{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T02:19:46Z","timestamp":1773800386176,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T00:00:00Z","timestamp":1619481600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T00:00:00Z","timestamp":1619481600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-021-10801-7","type":"journal-article","created":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T08:02:17Z","timestamp":1619510537000},"page":"26021-26047","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["An efficient watermarking algorithm for medical images"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4215-2286","authenticated-orcid":false,"given":"Ali","family":"Al-Haj","sequence":"first","affiliation":[]},{"given":"Heba","family":"Abdel-Nabi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,27]]},"reference":[{"key":"10801_CR1","doi-asserted-by":"crossref","unstructured":"Abdel-Nabi H, Al-Haj A (2017) Medical imaging security using partial encryption and histogram shifting watermarking. In 2017 8th International Conference on Information Technology (ICIT) (pp. 802\u2013807). IEEE","DOI":"10.1109\/ICITECH.2017.8079950"},{"key":"10801_CR2","doi-asserted-by":"crossref","unstructured":"Abdel-Nabi H, Al-Haj A (2017) Efficient joint encryption and data hiding algorithm for medical images security. In 2017 8th international conference on information and communication systems (ICICS) (pp. 147\u2013152). IEEE","DOI":"10.1109\/IACS.2017.7921962"},{"key":"10801_CR3","doi-asserted-by":"crossref","unstructured":"Al-Haj A, Abdel-Nabi H (2017) Digital image security based on data hiding and cryptography. In 2017 3rd International Conference on Information Management (ICIM)(pp. 437\u2013440). IEEE","DOI":"10.1109\/INFOMAN.2017.7950423"},{"key":"10801_CR4","doi-asserted-by":"crossref","unstructured":"Al-Haj A, Hussein N, Abandah G (2016) Combining cryptography and digital watermarking for secured transmission of Medical images, In Proc of the IEEE Int Conf Inf Manag","DOI":"10.1109\/INFOMAN.2016.7477531"},{"key":"10801_CR5","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.ins.2019.04.043","volume":"494","author":"Y Fu","year":"2019","unstructured":"Fu Y, Kong P, Yao H, Tang Z, Qin C (2019) Effective reversible data hiding in encrypted image with adaptive encoding strategy. Inform Sci 494:21\u201336","journal-title":"Inform Sci"},{"key":"10801_CR6","doi-asserted-by":"crossref","unstructured":"Fujiyoshi M (2013) Separable reversible data hiding in encrypted images with histogram permutation, In Multimedia and Expo Workshops (ICMEW), 2013 IEEE International Conference on, pp. 1\u20134","DOI":"10.1109\/ICMEW.2013.6618266"},{"key":"10801_CR7","doi-asserted-by":"publisher","first-page":"102744","DOI":"10.1016\/j.jvcir.2019.102744","volume":"66","author":"B Guan","year":"2020","unstructured":"Guan B, Xu D (2020) An efficient high-capacity reversible data hiding scheme for encrypted images. J Vis Commun Image Represent 66:102744","journal-title":"J Vis Commun Image Represent"},{"issue":"4","key":"10801_CR8","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","volume":"19","author":"W Hong","year":"2012","unstructured":"Hong W, Chen T, Wu H (2012) An improved reversible data hiding in encrypted images using side match. IEEE Sig Process Lett 19(4):199\u2013202","journal-title":"IEEE Sig Process Lett"},{"key":"10801_CR9","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.jvcir.2014.12.007","volume":"28","author":"X Liao","year":"2015","unstructured":"Liao X, Shu C (2015) Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J Vis Commun Image Represent 28:21\u201327","journal-title":"J Vis Commun Image Represent"},{"key":"10801_CR10","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.image.2019.03.013","volume":"75","author":"G Ma","year":"2019","unstructured":"Ma G, Wang J (2019) Efficient reversible data hiding in encrypted images based on multi-stage integer wavelet transform. Signal Process Image Commun 75:55\u201363","journal-title":"Signal Process Image Commun"},{"key":"10801_CR11","doi-asserted-by":"crossref","unstructured":"Ma K, Zhang W, Zhao X, Yu N, Li F (2013) Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans Inf Forensic Secur 8(3):553\u2013562","DOI":"10.1109\/TIFS.2013.2248725"},{"key":"10801_CR12","unstructured":"Malik A, Wang HX, Chen Y, Khan AN (2020) A reversible data hiding in encrypted image based on prediction-error estimation and location map. Multimed Tools