{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T12:10:01Z","timestamp":1758975001886,"version":"3.44.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"33","license":[{"start":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:00:00Z","timestamp":1743120000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:00:00Z","timestamp":1743120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-025-20740-2","type":"journal-article","created":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T19:01:06Z","timestamp":1743361266000},"page":"41009-41039","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bio-inspired optimization based secure model for watermarking of medical data"],"prefix":"10.1007","volume":"84","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1999-4258","authenticated-orcid":false,"given":"Akash Kumar","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Chinmay","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Bharat","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,28]]},"reference":[{"key":"20740_CR1","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.comcom.2020.01.038","volume":"152","author":"A Anand","year":"2020","unstructured":"Anand A, Singh AK (2020) An improved DWT-SVD domain watermarking for medical information security. Comput Commun 152:72\u201380","journal-title":"Comput Commun"},{"key":"20740_CR2","first-page":"163","volume":"23","author":"AK Gupta","year":"2020","unstructured":"Gupta AK, Chakraborty C, Gupta B (2020) Advanced telemedicine system for remote healthcare monitoring, IET: Advances in telemedicine for Health Monitoring. Healthc Technol Ser 23:163\u2013185","journal-title":"Healthc Technol Ser"},{"issue":"1","key":"20740_CR3","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1007\/s11042-015-3010-x","volume":"76","author":"D Singh","year":"2017","unstructured":"Singh D, Singh SK (2017) DCT Based efficient fragile watermarking scheme for image authentication and restoration. Multimedia Tools Appl 76(1):953\u2013977","journal-title":"Multimedia Tools Appl"},{"issue":"6","key":"20740_CR4","doi-asserted-by":"publisher","first-page":"2223","DOI":"10.1007\/s11277-017-4971-z","volume":"98","author":"S Roy","year":"2018","unstructured":"Roy S, Pal AK (2018) An SVD based location specific robust color image watermarking scheme using RDWT and arnold scrambling. Wirel Pers Commun 98(6):2223\u20132250","journal-title":"Wirel Pers Commun"},{"doi-asserted-by":"crossref","unstructured":"Niu Y, Zheng X, Han Y (2018) An optimized digital watermarking algorithm in wavelet domain based on differential evolution for color image. PLoS ONE 13(5)","key":"20740_CR5","DOI":"10.1371\/journal.pone.0196306"},{"issue":"5","key":"20740_CR6","doi-asserted-by":"publisher","first-page":"13161","DOI":"10.1007\/s11042-020-08639-6","volume":"79","author":"AK Chaturvedi","year":"2020","unstructured":"Chaturvedi AK, Shukla PK (2020) Effective watermarking technique using optimal discrete wavelet transform and sanitization technique. Multimedia Tools Appl 79(5):13161\u201313177","journal-title":"Multimedia Tools Appl"},{"key":"20740_CR7","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.cosrev.2017.11.003","volume":"27","author":"A Qasim","year":"2018","unstructured":"Qasim A, Meziane F, Aspin R (2018) Digital watermarking: applicability for developing trust in medical imaging workflows state of the art review. Comput Sci Rev 27:45\u201360","journal-title":"Comput Sci Rev"},{"key":"20740_CR8","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.eswa.2018.07.004","volume":"114","author":"MH Vali","year":"2018","unstructured":"Vali MH, Aghagolzadeh A, Baleghi Y (2018) Optimized watermarking technique using self-adaptive differential evolution based on redundant discrete wavelet transform and singular value decomposition. Expert Syst Appl 114:296\u2013312","journal-title":"Expert Syst Appl"},{"key":"20740_CR9","doi-asserted-by":"publisher","first-page":"32931","DOI":"10.1109\/ACCESS.2021.3060861","volume":"9","author":"WH Alshoura","year":"2021","unstructured":"Alshoura WH, Zainol Z, Teh JS, Alawida M, Alabdulatif A (2021) Hybrid SVD-based image watermarking schemes: a review. IEEE