{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T10:00:44Z","timestamp":1771754444642,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T00:00:00Z","timestamp":1657152000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T00:00:00Z","timestamp":1657152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cogn Comput"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s12559-022-10040-4","type":"journal-article","created":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T09:03:28Z","timestamp":1657184608000},"page":"1947-1963","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["WatMIF: Multimodal Medical Image Fusion-Based Watermarking for Telehealth Applications"],"prefix":"10.1007","volume":"16","author":[{"given":"Kedar Nath","family":"Singh","sequence":"first","affiliation":[]},{"given":"Om Prakash","family":"Singh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7359-2068","authenticated-orcid":false,"given":"Amit Kumar","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Amrit Kumar","family":"Agrawal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,7]]},"reference":[{"key":"10040_CR1","doi-asserted-by":"crossref","unstructured":"Masood F, Driss M, Boulila W, Ahmad J, Rehman SU, Jan SU, Qayyum A, Buchanan WJ. A lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations. Wirel Pers Commun. 2021 pp.1\u201328.","DOI":"10.1007\/s11277-021-08584-z"},{"key":"10040_CR2","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s00530-021-00835-0","volume":"28","author":"B Fan","year":"2022","unstructured":"Fan B, Li Z, Gao J. DwiMark: a multiscale robust deep watermarking framework for diffusion-weighted imaging images. Multimedia Syst. 2022;28:295\u2013310.","journal-title":"Multimedia Syst"},{"key":"10040_CR3","doi-asserted-by":"crossref","unstructured":"Anand A, Singh AK. Hybrid nature-inspired optimization and encryption-based watermarking for e-healthcare. IEEE Transactions on Computational Social Systems.\u00a02022.","DOI":"10.1109\/TCSS.2022.3140862"},{"key":"10040_CR4","doi-asserted-by":"crossref","unstructured":"Wang B, Shi J, Wang W, Zhao P. Image copyright protection based on blockchain and zero-watermark. IEEE Transactions on Network Science and Engineering. 2022.","DOI":"10.1109\/TNSE.2022.3157867"},{"key":"10040_CR5","doi-asserted-by":"publisher","first-page":"3703","DOI":"10.1007\/s00500-022-06841-2","volume":"26","author":"M Kaur","year":"2022","unstructured":"Kaur M, Singh D, Kumar V. Improved seven-dimensional (i7D) hyperchaotic map-based image encryption technique. Soft Comput. 2022;26:3703\u201312.","journal-title":"Soft Comput"},{"issue":"3","key":"10040_CR6","doi-asserted-by":"publisher","first-page":"2022","DOI":"10.1145\/3498342","volume":"18","author":"KN Singh","year":"2022","unstructured":"Singh KN, Singh AK. Towards integrating image encryption with compression: a survey. ACM Trans Multimedia Comput Commun Appl. 2022;18(3):2022.","journal-title":"ACM Trans Multimedia Comput Commun Appl"},{"key":"10040_CR7","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.comcom.2022.02.023","volume":"188","author":"P Amrit","year":"2022","unstructured":"Amrit P, Singh AK. Survey on watermarking methods in the artificial intelligence domain and beyond. Comput Commun. 2022;188:52\u201365.","journal-title":"Comput Commun"},{"key":"10040_CR8","doi-asserted-by":"crossref","unstructured":"Singh OP, Singh AK. A robust information hiding algorithm based on lossless encryption and NSCT-HD-SVD.\u00a0Mach Vis Appl.\u00a02021;32(101).","DOI":"10.1007\/s00138-021-01227-0"},{"key":"10040_CR9","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.neucom.2022.02.083","volume":"488","author":"W Wan","year":"2022","unstructured":"Wan W, Wang J, Zhang Y, Li J, Yu H, Sun J. A comprehensive survey on robust image watermarking. Neurocomputing. 