{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T19:41:04Z","timestamp":1771962064190,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T00:00:00Z","timestamp":1693872000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T00:00:00Z","timestamp":1693872000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100013077","name":"National Science Foundation of China","doi-asserted-by":"publisher","award":["61976109, 62006108, 61601214, 61877007"],"award-info":[{"award-number":["61976109, 62006108, 61601214, 61877007"]}],"id":[{"id":"10.13039\/501100013077","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018617","name":"Liaoning Revitalization Talents Program","doi-asserted-by":"publisher","award":["XLYC2006005"],"award-info":[{"award-number":["XLYC2006005"]}],"id":[{"id":"10.13039\/501100018617","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007620","name":"Liaoning Provincial Education Department","doi-asserted-by":"crossref","award":["WQ2020014"],"award-info":[{"award-number":["WQ2020014"]}],"id":[{"id":"10.13039\/501100007620","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Scientific Research Project of Liaoning Province","award":["LJKZ0963"],"award-info":[{"award-number":["LJKZ0963"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-16679-x","type":"journal-article","created":{"date-parts":[[2023,9,5]],"date-time":"2023-09-05T07:01:47Z","timestamp":1693897307000},"page":"30319-30360","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A cross-embedding based medical image tamper detection and self-recovery watermarking scheme"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5029-7461","authenticated-orcid":false,"given":"Hui","family":"Shi","sequence":"first","affiliation":[]},{"given":"Kexun","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Jianing","family":"Geng","sequence":"additional","affiliation":[]},{"given":"Yonggong","family":"Ren","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,5]]},"reference":[{"issue":"7","key":"16679_CR1","doi-asserted-by":"publisher","first-page":"10039","DOI":"10.1007\/s11042-021-11840-w","volume":"82","author":"M AlShaikh","year":"2023","unstructured":"AlShaikh M (2023) A novel tamper detection watermarking approach for improving image integrity[J]. Multimed Tools Appl 82(7):10039\u201310060","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"16679_CR2","doi-asserted-by":"publisher","first-page":"16549","DOI":"10.1007\/s11042-020-08814-9","volume":"80","author":"HS Alshanbari","year":"2021","unstructured":"Alshanbari HS (2021) Medical image watermarking for ownership & tamper detection[J]. Multimed Tools Appl 80(11):16549\u201316564","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"16679_CR3","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1007\/s13042-015-0455-1","volume":"7","author":"IA Ansari","year":"2016","unstructured":"Ansari IA, Pant M, Ahn CW (2016) SVD based fragile watermarking scheme for tamper localization and self-recovery[J]. Int J Mach Learn Cybern 7(6):1225\u20131239","journal-title":"Int J Mach Learn Cybern"},{"key":"16679_CR4","doi-asserted-by":"publisher","first-page":"22149","DOI":"10.1007\/s11042-022-13350-9","volume":"82","author":"O Benrhouma","year":"2023","unstructured":"Benrhouma O (2023) Cryptanalysis and improvement of a semi-fragile watermarking technique for tamper detection and recovery[J]. Multimed Tools Appl 82:22149\u201322174","journal-title":"Multimed Tools Appl"},{"key":"16679_CR5","doi-asserted-by":"publisher","first-page":"115721","DOI":"10.1016\/j.eswa.2021.115721","volume":"186","author":"R Bhardwaj","year":"2021","unstructured":"Bhardwaj R, Aggarwal A (2021) An enhanced separable reversible and secure patient data hiding algorithm for telemedicine applications[J]. Expert Syst Appl 186:115721","journal-title":"Expert Syst Appl"},{"issue":"21\u201323","key":"16679_CR6","doi-asserted-by":"publisher","first-page":"31687","DOI":"10.1007\/s11042-021-10892-2","volume":"80","author":"R Bhardwaj","year":"2021","unstructured":"Bhardwaj R, Singh A (2021) An efficient reversible and secure patient data hiding algorithm for E-healthcare[J]. Multimed Tools Appl 80(21\u201323):31687\u201331703","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"16679_CR7","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1109\/TIFS.2018.2871749","volume":"14","author":"M Boroumand","year":"2019","unstructured":"Boroumand M, Chen M, Fridrich J (2019) Deep residual network for steganalysis of digital images[J]. IEEE Trans Inf Forensic Secur 14(5):1181\u20131193","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"16679_CR8","doi-asserted-by":"crossref","unstructured":"Chang CC, Chou YC, Kieu TD (2008) An information hiding scheme using sudoku. The 3rd