{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T13:25:02Z","timestamp":1773753902084,"version":"3.50.1"},"reference-count":200,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2022,3,22]],"date-time":"2022-03-22T00:00:00Z","timestamp":1647907200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,3,22]],"date-time":"2022-03-22T00:00:00Z","timestamp":1647907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100007102","name":"Zagazig University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100007102","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,7]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Recently, there has been a rapid growth in the utilization of medical images in telemedicine applications. The authors in this paper presented a detailed discussion of different types of medical images and the attacks that may affect medical image transmission. This survey paper summarizes existing medical data security approaches and the different challenges associated with them. An in-depth overview of security techniques, such as cryptography, steganography, and watermarking are introduced with a full survey of recent research. The objective of the paper is to summarize and assess the different algorithms of each approach based on different parameters such as PSNR, MSE, BER, and NC.<\/jats:p>","DOI":"10.1007\/s11042-022-11956-7","type":"journal-article","created":{"date-parts":[[2022,3,22]],"date-time":"2022-03-22T10:03:07Z","timestamp":1647943387000},"page":"25101-25145","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":76,"title":["Security of medical images for telemedicine: a systematic review"],"prefix":"10.1007","volume":"81","author":[{"given":"Mahmoud","family":"Magdy","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8065-8977","authenticated-orcid":false,"given":"Khalid M.","family":"Hosny","sequence":"additional","affiliation":[]},{"given":"Neveen I.","family":"Ghali","sequence":"additional","affiliation":[]},{"given":"Said","family":"Ghoniemy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,22]]},"reference":[{"key":"11956_CR1","first-page":"1","volume-title":"21st Saudi computer society National Computer Conference (NCC)","author":"F Abbasi","year":"2018","unstructured":"Abbasi F, Memon NA (2018) Reversible watermarking for the security of medical image databases. In: 21st Saudi computer society National Computer Conference (NCC). IEEE, pp 1\u20136"},{"issue":"8","key":"11956_CR2","doi-asserted-by":"publisher","first-page":"12641","DOI":"10.1007\/s11042-020-10217-9","volume":"80","author":"MM Abdel-Aziz","year":"2021","unstructured":"Abdel-Aziz MM, Hosny KM, Lashin NA (2021) Improved data hiding method for securing color images. Multimed Tools Appl 80(8):12641\u201312670","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"11956_CR3","doi-asserted-by":"publisher","first-page":"129","DOI":"10.47839\/ijc.20.1.2101","volume":"20","author":"OY Abdulhammed","year":"2021","unstructured":"Abdulhammed OY (2021) Improving encryption digital watermark by using blue monkey algorithm. Int J Comput 20(1):129\u2013136","journal-title":"Int J Comput"},{"key":"11956_CR4","volume-title":"Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography","author":"AA Abdulla","year":"2015","unstructured":"Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Ph.D. Thesis. University of Buckingham"},{"key":"11956_CR5","first-page":"287","volume-title":"IEEE international symposium on multimedia","author":"AA Abdulla","year":"2013","unstructured":"Abdulla AA, Jassim SA, Sellahewa H (2013) Secure steganography technique based on Bitplane indexes. In: IEEE international symposium on multimedia. IEEE, pp 287\u2013291"},{"key":"11956_CR6","first-page":"151","volume-title":"Stego quality enhancement by message size reduction and Fibonacci bit-plane mapping","author":"A Abdulla","year":"2014","unstructured":"Abdulla A, Sellahewa H, Jassim S (2014) Stego quality enhancement by message size reduction and Fibonacci bit-plane mapping, pp 151\u2013166"},{"key":"11956_CR7","first-page":"1","volume-title":"International seminar on intelligent technology and its applications (ISITIA)","author":"TMK Afandi","year":"2021","unstructured":"Afandi TMK, Fandiantoro DH, Endroyono PIKE (2021) Medical images compression and encryption using DCT, arithmetic encoding, and Chaos-based encryption. In: International seminar on intelligent technology and its applications (ISITIA), pp 1\u20135"},{"key":"11956_CR8","volume-title":"Cellular imaging to biometrics Alice","author":"A Ahlem","year":"2019","unstructured":"Ahlem A, Sreetama O (2019) Cellular imaging to biometrics Alice. Springer, Singapore"},{"key":"11956_CR9","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.cmpb.2016.01.011","volume":"127","author":"H Al-Dmour","year":"2016","unstructured":"Al-Dmour H, Al-Ani A (2016) Quality optimized medical image information hiding algorithm that employs edge detection and data coding. Comput Methods Prog Biomed 127:24\u201343","journal-title":"Comput Methods Prog Biomed"},{"key":"11956_CR10","doi-asserted-by":"publisher","first-page":"9","DOI":"10.26483\/ijarcs.v10i1.6350","volume":"10","author":"M Ali","year":"2019","unstructured":"Ali M (2019) A survey of the Most current image encryption and decryption techniques. Int J Adv Res Comput Sci 10:9\u201314","journal-title":"Int J Adv Res Comput Sci"},{"issue":"1","key":"11956_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/sipij.2018.9101","volume":"9","author":"M Al-qdah","year":"2018","unstructured":"Al-qdah M (2018) Secure watermarking technique for medical images with visual evaluation. Signal Image Process Int J (SIPIJ) 9(1):1\u20139","journal-title":"Signal Image Process Int J (SIPIJ)"},{"key":"11956_CR12","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.aeue.2013.09.008","volume":"68","author":"OM Al-Qershi","year":"2014","unstructured":"Al-Qershi OM, Khoo BE (2014) Controlling hiding capacity using image characteristics with a 2D-DE data hiding scheme. AEU-Int J Electron Commun 68:346\u2013350","journal-title":"AEU-Int J Electron Commun"},{"key":"11956_CR13","first-page":"122","volume-title":"International conference on advanced computer science applications and technologies (ACSAT)","author":"AAJ Altaay","year":"2012","unstructured":"Altaay AAJ, Bin Sahib S, Zamani M (2012) An introduction to image steganography techniques. In: International conference on advanced computer science applications and technologies (ACSAT). IEEE, pp 122\u2013126"},{"key":"11956_CR14","doi-asserted-by":"publisher","first-page":"113714","DOI":"10.1109\/ACCESS.2021.3104985","volume":"9","author":"A Alzahrani","year":"2021","unstructured":"Alzahrani A, Memon NA (2021) Blind and robust watermarking scheme in hybrid domain for copyright protection of medical images. IEEE Access 9:113714\u2013113734","journal-title":"IEEE Access"},{"key":"11956_CR15","first-page":"30165","volume":"1-33","author":"A Anand","year":"2020","unstructured":"Anand A, Singh AK (2020) Watermarking techniques for medical data authentication: a survey. Multimed Tools Appl 1-33:30165\u201330197","journal-title":"Multimed Tools Appl"},{"key":"11956_CR16","doi-asserted-by":"publisher","first-page":"2770","DOI":"10.1049\/ipr2.12261","volume":"15","author":"I Aouissaoui","year":"2021","unstructured":"Aouissaoui I, Bakir T, Sakly A (2021) Robustly correlated key-medical image for DNA-chaos based encryption. IET Image Process 15:2770\u20132786","journal-title":"IET Image Process"},{"issue":"12e","key":"11956_CR17","first-page":"13233","volume":"119","author":"S Arunkumar","year":"2018","unstructured":"Arunkumar S, Subramaniyaswamy V, Sivaramakrishnan N (2018) Reversible data hiding scheme using modified histogram shifting in encrypted images for biomedical images. Int J Pure Appl Math 119(12e):13233\u201313239","journal-title":"Int J Pure Appl Math"},{"key":"11956_CR18","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.measurement.2019.02.069","volume":"139","author":"S Arunkumar","year":"2019","unstructured":"Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N, Logesh R (2019) SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139:426\u2013437","journal-title":"Measurement"},{"key":"11956_CR19","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-44790-2_1","volume-title":"Intelligent techniques in signal processing for multimedia security","author":"AS Ashour","year":"2017","unstructured":"Ashour AS, Dey N (2017) Security of multimedia contents: a brief. In: Intelligent techniques in signal processing for multimedia security. Springer, Cham, pp 3\u201314"},{"key":"11956_CR20","doi-asserted-by":"publisher","first-page":"18451","DOI":"10.1007\/s11042-016-3930-0","volume":"76","author":"S Atawneh","year":"2017","unstructured":"Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76:18451\u201318472","journal-title":"Multimed Tools Appl"},{"key":"11956_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0170329","volume":"12","author":"HA Atee","year":"2017","unstructured":"Atee HA, Ahmad R, Noor NM, Rahma AMS, Aljeroudi Y (2017) Extreme learning machine based optimal embedding location finder for image steganography. PLoS