{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T22:50:23Z","timestamp":1770418223255,"version":"3.49.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"27","license":[{"start":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T00:00:00Z","timestamp":1651190400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T00:00:00Z","timestamp":1651190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s11042-022-12192-9","type":"journal-article","created":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T08:04:31Z","timestamp":1651219471000},"page":"39577-39603","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Image-based decision making for reliable and proper diagnosing in NIFTI format using watermarking"],"prefix":"10.1007","volume":"81","author":[{"given":"Kamred Udham","family":"Singh","sequence":"first","affiliation":[]},{"given":"Akshay","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Teekam","family":"Singh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8221-092X","authenticated-orcid":false,"given":"Mangey","family":"Ram","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,29]]},"reference":[{"issue":"4","key":"12192_CR1","doi-asserted-by":"publisher","first-page":"2578","DOI":"10.1109\/TVT.2007.913179","volume":"57","author":"CJ AHN","year":"2008","unstructured":"AHN CJ (2008) Parallel detection algorithm using multiple QR decompositions with permuted channel matrix for SDM\/OFDM. IEEE Trans Veh Technol 57(4):2578\u20132582","journal-title":"IEEE Trans Veh Technol"},{"key":"12192_CR2","doi-asserted-by":"crossref","unstructured":"Alshanbari HS (2020) Medical image watermarking for ownership & tamper detection. Multimed Tools Appl:1\u201316","DOI":"10.1007\/s11042-020-08814-9"},{"key":"12192_CR3","doi-asserted-by":"crossref","unstructured":"Awasthi Y, Sharma A, Pandey R (2019) Image watermarking using APDCBT in selected pixel blocks. In: 2019 8th international conference system modeling and advancement in research trends (SMART). IEEE. pp. 250-255","DOI":"10.1109\/SMART46866.2019.9117522"},{"key":"12192_CR4","unstructured":"Balasamy K, Suganyadevi S (2020) A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD. Multimedia tools and applications, 1-20."},{"issue":"24","key":"12192_CR5","doi-asserted-by":"publisher","first-page":"4909","DOI":"10.1016\/j.ins.2010.08.039","volume":"180","author":"R Chamlawi","year":"2010","unstructured":"Chamlawi R, Khan A (2010) Digital image authentication and recovery: employing integer transform based information embedding and extraction. Inf Sci 180(24):4909\u20134928","journal-title":"Inf Sci"},{"key":"12192_CR6","unstructured":"Darwish SM, Hassan OF (2020) A new colour image copyright protection approach using evolution-based dual watermarking. J Exp Theor Artif Intell:1\u201323"},{"issue":"3","key":"12192_CR7","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/BF02476026","volume":"4","author":"I Daubechies","year":"1998","unstructured":"Daubechies I, Sweldens W (1998) Factoring wavelet transforms into lifting steps. J Fourier Anal Appl 4(3):247\u2013269","journal-title":"J Fourier Anal Appl"},{"key":"12192_CR8","doi-asserted-by":"publisher","first-page":"45474","DOI":"10.1109\/ACCESS.2021.3067245","volume":"9","author":"F Ernawan","year":"2021","unstructured":"Ernawan F, Ariatmanto D, Firdaus A (2021) An improved image watermarking by modifying selected DWT-DCT coefficients. IEEE Access 9:45474\u201345485","journal-title":"IEEE Access"},{"key":"12192_CR9","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1007\/11596981_122","volume-title":"Computational Intelligence and Security","author":"W Fan","year":"2005","unstructured":"Fan W, Chen J, Zhen J (2005) Spiht algorithm based on fast lifting wavelet transform in image compression. In: Hao Y, Liu J, Wang Y-P, Cheung Y-m, Yin H, Jiao L, Ma J, Jiao Y-C (eds) Computational Intelligence and Security. Springer, Berlin, Heidelberg, pp 838\u2013844. https:\/\/doi.org\/10.1007\/11596981_122"},{"issue":"2","key":"12192_CR10","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.ijleo.2015.09.205","volume":"127","author":"S Fazli","year":"2016","unstructured":"Fazli S, Moeini M (2016) A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks. Optik - Int J Light Electron Optics 127(2):964\u2013972 ISSN 0030-4026","journal-title":"Optik - Int J Light Electron Optics"},{"key":"12192_CR11","doi-asserted-by":"crossref","unstructured":"Gao T-G, Gu Q-L (2007) Reversible watermarking algorithm based on wavelet lifting scheme,\" 2007 international conference on wavelet analysis and pattern recognition, Beijing, pp. 1771-1775.","DOI":"10.1109\/ICWAPR.2007.4421740"},{"key":"12192_CR12","first-page":"1499","volume":"41","author":"P