International Conference on Innovative Computing Information and Control, vol 8, pp 10184692","DOI":"10.1109\/ICICIC.2008.149"},{"issue":"33\u201334","key":"16679_CR9","doi-asserted-by":"publisher","first-page":"24795","DOI":"10.1007\/s11042-020-09132-w","volume":"79","author":"C Chang","year":"2020","unstructured":"Chang C, Lin C, Su G (2020) An effective image self-recovery based fragile watermarking using self-adaptive weight-based compressed AMBTC[J]. Multimed Tools Appl 79(33\u201334):24795\u201324824","journal-title":"Multimed Tools Appl"},{"key":"16679_CR10","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1016\/j.jvcir.2018.12.023","volume":"58","author":"K Chen","year":"2019","unstructured":"Chen K, Chang C (2019) High-capacity reversible data hiding in encrypted images based on extended run-length coding and block-based MSB plane rearrangement[J]. J Vis Commun Image Represent 58:334\u2013344","journal-title":"J Vis Commun Image Represent"},{"key":"16679_CR11","first-page":"102702","volume":"58","author":"X Chen","year":"2021","unstructured":"Chen X, Hong C (2021) An efficient dual-image reversible data hiding scheme based on exploiting modification direction[J]. J Inf Secur Appl 58:102702","journal-title":"J Inf Secur Appl"},{"issue":"8","key":"16679_CR12","doi-asserted-by":"publisher","first-page":"3170","DOI":"10.3390\/e15083260","volume":"15","author":"Y Chen","year":"2013","unstructured":"Chen Y, Yau H, Yang G (2013) A maximum entropy-based chaotic time-variant fragile watermarking scheme for image tampering detection[J]. Entropy 15(8):3170\u20133185","journal-title":"Entropy"},{"issue":"15","key":"16679_CR13","doi-asserted-by":"publisher","first-page":"23359","DOI":"10.1007\/s11042-020-10210-2","volume":"80","author":"N Chidambaram","year":"2021","unstructured":"Chidambaram N, Raj P, Thenmozhi K et al (2021) A new method for producing 320-bit modified hash towards tamper detection and restoration in colour images[J]. Multimed Tools Appl 80(15):23359\u201323375","journal-title":"Multimed Tools Appl"},{"key":"16679_CR14","first-page":"102420","volume":"50","author":"P Chowdhuri","year":"2020","unstructured":"Chowdhuri P, Jana B (2020) Hiding data in dual color images reversibly via weighted matrix[J]. J Inf Secur Appl 50:102420","journal-title":"J Inf Secur Appl"},{"issue":"6","key":"16679_CR15","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1007\/s10278-013-9622-7","volume":"26","author":"K Clark","year":"2013","unstructured":"Clark K, Vendt B, Smith K et al (2013) The Cancer imaging archive (TCIA): maintaining and operating a public information repository[J]. J Digit Imaging 26(6):1045\u20131057","journal-title":"J Digit Imaging"},{"issue":"8","key":"16679_CR16","doi-asserted-by":"publisher","first-page":"11753","DOI":"10.1007\/s11042-022-13585-6","volume":"82","author":"S De","year":"2023","unstructured":"De S, Bhaumik J, Giri D et al (2023) A new robust and fragile scheme based on chaotic maps and dwt for medical image security[J]. Multimed Tools Appl 82(8):11753\u201311792","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"16679_CR17","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1109\/TCOM.1979.1094560","volume":"27","author":"E Delp","year":"1979","unstructured":"Delp E, Mitchell O (1979) Image compression using block truncation coding[J]. IEEE Trans Commun 27(9):1335\u20131342","journal-title":"IEEE Trans Commun"},{"key":"16679_CR18","doi-asserted-by":"publisher","first-page":"107817","DOI":"10.1016\/j.sigpro.2020.107817","volume":"178","author":"G Gao","year":"2021","unstructured":"Gao G, Tong S, Xia Z et al (2021) Reversible data hiding with automatic contrast enhancement for medical images[J]. Signal Process 178:107817","journal-title":"Signal Process"},{"issue":"19\u201320","key":"16679_CR19","doi-asserted-by":"publisher","first-page":"12869","DOI":"10.1007\/s11042-019-08484-2","volume":"79","author":"R Geetha","year":"2020","unstructured":"Geetha R, Geetha S (2020) Embedding electronic patient information in clinical images: an improved and efficient reversible data hiding technique[J]. Multimed Tools Appl 79(19\u201320):12869\u201312890","journal-title":"Multimed Tools Appl"},{"key":"16679_CR20","doi-asserted-by":"crossref","unstructured":"Geetha R, Geetha S (2018) Improved reversible data embedding in medical images using I-IWT and pairwise pixel difference expansion. International Conference on Next Generation Computing Technologies, vol 9, pp 601\u2013611","DOI":"10.1007\/978-981-10-8660-1_45"},{"issue":"19","key":"16679_CR21","doi-asserted-by":"publisher","first-page":"29939","DOI":"10.1007\/s11042-021-11170-x","volume":"80","author":"S Gull","year":"2021","unstructured":"Gull S, Mansour RF, Aljehane NO et al (2021) A