{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T06:11:23Z","timestamp":1774937483326,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T00:00:00Z","timestamp":1735344000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T00:00:00Z","timestamp":1735344000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Education Department of Jilin Province, China","award":["JJKH20240952KJ"],"award-info":[{"award-number":["JJKH20240952KJ"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s40747-024-01723-6","type":"journal-article","created":{"date-parts":[[2024,12,28]],"date-time":"2024-12-28T09:08:14Z","timestamp":1735376894000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Dual medical image watermarking using SRU-enhanced network and EICC chaotic map"],"prefix":"10.1007","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8532-1978","authenticated-orcid":false,"given":"Fei","family":"Yan","sequence":"first","affiliation":[]},{"given":"Zeqian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kaoru","family":"Hirota","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,28]]},"reference":[{"key":"1723_CR1","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1016\/j.inffus.2021.06.007","volume":"76","author":"G Muhammad","year":"2021","unstructured":"Muhammad G, Alshehri F, Karray F, El Saddik A, Alsulaiman M, Falk TH (2021) A comprehensive survey on multimodal medical signals fusion for smart healthcare systems. Inf Fusion 76:355\u2013375","journal-title":"Inf Fusion"},{"key":"1723_CR2","volume":"151","author":"F Yan","year":"2023","unstructured":"Yan F, Huang H, Pedrycz W, Hirota K (2023) A disease diagnosis system for smart healthcare based on fuzzy clustering and battle royale optimization. Appl Soft Comput 151:111123","journal-title":"Appl Soft Comput"},{"key":"1723_CR3","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.cosrev.2017.11.003","volume":"27","author":"AF Qasim","year":"2018","unstructured":"Qasim AF, Meziane F, Aspin R (2018) Digital watermarking: applicability for developing trust in medical imaging workflows state of the art review. Comput Sci Rev 27:45\u201360","journal-title":"Comput Sci Rev"},{"issue":"1","key":"1723_CR4","first-page":"5595180","volume":"2021","author":"X Cai","year":"2021","unstructured":"Cai X, Li X, Razmjooy N, Ghadimi N (2021) Breast cancer diagnosis by convolutional neural network and advanced thermal exchange optimization algorithm. Comput Math Methods Med 2021(1):5595180","journal-title":"Comput Math Methods Med"},{"key":"1723_CR5","volume":"78","author":"F Yan","year":"2023","unstructured":"Yan F, Li N, Iliyasu AM, Salama AS, Hirota K (2023) Insights into security and privacy issues in smart healthcare systems based on medical images. J Inf Secur Appl 78:103621","journal-title":"J Inf Secur Appl"},{"issue":"2","key":"1723_CR6","doi-asserted-by":"crossref","first-page":"2187","DOI":"10.1007\/s40747-023-01258-2","volume":"10","author":"L Zhang","year":"2024","unstructured":"Zhang L, Song X, El-Latif AAA, Zhao Y, Abd-El-Atty B (2024) Reversibly selective encryption for medical images based on coupled chaotic maps and steganography. Complex Intell Syst 10(2):2187\u20132213","journal-title":"Complex Intell Syst"},{"issue":"1","key":"1723_CR7","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1007\/s10489-021-02476-2","volume":"52","author":"Z Xia","year":"2022","unstructured":"Xia Z, Wang X, Wang C, Wang C, Ma B, Li Q, Wang M, Zhao T (2022) A robust zero-watermarking algorithm for lossless copyright protection of medical images. Appl Intell 52(1):607\u2013621","journal-title":"Appl Intell"},{"key":"1723_CR8","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2024.109451","volume":"118","author":"D Awasthi","year":"2024","unstructured":"Awasthi