{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T16:44:17Z","timestamp":1726850657894},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2021,2,14]],"date-time":"2021-02-14T00:00:00Z","timestamp":1613260800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,14]],"date-time":"2021-02-14T00:00:00Z","timestamp":1613260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11042-021-10531-w","type":"journal-article","created":{"date-parts":[[2021,2,18]],"date-time":"2021-02-18T00:18:22Z","timestamp":1613607502000},"page":"18069-18105","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Multilayered highly secure authentic watermarking mechanism for medical applications"],"prefix":"10.1007","volume":"80","author":[{"given":"Sangeeta","family":"Dhall","sequence":"first","affiliation":[]},{"given":"Shailender","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,14]]},"reference":[{"key":"10531_CR1","doi-asserted-by":"publisher","first-page":"4653","DOI":"10.1016\/j.cnsns.2012.05.033","volume":"17","author":"A Akhshani","year":"2012","unstructured":"Akhshani A, Akhavan A, Lim S-C, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Commun Nonlinear Sci Numer Simul 17:4653\u20134661. https:\/\/doi.org\/10.1016\/j.cnsns.2012.05.033","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"10531_CR2","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.ins.2015.06.049","volume":"324","author":"L Bao","year":"2015","unstructured":"Bao L, Zhou Y (2015) Image encryption: generating visually meaningful encrypted images. Inf Sci 324:197\u2013207. https:\/\/doi.org\/10.1016\/j.ins.2015.06.049","journal-title":"Inf Sci"},{"key":"10531_CR3","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cmpb.2011.09.015","volume":"106","author":"D Bouslimi","year":"2012","unstructured":"Bouslimi D, Coatrieux G, Roux C (2012) A joint encryption\/watermarking algorithm for verifying the reliability of medical images: application to echographic images. Comput Methods Prog Biomed 106:47\u201354. https:\/\/doi.org\/10.1016\/j.cmpb.2011.09.015","journal-title":"Comput Methods Prog Biomed"},{"key":"10531_CR4","first-page":"6","volume":"2","author":"B Chauhan","year":"2015","unstructured":"Chauhan B, Dhall S, Gupta S (2015) A comparison of various hashing techniques. Int J Comput Netw Appl 2:6","journal-title":"Int J Comput Netw Appl"},{"key":"10531_CR5","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/s11042-019-08087-x","volume":"79","author":"A Chopra","year":"2019","unstructured":"Chopra A, Gupta S, Dhall S (2019) Analysis of frequency domain watermarking techniques in presence of geometric and simple attacks. Multimed Tools Appl 79:501\u2013554. https:\/\/doi.org\/10.1007\/s11042-019-08087-x","journal-title":"Multimed Tools Appl"},{"key":"10531_CR6","doi-asserted-by":"publisher","first-page":"67","DOI":"10.14257\/ijsia.2015.9.8.07","volume":"9","author":"S Dhall","year":"2015","unstructured":"Dhall S, Bhushan B, Gupta S (2015) An in-depth analysis of various steganography techniques. Int J Secur Its Appl 9:67\u201394. https:\/\/doi.org\/10.14257\/ijsia.2015.9.8.07","journal-title":"Int J Secur Its Appl"},{"key":"10531_CR7","doi-asserted-by":"publisher","first-page":"67","DOI":"10.5815\/ijcnis.2016.06.08","volume":"8","author":"S Dhall","year":"2016","unstructured":"Dhall S, Bhushan B, Gupta S (2016) An improved hybrid mechanism for secure data communication. Int J Comput Netw Inf Secur 8:67\u201379. https:\/\/doi.org\/10.5815\/ijcnis.2016.06.08","journal-title":"Int J Comput Netw Inf Secur"},{"key":"10531_CR8","doi-asserted-by":"publisher","unstructured":"Elhoseny M, Ramirez-Gonzalez G, Abu-Elnasr OM, Shawkat SA, N A, Farouk A (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6:20596\u201320608. https:\/\/doi.org\/10.1109\/ACCESS.2018.2817615","DOI":"10.1109\/ACCESS.2018.2817615"},{"key":"10531_CR9","unstructured":"Gao T-G, Gu Q-L (2007) Reversible watermarking algorithm based on wavelet lifting scheme. Int Conf Wavelet Anal Pattern Recognit:5"},{"key":"10531_CR10","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-21984-9_14","volume-title":"Digital