{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T19:41:04Z","timestamp":1771962064235,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2021,3,27]],"date-time":"2021-03-27T00:00:00Z","timestamp":1616803200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,27]],"date-time":"2021-03-27T00:00:00Z","timestamp":1616803200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-020-10389-4","type":"journal-article","created":{"date-parts":[[2021,3,27]],"date-time":"2021-03-27T07:02:32Z","timestamp":1616828552000},"page":"23815-23875","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A watermarking scheme for source authentication, ownership identification, tamper detection and restoration for color medical images"],"prefix":"10.1007","volume":"80","author":[{"given":"Diana","family":"Laishram","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6698-1185","authenticated-orcid":false,"given":"Khumanthem","family":"Manglem Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,27]]},"reference":[{"issue":"6","key":"10389_CR1","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1007\/s10278-014-9709-9","volume":"27","author":"A Al-Haj","year":"2014","unstructured":"Al-Haj A, Amer A (2014) Secured telemedicine using region-based watermarking with tamper localization. J Digit Imaging 27(6):737\u2013750","journal-title":"J Digit Imaging"},{"key":"10389_CR2","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/s10278-016-9901-1","volume":"30","author":"A Al-Haj","year":"2017","unstructured":"Al-Haj A, Mohammad A, Amer A (2017) Crypto-watermarking of transmitted medical images. J Digit Imaging 30:26\u201338","journal-title":"J Digit Imaging"},{"key":"10389_CR3","doi-asserted-by":"publisher","first-page":"2911","DOI":"10.1007\/s11042-015-3213-1","volume":"76","author":"K Anusudha","year":"2017","unstructured":"Anusudha K, Venkateswaran N, Valarmathi J (2017) Secured medical image watermarking with DNA codec. Multimed Tools Appl 76:2911\u20132932","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10389_CR4","first-page":"1","volume":"1","author":"S Banerjee","year":"2016","unstructured":"Banerjee S, Mitra S, Shankar BU, Hayashi Y (2016) A novel GBM saliency detection model using Multi-Channel MRI. PLoS One 1(1):1\u201316","journal-title":"PLoS One"},{"key":"10389_CR5","first-page":"1401","volume":"3","author":"SO Belkasim","year":"1996","unstructured":"Belkasim SO, Ahmadi M, Shridhar M (1996) Efficient algorithm for fast computation of Zernike moments. 39thIEEE Mid West Symp Circ Syst 3:1401\u20131404","journal-title":"39thIEEE Mid West Symp Circ Syst"},{"issue":"2","key":"10389_CR6","doi-asserted-by":"publisher","first-page":"536","DOI":"10.13164\/re.2017.0536","volume":"26","author":"M Cedillo-Hernandez","year":"2017","unstructured":"Cedillo-Hernandez M, Garcia-Ugalde F, Nakano-Miyatake M, Perez-Meana H (2017) Digital color image ownership authentication via efficient and robust watermarking in a hybrid domain. Radioengineering 26(2):536\u2013551","journal-title":"Radioengineering"},{"key":"10389_CR7","doi-asserted-by":"publisher","first-page":"3339","DOI":"10.1007\/s10916-012-9827-1","volume":"36","author":"S Das","year":"2012","unstructured":"Das S, Kundu MK (2012) Effective management of medical information through a novel blind watermarking technique. J Med Syst 36:3339\u20133351","journal-title":"J Med Syst"},{"issue":"6","key":"10389_CR8","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1080\/03772063.2017.1324328","volume":"63","author":"BP Devi","year":"2017","unstructured":"Devi BP, Singh KM, Roy S (2017) New copyright protection scheme for digital images based on visual cryptography. IETE J Res 63(6):870\u2013880","journal-title":"IETE J Res"},{"issue":"8","key":"10389_CR9","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1049\/iet-ipr.2014.0986","volume":"9","author":"R Eswaraiah","year":"2015","unstructured":"Eswaraiah R, Reddy ES (2015) Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest. IET Image Process 9(8):615\u2013625","journal-title":"IET Image Process"},{"key":"10389_CR10","unstructured":"http:\/\/e-pao.net\/epSubPageExtractor.asp?src=news_section.Top_Stories.Top_Stories_2017.NABH_ certifies_Shija_Hospitals_20170106 (Accessed on 17\/02\/2018)"},{"key":"10389_CR11","unstructured":"http:\/\/www.logobook.com\/logo\/park-city-hospital\/(Accessed on 17\/02\/2018)"},{"key":"10389_CR12","unstructured":"http:\/\/www.graphis.com\/logos\/42d24f6c-4b41-11e2-ae70-f23c91dffdec\/ (Accessed on 17\/02\/2018)"},{"key":"10389_CR13","unstructured":"https:\/\/brenmoor.com\/catalogue\/skin-id-labels-direct-to-skin-patient-identification\/ (Accessed on 17\/02\/2018)"},{"key":"10389_CR14","unstructured":"https:\/\/www.linstar.com\/products\/product-details\/patient-id-card-program (Accessed on 17\/02\/2018)"},{"key":"10389_CR15","doi-asserted-by":"crossref","unstructured":"Jampani V, Ujjwal, Sivaswamy J , Vidya V (2012) Assessment of computational visual attention models on medical images. Proc. ICVIP. 