{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:35:18Z","timestamp":1764333318811},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T00:00:00Z","timestamp":1689897600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T00:00:00Z","timestamp":1689897600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16203-1","type":"journal-article","created":{"date-parts":[[2023,7,21]],"date-time":"2023-07-21T04:02:19Z","timestamp":1689912139000},"page":"17183-17215","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Improved adaptive reversible watermarking in integer wavelet transform using moth-flame optimization"],"prefix":"10.1007","volume":"83","author":[{"given":"H. R.","family":"Lakshmi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Surekha","family":"Borra","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,7,21]]},"reference":[{"key":"16203_CR1","doi-asserted-by":"publisher","first-page":"8603","DOI":"10.1007\/s11042-018-7128-5","volume":"78","author":"N Agarwal","year":"2019","unstructured":"Agarwal N, Singh AK, Singh PK (2019) Survey of robust and imperceptible watermarking. Multimed Tools Appl 78:8603\u20138633. https:\/\/doi.org\/10.1007\/s11042-018-7128-5","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"16203_CR2","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1016\/j.jss.2011.11.005","volume":"85","author":"M Arsalan","year":"2012","unstructured":"Arsalan M, Malik SA, Khan A (2012) Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw 85(4):883\u2013894. https:\/\/doi.org\/10.1016\/j.jss.2011.11.005","journal-title":"J Syst Softw"},{"key":"16203_CR3","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.asoc.2016.11.044","volume":"51","author":"M Arsalan","year":"2017","unstructured":"Arsalan M, Qureshi AS, Khan A, Rajarajan M (2017) Protection of medical images and patient related information in healthcare: using an intelligent and reversible watermarking technique. Appl Soft Comput 51:168\u2013179. https:\/\/doi.org\/10.1016\/j.asoc.2016.11.044","journal-title":"Appl Soft Comput"},{"key":"16203_CR4","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1016\/j.measurement.2019.02.069","volume":"139","author":"S Arunkumar","year":"2019","unstructured":"Arunkumar S, Subramaniyaswamy V, Vijayakumar V, Chilamkurti N, Logesh R (2019) SVD-based robust image Steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139:426\u2013437. https:\/\/doi.org\/10.1016\/j.measurement.2019.02.069","journal-title":"Measurement"},{"issue":"3","key":"16203_CR5","doi-asserted-by":"publisher","first-page":"81","DOI":"10.9781\/ijimai.2018.01.001","volume":"5","author":"H Ayad","year":"2018","unstructured":"Ayad H, Khalil M (2018) QAM-DWT-SVD based Watermarking Scheme for Medical Images. Int J Interact Multimed Artif Intell 5(3):81\u201389. https:\/\/doi.org\/10.9781\/ijimai.2018.01.001","journal-title":"Int J Interact Multimed Artif Intell"},{"issue":"Suppl 2","key":"16203_CR6","doi-asserted-by":"publisher","first-page":"4431","DOI":"10.1007\/s10586-018-1991-8","volume":"22","author":"K Balasamy","year":"2019","unstructured":"Balasamy K, Ramakrishnan S (2019) An intelligent reversible watermarking system for authenticating medical images using Wavelet and PSO. Cluster Comput 22(Suppl 2):4431\u20134442. https:\/\/doi.org\/10.1007\/s10586-018-1991-8","journal-title":"Cluster Comput"},{"key":"16203_CR7","doi-asserted-by":"publisher","first-page":"8887","DOI":"10.5120\/IJCA2017913725","volume":"975","author":"HMK Bhuyan","year":"2017","unstructured":"Bhuyan HMK, Raihan MG (2017) A variance based approach (VBA) digital watermarking in frequency domain and comparative analysis using Walsh and Hadamard transform. Int J Comput Appl 975:8887. https:\/\/doi.org\/10.5120\/IJCA2017913725","journal-title":"Int J Comput Appl"},{"key":"16203_CR8","doi-asserted-by":"publisher","DOI":"10.1201\/9780429423291","author":"S Borra","year":"2018","unstructured":"Borra S, Thanki R, Dey N (2018) Digital image watermarking theoretical and computational advances. CRC Press, Florida. https:\/\/doi.org\/10.1201\/9780429423291","journal-title":"CRC Press, Florida"},{"key":"16203_CR9","doi-asserted-by":"publisher","unstructured":"Chatterjee S, Hore S, Dey N, Chakraborty S, Ashour AS (2017) Dengue Fever Classification Using Gene Expression Data: A PSO Based Artificial Neural Network Approach. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications. Advances in Intelligent Systems and Computing, vol 516. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-10-3156-4_34","DOI":"10.1007\/978-981-10-3156-4_34"},{"issue":"5","key":"16203_CR10","doi-asserted-by":"publisher","first-page":"19","DOI":"10.48550\/arXiv.1208.0803","volume":"36","author":"N Dey","year":"2011","unstructured":"Dey N, Roy AB, Dey S (2011) A novel approach of color image hiding using RGB color planes and DWT. Int J Comput Appl 36(5):19\u201324. https:\/\/doi.org\/10.48550\/arXiv.1208.0803","journal-title":"Int J Comput Appl"},{"issue":"3","key":"16203_CR11","doi-asserted-by":"publisher","first-page":"639","DOI":"10.21629\/JSEE.2018.03.21","volume":"29","author":"E Emad","year":"2018","unstructured":"Emad E, Safey A, Refaat A, Osama Z, Sayed E, Mohamed E (2018) A secure image steganography algorithm based on least significant bit and integer wavelet transform. J Syst Eng Electron 29(3):639\u2013649. https:\/\/doi.org\/10.21629\/JSEE.2018.03.21","journal-title":"J Syst Eng Electron"},{"key":"16203_CR12","doi-asserted-by":"publisher","first-page":"8075","DOI":"10.1007\/s11042-018-6596-y","volume":"78","author":"H Fang","year":"2019","unstructured":"Fang H, Zhou H, Ma Z, Zhang W, Yu N (2019) A robust image watermarking scheme in DCT domain based on adaptive texture direction quantization. Multimed Tools Appl 78:8075\u20138089. https:\/\/doi.org\/10.1007\/s11042-018-6596-y","journal-title":"Multimed Tools Appl"},{"key":"16203_CR13","doi-asserted-by":"publisher","unstructured":"Gao W, Yang L, Zhang X (2010) An improved Sobel edge detection. In proceedings of 2010 3rd IEEE International conference on computer science and information technology, Chengdu, China, pp 67\u201371. IEEE. https:\/\/doi.org\/10.1109\/ICCSIT.2010.5563693","DOI":"10.1109\/ICCSIT.2010.5563693"},{"key":"16203_CR14","doi-asserted-by":"publisher","first-page":"25889","DOI":"10.1007\/s11042-019-07767-y","volume":"78","author":"S Gujjunoori","year":"2019","unstructured":"Gujjunoori S, Oruganti M (2019) Difference expansion based reversible data embedding and edge detection. Multimed Tools Appl 78:25889\u201325917. https:\/\/doi.org\/10.1007\/s11042-019-07767-y","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"16203_CR15","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1016\/j.jvcir.2014.03.012","volume":"25","author":"J-M Guo","year":"2014","unstructured":"Guo J-M, Prasetyo H (2014) False-positive-free SVD-based image watermarking. J Vis Commun Image Represent 25(5):1149\u20131163. https:\/\/doi.org\/10.1016\/j.jvcir.2014.03.012","journal-title":"J Vis Commun Image Represent"},{"key":"16203_CR16","doi-asserted-by":"publisher","unstructured":"Heidari M, Karimi N, Samavi S (2016) A hybrid DCT-SVD based image watermarking algorithm. In 2016 24th Iranian Conference on Electrical Engineering (ICEE), Shiraz University, Iran, May 10 2016, p. 838\u2013843. https:\/\/doi.org\/10.1109\/IranianCEE.2016.7585636","DOI":"10.1109\/IranianCEE.2016.7585636"},{"issue":"9","key":"16203_CR17","doi-asserted-by":"publisher","first-page":"397","DOI":"10.3390\/sym10090397","volume":"10","author":"X Hou","year":"2018","unstructured":"Hou X, Min L, Yang H (2018) A reversible watermarking scheme for vector maps based on multilevel histogram modification. Symmetry 