{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T22:50:36Z","timestamp":1775170236073,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T00:00:00Z","timestamp":1692144000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T00:00:00Z","timestamp":1692144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16446-y","type":"journal-article","created":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T05:01:48Z","timestamp":1692162108000},"page":"24919-24937","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["HIDEmarks: hiding multiple marks for robust medical data sharing using IWT-LSB"],"prefix":"10.1007","volume":"83","author":[{"given":"Om Prakash","family":"Singh","sequence":"first","affiliation":[]},{"given":"Kedar Nath","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Naman","family":"Baranwal","sequence":"additional","affiliation":[]},{"given":"Amrit Kumar","family":"Agrawal","sequence":"additional","affiliation":[]},{"given":"Amit Kumar","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Huiyu","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,16]]},"reference":[{"key":"16446_CR1","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.comcom.2022.02.023","volume":"188","author":"P Amrit","year":"2022","unstructured":"Amrit P, Singh AK (2022) Survey on watermarking methods in the artificial intelligence domain and beyond. Comput Commun 188:52\u201365","journal-title":"Comput Commun"},{"key":"16446_CR2","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.comcom.2020.01.038","volume":"152","author":"A Anand","year":"2020","unstructured":"Anand A, Singh AK (2020) An improved DWT-SVD domain watermarking for medical information security. Comput Commun 152:72\u201380","journal-title":"Comput Commun"},{"issue":"1","key":"16446_CR3","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1109\/TII.2022.3164732","volume":"19","author":"A Anand","year":"2022","unstructured":"Anand A, Singh AK (2022) A hybrid optimization-based medical data hiding scheme for industrial internet of things security. IEEE Trans Industr Inf 19(1):1051\u20131058","journal-title":"IEEE Trans Industr Inf"},{"issue":"8","key":"16446_CR4","first-page":"5856","volume":"34","author":"M Begum","year":"2022","unstructured":"Begum M, Ferdush J, Uddin MS (2022) A hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition. J King Saud Univ-Comput Inf Sci 34(8):5856\u20135867","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"16446_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijleo.2022.169319","volume":"262","author":"H Cao","year":"2022","unstructured":"Cao H, Hu F, Sun Y, Chen S, Su Q (2022) Robust and reversible color image watermarking based on DFT in the spatial domain. Optik 262:1\u201317","journal-title":"Optik"},{"key":"16446_CR6","first-page":"1","volume":"131","author":"KJ Devi","year":"2022","unstructured":"Devi KJ, Singh P, Thakkar HK, Kumar N (2022) Robust and secured watermarking using ja-fi optimization for digital image transmission in social media. Appl Soft Comput 131:1\u201317","journal-title":"Appl Soft Comput"},{"issue":"2","key":"16446_CR7","doi-asserted-by":"publisher","first-page":"2471","DOI":"10.1016\/j.aej.2020.12.050","volume":"60","author":"A Elhadad","year":"2021","unstructured":"Elhadad A, Ghareeb A, Abbas S (2021) A blind and high-capacity data hiding of DICOM medical images based on fuzzification concepts. Alex Eng J 60(2):2471\u20132482","journal-title":"Alex Eng J"},{"key":"16446_CR8","first-page":"103126","volume":"65","author":"KS Hsieh","year":"2022","unstructured":"Hsieh KS, Wang CM (2022) Constructive image steganography using example-based weighted color transfer. J Inf Secur Appl 65:103126","journal-title":"J Inf Secur Appl"},{"issue":"7","key":"16446_CR9","doi-asserted-by":"publisher","first-page":"5108","DOI":"10.1109\/TII.2020.3028612","volume":"17","author":"A Kamili","year":"2020","unstructured":"Kamili A, Hurrah NN, Parah SA, Bhat GM, Muhammad K (2020) DWFCAT: dual watermarking framework for industrial image authentication and tamper localization. IEEE Trans Industr Inf 17(7):5108\u20135117","journal-title":"IEEE Trans Industr Inf"},{"issue":"5","key":"16446_CR10","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1109\/TCSVT.2016.2633878","volume":"28","author":"XL Liu","year":"2016","unstructured":"Liu XL, Lin CC, Yuan SM (2016) Blind dual watermarking for color