{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T07:07:55Z","timestamp":1746860875797,"version":"3.37.3"},"reference-count":45,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,3,25]],"date-time":"2021-03-25T00:00:00Z","timestamp":1616630400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100007446","name":"King Khalid University","doi-asserted-by":"publisher","award":["R.G.P. 1\/234\/41"],"award-info":[{"award-number":["R.G.P. 1\/234\/41"]}],"id":[{"id":"10.13039\/501100007446","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,3,25]]},"abstract":"<jats:p>In critical domains such as medical and military, reversible watermarking (RW) has been used. In the medical domain, different modalities are used to store patient information. The current study focuses on the application of RW in echocardiography data. Mostly, RW is applied to protect patient data without affecting the quality of the decoded image. The RW methods are benchmarked as per imperceptibility, robustness, and payload. The survey presents a comparison of state-of-the-art RW techniques. The imperceptibility and payload are balanced through a tradeoff. It has been observed in the literature that most of the RW methods lack robustness, and very small-scale robustness has been achieved in this domain of watermarking. Different types of RW, i.e., fragile, semifragile, and robust methods, are being compared and reviewed. Mostly, fragile methods are developed on the error-expansion techniques built on histogram shifting-based approach. In this study, several RW methods are compared and the results are presented.<\/jats:p>","DOI":"10.1155\/2021\/8820082","type":"journal-article","created":{"date-parts":[[2021,3,26]],"date-time":"2021-03-26T17:50:20Z","timestamp":1616781020000},"page":"1-19","source":"Crossref","is-referenced-by-count":3,"title":["Survey on Reversible Watermarking Techniques of Echocardiography"],"prefix":"10.1155","volume":"2021","author":[{"given":"Rabiya","family":"Ghafoor","sequence":"first","affiliation":[{"name":"Department of Software Engineering, Foundation University Islamabad, Islamabad 46000, Pakistan"}]},{"given":"Danish","family":"Saleem","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Foundation University Islamabad, Islamabad 46000, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5852-1955","authenticated-orcid":true,"given":"Sajjad Shaukat","family":"Jamal","sequence":"additional","affiliation":[{"name":"Department of Mathematics, College of Science, King Khalid University, Abha, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2780-731X","authenticated-orcid":true,"given":"M.","family":"Ishtiaq","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Foundation University Islamabad, Islamabad 46000, Pakistan"}]},{"given":"Sadaf","family":"Ejaz","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Foundation University Islamabad, Islamabad 46000, Pakistan"}]},{"given":"Arif","family":"Jamal Malik","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Foundation University Islamabad, Islamabad 46000, Pakistan"}]},{"given":"M. Fahad","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Foundation University Islamabad, Islamabad 46000, Pakistan"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1023\/a:1010669009889"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cpcardiol.2003.10.001"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1166\/jmihi.2014.1251"},{"article-title":"Watermarking in motion vector for security enhancement of medical videos","author":"S. Acharjee","key":"4","doi-asserted-by":"crossref","DOI":"10.1109\/ICCICCT.2014.6993019"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.11.019"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-014-9700-5"},{"key":"7","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/3158416","article-title":"Information hiding:Challenges for forensic experts","volume":"61","author":"W. Mazurczyk","year":"2018","journal-title":"Communications of the ACM"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5325040"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-57699-2","volume-title":"Medical Image Watermarking: Techniques and Applications","author":"A. Singh","year":"2017"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-010-9295-4"},{"key":"11","article-title":"Clinical application of intravascular ultrasound in coronary artery disease: an update","volume":"27","author":"L. Chia-Pin","year":"2011","journal-title":"Acta Cardiologica Sinica"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6407-5"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.5120\/3619-5051"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/5.771065"},{"issue":"3","key":"15","article-title":"Reversible data hiding: a survey","volume":"1","author":"D. D. Brabin","year":"2013","journal-title":"International Journal of Innovative Research in Computer and Communication