{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T15:38:51Z","timestamp":1769182731318,"version":"3.49.0"},"reference-count":68,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T00:00:00Z","timestamp":1661731200000},"content-version":"vor","delay-in-days":240,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"name":"Sakarya University of Applied Science Scientific Research Projects Coordination Unit","award":["2020-01-01-011"],"award-info":[{"award-number":["2020-01-01-011"]}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2022,1]]},"abstract":"<jats:p>Watermarking is one of the most common techniques used to protect data\u2019s authenticity, integrity, and security. The obfuscation in the frequency domain used in the watermarking method makes the watermarking stronger than the obfuscation in the spatial domain. It occupies an important place in watermarking works in imperceptibility, capacity, and robustness. Finding the optimal location to hide the watermarking is one of the most challenging tasks in these methods and affects the method\u2019s performance. In this article, sample identification information is processed with the method of watermaking on the hiding environment created by using a chaos\u2010based random number generator on biomedical data to provide solutions to problems such as visual attack, identity theft, and information confusion. In order to obtain biomedical data, a lensless digital in\u2010line holographic microscopy (DIHM) setup was designed, and holographic data of human blood and cancer cell lines, which are widely used in the laboratory environment, were obtained. The standard USAF 1951 target was used to evaluate the resolution of our imaging setup. Various QR codes were generated for medical sample identification, and the captured medical data were processed by watermarking it with chaos\u2010based random number generators. A new method using chaos\u2010based discrete wavelet transform (DWT) and singular value decomposition (SVD) has been developed and applied to high\u2010resolution data to eliminate the problem of encrypted data being directly targeted by third\u2010party attacks. The performance of the proposed new watermarking method has been demonstrated by various robustness and invisibility tests. Experimental results showed that the proposed scheme reached an average PSNR value of 564588\u2009dB and SSIM value of 0.9972 against several geometric and destructive attacks, which means that the proposed method does not affect the image quality and also ensures the security of the watermarking information. The results of the proposed method have shown that it can be used efficiently in various fields.<\/jats:p>","DOI":"10.1155\/2022\/3154650","type":"journal-article","created":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T21:05:06Z","timestamp":1661807106000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["DWT\u2010SVD Based Watermarking for High\u2010Resolution Medical Holographic Images"],"prefix":"10.1155","volume":"2022","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4554-9083","authenticated-orcid":false,"given":"Fahrettin","family":"Horasan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8153-7971","authenticated-orcid":false,"given":"Muhammed","family":"Ali Pala","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5347-4491","authenticated-orcid":false,"given":"Ali","family":"Durdu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9151-3052","authenticated-orcid":false,"given":"Akif","family":"Akg\u00fcl","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5877-0177","authenticated-orcid":false,"given":"\u00d6mer Faruk","family":"Akme\u015fe","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1870-288X","authenticated-orcid":false,"given":"Mustafa Zahid","family":"Y\u0131ld\u0131z","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2022,8,29]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/S1470-2045(19)30149-4"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49736-5_7"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2017.06.001"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-014-9700-5"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/S00521-020-05634-8\/TABLES\/8"},{"key":"e_1_2_10_6_2","first-page":"248","article-title":"Dual watermarking scheme with encryption","volume":"7","author":"Dhanalakshmi R.","year":"2010","journal-title":"International Journal of Computer Science and Information Security"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1504\/IJIEI.2020.112041"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-2091-6"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.2174\/1874120701004010093"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/J.ASOC.2019.105696"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3536-6"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-012-9527-x"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3928-7"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2754-7"},{"key":"e_1_2_10_15_2","unstructured":"NavasK. A.andSasikumarM. Survey of medical image watermarking algorithms Proceedings of the 4 th International conference: Sciences of Electronic Technologies of Information and Telecommunications July 2007 Tunisia 25\u201329."