1\u20138","DOI":"10.1145\/2425333.2425413"},{"key":"10389_CR16","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.neucom.2012.09.032","volume":"106","author":"F Ji","year":"2013","unstructured":"Ji F, Deng C, An L, Huang D (2013) Desynchronization attacks resilient image watermarking scheme based on global restoration and local embedding. Neucomputing 106:42\u201350","journal-title":"Neucomputing"},{"issue":"7","key":"10389_CR17","doi-asserted-by":"publisher","first-page":"3178","DOI":"10.1016\/j.eswa.2013.11.019","volume":"41","author":"B Lei","year":"2014","unstructured":"Lei B, Tan EL, Chen S, Ni D, Wang T, Lei H (2014) Reversible watermarking scheme for medical image based on differential evolution. Expert Syst Appl 41(7):3178\u20133188","journal-title":"Expert Syst Appl"},{"key":"10389_CR18","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe DG (2004) Distinctive image features from scale invariant key-points. Int J Comput Vis 60:91\u2013110","journal-title":"Int J Comput Vis"},{"issue":"1","key":"10389_CR19","first-page":"223","volume":"45","author":"G Lui","year":"2017","unstructured":"Lui G, Yang X (2017) Automatic renal lesion segmentation in ultrasound images based on saliency features, improved LBP, and an edge indicator under level set framework. Am Assoc Phys Med 45(1):223\u2013235","journal-title":"Am Assoc Phys Med"},{"key":"10389_CR20","first-page":"93","volume":"4","author":"SAK Mostafa","year":"2010","unstructured":"Mostafa SAK, El-sheimy N, Tolba AS, Abdelkader FM, Elhindy HM (2010) Wavelet packets-based blind watermarking for medical image management the open. Biol Eng J 4:93\u201398","journal-title":"Biol Eng J"},{"issue":"9","key":"10389_CR21","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1093\/comjnl\/bxv079","volume":"59","author":"A Neelima","year":"2016","unstructured":"Neelima A, Singh KM (2016) Perceptual hash function based on scale invariant feature transform and singular value decomposition. Comput J 59(9):1275\u20131281","journal-title":"Comput J"},{"key":"10389_CR22","doi-asserted-by":"crossref","unstructured":"Papakostas GA, Koulouriotis DE, Karakasis EG (2009) Effifient 2-D DCT computation from an image representation point of view, Image processing, Intec, eds.Chen, Y.-S., 21\u201334","DOI":"10.5772\/7043"},{"key":"10389_CR23","doi-asserted-by":"publisher","first-page":"10599","DOI":"10.1007\/s11042-015-3127-y","volume":"76","author":"SA Parah","year":"2017","unstructured":"Parah SA, Sheikh JA, Ahad F, Loan NA, Bhat GM (2017) Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimed Tools Appl 76:10599\u201310633","journal-title":"Multimed Tools Appl"},{"key":"10389_CR24","unstructured":"Paulo DJ, Rodrigo DB, Alexander DM (2011) Analyzing and exploring feature detectors in images. Int Conf Ind Informa, Port:305\u2013310"},{"key":"10389_CR25","unstructured":"PEIR Digital Library: http:\/\/peir.path.uab.edu\/library\/index.php?\/category\/244 (Accessed on 17\/02\/2018"},{"key":"10389_CR26","first-page":"53","volume":"10","author":"F Rahimi","year":"2011","unstructured":"Rahimi F, Rabbani H (2011) A dual adaptive watermarking scheme in contourlet domain for DICOM images. BioMedEngOnLine 10:53","journal-title":"BioMedEngOnLine"},{"key":"10389_CR27","doi-asserted-by":"publisher","first-page":"1611","DOI":"10.1007\/s11277-016-3625-x","volume":"92","author":"A Sharma","year":"2017","unstructured":"Sharma A, Singh AK, Ghrera SP (2017) Robust and secure multiple watermarking for medical images. Wireless Pers Commun 92:1611\u20131624","journal-title":"Wireless Pers Commun"},{"key":"10389_CR28","doi-asserted-by":"crossref","unstructured":"Shen L, Margolies LR, Rothstein JH, Fluder E, McBridge R , Shieh W (2019) Deep learning to improve breast cancer detection on screening mammography. Scientic Reports, 9, 1\u201312 (Online)","DOI":"10.1038\/s41598-019-48995-4"},{"key":"10389_CR29","first-page":"123790","volume":"2015","author":"PM Siddaraju","year":"2015","unstructured":"Siddaraju PM, Jayadevappa D, Ezhilarasan K (2015) Application of fractional wave packet transform for robust watermarking of mammograms. Int J Telemed Appl 2015:123790","journal-title":"Int J Telemed Appl"},{"key":"10389_CR30","first-page":"1063","volume":"4","author":"KM Singh","year":"2004","unstructured":"Singh KM, Bora PK (2004) Adaptive vector median filter for removal of impulse noise from color images. J Electr Electron Eng 4:1063\u20131072","journal-title":"J Electr Electron