{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T09:16:20Z","timestamp":1773566180972,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,7,21]],"date-time":"2025-07-21T00:00:00Z","timestamp":1753056000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,21]],"date-time":"2025-07-21T00:00:00Z","timestamp":1753056000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12083-025-02059-9","type":"journal-article","created":{"date-parts":[[2025,7,21]],"date-time":"2025-07-21T14:23:57Z","timestamp":1753107837000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Discrete cosine transform and discrete wavelet transform based hybrid method for robust and blind medical image watermarking"],"prefix":"10.1007","volume":"18","author":[{"given":"Saima","family":"Kanwal","sequence":"first","affiliation":[]},{"given":"Feng","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Rizwan","family":"Taj","sequence":"additional","affiliation":[]},{"given":"Qamar","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Farhan","family":"Amin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,21]]},"reference":[{"key":"2059_CR1","doi-asserted-by":"publisher","first-page":"636082","DOI":"10.3389\/fdgth.2021.636082","volume":"3","author":"EG Spanakis","year":"2021","unstructured":"Spanakis EG, Sfakianakis S, Bonomi S, Ciccotelli C, Magalini S, Sakkalis V (2021) Emerging and established trends to support secure health information exchange. Front Digital Health 3:636082. https:\/\/doi.org\/10.3389\/fdgth.2021.636082","journal-title":"Front Digital Health"},{"key":"2059_CR2","doi-asserted-by":"publisher","first-page":"104130","DOI":"10.1016\/j.compbiomed.2020.104130","volume":"129","author":"C Thapa","year":"2021","unstructured":"Thapa C, Camtepe S (2021) Precision health data: Requirements, challenges and existing techniques for data security and privacy. Comput Biol Med 129:104130. https:\/\/doi.org\/10.1016\/j.compbiomed.2020.104130","journal-title":"Comput Biol Med"},{"issue":"12","key":"2059_CR3","doi-asserted-by":"publisher","first-page":"9493","DOI":"10.1007\/s11227-020-03213-1","volume":"76","author":"H Tabrizchi","year":"2020","unstructured":"Tabrizchi H, Rafsanjani MK (2020) A survey on security challenges in cloud computing: issues, threats, and solutions. J Supercomput 76(12):9493\u20139532. https:\/\/doi.org\/10.1007\/s11227-020-03213-1","journal-title":"J Supercomput"},{"issue":"1","key":"2059_CR4","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/s00247-020-04818-7","volume":"51","author":"RI Markowitz","year":"2021","unstructured":"Markowitz RI, Reid JR, Hee TP, Zweig J, Lilley J (2021) Preserving the value of legacy film-based teaching files in pediatric radiology. Pediatr Radiol 51(1):40\u201344. https:\/\/doi.org\/10.1007\/s00247-020-04818-7","journal-title":"Pediatr Radiol"},{"key":"2059_CR5","doi-asserted-by":"publisher","first-page":"79481","DOI":"10.1007\/s11042-024-19402-6","volume":"83","author":"A Soualmi","year":"2024","unstructured":"Soualmi A, Laouamer L, Alti A (2024) A novel intelligent approach for color image privacy preservation. Multimed Tools Appl 83:79481\u201379502","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"2059_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3453176","volume":"2","author":"AI Newaz","year":"2021","unstructured":"Newaz AI, Sikder AK, Rahman MA, Uluagac AS (2021) A survey on security and privacy issues in modern healthcare systems: Attacks and defenses. ACM Transactions Comput Healthcare 2(3):1\u201344. https:\/\/doi.org\/10.1145\/3453176","journal-title":"ACM Transactions Comput Healthcare"},{"key":"2059_CR7","doi-asserted-by":"publisher","first-page":"102060","DOI":"10.1016\/j.inffus.2023.102060","volume":"102","author":"SF Ahmed","year":"2024","unstructured":"Ahmed SF, Alam MSB, Afrin S, Rafa SJ, Rafa N, Gandomi AH (2024) Insights into the internet of medical things (IoT): Data fusion, security issues, and potential solutions. Inform Fusion 102:102060. https:\/\/doi.org\/10.1016\/j.inffus.2023.102060","journal-title":"Inform Fusion"},{"key":"2059_CR8","doi-asserted-by":"publisher","unstructured":"Singh AK, Bhushan S, Vij S (2021) A brief analysis and comparison of dct-and dwt-based image compression techniques,\" in Information Management and Machine Intelligence: Proceedings of ICIMMI 2019, pp. 45\u201355, Springer, 