Garg","year":"2020","unstructured":"Garg P, Kishore RR (2020) Optimized color image watermarking through watermark strength optimization using particle swarm optimization technique. J Inform Optim Sci 41:1499\u20131512","journal-title":"J Inform Optim Sci"},{"key":"12192_CR13","doi-asserted-by":"crossref","unstructured":"Goli MS, Naghsh A (2017) Introducing a new method robust against crop attack in digital image watermarking using two-step sudoku. In: 2017 3rd international conference on pattern recognition and image analysis (IPRIA). IEEE. pp. 237-242","DOI":"10.1109\/PRIA.2017.7983054"},{"key":"12192_CR14","doi-asserted-by":"crossref","unstructured":"Gong LH, Tian C, Zou WP, Zhou NR (2020). Robust and imperceptible watermarking scheme based on canny edge detection and SVD in the contourlet domain. Multimedia tools and applications, 1-23.","DOI":"10.1007\/s11042-020-09677-w"},{"key":"12192_CR15","doi-asserted-by":"crossref","unstructured":"Hsu LY, Hu HT, Chou HH (2019) A blind robust QR code watermarking approach based on DCT. In: 2019 4th international conference on control, robotics and cybernetics (CRC). IEEE. pp. 174-178","DOI":"10.1109\/CRC.2019.00043"},{"issue":"1","key":"12192_CR16","first-page":"205","volume":"41","author":"G Kaur","year":"2020","unstructured":"Kaur G, Agarwal R, Patidar V (2020) Crypto watermarking of images for secure transmission over cloud. J Inf Optim Sci 41(1):205\u2013216","journal-title":"J Inf Optim Sci"},{"issue":"2","key":"12192_CR17","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1080\/13682199.2020.1740431","volume":"68","author":"OH Khalil","year":"2020","unstructured":"Khalil OH, Elhadad A, Ghareeb A (2020) A blind proposed 3D mesh watermarking technique for copyright protection. Imag Sci J 68(2):90\u201399","journal-title":"Imag Sci J"},{"key":"12192_CR18","doi-asserted-by":"publisher","unstructured":"Lin N, Shen J, Guo X, Zhou J (2011) A robust image watermarking based on DWT-QR decomposition. 2011 IEEE 3rd International Conference on Communication Software and Networks, Xi'an, pp. 684\u2013688. https:\/\/doi.org\/10.1109\/ICCSN.2011.6014360","DOI":"10.1109\/ICCSN.2011.6014360"},{"key":"12192_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13681-8_46","volume-title":"Image and Signal Processing. ICISP 2010. Lecture notes in computer science","author":"K Loukhaoukha","year":"2010","unstructured":"Loukhaoukha K, Chouinard JY, Taieb MH (2010) Multi-Objective Genetic Algorithm Optimization for Image Watermarking Based on Singular Value Decomposition and Lifting Wavelet Transform. In: Elmoataz A, Lezoray O, Nouboud F, Mammass D, Meunier J (eds) Image and Signal Processing. ICISP 2010. Lecture notes in computer science, vol 6134. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-13681-8_46"},{"key":"12192_CR20","doi-asserted-by":"publisher","unstructured":"Ma J, Cheng G, Yixin W, Xingle A, Jiantao G, Ziqi Y, \u2026 He J. (2020) COVID-19 CT lung and infection segmentation dataset (version Verson 1.0) [data set]. Zenodo. https:\/\/doi.org\/10.5281\/zenodo.3757476","DOI":"10.5281\/zenodo.3757476"},{"key":"12192_CR21","doi-asserted-by":"publisher","first-page":"1708","DOI":"10.1016\/j.procs.2015.02.114","volume":"46","author":"S Malini","year":"2015","unstructured":"Malini S, Moni RS (2015) Image Denoising using multiresolution singular value decomposition transform. Procedia Comput Sci 46:1708\u20131715","journal-title":"Procedia Comput Sci"},{"key":"12192_CR22","doi-asserted-by":"publisher","first-page":"4129","DOI":"10.1007\/s11042-015-3084-5","volume":"75","author":"R Mehta","year":"2016","unstructured":"Mehta R, Rajpal N, Vishwakarma VP (2016) LWT- QR decomposition based robust and efficient image watermarking scheme using Lagrangian SVR. Multimed Tools Appl, ISSN 1380\u20137501 75:4129\u20134150","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"12192_CR23","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1080\/13682199.2020.1732116","volume":"68","author":"F Musanna","year":"2020","unstructured":"Musanna F, Dangwal D, Kumar S, Malik V (2020) A chaos-based image encryption algorithm based on multiresolution singular value decomposition and a symmetric attractor. Imag Sci J 68(1):24\u201340","journal-title":"Imag Sci J"},{"key":"12192_CR24","doi-asserted-by":"crossref","unstructured":"Ni R, Ruan Q, Liu J (2006, November) Tampering estimation watermarking based on lifting wavelet and chaotic sequence. In: 2006 8th international conference on signal processing (Vol. 4). IEEE","DOI":"10.1109\/ICOSP.2006.345985"},{"key":"12192_CR25","doi-asserted-by":"crossref","unstructured":"Ni R, Ruan Q, Liu J (2006) Tampering estimation watermarking based on lifting wavelet and chaotic sequence. 