Appl, pp.1\u201324"},{"issue":"3","key":"10801_CR13","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Ni Z, Shi YQ, Ansari N, Wei S (2006) Reversible data hiding. IEEE Trans Circ Syst Video Technol 16(3):354\u2013362","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"21","key":"10801_CR14","doi-asserted-by":"publisher","first-page":"13749","DOI":"10.1007\/s11042-015-2760-9","volume":"75","author":"Z Qian","year":"2016","unstructured":"Qian Z, Zhang X, Ren Y, Feng G (2016) Block cipher based separable reversible data hiding in encrypted images. Multimed Tools Appl 75(21):13749\u201313763","journal-title":"Multimed Tools Appl"},{"key":"10801_CR15","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.jvcir.2015.06.009","volume":"31","author":"C Qin","year":"2015","unstructured":"Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154\u2013164","journal-title":"J Vis Commun Image Represent"},{"key":"10801_CR16","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.ins.2019.03.008","volume":"487","author":"C Qin","year":"2019","unstructured":"Qin C, Qian X, Hong W, Zhang X (2019) An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer. Inf Sci 487:176\u2013192","journal-title":"Inf Sci"},{"key":"10801_CR17","doi-asserted-by":"publisher","first-page":"23209","DOI":"10.1109\/ACCESS.2020.2969252","volume":"8","author":"Y Qiu","year":"2020","unstructured":"Qiu Y, Ying Q, Lin X, Zhang Y, Qian Z (2020) Reversible data hiding in encrypted images with dual data embedding. IEEE Access 8:23209\u201323220","journal-title":"IEEE Access"},{"key":"10801_CR18","unstructured":"Stallings W (2013) Cryptography and network security: principles and practice. Pearson"},{"issue":"3","key":"10801_CR19","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1007\/s11045-017-0497-5","volume":"29","author":"L Xiong","year":"2018","unstructured":"Xiong L, Xu Z, Shi YQ (2018) An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidim Syst Sign Process 29(3):1191\u20131202","journal-title":"Multidim Syst Sign Process"},{"key":"10801_CR20","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.image.2018.03.001","volume":"64","author":"S Yi","year":"2018","unstructured":"Yi S, Zhou Y, Hua Z (2018) Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion. Signal Process Image Commun 64:78\u201388","journal-title":"Signal Process Image Commun"},{"issue":"3","key":"10801_CR21","doi-asserted-by":"publisher","first-page":"3899","DOI":"10.1007\/s11042-016-4049-z","volume":"76","author":"Z Yin","year":"2017","unstructured":"Yin Z, Abel A, Tang J, Zhang X, Luo B (2017) Reversible data hiding in encrypted images based on multi-level encryption and block histogram modification. Multimed Tools Appl 76(3):3899\u20133920","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"10801_CR22","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1109\/LSP.2011.2114651","volume":"18","author":"X Zhang","year":"2011","unstructured":"Zhang X (2011) Reversible data hiding in encrypted images. IEEE Sig Process Lett 18(4):255\u2013258","journal-title":"IEEE Sig Process Lett"},{"issue":"2","key":"10801_CR23","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"X Zhang","year":"2012","unstructured":"Zhang X (2012) Separable reversible data hiding in encrypted image. IEEE Trans Inf Forensic Secur 7(2):826\u2013832","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"10801_CR24","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.sigpro.2013.06.023","volume":"94","author":"W Zhang","year":"2014","unstructured":"Zhang W, Ma K, Yu N (2014) Reversibility improved data hiding in encrypted images. Signal Process 94:118\u2013127","journal-title":"Signal Process"},{"key":"10801_CR25","doi-asserted-by":"crossref","unstructured":"Zhang S, Gao T, Sheng G (2014) A joint encryption and reversible data hiding scheme based on integer-DWT and arnold map permutation. J Appl Math, 2014","DOI":"10.1155\/2014\/861782"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10801-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10801-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10801-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T06:17:13Z","timestamp":1625552233000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10801-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,27]]},"references-count":25,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["10801"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10801-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,27]]},"assertion":[{"value":"29 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}