Access 9:32931\u201332968","journal-title":"IEEE Access"},{"unstructured":"Chaurasia P, Kohli R, Garg A (2014) Biometrics minutiae detection and feature extraction. LAP LAMBERT Academic Publishing","key":"20740_CR10"},{"issue":"3","key":"20740_CR11","doi-asserted-by":"publisher","first-page":"3457","DOI":"10.1007\/s11042-018-6263-3","volume":"78","author":"S Thakur","year":"2019","unstructured":"Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimedia Tools Appl 78(3):3457\u20133470","journal-title":"Multimedia Tools Appl"},{"issue":"11","key":"20740_CR12","first-page":"169","volume":"1","author":"A Imane","year":"2018","unstructured":"Imane A, Abdelmajid K, Sahel A (2018) A robust hybrid watermarking technique for securing medical image. Int J Intell Eng Syst 1(11):169\u2013175","journal-title":"Int J Intell Eng Syst"},{"key":"20740_CR13","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1007\/s11042-016-3862-8","volume":"77","author":"A Zear","year":"2016","unstructured":"Zear A, Singh AK, Kumar P (2016) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimedia Tools Appl 77:4863\u20134882","journal-title":"Multimedia Tools Appl"},{"doi-asserted-by":"crossref","unstructured":"Kulkarni BP, Sai KS, Meenakshi K, Padmavathi K, Swaraja K (2020) Performance analysis of optimization algorithms GA, PSO, and ABC based on DWT-SVD watermarking in opencv python environment. In: 2020 International Conference for emerging technology (INCET), pp 1\u20135","key":"20740_CR14","DOI":"10.1109\/INCET49848.2020.9154134"},{"issue":"6","key":"20740_CR15","doi-asserted-by":"publisher","first-page":"565","DOI":"10.18280\/ts.360612","volume":"36","author":"K Swaraja","year":"2019","unstructured":"Swaraja K, Meenakshi K, Padmavathi K (2019) Robust optimized discrete wavelet transform-singular value decomposition based video watermarking. Traitement Sig 36(6):565\u2013573","journal-title":"Traitement Sig"},{"doi-asserted-by":"crossref","unstructured":"Amrit P, Anand A, Kumar S, Singh AK (2021) Robust transmission of medical records using dual watermarking and optimization algorithm. J Phys: Conf Ser 1767","key":"20740_CR16","DOI":"10.1088\/1742-6596\/1767\/1\/012060"},{"key":"20740_CR17","first-page":"1218","volume":"21","author":"A Mohsin Abdulazeez","year":"2021","unstructured":"Mohsin Abdulazeez A, Hajy D, Zeebaree D, Zebari D (2021) Robust watermarking scheme based LWT and SVD using artificial bee colony optimization. Indones J Electr Eng Comput Sci 21:1218\u20131229","journal-title":"Indones J Electr Eng Comput Sci"},{"issue":"17","key":"20740_CR18","doi-asserted-by":"publisher","first-page":"105696","DOI":"10.1016\/j.asoc.2019.105696","volume":"84","author":"S Sharma","year":"2019","unstructured":"Sharma S, Sharma H, Sharma JB (2019) An adaptive color image watermarking using RDWT-SVD and artificial bee colony based quality metric strength factor optimization. Appl Soft Comput 84(17):105696","journal-title":"Appl Soft Comput"},{"issue":"2","key":"20740_CR19","first-page":"101665","volume":"55","author":"K Swaraja","year":"2020","unstructured":"Swaraja K, Meenakshi K, Padmavathi K (2020) An optimized blind dual medical image watermarking framework for tamper localization and content authentication in secured telemedicine. Biomed Signal Process Control 55(2):101665","journal-title":"Biomed Signal Process Control"},{"key":"20740_CR20","first-page":"1","volume":"2018","author":"S Bharati","year":"2018","unstructured":"Bharati S, Rahman MA, Mandal S, Podder P (2018) Analysis of DWT, DCT, BFO & PBFO algorithm for the purpose of medical image watermarking. Int Conf Innov Eng Technol (ICIET) 2018:1\u20136","journal-title":"Int Conf Innov Eng Technol (ICIET)"},{"issue":"9","key":"20740_CR21","first-page":"43","volume":"2","author":"N Tayal","year":"2016","unstructured":"Tayal N, Sagar N (2016) Audio watermarking using DWT-SVD-BFO. Int J Innov Res Sci Technol 2(9):43\u201348","journal-title":"Int J Innov Res Sci Technol"},{"doi-asserted-by":"crossref","unstructured":"Anu S, Nair H, Aruna P (2018) Genetic algorithm and BFOA-based iris and palmprint multimodal biometric digital watermarking models. Bio-Inspired Comput Image Video Process 