D, Khare P, Srivastava VK, Singh AK (2024) Anfis optimization-based watermarking for securing integrity of medical images with blockchain authentication. Comput Electr Eng 118:109451","journal-title":"Comput Electr Eng"},{"issue":"4","key":"1723_CR9","doi-asserted-by":"crossref","first-page":"1265","DOI":"10.1109\/TCSS.2021.3125025","volume":"9","author":"A Anand","year":"2021","unstructured":"Anand A, Singh AK (2021) SDH: secure data hiding in fused medical image for smart healthcare. IEEE Trans Comput Soc Syst 9(4):1265\u20131273","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"4","key":"1723_CR10","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MCOM.2018.1700817","volume":"56","author":"A Ghoneim","year":"2018","unstructured":"Ghoneim A, Muhammad G, Amin SU, Gupta B (2018) Medical image forgery detection for smart healthcare. IEEE Commun Mag 56(4):33\u201337","journal-title":"IEEE Commun Mag"},{"key":"1723_CR11","volume":"226","author":"S Kumar","year":"2023","unstructured":"Kumar S, Sharma NK, Kumar N (2023) Wsomark: an adaptive dual-purpose color image watermarking using white shark optimizer and Levenberg\u2013Marquardt BPNN. Expert Syst Appl 226:120137","journal-title":"Expert Syst Appl"},{"issue":"1","key":"1723_CR12","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1109\/TII.2022.3172622","volume":"19","author":"A Anand","year":"2022","unstructured":"Anand A, Singh AK, Zhou H (2022) Vimdh: visible-imperceptible medical data hiding for internet of medical things. IEEE Trans Ind Inf 19(1):849\u2013856","journal-title":"IEEE Trans Ind Inf"},{"key":"1723_CR13","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1016\/j.aej.2023.07.068","volume":"78","author":"MM Eltoukhy","year":"2023","unstructured":"Eltoukhy MM, Khedr AE, Abdel-Aziz MM, Hosny KM (2023) Robust watermarking method for securing color medical images using Slant-SVD-QFT transforms and OTP encryption. Alex Eng J 78:517\u2013529","journal-title":"Alex Eng J"},{"key":"1723_CR14","doi-asserted-by":"crossref","DOI":"10.1016\/j.bspc.2023.105015","volume":"84","author":"G Azizoglu","year":"2023","unstructured":"Azizoglu G, Toprak AN (2023) A novel reversible fragile watermarking method in DWT domain for tamper localization and digital image authentication. Biomed Signal Process Control 84:105015","journal-title":"Biomed Signal Process Control"},{"issue":"1","key":"1723_CR15","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1007\/s00034-023-02479-z","volume":"43","author":"R Dwivedi","year":"2024","unstructured":"Dwivedi R, Awasthi D, Srivastava VK (2024) An optimized dual image watermarking scheme based on redundant DWT and randomized SVD with henon mapping encryption. Circuits Syst Signal Process 43(1):408\u2013456","journal-title":"Circuits Syst Signal Process"},{"issue":"11","key":"1723_CR16","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1007\/s10462-024-10932-x","volume":"57","author":"F Yan","year":"2024","unstructured":"Yan F, Huang H, Pedrycz W, Hirota K (2024) Review of medical image processing using quantum-enabled algorithms. Artif Intell Rev 57(11):300","journal-title":"Artif Intell Rev"},{"key":"1723_CR17","doi-asserted-by":"crossref","DOI":"10.1016\/j.bspc.2020.102403","volume":"66","author":"K Fares","year":"2021","unstructured":"Fares K, Khaldi A, Redouane K, Salah E (2021) DCT & DWT based watermarking scheme for medical information security. Biomed Signal Process Control 66:102403","journal-title":"Biomed Signal Process Control"},{"issue":"1","key":"1723_CR18","first-page":"1051","volume":"19","author":"AK Singh","year":"2022","unstructured":"Singh AK, Anand A (2022) A hybrid optimization-based medical data hiding scheme for industrial internet of things