One 12:1\u201323","journal-title":"PLoS One"},{"key":"11956_CR22","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1201\/b12697-11","volume":"2","author":"M Bachrach","year":"2017","unstructured":"Bachrach M, Shih FY (2017) Survey of image steganography and steganalysis. Multimedia. Security. Watermarking, Steganography, Forensics 2:201\u2013214","journal-title":"Watermarking, Steganography, Forensics"},{"key":"11956_CR23","doi-asserted-by":"crossref","unstructured":"Balasamy K, Suganyadevi S (2020) A fuzzy-based ROI selection for encryption and watermarking in medical image using DWT and SVD. Multimed Tools Appl:7167\u20137186","DOI":"10.1007\/s11042-020-09981-5"},{"issue":"5","key":"11956_CR24","doi-asserted-by":"publisher","first-page":"7167","DOI":"10.1007\/s11042-020-09981-5","volume":"80","author":"K Balasamy","year":"2021","unstructured":"Balasamy K, Suganyadevi S (2021) A fuzzy based ROI selection for encryption and watermarking in the medical image using DWT and SVD. Multimed Tools Appl 80(5):7167\u20137186","journal-title":"Multimed Tools Appl"},{"key":"11956_CR25","doi-asserted-by":"publisher","first-page":"2223","DOI":"10.1007\/s11042-013-1640-4","volume":"73","author":"C Balasubramanian","year":"2014","unstructured":"Balasubramanian C, Selvakumar S, Geetha S (2014) High payload image steganography with reduced distortion using octonary pixel pairing scheme. Multimed Tools Appl 73:2223\u20132245","journal-title":"Multimed Tools Appl"},{"issue":"13","key":"11956_CR26","doi-asserted-by":"publisher","first-page":"17899","DOI":"10.1007\/s11042-018-6820-9","volume":"78","author":"R Bamal","year":"2019","unstructured":"Bamal R, Kasana SS (2019) Dual hybrid medical watermarking using Walsh-slantlet transform. Multimed Tools Appl 78(13):17899\u201317927","journal-title":"Multimed Tools Appl"},{"key":"11956_CR27","first-page":"1","volume":"3","author":"S Banerjee","year":"2015","unstructured":"Banerjee S, Chakraborty S, Dey N, Kumar Pal A, Ray R (2015) High payload watermarking using residue number system. Int J Image Graph Signal Process 3:1\u20138","journal-title":"Int J Image Graph Signal Process"},{"key":"11956_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijigsp.2015.03.01","volume":"7","author":"S Banerjee","year":"2015","unstructured":"Banerjee S, Chakraborty S, Dey N, Kumar Pal A, Ray R (2015) High payload watermarking using residue number system. Int J Image Graph Signal Process 7:1\u20138","journal-title":"Int J Image Graph Signal Process"},{"issue":"7","key":"11956_CR29","doi-asserted-by":"publisher","first-page":"1445","DOI":"10.1007\/s11517-020-02178-w","volume":"58","author":"SA Banu","year":"2020","unstructured":"Banu SA, Amirtharajan R (2020) A robust medical image encryption in dual-domain: chaos-DNA-IWT combined approach. Med Biol Eng Comput 58(7):1445\u20131458","journal-title":"Med Biol Eng Comput"},{"issue":"20","key":"11956_CR30","doi-asserted-by":"publisher","first-page":"27041","DOI":"10.1007\/s11042-018-5903-y","volume":"77","author":"AAS Begum","year":"2018","unstructured":"Begum AAS, Nirmala S (2018) Secure visual cryptography for medical image using modified cuckoo search. Multimed Tools Appl 77(20):27041\u201327060","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"11956_CR31","doi-asserted-by":"publisher","first-page":"110","DOI":"10.3390\/info11020110","volume":"11","author":"M Begum","year":"2020","unstructured":"Begum M, Uddin MS (2020) Digital image watermarking techniques: a review. Information 11(2):110","journal-title":"Information"},{"issue":"2","key":"11956_CR32","doi-asserted-by":"publisher","first-page":"2081","DOI":"10.1007\/s11042-020-09775-9","volume":"80","author":"M Benssalah","year":"2021","unstructured":"Benssalah M, Rhaskali Y, Drouiche K (2021) An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography. Multimed Tools Appl 80(2):2081\u20132107","journal-title":"Multimed Tools Appl"},{"key":"11956_CR33","unstructured":"Bhabatosh C (1977) Digital image processing and analysis, pp 469. PHI Learning Pvt. Ltd ISBN:9788120343252"},{"key":"11956_CR34","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.sigpro.2016.10.003","volume":"132","author":"W Cao","year":"2017","unstructured":"Cao W, Zhou Y, Chen CLP, Xia L (2017) Medical image encryption using edge maps. Signal Process 132:96\u2013109","journal-title":"Signal Process"},{"key":"11956_CR35","doi-asserted-by":"publisher","first-page":"7973","DOI":"10.1007\/s11042-016-3449-4","volume":"76","author":"S Chakraborty","year":"2017","unstructured":"Chakraborty S, Jalal AS, Bhatnagar C (2017) LSB based nonblind predictive edge adaptive image steganography. Multimed Tools Appl 76:7973\u20137987","journal-title":"Multimed Tools Appl"},{"key":"11956_CR36","unstructured":"Chandel R, Gupta G (2013) Image filtering algorithms and techniques: a review. Int J Adv Res Comput Sci Softw Eng 3(10)"},{"key":"11956_CR37","first-page":"434","volume":"3","author":"GS Chandel","year":"2013","unstructured":"Chandel GS, Sharma V, Singh UP (2013) Different image encryption techniques-survey and overview. Int J Adv Res Comput Sci Softw Eng 3:434\u2013437","journal-title":"Int J Adv Res Comput Sci Softw Eng"},{"issue":"10","key":"11956_CR38","doi-asserted-by":"publisher","first-page":"12647","DOI":"10.1007\/s11042-017-5348-8","volume":"78","author":"DS Chauhan","year":"2019","unstructured":"Chauhan DS et al (2019) Combining Mexican hat wavelet and spread spectrum for adaptive watermarking and its statistical detection using medical images. Multimed Tools Appl 78(10):12647\u201312661","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"11956_CR39","doi-asserted-by":"publisher","first-page":"3292","DOI":"10.1016\/j.eswa.2009.09.050","volume":"37","author":"WJ Chen","year":"2010","unstructured":"Chen WJ, Chang CC, Le THN (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37(4):3292\u20133301","journal-title":"Expert Syst Appl"},{"key":"11956_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics11010001","volume":"10","author":"YP Chen","year":"2021","unstructured":"Chen YP, Fan TY, Chao HC (2021) Wmnet: a lossless watermarking technique using deep learning for medical image authentication. Electron 10:1\u201312","journal-title":"Electron."},{"key":"11956_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42452-019-1685-8","volume":"2","author":"S Chirakkarottu","year":"2020","unstructured":"Chirakkarottu S, Mathew S (2020) A novel encryption method for medical images using 2D Zaslavski map and DNA cryptography. SN Appl Sci 2:1","journal-title":"SN Appl Sci"},{"key":"11956_CR42","first-page":"01","volume":"6","author":"J Collins","year":"2016","unstructured":"Collins J, Agaian S (2016) High capacity image steganography using adjunctive numerical representations with multiple bitplane decomposition methods. Int J Cryptogr Inf Secur 6:01\u201321","journal-title":"Int J Cryptogr Inf Secur"},{"issue":"1","key":"11956_CR43","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1089\/tmj.2009.0152","volume":"16","author":"JG Conde","year":"2010","unstructured":"Conde JG, De S, Hall RW, Johansen E, Meglan D, Peng GC (2010) Telehealth innovations in health education and training. Telemed E-Health 16(1):103\u2013106","journal-title":"Telemed E-Health"},{"key":"11956_CR44","first-page":"63","volume":"30","author":"S Dhawan","year":"2021","unstructured":"Dhawan S, Gupta R (2021) Analysis of various data security techniques of steganography: a survey. Information Security J 30:63\u201387","journal-title":"Information Security J"},{"key":"11956_CR45","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1016\/j.neucom.2006.05.003","volume":"70","author":"JX Du","year":"2006","unstructured":"Du JX, Huang DS, Zhang GJ, Wang ZF (2006) A novel full structure optimization algorithm for radial basis probabilistic neural networks. Neurocomputing 70:592\u2013596","journal-title":"Neurocomputing"},{"key":"11956_CR46","first-page":"506","volume-title":"43rd international conference on telecommunications and signal processing (TSP)","author":"E Elbasi","year":"2020","unstructured":"Elbasi E (2020) M-SVD based quality measurement in hybrid non-blind watermarked medical images. In: 43rd international conference on telecommunications and signal processing (TSP). IEEE, pp 506\u2013510"},{"key":"11956_CR47","doi-asserted-by":"publisher","first-page":"9007","DOI":"10.1007\/s12652-020-02597-5","volume":"12","author":"W El-Shafai","year":"2021","unstructured":"El-Shafai W, Khallaf F, El-Rabaie ESM et al (2021) Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications. J Ambient Intell Humaniz Comput 12:9007\u20139035","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"11956_CR48","doi-asserted-by":"publisher","first-page":"6119","DOI":"10.1109\/EMBC44109.2020.9176066","volume-title":"2020 42nd annual international conference of the IEEE engineering in Medicine & Biology Society (EMBC)","author":"P Eze","year":"2020","unstructured":"Eze P, Parampalli U, Evans R, Liu D (2020) A new evaluation method for medical image information hiding techniques. In: 2020 42nd annual international conference of the IEEE engineering in Medicine & Biology Society (EMBC). IEEE, pp 6119\u20136122"},{"issue":"3","key":"11956_CR49","first-page":"107","volume":"12","author":"P Eze","year":"2018","unstructured":"Eze P, Udaya P, Evans R (2018) Medical image watermark and tamper detection using constant correlation spread spectrum watermarking. Int J Comput Electr Autom Control Inf Eng 12(3):107\u2013114","journal-title":"Int J Comput Electr Autom Control Inf Eng"},{"key":"11956_CR50","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/3323873.3325020","volume-title":"Proceedings of 2019 on international conference on multimedia retrieval","author":"P Eze","year":"2019","unstructured":"Eze P et al (2019) Integrity verification in medical image retrieval systems using spread Spectrum steganography. In: Proceedings of 2019 on international conference on multimedia retrieval, pp 53\u201357"},{"key":"11956_CR51","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-981-16-3013-2_6","volume-title":"Innovation in medicine and healthcare","author":"Y Fang","year":"2021","unstructured":"Fang Y, Liu J, Li J, Yi D, Cui W, Xiao X, Bhatti UA (2021) A novel robust watermarking algorithm for encrypted medical image based on Bandelet-DCT. In: Innovation in medicine and healthcare. Springer, Singapore, pp 61\u201373"},{"key":"11956_CR52","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2020.102403","volume":"66","author":"K Fares","year":"2021","unstructured":"Fares K et al (2021) DCT & DWT based watermarking scheme for medical information security. Biomed Signal Process Control 66:102403","journal-title":"Biomed Signal Process Control"},{"issue":"3","key":"11956_CR53","first-page":"033103","volume":"57","author":"A Fatima","year":"2018","unstructured":"Fatima A, Nishchal NK (2018) Optical image encryption using a triplet of functions. Opt Eng 57(3):033103","journal-title":"Opt Eng"},{"key":"11956_CR54","first-page":"1","volume-title":"Proceedings of the 8th IEEE international conference on bioinformatics and BioEngineering","author":"V Fotopoulos","year":"2008","unstructured":"Fotopoulos V, Stavrinou M, Skodras A (2008) Medical image authentication and self-correction through an adaptive reversible watermarking technique. In: Proceedings of the 8th IEEE international conference on bioinformatics and BioEngineering, pp 1\u20135"},{"issue":"4","key":"11956_CR55","doi-asserted-by":"publisher","first-page":"75","DOI":"10.4018\/JITR.2020100106","volume":"13","author":"L Gao","year":"2020","unstructured":"Gao L, Zhang Y, Li G (2020) Reversible watermarking in medical images using sub-sample and multiple histogram modification. J Inf Technol Res (JITR) 13(4):75\u201390","journal-title":"J Inf Technol Res (JITR)"},{"issue":"2","key":"11956_CR56","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1504\/IJHPCN.2019.097508","volume":"13","author":"NE-H Gol\u00e9a","year":"2019","unstructured":"Gol\u00e9a NE-H, Melkemi KE (2019) ROI-based fragile watermarking for medical image tamper detection. Int J High Perform Comput Netw 13(2):199","journal-title":"Int J High Perform Comput Netw"},{"key":"11956_CR57","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-319-39393-3_13","volume-title":"Mexican conference on pattern recognition","author":"IR Grajeda-Mar\u00edn","year":"2016","unstructured":"Grajeda-Mar\u00edn IR, Montes-Venegas HA, Marcial-Romero JR, Hernandez-Servin JA, De Ita G (2016) An optimization approach to the TWPVD method for digital image steganography. In: Mexican conference on pattern recognition. Springer, Cham, pp 125\u2013134"},{"key":"11956_CR58","doi-asserted-by":"publisher","first-page":"1925","DOI":"10.1007\/s11042-020-09672-1","volume":"80","author":"R Guesmi","year":"2021","unstructured":"Guesmi R, Farah MAB (2021) A new efficient medical image cipher based on hybrid chaotic map and DNA code. Multimed Tools Appl 80:1925\u20131944","journal-title":"Multimed Tools Appl"},{"key":"11956_CR59","first-page":"826","volume-title":"A survey on reversible watermarking techniques for image security","author":"S Gupta","year":"2019","unstructured":"Gupta S, Baraskar R, Agrawal S (2019) A survey on reversible watermarking techniques for image security, pp 826\u2013836"},{"key":"11956_CR60","first-page":"1","volume-title":"2017 27th international Conference RADIOELEKTRONIKA (RADIOELEKTRONIKA)","author":"V Hajduk","year":"2017","unstructured":"Hajduk V, Levick\u00fd D (2017) Accelerated cover selection steganography. In: 2017 27th international Conference RADIOELEKTRONIKA (RADIOELEKTRONIKA). IEEE, pp 1\u20134"},{"key":"11956_CR61","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1109\/ICFCN.2012.6206858","volume-title":"International conference on future communication networks","author":"N Hamid","year":"2012","unstructured":"Hamid N, Yahya A, Ahmad RB, Al-Qershi O (2012) Characteristic region based image steganography using speeded-up robust features technique. In: International conference on future communication networks. IEEE, pp 141\u2013146"},{"key":"11956_CR62","volume-title":"KSII transactions on internet and information systems (TIIS) 15.3","author":"A Hamza","year":"2021","unstructured":"Hamza A et al (2021) Novel secure hybrid image steganography technique based on pattern matching. In: KSII transactions on internet and information systems (TIIS) 15.3"},{"key":"11956_CR63","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1016\/j.ins.2019.01.070","volume":"527","author":"R Hamza","year":"2020","unstructured":"Hamza R, Yan Z, Muhammad K, Bellavista P, Titouna F (2020) A privacy-preserving cryptosystem for IoT E-healthcare. Inf Sci 527:493\u2013510","journal-title":"Inf Sci"},{"key":"11956_CR64","volume-title":"7th international conference on advanced computing and communication systems ICACCS","author":"M Harshitha","year":"2021","unstructured":"Harshitha M et al (2021) Secure medical data using symmetric cipher based chaotic logistic mapping. In: 7th international conference on advanced computing and communication systems ICACCS, vol 1. IEEE"},{"key":"11956_CR65","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/s10278-020-00394-2","volume":"34","author":"A Hizukuri","year":"2021","unstructured":"Hizukuri A, Nakayama R, Nara M, Suzuki M, Namba K (2021) Computer-aided diagnosis scheme for distinguishing between benign and malignant masses on breast DCE-MRI images using deep convolutional neural network with Bayesian optimization. J Digit Imaging 34:116\u2013123","journal-title":"J Digit Imaging"},{"key":"11956_CR66","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1016\/j.image.2012.09.002","volume":"27","author":"W Hong","year":"2012","unstructured":"Hong W (2012) Human visual system based data embedding method using quadtree partitioning. Signal Process Image Commun 27:1123\u20131133","journal-title":"Signal Process Image Commun"},{"key":"11956_CR67","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2021.103007","volume":"70","author":"KM Hosny","year":"2021","unstructured":"Hosny KM, Darwish MM (2021) New geometrically invariant multiple zero-watermarking algorithm for color medical images. Biomed Signal Process Control 70:103007","journal-title":"Biomed Signal Process Control"},{"key":"11956_CR68","doi-asserted-by":"publisher","first-page":"47425","DOI":"10.1109\/ACCESS.2021.3068211","volume":"9","author":"KM Hosny","year":"2021","unstructured":"Hosny KM, Darwish MM, Fouda MM (2021) Robust color images watermarking using new fractional-order exponent moments. IEEE Access 9:47425\u201347435","journal-title":"IEEE Access"},{"key":"11956_CR69","doi-asserted-by":"publisher","first-page":"77212","DOI":"10.1109\/ACCESS.2018.2879919","volume":"6","author":"KM Hosny","year":"2018","unstructured":"Hosny KM, Darwish MM, Li K, Salah A (2018) Parallel multi-core CPU and GPU for fast and robust medical image watermarking. IEEE Access 6:77212\u201377225","journal-title":"IEEE Access"},{"key":"11956_CR70","doi-asserted-by":"publisher","first-page":"2099","DOI":"10.1109\/TNN.2008.2004370","volume":"19","author":"DS Huang","year":"2008","unstructured":"Huang DS, Du JX (2008) A constructive hybrid structure optimization methodology for radial basis probabilistic neural networks. IEEE Trans Neural Netw 19:2099\u20132115","journal-title":"IEEE Trans Neural Netw"},{"key":"11956_CR71","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-981-16-0586-4_8","volume-title":"Proceedings of international joint conference on advances in computational intelligence","author":"F Huma","year":"2021","unstructured":"Huma F et al (2021) Wavelet and LSB-based encrypted watermarking approach to Hide Patient\u2019s information in medical image. In: Proceedings of international joint conference on advances in computational intelligence. Springer, Singapore, pp 89\u2013104"},{"key":"11956_CR72","doi-asserted-by":"crossref","unstructured":"Iskandar MW, Adiwijaya (2019) An implementation of text hiding in medical images based on graph coloring for android devices. J Phys Conf Ser 1192(1):012008","DOI":"10.1088\/1742-6596\/1192\/1\/012008"},{"issue":"15","key":"11956_CR73","first-page":"12353","volume":"13","author":"M Jain","year":"2018","unstructured":"Jain M (2018) Medical image steganography using dynamic decision