{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T16:16:40Z","timestamp":1774973800907,"version":"3.50.1"},"reference-count":177,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T00:00:00Z","timestamp":1610668800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T00:00:00Z","timestamp":1610668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11042-020-10421-7","type":"journal-article","created":{"date-parts":[[2021,1,15]],"date-time":"2021-01-15T00:03:42Z","timestamp":1610669022000},"page":"13439-13473","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Review of medical image authentication techniques and their recent trends"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4141-5723","authenticated-orcid":false,"given":"Rasha","family":"Thabit","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,15]]},"reference":[{"key":"10421_CR1","unstructured":"Abokhdair NO, Bt A, Manaf A (2013) A review of reversible watermarking properties, applications and techniques for medical images, pp. 6\u201311"},{"issue":"1","key":"10421_CR2","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.jksuci.2016.12.004","volume":"31","author":"J Abraham","year":"2019","unstructured":"Abraham J, Paul V (2019) An imperceptible spatial domain color image watermarking scheme. J King Saud Univ - Comput Inf Sci 31(1):125\u2013133. https:\/\/doi.org\/10.1016\/j.jksuci.2016.12.004","journal-title":"J King Saud Univ - Comput Inf Sci"},{"issue":"1","key":"10421_CR3","doi-asserted-by":"crossref","first-page":"2014","DOI":"10.26634\/jip.1.1.2700","volume":"1","author":"R Agrawal","year":"2014","unstructured":"Agrawal R, Sharma M (2014) Comparative evaluation of image watermarking method in health care. I-Manager\u2019s J Image Process 1(1):2014","journal-title":"I-Manager\u2019s J Image Process"},{"key":"10421_CR4","unstructured":"Al-Ghadi MQ (2018) Watermarking approaches for images authentication in applications with time constraints (PhD thesis), Universit\u00e9 de Bretagne occidentale - Brest"},{"key":"10421_CR5","doi-asserted-by":"publisher","unstructured":"Allaf AH, Kbir MA (2019) A review of digital watermarking applications for medical image exchange security. In: The Proceedings of the Third International Conference on Smart City Applications, pp. 472\u2013480. https:\/\/doi.org\/10.1007\/978-3-030-11196-0_40.","DOI":"10.1007\/978-3-030-11196-0_40"},{"issue":"2","key":"10421_CR6","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.aci.2018.06.003","volume":"15","author":"RA Alotaibi","year":"2019","unstructured":"Alotaibi RA, Elrefaei LA (2019) Text-image watermarking based on integer wavelet transform (IWT) and discrete cosine transform (DCT). Appl Comput Inf 15(2):191\u2013202. https:\/\/doi.org\/10.1016\/j.aci.2018.06.003","journal-title":"Appl Comput Inf"},{"key":"10421_CR7","unstructured":"Al-Qershi OM, Ee KB (2009) Authentication and Data Hiding Using a Reversible ROI-based Watermarking Scheme for DICOM Images. In: World Academy of Science, Engineering and Technology, pp. 801\u2013806"},{"key":"10421_CR8","doi-asserted-by":"publisher","unstructured":"Al-Qershi OM, Khoo BE (2010) ROI-based tamper detection and recovery for medical images using reversible watermarking technique. Proc 2010 IEEE Int Conf Inf Theory Inf Secur ICITIS 2010, pp. 151\u2013155. https:\/\/doi.org\/10.1109\/ICITIS.2010.5688743","DOI":"10.1109\/ICITIS.2010.5688743"},{"issue":"1","key":"10421_CR9","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s10278-009-9253-1","volume":"24","author":"OM Al-Qershi","year":"2011","unstructured":"Al-Qershi OM, Khoo BE (2011) Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging 24(1):114\u2013125. https:\/\/doi.org\/10.1007\/s10278-009-9253-1","journal-title":"J Digit Imaging"},{"issue":"3","key":"10421_CR10","doi-asserted-by":"publisher","first-page":"88","DOI":"10.3923\/rjit.2016.88.97","volume":"8","author":"FW Alsaade","year":"2016","unstructured":"Alsaade FW (2016) Watermarking system for the security of medical image databases used in telemedicine. Res J Inf Technol 8(3):88\u201397. https:\/\/doi.org\/10.3923\/rjit.2016.88.97","journal-title":"Res J Inf Technol"},{"key":"10421_CR11","doi-asserted-by":"publisher","unstructured":"Alshanbari HS (2020) Medical image watermarking for ownership & tamper detection. Multimed Tools Appl:1\u201317. https:\/\/doi.org\/10.1007\/s11042-020-08814-9","DOI":"10.1007\/s11042-020-08814-9"},{"key":"10421_CR12","doi-asserted-by":"publisher","unstructured":"Alshanbari HS (2020) Medical image watermarking for ownership & tamper detection. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-020-08814-9.","DOI":"10.1007\/s11042-020-08814-9"},{"key":"10421_CR13","doi-asserted-by":"publisher","unstructured":"An L, Gao X, Deng C, Ji F (2010) Robust lossless data hiding: Analysis and evaluation. Proc. 2010 Int. Conf. High Perform. Comput. Simulation, HPCS 2010, pp. 512\u2013516. https:\/\/doi.org\/10.1109\/HPCS.2010.5547084","DOI":"10.1109\/HPCS.2010.5547084"},{"key":"10421_CR14","doi-asserted-by":"publisher","unstructured":"An L, Gao X, Deng C (2010) Reliable embedding for robust reversible watermarking. Proc 2nd Int Conf Internet Multimed Comput Serv ICIMCS\u201910, pp. 57\u201360. https:\/\/doi.org\/10.1145\/1937728.1937742.","DOI":"10.1145\/1937728.1937742"},{"issue":"8","key":"10421_CR15","doi-asserted-by":"publisher","first-page":"3598","DOI":"10.1109\/TIP.2012.2191564","volume":"21","author":"L An","year":"2012","unstructured":"An L, Gao X, Li X, Tao D, Deng C, Li J (2012) Robust reversible watermarking via clustering and enhanced pixel-wise masking. IEEE Trans Image Process 21(8):3598\u20133611. https:\/\/doi.org\/10.1109\/TIP.2012.2191564","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"10421_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neucom.2011.06.012","volume":"77","author":"L An","year":"2012","unstructured":"An L, Gao X, Yuan Y, Tao D (2012) Robust lossless data hiding using clustering and statistical quantity histogram. Neurocomputing 77(1):1\u201311. https:\/\/doi.org\/10.1016\/j.neucom.2011.06.012","journal-title":"Neurocomputing"},{"key":"10421_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.neucom.2011.08.019","volume":"79","author":"L An","year":"2012","unstructured":"An L, Gao X, Yuan Y, Tao D, Deng C, Ji F (2012) Content-adaptive reliable robust lossless data embedding. Neurocomputing 79:1\u201311. https:\/\/doi.org\/10.1016\/j.neucom.2011.08.019","journal-title":"Neurocomputing"},{"key":"10421_CR18","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.comcom.2020.01.038","volume":"152","author":"A Anand","year":"2020","unstructured":"Anand A, Singh AK (2020) An improved DWT-SVD domain watermarking for medical information security. Comput Commun 152:72\u201380. https:\/\/doi.org\/10.1016\/j.comcom.2020.01.038","journal-title":"Comput Commun"},{"issue":"1","key":"10421_CR19","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1515\/jisys-2017-0266","volume":"27","author":"P Aparna","year":"2018","unstructured":"Aparna P, Kishore PVV (2018) An Efficient Medical Image Watermarking Technique in E-healthcare Application Using Hybridization of Compression and Cryptography Algorithm. J Intell Syst 27(1):115\u2013133. https:\/\/doi.org\/10.1515\/jisys-2017-0266","journal-title":"J Intell Syst"},{"issue":"1","key":"10421_CR20","doi-asserted-by":"publisher","first-page":"1558","DOI":"10.1515\/jisys-2018-0370","volume":"29","author":"P Aparna","year":"2020","unstructured":"Aparna P, Kishore PVV (2020) A Blind Medical Image Watermarking for Secure E-Healthcare Application Using Crypto-Watermarking System. J Intell Syst 29(1):1558\u20131575. https:\/\/doi.org\/10.1515\/jisys-2018-0370","journal-title":"J Intell Syst"},{"key":"10421_CR21","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1016\/j.future.2019.07.064","volume":"101","author":"TK Araghi","year":"2019","unstructured":"Araghi TK, Manaf AA (2019) An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD. Futur Gener Comput Syst 101:1223\u20131246. https:\/\/doi.org\/10.1016\/j.future.2019.07.064","journal-title":"Futur