{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T19:41:03Z","timestamp":1771962063649,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T00:00:00Z","timestamp":1606348800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T00:00:00Z","timestamp":1606348800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10032-2","type":"journal-article","created":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T21:11:30Z","timestamp":1606425090000},"page":"10615-10655","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":49,"title":["A novel chaotic IWT-LSB blind watermarking approach with flexible capacity for secure transmission of authenticated medical images"],"prefix":"10.1007","volume":"80","author":[{"given":"Mahboubeh","family":"Nazari","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7141-2550","authenticated-orcid":false,"given":"Mahshid","family":"Mehrabian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,26]]},"reference":[{"key":"10032_CR1","doi-asserted-by":"crossref","unstructured":"ALabaichi A, Al-Dabbas MA, Salih A (2020) Image steganography using least significant bit and secret map techniques. International journal of electrical & computer engineering (2088-8708) 10","DOI":"10.11591\/ijece.v10i1.pp935-946"},{"issue":"2","key":"10032_CR2","first-page":"191","volume":"15","author":"RA Alotaibi","year":"2019","unstructured":"Alotaibi RA, Elrefaei LA (2019) Text-image watermarking based on integer wavelet transform (IWT) and discrete cosine transform (DCT). Appl Comput Info 15(2):191\u2013202","journal-title":"Appl Comput Info"},{"key":"10032_CR3","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.comcom.2020.01.038","volume":"152","author":"A Anand","year":"2020","unstructured":"Anand A, Singh AK (2020) An improved DWT-SVD domain watermarking for medical information security. Comput Commun 152:72\u201380","journal-title":"Comput Commun"},{"key":"10032_CR4","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1016\/j.future.2019.07.064","volume":"101","author":"TK Araghi","year":"2019","unstructured":"Araghi TK, Manaf AA (2019) An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD. Futur Gener Comput Syst 101:1223\u20131246","journal-title":"Futur Gener Comput Syst"},{"issue":"2","key":"10032_CR5","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s11082-019-2130-3","volume":"52","author":"M Arora","year":"2020","unstructured":"Arora M, Khurana M (2020) Secure image encryption technique based on jigsaw transform and chaotic scrambling using digital image watermarking. Opt Quant Electron 52(2):59","journal-title":"Opt Quant Electron"},{"issue":"1","key":"10032_CR6","first-page":"183","volume":"79","author":"P Bhinder","year":"2019","unstructured":"Bhinder P, Jindal N, Singh K (2019) An improved robust image-adaptive watermarking with two watermarks using statistical decoder. Multimed Tools Appl 79(1):183\u2013217","journal-title":"Multimed Tools Appl"},{"key":"10032_CR7","doi-asserted-by":"publisher","first-page":"101695","DOI":"10.1016\/j.bspc.2019.101695","volume":"56","author":"M Cedillo-Hernandez","year":"2020","unstructured":"Cedillo-Hernandez M, Cedillo-Hernandez A, Nakano-Miyatake M, Perez-Meana H (2020) Improving the management of medical imaging by using robust and secure dual watermarking. Biomed Signal Process Control 56:101695","journal-title":"Biomed Signal Process Control"},{"issue":"4","key":"10032_CR8","doi-asserted-by":"publisher","first-page":"3911","DOI":"10.1007\/s11042-017-4886-4","volume":"78","author":"DS Chauhan","year":"2017","unstructured":"Chauhan DS, Singh AK, Kumar B, Saini JP (2017) Quantization based multiple medical information watermarking for secure e-health. Multimed Tools Appl 78(4):3911\u20133923","journal-title":"Multimed Tools Appl"},{"key":"10032_CR9","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.image.2016.03.007","volume":"45","author":"W Chun-peng","year":"2016","unstructured":"Chun-peng W, Xing-yuan W, Zhi-qiu X (2016) Geometrically invariant image watermarking based on fast radial harmonic Fourier moments. Signal Process Image Commun 45:10\u201323","journal-title":"Signal Process Image Commun"},{"key":"10032_CR10","doi-asserted-by":"publisher","first-page":"20596","DOI":"10.1109\/ACCESS.2018.2817615","volume":"6","author":"M Elhoseny","year":"2018","unstructured":"Elhoseny M, Ram\u00edrez-Gonz\u00e1lez G, Abu-Elnasr OM, Shawkat SA, Arunkumar N, Farouk A (2018) Secure medical data transmission model for IoT-based healthcare systems. Ieee Access 6:20596\u201320608","journal-title":"Ieee