information and communication technology and its applications","author":"M Gholipour","year":"2011","unstructured":"Gholipour M (2011) Design and implementation of lifting based integer wavelet transform for image compression applications. In: Cherifi H, Zain JM, El-Qawasmeh E (eds) Digital information and communication technology and its applications. Springer, Berlin Heidelberg, Berlin, Heidelberg, pp 161\u2013172. https:\/\/doi.org\/10.1007\/978-3-642-21984-9_14"},{"key":"10531_CR11","unstructured":"https:\/\/biometrictoday.com\/iris-recognition\/"},{"key":"10531_CR12","unstructured":"https:\/\/geoffboeing.com\/2015\/03\/chaos-theory-logistic-map\/"},{"key":"10531_CR13","unstructured":"https:\/\/resources.infosecinstitute.com\/introduction-biometric-key-performance-indicators-standards\/#gref"},{"key":"10531_CR14","unstructured":"https:\/\/www.hipaajournal.com\/june-2019-healthcare-data-breach-report\/."},{"key":"10531_CR15","unstructured":"https:\/\/www.slideshare.net\/khandhar\/telemedicine-ppt."},{"key":"10531_CR16","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1093\/comjnl\/bxz014","volume":"62","author":"M Kalita","year":"2019","unstructured":"Kalita M, Tuithung T, Majumder S (2019) A new steganography method using integer wavelet transform and least significant bit substitution. Comput J 62:1639\u20131655. https:\/\/doi.org\/10.1093\/comjnl\/bxz014","journal-title":"Comput J"},{"key":"10531_CR17","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1002\/ima.22086","volume":"24","author":"A Kannammal","year":"2014","unstructured":"Kannammal A, Subha Rani S (2014) Two level security for medical images using watermarking\/encryption algorithms. Int J Imaging Syst Technol 24:111\u2013120. https:\/\/doi.org\/10.1002\/ima.22086","journal-title":"Int J Imaging Syst Technol"},{"key":"10531_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2012\/839161","volume":"2012","author":"L-T Ko","year":"2012","unstructured":"Ko L-T, Chen J-E, Shieh Y-S, Hsin H-C, Sung T-Y (2012) Nested quantization index modulation for Reversible watermarking and its application to healthcare information management systems. Comput Math Methods Med 2012:1\u20138. https:\/\/doi.org\/10.1155\/2012\/839161","journal-title":"Comput Math Methods Med"},{"key":"10531_CR19","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s13319-017-0148-5","volume":"8","author":"M Kumari","year":"2017","unstructured":"Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. 3D Res 8:37. https:\/\/doi.org\/10.1007\/s13319-017-0148-5","journal-title":"3D Res"},{"key":"10531_CR20","doi-asserted-by":"publisher","first-page":"3178","DOI":"10.1016\/j.eswa.2013.11.019","volume":"41","author":"B Lei","year":"2014","unstructured":"Lei B, Tan E-L, Chen S, Ni D, Wang T, Lei H (2014) Reversible watermarking scheme for medical image based on differential evolution. Expert Syst Appl 41:3178\u20133188. https:\/\/doi.org\/10.1016\/j.eswa.2013.11.019","journal-title":"Expert Syst Appl"},{"key":"10531_CR21","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.jbi.2017.08.002","volume":"73","author":"NA Loan","year":"2017","unstructured":"Loan NA, Parah SA, Sheikh JA, Akhoon JA, Bhat GM (2017) Hiding electronic patient record (EPR) in medical images: a high capacity and computationally efficient technique for e-healthcare applications. J Biomed Inform 73:125\u2013136. https:\/\/doi.org\/10.1016\/j.jbi.2017.08.002","journal-title":"J Biomed Inform"},{"key":"10531_CR22","doi-asserted-by":"publisher","first-page":"27941","DOI":"10.1007\/s11042-020-09279-6","volume":"79","author":"A Malik","year":"2020","unstructured":"Malik A, Gupta S, Dhall S (2020) Analysis of traditional and modern image encryption algorithms under realistic ambience. Multimed Tools Appl 79:27941\u201327993. https:\/\/doi.org\/10.1007\/s11042-020-09279-6","journal-title":"Multimed Tools Appl"},{"key":"10531_CR23","unstructured":"Masek L, Kovesi P (2003) MATLAB source code for a biometric identification system based