10(9):397. https:\/\/doi.org\/10.3390\/sym10090397","journal-title":"Symmetry"},{"issue":"4","key":"16203_CR18","doi-asserted-by":"publisher","first-page":"19","DOI":"10.4018\/IJACI.2017100102","volume":"8","author":"A Jain","year":"2017","unstructured":"Jain A, Bhatnagar V (2017) Concoction of ambient intelligence and big data for better patient ministration services. Int J Ambient Comput Intell (IJACI) 8(4):19\u201330. https:\/\/doi.org\/10.4018\/IJACI.2017100102","journal-title":"Int J Ambient Comput Intell (IJACI)"},{"issue":"2","key":"16203_CR19","doi-asserted-by":"publisher","first-page":"540","DOI":"10.26483\/ijarcs.v9i2.5747","volume":"9","author":"N Jimson","year":"2018","unstructured":"Jimson N, Hemachandran K (2018) DFT Based Digital Image Watermarking: A Survey. Int J Adv Res Comput Sci 9(2):540\u2013544. https:\/\/doi.org\/10.26483\/ijarcs.v9i2.5747","journal-title":"Int J Adv Res Comput Sci"},{"issue":"1","key":"16203_CR20","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1504\/IJICS.2020.104001","volume":"12","author":"AM Kapadia","year":"2020","unstructured":"Kapadia AM, Pandian N (2020) Reversible data hiding methods in integer wavelet transform. Int J Inf Comput Secur 12(1):70\u201389. https:\/\/doi.org\/10.1504\/IJICS.2020.104001","journal-title":"Int J Inf Comput Secur"},{"key":"16203_CR21","doi-asserted-by":"publisher","first-page":"30","DOI":"10.4018\/IJACI.2020040102","volume":"11","author":"P Kaur","year":"2020","unstructured":"Kaur P, Gupta S, Dhingra S, Sharma S, Arora A (2020) Towards content-dependent social media platform preference analysis. Int J Ambient Comput Intell (IJCAI) 11:30\u201347. https:\/\/doi.org\/10.4018\/IJACI.2020040102","journal-title":"Int J Ambient Comput Intell (IJCAI)"},{"key":"16203_CR22","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.ijinfomgt.2018.09.008","volume":"45","author":"JA Kaw","year":"2019","unstructured":"Kaw JA, Loan NA, Parah SA, Muhammad K, Sheikh JA, Bhat GM (2019) A reversible and secure patient information hiding system for IoT driven e-health. Int J Inf Manage 45:262\u2013275. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2018.09.008","journal-title":"Int J Inf Manage"},{"key":"16203_CR23","doi-asserted-by":"publisher","first-page":"4083","DOI":"10.1007\/s00500-017-2617-4","volume":"22","author":"B Kazemivash","year":"2018","unstructured":"Kazemivash B, Moghaddam ME (2018) A predictive model-based image watermarking scheme using Regression Tree and Firefly algorithm. Soft Comput 22:4083\u20134098. https:\/\/doi.org\/10.1007\/s00500-017-2617-4","journal-title":"Soft Comput"},{"issue":"6","key":"16203_CR24","first-page":"193","volume":"4","author":"R Kulkarni","year":"2021","unstructured":"Kulkarni R, Dinesh VS, Bhagya R, Bharathi R (2021) Difference expansion based reversible data hiding scheme for watermarking. Int J Res Eng Sci Manage 4(6):193\u2013195","journal-title":"Int J Res Eng Sci Manage"},{"issue":"4","key":"16203_CR25","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1007\/s10772-021-09818-y","volume":"24","author":"HR Lakshmi","year":"2021","unstructured":"Lakshmi HR, Borra S (2021) Difference expansion based reversible watermarking algorithms for copyright protection of images: state-of-the-art and challenges. Int J Speech Technol 24(4):823\u2013852. https:\/\/doi.org\/10.1007\/s10772-021-09818-y","journal-title":"Int J Speech Technol"},{"key":"16203_CR26","doi-asserted-by":"publisher","unstructured":"Li, Qi, Bin Yan, Hui Li, Jeng-Shyang Pan (2019) Reversible Watermarking Based on Adaptive Prediction Error Expansion. In: Pan, JS., Lin, JW., Sui, B., Tseng, SP. (eds) Genetic and Evolutionary Computing. ICGEC 2018. Advances in Intelligent Systems and Computing, vol 834. Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-13-5841-8_26","DOI":"10.1007\/978-981-13-5841-8_26"},{"key":"16203_CR27","doi-asserted-by":"publisher","unstructured":"Li Q, Yan B, Li H, Pan J-S (2019) Reversible Watermarking Based on Adaptive Prediction Error Expansion. In: Pan, JS., Lin, JW., Sui, B., Tseng, SP. (eds) Genetic and Evolutionary Computing. ICGEC 2018. Advances in Intelligent Systems and Computing, vol 834. Springer, Singapore, p 234\u2013251. https:\/\/doi.org\/10.1007\/978-981-13-5841-8_26","DOI":"10.1007\/978-981-13-5841-8_26"},{"issue":"8","key":"16203_CR28","doi-asserted-by":"publisher","first-page":"1234","DOI":"10.3390\/sym12081234","volume":"12","author":"Y Li","year":"2020","unstructured":"Li Y, Zhu X, Liu J (2020) An improved moth-flame optimization algorithm for engineering problems. Symmetry 12(8):1234. https:\/\/doi.org\/10.3390\/sym12081234","journal-title":"Symmetry"},{"key":"16203_CR29","doi-asserted-by":"publisher","first-page":"955","DOI":"10.1109\/JSTSP.2020.3002391","volume":"14","author":"X Liao","year":"2020","unstructured":"Liao X, Li K, Xinshan Zhu KJ, Liu R (2020) Robust detection of image operator chain with two-stream convolutional neural network. IEEE J Sel Top Signal Process 14:955\u2013968. https:\/\/doi.org\/10.1109\/JSTSP.2020.3002391","journal-title":"IEEE J Sel Top Signal Process"},{"issue":"2","key":"16203_CR30","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1109\/TDSC.2020.3004708","volume":"19","author":"X Liao","year":"2020","unstructured":"Liao X, Yin J, Chen M, Qin Z (2020) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Dependable Secure Comput 19(2):897\u2013911. https:\/\/doi.org\/10.1109\/TDSC.2020.3004708","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"3","key":"16203_CR31","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2019","unstructured":"Liao X, Yu Y, Li B, Li Z, Qin Z (2019) A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Vid Technol 30(3):685\u2013696. https:\/\/doi.org\/10.1109\/TCSVT.2019.2896270","journal-title":"IEEE Trans Circuits Syst Vid Technol"},{"key":"16203_CR32","doi-asserted-by":"publisher","first-page":"765","DOI":"10.3390\/sym11060765","volume":"11","author":"CC Lin","year":"2019","unstructured":"Lin CC, Chang CC, Wang ZM (2019) Reversible data hiding scheme using adaptive block truncation coding based on an edge-based quantization approach. Symmetry 11:765. https:\/\/doi.org\/10.3390\/sym11060765","journal-title":"Symmetry"},{"issue":"4","key":"16203_CR33","doi-asserted-by":"publisher","first-page":"1334","DOI":"10.1016\/j.dsp.2013.02.006","volume":"23","author":"K Loukhaoukha","year":"2013","unstructured":"Loukhaoukha K (2013) Comments on \u201cA digital watermarking scheme based on singular value decomposition and tiny genetic algorithm.\u201d Digital Signal Process 23(4):1334. https:\/\/doi.org\/10.1016\/j.dsp.2013.02.006","journal-title":"Digital Signal Process"},{"issue":"3","key":"16203_CR34","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/j.jesit.2016.12.011","volume":"4","author":"K Loukhaoukha","year":"2017","unstructured":"Loukhaoukha K, Rafaey A, Zebbiche K (2017) Ambiguity attacks on robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. J Electric Syst Inform Technol 4(3):359\u2013368. https:\/\/doi.org\/10.1016\/j.jesit.2016.12.011","journal-title":"J Electric Syst Inform Technol"},{"key":"16203_CR35","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.advengsoft.2015.12.006","volume":"93","author":"K Loukhaoukha","year":"2016","unstructured":"Loukhaoukha K, Refaey A, Zebbiche K (2016) Comment on \u201ca robust color image watermarking with singular value decomposition method.