Access"},{"issue":"3","key":"10032_CR11","doi-asserted-by":"publisher","first-page":"2185","DOI":"10.11591\/ijece.v9i3.pp2185-2195","volume":"9","author":"F Ernawan","year":"2019","unstructured":"Ernawan F, Ariatmanto D (2019) Image watermarking based on integer wavelet transform-singular value decomposition with variance pixels. Int J Electr Compu Eng (IJECE) 9(3):2185\u20132195","journal-title":"Int J Electr Compu Eng (IJECE)"},{"issue":"1","key":"10032_CR12","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s00371-018-1567-x","volume":"36","author":"F Ernawan","year":"2018","unstructured":"Ernawan F, Kabir MN (2018) A block-based RDWT-SVD image watermarking method using human visual system characteristics. Vis Comput 36(1):19\u201337","journal-title":"Vis Comput"},{"issue":"8","key":"10032_CR13","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1049\/iet-ipr.2014.0986","volume":"9","author":"R Eswaraiah","year":"2015","unstructured":"Eswaraiah R, Reddy ES (2015) Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest. IET Image Process 9(8):615\u2013625","journal-title":"IET Image Process"},{"issue":"1","key":"10032_CR14","doi-asserted-by":"publisher","first-page":"58","DOI":"10.7763\/IJCTE.2016.V8.1020","volume":"8","author":"L Feng","year":"2016","unstructured":"Feng L, Wu Z, Long X (2016) Fast image diffusion for feature detection and description. Int J Comput Theory Eng 8(1):58\u201362","journal-title":"Int J Comput Theory Eng"},{"key":"10032_CR15","first-page":"1","volume":"12","author":"S Gull","year":"2018","unstructured":"Gull S, Loan NA, Parah SA, Sheikh JA, Bhat GM (2018) An efficient watermarking technique for tamper detection and localization of medical images. J Ambient Intell Humaniz Comput 12:1\u20130","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"6","key":"10032_CR16","doi-asserted-by":"publisher","first-page":"27","DOI":"10.5815\/ijmecs.2012.06.04","volume":"4","author":"S Gupta","year":"2012","unstructured":"Gupta S, Goyal A, Bhushan B (2012) Information hiding using least significant bit steganography and cryptography. Int J Mod Educ Comput Sci 4(6):27\u201334","journal-title":"Int J Mod Educ Comput Sci"},{"key":"10032_CR17","doi-asserted-by":"publisher","first-page":"64955","DOI":"10.1109\/ACCESS.2019.2916674","volume":"7","author":"U Khadam","year":"2019","unstructured":"Khadam U, Iqbal MM, Azam MA, Khalid S, Rho S, Chilamkurti N (2019) Digital watermarking technique for text document protection using data mining analysis. IEEE Access 7:64955\u201364965","journal-title":"IEEE Access"},{"issue":"3","key":"10032_CR18","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1109\/TIFS.2007.905146","volume":"2","author":"S Lee","year":"2007","unstructured":"Lee S, Yoo CD, Kalker T (2007) Reversible image watermarking based on integer-to-integer wavelet transform. IEEE Trans Inf Forensics Secur 2(3):321\u2013330","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"10032_CR19","doi-asserted-by":"publisher","first-page":"6355","DOI":"10.1007\/s11042-018-6361-2","volume":"78","author":"X Liu","year":"2018","unstructured":"Liu X, Wang Y, Du J, Liao S, Lou J, Zou B (2018) Robust hybrid image watermarking scheme based on KAZE features and IWT-SVD. Multimed Tools Appl 78(5):6355\u20136384","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10032_CR20","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1049\/iet-ipr.2014.0965","volume":"10","author":"NM Makbol","year":"2016","unstructured":"Makbol NM, Khoo BE, Rassem TH (2016) Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Process 10(1):34\u201352","journal-title":"IET Image Process"},{"key":"10032_CR21","first-page":"1","volume":"1","author":"M Nazari","year":"2020","unstructured":"Nazari M, Ahmadi ID (2020) A novel chaotic steganography method with three approaches for color and grayscale images based on FIS and DCT with flexible capacity. Multimed Tools Appl 1:1\u201332","journal-title":"Multimed Tools Appl"},{"issue":"15","key":"10032_CR22","doi-asserted-by":"publisher","first-page":"16107","DOI":"10.1007\/s11042-016-3897-x","volume":"76","author":"M Nazari","year":"2017","unstructured":"Nazari M, Sharif A, Mollaeefar M (2017) An improved method for digital image fragile watermarking based on chaotic maps. Multimed Tools Appl 76(15):16107\u201316123","journal-title":"Multimed Tools Appl"},{"key":"10032_CR23","doi-asserted-by":"crossref","unstructured":"Priya S, Santhi B (2019) A novel visual medical image encryption for secure transmission of authenticated watermarked medical images. Mobile networks and applications 1-8","DOI":"10.1007\/s11036-019-01213-x"},{"key":"10032_CR24","first-page":"1","volume":"4","author":"L