self-embedding technique for tamper detection and localization of medical images for smart-health[J]. Multimed Tools Appl 80(19):29939\u201329964","journal-title":"Multimed Tools Appl"},{"key":"16679_CR22","doi-asserted-by":"publisher","first-page":"31181","DOI":"10.1007\/s11042-023-14824-0","volume":"82","author":"SY Iseed","year":"2023","unstructured":"Iseed SY, Mahmoud KW (2023) Forensic approach for distinguishing between source and destination regions in copy-move forgery[J]. Multimed Tools Appl 82:31181\u201331210","journal-title":"Multimed Tools Appl"},{"key":"16679_CR23","doi-asserted-by":"publisher","unstructured":"Jaiswal AK, Srivastava R (2023) Fake region identification in an image using deep learning segmentation model[J]. Multimed Tools Appl:1\u201321. https:\/\/doi.org\/10.1007\/s11042-023-15032-6","DOI":"10.1007\/s11042-023-15032-6"},{"issue":"10","key":"16679_CR24","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1109\/TCOM.1984.1095973","volume":"32","author":"M Lema","year":"1984","unstructured":"Lema M, Mitchell O (1984) Absolute moment block truncation coding and its application to color images[J]. IEEE Trans Commun 32(10):1148\u20131157","journal-title":"IEEE Trans Commun"},{"issue":"3","key":"16679_CR25","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2020","unstructured":"Liao X, Yu YB, Li B et al (2020) A new payload partition strategy in color image steganography.[J]. IEEE Trans Circ Syst Vid Technol 30(3):685\u2013696","journal-title":"IEEE Trans Circ Syst Vid Technol"},{"issue":"2","key":"16679_CR26","first-page":"897","volume":"19","author":"X Liao","year":"2022","unstructured":"Liao X, Yin JJ, Chen ML et al (2022) Adaptive payload distribution in multiple images steganography based on image texture features[J]. IEEE Trans Depend Sec Comput 19(2):897\u2013911","journal-title":"IEEE Trans Depend Sec Comput"},{"issue":"2","key":"16679_CR27","doi-asserted-by":"publisher","first-page":"952","DOI":"10.1109\/TCSVT.2022.3204740","volume":"33","author":"W Lu","year":"2023","unstructured":"Lu W, Xu WB, Sheng ZQ (2023) An interpretable image tampering detection approach based on cooperative game[J]. IEEE Trans Circ Syst Vid Technol 33(2):952\u2013962","journal-title":"IEEE Trans Circ Syst Vid Technol"},{"issue":"11","key":"16679_CR28","doi-asserted-by":"publisher","first-page":"3823","DOI":"10.1007\/s11042-013-1801-5","volume":"74","author":"C Lin","year":"2015","unstructured":"Lin C, Liu X, Tai W et al (2015) A novel reversible data hiding scheme based on AMBTC compression technique[J]. Multimed Tools Appl 74(11):3823\u20133842","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"16679_CR29","doi-asserted-by":"publisher","first-page":"9129","DOI":"10.1007\/s13369-021-05716-2","volume":"46","author":"RF Mansour","year":"2021","unstructured":"Mansour RF, Parah SA (2021) Reversible data hiding for electronic patient information security for telemedicine applications[J]. Arab J Sci Eng 46(9):9129\u20139144","journal-title":"Arab J Sci Eng"},{"issue":"20","key":"16679_CR30","doi-asserted-by":"publisher","first-page":"28509","DOI":"10.1007\/s11042-022-12846-8","volume":"81","author":"M Otair","year":"2022","unstructured":"Otair M, Abualigah L, Qawaqzeh MK (2022) Improved near-lossless technique using the Huffman coding for enhancing the quality of image compression[J]. Multimed Tools Appl 81(20):28509\u201328529","journal-title":"Multimed Tools Appl"},{"key":"16679_CR31","doi-asserted-by":"crossref","unstructured":"Reddy GT, Bhattacharya S, Ramakrishnan SS et al (2020) An ensemble based machine learning model for diabetic retinopathy classification. 2020 international conference on emerging trends in information technology and engineering (ic-ETITE), vol 19573816, pp 1\u20136","DOI":"10.1109\/ic-ETITE47903.2020.235"},{"issue":"1","key":"16679_CR32","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s13246-019-00838-2","volume":"43","author":"PV Sanivarapu","year":"2020","unstructured":"Sanivarapu PV, Rajesh KNVP, Reddy NVR et al (2020) Patient data hiding into ECG signal using watermarking in transform domain[J]. Phys Eng Sci Med 43(1):213\u2013226","journal-title":"Phys Eng Sci Med"},{"issue":"8","key":"16679_CR33","doi-asserted-by":"publisher","first-page":"11605","DOI":"10.1007\/s11042-022-12273-9","volume":"81","author":"PV Sanivarapu","year":"2022","unstructured":"Sanivarapu PV (2022) Adaptive tamper detection watermarking scheme for medical images in transform domain[J]. Multimed Tools Appl 81(8):11605\u201311619","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"16679_CR34","doi-asserted-by":"publisher","first-page":"6941","DOI":"10.1007\/s11042-016-3328-z","volume":"76","author":"H Shi","year":"2017","unstructured":"Shi H, Wang XH, Li