2022;488:226\u201347.","journal-title":"Neurocomputing"},{"key":"10040_CR10","doi-asserted-by":"crossref","unstructured":"Anand A, Singh AK, Lv Z, Bhatnagar G. Compression-then-encryption-based secure watermarking technique for smart healthcare system. in IEEE MultiMedia. 2020;27(4):133\u2013143.","DOI":"10.1109\/MMUL.2020.2993269"},{"issue":"7","key":"10040_CR11","doi-asserted-by":"publisher","first-page":"3142","DOI":"10.1109\/TIP.2017.2662206","volume":"26","author":"K Zhang","year":"2017","unstructured":"Zhang K, Zuo W, Chen Y, Meng D, Zhang L. Beyond a Gaussian Denoiser: residual learning of deep CNN for image denoising. IEEE Trans Image Process. 2017;26(7):3142\u201355.","journal-title":"IEEE Trans Image Process"},{"key":"10040_CR12","doi-asserted-by":"crossref","unstructured":"Anand A, Singh AK. Health record security through multiple watermarking on fused medical images. IEEE Transactions on Computational Social Systems. 2021.","DOI":"10.1109\/TCSS.2021.3126628"},{"key":"10040_CR13","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1007\/s11042-021-11445-3","volume":"81","author":"R Bhardwaj","year":"2022","unstructured":"Bhardwaj R. Hiding patient information in medical images: an encrypted dual image reversible and secure patient data hiding algorithm for e-healthcare. Multimed Tools Appl. 2022;81:1125\u201352.","journal-title":"Multimed Tools Appl"},{"key":"10040_CR14","unstructured":"Vaidya SP. Fingerprint-based robust medical image watermarking in hybrid transform.\u00a0Visl Comput. 2022 pp. 1\u201316."},{"key":"10040_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2022.104490","volume":"90","author":"MM Sayah","year":"2022","unstructured":"Sayah MM, Redouane K, Amine K. A wavelet based medical image watermarking scheme for secure transmission in telemedicine applications. Microprocess Microsyst. 2022;90: 104490.","journal-title":"Microprocess Microsyst"},{"key":"10040_CR16","volume":"35","author":"M Ramzan","year":"2022","unstructured":"Ramzan M, Habib M, Khan SA. Secure and efficient privacy protection system for medical records. Sustainable Computing: Informatics and Systems. 2022;35: 100717.","journal-title":"Sustainable Computing: Informatics and Systems"},{"key":"10040_CR17","doi-asserted-by":"crossref","unstructured":"Manikandan V, Amirtharajan R. A simple embed over encryption scheme for DICOM images using B\u00fclban Map.\u00a0Med Biol Eng Comput. 2022;60:701\u2013717.","DOI":"10.1007\/s11517-021-02499-4"},{"key":"10040_CR18","doi-asserted-by":"crossref","unstructured":"Singh P et al. Region-based hybrid medical image watermarking scheme for robust and secured transmission in IoMT. IEEE Access.\u00a02022.","DOI":"10.1109\/ACCESS.2022.3143801"},{"key":"10040_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116193","volume":"190","author":"A Daoui","year":"2022","unstructured":"Daoui A, Karmouni H, Sayyouri M, Qjidaa H. Robust image encryption and zero-watermarking scheme using SCA and modified logistic map. Expert Syst Appl. 2022;190: 116193.","journal-title":"Expert Syst Appl"},{"key":"10040_CR20","doi-asserted-by":"publisher","first-page":"30127","DOI":"10.1109\/ACCESS.2020.2972296","volume":"8","author":"H Li","year":"2020","unstructured":"Li H, Deng L, Gu Z. A robust image encryption algorithm based on a 32-bit chaotic system. IEEE Access. 2020;8:30127\u201351.","journal-title":"IEEE Access"},{"key":"10040_CR21","unstructured":"https:\/\/openi.nlm.nih.gov\/gridquery?it=xg,c,m&m=1&n=100. Accessed 25 Mar 2022."},{"key":"10040_CR22","unstructured":"https:\/\/github.com\/ml-workgroup\/covid-19-image-repository\/tree\/master\/png. Accessed 25 Mar 2022."},{"key":"10040_CR23","volume-title":"An introduction to multivariate statistical analysis","author":"TW Anderson","year":"1958","unstructured":"Anderson TW. An introduction to multivariate statistical analysis. New York: Wiley; 1958."},{"key":"10040_CR24","doi-asserted-by":"publisher","unstructured":"Lin H, Wang C, Cui L, Sun Y, Xu C, Yu F. Brain-like initial-boosted hyperchaos and application in biomedical image encryption. IEEE Trans Ind Inf.