Gener Comput Syst"},{"key":"10421_CR22","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.asoc.2016.11.044","volume":"51","author":"M Arsalan","year":"2017","unstructured":"Arsalan M, Qureshi AS, Khan A, Rajarajan M (2017) Protection of medical images and patient related information in healthcare: Using an intelligent and reversible watermarking technique. Appl Soft Comput 51:168\u2013179. https:\/\/doi.org\/10.1016\/j.asoc.2016.11.044","journal-title":"Appl Soft Comput"},{"key":"10421_CR23","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.jbi.2018.08.010","volume":"86","author":"S Arumugham","year":"2018","unstructured":"Arumugham S, Rajagopalan S, Rayappan JBB, Amirtharajan R (2018) Networked medical data sharing on secure medium \u2013 A web publishing mode for DICOM viewer with three layer authentication. J Biomed Inform 86:90\u2013105. https:\/\/doi.org\/10.1016\/j.jbi.2018.08.010","journal-title":"J Biomed Inform"},{"key":"10421_CR24","unstructured":"Asatryan D, Asatryan N (2009) Combined spatial and frequency domain watermarking. In: Proceedings of the 7th International Conference on Computer Science and Information Technologies, pp. 323\u2013326"},{"issue":"3","key":"10421_CR25","doi-asserted-by":"publisher","first-page":"169","DOI":"10.22266\/IJIES2018.0630.18","volume":"11","author":"I Assini","year":"2018","unstructured":"Assini I, Badri A, Sahel KSA, Baghdad A (2018) A robust hybrid watermarking technique for securing medical image. Int J Intell Eng Syst 11(3):169\u2013176. https:\/\/doi.org\/10.22266\/IJIES2018.0630.18","journal-title":"Int J Intell Eng Syst"},{"key":"10421_CR26","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.aeue.2017.06.001","volume":"79","author":"A Azeroual","year":"2017","unstructured":"Azeroual A, Afdel K (2017) Real-time image tamper localization based on fragile watermarking and Faber-Schauder wavelet. AEU Int J Electron Commun 79:207\u2013218. https:\/\/doi.org\/10.1016\/j.aeue.2017.06.001","journal-title":"AEU Int J Electron Commun"},{"issue":"7","key":"10421_CR27","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1016\/j.urolonc.2017.04.014","volume":"35","author":"MH Bagheri","year":"2017","unstructured":"Bagheri MH et al (2017) Advances in medical imaging for the diagnosis and management of common genitourinary cancers. Urol Oncol Semin Orig Investig 35(7):473\u2013491. https:\/\/doi.org\/10.1016\/j.urolonc.2017.04.014","journal-title":"Urol Oncol Semin Orig Investig"},{"issue":"5","key":"10421_CR28","first-page":"309","volume":"3","author":"G Balamurugan","year":"2014","unstructured":"Balamurugan G, Jayarraman DKB, Arulalan V (2014) A Survey on Medical Image Watermarking Techniques. Int J Comput Sci Netw 3(5):309\u2013317","journal-title":"Int J Comput Sci Netw"},{"issue":"13","key":"10421_CR29","doi-asserted-by":"publisher","first-page":"17899","DOI":"10.1007\/s11042-018-6820-9","volume":"78","author":"R Bamal","year":"2019","unstructured":"Bamal R, Kasana SS (2019) Dual hybrid medical watermarking using walsh-slantlet transform. Multimed Tools Appl 78(13):17899\u201317927. https:\/\/doi.org\/10.1007\/s11042-018-6820-9","journal-title":"Multimed Tools Appl"},{"key":"10421_CR30","unstructured":"Bankman I (2009) Handbook of Medical Image Processing and Analysis, Academic Press, Elsevier"},{"key":"10421_CR31","doi-asserted-by":"publisher","unstructured":"Begum M, Uddin MS (2020) Digital image watermarking techniques: A review. Inf 11(2). https:\/\/doi.org\/10.3390\/info11020110.","DOI":"10.3390\/info11020110"},{"key":"10421_CR32","doi-asserted-by":"publisher","unstructured":"Benyoussef M, Mabtoul S, El Marraki M, Aboutajdine D (2014) Medical image watermarking for copyright protection based on visual cryptography. Int Conf Multimed Comput Syst -Proc, pp. 93\u201398. https:\/\/doi.org\/10.1109\/ICMCS.2014.6911198.","DOI":"10.1109\/ICMCS.2014.6911198"},{"key":"10421_CR33","doi-asserted-by":"publisher","unstructured":"Bhagat D, Bhardwaj R (2019) A Survey on Medical Images for Reversible Data Hiding Techniques. Proc. - 2019 Amity Int. Conf. Artif. Intell. AICAI 2019, no. April 2019, pp. 811\u2013817. https:\/\/doi.org\/10.1109\/AICAI.2019.8701228","DOI":"10.1109\/AICAI.2019.8701228"},{"key":"10421_CR34","unstructured":"Borra S, Thanki R, Dey N (2018) Digital image watermarking theoretical and computational advances. CRC Press"},{"key":"10421_CR35","doi-asserted-by":"publisher","first-page":"101695","DOI":"10.1016\/j.bspc.2019.101695","volume":"56","author":"M Cedillo-Hernandez","year":"2020","unstructured":"Cedillo-Hernandez M, Cedillo-Hernandez A, Nakano-Miyatake M, Perez-Meana H (2020) Improving the management of medical imaging by using robust and secure dual watermarking. Biomed Signal Process Control 56:101695. https:\/\/doi.org\/10.1016\/j.bspc.2019.101695","journal-title":"Biomed Signal Process Control"},{"key":"10421_CR36","doi-asserted-by":"crossref","unstructured":"Celebi ME, Schaefer G (2013) Color Medical Image Analysis, Lecture Notes in Computational Vision and Biomechanics. Springer Netherlands","DOI":"10.1007\/978-94-007-5389-1"},{"issue":"4","key":"10421_CR37","doi-asserted-by":"publisher","first-page":"2137","DOI":"10.14419\/ijet.v7i4.128554","volume":"7","author":"K Chaitanya","year":"2018","unstructured":"Chaitanya K, Rao KG (2018) A novel approach to medical image watermarking for tamper detection and recovery of Region of Interest using block compression and checksum. Int J Eng Technol 7(4):2137\u20132148. https:\/\/doi.org\/10.14419\/ijet.v7i4.128554","journal-title":"Int J Eng Technol"},{"issue":"10","key":"10421_CR38","doi-asserted-by":"publisher","first-page":"12647","DOI":"10.1007\/s11042-017-5348-8","volume":"78","author":"DS Chauhan","year":"2019","unstructured":"Chauhan DS, Singh AK, Adarsh A, Kumar B, Saini JP (2019) Combining Mexican hat wavelet and spread spectrum for adaptive watermarking and its statistical detection using medical images. Multimed Tools Appl 78(10):12647\u201312661. https:\/\/doi.org\/10.1007\/s11042-017-5348-8","journal-title":"Multimed Tools Appl"},{"key":"10421_CR39","unstructured":"Chawla G, Haryana R, Saini CMRA, Yadav R (2012) Classification of watermarking based upon various parameters. Int J Comput Appl Inf Technol, Issue II, vol. I(Ii): 2278\u20137720. Available: www.ijcait.com."},{"issue":"1","key":"10421_CR40","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10278-007-9012-0","volume":"21","author":"KH Chiang","year":"2008","unstructured":"Chiang KH, Chang-Chien KC, Chang RF, Yen HY (2008) Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. J Digit Imaging 21(1):77\u201390. https:\/\/doi.org\/10.1007\/s10278-007-9012-0","journal-title":"J Digit Imaging"},{"key":"10421_CR41","doi-asserted-by":"publisher","unstructured":"Choi O, Jeon I, Yoo SW, Moon S (2013) An extended DCT domain watermarking for robot vision against geometric image attacks. J Appl Math 2013. https:\/\/doi.org\/10.1155\/2013\/632043","DOI":"10.1155\/2013\/632043"},{"key":"10421_CR42","unstructured":"Chuin LS, Zain JM (2009) A Review of Medical Image Watermarking Schemes. In: Proceedings of ICSECS09 International Conference on Software Engineering and Computer Systems"},{"key":"10421_CR43","doi-asserted-by":"publisher","unstructured":"Coatrieux G, Lecornu L, Sankur B, Roux C (2006) A review of image watermarking applications in healthcare. Annu Int Conf IEEE Eng Med Biol - Proc, pp. 4691\u20134694. https:\/\/doi.org\/10.1109\/IEMBS.2006.259305.","DOI":"10.1109\/IEMBS.2006.259305"},{"key":"10421_CR44","doi-asserted-by":"crossref","unstructured":"Cox IJ, Miller ML, Bloom JA (2002) Digital Watermarking. Morgan Kaufmann","DOI":"10.1016\/B978-155860714-9\/50009-2"},{"issue":"2","key":"10421_CR45","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/S1005-8885(08)60089-8","volume":"15","author":"L da Li","year":"2008","unstructured":"da Li L, Guo BL, Guo L (2008) Rotation, scaling and translation invariant image watermarking using feature points. J China Univ Posts Telecommun 15(2):82\u201387. https:\/\/doi.org\/10.1016\/S1005-8885(08)60089-8","journal-title":"J