on Iris patterns, the School of Computer Science and Software Engineering, the University of Western Australia"},{"key":"10531_CR24","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/Anti-Cybercrime.2017.7905271","volume-title":"Presented at the 2017 2nd international conference on anti-cyber crimes (ICACC), IEEE, Abha, Saudi Arabia","author":"M Moizuddin","year":"2017","unstructured":"Moizuddin M, Winston J, Qayyum M (2017) A comprehensive survey: quantum cryptography, in: 2017 2nd international conference on anti-cyber crimes (ICACC). In: Presented at the 2017 2nd international conference on anti-cyber crimes (ICACC), IEEE, Abha, Saudi Arabia, pp 98\u2013102. https:\/\/doi.org\/10.1109\/Anti-Cybercrime.2017.7905271"},{"key":"10531_CR25","doi-asserted-by":"publisher","first-page":"10313","DOI":"10.1007\/s11042-016-3622-9","volume":"76","author":"SM Mousavi","year":"2017","unstructured":"Mousavi SM, Naghsh A, Manaf AA, Abu-Bakar SAR (2017) A robust medical image watermarking against salt and pepper noise for brain MRI images. Multimed Tools Appl 76:10313\u201310342. https:\/\/doi.org\/10.1007\/s11042-016-3622-9","journal-title":"Multimed Tools Appl"},{"key":"10531_CR26","doi-asserted-by":"publisher","unstructured":"National Institute of Standards and Technology (n.d.) Federal information processing standards publication Secure Hash Standard (SHS) https:\/\/doi.org\/10.6028\/NIST.FIPS.180-4.","DOI":"10.6028\/NIST.FIPS.180-4"},{"key":"10531_CR27","doi-asserted-by":"publisher","unstructured":"Ng RYF, Tay YH, Mok KM (2008) A review of iris recognition algorithms, in: 2008 International Symposium on Information Technology. Presented at the 2008 International symposium on information technology, IEEE, Kuala Lumpur, Malaysia, pp. 1\u20137. https:\/\/doi.org\/10.1109\/ITSIM.2008.4631656","DOI":"10.1109\/ITSIM.2008.4631656"},{"key":"10531_CR28","doi-asserted-by":"publisher","unstructured":"Priya S, Santhi B (2019) A novel visual medical image encryption for secure transmission of authenticated watermarked medical images. Mob Netw Appl. https:\/\/doi.org\/10.1007\/s11036-019-01213-x","DOI":"10.1007\/s11036-019-01213-x"},{"key":"10531_CR29","first-page":"7","volume":"2","author":"R Saini","year":"2014","unstructured":"Saini R, Rana N (2014) Comparison of various biometric methods 2:7","journal-title":"Comparison of various biometric methods"},{"key":"10531_CR30","doi-asserted-by":"publisher","first-page":"1611","DOI":"10.1007\/s11277-016-3625-x","volume":"92","author":"A Sharma","year":"2017","unstructured":"Sharma A, Singh AK, Ghrera SP (2017) Robust and secure multiple watermarking for medical images. Wirel Pers Commun 92:1611\u20131624. https:\/\/doi.org\/10.1007\/s11277-016-3625-x","journal-title":"Wirel Pers Commun"},{"key":"10531_CR31","doi-asserted-by":"publisher","first-page":"31737","DOI":"10.1007\/s11042-018-6226-8","volume":"77","author":"G Sharma","year":"2018","unstructured":"Sharma G, Gupta S, Dhall S, Nagpal CK (2018a) Publicly verifiable watermarking scheme for intellectual property protection using quantum Chaos and bit plane complexity slicing. Multimed Tools Appl 77:31737\u201331762. https:\/\/doi.org\/10.1007\/s11042-018-6226-8","journal-title":"Multimed Tools Appl"},{"key":"10531_CR32","doi-asserted-by":"publisher","first-page":"37","DOI":"10.5815\/ijcnis.2018.09.04","volume":"10","author":"R Sharma","year":"2018","unstructured":"Sharma R, Ganotra R, Dhall S, Gupta S (2018b) Performance comparison of steganography techniques. Int J Comput Netw Inf Secur. 10:37\u201346. https:\/\/doi.org\/10.5815\/ijcnis.2018.09.04","journal-title":"Int J Comput Netw Inf Secur."