Salimi","year":"2020","unstructured":"Salimi L, Haghighi A, Fathi A (2020) A novel watermarking method based on differential evolutionary algorithm and wavelet transform. Multimed Tools Appl 4:1\u20138","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"10032_CR25","doi-asserted-by":"publisher","first-page":"8881","DOI":"10.1007\/s11042-016-3514-z","volume":"76","author":"AK Singh","year":"2016","unstructured":"Singh AK (2016) Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimed Tools Appl 76(6):8881\u20138900","journal-title":"Multimed Tools Appl"},{"issue":"21","key":"10032_CR26","doi-asserted-by":"publisher","first-page":"30523","DOI":"10.1007\/s11042-018-7115-x","volume":"78","author":"AK Singh","year":"2019","unstructured":"Singh AK (2019) Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image. Multimed Tools Appl 78(21):30523\u201330533","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"10032_CR27","doi-asserted-by":"publisher","first-page":"2133","DOI":"10.1007\/s11277-015-2505-0","volume":"83","author":"AK Singh","year":"2015","unstructured":"Singh AK, Dave M, Mohan A (2015) Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain. Wirel Pers Commun 83(3):2133\u20132150","journal-title":"Wirel Pers Commun"},{"key":"10032_CR28","first-page":"1","volume":"13","author":"N Sivasubramanian","year":"2020","unstructured":"Sivasubramanian N, Konganathan G (2020) A novel semi fragile watermarking technique for tamper detection and recovery using IWT and DCT. Computing 13:1\u201320","journal-title":"Computing"},{"key":"10032_CR29","doi-asserted-by":"publisher","first-page":"101665","DOI":"10.1016\/j.bspc.2019.101665","volume":"55","author":"K Swaraja","year":"2020","unstructured":"Swaraja K, Meenakshi K, Kora P (2020) An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomed Signal Process Control 55:101665","journal-title":"Biomed Signal Process Control"},{"issue":"3","key":"10032_CR30","doi-asserted-by":"publisher","first-page":"3669","DOI":"10.1007\/s11042-016-3928-7","volume":"76","author":"FN Thakkar","year":"2016","unstructured":"Thakkar FN, Srivastava VK (2016) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed Tools Appl 76(3):3669\u20133697","journal-title":"Multimed Tools Appl"},{"key":"10032_CR31","doi-asserted-by":"crossref","unstructured":"Thakur S, Singh AK, Ghrera SP (2018) NSCT domain\u2013based secure multiple-watermarking technique through lightweight encryption for medical images. Concurrency and Computation: Practice and Experience e5108","DOI":"10.1002\/cpe.5108"},{"issue":"3","key":"10032_CR32","doi-asserted-by":"publisher","first-page":"3457","DOI":"10.1007\/s11042-018-6263-3","volume":"78","author":"S Thakur","year":"2018","unstructured":"Thakur S, Singh AK, Ghrera SP, Elhoseny M (2018) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 78(3):3457\u20133470","journal-title":"Multimed Tools Appl"},{"key":"10032_CR33","first-page":"1","volume":"20","author":"S Thakur","year":"2018","unstructured":"Thakur S, Singh AK, Ghrera SP, Mohan A (2018) Chaotic based secure watermarking approach for medical images. Multimed Tools Appl 20:1\u20134","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"10032_CR34","first-page":"1366","volume":"20","author":"R Thanki","year":"2017","unstructured":"Thanki R, Borra S, Dwivedi V, Borisagar K (2017) An efficient medical image watermarking scheme based on FDCuT\u2013DCT. Eng sci tech int j 20(4):1366\u20131379","journal-title":"Eng sci tech int j"},{"key":"10032_CR35","doi-asserted-by":"crossref","unstructured":"Vaidya SP, Mouli PC (2020) A robust and blind watermarking for color videos using redundant wavelet domain and SVD. InSmart computing paradigms: new progresses and challenges (pp. 11-17). Springer, Singapore","DOI":"10.1007\/978-981-13-9683-0_2"},{"issue":"2","key":"10032_CR36","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1007\/s00500-019-04524-z","volume":"24","author":"MY Valandar","year":"2019","unstructured":"Valandar MY, Barani MJ, Ayubi P (2019) A blind and robust color images watermarking method based on block transform and secured by modified 3-dimensional H\u00e9non map. Soft Comput 24(2):771\u2013794","journal-title":"Soft Comput"},{"issue":"24","key":"10032_CR37","doi-asserted-by":"publisher","first-page":"26355","DOI":"10.1007\/s11042-016-4130-7","volume":"76","author":"CP Wang","year":"2017","unstructured":"Wang CP, Wang XY, Chen XJ, Zhang C (2017) Robust zero-watermarking algorithm based on polar complex exponential transform and logistic mapping. Multimed Tools Appl 76(24):26355\u201326376","journal-title":"Multimed