China Univ Posts Telecommun"},{"issue":"14","key":"10421_CR46","first-page":"38","volume":"71","author":"P Dabas","year":"2013","unstructured":"Dabas P, Khanna K (2013) A Study on Spatial and Transform Domain Watermarking Techniques. Int J Comput Appl 71(14):38\u201341","journal-title":"Int J Comput Appl"},{"issue":"4","key":"10421_CR47","doi-asserted-by":"publisher","first-page":"56","DOI":"10.5815\/ijigsp.2017.04.07","volume":"9","author":"A Dixit","year":"2017","unstructured":"Dixit A, Dixit R (2017) A Review on Digital Image Watermarking Techniques. Int J Image Graph Signal Process 9(4):56\u201366. https:\/\/doi.org\/10.5815\/ijigsp.2017.04.07","journal-title":"Int J Image Graph Signal Process"},{"key":"10421_CR48","unstructured":"Do\u00ebrr G, Dugelay J-L (2003) Video watermarking: overview and challenges. In: Handbook of Video Databases: Design and Applications"},{"issue":"6","key":"10421_CR49","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1007\/s10278-012-9518-y","volume":"25","author":"W Dou","year":"2012","unstructured":"Dou W, Poh CL, Guan YL (2012) An Improved Tamper Detection and Localization Scheme for Volumetric DICOM Images. J Digit Imaging 25(6):751\u2013763. https:\/\/doi.org\/10.1007\/s10278-012-9518-y","journal-title":"J Digit Imaging"},{"key":"10421_CR50","unstructured":"El-Shazly EHM (2004) Digital Image Watermarking in Transform Domains, Minufiya University"},{"issue":"1","key":"10421_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4304\/jait.5.1.1-4","volume":"5","author":"MS Emami","year":"2014","unstructured":"Emami MS, Omar K, Sahran S, Abdullah SNHS (2014) Spatial Domain Approaches for Real-Time Ownership Identification. J Adv Inf Technol 5(1):1\u20134. https:\/\/doi.org\/10.4304\/jait.5.1.1-4","journal-title":"J Adv Inf Technol"},{"key":"10421_CR52","doi-asserted-by":"publisher","unstructured":"Eswaraiah R, Sreenivasa Reddy E (2014) Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. Int J Telemed Appl vol, 2014. https:\/\/doi.org\/10.1155\/2014\/984646.","DOI":"10.1155\/2014\/984646"},{"key":"10421_CR53","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.image.2018.09.015","volume":"70","author":"T-Y Fan","year":"2019","unstructured":"Fan T-Y, Chao H-C, Chieu B-C (2019) Lossless medical image watermarking method based on significant difference of cellular automata transform coefficient. Signal Process Image Commun 70:174\u2013183. https:\/\/doi.org\/10.1016\/j.image.2018.09.015","journal-title":"Signal Process Image Commun"},{"key":"10421_CR54","doi-asserted-by":"publisher","first-page":"164562","DOI":"10.1016\/j.ijleo.2020.164562","volume":"208","author":"K Fares","year":"2020","unstructured":"Fares K, Amine K, Salah E (2020) A robust blind color image watermarking based on Fourier transform domain. Optik (Stuttg) 208:164562. https:\/\/doi.org\/10.1016\/j.ijleo.2020.164562","journal-title":"Optik (Stuttg)"},{"issue":"5","key":"10421_CR55","doi-asserted-by":"publisher","first-page":"1247","DOI":"10.1148\/rg.295095151","volume":"29","author":"AE Flanders","year":"2009","unstructured":"Flanders AE (2009) Medical image and data sharing: Are we there yet? Radiographics 29(5):1247\u20131251. https:\/\/doi.org\/10.1148\/rg.295095151","journal-title":"Radiographics"},{"key":"10421_CR56","doi-asserted-by":"publisher","first-page":"7035264","DOI":"10.1155\/2018\/7035264","volume":"2018","author":"S Fu","year":"2018","unstructured":"Fu S, Zhang M, Mu C, Shen X (2018) Advancements of Medical Image Enhancement in Healthcare Applications. J Healthc Eng 2018:7035264. https:\/\/doi.org\/10.1155\/2018\/7035264","journal-title":"J Healthc Eng"},{"key":"10421_CR57","doi-asserted-by":"publisher","unstructured":"Gadhiya TD, Roy AK, Mitra SK, Mall V (2017) Use of discrete wavelet transform method for detection and localization of tampering in a digital medical image. In: 2017 IEEE Region 10 Symposium (TENSYMP), pp. 1\u20135. https:\/\/doi.org\/10.1109\/TENCONSpring.2017.8070082","DOI":"10.1109\/TENCONSpring.2017.8070082"},{"key":"10421_CR58","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.bspc.2018.02.007","volume":"43","author":"Y Gangadhar","year":"2018","unstructured":"Gangadhar Y, Giridhar Akula VS, Reddy PC (2018) An evolutionary programming approach for securing medical images using watermarking scheme in invariant discrete wavelet transformation. Biomed Signal Process Control 43:31\u201340. https:\/\/doi.org\/10.1016\/j.bspc.2018.02.007","journal-title":"Biomed Signal Process Control"},{"key":"10421_CR59","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1007\/978-3-642-16444-6_63","volume":"78 CCIS","author":"D Ganguly","year":"2010","unstructured":"Ganguly D, Chakraborty S, Balitanas M, Kim TH (2010) Medical imaging: A review. Commun Comput Inf Sci 78 CCIS:504\u2013516. https:\/\/doi.org\/10.1007\/978-3-642-16444-6_63","journal-title":"Commun Comput Inf Sci"},{"issue":"10","key":"10421_CR60","doi-asserted-by":"publisher","first-page":"2053","DOI":"10.1016\/j.sigpro.2009.04.015","volume":"89","author":"X Gao","year":"2009","unstructured":"Gao X, An L, Li X, Tao D (2009) Reversibility improved lossless data hiding. Signal Process 89(10):2053\u20132065. https:\/\/doi.org\/10.1016\/j.sigpro.2009.04.015","journal-title":"Signal Process"},{"key":"10421_CR61","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.ins.2017.01.009","volume":"385-386","author":"G Gao","year":"2017","unstructured":"Gao G, Wan X, Yao S, Cui Z, Zhou C, Sun X (2017) Reversible data hiding with contrast enhancement and tamper localization for medical images. Inf Sci (NY) 385-386:250\u2013265. https:\/\/doi.org\/10.1016\/j.ins.2017.01.009","journal-title":"Inf Sci (NY)"},{"key":"10421_CR62","doi-asserted-by":"crossref","unstructured":"Giakoumaki A, Pavlopoulos S, Koutsouris D (2005) Multiple digital watermarking applied to medical imaging. Conf Proc Int Conf. IEEE Eng Med Biol Soc 4, pp. 3444\u20133447. Available: http:\/\/www.ncbi.nlm.nih.gov\/pubmed\/17280964","DOI":"10.1109\/IEMBS.2005.1617219"},{"issue":"4","key":"10421_CR63","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1109\/TITB.2006.875655","volume":"10","author":"A Giakoumaki","year":"2006","unstructured":"Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Multiple image watermarking applied to health information management. IEEE Trans Inf Technol Biomed 10(4):722\u2013732. https:\/\/doi.org\/10.1109\/TITB.2006.875655","journal-title":"IEEE Trans Inf Technol Biomed"},{"issue":"8","key":"10421_CR64","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/s11517-006-0081-x","volume":"44","author":"A Giakoumaki","year":"2006","unstructured":"Giakoumaki A, Pavlopoulos S, Koutsouris D (2006) Secure and efficient health data management through multiple watermarking on medical images. Med Biol Eng Comput 44(8):619\u2013631. https:\/\/doi.org\/10.1007\/s11517-006-0081-x","journal-title":"Med Biol Eng Comput"},{"key":"10421_CR65","doi-asserted-by":"publisher","unstructured":"Gueorguiev VE, Ivanov IE, Ivanov BI (2019) Improving quality of digital medical images. In: 2019 Second Balkan Junior Conference on Lighting (Balkan Light Junior), pp. 1\u20136. https:\/\/doi.org\/10.1109\/BLJ.2019.8883604","DOI":"10.1109\/BLJ.2019.8883604"},{"key":"10421_CR66","doi-asserted-by":"publisher","unstructured":"Gull S, Loan NA, Parah SA, Sheikh JA, Bhat GM (2018) An efficient watermarking technique for tamper detection and localization of medical images. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-018-1158-8","DOI":"10.1007\/s12652-018-1158-8"},{"issue":"1","key":"10421_CR67","first-page":"37","volume":"2","author":"BL Gunjal","year":"2010","unstructured":"Gunjal BL, Manthalkar RR (2010) An overview of transform domain robust digital image watermarking algorithms. J Emerg Trends Comput Inf Sci 2(1):37\u201342","journal-title":"J Emerg Trends Comput Inf Sci"},{"issue":"1","key":"10421_CR68","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s10278-007-9043-6","volume":"22","author":"X Guo","year":"2009","unstructured":"Guo X, Zhuang TG (2009) A region-based lossless watermarking scheme for enhancing security of medical data. J Digit Imaging 22(1):53\u201364. https:\/\/doi.org\/10.1007\/s10278-007-9043-6","journal-title":"J Digit Imaging"},{"issue":"6","key":"10421_CR69","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1007\/s10278-008-9120-5","volume":"22","author":"X Guo","year":"2009","unstructured":"Guo X, Zhuang TG (2009) Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digit Imaging 22(6):620\u2013628. https:\/\/doi.org\/10.1007\/s10278-008-9120-5","journal-title":"J Digit Imaging"},{"key":"10421_CR70","doi-asserted-by":"publisher","unstructured":"hang X, Liu X, Chen Y, Shu H (2018) Medical image blind integrity verification with krawtchouk moments. Int J Biomed Imaging 2018. https:\/\/doi.org\/10.1155\/2018\/2572431.","DOI":"10.1155\/2018\/2572431"},{"issue":"1","key":"10421_CR71","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-007-0154-3","volume":"39","author":"A Haouzia","year":"2008","unstructured":"Haouzia A, Noumeir R (2008) Methods for image authentication: A survey. Multimed Tools Appl 39(1):1\u201346. https:\/\/doi.org\/10.1007\/s11042-007-0154-3","journal-title":"Multimed Tools Appl"},{"key":"10421_CR72","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.10.016","volume":"426","author":"T Huynh-The","year":"2018","unstructured":"Huynh-The T et al (2018) Selective bit embedding scheme for robust blind color image watermarking. Inf Sci (NY) 426:1\u201318. https:\/\/doi.org\/10.1016\/j.ins.2017.10.016","journal-title":"Inf Sci (NY)"},{"issue":"3","key":"10421_CR73","doi-asserted-by":"publisher","first-page":"513","DOI":"10.4304\/jcp.9.3.513-518","volume":"9","author":"S Islam","year":"2014","unstructured":"Islam S, Das A, Gupta S, Gupta P (2014) Data hiding in medical images. J Comput 9(3):513\u2013518. https:\/\/doi.org\/10.4304\/jcp.9.3.513-518","journal-title":"J Comput"},{"issue":"1","key":"10421_CR74","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1515\/jisys-2017-0019","volume":"27","author":"J Jennifer Ranjani","year":"2018","unstructured":"Jennifer Ranjani J, Babu M (2018) Medical Image Reliability Verification Using Hash Signatures and Sequential Square Encoding. J Intell Syst 27(1):19\u201330. https:\/\/doi.org\/10.1515\/jisys-2017-0019","journal-title":"J Intell Syst"},{"key":"10421_CR75","doi-asserted-by":"publisher","unstructured":"Kallianpur AK, Bharath MV, Manikantan K (2015) Digital image watermarking using optimized transform-domain approach. In: 2015 IEEE UP Section Conference on Electrical Computer and Electronics (UPCON), pp. 1\u20136. https:\/\/doi.org\/10.1109\/UPCON.2015.7456684","DOI":"10.1109\/UPCON.2015.7456684"},{"key":"10421_CR76","doi-asserted-by":"publisher","unstructured":"Kang X, Zhao F, Chen Y, Lin G, Jing C (2020) Combining polar harmonic transforms and 2D compound chaotic map for distinguishable and robust color image zero-watermarking algorithm. J Vis Commun Image Represent 102804. https:\/\/doi.org\/10.1016\/j.jvcir.2020.102804.","DOI":"10.1016\/j.jvcir.2020.102804"},{"issue":"6","key":"10421_CR77","first-page":"181","volume":"8","author":"A Kannammal","year":"2011","unstructured":"Kannammal A, Rani SS (2011) Authentication of DICOM Medical Images using Multiple fragile watermarking Techniques in Wavelet Transform Domain. Int J Comput Sci Issues 8(6):181\u2013189","journal-title":"Int J Comput Sci Issues"},{"issue":"1","key":"10421_CR78","first-page":"241","volume":"3","author":"M Kaur","year":"2012","unstructured":"Kaur M, Kaur R (2012) Reversible watermarking of medical images: authentication and recovery-a survey. J Inf Oper Manag 3(1):241\u2013244","journal-title":"J Inf Oper Manag"},{"issue":"3","key":"10421_CR79","first-page":"20","volume":"4","author":"C Kavadia","year":"2013","unstructured":"Kavadia C Available Online at www.ijarcs.info(2013) A review on spatial & transform domain digital watermarking techniques. Int J Adv Res Comput Sci 4(3):20\u201322","journal-title":"Int J Adv Res Comput Sci"},{"key":"10421_CR80","doi-asserted-by":"publisher","unstructured":"Kelkar V, Tuckley K, Nemade H (2017) Novel variants of a histogram shift-based reversible watermarking technique for medical images to improve hiding capacity. J Healthc Eng 2017, no. i. https:\/\/doi.org\/10.1155\/2017\/3538979.","DOI":"10.1155\/2017\/3538979"},{"issue":"3","key":"10421_CR81","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/s10278-016-9930-9","volume":"30","author":"HL Khor","year":"2017","unstructured":"Khor HL, Liew SC, Zain JM (2017) Region of Interest-Based Tamper Detection and Lossless Recovery Watermarking Scheme (ROI-DR) on Ultrasound Medical Images. J Digit Imaging 30(3):328\u2013349. https:\/\/doi.org\/10.1007\/s10278-016-9930-9","journal-title":"J Digit Imaging"},{"issue":"2019","key":"10421_CR82","doi-asserted-by":"publisher","first-page":"1505","DOI":"10.1016\/j.procs.2020.03.361","volume":"167","author":"RR Kishore","year":"2020","unstructured":"Kishore RR (2020) A Novel and Efficient Blind Image Watermarking In Transform A Novel and Efficient Blind Domain Image Watermarking In Transform Domain. Procedia Comput Sci 167(2019):1505\u20131514. https:\/\/doi.org\/10.1016\/j.procs.2020.03.361","journal-title":"Procedia Comput Sci"},{"issue":"5","key":"10421_CR83","first-page":"2882","volume":"11","author":"PVV Kishore","year":"2016","unstructured":"Kishore PVV, Srinivasa Rao M, Raghava Prasad C, Anil Kumar D (2016) Medical image watermarking: Run through review. ARPN J Eng Appl Sci 11(5):2882\u20132899","journal-title":"ARPN J Eng Appl Sci"},{"issue":"3","key":"10421_CR84","first-page":"1","volume":"2","author":"MMB Kulkarni","year":"2012","unstructured":"Kulkarni MMB, Patil RT (2012) Tamper Detection & Recovery in Medical Image with secure data hiding using Reversible watermarking. Int J Emerg Technol Adv Eng 2(3):1\u20134","journal-title":"Int J Emerg Technol Adv Eng"},{"issue":"14","key":"10421_CR85","doi-asserted-by":"publisher","first-page":"19663","DOI":"10.1007\/s11042-019-7322-0","volume":"78","author":"H-Y Lee","year":"2019","unstructured":"Lee H-Y (2019) Adaptive reversible watermarking for authentication and privacy protection of medical records. Multimed Tools Appl 78(14):19663\u201319680. https:\/\/doi.org\/10.1007\/s11042-019-7322-0","journal-title":"Multimed Tools Appl"},{"key":"10421_CR86","doi-asserted-by":"publisher","unstructured":"Lee YS, Seo YH, Kim DW (2019) Blind image watermarking based on adaptive data spreading in N-level DWT subbands. Secur Commun Networks, vol. 2019. https:\/\/doi.org\/10.1155\/2019\/8357251.","DOI":"10.1155\/2019\/8357251"},{"issue":"2","key":"10421_CR87","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.aeue.2007.11.007","volume":"63","author":"L-D Li","year":"2009","unstructured":"Li L-D, Guo B-L (2009) Localized image watermarking in spatial domain resistant to geometric attacks. AEU Int J Electron Commun 63(2):123\u2013131. https:\/\/doi.org\/10.1016\/j.aeue.2007.11.007","journal-title":"AEU Int J Electron Commun"},{"issue":"5","key":"10421_CR88","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1016\/j.aeue.2010.06.001","volume":"65","author":"L Li","year":"2011","unstructured":"Li L, Qian J, Pan JS (2011) Characteristic region based watermark embedding with RST invariance and high capacity. AEU Int J Electron Commun 65(5):435\u2013442. https:\/\/doi.org\/10.1016\/j.aeue.2010.06.001","journal-title":"AEU Int J Electron Commun"},{"issue":"2","key":"10421_CR89","doi-asserted-by":"publisher","first-page":"317","DOI":"10.2478\/v10175-012-0042-5","volume":"60","author":"P Lipi\u0144ski","year":"2012","unstructured":"Lipi\u0144ski P (2012) On domain selection for additive, blind image watermarking. Bull Polish Acad Sci Tech Sci 60(2):317\u2013321. https:\/\/doi.org\/10.2478\/v10175-012-0042-5","journal-title":"Bull Polish Acad Sci Tech Sci"},{"issue":"2","key":"10421_CR90","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1049\/iet-ifs.2009.0183","volume":"5","author":"F Liu","year":"2011","unstructured":"Liu F, Wu C (2011) Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners. IET Inf Secur 