tree, piecewise linear chaotic map, and hybrid cryptosystem. Int J Appl Eng Res 13(15):12353\u201312363","journal-title":"Int J Appl Eng Res"},{"key":"11956_CR74","first-page":"291","volume-title":"2nd international conference on contemporary computing and informatics (IC3I)","author":"M Jain","year":"2016","unstructured":"Jain M, Choudhary RC, Kumar A (2016) Secure medical image steganography with RSA cryptography using decision tree. In: 2nd international conference on contemporary computing and informatics (IC3I). IEEE, pp 291\u2013295"},{"issue":"2","key":"11956_CR75","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s40708-016-0057-z","volume":"4","author":"M Jain","year":"2017","unstructured":"Jain M, Kumar A, Choudhary RC (2017) Improved diagonal queue medical image steganography using Chaos theory, LFSR, and Rabin cryptosystem. Brain Inform 4(2):95\u2013106","journal-title":"Brain Inform"},{"key":"11956_CR76","volume-title":"Intelligent data communication technologies and internet of things: proceedings of ICICI 2020","author":"T Jambhale","year":"2021","unstructured":"Jambhale T, Sudha M (2021) A privacy-preserving hybrid neural-crypto computing-based image steganography for medical images. In: Intelligent data communication technologies and internet of things: proceedings of ICICI 2020. Springer, Singapore"},{"key":"11956_CR77","volume":"59","author":"T Janani","year":"2021","unstructured":"Janani T, Brindha M (2021) A secure medical image transmission scheme aided by quantum representation. J Inf Secur Appl 59:102832","journal-title":"J Inf Secur Appl"},{"issue":"1","key":"11956_CR78","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s12553-018-00285-1","volume":"10","author":"S Jeevitha","year":"2020","unstructured":"Jeevitha S, Amutha Prabha N (2020) Effective payload and improved security using HMT Contourlet transform in medical image steganography. Heal Technol 10(1):217\u2013229","journal-title":"Heal Technol"},{"issue":"2","key":"11956_CR79","first-page":"193","volume":"20","author":"S Jia","year":"2017","unstructured":"Jia S, Zhou Q, Zhou H (2017) A novel color image watermarking scheme based on DWT and QR decomposition. J Appl Sci Eng 20(2):193\u2013200","journal-title":"J Appl Sci Eng"},{"issue":"2","key":"11956_CR80","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1049\/iet-ipr.2016.0349","volume":"11","author":"L Kabbai","year":"2016","unstructured":"Kabbai L, Abdellaoui M, Douik A (2016) Hybrid local and global descriptor enhanced with colour information. IET Image Process 11(2):109\u2013117","journal-title":"IET Image Process"},{"key":"11956_CR81","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.cogsys.2019.11.002","volume":"60","author":"IJ Kadhim","year":"2020","unstructured":"Kadhim IJ, Premaratne P, Vial PJ (2020) High capacity adaptive image steganography with cover region selection using dualtree complex wavelet transform. Cogn Syst Res 60:20\u201332","journal-title":"Cogn Syst Res"},{"key":"11956_CR82","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.neucom.2018.06.075","volume":"335","author":"IJ Kadhim","year":"2019","unstructured":"Kadhim IJ et al (2019) Comprehensive survey of image steganography: techniques, evaluations, and trends in future research. Neurocomputing 335:299\u2013326","journal-title":"Neurocomputing"},{"issue":"2","key":"11956_CR83","doi-asserted-by":"publisher","first-page":"2931","DOI":"10.1007\/s12652-020-02450-9","volume":"12","author":"F Kahlessenane","year":"2021","unstructured":"Kahlessenane F et al (2021) A DWT based watermarking approach for medical image protection. J Ambient Intell Humaniz Comput 12(2):2931\u20132938","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"11956_CR84","doi-asserted-by":"publisher","first-page":"37855","DOI":"10.1109\/ACCESS.2021.3063237","volume":"9","author":"ST Kamal","year":"2021","unstructured":"Kamal ST, Hosny KM, Elgindy TM, Darwish MM, Fouda MM (2021) A new image encryption algorithm for Grey and color medical images. IEEE Access 9:37855\u201337865","journal-title":"IEEE Access"},{"issue":"8","key":"11956_CR85","doi-asserted-by":"publisher","first-page":"3221","DOI":"10.1007\/s12652-019-01500-1","volume":"11","author":"AMS Kamalraj","year":"2020","unstructured":"Kamalraj AMS, Venkatesan GKDP, Ravi RV (2020) Digital watermarking techniques for image security: a review. J Ambient Intell Humaniz Comput 11(8):3221\u20133229","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"1","key":"11956_CR86","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s40747-020-00199-4","volume":"7","author":"ME Karar","year":"2021","unstructured":"Karar ME, Hemdan EED, Shouman MA (2021) Cascaded deep learning classifiers for computer-aided diagnosis of COVID-19 and pneumonia diseases in X-ray scans. Complex Intell Syst 7(1):235\u2013247","journal-title":"Complex Intell Syst"},{"issue":"6","key":"11956_CR87","first-page":"58","volume":"14","author":"JV Karthik","year":"2014","unstructured":"Karthik JV, Reddy BV (2014) Authentication of secret information in image stenography. Int J Comput Sci Netw Secur 14(6):58","journal-title":"Int J Comput Sci Netw Secur"},{"issue":"1","key":"11956_CR88","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s11831-018-9298-8","volume":"27","author":"M Kaur","year":"2020","unstructured":"Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 27(1):15\u201343","journal-title":"Arch Comput Methods Eng"},{"key":"11956_CR89","first-page":"3194","volume-title":"International conference on energy, communication, data analytics and soft computing (ICECDS)","author":"J Kaur","year":"2018","unstructured":"Kaur J, Pandey S (2018) An adaptive quadtree based transform domain steganography for textual data. In: International conference on energy, communication, data analytics and soft computing (ICECDS), pp 3194\u20133199"},{"key":"11956_CR90","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-981-10-7895-8_11","volume-title":"Proceedings of 2nd international conference on Computer Vision & Image Processing","author":"V Kelkar","year":"2018","unstructured":"Kelkar V, Mehta JH, Tuckley K (2018) A novel robust reversible watermarking technique based on prediction error expansion for medical images. In: Proceedings of 2nd international conference on Computer Vision & Image Processing. Springer, Singapore, pp 131\u2013143"},{"issue":"1","key":"11956_CR91","first-page":"379","volume":"8","author":"S Khan","year":"2018","unstructured":"Khan S (2018) Ant colony optimization (ACO) based data hiding in image complex region. Int J Electr Comput Eng (2088\u20138708) 8(1):379","journal-title":"Int J Electr Comput Eng (2088\u20138708)"},{"issue":"3","key":"11956_CR92","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/s13319-014-0016-5","volume":"5","author":"M Khan","year":"2014","unstructured":"Khan M, Shah T (2014) A novel statistical analysis of chaotic S-box in image encryption. 3D Res 5(3):16","journal-title":"3D Res"},{"issue":"6","key":"11956_CR93","doi-asserted-by":"publisher","first-page":"899","DOI":"10.3390\/sym12060899","volume":"12","author":"MZ Konyar","year":"2020","unstructured":"Konyar MZ, \u00d6zt\u00fcrk S (2020) Reed Solomon coding-based medical image data hiding method against salt and pepper noise. Symmetry 12(6):899","journal-title":"Symmetry"},{"key":"11956_CR94","doi-asserted-by":"publisher","first-page":"2517","DOI":"10.1007\/s11517-019-02037-3","volume":"57","author":"S Kumar","year":"2019","unstructured":"Kumar S, Panna B, Jha RK (2019) Medical image encryption using fractional discrete cosine transform with chaotic function. Med Biol Eng Comput 57:2517\u20132533","journal-title":"Med Biol Eng Comput"},{"key":"11956_CR95","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.ijleo.2017.08.028","volume":"147","author":"DS Laiphrakpam","year":"2017","unstructured":"Laiphrakpam DS, Khumanthem MS (2017) Medical image encryption based on improved ElGamal encryption technique. Optik 147:88\u2013102","journal-title":"Optik"},{"key":"11956_CR96","first-page":"26","volume-title":"Proceedings of 3rd international conference on internet of things and connected technologies (ICIoTCT)","author":"D Laishram","year":"2018","unstructured":"Laishram D, Tuithung T (2018) A survey on digital image steganography: current trends and challenges. In: Proceedings of 3rd international conference on internet of things and connected technologies (ICIoTCT), pp 26\u201327"},{"key":"11956_CR97","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.optlaseng.2014.08.016","volume":"66","author":"XW Li","year":"2015","unstructured":"Li XW, Lee IK (2015) Modified computational integral imaging-based double image encryption using fractional Fourier transform. Opt Lasers Eng 66:112\u2013121","journal-title":"Opt Lasers Eng"},{"key":"11956_CR98","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.optlaseng.2017.08.018","volume":"100","author":"X Li","year":"2018","unstructured":"Li X, Xiao D, Wang QH (2018) Error-free holographic frames encryption with CA pixel-permutation encoding algorithm. Opt Lasers Eng 100:200\u2013207","journal-title":"Opt Lasers