Eng"},{"issue":"6","key":"10389_CR31","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1179\/1743131X14Y.0000000072","volume":"62","author":"KM Singh","year":"2014","unstructured":"Singh KM, Bora PK (2014) Switching vector median filters based on non-causal linear prediction for detection of impulse noise. Imaging Sci J 62(6):313\u2013326","journal-title":"Imaging Sci J"},{"key":"10389_CR32","doi-asserted-by":"publisher","first-page":"1415","DOI":"10.1007\/s11277-014-2091-6","volume":"80","author":"AK Singh","year":"2015","unstructured":"Singh AK, Kumar B, Dave M, Mohon A (2015) Robust and imperceptible dual watermarking for telemedicine applications. Wireless Pers Commun 80:1415\u20131433","journal-title":"Wireless Pers Commun"},{"key":"10389_CR33","doi-asserted-by":"publisher","first-page":"7893","DOI":"10.1007\/s13369-018-3246-7","volume":"43","author":"A Soualmi","year":"2018","unstructured":"Soualmi A, Alti A, Laouamer L (2018) A new blind medical image watermarking based on weber descriptors and Arnold chaotic map. Arab J Sci Eng 43:7893\u20137905","journal-title":"Arab J Sci Eng"},{"key":"10389_CR34","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s11042-015-3055-x","volume":"76","author":"R Thabit","year":"2017","unstructured":"Thabit R, Khoo BE (2017) Medical image authentication using SLT and IWT schemes. Multimed Tools Appl 76:309\u2013332","journal-title":"Multimed Tools Appl"},{"key":"10389_CR35","doi-asserted-by":"publisher","first-page":"3669","DOI":"10.1007\/s11042-016-3928-7","volume":"76","author":"FN Thakkar","year":"2017","unstructured":"Thakkar FN, Srivastava VK (2017) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed Tools Appl 76:3669\u20133697","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"10389_CR36","first-page":"1366","volume":"20","author":"R Thanki","year":"2017","unstructured":"Thanki R, Borra S, Dwivedi V, Borisagar K (2017) An efficient medical image watermarking scheme based on FDCuT-DCT. Eng Sc and Tech 20(4):1366\u20131379","journal-title":"Eng Sc and Tech"},{"key":"10389_CR37","doi-asserted-by":"crossref","unstructured":"Wang C, Zhang Y, Zhou X (2018) Robust image watermarking algorithm based on ASIFT against geometric attacks. Appl Sci 8(410), 1\u201319","DOI":"10.3390\/app8030410"},{"issue":"2","key":"10389_CR38","doi-asserted-by":"publisher","first-page":"025503","DOI":"10.1117\/1.JMI.4.2.025503","volume":"4","author":"G Weng","year":"2017","unstructured":"Weng G, Rodriguez-Nino B, Pecen FY, Vining DJ, Garg N, Marhey MK (2017) Comparative study of computational visual attention models on two-dimensional medical images. J Med Imaging 4(2):025503\u2013025515","journal-title":"J Med Imaging"},{"key":"10389_CR39","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s10278-007-9011-1","volume":"21","author":"JHK Wu","year":"2008","unstructured":"Wu JHK, Chang R, Chen C, Wang C-L, Kuo T-H, Moon W-K, Chen D-R (2008) Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21:59\u201376","journal-title":"J Digit Imaging"},{"key":"10389_CR40","unstructured":"www.sgrh.com (Accessed on 17\/02\/2018)"},{"key":"10389_CR41","unstructured":"www.vardhmanhealth.com (Accessed on 17\/02\/2018)"},{"issue":"1","key":"10389_CR42","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/72.363442","volume":"6","author":"L Xu","year":"1995","unstructured":"Xu L, Yuille AL (1995) Robust principal component analysis by self-organizing rules based on statistical physics approach. IEEE Trans Neural Netw 6(1):131\u2013143","journal-title":"IEEE Trans Neural Netw"},{"issue":"6","key":"10389_CR43","first-page":"753","volume":"13","author":"C Yu","year":"2008","unstructured":"Yu C, Fang Q, Jianbin H, Zhong C (2008) A geometric robust watermarking algorithm based on DWT-DCT and Zernike moments. J Nat Sci 13(6):753\u2013758","journal-title":"J Nat Sci"},{"key":"10389_CR44","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1007\/s11042-016-3862-8","volume":"77","author":"A Zear","year":"2018","unstructured":"Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77:4863\u20134882","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10389-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10389-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10389-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T04:04:55Z","timestamp":1625457895000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10389-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,27]]},"references-count":44,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["10389"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10389-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,27]]},"assertion":[{"value":"31 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}