5(2):121\u2013128. https:\/\/doi.org\/10.1049\/iet-ifs.2009.0183","journal-title":"IET Inf Secur"},{"key":"10421_CR91","doi-asserted-by":"publisher","unstructured":"Liu J, Li J, Ma J, Sadiq N, Bhatti UA, Ai Y (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and henon map. Appl Sci 9(4). https:\/\/doi.org\/10.3390\/app9040700.","DOI":"10.3390\/app9040700"},{"key":"10421_CR92","doi-asserted-by":"crossref","unstructured":"Liu X et al. (2019) A novel robust reversible watermarking scheme for protecting authenticity and integrity of medical images. IEEE Access, vol. 7, pp. 76580\u201376598. Available: https:\/\/repository.lboro.ac.uk\/articles\/A_novel_robust_reversible_watermarking_scheme_for_protecting_authenticity_and_integrity_of_medical_images\/9402785.","DOI":"10.1109\/ACCESS.2019.2921894"},{"key":"10421_CR93","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.jbi.2017.08.002","volume":"73","author":"NA Loan","year":"2017","unstructured":"Loan NA, Parah SA, Sheikh JA, Akhoon JA, Bhat GM (2017) Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications. J Biomed Inform 73:125\u2013136. https:\/\/doi.org\/10.1016\/j.jbi.2017.08.002","journal-title":"J Biomed Inform"},{"issue":"8","key":"10421_CR94","doi-asserted-by":"publisher","first-page":"184","DOI":"10.17148\/IJARCCE.2016.5834","volume":"5","author":"YU Madhuri","year":"2016","unstructured":"Madhuri YU, Chaitanya K (2016) Reversible watermarking technique for data hiding, accurate tamper detection in ROI and exact recovery of ROI. IJARCCE 5(8):184\u2013188. https:\/\/doi.org\/10.17148\/IJARCCE.2016.5834","journal-title":"IJARCCE"},{"key":"10421_CR95","doi-asserted-by":"crossref","unstructured":"Maier A, Steidl S, Christlein V, Hornegger J (2018) Medical imaging systems - an introductory guide, vol. 11111. Springer Open","DOI":"10.1007\/978-3-319-96520-8"},{"key":"10421_CR96","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.ins.2017.07.026","volume":"417","author":"NM Makbol","year":"2017","unstructured":"Makbol NM, Khoo BE, Rassem TH, Loukhaoukha K (2017) A new reliable optimized image watermarking scheme based on the integer wavelet transform and singular value decomposition for copyright protection. Inf Sci (NY) 417:381\u2013400. https:\/\/doi.org\/10.1016\/j.ins.2017.07.026","journal-title":"Inf Sci (NY)"},{"key":"10421_CR97","doi-asserted-by":"publisher","unstructured":"Malayil MV, Vedhanayagam M (2020) A novel image scaling based reversible watermarking scheme for secure medical image transmission. ISA Trans. https:\/\/doi.org\/10.1016\/j.isatra.2020.08.019.","DOI":"10.1016\/j.isatra.2020.08.019"},{"key":"10421_CR98","unstructured":"Marini E et al. (2008) Evaluation of standard watermarking techniques. Electron Imaging Secur Steganography Watermarking Multimed. Contents. Available: https:\/\/hal.archives-ouvertes.fr\/hal-00250682"},{"key":"10421_CR99","unstructured":"Memon Ahmed N (2010) Watermarking of medical images for content authentication and copyright protection, vol. Doctor of, no. May, p. 195"},{"issue":"10","key":"10421_CR100","doi-asserted-by":"publisher","first-page":"2057","DOI":"10.1080\/00207160.2010.543677","volume":"88","author":"NA Memon","year":"2011","unstructured":"Memon NA, Chaudhry A, Ahmad M, Keerio ZA (2011) Hybrid watermarking of medical images for ROI authentication and recovery. Int J Comput Math 88(10):2057\u20132071. https:\/\/doi.org\/10.1080\/00207160.2010.543677","journal-title":"Int J Comput Math"},{"key":"10421_CR101","doi-asserted-by":"publisher","unstructured":"Mohanarathinam A, Kamalraj S, Prasanna Venkatesan GKD, Ravi RV, Manikandababu CS (2019) Digital watermarking techniques for image security: a review. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-019-01500-1","DOI":"10.1007\/s12652-019-01500-1"},{"key":"10421_CR102","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.measurement.2018.12.030","volume":"136","author":"R Mothi","year":"2019","unstructured":"Mothi R, Karthikeyan M (2019) Protection of bio medical iris image using watermarking and cryptography with WPT. Measurement 136:67\u201373. https:\/\/doi.org\/10.1016\/j.measurement.2018.12.030","journal-title":"Measurement"},{"issue":"6","key":"10421_CR103","doi-asserted-by":"publisher","first-page":"714","DOI":"10.1007\/s10278-014-9700-5","volume":"27","author":"SM Mousavi","year":"2014","unstructured":"Mousavi SM, Naghsh A, Abu-Bakar SAR (2014) Watermarking Techniques used in Medical Images: a Survey. J Digit Imaging 27(6):714\u2013729. https:\/\/doi.org\/10.1007\/s10278-014-9700-5","journal-title":"J Digit Imaging"},{"issue":"6","key":"10421_CR104","first-page":"488","volume":"3","author":"MT Naseem","year":"2013","unstructured":"Naseem MT, Qureshi IM, Cheema TA (2013) Hash based Medical Image Authentication and Recovery using Chaos and Residue Number System. J Basic Appl Sci Res 3(6):488\u2013495","journal-title":"J Basic Appl Sci Res"},{"issue":"8","key":"10421_CR105","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1016\/j.aeue.2016.05.003","volume":"70","author":"T-S Nguyen","year":"2016","unstructured":"Nguyen T-S, Chang C-C, Yang X-Q (2016) A reversible image authentication scheme based on fragile watermarking in discrete wavelet transform domain. AEU Int J Electron Commun 70(8):1055\u20131061. https:\/\/doi.org\/10.1016\/j.aeue.2016.05.003","journal-title":"AEU Int J Electron Commun"},{"issue":"4","key":"10421_CR106","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/TCSVT.2008.918761","volume":"18","author":"Z Ni","year":"2008","unstructured":"Ni Z, Shi YQ, Ansari N, Su W, Sun Q, Lin X (2008) Robust lossless image data hiding designed for semi-fragile image authentication. IEEE Trans Circ Syst Video Technol 18(4):497\u2013509. https:\/\/doi.org\/10.1109\/TCSVT.2008.918761","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"2","key":"10421_CR107","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/s10278-012-9527-x","volume":"26","author":"H Nyeem","year":"2013","unstructured":"Nyeem H, Boles W, Boyd C (2013) A review of medical image watermarking requirements for teleradiology. J Digit Imaging 26(2):326\u2013343. https:\/\/doi.org\/10.1007\/s10278-012-9527-x","journal-title":"J Digit Imaging"},{"key":"10421_CR108","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.jbi.2017.01.006","volume":"66","author":"SA Parah","year":"2017","unstructured":"Parah SA, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: A new high capacity and reversible data hiding technique. J Biomed Inform 66:214\u2013230. https:\/\/doi.org\/10.1016\/j.jbi.2017.01.006","journal-title":"J Biomed Inform"},{"issue":"3","key":"10421_CR109","doi-asserted-by":"publisher","first-page":"3617","DOI":"10.1007\/s11042-016-3913-1","volume":"76","author":"Priyanka","year":"2017","unstructured":"Priyanka, Maheshkar S (2017) Region-based hybrid medical image watermarking for secure telemedicine applications. Multimed Tools Appl 76(3):3617\u20133647. https:\/\/doi.org\/10.1007\/s11042-016-3913-1","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"10421_CR110","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.cosrev.2017.11.003","volume":"27","author":"AF Qasim","year":"2018","unstructured":"Qasim AF, Meziane F, Aspin R (2018) Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review. Comput Sci Rev 27(2):45\u201360. https:\/\/doi.org\/10.1016\/j.cosrev.2017.11.003","journal-title":"Comput Sci Rev"},{"issue":"12","key":"10421_CR111","doi-asserted-by":"publisher","first-page":"16433","DOI":"10.1007\/s11042-018-7029-7","volume":"78","author":"AF Qasim","year":"2019","unstructured":"Qasim AF, Aspin R, Meziane F, Hogg P (2019) ROI-based reversible watermarking scheme for ensuring the integrity and authenticity of DICOM MR images. Multimed Tools Appl 78(12):16433\u201316463. https:\/\/doi.org\/10.1007\/s11042-018-7029-7","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"10421_CR112","doi-asserted-by":"publisher","first-page":"126","DOI":"10.14569\/ijacsa.2019.0100217","volume":"10","author":"R Radha Kumari","year":"2019","unstructured":"Radha Kumari R, Vijaya Kumar V, Naidu KR (2019) Existing trends