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.jvcir.2015.06.010","volume":"31","author":"H Wu","year":"2015","unstructured":"Wu H, Huang J, Shi Y (2015) A reversible data hiding method with contrast enhancement for medical images. J Vis Commun Image Represent 31:146\u2013153","journal-title":"J Vis Commun Image Represent"},{"key":"9981_CR46","doi-asserted-by":"publisher","first-page":"18043","DOI":"10.1007\/s11042-017-4444-0","volume":"77","author":"Y Yang","year":"2018","unstructured":"Yang Y, Zhang W, Liang D, Yu N (2018) A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images. Multimed Tools Appl 77:18043\u201318065","journal-title":"Multimed Tools Appl"},{"key":"9981_CR47","unstructured":"JM Zain, LP Baldwin, M Clarke (2004). Reversible watermarking for authentication of DICOM images, in: Proceedings of the 26th Annual International Conference on IEEE EMBS, September, pp. 3237\u20133240"},{"key":"9981_CR48","doi-asserted-by":"crossref","unstructured":"JM Zain, AM Fauzi (2006). Medical image watermarking with tamper detection and recovery, in: Proceedings of the 28th IEEE EMBS Annual Intrn. Conference, pp. 3270\u20133273","DOI":"10.1109\/IEMBS.2006.4398145"},{"issue":"4","key":"9981_CR49","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255\u2013258","journal-title":"IEEE Signal Process Lett"},{"key":"9981_CR50","doi-asserted-by":"publisher","unstructured":"Zhang X, Wang Z, Yu J, Qian Z. (2015). Reversible visible watermark embedded in encrypted domain. p. 826\u201330. https:\/\/doi.org\/10.1109\/ChinaSIP.2015.7230520","DOI":"10.1109\/ChinaSIP.2015.7230520"},{"key":"9981_CR51","first-page":"515","volume":"43","author":"Y Zhou","year":"2013","unstructured":"Zhou Y, Panetta K, Agaian S, Chen CLP (2013) (n, k, p)-gray code for image systems, IEEE trans. Cybern. 43:515\u2013529","journal-title":"Cybern."}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09981-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09981-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09981-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T00:15:57Z","timestamp":1635207357000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09981-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,26]]},"references-count":51,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["9981"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09981-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,26]]},"assertion":[{"value":"20 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}