},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/S11042-022-13233-Z"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/J.ESWA.2022.117134"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2022.0130425"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2022.0130326"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.897255"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1998.723409"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/CNNA.2002.1035038"},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/J.CHAOS.2009.03.173"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.04.026"},{"key":"e_1_2_10_25_2","volume-title":"Security in Telemedicine: Issues in Watermarking Medical Images","author":"Zain J.","year":"2005"},{"key":"e_1_2_10_26_2","first-page":"37","article-title":"An adaptive watermarking approach for medical imaging using swarm intelligent","volume":"6","author":"Soliman M. M.","year":"2012","journal-title":"Int. J. Smart Home"},{"key":"e_1_2_10_27_2","doi-asserted-by":"publisher","DOI":"10.5923\/j.ajbe.20120202.06"},{"key":"e_1_2_10_28_2","doi-asserted-by":"crossref","unstructured":"MemonN. A.andGilaniS. A. M. NROI watermarking of medical images for content authentication Proceedings of the 2008 IEEE International Multitopic Conference 2008 12th IEEE Int. Multitopic Conf. - Conf. Proc December 2008 Karachi Pakistan IEEE 106\u2013110 https:\/\/doi.org\/10.1109\/INMIC.2008.4777717 2-s2.0-67649669927.","DOI":"10.1109\/INMIC.2008.4777717"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2010.2066770"},{"key":"e_1_2_10_30_2","first-page":"46","article-title":"Double watermarking of dicom medical images using wavelet decomposition technique","volume":"70","author":"Kannammal A.","year":"2012","journal-title":"European Journal of Scientific Research"},{"key":"e_1_2_10_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/J.COMCOM.2020.01.038"},{"key":"e_1_2_10_32_2","doi-asserted-by":"crossref","unstructured":"KadianP. AroraN. andAroraS. M. Performance evaluation of robust watermarking using DWT-SVD and RDWT-SVD Proceedings of the 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN) May 2019 Noida India IEEE 987\u2013991 https:\/\/doi.org\/10.1109\/SPIN.2019.8711681 2-s2.0-85066891621.","DOI":"10.1109\/SPIN.2019.8711681"},{"key":"e_1_2_10_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10712-7"},{"key":"e_1_2_10_34_2","doi-asserted-by":"publisher","DOI":"10.1088\/0034-4885\/79\/7\/076001"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.121.093902"},{"key":"e_1_2_10_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.2978129"},{"key":"e_1_2_10_37_2","doi-asserted-by":"publisher","DOI":"10.31590\/EJOSAT.999707"},{"key":"e_1_2_10_38_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-81098-7"},{"key":"e_1_2_10_39_2","doi-asserted-by":"publisher","DOI":"10.3390\/proceedings2130877"},{"key":"e_1_2_10_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.marpolbul.2020.111927"},{"key":"e_1_2_10_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.bbrc.2020.02.155"},{"key":"e_1_2_10_42_2","doi-asserted-by":"publisher","DOI":"10.1140\/epjs\/s11734-021-00342-3"},{"key":"e_1_2_10_43_2","doi-asserted-by":"publisher","DOI":"10.1039\/c8an01056k"},{"key":"e_1_2_10_44_2","doi-asserted-by":"publisher","DOI":"10.1364\/oe.405563"},{"key":"e_1_2_10_45_2","first-page":"86","article-title":"Holografik g\u00f6r\u00fcnt\u00fclerde kenar tabanl\u0131 fraktal \u00f6zniteliklerin h\u00fccre canl\u0131l\u0131k analizlerinde ba\u015far\u0131s\u0131","volume":"2","author":"Pala M. A.","year":"2021","journal-title":"Journal of Smart Systems Research"},{"key":"e_1_2_10_46_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41377-019-0196-0"},{"key":"e_1_2_10_47_2","doi-asserted-by":"publisher","DOI":"10.1117\/1.ap.1.1.016004"},{"key":"e_1_2_10_48_2","doi-asserted-by":"publisher","DOI":"10.1038\/161777a0"},{"key":"e_1_2_10_49_2","doi-asserted-by":"publisher","DOI":"10.1038\/lsa.2016.60"},{"key":"e_1_2_10_50_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2018.10.035"},{"key":"e_1_2_10_51_2","doi-asserted-by":"publisher","DOI":"10.1364\/AO.54.002424"},{"key":"e_1_2_10_52_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64747-0_6"},{"key":"e_1_2_10_53_2","unstructured":"ZhangJ. SunJ. ChenQ. andZuoC. Resolution Analysis in a Lens-free On-Chip Digital Holographic Microscope 2019 http:\/\/arxiv.org\/abs\/1906.06231."},{"key":"e_1_2_10_54_2","doi-asserted-by":"publisher","DOI":"10.1021\/acssensors.0c00990"},{"key":"e_1_2_10_55_2","doi-asserted-by":"publisher","DOI":"10.1117\/3.858456"},{"key":"e_1_2_10_56_2","doi-asserted-by":"publisher","DOI":"10.1117\/12.2002038"},{"key":"e_1_2_10_57_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106195"},{"key":"e_1_2_10_58_2","doi-asserted-by":"publisher","DOI":"10.1364\/oe.402293"},{"key":"e_1_2_10_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3036380"},{"key":"e_1_2_10_60_2","doi-asserted-by":"crossref","unstructured":"LorenzE. N. Deterministic nonperiodic flow 1963 Universality in Chaos Tyrol Austria 367\u2013378.","DOI":"10.1201\/9780203734636-38"},{"key":"e_1_2_10_61_2","doi-asserted-by":"publisher","DOI":"10.1063\/5.0016505"},{"key":"e_1_2_10_62_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-019-05430-7"},{"key":"e_1_2_10_63_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102944"},{"key":"e_1_2_10_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3011724"},{"key":"e_1_2_10_65_2","doi-asserted-by":"crossref","unstructured":"Akg\u00fclA. Ka\u00e7arS. AriciogluB. andPehlivanI. Text encryption by using one-dimensional chaos generators and nonlinear equations Proceedings of the 2013 8th International Conference on Electrical and Electronics Engineering (ELECO) November 2013 Bursa Turkey IEEE 320\u2013323 6713853 https:\/\/doi.org\/10.1109\/ELECO.2013.6713853.","DOI":"10.1109\/ELECO.2013.6713853"},{"key":"e_1_2_10_66_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12043-017-1493-x"},{"key":"e_1_2_10_67_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12043-018-1545-x"},{"key":"e_1_2_10_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2915596"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2022\/3154650","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1155\/2022\/3154650","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2022\/3154650","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T21:18:47Z","timestamp":1769116727000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2022\/3154650"}},"subtitle":[],"editor":[{"given":"Ning","family":"Cai","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,1]]},"references-count":68,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["10.1155\/2022\/3154650"],"URL":"https:\/\/doi.org\/10.1155\/2022\/3154650","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"value":"1076-2787","type":"print"},{"value":"1099-0526","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1]]},"assertion":[{"value":"2022-02-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-07-11","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"3154650"}}