{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T19:40:50Z","timestamp":1772221250875,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2021,7,15]],"date-time":"2021-07-15T00:00:00Z","timestamp":1626307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,15]],"date-time":"2021-07-15T00:00:00Z","timestamp":1626307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001843","name":"Science and Engineering Research Board","doi-asserted-by":"publisher","award":["XXX"],"award-info":[{"award-number":["XXX"]}],"id":[{"id":"10.13039\/501100001843","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11042-021-11170-x","type":"journal-article","created":{"date-parts":[[2021,7,15]],"date-time":"2021-07-15T09:03:48Z","timestamp":1626339828000},"page":"29939-29964","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["A self-embedding technique for tamper detection and localization of medical images for smart-health"],"prefix":"10.1007","volume":"80","author":[{"given":"Solihah","family":"Gull","sequence":"first","affiliation":[]},{"given":"Romany F.","family":"Mansour","sequence":"additional","affiliation":[]},{"given":"Nojood O.","family":"Aljehane","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5983-0912","authenticated-orcid":false,"given":"Shabir A.","family":"Parah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,15]]},"reference":[{"issue":"6","key":"11170_CR1","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1007\/s13042-015-0455-1","volume":"7","author":"IA Ansari","year":"2015","unstructured":"Ansari IA, Pant M, Ahn CW (2015) SVD based fragile watermarking scheme for tamper localization and self-recovery. Int J Mach Learn Cybern 7(6):1225\u20131239","journal-title":"Int J Mach Learn Cybern"},{"key":"11170_CR2","unstructured":"Anwer AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Doctoral thesis, University of Buckingham"},{"key":"11170_CR3","doi-asserted-by":"publisher","first-page":"18451","DOI":"10.1007\/s11042-016-3930-0","volume":"76","author":"S Atawneh","year":"2017","unstructured":"Atawneh S, Almomani A, Al Bazar H et al (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76:18451\u201318472. https:\/\/doi.org\/10.1007\/s11042-016-3930-0","journal-title":"Multimed Tools Appl"},{"key":"11170_CR4","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/j.aeue.2017.06.001","volume":"79","author":"A Azeroual","year":"2017","unstructured":"Azeroual A, Afdel K (2017) Real-time image tamper localisation based on fragile watermarking and Faber-Schauder wavelet. Int J Commun (AE\u00dc) 79:207\u2013218","journal-title":"Int J Commun (AE\u00dc)"},{"key":"11170_CR5","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.ijleo.2019.04.074","volume":"187","author":"MJ Barani","year":"2019","unstructured":"Barani MJ, Valandar MY, Ayubi P (2019) A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map. Optik 187:205\u2013222","journal-title":"Optik"},{"key":"11170_CR6","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1007\/s12652-020-02135-3","volume":"12","author":"S Bhalerao","year":"2020","unstructured":"Bhalerao S, Ansari IA, Kumar AA (2020) Secure image watermarking for tamper detection and localization. J Ambient Intell Humaniz Comput 12:1057\u20131068. https:\/\/doi.org\/10.1007\/s12652-020-02135-3","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"11170_CR7","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.displa.2017.01.001","volume":"46","author":"F Cao","year":"2017","unstructured":"Cao F, An B, Wang J, Ye D, Wang H (2017) Hierarchical recovery for tampered images based on watermark self-embedding. Displays 46:52\u201360","journal-title":"Displays"},{"issue":"1","key":"11170_CR8","doi-asserted-by":"publisher","first-page":"154","DOI":"10.4018\/IJCAC.2018010108","volume":"8","author":"O Dorgham","year":"2018","unstructured":"Dorgham O, Al-Rahamneh B, Almomani A, Al-Hadidi M, Khatatneh KF (2018) Enhancing the security of exchanging and storing DICOM medical images on the cloud. Int J Cloud Appl Comput (IJCAC) 8(1):154\u2013172. https:\/\/doi.org\/10.4018\/IJCAC.2018010108","journal-title":"Int J Cloud Appl Comput (IJCAC)"},{"key":"11170_CR9","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.image.2018.04.003","volume":"66","author":"M Fan","year":"2018","unstructured":"Fan M, Wang H (2018) An enhanced fragile watermarking scheme to digital image protection and self-recovery. Signal Process Image Commun 66:19\u201329. https:\/\/doi.org\/10.1016\/j.image.2018.04.003","journal-title":"Signal Process