},{"key":"10531_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICONSIP.2016.7857449","volume-title":"Presented at the 2016 international conference on signal and information processing (IConSIP), IEEE, Maharashtra state, India","author":"R Shelke","year":"2016","unstructured":"Shelke R, Metkar S (2016) Image scrambling methods for digital image encryption, in: 2016 international conference on signal and information processing (IConSIP). In: Presented at the 2016 international conference on signal and information processing (IConSIP), IEEE, Maharashtra state, India, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICONSIP.2016.7857449"},{"key":"10531_CR34","doi-asserted-by":"publisher","first-page":"1415","DOI":"10.1007\/s11277-014-2091-6","volume":"80","author":"AK Singh","year":"2015","unstructured":"Singh AK, Kumar B, Dave M, Mohan A (2015) Robust and imperceptible dual watermarking for telemedicine applications. Wirel Pers Commun 80:1415\u20131433. https:\/\/doi.org\/10.1007\/s11277-014-2091-6","journal-title":"Wirel Pers Commun"},{"key":"10531_CR35","doi-asserted-by":"publisher","first-page":"8381","DOI":"10.1007\/s11042-015-2754-7","volume":"75","author":"AK Singh","year":"2016","unstructured":"Singh AK, Dave M, Mohan A (2016) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl 75:8381\u20138401. https:\/\/doi.org\/10.1007\/s11042-015-2754-7","journal-title":"Multimed Tools Appl"},{"key":"10531_CR36","doi-asserted-by":"publisher","first-page":"40","DOI":"10.5815\/ijmecs.2014.10.06","volume":"6","author":"N Solanki","year":"2014","unstructured":"Solanki N, Malik SK (2014) ROI based medical image watermarking with zero distortion and enhanced security. Int J Mod Educ Comput Sci 6:40\u201348. https:\/\/doi.org\/10.5815\/ijmecs.2014.10.06","journal-title":"Int J Mod Educ Comput Sci"},{"key":"10531_CR37","doi-asserted-by":"publisher","first-page":"24063","DOI":"10.1007\/s11042-016-4111-x","volume":"76","author":"N Tayal","year":"2017","unstructured":"Tayal N, Bansal R, Dhal S, Gupta S (2017) A novel hybrid security mechanism for data communication networks. Multimed Tools Appl 76:24063\u201324090. https:\/\/doi.org\/10.1007\/s11042-016-4111-x","journal-title":"Multimed Tools Appl"},{"key":"10531_CR38","doi-asserted-by":"publisher","first-page":"41","DOI":"10.5120\/3619-5051","volume":"30","author":"A Umamageswari","year":"2011","unstructured":"Umamageswari A, Ferni Ukrit M, Suresh R, Dr.G (2011) A survey on security in medical image communication. Int J Comput Appl 30:41\u201345. https:\/\/doi.org\/10.5120\/3619-5051","journal-title":"Int J Comput Appl"},{"key":"10531_CR39","unstructured":"Wu Y, Agaian S (2011) NPCR and UACI Randomness Tests for Image Encryption:8"},{"key":"10531_CR40","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.1109\/ICISE.2009.347","volume-title":"Presented at the 2009 first international conference on information science and engineering, IEEE, Nanjing, China","author":"L Wu","year":"2009","unstructured":"Wu L, Zhang J, Deng W, He D (2009) Arnold transformation algorithm and anti-Arnold transformation algorithm, in: 2009 first international conference on information science and engineering. In: Presented at the 2009 first international conference on information science and engineering, IEEE, Nanjing, China, pp 1164\u20131167. https:\/\/doi.org\/10.1109\/ICISE.2009.347"},{"key":"10531_CR41","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/BF02827928","volume":"5","author":"Y Yan","year":"2000","unstructured":"Yan Y, Dong Z (2000) An approach to integer wavelet transform for medical image compression in PACS. Wuhan Univ J Nat Sci 5:204\u2013206. https:\/\/doi.org\/10.1007\/BF02827928","journal-title":"Wuhan Univ J Nat Sci"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10531-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10531-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10531-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T09:04:45Z","timestamp":1621501485000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10531-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,14]]},"references-count":41,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10531"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10531-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2,14]]},"assertion":[{"value":"21 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 August 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest\u2019 declaration"}}]}}