Tools Appl"},{"key":"10032_CR38","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.ins.2018.03.040","volume":"450","author":"C Wang","year":"2018","unstructured":"Wang C, Wang X, Li Y, Xia Z, Zhang C (2018) Quaternion polar harmonic Fourier moments for color images. Inf Sci 450:141\u2013156","journal-title":"Inf Sci"},{"key":"10032_CR39","doi-asserted-by":"crossref","unstructured":"Wang C, Wang X, Xia Z, Ma B, Shi YQ (2019) Image description with polar harmonic Fourier moments. IEEE Trans Circuits Syst Video Technol","DOI":"10.1109\/TCSVT.2019.2960507"},{"key":"10032_CR40","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.ins.2018.08.028","volume":"470","author":"C Wang","year":"2019","unstructured":"Wang C, Wang X, Xia Z, Zhang C (2019) Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf Sci 470:109\u2013120","journal-title":"Inf Sci"},{"key":"10032_CR41","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.jvcir.2016.10.004","volume":"41","author":"CP Wang","year":"2016","unstructured":"Wang CP, Wang XY, Xia ZQ, Zhang C, Chen XJ (2016) Geometrically resilient color image zero-watermarking algorithm based on quaternion exponent moments. J Vis Commun Image Represent 41:247\u2013259","journal-title":"J Vis Commun Image Represent"},{"key":"10032_CR42","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.sigpro.2016.12.010","volume":"134","author":"C Wang","year":"2017","unstructured":"Wang C, Wang X, Zhang C, Xia Z (2017) Geometric correction based color image watermarking using fuzzy least squares support vector machine and Bessel K form distribution. Signal Process 134:197\u2013208","journal-title":"Signal Process"},{"issue":"7","key":"10032_CR43","doi-asserted-by":"publisher","first-page":"8463","DOI":"10.1007\/s11042-018-6877-5","volume":"78","author":"X Wu","year":"2018","unstructured":"Wu X, Li J, Tu R, Cheng J, Bhatti UA, Ma J (2018) Contourlet-DCT based multiple robust watermarkings for medical images. Multimed Tools Appl 78(7):8463\u20138480","journal-title":"Multimed Tools Appl"},{"key":"10032_CR44","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.sigpro.2019.06.025","volume":"164","author":"Z Xia","year":"2019","unstructured":"Xia Z, Wang X, Li X, Wang C, Unar S, Wang M, Zhao T (2019) Efficient copyright protection for three CT images based on quaternion polar harmonic Fourier moments. Signal Process 164:368\u2013379","journal-title":"Signal Process"},{"key":"10032_CR45","doi-asserted-by":"publisher","first-page":"122544","DOI":"10.1109\/ACCESS.2019.2935174","volume":"7","author":"Z Xia","year":"2019","unstructured":"Xia Z, Wang X, Wang M, Unar S, Wang C, Liu Y, Li X (2019) Geometrically invariant color medical image null-watermarking based on precise quaternion polar harmonic Fourier moments. IEEE Access 7:122544\u2013122560","journal-title":"IEEE Access"},{"key":"10032_CR46","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.sigpro.2018.11.011","volume":"157","author":"Z Xia","year":"2019","unstructured":"Xia Z, Wang X, Zhou W, Li R, Wang C, Zhang C (2019) Color medical image lossless watermarking using chaotic system and accurate quaternion polar harmonic transforms. Signal Process 157:108\u2013118","journal-title":"Signal Process"},{"key":"10032_CR47","doi-asserted-by":"publisher","first-page":"43391","DOI":"10.1109\/ACCESS.2020.2978186","volume":"8","author":"Z Zainol","year":"2020","unstructured":"Zainol Z, Teh JS, Alawida M (2020) A new chaotic image watermarking scheme based on SVD and IWT. IEEE Access 8:43391\u201343406","journal-title":"IEEE Access"},{"issue":"4","key":"10032_CR48","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1007\/s11042-016-3862-8","volume":"77","author":"A Zear","year":"2018","unstructured":"Zear A, Singh AK, Kumar P (2018) A ILC secure multiple watermarking technique based on DWT, DCT, and SVD for application in medicine. Multimed Tools Appl 77(4):4863\u20134882","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10032-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-020-10032-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10032-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,25]],"date-time":"2021-03-25T23:59:07Z","timestamp":1616716747000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-020-10032-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,26]]},"references-count":48,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10032"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10032-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,26]]},"assertion":[{"value":"18 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}