Image Commun"},{"key":"11170_CR10","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/s11036-018-1186-9","volume":"25","author":"B Feng","year":"2020","unstructured":"Feng B, Li X, Jie Y, Guo C, Fu H (2020) A novel semi-fragile digital watermarking scheme for scrambled image authentication and restoration. Mob Netw Appl 25:82\u201394. https:\/\/doi.org\/10.1007\/s11036-018-1186-9","journal-title":"Mob Netw Appl"},{"issue":"1","key":"11170_CR11","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1109\/TMI.2017.2746879","volume":"37","author":"Z Gao","year":"2018","unstructured":"Gao Z, Li Y, Sun Y, Yang J, Xiong H, Zhang H, Liu X, Wu W, Liang D, Li S (2018) Motion tracking of the carotid Artery Wall from ultrasound image sequences: a nonlinear state-space approach. IEEE Trans Med Imaging 37(1):273\u2013283. https:\/\/doi.org\/10.1109\/TMI.2017.2746879","journal-title":"IEEE Trans Med Imaging"},{"issue":"2","key":"11170_CR12","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1504\/IJHPCN.2019.097508","volume":"13","author":"NEH Gol\u00e9a","year":"2019","unstructured":"Gol\u00e9a NEH, Melkemi KE (2019) ROI-based fragile watermarking for medical image tamper detection. Int J High Perform Comput Netwo 13(2):199. https:\/\/doi.org\/10.1504\/IJHPCN.2019.097508","journal-title":"Int J High Perform Comput Netwo"},{"key":"11170_CR13","doi-asserted-by":"publisher","first-page":"1799","DOI":"10.1007\/s12652-018-1158-8","volume":"2018","author":"S Gull","year":"2018","unstructured":"Gull S, Loan NA, Parah SA (2018) An efficient watermarking technique for tamper detection and localization of medical images. J Ambient Intell Humaniz Comput 2018:1799\u20131808. https:\/\/doi.org\/10.1007\/s12652-018-1158-8","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"11170_CR14","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.jvcir.2017.09.017","volume":"50","author":"B Haghighi","year":"2018","unstructured":"Haghighi B, Taherinia AH, Harati A (2018) TRLH: fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique. J Vis Commun Image Represent 50:49\u201364. https:\/\/doi.org\/10.1016\/j.jvcir.2017.09.017","journal-title":"J Vis Commun Image Represent"},{"key":"11170_CR15","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.ergon.2018.02.002","volume":"66","author":"M Haider","year":"2018","unstructured":"Haider M, Tayeb L, Maria M, Damien M (2018) A survey on health monitoring systems for health smart homes. Int J Ind Ergon 66:26\u201356. https:\/\/doi.org\/10.1016\/j.ergon.2018.02.002","journal-title":"Int J Ind Ergon"},{"key":"11170_CR16","doi-asserted-by":"publisher","first-page":"21441","DOI":"10.1007\/s11042-020-08988-2","volume":"79","author":"NN Hurrah","year":"2020","unstructured":"Hurrah NN, Parah SA, Sheikh JA (2020) Embedding in medical images: an efficient scheme for authentication and tamper localization. Multimed Tools Appl 79:21441\u201321470. https:\/\/doi.org\/10.1007\/s11042-020-08988-2","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"11170_CR17","first-page":"1058","volume":"6","author":"Y Kaur","year":"2017","unstructured":"Kaur Y, Ranade SK (2017) Image authentication and tamper detection using fragile watermarking in spatial domain. Int J Adv Res Comput Eng Technol (IJARCET) 6(7):1058\u20131063","journal-title":"Int J Adv Res Comput Eng Technol (IJARCET)"},{"issue":"5","key":"11170_CR18","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1109\/TCSVT.2016.2633878","volume":"28","author":"X Liu","year":"2018","unstructured":"Liu X, Lin C, Yuan S (2018) Blind dual watermarking for color images\u2019 authentication and copyright protection. IEEE Trans Circ Syst Video Technol 28(5):1047\u20131055","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"11170_CR19","doi-asserted-by":"publisher","first-page":"107293","DOI":"10.1016\/j.sigpro.2019.107293","volume":"167","author":"Y Liu","year":"2020","unstructured":"Liu Y, You Z, Gao T (2020) Lossless image hierarchical recovery based on POB number system. Signal Process 167:107293. https:\/\/doi.org\/10.1016\/j.sigpro.2019.107293","journal-title":"Signal Process"},{"issue":"15","key":"11170_CR20","doi-asserted-by":"publisher","first-page":"16107","DOI":"10.1007\/s11042-016-3897-x","volume":"76","author":"M Nazari","year":"2017","unstructured":"Nazari M, Sharif S (2017) An improved method for digital image fragile watermarking based on chaotic maps. Multimed Tools Appl 76(15):16107\u201316123","journal-title":"Multimed Tools