2021. https:\/\/doi.org\/10.1007\/978-981-15-4936-6_5","DOI":"10.1007\/978-981-15-4936-6_5"},{"key":"2059_CR9","doi-asserted-by":"publisher","unstructured":"Mulani A, Shinde G (2021) An approach for robust digital image watermarking using dwt-PCA. J Sci Technol 6(1). https:\/\/doi.org\/10.46243\/jst.2021.v6.i04.pp59-62","DOI":"10.46243\/jst.2021.v6.i04.pp59-62"},{"issue":"16","key":"2059_CR10","doi-asserted-by":"publisher","first-page":"5540","DOI":"10.3390\/s21165540","volume":"21","author":"N Hasan","year":"2021","unstructured":"Hasan N, Islam MS, Chen W, Kabir MA, Al-Ahmadi S (2021) Encryption based image watermarking algorithm in 2dwt-dct domains. Sensors 21(16):5540. https:\/\/doi.org\/10.3390\/s21165540","journal-title":"Sensors"},{"key":"2059_CR11","first-page":"365","volume":"30","author":"S Kim","year":"2021","unstructured":"Kim S, Chung W, Lee J (2021) Discrete cosine transform (dct). J Seism Explor 30:365\u2013380","journal-title":"J Seism Explor"},{"key":"2059_CR12","doi-asserted-by":"publisher","first-page":"105007","DOI":"10.1016\/j.bspc.2023.105007","volume":"84","author":"A Soualmi","year":"2023","unstructured":"Soualmi A, Laouamer L (2023) A blind watermarking approach based on hybrid imperialistic competitive algorithm and SURF points for color Images\u2019 authentication. Biomed Signal Process Control 84:105007","journal-title":"Biomed Signal Process Control"},{"key":"2059_CR13","doi-asserted-by":"publisher","unstructured":"Mohammed AO, Hussein HI, Mstafa RJ, Abdulazeez AM (2023) A blind and robust color image watermarking scheme based on dct and dwt domains. Multimedia Tools Appl 1\u201327. https:\/\/doi.org\/10.1007\/s11042-023-14797-0","DOI":"10.1007\/s11042-023-14797-0"},{"key":"2059_CR14","doi-asserted-by":"publisher","unstructured":"Kumar C (2023) Hybrid optimization for secure and robust digital image watermarking with dwt, dct, and spit. Multimedia Tools Appl 1\u201322. https:\/\/doi.org\/10.1007\/s11042-023-16903-8","DOI":"10.1007\/s11042-023-16903-8"},{"issue":"1","key":"2059_CR15","first-page":"1","volume":"16","author":"A Soualmi","year":"2022","unstructured":"Soualmi A, Alti A, Laouamer L (2022) An imperceptible watermarking scheme for medical image tamper detection. Int J Inform Sec Privacy (IJISP) 16(1):1\u201318","journal-title":"Int J Inform Sec Privacy (IJISP)"},{"issue":"3","key":"2059_CR16","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TCSVT.2019.2896270","volume":"30","author":"X Liao","year":"2020","unstructured":"Liao X, Yu Y, Li B, Li Z, Qin Z (2020) A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Video Technol 30(3):685\u2013696. https:\/\/doi.org\/10.1109\/TCSVT.2019.2896270","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"2059_CR17","doi-asserted-by":"publisher","first-page":"73110","DOI":"10.1109\/ACCESS.2021.3080576","volume":"9","author":"S Battiato","year":"2021","unstructured":"Battiato S, Giudice O, Guarnera F, Puglisi G (2021) First quantization estimation by a robust data exploitation strategy of dct coefficients. IEEE Access 9:73110\u201373120. https:\/\/doi.org\/10.1109\/ACCESS.2021.3080576","journal-title":"IEEE Access"},{"key":"2059_CR18","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1016\/j.sigpro.2019.06.034","volume":"164","author":"Y Yao","year":"2019","unstructured":"Yao Y, Zhang W, Wang H, Zhou H, Yu N (2019) Content-adaptive reversible visible watermarking in encrypted images. Signal Process 164:386\u2013401. https:\/\/doi.org\/10.1016\/j.sigpro.2019.06.034","journal-title":"Signal Process"},{"issue":"3","key":"2059_CR19","doi-asserted-by":"publisher","first-page":"50","DOI":"10.5815\/ijmecs.2012.03.07","volume":"4","author":"N Kashyap","year":"2012","unstructured":"Kashyap N, Sinha G (2012) Image watermarking using 3-level discrete wavelet transform (dwt). Int J Modern Education Comput Sci 4(3):50. https:\/\/doi.org\/10.5815\/ijmecs.2012.03.07","journal-title":"Int J Modern Education Comput Sci"},{"issue":"2","key":"2059_CR20","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1109\/TDSC.2020.3004708","volume":"19","author":"X Liao","year":"2022","unstructured":"Liao X, Yin J, Chen M, Qin Z (2022) Adaptive payload distribution in multiple images steganography based on image texture features. IEEE Trans Depend Sec Comput 19(2):897\u2013911. https:\/\/doi.org\/10.1109\/TDSC.2020.3004708","journal-title":"IEEE Trans Depend Sec