\u201d Adv Eng Softw 93:44\u201346. https:\/\/doi.org\/10.1016\/j.advengsoft.2015.12.006","journal-title":"Adv Eng Softw"},{"issue":"4","key":"16203_CR36","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1016\/j.ipm.2015.12.009","volume":"52","author":"K Loukhaoukha","year":"2016","unstructured":"Loukhaoukha K, Refaey A, Zebbiche K (2016) Comments on\" Homomorphic image watermarking with a singular value decomposition algorithm\". Inf Process Manag 52(4):644\u2013645. https:\/\/doi.org\/10.1016\/j.ipm.2015.12.009","journal-title":"Inf Process Manag"},{"issue":"3","key":"16203_CR37","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.12785\/amis\/090307","volume":"9","author":"K Loukhaoukha","year":"2015","unstructured":"Loukhaoukha K, Refaey A, Zebbiche K, Nabti M (2015) On the security of robust image watermarking algorithm based on discrete wavelet transform, discrete cosine transform and singular value decomposition. Appl Math Inf Sci 9(3):1159\u20131166. https:\/\/doi.org\/10.12785\/amis\/090307","journal-title":"Appl Math Inf Sci"},{"issue":"1","key":"16203_CR38","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1049\/iet-ipr.2014.0965","volume":"10","author":"N Makbol","year":"2016","unstructured":"Makbol N, Khoo B, Rassem T (2016) Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics. IET Image Proc 10(1):34\u201352. https:\/\/doi.org\/10.1049\/iet-ipr.2014.0965","journal-title":"IET Image Proc"},{"issue":"4","key":"16203_CR39","doi-asserted-by":"publisher","first-page":"3519","DOI":"10.11591\/ijece.v10i4.pp3519-3527","volume":"10","author":"FL Malallah","year":"2020","unstructured":"Malallah FL, Jafaar AA, Abbas NH, Saeed MG (2020) Reversible color video watermarking scheme based on hybrid of integer-to-integer wavelet transform and Arnold transform. Int J Electr Comput Eng 10(4):3519. https:\/\/doi.org\/10.11591\/ijece.v10i4.pp3519-3527","journal-title":"Int J Electr Comput Eng"},{"key":"16203_CR40","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.chemolab.2015.08.020","volume":"149","author":"F Marini","year":"2015","unstructured":"Marini F, Walczak B (2015) Particle swarm optimization (PSO) A tutorial. Chemometr Intell Lab Syst 149:153\u2013165. https:\/\/doi.org\/10.1016\/j.chemolab.2015.08.020","journal-title":"Chemometr Intell Lab Syst"},{"key":"16203_CR41","doi-asserted-by":"publisher","first-page":"101080","DOI":"10.1016\/j.jestch.2021.101080","volume":"34","author":"G Melendez-Melendez","year":"2022","unstructured":"Melendez-Melendez G, Cumplido R (2022) Reversible image authentication scheme with blind content reconstruction based on compressed sensing. Eng Sci Technol Int J. 34:101080. https:\/\/doi.org\/10.1016\/j.jestch.2021.101080","journal-title":"Eng Sci Technol Int J."},{"key":"16203_CR42","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1007\/s11042-020-09686-9","volume":"80","author":"L Meng","year":"2021","unstructured":"Meng L, Liu L, Tian G et al (2021) An adaptive reversible watermarking in IWT domain. Multimed Tools Appl 80:711\u2013735. https:\/\/doi.org\/10.1007\/s11042-020-09686-9","journal-title":"Multimed Tools Appl"},{"key":"16203_CR43","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.knosys.2015.07.006","volume":"89","author":"S Mirjalili","year":"2015","unstructured":"Mirjalili S (2015) Moth-flame optimization algorithm: a novel nature-inspired heuristic paradigm. Knowl Based Syst 89:228\u2013249. https:\/\/doi.org\/10.1016\/j.knosys.2015.07.006","journal-title":"Knowl Based Syst"},{"issue":"5","key":"16203_CR44","doi-asserted-by":"publisher","first-page":"e0176979","DOI":"10.1371\/journal.pone.0176979","volume":"12","author":"N Muhammad","year":"2017","unstructured":"Muhammad N, Bibi N, Mahmood Z, Akram T, Naqvi SR (2017) Reversible integer wavelet transform for blind image hiding method. PLoS One 12(5):e0176979. https:\/\/doi.org\/10.1371\/journal.pone.0176979","journal-title":"PLoS One"},{"key":"16203_CR45","doi-asserted-by":"publisher","first-page":"106257","DOI":"10.1016\/j.asoc.2020.106257","volume":"92","author":"PK Muhuri","year":"2020","unstructured":"Muhuri PK, Ashraf Z, Goel S (2020) A novel image steganographic method based on integer wavelet transformation and particle swarm optimization. Appl Soft Comput 92:106257. https:\/\/doi.org\/10.1016\/j.asoc.2020.106257","journal-title":"Appl Soft Comput"},{"key":"16203_CR46","doi-asserted-by":"publisher","unstructured":"Naskar R, Chakraborty RS (2011) Reversible Image Watermarking through Coordinate Logic Operation Based Prediction. In: Jajodia, S., Mazumdar, C. (eds) Information Systems Security. ICISS 2011. Lecture Notes in Computer Science, vol 7093. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-25560-1_13","DOI":"10.1007\/978-3-642-25560-1_13"},{"key":"16203_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/5514944","volume":"2021","author":"M Nazari","year":"2021","unstructured":"Nazari M, Maneshi A (2021) Chaotic reversible watermarking method based on IWT with tamper detection for transferring electronic health record. Secur Commun Netw 2021:1\u201315. https:\/\/doi.org\/10.1155\/2021\/5514944","journal-title":"Secur Commun Netw"},{"key":"16203_CR48","doi-asserted-by":"publisher","first-page":"8931","DOI":"10.1007\/s11042-020-10058-6","volume":"80","author":"Z Pakdaman","year":"2021","unstructured":"Pakdaman Z, Nezamabadi-pour H, Saryazdi S (2021) A new reversible data hiding in transform domain. Multimed Tools Appl 80:8931\u20138955. https:\/\/doi.org\/10.1007\/s11042-020-10058-6","journal-title":"Multimed Tools Appl"},{"key":"16203_CR49","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.jbi.2017.01.006","volume":"66","author":"SA Parah","year":"2017","unstructured":"Parah SA, Ahad F, Sheikh JA, Bhat GM (2017) Hiding clinical information in medical images: a new high capacity and reversible data hiding technique. J Biomed Inf 66:214\u2013230. https:\/\/doi.org\/10.1016\/j.jbi.2017.01.006","journal-title":"J Biomed Inf"},{"key":"16203_CR50","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1016\/j.future.2018.02.023","volume":"108","author":"SA Parah","year":"2020","unstructured":"Parah SA, Sheikh JA, Akhoon JA, Loan NA (2020) Electronic Health Record hiding in Images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication. Future Gener Comput Syst 108:935\u2013949. https:\/\/doi.org\/10.1016\/j.future.2018.02.023","journal-title":"Future Gener Comput Syst"},{"issue":"3","key":"16203_CR51","doi-asserted-by":"publisher","first-page":"46","DOI":"10.4018\/jaci.2012070104","volume":"4","author":"D Quinn","year":"2012","unstructured":"Quinn D, Chen L, Mulvenna M (2012) Social network analysis: a survey. Int J Ambient Comput Intell (IJACI) 4(3):46\u201358. https:\/\/doi.org\/10.4018\/jaci.2012070104","journal-title":"Int J Ambient Comput Intell (IJACI)"},{"key":"16203_CR52","doi-asserted-by":"publisher","unstructured":"Sangeetha N, Anita X, Vijayarajan R (2021) Medical Image Watermarking: A Review on Wavelet-Based Methods. In: E. Priya, V. Rajinikanth (eds) Signal and Image Processing Techniques for the Development of Intelligent Healthcare Systems, Springer, Singapore, pp 203\u2013221. https:\/\/doi.org\/10.1007\/978-981-15-6141-2_11","DOI":"10.1007\/978-981-15-6141-2_11"},{"issue":"3","key":"16203_CR53","doi-asserted-by":"publisher","first-page":"8","DOI":"10.4236\/jcc.2019.73002","volume":"7","author":"U Sara","year":"2019","unstructured":"Sara U, Akter M, Uddin MS (2019) Image quality assessment through FSIM, SSIM, MSE and PSNR\u2014a comparative study. J Comput Commun 7(3):8\u201318. https:\/\/doi.org\/10.4236\/jcc.2019.73002","journal-title":"J Comput Commun"},{"issue":"4","key":"16203_CR54","doi-asserted-by":"publisher","first-page":"60","DOI":"10.4018\/IJACI.2019100104","volume":"10","author":"S Sharma","year":"2019","unstructured":"Sharma S, Saini H (2019) Efficient solution for load balancing in fog computing utilizing artificial bee colony. Int J Ambient Comput Intell (IJACI) 10(4):60\u201377. https:\/\/doi.org\/10.4018\/IJACI.2019100104","journal-title":"Int J Ambient Comput Intell (IJACI)"},{"issue":"2","key":"16203_CR55","doi-asserted-by":"publisher","first-page":"e5108","DOI":"10.1002\/cpe.5108","volume":"33","author":"S