of digital watermarking and its significant impact on multimedia streaming: A survey. Int J Adv Comput Sci Appl 10(2):126\u2013139. https:\/\/doi.org\/10.14569\/ijacsa.2019.0100217","journal-title":"Int J Adv Comput Sci Appl"},{"key":"10421_CR113","doi-asserted-by":"publisher","unstructured":"Rahman AU, Sultan K, Musleh D, Aldhafferi N, Alqahtani A, Mahmud M (2018) Robust and fragile medical image watermarking: a joint venture of coding and chaos theories. J Healthc Eng 2018. https:\/\/doi.org\/10.1155\/2018\/8137436","DOI":"10.1155\/2018\/8137436"},{"key":"10421_CR114","doi-asserted-by":"publisher","unstructured":"Rahman AU, Sultan K, Aldhafferi N, Alqahtani A, and Mahmud M 2018) Reversible and fragile watermarking for medical images. Comput Math Methods Med, 2018, https:\/\/doi.org\/10.1155\/2018\/3461382","DOI":"10.1155\/2018\/3461382"},{"issue":"18","key":"10421_CR115","doi-asserted-by":"publisher","first-page":"18605","DOI":"10.1007\/s11042-016-4215-3","volume":"76","author":"A Rai","year":"2017","unstructured":"Rai A, Singh HV (2017) SVM based robust watermarking for enhanced medical image security. Multimed Tools Appl 76(18):18605\u201318618. https:\/\/doi.org\/10.1007\/s11042-016-4215-3","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10421_CR116","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1515\/jisys-2017-0068","volume":"27","author":"A Rai","year":"2018","unstructured":"Rai A, Singh HV (2018) Machine Learning-Based Robust Watermarking Technique for Medical Image Transmitted over LTE Network. J Intell Syst 27(1):105\u2013114. https:\/\/doi.org\/10.1515\/jisys-2017-0068","journal-title":"J Intell Syst"},{"issue":"1","key":"10421_CR117","first-page":"27","volume":"1","author":"SC Rathi","year":"2012","unstructured":"Rathi SC, Inamdar VS (2012) Medical Images Authentication Through Watermarking Preserving Roi. Heal Inf-An Int J 1(1):27\u201342","journal-title":"Heal Inf-An Int J"},{"key":"10421_CR118","doi-asserted-by":"publisher","unstructured":"Ra\u00fal RC, Claudia FU, Trinidad-Blas GDJ (2007) Data hiding scheme for medical images. In: 17th Int. Conf. Electron. Commun. Comput. CONIELECOMP\u201907, Proc., no. February 2007. https:\/\/doi.org\/10.1109\/CONIELECOMP.2007.14","DOI":"10.1109\/CONIELECOMP.2007.14"},{"key":"10421_CR119","doi-asserted-by":"crossref","unstructured":"Rayachoti E, Edara SR, Pradesh A, Pradesh A (2014) Block based medical image watermarking technique for tamper detection and recovery. arXiv:1412.6143 [cs.MM]","DOI":"10.1109\/ISSPIT.2014.7300608"},{"issue":"06","key":"10421_CR120","first-page":"2556","volume":"03","author":"C Razbonyal\u0131","year":"2016","unstructured":"Razbonyal\u0131 C, G\u00fcveno\u011flu E (2016) Traditional Data Storage Methods and the Big Data Concepts. Int Res J Eng Technol 03(06):2556\u20132561","journal-title":"Int Res J Eng Technol"},{"key":"10421_CR121","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.bspc.2016.05.005","volume":"29","author":"A Ro\u010dek","year":"2016","unstructured":"Ro\u010dek A, Slav\u00ed\u010dek K, Dost\u00e1l O, Javorn\u00edk M (2016) A new approach to fully-reversible watermarking in medical imaging with breakthrough visibility parameters. Biomed Signal Process Control 29:44\u201352. https:\/\/doi.org\/10.1016\/j.bspc.2016.05.005","journal-title":"Biomed Signal Process Control"},{"issue":"3","key":"10421_CR122","first-page":"536","volume":"1","author":"S Rohini","year":"2010","unstructured":"Rohini S, Bairagi V (2010) Lossless Medical Image Security. Int J Appl Eng Res 1(3):536\u2013541","journal-title":"Int J Appl Eng Res"},{"issue":"3","key":"10421_CR123","doi-asserted-by":"publisher","first-page":"232","DOI":"10.4338\/ACI-2010-03-RA-0019","volume":"1","author":"ST Rosenbloom","year":"2010","unstructured":"Rosenbloom ST et al (2010) Generating clinical notes for electronic health record systems. Appl Clin Inform 1(3):232\u2013243. https:\/\/doi.org\/10.4338\/ACI-2010-03-RA-0019","journal-title":"Appl Clin Inform"},{"issue":"23","key":"10421_CR124","doi-asserted-by":"publisher","first-page":"34129","DOI":"10.1007\/s11042-019-08134-7","volume":"78","author":"F Sabbane","year":"2019","unstructured":"Sabbane F, Tairi H (2019) Medical image watermarking technique based on polynomial decomposition. Multimed Tools Appl 78(23):34129\u201334155. https:\/\/doi.org\/10.1007\/s11042-019-08134-7","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"10421_CR125","doi-asserted-by":"publisher","first-page":"152","DOI":"10.30534\/ijiscs\/2019\/36822019","volume":"8","author":"G Saju","year":"2019","unstructured":"Saju G (2019) An effective method for detection and localization of tampering. Int J Inf Syst Comput Sci 8(2):152\u2013154. https:\/\/doi.org\/10.30534\/ijiscs\/2019\/36822019","journal-title":"Int J Inf Syst Comput Sci"},{"key":"10421_CR126","doi-asserted-by":"publisher","unstructured":"Senapati RK, Srivastava S, Mankar P (2020) RST invariant blind image watermarking schemes based on discrete Tchebichef transform and singular value decomposition. Optik (Stuttg), 164694. https:\/\/doi.org\/10.1016\/j.ijleo.2020.164694","DOI":"10.1016\/j.ijleo.2020.164694"},{"key":"10421_CR127","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.procs.2018.07.047","volume":"133","author":"A Shaik","year":"2018","unstructured":"Shaik A, Masilamani V (2018) Zero-Watermarking in Transform Domain and Quadtree Decomposition for under Water Images Captured by Robot. Procedia Comput Sci 133:385\u2013392. https:\/\/doi.org\/10.1016\/j.procs.2018.07.047","journal-title":"Procedia Comput Sci"},{"key":"10421_CR128","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1016\/j.procs.2015.10.117","volume":"70","author":"A Sharma","year":"2015","unstructured":"Sharma A, Singh AK, Ghrera SP (2015) Secure Hybrid Robust Watermarking Technique for Medical Images. Procedia Comput Sci 70:778\u2013784. https:\/\/doi.org\/10.1016\/j.procs.2015.10.117","journal-title":"Procedia Comput Sci"},{"key":"10421_CR129","doi-asserted-by":"publisher","first-page":"10269","DOI":"10.1109\/ACCESS.2018.2799240","volume":"6","author":"A Shehab","year":"2018","unstructured":"Shehab A et al (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269\u201310278. https:\/\/doi.org\/10.1109\/ACCESS.2018.2799240","journal-title":"IEEE Access"},{"issue":"1","key":"10421_CR130","first-page":"3","volume":"33","author":"L Shiguo","year":"2009","unstructured":"Shiguo L, Kanellopoulos D, Ruffo G (2009) Recent advances in multimedia information system security. Inform 33(1):3\u201324","journal-title":"Inform"},{"key":"10421_CR131","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1016\/j.ins.2016.07.015","volume":"367\u2013368","author":"FY Shih","year":"2016","unstructured":"Shih FY, Zhong X (2016) High-capacity multiple regions of interest watermarking for medical images. Inf Sci (NY) 367\u2013368:648\u2013659. https:\/\/doi.org\/10.1016\/j.ins.2016.07.015","journal-title":"Inf Sci (NY)"},{"key":"10421_CR132","doi-asserted-by":"publisher","unstructured":"Singh G (2018) A review of secure medical image watermarking. IEEE Int. Conf. Power, Control. Signals Instrum. Eng. ICPCSI 2017, no. June 2018, pp. 3105\u20133109. https:\/\/doi.org\/10.1109\/ICPCSI.2017.8392297","DOI":"10.1109\/ICPCSI.2017.8392297"},{"issue":"1C2","key":"10421_CR133","first-page":"329","volume":"8","author":"KU Singh","year":"2019","unstructured":"Singh KU, Singhal A (2019) A synthesis of state of the art contributions in digital image watermarking. Int J Recent Technol Eng 8(1C2):329\u2013340","journal-title":"Int J Recent Technol Eng"},{"issue":"14","key":"10421_CR134","doi-asserted-by":"publisher","first-page":"8381","DOI":"10.1007\/s11042-015-2754-7","volume":"75","author":"AK Singh","year":"2016","unstructured":"Singh AK, Dave M, Mohan A (2016) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl 75(14):8381\u20138401. https:\/\/doi.org\/10.1007\/s11042-015-2754-7","journal-title":"Multimed Tools Appl"},{"key":"10421_CR135","doi-asserted-by":"crossref","unstructured":"Singh AK, Kumar B, Singh G, Mohan A (2017) Medical image watermarking, 1st