3\u201330","key":"20740_CR22","DOI":"10.1201\/9781315153797-1"},{"doi-asserted-by":"crossref","unstructured":"Singh A, Kumar A, Dutta K (2020) DWT, DCT and PBFO based approach for biometric image security. In: 2020 International Conference on Contemporary Computing and Applications (IC3A), pp 298\u2013303","key":"20740_CR23","DOI":"10.1109\/IC3A48958.2020.233317"},{"doi-asserted-by":"crossref","unstructured":"Altay SY, Ulutas G (2019) a lwt-firefly algorithm based approach for smooth images watermarking. In: 2019 4th International Conference on Computer Science and Engineering (UBMK), pp 1\u20136","key":"20740_CR24","DOI":"10.1109\/UBMK.2019.8907217"},{"doi-asserted-by":"crossref","unstructured":"Anand A, Singh AK (2020) RDWT-SVD-firefly based dual watermarking technique for medical images. In: 2020 International Conference on Multimedia Big Data (BigMM), pp 366\u2013372","key":"20740_CR25","DOI":"10.1109\/BigMM50055.2020.00063"},{"issue":"21","key":"20740_CR26","doi-asserted-by":"publisher","first-page":"28249","DOI":"10.1007\/s11042-018-6020-7","volume":"77","author":"K Swaraja","year":"2018","unstructured":"Swaraja K (2018) Medical image region based watermarking for secured telemedicine. Multimedia Tools Appl 77(21):28249\u201328280","journal-title":"Multimedia Tools Appl"},{"issue":"19","key":"20740_CR27","doi-asserted-by":"publisher","first-page":"26083","DOI":"10.1007\/s11042-018-5838-3","volume":"77","author":"E Moeinaddini","year":"2018","unstructured":"Moeinaddini E, Afsari F (2018) Robust watermarking in DWT domain using SVD and opposition and dimensional based modified firefly algorithm. Multimedia Tools Appl 77(19):26083\u201326105","journal-title":"Multimedia Tools Appl"},{"issue":"2","key":"20740_CR28","first-page":"525","volume":"23","author":"S Sharma","year":"2020","unstructured":"Sharma S, Patil H (2020) Secure data hiding scheme using firefly algorithm with hidden compression. J Discret Math Sci Crypt 23(2):525\u2013534","journal-title":"J Discret Math Sci Crypt"},{"issue":"5","key":"20740_CR29","first-page":"1","volume":"79","author":"EMF El Houby","year":"2020","unstructured":"El Houby EMF, Yassin NIR (2020) Wavelet-Hadamard based blind image watermarking using genetic algorithm and decision tree. Multimedia Tools Appl 79(5):1\u201322","journal-title":"Multimedia Tools Appl"},{"doi-asserted-by":"crossref","unstructured":"Krishnasamy B, Balakrishnan M, Christopher A (2021) A genetic algorithm based medical image watermarking for improving robustness and fidelity in wavelet domain. In: Satapathy S, Zhang YD, Bhateja V, Majhi R (eds) Intelligent data engineering and analytics. Advances in Intelligent Systems and Computing, vol 1177. pp 289\u2013299","key":"20740_CR30","DOI":"10.1007\/978-981-15-5679-1_27"},{"doi-asserted-by":"crossref","unstructured":"Takore TT, Kumar PR, Devi GL (2018) A robust and oblivious grayscale image watermarking scheme based on edge detection, SVD, and GA. In: Satapathy S, Bhateja V, Chowdary P, Chakravarthy V, Anguera J (eds) Proceedings of 2nd International conference on micro-electronics, electromagnetics and telecommunications, vol 434. pp 51\u201361","key":"20740_CR31","DOI":"10.1007\/978-981-10-4280-5_6"},{"doi-asserted-by":"crossref","unstructured":"Chao Y, Wang H, Liu S, Liu H (2018) RST invariant watermarking scheme using genetic algorithm and DWT-SVD. In: Ren J et al (eds) Advances in brain inspired cognitive systems. BICS 2018. Lecture notes in computer science, vol 10989. pp 665\u2013675","key":"20740_CR32","DOI":"10.1007\/978-3-030-00563-4_65"},{"issue":"6","key":"20740_CR33","first-page":"1","volume":"41","author":"P Garg","year":"2020","unstructured":"Garg P, Kishore R (2020) Optimized color image watermarking through watermark strength optimization using particle swarm optimization technique. J Inf Optim Sci 41(6):1\u201314","journal-title":"J Inf Optim Sci"},{"doi-asserted-by":"crossref","unstructured":"Yadav N, Rajpoot D, Dhakad SK (2020) Optimization of watermarking in image by using particle swarm optimization algorithm. In: 2020 International Conference on Signal Processing and Communication (ICSC), pp 85\u201390","key":"20740_CR34","DOI":"10.1109\/ICSC48311.2020.9182716"},{"doi-asserted-by":"crossref","unstructured":"Bansal