{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T02:23:39Z","timestamp":1773800619553,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T00:00:00Z","timestamp":1753142400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T00:00:00Z","timestamp":1753142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12083-025-02041-5","type":"journal-article","created":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T14:00:30Z","timestamp":1753192830000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Securing medical images using multi-stepwatermarking model"],"prefix":"10.1007","volume":"18","author":[{"given":"Saima","family":"Kanwal","sequence":"first","affiliation":[]},{"given":"Feng","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Rizwan","family":"Taj","sequence":"additional","affiliation":[]},{"given":"Qamar","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Farhan","family":"Amin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,22]]},"reference":[{"key":"2041_CR1","doi-asserted-by":"publisher","unstructured":"\u00a0Nilesh Rathi , Ganga Holi, Securing Medical Images by Watermarking Using DWT-DCT-SVD, International Journal of Computer Trends and Technology (IJCTT), vol. 12, no. 1, pp. 67\u201374, 2014. https:\/\/doi.org\/10.14445\/22312803\/IJCTT-V12P113","DOI":"10.14445\/22312803\/IJCTT-V12P113"},{"issue":"2","key":"2041_CR2","doi-asserted-by":"publisher","first-page":"3895","DOI":"10.1007\/s11042-023-15554-z","volume":"83","author":"TK Araghi","year":"2024","unstructured":"Araghi TK, Meg\u00edas D (2024) Analysis and effectiveness of deeper levels of SVD on performance of hybrid DWT and SVD watermarking. Multimed Tools Appl 83(2):3895\u20133916","journal-title":"Multimed Tools Appl"},{"key":"2041_CR3","doi-asserted-by":"publisher","unstructured":"Araghi TK, Meg\u00edas D\u00a0(2024) Analysis and effectiveness of deeper levels of SVD on performance of hybrid DWT and SVD watermarking. Multimed Tools Appl 83;3895\u20133916 https:\/\/doi.org\/10.1007\/s11042-023-15554-z","DOI":"10.1007\/s11042-023-15554-z"},{"key":"2041_CR4","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1007\/s11042-016-3862-8","volume":"77","author":"A Zear","year":"2018","unstructured":"Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77:4863\u20134882","journal-title":"Multimed Tools Appl"},{"key":"2041_CR5","doi-asserted-by":"publisher","unstructured":"Amrit P, Baranwal N, Singh KN, and Singh AK (2024) ConvNet-HIDE: Deep-Learning-Based Dual Watermarking for Health-Care Images, in IEEE MultiMedia, vol. 31, no. 3, pp. 78-87, https:\/\/doi.org\/10.1109\/MMUL.2024.3423370","DOI":"10.1109\/MMUL.2024.3423370"},{"key":"2041_CR6","doi-asserted-by":"crossref","unstructured":"Fan Y, Li J, Bhatti UA, Nawaz SA, Chen Y (2025) Medical image hybrid watermark algorithm based on frequency domain processing and inception v3.\u00a0Advanced Intelligent Systems 2400654","DOI":"10.1002\/aisy.202400654"},{"key":"2041_CR7","doi-asserted-by":"publisher","unstructured":"Karki B, Tsai CH, Huang\u00a0PC and Zhong X, deep learning-based text-in-image watermarking, 2024 IEEE 7th International Conference on Multimedia Information Processing and Retrieval (MIPR), San Jose, CA, USA, 2024, pp. 376-382, https:\/\/doi.org\/10.1109\/MIPR62202.2024.00066.\u00a0","DOI":"10.1109\/MIPR62202.2024.00066"},{"key":"2041_CR8","doi-asserted-by":"publisher","unstructured":"Sreenivasan M., Anu Mary Chacko, 2 - Interoperability issues in EHR systems: Research directions, Editor(s): Kun Chang Lee, Sanjiban Sekhar Roy, Pijush Samui, Vijay Kumar, Data Analytics in Biomedical Engineering and Healthcare, Academic Press, 2021, Pages 13-28, https:\/\/doi.org\/10.1016\/B978-0-12-819314-3.00002-1.\u00a0","DOI":"10.1016\/B978-0-12-819314-3.00002-1"},{"key":"2041_CR9","doi-asserted-by":"publisher","unstructured":"Wei X, Pu B, Chen C and Fu H (2024) MIAD-MARK: Adversarial Watermarking of Medical Image for Protecting Copyright and Privacy, 2024 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), Lisbon, Portugal, pp. 3842-3845, https:\/\/doi.org\/10.1109\/BIBM62325.2024.10822032\u00a0","DOI":"10.1109\/BIBM62325.2024.10822032"},{"issue":"28","key":"2041_CR10","doi-asserted-by":"publisher","first-page":"44591","DOI":"10.1007\/s11042-023-15315-y","volume":"82","author":"J Kumar","year":"2023","unstructured":"Kumar J, Singh AK (2023) Copyright protection of medical images: A view of the state-of-the-art research and current developments. Multimed Tools Appl 82(28):44591\u201344621","journal-title":"Multimed Tools Appl"},{"key":"2041_CR11","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-319-57699-2_10","volume-title":"Medical Image Watermarking: Techniques and Applications","author":"AK Singh","year":"2017","unstructured":"Singh AK, Kumar B, Singh G, Mohan A (2017) State-of-the-art techniques of image watermarking: New trends and future challenges. Medical Image Watermarking: Techniques and Applications. Springer International Publishing, Cham, pp 227\u2013244"},{"key":"2041_CR12","doi-asserted-by":"publisher","unstructured":"Mohammad A, Adnan H, Aseel A, Yousef J, Mohammad M, AM, Ahmad A Robust (2024) Image Watermarking using DWT, DCT, and PSO with CNN-Based Attack Evaluation, The International Arab Journal of Information Technology (IAJIT) ,Volume 21, Number 06, pp. 9670\u2013977, November https:\/\/doi.org\/10.34028\/iajit\/21\/6\/1.","DOI":"10.34028\/iajit\/21\/6\/1"},{"issue":"14","key":"2041_CR13","doi-asserted-by":"publisher","first-page":"8430","DOI":"10.3390\/app13148430","volume":"13","author":"SL Gomez-Coronel","year":"2023","unstructured":"Gomez-Coronel SL, Moya-Albor E, Brieva J, Romero-Arellano A (2023) A robust and secure watermarking approach based on Hermite transform and SVD-DCT. Appl Sci 13(14):8430","journal-title":"Appl Sci"},{"key":"2041_CR14","doi-asserted-by":"publisher","unstructured":"Mohammed AA, Awad SR, Abdullah MAM, Elbasi\u00a0E and Woo WL (2024) Quantifying the Impact of Watermarking on Deep Learning Accuracy in Medical Image Classification, in IEEE Access, vol. 12, pp. 162040\u2013162061, https:\/\/doi.org\/10.1109\/ACCESS.2024.3486757\u00a0","DOI":"10.1109\/ACCESS.2024.3486757"},{"issue":"1","key":"2041_CR15","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s11220-023-00427-4","volume":"24","author":"LR Battarusetty","year":"2023","unstructured":"Battarusetty LR, Kumari GRN, Tamilkodi R, Kumar BS (2023) Modeling automated image watermarking using meta-heuristic-based deep learning with wavelet approach. Sensing Imaging 24(1):24","journal-title":"Sensing Imaging"},{"key":"2041_CR16","doi-asserted-by":"publisher","unstructured":"Hosny KM, Abdel-Aziz MM, Lashin NA et al\u00a0(2025) A new CNN-based watermarking method for color medical images in a fusion domain. Neural Comput and Applic 37, 12611\u201312629. https:\/\/doi.org\/10.1007\/s00521-025-11056-1\u00a0","DOI":"10.1007\/s00521-025-11056-1"},{"issue":"18","key":"2041_CR17","doi-asserted-by":"publisher","first-page":"25075","DOI":"10.1007\/s11042-022-12456-4","volume":"81","author":"D Awasthi","year":"2022","unstructured":"Awasthi D, Srivastava VK (2022) LWT-DCT-SVD and DWT-DCT-SVD based watermarking schemes with their performance enhancement using Jaya and Particle swarm optimization and comparison of results under various attacks. Multimed Tools Appl 81(18):25075\u201325099","journal-title":"Multimed Tools Appl"},{"key":"2041_CR18","doi-asserted-by":"publisher","first-page":"109857","DOI":"10.1016\/j.compeleceng.2024.109857","volume":"121","author":"R Singh","year":"2025","unstructured":"Singh R, Pal R, Joshi D (2025) Optimal frame selection-based watermarking using a meta-heuristic algorithm for securing video content. Comput Electr Eng 121:109857","journal-title":"Comput Electr Eng"},{"key":"2041_CR19","doi-asserted-by":"publisher","first-page":"109303","DOI":"10.1016\/j.compeleceng.2024.109303","volume":"118","author":"R Singh","year":"2024","unstructured":"Singh R, Pal R, Mittal H, Joshi D (2024) Multi-objective optimization-based medical image watermarking scheme for securing patient records. Comput Electr Eng 118:109303","journal-title":"Comput Electr Eng"},{"issue":"1","key":"2041_CR20","doi-asserted-by":"publisher","first-page":"e70011","DOI":"10.1111\/coin.70011","volume":"41","author":"KS Singh","year":"2025","unstructured":"Singh KS, Singh HV (2025) A Novel Deep Learning Based Dual Watermarking System for Securing Healthcare Data. Comput Intell 41(1):e70011","journal-title":"Comput Intell"},{"key":"2041_CR21","doi-asserted-by":"publisher","unstructured":"mina hanna, Mazhar Tayel. A Hybrid Encoded and Adapted-tuned Neural Network for Asset Medical Image Watermarking Technique, 17 January 2022, PREPRINT (Version 1) available at Research Square https:\/\/doi.org\/10.21203\/rs.3.rs-831690\/v1\u00a0","DOI":"10.21203\/rs.3.rs-831690\/v1"},{"issue":"1","key":"2041_CR22","doi-asserted-by":"publisher","first-page":"17320","DOI":"10.1038\/s41598-024-67672-9","volume":"14","author":"R Taj","year":"2024","unstructured":"Taj R, Tao F, Kanwal S, Almogren A, Altameem A, Ur Rehman A (2024) A reversible-zero watermarking scheme for medical images. Sci Rep 14(1):17320","journal-title":"Sci Rep"},{"issue":"9","key":"2041_CR23","doi-asserted-by":"publisher","first-page":"e0307619","DOI":"10.1371\/journal.pone.0307619","volume":"19","author":"R