Eng"},{"key":"11956_CR99","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1186\/s12911-020-01328-2","volume":"20","author":"J Li","year":"2020","unstructured":"Li J, Zhang Z, Li S, Benton R, Huang Y, Kasukurthi MV, Li D, Lin J, Borchert GM, Tan S, Li G, Ma B, Yang M, Huang J (2020) A partial encryption algorithm for medical images based on quick response code and reversible data hiding technology. BMC Med Inform Decis Mak 20:297","journal-title":"BMC Med Inform Decis Mak"},{"key":"11956_CR100","doi-asserted-by":"publisher","first-page":"904","DOI":"10.1109\/ISECS.2008.83","volume-title":"2008 international symposium on electronic commerce and security","author":"Y Li","year":"2008","unstructured":"Li Y, Zhu H, Yu R, Yang G, Xu J (2008) An adaptive blind watermarking algorithm based on DCT and modified watson\u2019s visual model. In: 2008 international symposium on electronic commerce and security. IEEE, pp 904\u2013907"},{"issue":"5","key":"11956_CR101","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1109\/JSTSP.2020.3002391","volume":"14","author":"X Liao","year":"2020","unstructured":"Liao X, Li K, Zhu X, Liu KJR (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Sel Top Signal Process 14(5):955\u2013968","journal-title":"IEEE J Sel Top Signal Process"},{"key":"11956_CR102","doi-asserted-by":"publisher","unstructured":"Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Dependable Secure Comput:1\u20131. https:\/\/doi.org\/10.1109\/TDSC.2020.3004708","DOI":"10.1109\/TDSC.2020.3004708"},{"issue":"3","key":"11956_CR103","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2020","unstructured":"Liao X, Yu Y, Li B, Li Z, Qin Z (2020) A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Video Technol 30(3):685\u2013696","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"3","key":"11956_CR104","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MMUL.2005.46","volume":"12","author":"V Licks","year":"2005","unstructured":"Licks V, Jordan R (2005) Geometric attacks on image watermarking systems. IEEE MultiMedia 12(3):68\u201378","journal-title":"IEEE MultiMedia"},{"issue":"2","key":"11956_CR105","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1109\/76.905982","volume":"11","author":"CY Lin","year":"2001","unstructured":"Lin CY, Chang SF (2001) A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol 11(2):153\u2013168","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"11956_CR106","doi-asserted-by":"publisher","first-page":"118624","DOI":"10.1109\/ACCESS.2021.3107608","volume":"9","author":"C-H Lin","year":"2021","unstructured":"Lin C-H et al (2021) Intelligent symmetric cryptography with chaotic map and quantum based key generator for medical images Infosecurity. IEEE Access 9:118624\u2013118639","journal-title":"IEEE Access"},{"key":"11956_CR107","doi-asserted-by":"publisher","first-page":"93939","DOI":"10.1109\/ACCESS.2020.2995015","volume":"8","author":"J Liu","year":"2020","unstructured":"Liu J, Ma J, Li J (2020) Robust watermarking algorithm for medical volume data in internet of medical things. IEEE Access 8:93939\u201393961","journal-title":"IEEE Access"},{"key":"11956_CR108","doi-asserted-by":"crossref","unstructured":"Liu X et al (2018) Discriminative and robust zero-watermarking scheme based on completed local binary pattern for authentication and copyright identification of medical images. Medical imaging 2018: imaging informatics for healthcare, research, and applications. International Society for Optics and Photonics 10579","DOI":"10.1117\/12.2292852"},{"key":"11956_CR109","doi-asserted-by":"publisher","first-page":"19027","DOI":"10.1007\/s11042-017-5356-8","volume":"77","author":"T Luo","year":"2018","unstructured":"Luo T, Jiang G, Yu M, Xu H, Gao W (2018) Sparse recovery based reversible data hiding method using the human visual system. Multimed Tools Appl 77:19027\u201319050","journal-title":"Multimed Tools Appl"},{"key":"11956_CR110","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.1007\/s10851-021-01048-w","volume":"1-19","author":"B Ma","year":"2021","unstructured":"Ma B, Chang L, Wang C, Li J, Li G, Xia Z, Wang X (2021) Double medical images zero-watermarking algorithm based on the chaotic system and ternary accurate polar complex exponential transform. J Math Imaging Vis 1-19:1160\u20131178","journal-title":"J Math Imaging Vis"},{"key":"11956_CR111","first-page":"408","volume-title":"Third international conference on intelligent networking and collaborative systems","author":"E Martiri","year":"2011","unstructured":"Martiri E, Baxhaku A, Barolli E (2011) Steganographic algorithm injection in image information systems used in healthcare organizations. In: Third international conference on intelligent networking and collaborative systems. IEEE, pp 408\u2013411"},{"key":"11956_CR112","doi-asserted-by":"crossref","unstructured":"Mata-Mendoza D, Cedillo-Hernandez M, Garcia-Ugalde F, Cedillo-Hernandez A, Nakano-Miyatake M, Perez-Meana H (2021) Secured telemedicine of medical imaging based on dual robust watermarking. Vis Comput:1\u201318","DOI":"10.1007\/s00371-021-02267-3"},{"key":"11956_CR113","first-page":"1","volume":"2008","author":"H Mathkour","year":"2008","unstructured":"Mathkour H, Al-Sadoon B, Touir A (2008) A new image steganography technique. 2008 Int. Conf Wirel Commun Netw Mob Comput WiCOM 2008:1\u20134","journal-title":"Conf Wirel Commun Netw Mob Comput WiCOM"},{"key":"11956_CR114","doi-asserted-by":"crossref","unstructured":"Meryem B (2018) A short survey on image zero-watermarking techniques based on visual cryptography. 9th Int. Symp Signal, Image, Video Communication:157\u2013162","DOI":"10.1109\/ISIVC.2018.8709240"},{"key":"11956_CR115","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.ijleo.2017.07.043","volume":"145","author":"A Miri","year":"2017","unstructured":"Miri A, Faez K (2017) Adaptive image steganography based on transform domain via genetic algorithm. Optik 145:158\u2013168","journal-title":"Optik"},{"key":"11956_CR116","doi-asserted-by":"crossref","unstructured":"Mishra P, Bhaya C, Pal AK, Singh AK (2021) A medical image cryptosystem using bit-level diffusion with DNA coding. J Ambient Intell Humaniz Comput:1\u201322","DOI":"10.1007\/s12652-021-03410-7"},{"key":"11956_CR117","doi-asserted-by":"publisher","first-page":"6355","DOI":"10.1007\/s11042-020-10066-6","volume":"80","author":"ZF Mohammed","year":"2021","unstructured":"Mohammed ZF, Abdulla AA (2021) An efficient CAD system for ALL cell identification from microscopic blood images. Multimed Tools Appl 80:6355\u20136368","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"11956_CR118","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJESDF.2020.103869","volume":"12","author":"J Mondal","year":"2020","unstructured":"Mondal J, Swain D (2020) A 3-layer RDH method in encrypted domain for medical information security. Int J Electron Secur Digit Forensics 12(1):1\u201315","journal-title":"Int J Electron Secur Digit Forensics"},{"key":"11956_CR119","doi-asserted-by":"publisher","first-page":"8597","DOI":"10.1007\/s11042-016-3383-5","volume":"76","author":"K Muhammad","year":"2017","unstructured":"Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) CISSKA-LSB: color image steganography using stego keydirected adaptive LSB substitution method. Multimed Tools Appl 76:8597\u20138626","journal-title":"Multimed Tools Appl"},{"key":"11956_CR120","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1016\/j.procs.2016.03.114","volume":"79","author":"S Mungmode","year":"2016","unstructured":"Mungmode S, Sedamkar RR, Kulkarni N (2016) A modified high-frequency adaptive security approach using steganography for region selection based on threshold value. Procedia Comput Sci 79:912\u2013921","journal-title":"Procedia Comput Sci"},{"issue":"C","key":"11956_CR121","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1016\/j.procs.2015.04.182","volume":"48","author":"S Nagaraj","year":"2015","unstructured":"Nagaraj S, Raju GSVP, Koteswara Rao K (2015) Image encryption using elliptic curve cryptography and matrix. Procedia Comput Sci 48(C):276\u2013281","journal-title":"Procedia Comput Sci"},{"key":"11956_CR122","unstructured":"Naidu CD, Koppu S, Viswanatham VM, Aarthy SL (2014) Cryptography based medical image security with LSB blowfish algorithms. ARPN Journal of Engineering and Applied Sciences 9(8)"},{"issue":"7","key":"11956_CR123","doi-asserted-by":"publisher","first-page":"10615","DOI":"10.1007\/s11042-020-10032-2","volume":"80","author":"M Nazari","year":"2021","unstructured":"Nazari M, Mehrabian M (2021) A novel chaotic IWT-LSB blind watermarking approach with flexible capacity for secure transmission of authenticated medical images. Multimed Tools Appl 80(7):10615\u201310655","journal-title":"Multimed Tools Appl"},{"issue":"14","key":"11956_CR124","doi-asserted-by":"publisher","first-page":"8319","DOI":"10.1007\/s11042-015-2752-9","volume":"75","author":"TD Nguyen","year":"2016","unstructured":"Nguyen TD, Arch-Int S, Arch-Int N (2016) An adaptive multi bit-plane image steganography using block data-hiding. Multimed Tools Appl 75(14):8319\u20138345","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"11956_CR125","first-page":"266","volume":"13","author":"L