Thakur","year":"2021","unstructured":"Thakur S, Singh AK, Ghrera SP (2021) NSCT domain\u2013based secure multiple-watermarking technique through lightweight encryption for medical images. Concurr Comput Pract Exper 33(2):e5108. https:\/\/doi.org\/10.1002\/cpe.5108","journal-title":"Concurr Comput Pract Exper"},{"key":"16203_CR56","doi-asserted-by":"publisher","unstructured":"Thanki, R., Borra, S., Dey, N., Ashour, A.S. (2018). Medical Imaging and Its Objective Quality Assessment: An Introduction. In: Dey, N., Ashour, A., Borra, S. (eds) Classification in BioApps. Lecture Notes in Computational Vision and Biomechanics, vol 26. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-65981-7_1","DOI":"10.1007\/978-3-319-65981-7_1"},{"key":"16203_CR57","doi-asserted-by":"publisher","first-page":"22269","DOI":"10.1007\/s11042-019-7529-0","volume":"78","author":"A Ustubioglu","year":"2019","unstructured":"Ustubioglu A, Ulutas G, Ustubioglu B (2019) IWT-MDE based reversible thermal image watermarking enhanced with secret sharing mechanism. Multimed Tools Appl 78:22269\u201322299. https:\/\/doi.org\/10.1007\/s11042-019-7529-0","journal-title":"Multimed Tools Appl"},{"key":"16203_CR58","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.image.2019.08.007","volume":"78","author":"X Wu","year":"2019","unstructured":"Wu X, Yang CN (2019) Invertible secret image sharing with steganography and authentication for AMBTC compressed images. Signal Process: Image Commu 78:437\u2013447. https:\/\/doi.org\/10.1016\/j.image.2019.08.007","journal-title":"Signal Process: Image Commu"},{"issue":"15","key":"16203_CR59","doi-asserted-by":"publisher","first-page":"3829","DOI":"10.1049\/iet-ipr.2019.1740","volume":"14","author":"Z Yuan","year":"2020","unstructured":"Yuan Z, Su Q, Liu D, Zhang X, Yao T (2020) Fast and robust image watermarking method in the spatial domain. IET Image Proc 14(15):3829\u20133838. https:\/\/doi.org\/10.1049\/iet-ipr.2019.1740","journal-title":"IET Image Proc"},{"issue":"3","key":"16203_CR60","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/TMM.2005.843357","volume":"7","author":"XP Zhang","year":"2005","unstructured":"Zhang XP, Li K (2005) Comments on \u201cAn SVD-based watermarking scheme for protecting rightful Ownership.\u201d IEEE Trans Multimed 7(3):593\u2013594. https:\/\/doi.org\/10.1109\/TMM.2005.843357","journal-title":"IEEE Trans Multimed"},{"key":"16203_CR61","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1007\/s13369-017-2898-z","volume":"43","author":"Z Zhang","year":"2018","unstructured":"Zhang Z, Wu L, Gao S et al (2018) Robust Reversible Watermarking Algorithm Based on RIWT and Compressed Sensing. Arab J Sci Eng 43:979\u2013992. https:\/\/doi.org\/10.1007\/s13369-017-2898-z","journal-title":"Arab J Sci Eng"},{"key":"16203_CR62","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/s11227-021-03886-2","volume":"78","author":"T Zhu","year":"2022","unstructured":"Zhu T, Qu W, Cao W (2022) An optimized image watermarking algorithm based on SVD and IWT. J Supercomput 78:222\u2013237. https:\/\/doi.org\/10.1007\/s11227-021-03886-2","journal-title":"J Supercomput"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16203-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16203-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16203-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T08:54:53Z","timestamp":1706691293000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16203-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,21]]},"references-count":62,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2024,2]]}},"alternative-id":["16203"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16203-1","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,21]]},"assertion":[{"value":"24 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}