Taj","year":"2024","unstructured":"Taj R, Tao F, Kanwal S, Almogren A, Rehman AU (2024) A SURF and SVD-based robust zero-watermarking for medical image integrity. PLoS ONE 19(9):e0307619","journal-title":"PLoS ONE"},{"issue":"1","key":"2041_CR24","first-page":"201","volume":"134","author":"S Kanwal","year":"2022","unstructured":"Kanwal S, Tao F, Almogren A, Rehman AU, Taj R, Radwan A (2022) A robust data hiding reversible technique for improving the security in e-health care system. Comput Model Eng Sci 134(1):201\u2013219","journal-title":"Comput Model Eng Sci"},{"key":"2041_CR25","doi-asserted-by":"publisher","unstructured":"Saima Kanwal, Feng Tao and Rizwan Taj (2023) \u201cA novel deep learning-assisted SVD-based method for medical image watermarking\u201d International Journal of Advanced Computer Science and Applications(IJACSA), 14(11), https:\/\/doi.org\/10.14569\/IJACSA.2023.01411146\u00a0","DOI":"10.14569\/IJACSA.2023.01411146"},{"issue":"1","key":"2041_CR26","doi-asserted-by":"publisher","first-page":"7166","DOI":"10.1038\/s41598-024-55639-9","volume":"14","author":"H Saidi","year":"2024","unstructured":"Saidi H, Tibermacine O, Elhadad A (2024) High-capacity data hiding for medical images based on the mask-RCNN model. Sci Rep 14(1):7166","journal-title":"Sci Rep"},{"key":"2041_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1475-925X-14-7","volume":"14","author":"H Nyeem","year":"2015","unstructured":"Nyeem H, Boles W, Boyd C (2015) Content-independent embedding scheme for multi-modal medical image watermarking. Biomed Eng Online 14:1\u201319","journal-title":"Biomed Eng Online"},{"issue":"10","key":"2041_CR28","doi-asserted-by":"publisher","first-page":"2447","DOI":"10.1109\/TMM.2019.2907475","volume":"21","author":"Y Huang","year":"2019","unstructured":"Huang Y, Niu B, Guan H, Zhang S (2019) Enhancing image watermarking with adaptive embedding parameter and PSNR guarantee. IEEE Trans Multimed 21(10):2447\u20132460","journal-title":"IEEE Trans Multimed"},{"issue":"1","key":"2041_CR29","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/TCSVT.2006.887086","volume":"17","author":"S Wang","year":"2006","unstructured":"Wang S, Zheng D, Zhao J, Tam WJ, Speranza F (2006) An image quality evaluation method based on digital watermarking. IEEE Trans Circuits Syst Video Technol 17(1):98\u2013105","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"2041_CR30","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/TIP.2020.3036727","volume":"30","author":"R Hu","year":"2020","unstructured":"Hu R, Xiang S (2020) Cover-lossless robust image watermarking against geometric deformations. IEEE Trans Image Process 30:318\u2013331","journal-title":"IEEE Trans Image Process"},{"key":"2041_CR31","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.neucom.2022.02.083","volume":"488","author":"W Wan","year":"2022","unstructured":"Wan W, Wang J, Zhang Y, Li J, Yu H, Sun J (2022) A comprehensive survey on robust image watermarking. Neurocomputing 488:226\u2013247","journal-title":"Neurocomputing"},{"issue":"2","key":"2041_CR32","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.ijleo.2015.09.205","volume":"127","author":"S Fazli","year":"2016","unstructured":"Fazli S, Moeini M (2016) A robust image watermarking method based on DWT, DCT, and SVD using a new technique for correction of main geometric attacks. Optik 127(2):964\u2013972","journal-title":"Optik"},{"key":"2041_CR33","unstructured":"]SHOWKAT H and ROHUN NISA DAB (2024) Systematic review and simulative comparison of video watermarking schemes. J of Theor and Applied Information Techno 102(4)\u00a0"},{"issue":"2","key":"2041_CR34","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1049\/ipr2.12961","volume":"18","author":"W Zhang","year":"2024","unstructured":"Zhang W, Chen R, Wang B (2024) A robust watermarking algorithm against JPEG compression based on multiscale autoencoder. IET Image Proc 18(2):455\u2013469","journal-title":"IET Image Proc"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02041-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02041-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02041-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T06:38:25Z","timestamp":1760683105000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02041-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,22]]},"references-count":34,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2041"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02041-5","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,22]]},"assertion":[{"value":"19 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}],"article-number":"253"}}