\u00a02022.\u00a0https:\/\/doi.org\/10.1109\/TII.2022.3155599.","DOI":"10.1109\/TII.2022.3155599"},{"key":"10040_CR25","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1007\/s11517-021-02499-4","volume":"60","author":"V Manikandan","year":"2022","unstructured":"Manikandan V, Amirtharajan R. A simple embed over encryption scheme for DICOM images using B\u00fclban Map. Med Biol Eng Comput. 2022;60:701\u201317.","journal-title":"Med Biol Eng Comput"},{"key":"10040_CR26","doi-asserted-by":"publisher","first-page":"7253","DOI":"10.1007\/s11042-021-11812-0","volume":"81","author":"P Sarosh","year":"2022","unstructured":"Sarosh P, Parah SA, Bhat GM. An efficient image encryption scheme for healthcare applications. Multimed Tools Appl. 2022;81:7253\u201370.","journal-title":"Multimed Tools Appl"},{"key":"10040_CR27","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.ins.2022.05.032","volume":"605","author":"L Teng","year":"2022","unstructured":"Teng L, Wang X, Xian Y. Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion. Inf Sci. 2022;605:71\u201385.","journal-title":"Inf Sci"},{"key":"10040_CR28","doi-asserted-by":"crossref","unstructured":"Adeel A, Ahmad J, Larijani H, Hussain A. A novel real-time, lightweight chaotic-encryption scheme for next-generation audio-visual hearing aids. Cogn Comput. 2020;12.","DOI":"10.1007\/s12559-019-09653-z"},{"key":"10040_CR29","unstructured":"Adeel A, Ahmad J, Hussain A. Real-time lightweight chaotic encryption for 5g iot enabled lip-reading driven secure hearing-aid. 2018. arXiv preprint arXiv:1809.04966."},{"issue":"08","key":"10040_CR30","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S. Some basic cryptographic requirements for chaosbased cryptosystems. International journal of bifurcation and chaos. 2006;16(08):2129\u201351.","journal-title":"International journal of bifurcation and chaos"},{"key":"10040_CR31","doi-asserted-by":"crossref","unstructured":"Anand A, Singh AK. An improved DWT-SVD domain watermarking for medical information security. Comput Commun. 2020;152:72\u201380.","DOI":"10.1016\/j.comcom.2020.01.038"},{"key":"10040_CR32","doi-asserted-by":"crossref","unstructured":"Singh OP, Singh AK. Data hiding in encryption\u2013compression domain. Complex Intell Syst.\u00a02021.","DOI":"10.1007\/s40747-021-00309-w"},{"key":"10040_CR33","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3918","volume":"32","author":"P Khare","year":"2021","unstructured":"Khare P, Srivastava VK. A Secured and robust medical image watermarking approach for protecting integrity of medical images. Trans Emerging Tel Tech. 2021;32: e3918.","journal-title":"Trans Emerging Tel Tech"},{"key":"10040_CR34","doi-asserted-by":"publisher","unstructured":"Anand A, Singh AK. Dual watermarking for security of COVID-19 patient record. IEEE Transactions on Dependable and Secure Computing.\u00a02022. https:\/\/doi.org\/10.1109\/TDSC.2022.3144657.","DOI":"10.1109\/TDSC.2022.3144657"}],"container-title":["Cognitive Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-022-10040-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12559-022-10040-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-022-10040-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T23:51:41Z","timestamp":1744156301000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12559-022-10040-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,7]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["10040"],"URL":"https:\/\/doi.org\/10.1007\/s12559-022-10040-4","relation":{},"ISSN":["1866-9956","1866-9964"],"issn-type":[{"value":"1866-9956","type":"print"},{"value":"1866-9964","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,7]]},"assertion":[{"value":"8 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"Consent was obtained from all individual participants included in the study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Participate"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}