ed. Springer International Publishing","DOI":"10.1007\/978-3-319-57699-2_1"},{"key":"10421_CR136","first-page":"227","volume-title":"State-of-the-Art Techniques of Image Watermarking: New Trends and Future Challenges BT - Medical Image Watermarking: Techniques and Applications","author":"AK Singh","year":"2017","unstructured":"Singh AK, Kumar B, Singh G, Mohan A (2017) In: Singh AK, Kumar B, Singh G, Mohan A (eds) State-of-the-Art Techniques of Image Watermarking: New Trends and Future Challenges BT - Medical Image Watermarking: Techniques and Applications. Springer International Publishing, Cham, pp 227\u2013244"},{"key":"10421_CR137","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1016\/j.procs.2018.05.009","volume":"132","author":"S Sinha","year":"2018","unstructured":"Sinha S, Singh A, Gupta R, Singh S (2018) Authentication and Tamper Detection in Tele-medicine using Zero Watermarking. Procedia Comput Sci 132:557\u2013562. https:\/\/doi.org\/10.1016\/j.procs.2018.05.009","journal-title":"Procedia Comput Sci"},{"key":"10421_CR138","doi-asserted-by":"publisher","unstructured":"Soualmi A, Alti A, Laouamer L (2018) Toward a Secure and Robust Medical Image Watermarking in Untrusted Environment. AMLTA 2018 Adv Intell Syst Comput, vol. 723, pp. 693\u2013703. https:\/\/doi.org\/10.1007\/978-3-319-74690-6_68.","DOI":"10.1007\/978-3-319-74690-6_68"},{"issue":"23","key":"10421_CR139","doi-asserted-by":"publisher","first-page":"6255","DOI":"10.1016\/j.ijleo.2013.05.013","volume":"124","author":"Q Su","year":"2013","unstructured":"Su Q, Niu Y, Wang Q, Sheng G (2013) A blind color image watermarking based on DC component in the spatial domain. Optik (Stuttg) 124(23):6255\u20136260. https:\/\/doi.org\/10.1016\/j.ijleo.2013.05.013","journal-title":"Optik (Stuttg)"},{"key":"10421_CR140","doi-asserted-by":"publisher","unstructured":"Sun S, Zhang R (2017) Region of interest extraction of medical image based on improved region growing algorithm. In: International Conference on Material Science, Energy and Environmental Engineering (MSEEE 2017), vol. 125, pp. 360\u2013364, https:\/\/doi.org\/10.2991\/mseee-17.2017.87","DOI":"10.2991\/mseee-17.2017.87"},{"issue":"21","key":"10421_CR141","doi-asserted-by":"publisher","first-page":"28249","DOI":"10.1007\/s11042-018-6020-7","volume":"77","author":"K Swaraja","year":"2018","unstructured":"Swaraja K (2018) Medical image region based watermarking for secured telemedicine. Multimed Tools Appl 77(21):28249\u201328280. https:\/\/doi.org\/10.1007\/s11042-018-6020-7","journal-title":"Multimed Tools Appl"},{"key":"10421_CR142","doi-asserted-by":"publisher","first-page":"101665","DOI":"10.1016\/j.bspc.2019.101665","volume":"55","author":"K Swaraja","year":"2020","unstructured":"Swaraja K, Meenakshi K, Padmavathi K (2020) An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomed Signal Process Control 55:101665. https:\/\/doi.org\/10.1016\/j.bspc.2019.101665","journal-title":"Biomed Signal Process Control"},{"issue":"3","key":"10421_CR143","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/s10278-010-9295-4","volume":"24","author":"CK Tan","year":"2011","unstructured":"Tan CK, Ng JC, Xu X, Poh CL, Guan YL, Sheah K (2011) Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24(3):528\u2013540. https:\/\/doi.org\/10.1007\/s10278-010-9295-4","journal-title":"J Digit Imaging"},{"key":"10421_CR144","doi-asserted-by":"publisher","unstructured":"Tareef A, Al-Ani A, Nguyen H, Chung YY (2014) A novel tamper detection-recovery and watermarking system for medical image authentication and EPR hiding. In: 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 5554\u20135557. https:\/\/doi.org\/10.1109\/EMBC.2014.6944885","DOI":"10.1109\/EMBC.2014.6944885"},{"key":"10421_CR145","doi-asserted-by":"crossref","unstructured":"Thabit R (2015) A study of robust reversible image watermarking based on Slantlet transform (PhD thesis),\u201d Universiti Sains Malaysia","DOI":"10.1016\/j.jss.2013.09.033"},{"issue":"89","key":"10421_CR146","first-page":"110","volume":"8","author":"R Thabit","year":"2019","unstructured":"Thabit R (2019) Review of Cryptography Applications in eHealth Security Systems. Int J Sci Eng Investig 8(89):110\u2013116 Available: http:\/\/www.ijsei.com\/papers\/ijsei-88919-16.pdf","journal-title":"Int J Sci Eng Investig"},{"key":"10421_CR147","doi-asserted-by":"publisher","unstructured":"Thabit R, Khoo BE (2014) Capacity improved robust lossless image watermarking. IET Image Process 8(11). https:\/\/doi.org\/10.1049\/iet-ipr.2013.0862","DOI":"10.1049\/iet-ipr.2013.0862"},{"key":"10421_CR148","doi-asserted-by":"publisher","unstructured":"Thabit R, Khoo BE (2014) Robust reversible watermarking scheme using Slantlet transform matrix. J Syst Softw 88(1). https:\/\/doi.org\/10.1016\/j.jss.2013.09.033.","DOI":"10.1016\/j.jss.2013.09.033"},{"key":"10421_CR149","doi-asserted-by":"publisher","unstructured":"Thabit R, Khoo BE (2015) A new robust lossless data hiding scheme and its application to color medical images. Digit Signal Process Rev J 38. https:\/\/doi.org\/10.1016\/j.dsp.2014.12.005","DOI":"10.1016\/j.dsp.2014.12.005"},{"issue":"1","key":"10421_CR150","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s11042-015-3055-x","volume":"76","author":"R Thabit","year":"2017","unstructured":"Thabit R, Khoo BE (2017) Medical image authentication using SLT and IWT schemes. Multimed Tools Appl 76(1):309\u2013332. https:\/\/doi.org\/10.1007\/s11042-015-3055-x","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"10421_CR151","doi-asserted-by":"publisher","first-page":"3669","DOI":"10.1007\/s11042-016-3928-7","volume":"76","author":"FN Thakkar","year":"2017","unstructured":"Thakkar FN, Srivastava VK (2017) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed Tools Appl 76(3):3669\u20133697. https:\/\/doi.org\/10.1007\/s11042-016-3928-7","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"10421_CR152","doi-asserted-by":"publisher","first-page":"13905","DOI":"10.1007\/s11042-018-6746-2","volume":"78","author":"R Thanki","year":"2019","unstructured":"Thanki R, Borra S (2019) Fragile watermarking for copyright authentication and tamper detection of medical images using compressive sensing (CS) based encryption and contourlet domain processing. Multimed Tools Appl 78(10):13905\u201313924. https:\/\/doi.org\/10.1007\/s11042-018-6746-2","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"10421_CR153","doi-asserted-by":"publisher","first-page":"1366","DOI":"10.1016\/j.jestch.2017.06.001","volume":"20","author":"R Thanki","year":"2017","unstructured":"Thanki R, Borra S, Dwivedi V, Borisagar K (2017) An efficient medical image watermarking scheme based on FDCuT\u2013DCT. Eng Sci Technol Int J 20(4):1366\u20131379. https:\/\/doi.org\/10.1016\/j.jestch.2017.06.001","journal-title":"Eng Sci Technol Int J"},{"key":"10421_CR154","doi-asserted-by":"publisher","unstructured":"Tjokorda Agung BW, Adiwijaya, Permana FP (2012) Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and Run Length Encoding (RLE) compression. Proceeding - COMNETSAT 2012 2012 IEEE Int Conf Commun Networks Satell, pp. 167\u2013171. https:\/\/doi.org\/10.1109\/ComNetSat.2012.6380799","DOI":"10.1109\/ComNetSat.2012.6380799"},{"key":"10421_CR155","doi-asserted-by":"publisher","unstructured":"Tjokorda B, Adiwijaya, Permana FP (2012) Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and run length encoding (RLE) compression. In: 2012 IEEE International Conference on Communication, Networks and Satellite (ComNetSat), pp. 167\u2013171, https:\/\/doi.org\/10.1109\/ComNetSat.2012.6380799","DOI":"10.1109\/ComNetSat.2012.6380799"},{"key":"10421_CR156","unstructured":"Tripathi M, Tripathi SP (2013) A review of medical image watermarking schemes 2(3):1\u201310"},{"key":"10421_CR157","doi-asserted-by":"publisher","unstructured":"Tsai DY, E. Matsuyama, and H. M. Chen (2013) Improving image quality in medical images using a combined method of undecimated wavelet transform and wavelet coefficient mapping. Int J Biomed Imaging 