M, Mishra A, Sharma A (2020) Optimized DWT SVD based image watermarking scheme using particle swarm optimization. In: Gervasi O et al (eds) Computational Science and Its Applications \u2013 ICCSA 2020. Lecture notes in computer science, pp 12254","key":"20740_CR35","DOI":"10.1007\/978-3-030-58817-5_61"},{"doi-asserted-by":"crossref","unstructured":"Sanku D, Kiran S, Takore TT, Kumar PR (2018) Digital image watermarking in RGB host using DWT, SVD, and PSO Techniques. Lecture Notes in Electrical Engineering, pp 333\u2013342","key":"20740_CR36","DOI":"10.1007\/978-981-10-4280-5_35"},{"unstructured":"\u201cThe National Library of Medicine presents MedPix.\u201d [Online]. Available: https:\/\/www.nlm.nih.gov\/news\/medpix_image_database.html.\u00a0Accessed 21 Aug 2020","key":"20740_CR37"},{"issue":"6","key":"20740_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1103\/PhysRevE.64.061907","volume":"64","author":"RG Andrzejak","year":"2001","unstructured":"Andrzejak RG, Lehnertz K, Mormann F, Rieke C, David P, Elger CE (2001) Indications of nonlinear deterministic and finite-dimensional structures in time series of brain electrical activity: Dependence on recording region and brain state. Phys Rev E Stat Nonlin Soft Matter Phys 64(6):1\u20138","journal-title":"Phys Rev E Stat Nonlin Soft Matter Phys"},{"issue":"1","key":"20740_CR39","first-page":"299","volume":"17","author":"M Sameer","year":"2021","unstructured":"Sameer M, Gupta B (2021) ROC analysis of EEG subbands for epileptic seizure detection using naive bayes classifier. J Mob Multimedia 17(1):299\u2013310","journal-title":"J Mob Multimedia"},{"key":"20740_CR40","doi-asserted-by":"publisher","first-page":"110691","DOI":"10.1016\/j.forsciint.2021.110691","volume":"320","author":"N Zermi","year":"2021","unstructured":"Zermi N, Khaldi A, Kafi R, Kahlessenane F, Euschi S (2021) A DWT-SVD based robust digital watermarking for medical image security. Forensic Sci Int 320:110691","journal-title":"Forensic Sci Int"},{"issue":"17","key":"20740_CR41","doi-asserted-by":"publisher","first-page":"7858","DOI":"10.1016\/j.eswa.2014.06.011","volume":"41","author":"C Agarwal","year":"2014","unstructured":"Agarwal C, Mishra A, Sharma A, Bedi P (2014) Optimized gray-scale image watermarking using DWT-SVD and firefly algorithm. Expert Syst Appl 41(17):7858\u20137867","journal-title":"Expert Syst Appl"},{"issue":"3","key":"20740_CR42","doi-asserted-by":"publisher","first-page":"27895","DOI":"10.1007\/s11042-018-6014-5","volume":"77","author":"AM Abdelhakim","year":"2018","unstructured":"Abdelhakim AM, Saad MH, Sayed M, Saleh HI (2018) Optimized SVD-based robust watermarking in the fractional fourier domain. Multimedia Tools and Appl 77(3):27895\u201327917","journal-title":"Multimedia Tools and Appl"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20740-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-025-20740-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20740-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T11:55:49Z","timestamp":1758974149000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-025-20740-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,28]]},"references-count":42,"journal-issue":{"issue":"33","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["20740"],"URL":"https:\/\/doi.org\/10.1007\/s11042-025-20740-2","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2025,3,28]]},"assertion":[{"value":"3 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 February 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 March 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This work did not require ethical approval as it did not involve human participants, animals, or sensitive data.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"This study did not involve human participants; hence, consent to participate was not required.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All authors have reviewed and approved the final version of this manuscript and consent to its publication.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare that they have no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}