security. IEEE Trans Ind Inf 19(1):1051\u20131058","journal-title":"IEEE Trans Ind Inf"},{"key":"1723_CR19","doi-asserted-by":"crossref","first-page":"6360","DOI":"10.1109\/JBHI.2023.3257340","volume":"28","author":"B Han","year":"2023","unstructured":"Han B, Wang H, Qiao D, Xu J, Yan T (2023) Application of zero-watermarking scheme based on swin transformer for securing the metaverse healthcare data. IEEE J Biomed Health Inform 28:6360\u20136369","journal-title":"IEEE J Biomed Health Inform"},{"key":"1723_CR20","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119810","volume":"653","author":"SA Nawaz","year":"2024","unstructured":"Nawaz SA, Li J, Bhatti UA, Shoukat MU, Li D, Raza MA (2024) Hybrid watermarking algorithm for medical images based on digital transformation and MobileNetV2. Inf Sci 653:119810","journal-title":"Inf Sci"},{"key":"1723_CR21","doi-asserted-by":"crossref","first-page":"16549","DOI":"10.1007\/s11042-020-08814-9","volume":"80","author":"HS Alshanbari","year":"2021","unstructured":"Alshanbari HS (2021) Medical image watermarking for ownership & tamper detection. Multimed Tools Appl 80:16549\u201316564","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"1723_CR22","doi-asserted-by":"crossref","first-page":"8885","DOI":"10.1109\/TII.2022.3159863","volume":"18","author":"F Yan","year":"2022","unstructured":"Yan F, Huang H, Yu X (2022) A multiwatermarking scheme for verifying medical image integrity and authenticity in the internet of medical things. IEEE Trans Ind Inf 18(12):8885\u20138894","journal-title":"IEEE Trans Ind Inf"},{"key":"1723_CR23","first-page":"1","volume":"24","author":"R Sinhal","year":"2023","unstructured":"Sinhal R, Ansari IA (2023) Machine learning based multipurpose medical image watermarking. Neural Comput Appl 24:1\u201322","journal-title":"Neural Comput Appl"},{"issue":"1","key":"1723_CR24","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/s42235-022-00255-4","volume":"20","author":"FS Gharehchopogh","year":"2023","unstructured":"Gharehchopogh FS, Nadimi-Shahraki MH, Barshandeh S, Abdollahzadeh B, Zamani H (2023) Cqffa: a chaotic quasi-oppositional farmland fertility algorithm for solving engineering optimization problems. J Bionic Eng 20(1):158\u2013183","journal-title":"J Bionic Eng"},{"issue":"10","key":"1723_CR25","doi-asserted-by":"crossref","first-page":"13002","DOI":"10.1109\/TIE.2024.3357878","volume":"71","author":"W Liu","year":"2024","unstructured":"Liu W, Sun K, Wang H, Li B (2024) Delayed feedback chaotification model and its hardware implementation. IEEE Trans Ind Electron 71(10):13002\u201313011","journal-title":"IEEE Trans Ind Electron"},{"key":"1723_CR26","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403\u2013419","journal-title":"Inf Sci"},{"key":"1723_CR27","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2023.114111","volume":"176","author":"G Long","year":"2023","unstructured":"Long G, Chai X, Gan Z, Jiang D, He X, Sun M (2023) Exploiting one-dimensional exponential Chebyshev chaotic map and matching embedding for visually meaningful image encryption. Chaos Solitons Fract 176:114111","journal-title":"Chaos Solitons Fract"},{"issue":"4","key":"1723_CR28","doi-asserted-by":"crossref","first-page":"2979","DOI":"10.1007\/s11071-023-09203-1","volume":"112","author":"Z Gan","year":"2024","unstructured":"Gan Z, Xiong B, Pang Z, Chai X, Jiang D, He X (2024) A visually secure image encryption scheme using newly designed 1D sinusoidal chaotic map and P-tensor product compressive sensing. Nonlinear Dyn 112(4):2979\u20133001","journal-title":"Nonlinear Dyn"},{"key":"1723_CR29","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.122030","volume":"238","author":"SS Jamal","year":"2024","unstructured":"Jamal SS, Hazzazi