Novamizanti","year":"2020","unstructured":"Novamizanti L, Wahidah I, Wardana NPDP (2020) A robust medical images watermarking using FDCuTDCT-SVD. Int J Intell Eng Syst 13(6):266\u2013278","journal-title":"Int J Intell Eng Syst"},{"key":"11956_CR126","volume-title":"28th signal processing and communications applications conference SIU","author":"FBM \u00d6zcan","year":"2020","unstructured":"\u00d6zcan FBM, Karakis R, G\u00fcler I (2020) Steganalysis on medical images with support vector machine. In: 28th signal processing and communications applications conference SIU. IEEE"},{"key":"11956_CR127","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1109\/UBMK.2017.8093481","volume-title":"2017 international conference on computer science and engineering (UBMK)","author":"F \u00d6zkaynak","year":"2017","unstructured":"\u00d6zkaynak F (2017) Role of NPCR and UACI tests in security problems of chaos based image encryption algorithms and possible solution proposals. In: 2017 international conference on computer science and engineering (UBMK). IEEE, pp 621\u2013624"},{"key":"11956_CR128","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/j.sigpro.2017.03.011","volume":"138","author":"C Pak","year":"2017","unstructured":"Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129\u2013137","journal-title":"Signal Process"},{"key":"11956_CR129","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-319-68533-5_15","volume-title":"Surveillance in action","author":"V Pomponiu","year":"2018","unstructured":"Pomponiu V, Cavagnino D, Botta M (2018) Data hiding in the wild: where computational intelligence meets digital forensics. In: Surveillance in action. Springer, Cham, pp 301\u2013331"},{"key":"11956_CR130","doi-asserted-by":"crossref","unstructured":"Priya S, Santhi B (2019) A novel visual medical image encryption for secure transmission of authenticated watermarked medical images. Mobile networks and applications:1\u20138","DOI":"10.1007\/s11036-019-01213-x"},{"key":"11956_CR131","first-page":"1","volume-title":"International conference on advances in electrical, computing, communication and sustainable technologies (ICAECT)","author":"A Priyadharshini","year":"2021","unstructured":"Priyadharshini A, Umamaheswari R, Jayapandian N, Priyananci S (2021) Securing medical images using encryption and LSB steganography. In: International conference on advances in electrical, computing, communication and sustainable technologies (ICAECT). IEEE, pp 1\u20135"},{"key":"11956_CR132","unstructured":"Qi G, Gong L, Song Y, Ma K, Zheng Y (2021) Stabilized medical image attacks. arXiv preprint arXiv:2103.05232"},{"key":"11956_CR133","doi-asserted-by":"publisher","first-page":"6473","DOI":"10.1007\/s11042-016-3301-x","volume":"76","author":"T Rabie","year":"2017","unstructured":"Rabie T, Kamel I (2017) High-capacity steganography: a global-adaptive-region discrete cosine transform approach. Multimed Tools Appl 76:6473\u20136493","journal-title":"Multimed Tools Appl"},{"key":"11956_CR134","doi-asserted-by":"publisher","first-page":"1950034","DOI":"10.1142\/S0219691319500346","volume":"17","author":"SP Raja","year":"2019","unstructured":"Raja SP (2019) Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique. Int J Wavelets Multiresolution Inf Process 17:1950034","journal-title":"Int J Wavelets Multiresolution Inf Process"},{"key":"11956_CR135","doi-asserted-by":"crossref","unstructured":"Rajendran S, Doraipandian M (2021) Chaos based secure medical image transmission model for IoT-powered healthcare systems. IOP conference series: materials science and engineering. Vol. 1022. No. 1. IOP Publishing","DOI":"10.1088\/1757-899X\/1022\/1\/012106"},{"key":"11956_CR136","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.optcom.2015.03.016","volume":"348","author":"Q Ran","year":"2015","unstructured":"Ran Q, Yuan L, Zhao T (2015) Image encryption based on nonseparable fractional Fourier transform and chaotic map. Opt Commun 348:43\u201349","journal-title":"Opt Commun"},{"key":"11956_CR137","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/s11517-021-02328-8","volume":"59","author":"D Ravichandran","year":"2021","unstructured":"Ravichandran D, Banu SA, Murthy B et al (2021) An efficient medical image encryption using hybrid DNA computing and chaos in transform domain. Med Biol Eng Comput 59:589\u2013605","journal-title":"Med Biol Eng Comput"},{"issue":"1","key":"11956_CR138","first-page":"111","volume":"1","author":"PR Reddy","year":"2009","unstructured":"Reddy PR, Prasad MV, Rao DS (2009) Robust digital watermarking of color images under noise attacks. Int J Recent Trends Eng 1(1):111\u2013116","journal-title":"Int J Recent Trends Eng"},{"issue":"4","key":"11956_CR139","doi-asserted-by":"publisher","first-page":"1505","DOI":"10.21917\/ijivp.2017.0215","volume":"7","author":"S Renukalatha","year":"2017","unstructured":"Renukalatha S, Suresh KV (2017) Automatic Roi extraction in Noisy medical images. ICTACT J Image Video Process 7(4):1505\u20131514","journal-title":"ICTACT J Image Video Process"},{"issue":"5","key":"11956_CR140","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1093\/comjnl\/bxaa017","volume":"64","author":"VK Reshma","year":"2021","unstructured":"Reshma VK, Vinod Kumar RS (2021) Pixel prediction-based image steganography by support vector neural network. Comput J 64(5):731\u2013748","journal-title":"Comput J"},{"key":"11956_CR141","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/s10278-020-00396-0","volume":"34","author":"A Rocek","year":"2021","unstructured":"Rocek A, Javorn\u00edk M, Slav\u00edcek K, Dost\u00e1l O (2021) Zero watermarking : critical analysis of its role in current medical imaging. J Digit Imaging 34:204\u2013211","journal-title":"J Digit Imaging"},{"issue":"2","key":"11956_CR142","first-page":"89","volume":"20","author":"E Sadek","year":"2020","unstructured":"Sadek E, AbdElSabour Seada N, Ghoniemy S (2020) Computer vision techniques for autism symptoms detection and recognition: a survey. Int J Intell Comput Inf Sci 20(2):89\u2013111","journal-title":"Int J Intell Comput Inf Sci"},{"key":"11956_CR143","first-page":"1","volume-title":"2020 IEEE 17th India council international conference (INDICON)","author":"S Sahoo","year":"2020","unstructured":"Sahoo S, Sahoo SS (2020) A new COVID-19 medical image steganography based on dual encrypted data insertion into minimum mean intensity window of LSB of X-ray scans. In: 2020 IEEE 17th India council international conference (INDICON), pp 1\u20136"},{"key":"11956_CR144","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113639","volume":"159","author":"S Sajadi","year":"2020","unstructured":"Sajadi S, Fathi A (2020) Genetic algorithm based local and global spectral features extraction for ear recognition. Expert Syst Appl 159:113639","journal-title":"Expert Syst Appl"},{"issue":"4","key":"11956_CR145","first-page":"28","volume":"19","author":"JNB Salameh","year":"2019","unstructured":"Salameh JNB (2019) A new approach for securing medical images and Patient\u2019s information by using a hybrid system. Int J of Computer Sci Netw Secur 19(4):28\u201339","journal-title":"Int J of Computer Sci Netw Secur"},{"key":"11956_CR146","first-page":"154","volume-title":"Model-based steganography. In international workshop on digital watermarking","author":"P Sallee","year":"2003","unstructured":"Sallee P (2003) Model-based steganography. In international workshop on digital watermarking. Springer, Berlin, Heidelberg, pp 154\u2013167"},{"issue":"1","key":"11956_CR147","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40064-016-3356-1","volume":"5","author":"B Santhi","year":"2016","unstructured":"Santhi B, Dheeptha B (2016) A novel edge-based embedding in medical images based on a unique key generated using sudoku puzzle design. SpringerPlus 5(1):1\u201316","journal-title":"SpringerPlus"},{"issue":"1","key":"11956_CR148","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1175\/1\/012057","volume":"1175","author":"B Santoso","year":"2019","unstructured":"Santoso B (2019) Color-based microscopic image steganography for telemedicine applications using pixel value differencing algorithm. J Phys Conf Ser 1175(1):012057","journal-title":"J Phys Conf Ser"},{"key":"11956_CR149","first-page":"117","volume":"5","author":"SK Sathua","year":"2017","unstructured":"Sathua SK, Dash A, Behera A (2017) Removal of Salt and Pepper noise from Gray-Scale and Color Images: An adaptive approach arXiv preprint arXiv 5:117\u2013126","journal-title":"Removal of Salt and Pepper noise from Gray-Scale and Color Images: An adaptive approach arXiv preprint arXiv"},{"issue":"11","key":"11956_CR150","first-page":"3","volume":"9","author":"D Seth","year":"2010","unstructured":"Seth D, Ramanathan L, Pandey A (2010) Security enhancement: combining cryptography and steganography. Int J Comput Appl 9(11):3\u20136","journal-title":"Int J Comput Appl"},{"key":"11956_CR151","doi-asserted-by":"crossref","unstructured":"Setiadi DRIM et al (2019) Secure reversible data hiding in the medical image using histogram shifting and RC4 encryption. International Seminar on Application for Technology of Information and