2013. https:\/\/doi.org\/10.1155\/2013\/797924.","DOI":"10.1155\/2013\/797924"},{"key":"10421_CR158","doi-asserted-by":"publisher","unstructured":"Tyagi S, Singh HV, Agarwal R, Gangwar SK (2016) Digital watermarking techniques for security applications. Int Conf Emerg Trends Electr Electron Sustain Energy Syst ICETEESES 2016, pp. 379\u2013382. https:\/\/doi.org\/10.1109\/ICETEESES.2016.7581413","DOI":"10.1109\/ICETEESES.2016.7581413"},{"issue":"6","key":"10421_CR159","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1007\/s10278-017-9960-y","volume":"30","author":"A Ustubioglu","year":"2017","unstructured":"Ustubioglu A, Ulutas G (2017) A New Medical Image Watermarking Technique with Finer Tamper Localization. J Digit Imaging 30(6):665\u2013680. https:\/\/doi.org\/10.1007\/s10278-017-9960-y","journal-title":"J Digit Imaging"},{"issue":"1","key":"10421_CR160","doi-asserted-by":"publisher","first-page":"351","DOI":"10.35940\/ijitee.A4126.119119","volume":"9","author":"U Verma","year":"2019","unstructured":"Verma U, Sharma N (2019) Hybrid mode of medical image watermarking to enhance robustness and imperceptibility. Int J Innov Technol Explor Eng 9(1):351\u2013359. https:\/\/doi.org\/10.35940\/ijitee.A4126.119119","journal-title":"Int J Innov Technol Explor Eng"},{"issue":"Iccids","key":"10421_CR161","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.1016\/j.procs.2018.05.017","volume":"132","author":"VP Vishwakarma","year":"2018","unstructured":"Vishwakarma VP, Sisaudia V (2018) Gray-scale image watermarking based on DE-KELM in DCT domain. Procedia Comput Sci 132(Iccids):1012\u20131020. https:\/\/doi.org\/10.1016\/j.procs.2018.05.017","journal-title":"Procedia Comput Sci"},{"key":"10421_CR162","doi-asserted-by":"crossref","unstructured":"Voloshynovskiy S, Herrigel A, Baumgaertner N, Pun T (2000) A stochastic approach to content adaptive digital image watermarking. In: Lecture Notes in Computer Science, vol 1768. Springer, Berlin, Heidelberg, pp. 211\u2013236","DOI":"10.1007\/10719724_16"},{"issue":"6","key":"10421_CR163","doi-asserted-by":"publisher","first-page":"1177","DOI":"10.1016\/S0165-1684(01)00039-1","volume":"81","author":"S Voloshynovskiy","year":"2001","unstructured":"Voloshynovskiy S, Pereira S, Iquise V, Pun T (2001) Attack modelling: Towards a second generation watermarking benchmark. Signal Process 81(6):1177\u20131214. https:\/\/doi.org\/10.1016\/S0165-1684(01)00039-1","journal-title":"Signal Process"},{"issue":"16","key":"10421_CR164","doi-asserted-by":"publisher","first-page":"3904","DOI":"10.1016\/j.optcom.2011.04.004","volume":"284","author":"Z Wenyin","year":"2011","unstructured":"Wenyin Z, Shih FY (2011) Semi-fragile spatial watermarking based on local binary pattern operators. Opt Commun 284(16):3904\u20133912. https:\/\/doi.org\/10.1016\/j.optcom.2011.04.004","journal-title":"Opt Commun"},{"key":"10421_CR165","unstructured":"Woo C, Du J, Pham B (2005) Multiple watermark method for privacy control and tamper detection in medical images. APRS Work Digit Image Comput, pp. 59\u201364. Available: http:\/\/www.aprs.org.au\/wdic2005\/fullproceedings.pdf"},{"issue":"1","key":"10421_CR166","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s10278-007-9011-1","volume":"21","author":"JHK Wu","year":"2008","unstructured":"Wu JHK et al (2008) Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21(1):59\u201376. https:\/\/doi.org\/10.1007\/s10278-007-9011-1","journal-title":"J Digit Imaging"},{"issue":"Iccids","key":"10421_CR167","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1016\/j.procs.2018.05.098","volume":"132","author":"J Yadav","year":"2018","unstructured":"Yadav J, Sehra K (2018) Large scale dual tree complex wavelet transform based robust features in PCA and SVD subspace for digital image watermarking. Procedia Comput Sci 132(Iccids):863\u2013872. https:\/\/doi.org\/10.1016\/j.procs.2018.05.098","journal-title":"Procedia Comput Sci"},{"issue":"1","key":"10421_CR168","doi-asserted-by":"publisher","first-page":"409","DOI":"10.14257\/ijsia.2015.9.1.39","volume":"9","author":"C Ye","year":"2015","unstructured":"Ye C, Xiong Z, Ding Y, Zhang X, Wang G, Xu F (2015) Joint fingerprinting\/encryption for medical image security. Int J Secur Appl 9(1):409\u2013418. https:\/\/doi.org\/10.14257\/ijsia.2015.9.1.39","journal-title":"Int J Secur Appl"},{"issue":"4","key":"10421_CR169","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/fi9040056","volume":"9","author":"X Yu","year":"2017","unstructured":"Yu X, Wang C, Zhou X (2017) Review on semi-fragile watermarking algorithms for content authentication of digital images. Futur Internet 9(4):1\u201317. https:\/\/doi.org\/10.3390\/fi9040056","journal-title":"Futur Internet"},{"key":"10421_CR170","doi-asserted-by":"publisher","first-page":"164152","DOI":"10.1016\/j.ijleo.2019.164152","volume":"204","author":"Z Yuan","year":"2020","unstructured":"Yuan Z, Liu D, Zhang X, Su Q (2020) New image blind watermarking method based on two-dimensional discrete cosine transform. Optik (Stuttg) 204:164152. https:\/\/doi.org\/10.1016\/j.ijleo.2019.164152","journal-title":"Optik (Stuttg)"},{"issue":"9","key":"10421_CR171","first-page":"19","volume":"7","author":"JM Zain","year":"2007","unstructured":"Zain JM, Clarke M (2007) Reversible region of non-interest (RONI) watermarking for authentication of DICOM images. Int J Comput Sci Netw Secur 7(9):19\u201328 Available: http:\/\/arxiv.org\/abs\/1101.1603","journal-title":"Int J Comput Sci Netw Secur"},{"key":"10421_CR172","doi-asserted-by":"publisher","unstructured":"Zain JM, Fauzi ARM (2006) Medical image watermarking with tamper detection and recovery. In: 2006 International Conference of the IEEE Engineering in Medicine and Biology Society. https:\/\/doi.org\/10.1109\/IEMBS.2006.260767","DOI":"10.1109\/IEMBS.2006.260767"},{"key":"10421_CR173","doi-asserted-by":"publisher","unstructured":"Zain JM, Fauzi ARM (2007) Evaluation of medical image watermarking with tamper detection and recovery (AW-TDR). Conf Proc IEEE Eng Med Biol Soc, pp. 5661\u20135664. https:\/\/doi.org\/10.1109\/IEMBS.2007.4353631","DOI":"10.1109\/IEMBS.2007.4353631"},{"key":"10421_CR174","unstructured":"Zain JM, Fauzi ARM (2007) Evaluation of medical image watermarking with tamper detection and recovery (AW-TDR). Conf Proc IEEE Eng Med Biol Soc, pp. 5662\u20135665"},{"issue":"1","key":"10421_CR175","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1515\/jisys-2016-0036","volume":"27","author":"A Zear","year":"2018","unstructured":"Zear A, Singh AK, Kumar P (2018) Multiple Watermarking for Healthcare Applications. J Intell Syst 27(1):5\u201318. https:\/\/doi.org\/10.1515\/jisys-2016-0036","journal-title":"J Intell Syst"},{"issue":"4","key":"10421_CR176","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1007\/s11042-016-3862-8","volume":"77","author":"A Zear","year":"2018","unstructured":"Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77(4):4863\u20134882. https:\/\/doi.org\/10.1007\/s11042-016-3862-8","journal-title":"Multimed Tools Appl"},{"issue":"14","key":"10421_CR177","doi-asserted-by":"publisher","first-page":"20113","DOI":"10.1007\/s11042-019-7288-y","volume":"78","author":"W Zhang","year":"2019","unstructured":"Zhang W, Tang X, Yang Z, Niu S (2019) Multi-scale segmentation strategies in PRNU-based image tampering localization. Multimed Tools Appl 78(14):20113\u201320132. https:\/\/doi.org\/10.1007\/s11042-019-7288-y","journal-title":"Multimed Tools Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10421-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10421-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10421-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,11]],"date-time":"2022-12-11T17:23:48Z","timestamp":1670779428000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10421-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,15]]},"references-count":177,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["10421"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10421-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,15]]},"assertion":[{"value":"18 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}