MM, Khan MF, Bassfar Z, Aljaedi A, ul Islam Z (2024) Region of interest-based medical image encryption technique based on chaotic S-boxes. Expert Syst Appl 238:122030","journal-title":"Expert Syst Appl"},{"key":"1723_CR30","doi-asserted-by":"crossref","DOI":"10.1016\/j.chaos.2024.115153","volume":"185","author":"X Chai","year":"2024","unstructured":"Chai X, Shang G, Wang B, Gan Z, Zhang W (2024) Exploiting 2D-SDMCHM and matching embedding driven by flag-shaped hexagon prediction for visually meaningful medical image cryptosystem. Chaos Solitons Fract 185:115153","journal-title":"Chaos Solitons Fract"},{"key":"1723_CR31","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.119076","volume":"213","author":"U Erkan","year":"2023","unstructured":"Erkan U, Toktas A, Lai Q (2023) 2D hyperchaotic system based on Schaffer function for image encryption. Expert Syst Appl 213:119076","journal-title":"Expert Syst Appl"},{"issue":"10","key":"1723_CR32","first-page":"8245","volume":"34","author":"J Wang","year":"2022","unstructured":"Wang J, Liu L, Xu M, Li X (2022) A novel content-selected image encryption algorithm based on the LS chaotic model. J King Saud Univ Comput Inf Sci 34(10):8245\u20138259","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"1723_CR33","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.ins.2022.05.032","volume":"605","author":"L Teng","year":"2022","unstructured":"Teng L, Wang X, Xian Y (2022) Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion. Inf Sci 605:71\u201385","journal-title":"Inf Sci"},{"key":"1723_CR34","volume":"227","author":"F Yan","year":"2023","unstructured":"Yan F, Huang H, Pedrycz W, Hirota K (2023) Automated breast cancer detection in mammography using ensemble classifier and feature weighting algorithms. Expert Syst Appl 227:120282","journal-title":"Expert Syst Appl"},{"key":"1723_CR35","doi-asserted-by":"crossref","unstructured":"Li J, Wen Y, He L (2023) Scconv: spatial and channel reconstruction convolution for feature redundancy. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 6153\u20136162","DOI":"10.1109\/CVPR52729.2023.00596"},{"key":"1723_CR36","doi-asserted-by":"crossref","unstructured":"Woo S, Debnath S, Hu R, Chen X, Liu Z, Kweon IS, Xie S (2023) Convnext v2: co-designing and scaling convnets with masked autoencoders. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 16133\u201316142","DOI":"10.1109\/CVPR52729.2023.01548"},{"key":"1723_CR37","volume":"216","author":"Z Xia","year":"2021","unstructured":"Xia Z, Wang X, Wang C, Ma B, Wang M, Shi Y-Q (2021) Local quaternion polar harmonic Fourier moments-based multiple zero-watermarking scheme for color medical images. Knowl-Based Syst 216:106568","journal-title":"Knowl-Based Syst"},{"issue":"6","key":"1723_CR38","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1049\/bme2.12102","volume":"11","author":"D Li","year":"2022","unstructured":"Li D, Chen Y, Li J, Cao L, Bhatti UA, Zhang P (2022) Robust watermarking algorithm for medical images based on accelerated-KAZE discrete cosine transform. IET Biometr 11(6):534\u2013546","journal-title":"IET Biometr"},{"issue":"1","key":"1723_CR39","first-page":"293","volume":"75","author":"M Sheng","year":"2023","unstructured":"Sheng M, Li J, Bhatti UA, Liu J, Huang M, Chen Y-W (2023) Zero watermarking algorithm for medical image based on Resnet50-DCT. CMC Comput Mater Contin 75(1):293\u2013309","journal-title":"CMC Comput Mater Contin"},{"issue":"7","key":"1723_CR40","doi-asserted-by":"crossref","first-page":"1554","DOI":"10.3390\/electronics12071554","volume":"12","author":"D Li","year":"2023","unstructured":"Li D, Li J, Bhatti UA, Nawaz SA, Liu J, Chen Y-W, Cao L (2023) Hybrid encrypted watermarking algorithm for medical images based