Comput"},{"key":"2059_CR21","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1007\/s11042-013-1375-2","volume":"72","author":"P Pandey","year":"2014","unstructured":"Pandey P, Kumar S, Singh SK (2014) Rightful ownership through im- age adaptive dwt-and watermarking algorithm and perceptual tweaking. Multimedia Tools Appl 72:723\u2013748. https:\/\/doi.org\/10.1007\/s11042-013-1375-2","journal-title":"Multimedia Tools Appl"},{"key":"2059_CR22","doi-asserted-by":"publisher","first-page":"1531","DOI":"10.1007\/s11760-013-0607-2","volume":"9","author":"N Yadav","year":"2015","unstructured":"Yadav N, Singh K (2015) Robust image-adaptive watermarking using an adjustable dynamic strength factor. Signal Image Video Process 9:1531\u20131542. https:\/\/doi.org\/10.1007\/s11760-013-0607-2","journal-title":"Signal Image Video Process"},{"issue":"2","key":"2059_CR23","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s00371-020-01808-6","volume":"37","author":"S Bagheri Baba Ahmadi","year":"2021","unstructured":"Bagheri Baba Ahmadi S, Zhang G, Wei S, Boukela L (2021) An intelligent and blind image watermarking scheme based on hybrid and trans- forms using human visual system characteristics. Visual Comput 37(2):385\u2013409. https:\/\/doi.org\/10.1007\/s00371-020-01808-6","journal-title":"Visual Comput"},{"key":"2059_CR24","doi-asserted-by":"publisher","first-page":"13197","DOI":"10.1007\/s11042-017-4941-1","volume":"77","author":"X-B Kang","year":"2018","unstructured":"Kang X-B, Zhao F, Lin G-F, Chen Y-J (2018) A novel hybrid of duct and svd in dwt domain for robust and invisible blind image watermarking with optimal embedding strength. Multimedia Tools Appl 77:13197\u201313224. https:\/\/doi.org\/10.1007\/s11042-017-4941-1","journal-title":"Multimedia Tools Appl"},{"key":"2059_CR25","doi-asserted-by":"publisher","first-page":"66254","DOI":"10.1109\/ACCESS.2018.2878456","volume":"6","author":"TB Taha","year":"2018","unstructured":"Taha TB, Ngadiran R, Ehkan P (2018) Adaptive image watermarking algorithm based on an efficient perceptual mapping model. IEEE Access 6:66254\u201366267. https:\/\/doi.org\/10.1109\/ACCESS.2018.2878456","journal-title":"IEEE Access"},{"key":"2059_CR26","doi-asserted-by":"publisher","first-page":"20464","DOI":"10.1109\/ACCESS.2018.2819424","volume":"6","author":"F Ernawan","year":"2018","unstructured":"Ernawan F, Kabir MN (2018) A robust image watermarking technique with an optimal dct-psychovisual threshold. IEEE Access 6:20464\u201320480. https:\/\/doi.org\/10.1109\/ACCESS.2018.2819424","journal-title":"IEEE Access"},{"issue":"2","key":"2059_CR27","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1109\/TNSE.2021.3139671","volume":"9","author":"J Tan","year":"2022","unstructured":"Tan J, Liao X, Liu J, Cao Y, Jiang H (2022) Channel Attention image steganography with generative adversarial networks. IEEE Trans Network Sci Eng 9(2):888\u2013903. https:\/\/doi.org\/10.1109\/TNSE.2021.3139671","journal-title":"IEEE Trans Network Sci Eng"},{"issue":"3","key":"2059_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2568224","volume":"10","author":"M Botta","year":"2014","unstructured":"Botta M, Cavagnino D, Pomponiu V (2014) Protecting the content in- integrity of digital imagery with fidelity preservation: an improved version. ACM Trans Multimedia Comput Commun Appl. 10(3):1\u20135. https:\/\/doi.org\/10.1145\/2568224","journal-title":"ACM Trans Multimedia Comput Commun Appl."},{"issue":"3","key":"2059_CR29","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1016\/S0165-1684(00)00239-5","volume":"81","author":"P-T Yu","year":"2001","unstructured":"Yu P-T, Tsai H-H, Lin J-S (2001) Digital watermarking based on neural networks for color images. Signal Process 81(3):663\u2013671. https:\/\/doi.org\/10.1016\/S0165-1684(00)00239-5","journal-title":"Signal Process"},{"key":"2059_CR30","doi-asserted-by":"publisher","unstructured":"Zhang J, Wang N, Xiong F (2002) Hiding a logo watermark into the multiwavelet domain using neural networks,\" in 14th IEEE International Conference on Tools with Artificial Intelligence, 2002. (ICTAI 2002). Proceedings., pp. 477\u2013482, IEEE, 2002. https:\/\/doi.org\/10.1109\/TAI.2002.1180841","DOI":"10.1109\/TAI.2002.1180841"},{"key":"2059_CR31","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1007\/s11042-016-3862-8","volume":"77","author":"A Zear","year":"2018","unstructured":"Zear