images\u2019 authentication and copyright protection. IEEE Trans Circ Syst Vid Technol 28(5):1047\u20131055","journal-title":"IEEE Trans Circ Syst Vid Technol"},{"key":"16446_CR11","doi-asserted-by":"crossref","unstructured":"Liu Y, Zhang D, Zhang Q, Han J (2021) Part-object relational visual saliency. IEEE Trans Pattern Anal Mach Intell:1\u201310","DOI":"10.1109\/TPAMI.2021.3053577"},{"issue":"2","key":"16446_CR12","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/TCE.2022.3217974","volume":"69","author":"S Mehraj","year":"2022","unstructured":"Mehraj S, Mushtaq S, Parah SA, Giri KJ, Sheikh JA, Gandomi AH, Hijji M, Gupta BB, Muhammad K (2022) RBWCI: robust and blind watermarking framework for cultural images. IEEE Trans Consum Electron 69(2):128\u2013139","journal-title":"IEEE Trans Consum Electron"},{"key":"16446_CR13","doi-asserted-by":"publisher","first-page":"104490","DOI":"10.1016\/j.micpro.2022.104490","volume":"90","author":"MS Moad","year":"2022","unstructured":"Moad MS, Kafi MR, Khaldi A (2022) A wavelet based medical image watermarking scheme for secure transmission in telemedicine applications. Microprocess Microsyst 90:104490","journal-title":"Microprocess Microsyst"},{"key":"16446_CR14","unstructured":"Nanashi (2022) Super resolution benchmarks. In: Kaggle. https:\/\/www.kaggle.com\/datasets\/jesucristo\/super-resolution-benchmarks. Accessed 8 Jul 2023"},{"key":"16446_CR15","doi-asserted-by":"crossref","unstructured":"Shao Z, Han J, Marnerides D, Debattista K (2022) Region-object relation-aware dense captioning via transformer. IEEE Trans Neural Netw Learn Syst:1\u201312","DOI":"10.1109\/TNNLS.2022.3152990"},{"issue":"4","key":"16446_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00138-021-01227-0","volume":"32","author":"OP Singh","year":"2021","unstructured":"Singh OP, Singh AK (2021) A robust information hiding algorithm based on lossless encryption and NSCT-HD-SVD. Mach Vis Appl 32(4):1\u201313","journal-title":"Mach Vis Appl"},{"key":"16446_CR17","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-981-19-0840-8_12","volume-title":"Advanced machine intelligence and signal processing","author":"OP Singh","year":"2022","unstructured":"Singh OP, Singh AK (2022) Image fusion-based watermarking in IWT-SVD domain. In: Advanced machine intelligence and signal processing. Springer, Singapore, 163\u2013175"},{"key":"16446_CR18","doi-asserted-by":"publisher","first-page":"30367","DOI":"10.1007\/s11042-020-09606-x","volume":"80","author":"OP Singh","year":"2020","unstructured":"Singh OP, Singh AK, Srivastava G, Kumar N (2020) Image watermarking using soft computing techniques: a comprehensive survey. Multimed Tools Appl 80:30367\u201330398","journal-title":"Multimed Tools Appl"},{"key":"16446_CR19","doi-asserted-by":"crossref","unstructured":"Singh KN, Singh OP, Singh AK, Agrawal AK (2022) Watmif: multimodal medical image fusion-based watermarking for telehealth applications. Cogn Comput:1\u201317","DOI":"10.1007\/s12559-022-10040-4"},{"key":"16446_CR20","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1016\/j.comcom.2022.05.010","volume":"191","author":"OP Singh","year":"2022","unstructured":"Singh OP, Singh AK, Agrawal AK, Zhou H (2022) SecDH: security of covid-19 images based on data hiding with PCA. Comput Commun 191:368\u2013377","journal-title":"Comput Commun"},{"key":"16446_CR21","doi-asserted-by":"publisher","first-page":"14045","DOI":"10.1007\/s11042-022-12082-0","volume":"81","author":"R Sinhal","year":"2022","unstructured":"Sinhal R, Sharma S, Ansari IA, Bajaj V (2022) Multipurpose medical image watermarking for effective security solutions. Multimed Tools Appl 81:14045\u201314063","journal-title":"Multimed Tools Appl"},{"key":"16446_CR22","doi-asserted-by":"publisher","first-page":"4358","DOI":"10.1109\/ACCESS.2018.2888857","volume":"7","author":"Q Su","year":"2018","unstructured":"Su Q, Yuan Z, Liu D (2018) An approximate Schur decomposition-based spatial domain color image watermarking method. IEEE Access 7:4358\u20134370","journal-title":"IEEE Access"},{"issue":"3","key":"16446_CR23","doi-asserted-by":"publisher","first-page":"384","DOI":"10.4103\/0970-1591.56208","volume":"25","author":"J Thomas","year":"2009","unstructured":"Thomas J (2009) Medical records and issues in negligence. Indian J Urol IJU: J Urol Soc India 25(3):384\u2013388","journal-title":"Indian J Urol IJU: J Urol