Engineering"},{"issue":"5","key":"16","first-page":"2857","article-title":"A review on reversible data hiding techniques","volume":"13","author":"A. Sonal","year":"2018","journal-title":"International Journal of Applied Engineering Research"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.09.008"},{"author":"R. Geetha","key":"18","article-title":"Improved reversible data embedding"},{"key":"19","doi-asserted-by":"crossref","DOI":"10.1007\/978-981-15-0694-9_57","article-title":"Robust reversible watermarking for grayscale medical images","volume-title":"Advances in Data and Information Sciences","author":"T. Dutta","year":"2020"},{"key":"20","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-44790-2_17","article-title":"Pixel repetition technique: a high capacity and reversible data hiding method for E-healthcare applications","volume-title":"Intelligent Techniques in Signal Processing for Multimedia Security","author":"S. A. Parah","year":"2017"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-019-00698-9"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08484-2"},{"author":"N. Dey","key":"23","article-title":"DWT-DCT-SVD based intravascular ultrasound video watermarking"},{"article-title":"Medical video watermarking scheme for telemedicine applications","author":"S. Fadoua","key":"24","doi-asserted-by":"crossref","DOI":"10.1109\/IRASET48871.2020.9091982"},{"author":"T. Agung","key":"25","article-title":"Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and run length encoding (RLE) compression"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/iccsit.2010.5564078"},{"author":"J. Zain","key":"27","article-title":"Medical image watermarking with tamper detection and recovery"},{"article-title":"ROI-based tamper detection and recovery for medical images using reversible watermarking technique","author":"O. M. Al-Qershi","key":"28","doi-asserted-by":"crossref","DOI":"10.1109\/ICITIS.2010.5688743"},{"author":"Khoo","key":"29","article-title":"Reversible watermarking scheme based on two-dimensional difference expansion (2D-DE)"},{"author":"M. G. Jessica Fridrich","key":"30","article-title":"Invertible authentication"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/2388576.2388588"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.5815\/ijigsp.2012.07.04"},{"key":"33","article-title":"Stationary wavelet transformation based self-recovery of blind-watermark from electrocardiogram signal in the wireless telecardiology","volume-title":"Communications in Computer and Information Science,Recent Trends in Computer Networks and Distributed Systems Security","author":"N. Dey","year":"2012"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/icadte.2013.6524732"},{"article-title":"Relevance of watermarking in medical imaging","author":"G. Coatrieux","key":"35","doi-asserted-by":"crossref","DOI":"10.1109\/ITAB.2000.892396"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.14569\/ijacsa.2019.0100416"},{"key":"37","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.bspc.2016.05.005","article-title":"A new approach to fully-reversible watermarking in medical imagingwith breakthrough visibility parameters","volume":"29","author":"A. Ro\u02c7cek","year":"2016","journal-title":"Biomedical Signal Processing and Control"},{"author":"A. Ro\u02c7cek","key":"38","article-title":"RONI size and another attributes ofrepresentative sample of medical images in common hospital operation,related to securing by watermarking methods"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2003.809366"},{"key":"40","article-title":"Dynamic hiding of message in rgb domain based on random channel indicator","volume":"10","author":"S. Rani","year":"2015","journal-title":"International Journal of Applied Engineering Research"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-017-0024-0"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2921894"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6263-3"},{"author":"F. A. Memon","key":"44","article-title":"Reversible watermarking for the security of medical image databases"},{"key":"45","first-page":"2857","article-title":"A review on reversible data hiding techniques","volume":"48","author":"Lakshmi","year":"2018","journal-title":"International Journal of Applied Engineering Research"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/8820082.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/8820082.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/8820082.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,22]],"date-time":"2022-12-22T15:43:44Z","timestamp":1671723824000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/8820082\/"}},"subtitle":[],"editor":[{"given":"Emanuele","family":"Maiorana","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,3,25]]},"references-count":45,"alternative-id":["8820082","8820082"],"URL":"https:\/\/doi.org\/10.1155\/2021\/8820082","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,3,25]]}}}