on DCT and improved DarkNet53. Electronics 12(7):1554","journal-title":"Electronics"},{"key":"1723_CR41","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2023.108985","volume":"112","author":"SA Nawaz","year":"2023","unstructured":"Nawaz SA, Li J, Shoukat MU, Bhatti UA, Raza MA (2023) Hybrid medical image zero watermarking via discrete wavelet transform-ResNet101 and discrete cosine transform. Comput Electr Eng 112:108985","journal-title":"Comput Electr Eng"},{"key":"1723_CR42","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1016\/j.patrec.2016.12.010","volume":"94","author":"IA Ansari","year":"2017","unstructured":"Ansari IA, Pant M (2017) Multipurpose image watermarking in the domain of DWT based on SVD and ABC. Pattern Recogn Lett 94:228-236","journal-title":"Pattern Recogn Lett"},{"issue":"10","key":"1723_CR43","doi-asserted-by":"crossref","first-page":"14045","DOI":"10.1007\/s11042-022-12082-0","volume":"81","author":"R Sinhal","year":"2022","unstructured":"Sinhal R, Sharma S, Ansari IA, Bajaj V (2022) Multipurpose medical image watermarking for effective security solutions. Multimed Tools Appl 81(10):14045\u201314063","journal-title":"Multimed Tools Appl"},{"key":"1723_CR44","doi-asserted-by":"crossref","DOI":"10.1016\/j.image.2021.116523","volume":"100","author":"O Evsutin","year":"2022","unstructured":"Evsutin O, Dzhanashia K (2022) Watermarking schemes for digital images: robustness overview. Signal Process Image Commun 100:116523","journal-title":"Signal Process Image Commun"},{"issue":"1","key":"1723_CR45","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1515\/med-2020-0131","volume":"15","author":"Z Xu","year":"2020","unstructured":"Xu Z, Sheykhahmad FR, Ghadimi N, Razmjooy N (2020) Computer-aided diagnosis of skin cancer based on soft computing techniques. Open Med 15(1):860\u2013871","journal-title":"Open Med"},{"key":"1723_CR46","doi-asserted-by":"crossref","unstructured":"Zhang L, Zhang J, Gao W, Bai F, Li N, Ghadimi N (2024) A deep learning outline aimed at prompt skin cancer detection utilizing gated recurrent unit networks and improved orca predation algorithm. Biomed Signal Process Control 90:105858","DOI":"10.1016\/j.bspc.2023.105858"},{"key":"1723_CR47","volume":"91","author":"H Liu","year":"2024","unstructured":"Liu H, Ghadimi N (2024) Hybrid convolutional neural network and Flexible Dwarf Mongoose Optimization Algorithm for strong kidney stone diagnosis. Biomed Signal Process Control 91:106024","journal-title":"Biomed Signal Process Control"},{"issue":"1","key":"1723_CR48","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1515\/med-2018-0002","volume":"13","author":"N Razmjooy","year":"2018","unstructured":"Razmjooy N, Sheykhahmad FR, Ghadimi N (2018) A hybrid neural network-world cup optimization algorithm for melanoma detection. Open Med 13(1):9\u201316","journal-title":"Open Med"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01723-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-024-01723-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01723-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T20:20:38Z","timestamp":1738268438000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-024-01723-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,28]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1723"],"URL":"https:\/\/doi.org\/10.1007\/s40747-024-01723-6","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,28]]},"assertion":[{"value":"25 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All authors read and agreed to participate in the final manuscript.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All authors agreed to publish this paper, if accepted.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"101"}}