Appl"},{"key":"11170_CR21","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1007\/s11042-019-08144-5","volume":"79","author":"S Prasad","year":"2020","unstructured":"Prasad S, Pal AK (2020) A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy. Multimed Tools Appl 79:1673\u20131705. https:\/\/doi.org\/10.1007\/s11042-019-08144-5","journal-title":"Multimed Tools Appl"},{"key":"11170_CR22","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.jvcir.2015.05.006","volume":"30","author":"X Qi","year":"2015","unstructured":"Qi X, Xin X (2015) A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization. J Vis Commun Image Represent 30:312\u2013327","journal-title":"J Vis Commun Image Represent"},{"key":"11170_CR23","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/j.ins.2016.09.001","volume":"373","author":"C Qin","year":"2016","unstructured":"Qin C, Wang H, Zhang X, Sun X (2016) Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode. Inf Sci 373:233\u2013250","journal-title":"Inf Sci"},{"issue":"2","key":"11170_CR24","doi-asserted-by":"publisher","first-page":"2267","DOI":"10.1007\/s11042-015-3218-9","volume":"76","author":"C Qin","year":"2017","unstructured":"Qin C, Ji P, Wang J, Chang CC (2017) Fragile image watermarking scheme based on vq index sharing and self-embedding. Multimed Tools Appl 76(2):2267\u20132287","journal-title":"Multimed Tools Appl"},{"key":"11170_CR25","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.sigpro.2017.03.033","volume":"138","author":"C Qin","year":"2017","unstructured":"Qin C, Ping J, Zhang X, Jing D, Wang J (2017) Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process 138:280\u2013293","journal-title":"Signal Process"},{"issue":"7","key":"11170_CR26","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1109\/TIP.2015.2414878","volume":"24","author":"S Saeed","year":"2015","unstructured":"Saeed S, Mohammad AA (2015) A source-channel coding approach to digital image protection and self-recovery. IEEE Trans Image Process 24(7):2266\u20132277","journal-title":"IEEE Trans Image Process"},{"key":"11170_CR27","doi-asserted-by":"publisher","first-page":"17761","DOI":"10.1007\/s11042-020-08669-0","volume":"79","author":"D Sarkar","year":"2020","unstructured":"Sarkar D, Palit S, Som S, Dey KN (2020) Large scale image tamper detection and restoration. Multimed Tools Appl 79:17761\u201317791. https:\/\/doi.org\/10.1007\/s11042-020-08669-0","journal-title":"Multimed Tools Appl"},{"key":"11170_CR28","doi-asserted-by":"publisher","first-page":"10269","DOI":"10.1109\/ACCESS.2018.2799240","volume":"6","author":"A Shehab","year":"2018","unstructured":"Shehab A, Elhoseny M, Muhammad K, Sangaiah AK, Yang P, Huang H, Hou G (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269\u201310278","journal-title":"IEEE Access"},{"key":"11170_CR29","doi-asserted-by":"crossref","unstructured":"Shuo T, Wenbo Y, Jehane MLG, Peng W, Wei H, Zhewei Y (2019) Smart healthcare: making medical care more intelligent. Glob Health J 3(3)","DOI":"10.1016\/j.glohj.2019.07.001"},{"issue":"1","key":"11170_CR30","first-page":"1","volume":"76","author":"D Singh","year":"2015","unstructured":"Singh D, Singh SK (2015) DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed Tools Appl 76(1):1\u201325","journal-title":"Multimed Tools Appl"},{"key":"11170_CR31","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.1007\/s00607-020-00797-7","volume":"102","author":"N Sivasubramanian","year":"2020","unstructured":"Sivasubramanian N, Konganathan G (2020) A novel semi fragile watermarking technique for tamper detection and recovery using IWT and DCT. Computing 102:1365\u20131384. https:\/\/doi.org\/10.1007\/s00607-020-00797-7","journal-title":"Computing"},{"key":"11170_CR32","doi-asserted-by":"publisher","first-page":"101665","DOI":"10.1016\/j.bspc.2019.101665","volume":"55","author":"K Swaraja","year":"2020","unstructured":"Swaraja K, Meenakshi K, Kora P (2020) An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomed Signal Process Control 55:101665. https:\/\/doi.org\/10.1016\/j.bspc.2019.101665","journal-title":"Biomed Signal Process Control"},{"key":"11170_CR33","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.image.2018.03.011","volume":"65","author":"WL Tai","year":"2018","unstructured":"Tai WL, Liao ZJ (2018) Image self-recovery with watermark self-embedding. Signal Process Image Commun 65:11\u201325","journal-title":"Signal Process Image Commun"},{"key":"11170_CR34","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.aeue.2017.05.027","volume":"78","author":"A