2006 8th international Conference on Signal Processing, Beijing, pp.","DOI":"10.1109\/ICOSP.2006.345985"},{"key":"12192_CR26","doi-asserted-by":"crossref","unstructured":"Rahim T, Khan S, Usman MA, Shin SY (2020) Exploiting de-noising convolutional neural networks DnCNNs for an efficient watermarking scheme: a case for information retrieval. IETE Tech Rev:1\u201311","DOI":"10.1080\/02564602.2020.1721342"},{"key":"12192_CR27","doi-asserted-by":"crossref","unstructured":"Siddharth S, Singh R, Siddiqui TJ (2016), \"MSVD Based Image Watermarking in NSCT Domain. In: 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), IEEE, pp. 685\u2013688, 2016","DOI":"10.1109\/PDGC.2016.7913209"},{"issue":"7","key":"12192_CR28","doi-asserted-by":"publisher","first-page":"1399","DOI":"10.1007\/s11760-012-0369-2","volume":"8","author":"T Sree Sharmila","year":"2014","unstructured":"Sree Sharmila T, Ramar K (Oct 2014) Efficient analysis of hybrid directional lifting technique for satellite image denoising. SIViP 8(7):1399\u20131404","journal-title":"SIViP"},{"issue":"1","key":"12192_CR29","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.sigpro.2013.06.025","volume":"94","author":"Q Su","year":"2014","unstructured":"Su Q, Niu Y, Wang G, Jia S, Yue J (2014a) Color image blind watermarking scheme based on QR decomposition. Signal Process 94(1):219\u2013235","journal-title":"Signal Process"},{"key":"12192_CR30","first-page":"1597","volume":"41","author":"Sunesh","year":"2020","unstructured":"Sunesh, Kishore RR, Saini A (2020) Optimized image watermarking with artificial neural networks and histogram shape. J Inform Optim Sci 41:1597\u20131613","journal-title":"J Inform Optim Sci"},{"key":"12192_CR31","doi-asserted-by":"crossref","unstructured":"Takore TT, Kumar PR, Devi GL (2016, March) A modified blind image watermarking scheme based on DWT, DCT and SVD domain using GA to optimize robustness. In: 2016 international conference on electrical, electronics, and optimization techniques (ICEEOT). IEEE. pp. 2725-2729","DOI":"10.1109\/ICEEOT.2016.7755190"},{"key":"12192_CR32","doi-asserted-by":"crossref","unstructured":"Thanki R, Kothari A (2020) Multi-level security of medical images based on encryption and watermarking for telemedicine applications. Multimedia tools and applications, 1-19.","DOI":"10.1007\/s11042-020-09941-z"},{"issue":"4","key":"12192_CR33","first-page":"1366","volume":"20","author":"R Thanki","year":"2017","unstructured":"Thanki R, Borra S, Dwivedi V, Borisagar K (2017) An efficient medical image watermarking scheme based on FDCuT\u2013DCT. Eng Sci Technol Int J 20(4):1366\u20131379","journal-title":"Eng Sci Technol Int J"},{"key":"12192_CR34","doi-asserted-by":"crossref","unstructured":"Tjokorda Agung BW, Adiwijaya, Permana FPFP (2012, July). Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and run length encoding (RLE) compression. In: 2012 IEEE international conference on communication, networks and satellite (ComNetSat). IEEE. pp. 167-171","DOI":"10.1109\/ComNetSat.2012.6380799"},{"key":"12192_CR35","doi-asserted-by":"crossref","unstructured":"Vinothini K, Mydhili S, Periyanayagi S, Sukanya G (2019) Dual watermarking in tele-radiology using DWT for data authentication and security. In: Proceedings of the 8th IEEE international conference on communication and signal processing, India, pp. 887\u2013891.","DOI":"10.1109\/ICCSP.2019.8697935"},{"key":"12192_CR36","unstructured":"Wang Z, Bovik AC (2002) A universal image quality index\u201d, IEEE Signal Processing Letters, XX"},{"key":"12192_CR37","doi-asserted-by":"crossref","unstructured":"Zairi M, Boujiha T, Abdelhaq O (2020, March) An algorithm for digital image watermarking using 2-level DWT, DCT and QR decomposition based on optimal blocks selection. In: Proceedings of the 3rd international conference on networking, information systems & security. pp. 1-4","DOI":"10.1145\/3386723.3387863"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12192-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-12192-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-12192-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T23:40:01Z","timestamp":1744155601000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-12192-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,29]]},"references-count":37,"journal-issue":{"issue":"27","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["12192"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-12192-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,29]]},"assertion":[{"value":"25 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 January 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}