Communication (iSemantic):1\u20136","DOI":"10.1109\/ISEMANTIC.2019.8884306"},{"key":"11956_CR152","first-page":"467","volume-title":"Proceedings of the 5th international conference on Frontiers in intelligent computing: theory and applications","author":"A Shahzad","year":"2017","unstructured":"Shahzad A, Ahmad T, Doja MN (2017) A novel edge-based chaotic steganography method using neural network. In: Proceedings of the 5th international conference on Frontiers in intelligent computing: theory and applications, pp 467\u2013475"},{"key":"11956_CR153","volume-title":"Medical image Detection & Privacy Management with Elliptic Curve GOPSO cryptographic optimization technique on the internet of health things","author":"BH Shanthan","year":"2021","unstructured":"Shanthan BH, Bist AS, VijendraBabu D (2021) Medical image Detection & Privacy Management with Elliptic Curve GOPSO cryptographic optimization technique on the internet of health things"},{"issue":"19","key":"11956_CR154","doi-asserted-by":"publisher","first-page":"1850212","DOI":"10.1142\/S0217984918502123","volume":"32","author":"S Sharma","year":"2018","unstructured":"Sharma S, Kumar V (2018) Performance evaluation of 2D face recognition techniques under image processing attacks. Modern Physics Letters B 32(19):1850212","journal-title":"Modern Physics Letters B"},{"key":"11956_CR155","doi-asserted-by":"publisher","first-page":"10269","DOI":"10.1109\/ACCESS.2018.2799240","volume":"6","author":"A Shehab","year":"2018","unstructured":"Shehab A et al (2018) Secure and robust fragile watermarking scheme for medical images. IEEE Access 6:10269\u201310278","journal-title":"IEEE Access"},{"issue":"3","key":"11956_CR156","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1007\/s11042-014-2016-0","volume":"74","author":"S Shen","year":"2015","unstructured":"Shen S, Huang L, Tian Q (2015) A novel data hiding for color images based on pixel value difference and modulus function. Multimed Tools Appl 74(3):707\u2013728","journal-title":"Multimed Tools Appl"},{"key":"11956_CR157","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2020.106911","volume":"138","author":"Y Shen","year":"2021","unstructured":"Shen Y, Tang C, Xu M, Lei Z (2021) Optical selective encryption based on the FRFCM algorithm and face biometric for the medical image. Opt Laser Technol 138:106911","journal-title":"Opt Laser Technol"},{"issue":"14","key":"11956_CR158","doi-asserted-by":"publisher","first-page":"8381","DOI":"10.1007\/s11042-015-2754-7","volume":"75","author":"AK Singh","year":"2016","unstructured":"Singh AK, Dave M, Mohan A (2016) Hybrid technique for robust and imperceptible multiple watermarking using medical images. Multimed Tools Appl 75(14):8381\u20138401","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"11956_CR159","doi-asserted-by":"publisher","first-page":"1415","DOI":"10.1007\/s11277-014-2091-6","volume":"80","author":"AK Singh","year":"2014","unstructured":"Singh AK, Kumar B, Dave M, Mohan A (2014) Robust and imperceptible dual watermarking for telemedicine applications. Wirel Pers Commun 80(4):1415\u20131433","journal-title":"Wirel Pers Commun"},{"key":"11956_CR160","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1016\/j.future.2016.11.023","volume":"86","author":"AK Singh","year":"2018","unstructured":"Singh AK, Kumar B, Singh SK, Ghrera SP, Mohan A (2018) Multiple watermarking technique for securing online social network contents using Backpropagation neural network. Futur Gener Comput Syst 86:926\u2013939","journal-title":"Futur Gener Comput Syst"},{"key":"11956_CR161","first-page":"511","volume":"2016","author":"A Singh","year":"2016","unstructured":"Singh A, Raghuvanshi N, Dutta MK, Burget R, Masek J (2016) An SVD based zero watermarking scheme for authentication of medical images for telemedicine applications. 2016 39th Int Conf Telecommun Signal Process TSP 2016:511\u2013514","journal-title":"2016 39th Int Conf Telecommun Signal Process TSP"},{"key":"11956_CR162","doi-asserted-by":"publisher","first-page":"15901","DOI":"10.1007\/s11042-018-6407-5","volume":"79","author":"L Singh","year":"2020","unstructured":"Singh L, Singh AK, Singh PK (2020) Secure data hiding techniques: a survey. Multimed Tools Appl 79:15901\u201315921","journal-title":"Multimed Tools Appl"},{"key":"11956_CR163","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-319-57699-2_6","volume-title":"Medical image watermarking","author":"AK Singh","year":"2017","unstructured":"Singh AK, Kumar B, Singh G, Mohan A (2017) Secure spread Spectrum based multiple watermarking technique for medical images. In: Medical image watermarking. Springer, Cham, pp 125\u2013157"},{"key":"11956_CR164","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/978-3-319-63639-9_20","volume-title":"Quantum computing: an environment for intelligent large scale real application","author":"S Singh","year":"2018","unstructured":"Singh S, Singh R, Singh AK, Siddiqui TJ (2018) SVD-DCT based medical image watermarking in NSCT domain. In: Quantum computing: an environment for intelligent large scale real application. Springer, Cham, pp 467\u2013488"},{"key":"11956_CR165","first-page":"1","volume-title":"7th IEEE consumer communications and networking conference","author":"C Song","year":"2010","unstructured":"Song C, Sudirman S, Merabti M, Llewellyn-Jones D (2010) Analysis of digital image watermark attacks. In: 7th IEEE consumer communications and networking conference, pp 1\u20135"},{"issue":"12","key":"11956_CR166","doi-asserted-by":"publisher","first-page":"7893","DOI":"10.1007\/s13369-018-3246-7","volume":"43","author":"A Soualmi","year":"2018","unstructured":"Soualmi A, Alti A, Laouamer L (2018) A new blind medical image watermarking based on weber descriptors and Arnold chaotic map. Arab J Sci Eng (Springer Sci Bus Media BV) 43(12):7893\u20137905","journal-title":"Arab J Sci Eng (Springer Sci Bus Media BV)"},{"issue":"2","key":"11956_CR167","doi-asserted-by":"publisher","first-page":"2279","DOI":"10.1007\/s11042-020-09614-x","volume":"80","author":"A Soualmi","year":"2021","unstructured":"Soualmi A, Alti A, Laouamer L (2021) A novel blind watermarking approach for medical image authentication using MinEigen value features. Multimed Tools Appl 80(2):2279\u20132293","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"11956_CR168","doi-asserted-by":"publisher","first-page":"501","DOI":"10.3390\/e22050501","volume":"22","author":"B Stoyanov","year":"2020","unstructured":"Stoyanov B, Stoyanov B (2020) BOOST: medical image steganography using nuclear spin generator. Entropy 22(5):501","journal-title":"Entropy"},{"key":"11956_CR169","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.cosrev.2014.09.001","volume":"13\u201314","author":"MS Subhedar","year":"2014","unstructured":"Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 13\u201314:95\u2013113","journal-title":"Comput Sci Rev"},{"issue":"1","key":"11956_CR170","first-page":"1","volume":"5","author":"B Surekha","year":"2011","unstructured":"Surekha B, Swamy GN (2011) A spatial domain public image watermarking. Int J Secur Its Appl 5(1):1\u201312","journal-title":"Int J Secur Its Appl"},{"key":"11956_CR171","first-page":"11065","volume-title":"A survey on the new development of medical image security algorithms","author":"Y Tan","year":"2018","unstructured":"Tan Y, Qin J, Tan L, Tang H, Xiang X (2018) A survey on the new development of medical image security algorithms. Springer International Publishing, p 11065 LNCS"},{"key":"11956_CR172","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1007\/978-3-030-00012-7_42","volume-title":"International conference on cloud computing and security","author":"Y Tan","year":"2018","unstructured":"Tan Y, Qin J, Tan L, Tang H, Xiang X (2018) A survey on the new development of medical image security algorithms. In: International conference on cloud computing and security, pp 458\u2013467"},{"key":"11956_CR173","doi-asserted-by":"publisher","first-page":"3669","DOI":"10.1007\/s11042-016-3928-7","volume":"76","author":"FN Thakkar","year":"2017","unstructured":"Thakkar FN, Srivastava VK (2017) A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimed Tools Appl 76:3669\u20133697","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"11956_CR174","doi-asserted-by":"publisher","first-page":"3457","DOI":"10.1007\/s11042-018-6263-3","volume":"78","author":"S Thakur","year":"2019","unstructured":"Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for telehealth applications. Multimed Tools Appl 78(3):3457\u20133470","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"11956_CR175","doi-asserted-by":"publisher","first-page":"4263","DOI":"10.1007\/s11042-018-6691-0","volume":"79","author":"S Thakur","year":"2020","unstructured":"Thakur S, Singh AK, Ghrera SP, Mohan A (2020) Chaotic based secure watermarking approach for medical images. Multimed Tools Appl 79(7):4263\u20134276","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"11956_CR176","doi-asserted-by":"publisher","first-page":"4307","DOI":"10.1007\/s11042-020-09941-z","volume":"80","author":"R Thanki","year":"2020","unstructured":"Thanki R, Kothari A (2020) Multi-level security of medical