{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T06:53:11Z","timestamp":1775976791282,"version":"3.50.1"},"reference-count":34,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T00:00:00Z","timestamp":1763337600000},"content-version":"vor","delay-in-days":320,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Quantum Communication"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>\n                    Medical image integrity is critical as telemedicine, cloud PACS and AI\u2010assisted diagnostics become routine. We present a tamper localisation framework that embeds authentication signatures in the\n                    <jats:italic>phase domain<\/jats:italic>\n                    of blockwise quantum Fourier transform (QFT) coefficients. The watermark is phase\u2010only, energy preserving and keyed through sparse midband supports with paired phase differences; a light cross\u2010block coupling imposes spatial consistency so that localised edits produce coherent high\u2010contrast residuals confined to manipulated regions after inverse QFT. Because magnitudes remain unaltered, benign photometric variations are naturally attenuated, improving specificity under common acquisition and storage pipelines. The verifier computes circular phase residuals and applies an adaptive threshold to generate blockwise tamper maps, which are refined to pixel resolution. Across standard distortions (JPEG recompression, Gaussian noise and blur) and localised forgeries (copy\u2013move, inpainting and contrast edits), the scheme maintains diagnostic fidelity (typical PSNR  40\u00a0dB, SSIM  0.98) while delivering precise spatially resolved detection. The design is deterministic and reproducible via seeded keys, integrates with DICOM workflows and is amenable to future quantum hardware realisation. This work contributes a quantum\u2010ready, imperceptible and localisation\u2010oriented approach to medical image authentication suitable for deployment in modern healthcare systems. The proposed QFT phase\u2013only watermark achieves imperceptibility (global PSNR \u2009dB; SSIM ) and detects localised tampering (ROC AUC  under class imbalance).\n                  <\/jats:p>","DOI":"10.1049\/qtc2.70023","type":"journal-article","created":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T16:33:34Z","timestamp":1763397214000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Tamper Localisation Using Quantum Fourier Transform Signatures for Medical Image Authentication"],"prefix":"10.1049","volume":"6","author":[{"given":"Kumar Sekhar","family":"Roy","sequence":"first","affiliation":[{"name":"School of Computer Engineering Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education  Manipal India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8094-2289","authenticated-orcid":false,"given":"Shweta","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education  Manipal India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ruhul Amin","family":"Hazarika","sequence":"additional","affiliation":[{"name":"Dipartimento di Ingegneria Informatica Modellistica, Elettronica e Sistemistica (DIMES) University of Calabria  Rende Cosenza Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3714-9453","authenticated-orcid":false,"given":"Sk Mahmudul","family":"Hassan","sequence":"additional","affiliation":[{"name":"School of Computer Engineering Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education  Manipal India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Himanshu Ranjan","family":"Das","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering Haldia Institute of Technology  Haldia West Bengal India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"265","published-online":{"date-parts":[[2025,11,17]]},"reference":[{"key":"e_1_2_15_2_1","doi-asserted-by":"publisher","DOI":"10.1117\/1.1494075"},{"key":"e_1_2_15_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2005.855418"},{"key":"e_1_2_15_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2921894"},{"key":"e_1_2_15_5_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511976667"},{"key":"e_1_2_15_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3072075"},{"key":"e_1_2_15_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/e24040538"},{"key":"e_1_2_15_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym12010137"},{"key":"e_1_2_15_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2964516"},{"key":"e_1_2_15_10_1","doi-asserted-by":"publisher","DOI":"10.1093\/nsr\/nwac228"},{"key":"e_1_2_15_11_1","doi-asserted-by":"publisher","DOI":"10.1364\/ol.426369"},{"key":"e_1_2_15_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.101980"},{"key":"e_1_2_15_13_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598\u2010024\u201062415\u20102"},{"key":"e_1_2_15_14_1","doi-asserted-by":"publisher","DOI":"10.1049\/qtc2.12049"},{"key":"e_1_2_15_15_1","doi-asserted-by":"publisher","DOI":"10.1049\/qtc2.70010"},{"key":"e_1_2_15_16_1","doi-asserted-by":"publisher","DOI":"10.1049\/qtc2.70006"},{"key":"e_1_2_15_17_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598\u2010025\u201090725\u20106"},{"key":"e_1_2_15_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3523530"},{"key":"e_1_2_15_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2025.3558294"},{"key":"e_1_2_15_20_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598\u2010025\u201086658\u20109"},{"key":"e_1_2_15_21_1","doi-asserted-by":"publisher","DOI":"10.71129\/ijaci.v1.i1.pp28\u201038"},{"key":"e_1_2_15_22_1","doi-asserted-by":"publisher","DOI":"10.71129\/ijaci.v1.i1.pp1\u201012"},{"key":"e_1_2_15_23_1","doi-asserted-by":"publisher","DOI":"10.71129\/ijaci.v1.i1.pp13\u201027"},{"key":"e_1_2_15_24_1","doi-asserted-by":"publisher","DOI":"10.71129\/ijaci.v1.i1.pp39\u201047"},{"key":"e_1_2_15_25_1","doi-asserted-by":"publisher","DOI":"10.71129\/ijaci.v1.i2.pp89\u201098"},{"key":"e_1_2_15_26_1","doi-asserted-by":"publisher","DOI":"10.71129\/ijaci.v2i1.pp41\u201052"},{"key":"e_1_2_15_27_1","doi-asserted-by":"publisher","DOI":"10.71129\/ijaci.v2i1.pp62\u201074"},{"key":"e_1_2_15_28_1","volume-title":"Handbook of Applied Cryptography","author":"Menezes A. J.","year":"2018"},{"key":"e_1_2_15_29_1","volume-title":"Cryptography Engineering: Design Principles and Practical Applications","author":"Ferguson N.","year":"2011"},{"key":"e_1_2_15_30_1","volume-title":"Digital Image Processing","author":"Gonzalez R. C.","year":"2009"},{"key":"e_1_2_15_31_1","first-page":"56","volume-title":"Digital Watermarking","author":"Cox I. J.","year":"2008"},{"key":"e_1_2_15_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2012.2190402"},{"key":"e_1_2_15_33_1","volume-title":"Effective Cybersecurity: A Guide to Using Best Practices and Standards","author":"Stallings W.","year":"2018"},{"key":"e_1_2_15_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042\u2010023\u201016482\u20108"},{"key":"e_1_2_15_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/s0262\u20108856(03)00137\u20109"}],"container-title":["IET Quantum Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/qtc2.70023","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/qtc2.70023","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/qtc2.70023","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T06:30:16Z","timestamp":1775975416000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/qtc2.70023"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1049\/qtc2.70023"],"URL":"https:\/\/doi.org\/10.1049\/qtc2.70023","archive":["Portico"],"relation":{},"ISSN":["2632-8925","2632-8925"],"issn-type":[{"value":"2632-8925","type":"print"},{"value":"2632-8925","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2025-09-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-29","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-11-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70023"}}