Soc India"},{"issue":"1","key":"16446_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/sdata.2018.161","volume":"5","author":"P Tschandl","year":"2018","unstructured":"Tschandl P, Rosendahl C, Kittler H (2018) The HAM10000 dataset, a large collection of multi-source dermatoscopic images of common pigmented skin lesions. Sci Data 5(1):1\u20139","journal-title":"Sci Data"},{"key":"16446_CR25","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1007\/s00371-022-02406-4","volume":"39","author":"SP Vaidya","year":"2022","unstructured":"Vaidya SP (2022) Fingerprint-based robust medical image watermarking in hybrid transform. Vis Comput 39:2245\u20132260","journal-title":"Vis Comput"},{"key":"16446_CR26","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.neucom.2022.02.083","volume":"488","author":"W Wan","year":"2022","unstructured":"Wan W, Wang J, Zhang Y, Li J, Yu H, Sun J (2022) A comprehensive survey on robust image watermarking. Neurocomputing 488:226\u2013247","journal-title":"Neurocomputing"},{"key":"16446_CR27","doi-asserted-by":"publisher","first-page":"37895","DOI":"10.1007\/s11042-022-13064-y","volume":"81","author":"H Wang","year":"2022","unstructured":"Wang H, Su Q (2022) A color image watermarking method combined QR decomposition and spatial domain. Multimed Tools Appl 81:37895\u201337916","journal-title":"Multimed Tools Appl"},{"key":"16446_CR28","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.ins.2020.05.034","volume":"535","author":"XY Wang","year":"2020","unstructured":"Wang XY, Wen TT, Shen X, Niu PP, Yang HY (2020) A new watermark decoder in DNST domain using singular values and gaussian-cauchy mixture-based vector HMT. Inf Sci 535:81\u2013106","journal-title":"Inf Sci"},{"issue":"4","key":"16446_CR29","doi-asserted-by":"publisher","first-page":"2188","DOI":"10.1109\/TNSE.2022.3157867","volume":"9","author":"B Wang","year":"2022","unstructured":"Wang B, Jiawei S, Wang W, Zhao P (2022) Image copyright protection based on blockchain and zero-watermark. IEEE Trans Netw Sci Eng 9(4):2188\u20132199","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"16446_CR30","doi-asserted-by":"publisher","first-page":"105726","DOI":"10.1016\/j.compbiomed.2022.105726","volume":"147","author":"Z Wu","year":"2022","unstructured":"Wu Z, Xuan S, Xie J, Lin C, Lu C (2022) How to ensure the confidentiality of electronic medical records on the cloud: a technical perspective. Comput Biol Med 147:105726","journal-title":"Comput Biol Med"},{"issue":"1","key":"16446_CR31","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s10489-021-02476-2","volume":"52","author":"Z Xia","year":"2022","unstructured":"Xia Z, Wang X, Wang C, Wang C, Ma B, Li Q, Wang M, Zhao T (2022) A robust zero-watermarking algorithm for lossless copyright protection of medical images. Appl Intell 52(1):607\u2013621","journal-title":"Appl Intell"},{"issue":"1","key":"16446_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-021-91920-x","volume":"11","author":"G Xin","year":"2021","unstructured":"Xin G, Fan P (2021) A lossless compression method for multi-component medical images based on big data mining. Sci Rep 11(1):1\u201311","journal-title":"Sci Rep"},{"issue":"4","key":"16446_CR33","doi-asserted-by":"publisher","first-page":"1860","DOI":"10.1109\/TCSVT.2021.3084676","volume":"32","author":"Y Yang","year":"2021","unstructured":"Yang Y, Zou T, Huang G, Zhang W (2021) A high visual quality color image reversible data hiding scheme based on BRG embedding principle and CIEDE2000 assessment metric. IEEE Trans Circ Syst Vid Technol 32(4):1860\u20131874","journal-title":"IEEE Trans Circ Syst Vid Technol"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16446-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16446-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16446-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T13:42:07Z","timestamp":1708609327000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16446-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,16]]},"references-count":33,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["16446"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16446-y","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,16]]},"assertion":[{"value":"22 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors of this manuscript declare no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}