Tiwari","year":"2017","unstructured":"Tiwari A, Sharma M, Tamrakar RK (2017) Watermarking based image authentication and tamper detection algorithm using vector quantization approach. AEU-Int J Electron Commun 78:114\u2013123","journal-title":"AEU-Int J Electron Commun"},{"issue":"2","key":"11170_CR35","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.image.2012.12.003","volume":"28","author":"X Tong","year":"2013","unstructured":"Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(2):301\u2013308","journal-title":"Signal Process Image Commun"},{"key":"11170_CR36","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s40998-017-0021-9","volume":"41","author":"S Trivedy","year":"2017","unstructured":"Trivedy S, Pal AK (2017) A logistic map-based fragile watermarking scheme of digital images with tamper detection. Iran J Sci Technol Trans Electr Eng 41:103\u2013113. https:\/\/doi.org\/10.1007\/s40998-017-0021-9","journal-title":"Iran J Sci Technol Trans Electr Eng"},{"issue":"2","key":"11170_CR37","doi-asserted-by":"publisher","first-page":"1402","DOI":"10.1109\/JIOT.2018.2844727","volume":"6","author":"L Wang","year":"2019","unstructured":"Wang L, Li L, Li J, Li J, Gupta BB, Liu X (2019) Compressive sensing of medical images with confidentially Homomorphic aggregations. IEEE Internet Things J 6(2):1402\u20131409. https:\/\/doi.org\/10.1109\/JIOT.2018.2844727","journal-title":"IEEE Internet Things J"},{"issue":"4356","key":"11170_CR38","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1038\/171737a0","volume":"171","author":"JD Watson","year":"1953","unstructured":"Watson JD et al (1953) Molecular structure of nucleic acids. Nature 171(4356):737\u2013738","journal-title":"Nature"},{"key":"11170_CR39","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1016\/j.sigpro.2019.04.022","volume":"162","author":"Y Xiang","year":"2019","unstructured":"Xiang Y, Xiao D, Wang H, Li X (2019) A secure image tampering detection and self- recovery scheme using POB number system over cloud. Signal Process 162:282\u2013295. https:\/\/doi.org\/10.1016\/j.sigpro.2019.04.022","journal-title":"Signal Process"},{"issue":"1","key":"11170_CR40","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.aeue.2014.10.006","volume":"69","author":"M Yu","year":"2015","unstructured":"Yu M, Wang J, Jiang G, Peng Z, Shao F, Luo T (2015) New fragile watermarking method for stereo image authentication with localization and recovery. AEU Int J Electron Commun 69(1):361\u2013370. https:\/\/doi.org\/10.1016\/j.aeue.2014.10.006","journal-title":"AEU Int J Electron Commun"},{"key":"11170_CR41","doi-asserted-by":"publisher","first-page":"120225","DOI":"10.1016\/j.techfore.2020.120225","volume":"160","author":"CS Yung","year":"2020","unstructured":"Yung CS, Ming YW, Ya CY (2020) Discovering the potential opportunities of scientific advancement and technological innovation: a case study of smart health monitoring technology. Technol Forecast Soc Chang 160:120225. https:\/\/doi.org\/10.1016\/j.techfore.2020.120225","journal-title":"Technol Forecast Soc Chang"},{"issue":"1","key":"11170_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/a10010027","volume":"10","author":"H Zhang","year":"2017","unstructured":"Zhang H, Wang C, Zhou X (2017) Fragile watermarking for image authentication using the characteristic of SVD. Algorithms 10(1):1\u201312","journal-title":"Algorithms"},{"key":"11170_CR43","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.jnca.2018.09.005","volume":"123","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Deng RH, Han G, Zheng D (2018) Secure smart health with privacy aware aggregate authentication and access control in internet of things. J Netw Comput Appl 123:89\u2013100. https:\/\/doi.org\/10.1016\/j.jnca.2018.09.005","journal-title":"J Netw Comput Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11170-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11170-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11170-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T18:25:06Z","timestamp":1629397506000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11170-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,15]]},"references-count":43,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["11170"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11170-x","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,15]]},"assertion":[{"value":"4 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 July 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}