MC et al (2017) Secure variable-capacity self-recovery watermarking scheme[J]. Multimed Tools Appl 76(5):6941\u20136972","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"16679_CR35","doi-asserted-by":"publisher","first-page":"2009","DOI":"10.1007\/s11042-020-09732-6","volume":"80","author":"S Showkat","year":"2021","unstructured":"Showkat S, Parah SA, Gull S (2021) Embedding in medical images with contrast enhancement and tamper detection capability[J]. Multimed Tools Appl 80(2):2009\u20132030","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"16679_CR36","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1007\/s11042-022-13270-8","volume":"82","author":"S Singh","year":"2023","unstructured":"Singh S, Singh SK, Udmale SS (2023) An efficient self-embedding fragile watermarking scheme for image authentication with two chances for recovery capability[J]. Multimed Tools Appl 82(1):1045\u20131066","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"16679_CR37","doi-asserted-by":"publisher","first-page":"12881","DOI":"10.1007\/s11042-020-10451-1","volume":"80","author":"G Su","year":"2021","unstructured":"Su G, Chang C, Chen C (2021) A hybrid-Sudoku based fragile watermarking scheme for image tampering detection[J]. Multimed Tools Appl 80(8):12881\u201312903","journal-title":"Multimed Tools Appl"},{"key":"16679_CR38","doi-asserted-by":"publisher","first-page":"101665","DOI":"10.1016\/j.bspc.2019.101665","volume":"55","author":"K Swaraja","year":"2020","unstructured":"Swaraja K, Meenakshi K, Kora P (2020) An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine[J]. Biomed Signal Process Control 55:101665","journal-title":"Biomed Signal Process Control"},{"issue":"2","key":"16679_CR39","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1109\/TNSE.2021.3139671","volume":"9","author":"JX Tan","year":"2022","unstructured":"Tan JX, Liao X, Liu JT et al (2022) Channel attention image steganography with generative adversarial networks[J]. IEEE Trans Netw Sci Eng 9(2):888\u2013903","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"10","key":"16679_CR40","doi-asserted-by":"publisher","first-page":"13905","DOI":"10.1007\/s11042-018-6746-2","volume":"78","author":"R Thanki","year":"2019","unstructured":"Thanki R, Borra S (2019) Fragile watermarking for copyright authentication and tamper detection of medical images using compressive sensing (CS) based encryption and contourlet domain processing[J]. Multimed Tools Appl 78(10):13905\u201313924","journal-title":"Multimed Tools Appl"},{"key":"16679_CR41","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.ins.2021.02.079","volume":"567","author":"X Wang","year":"2021","unstructured":"Wang X, Chang C, Lin C (2021) Reversible data hiding in encrypted images with block-based adaptive MSB encoding[J]. Inf Sci 567:375\u2013394","journal-title":"Inf Sci"},{"issue":"14","key":"16679_CR42","doi-asserted-by":"publisher","first-page":"18043","DOI":"10.1007\/s11042-017-4444-0","volume":"77","author":"Y Yang","year":"2018","unstructured":"Yang Y, Zhang W, Liang D et al (2018) A ROI-based high capacity reversible data hiding scheme with contrast enhancement for medical images[J]. Multimed Tools Appl 77(14):18043\u201318065","journal-title":"Multimed Tools Appl"},{"issue":"5","key":"16679_CR43","doi-asserted-by":"publisher","first-page":"1317","DOI":"10.1109\/TIFS.2017.2787986","volume":"13","author":"J Yu","year":"2018","unstructured":"Yu J, Kuang Z, Zhang B et al (2018) Leveraging content sensitiveness and user trustworthiness to recommend fine-grained privacy settings for social image sharing[J]. IEEE Trans Inf Forensic Secur 13(5):1317\u20131332","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"1","key":"16679_CR44","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.aeue.2014.10.006","volume":"69","author":"M Yu","year":"2015","unstructured":"Yu M, Wang J, Jiang G et al (2015) New fragile watermarking method for stereo image authentication with localization and recovery[J]. AEU Int J Electron Commun 69(1):361\u2013370","journal-title":"AEU Int J Electron Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16679-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-16679-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-16679-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T08:08:32Z","timestamp":1709798912000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-16679-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,5]]},"references-count":44,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["16679"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-16679-x","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,5]]},"assertion":[{"value":"13 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}