A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on dwt, dct and svd for application in medicine. Multimedia Tools Appl 77:4863\u20134882. https:\/\/doi.org\/10.1007\/s11042-016-3862-8","journal-title":"Multimedia Tools Appl"},{"key":"2059_CR32","doi-asserted-by":"publisher","first-page":"135831","DOI":"10.1109\/ACCESS.2023.3335172","volume":"11","author":"P Singh","year":"2023","unstructured":"Singh P, Devi KJ, Thakkar HK, Bilal M, Nayyar A, Kwak D (2023) Robust and secure medical image watermarking for edge-enabled e-healthcare. IEEE Access 11:135831\u2013135845","journal-title":"IEEE Access"},{"key":"2059_CR33","doi-asserted-by":"publisher","first-page":"8974","DOI":"10.1109\/ACCESS.2022.3143801","volume":"10","author":"P Singh","year":"2022","unstructured":"Singh P, Devi KJ, Thakkar HK, Kotecha K (2022) Region-based hybrid medical image watermarking scheme for robust and secured transmission in IoMT. IEEE Access 10:8974\u20138993","journal-title":"IEEE Access"},{"issue":"2","key":"2059_CR34","doi-asserted-by":"publisher","first-page":"e3918","DOI":"10.1002\/ett.3918","volume":"32","author":"P Khare","year":"2021","unstructured":"Khare P, Srivastava VK (2021) A secured and robust medical image watermarking approach for protecting integrity of medical images. Trans Emerg Telecommun Technol 32(2):e3918","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"10","key":"2059_CR35","doi-asserted-by":"publisher","first-page":"14045","DOI":"10.1007\/s11042-022-12082-0","volume":"81","author":"R Sinhal","year":"2022","unstructured":"Sinhal R, Sharma S, Ansari IA, Bajaj V (2022) Multipurpose medical image watermarking for effective security solutions. Multimedia Tools Appl 81(10):14045\u201314063","journal-title":"Multimedia Tools Appl"},{"issue":"2","key":"2059_CR36","doi-asserted-by":"publisher","first-page":"198","DOI":"10.3390\/e22020198","volume":"22","author":"V Vukotic'","year":"2020","unstructured":"Vukotic\u2019 V, Chappelier V, Furon T (2020) Are classification deep neural networks good for blind image watermarking. Entropy 22(2):198. https:\/\/doi.org\/10.3390\/e22020198","journal-title":"Entropy"},{"issue":"24","key":"2059_CR37","doi-asserted-by":"publisher","first-page":"13291","DOI":"10.3390\/app132413291","volume":"13","author":"A Odeh","year":"2023","unstructured":"Odeh A, Taleb AA, Alhajahjeh T, Navarro F (2023) Invisible Shield: Unveiling an Efficient Watermarking Solution for Medical Imaging Security. Appl Sci 13(24):13291","journal-title":"Appl Sci"},{"key":"2059_CR38","doi-asserted-by":"publisher","first-page":"102403","DOI":"10.1016\/j.bspc.2020.102403","volume":"66","author":"K Fares","year":"2021","unstructured":"Fares K, Khaldi A, Redouane K, Salah E (2021) Dct & dwt based watermarking scheme for medical information security. Biomed Signal Process Control 66:102403. https:\/\/doi.org\/10.1016\/j.bspc.2020.102403","journal-title":"Biomed Signal Process Control"},{"key":"2059_CR39","doi-asserted-by":"publisher","unstructured":"Zheng W, Mo S, Jin X, Qu Y, Deng F, Shuai J, Xie Z, Zheng C, Long S (2018) Robust and high capacity watermarking for image based on dwt- svd and cnn,\" in 2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 1233\u20131237, IEEE, 2018. https:\/\/doi.org\/10.1109\/ICIEA.2018.8397898","DOI":"10.1109\/ICIEA.2018.8397898"},{"key":"2059_CR40","doi-asserted-by":"publisher","unstructured":"Huynh-The T, Hua C-H, Tu NA, Kim D-S (2019) Robust image watermarking framework powered by the convolutional encoder-decoder network,\" in 2019 Digital Image Computing: Techniques and Applications (DICTA), pp. 1\u20137, IEEE, 2019. https:\/\/doi.org\/10.1109\/DICTA47822.2019.8945866","DOI":"10.1109\/DICTA47822.2019.8945866"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02059-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02059-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02059-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T06:39:33Z","timestamp":1760683173000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02059-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,21]]},"references-count":40,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["2059"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02059-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,21]]},"assertion":[{"value":"28 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}],"article-number":"251"}}