images based on encryption and watermarking for telemedicine applications. Multimed Tools Appl 80(3):4307\u20134325","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"11956_CR177","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1080\/13682199.2017.1367129","volume":"65","author":"R Thanki","year":"2017","unstructured":"Thanki R et al (2017) A steganographic approach for secure communication of medical images based on the DCT-SVD and the compressed sensing (CS) theory. Imaging Sci J 65(8):457\u2013467","journal-title":"Imaging Sci J"},{"issue":"4","key":"11956_CR178","first-page":"1366","volume":"20","author":"R Thanki","year":"2017","unstructured":"Thanki R et al (2017) An efficient medical image watermarking scheme based on FDCuT\u2013DCT. Eng Sci Technol Int J 20(4):1366\u20131379","journal-title":"Eng Sci Technol Int J"},{"key":"11956_CR179","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1016\/j.ins.2006.05.002","volume":"177","author":"HH Tsai","year":"2007","unstructured":"Tsai HH, Sun DW (2007) Color image watermark extraction based on support vector machines. Inf Sci (NY) 177:550\u2013569","journal-title":"Inf Sci (NY)"},{"key":"11956_CR180","doi-asserted-by":"crossref","unstructured":"Ud Din S, Jan Z, Sajjad M, Hussain M, Ali R, Ali A, Lee S (2020) Secure exchange of medical data using a novel real-time biometric-based protection and recognition method. Electronics 9(12):2013","DOI":"10.3390\/electronics9122013"},{"key":"11956_CR181","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1007\/s10278-017-9961-x","volume":"30","author":"G Ulutas","year":"2017","unstructured":"Ulutas G, Ustubioglu A, Ustubioglu B, Nabiyev VV, Ulutas M (2017) Medical image tamper detection based on passive image authentication. J Digit Imaging 30:695\u2013709","journal-title":"J Digit Imaging"},{"key":"11956_CR182","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/s11042-015-3035-1","volume":"76","author":"S Uma Maheswari","year":"2017","unstructured":"Uma Maheswari S, Jude Hemanth D (2017) Performance enhanced image steganography systems using transforms and optimization techniques. Multimed Tools Appl 76:415\u2013436","journal-title":"Multimed Tools Appl"},{"key":"11956_CR183","volume-title":"International conference on information technology: coding and computing, 2004. Proceedings. ITCC","author":"S Venkatraman","year":"2004","unstructured":"Venkatraman S, Abraham A, Paprzycki M (2004) Significance of steganography on data security. In: Abraham A, Paprzycki M (eds) International conference on information technology: coding and computing, 2004. Proceedings. ITCC, vol 2. IEEE"},{"key":"11956_CR184","first-page":"1","volume":"6","author":"CH Venugopal Reddy","year":"2015","unstructured":"Venugopal Reddy CH, Siddaiah P (2015) Hybrid LWT-SVD watermarking optimized using metaheuristic algorithms along with encryption for medical image security. Signal Image Process 6:1\u201395","journal-title":"Signal Image Process"},{"key":"11956_CR185","first-page":"34","volume-title":"2nd international conference on secure cyber computing and communications (ICSCCC)","author":"A Vijayakumar","year":"2021","unstructured":"Vijayakumar A, Sivaraman R, Avila J (2021) Cellular automata governed confidentiality preservation of medical image on reconfigurable Hardware. In: 2nd international conference on secure cyber computing and communications (ICSCCC), pp 34\u201338"},{"issue":"4","key":"11956_CR186","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13(4):600\u2013612","journal-title":"IEEE Trans Image Process"},{"key":"11956_CR187","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.optlaseng.2014.12.025","volume":"68","author":"XY Wang","year":"2015","unstructured":"Wang XY, Gu SX, Zhang YQ (2015) Novel image encryption algorithm based on cycle shift and chaotic system. Opt Lasers Eng 68:126\u2013134","journal-title":"Opt Lasers Eng"},{"key":"11956_CR188","doi-asserted-by":"publisher","first-page":"182391","DOI":"10.1109\/ACCESS.2020.3004841","volume":"8","author":"R Wang","year":"2020","unstructured":"Wang R, Shaocheng H, Zhang P, Yue M, Cheng Z, Zhang Y (2020) A novel zero-watermarking scheme based on variable parameter chaotic mapping in NSPD-DCT domain. IEEE Access 8:182391\u2013182411","journal-title":"IEEE Access"},{"issue":"10","key":"11956_CR189","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/1022594.1022597","volume":"47","author":"H Wang","year":"2004","unstructured":"Wang H, Wang S (2004) Cyber warfare: steganography vs. steg analysis. Commun ACM 47(10):76\u201382","journal-title":"Commun ACM"},{"key":"11956_CR190","first-page":"490","volume-title":"Advanced intelligent computing theories and applications","author":"DSHY Gan","year":"2010","unstructured":"Gan DSHY, Gromiha PGMM (2010) Advanced intelligent computing theories and applications. Springer, Heidelberg, pp 490\u2013498"},{"key":"11956_CR191","doi-asserted-by":"publisher","first-page":"181698","DOI":"10.1109\/ACCESS.2020.3028077","volume":"8","author":"J-X Wu","year":"2020","unstructured":"Wu J-X et al (2020) Two-round symmetric cryptography for medical image Infosecurity against-hacker attacks in a picture archiving and communication system. IEEE Access 8:181698\u2013181711","journal-title":"IEEE Access"},{"key":"11956_CR192","doi-asserted-by":"crossref","unstructured":"Xie Y, Ning L, Wang M, Li C (2019) Image enhancement based on histogram equalization. In journal of physics: conference series (Vol. 1314, no. 1, p. 012161). IOP publishing","DOI":"10.1088\/1742-6596\/1314\/1\/012161"},{"key":"11956_CR193","first-page":"223","volume":"34","author":"S Xu","year":"2017","unstructured":"Xu S, Jiang S, Min W (2017) No-reference\/blind image quality assessment: a survey. IETE Tech Rev (Inst Electron Telecommun Eng India) 34:223\u2013245","journal-title":"IETE Tech Rev (Inst Electron Telecommun Eng India)"},{"key":"11956_CR194","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78597-4","volume-title":"Steganography techniques for digital images","author":"A Yahya","year":"2019","unstructured":"Yahya A (2019) Steganography techniques for digital images. Springer International Publishing"},{"key":"11956_CR195","doi-asserted-by":"publisher","first-page":"18043","DOI":"10.1007\/s11042-017-4444-0","volume":"77","author":"Y Yang","year":"2018","unstructured":"Yang Y, Zhang W, Liang D, Yu N (2018) An ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images. Multimed Tools Appl 77:18043\u201318065","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"11956_CR196","first-page":"419","volume":"22","author":"S Yin","year":"2020","unstructured":"Yin S, Liu J, Teng L (2020) Improved elliptic curve cryptography with homomorphic encryption for medical image encryption. Int J Netw Security 22(3):419\u2013424","journal-title":"Int J Netw Security"},{"key":"11956_CR197","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.aeue.2013.08.007","volume":"68","author":"Q Zhang","year":"2014","unstructured":"Zhang Q, Liu L, Wei X (2014) Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps. AEU Int J Electron Commun 68:186\u2013192","journal-title":"AEU Int J Electron Commun"},{"issue":"8","key":"11956_CR198","doi-asserted-by":"publisher","first-page":"2750","DOI":"10.1109\/TCSVT.2019.2923980","volume":"30","author":"Y Zhang","year":"2019","unstructured":"Zhang Y et al (2019) Multiple robustness enhancements for image adaptive steganography in lossy channels. IEEE Trans Circuits Syst Video Technol 30(8):2750\u20132764","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"08","key":"11956_CR199","doi-asserted-by":"publisher","first-page":"1473","DOI":"10.1142\/S0218001404003824","volume":"18","author":"WB Zhao","year":"2004","unstructured":"Zhao WB, Huang DS, Du JY, Wang LM (2004) Genetic optimization of radial basis probabilistic neural networks. Int J Pattern Recognit Artif Intell 18(08):1473\u20131499","journal-title":"Int J Pattern Recognit Artif Intell"},{"key":"11956_CR200","first-page":"3633","volume-title":"Proc IEEE Comput Soc Conf Comput Vis pattern Recognit","author":"B Zheng","year":"2020","unstructured":"Zheng B, Yuan S, Slabaugh G, Leonardis A (2020) Image denoising with learnable bandpass filters. In: Proc IEEE Comput Soc Conf Comput Vis pattern Recognit, pp 3633\u20133642"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-11956-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-11956-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-11956-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,19]],"date-time":"2023-11-19T04:15:43Z","timestamp":1700367343000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-11956-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,22]]},"references-count":200,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["11956"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-11956-7","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,22]]},"assertion":[{"value":"29 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"<i>No fund available for this study.<\/i><i>The authors have declared that there are no competing interests exist.<\/i>","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics declarations"}}]}}