{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T14:38:08Z","timestamp":1770907088711,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Hainan Provincial Natural Science Foundation of China","award":["620QN286"],"award-info":[{"award-number":["620QN286"]}]},{"name":"Hainan Provincial Natural Science Foundation of China","award":["620QN286"],"award-info":[{"award-number":["620QN286"]}]},{"name":"the Education Department of Hainan Province","award":["Hnkyzc2022-13"],"award-info":[{"award-number":["Hnkyzc2022-13"]}]},{"name":"the Education Department of Hainan Province","award":["Hnkyzc2022-13"],"award-info":[{"award-number":["Hnkyzc2022-13"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>With the help of big data, cloud computing, artificial intelligence and other technologies, the informatization and intelligence of the wisdom medical have been gradually realized. However, with the transmission and storage of massive amounts of medical images in the cloud, information security issues have become increasingly prominent. The privacy of patients is at risk of disclosure, theft and tampering, which has become an important challenge restricting the development of wisdom medical. How to protect the personal information of patients in the cloud environment has become an urgent problem to be solved. Medical image watermarking technology is an effective method to solve this problem. Combining the characteristics of Tent chaos and Henon chaos, this paper designed a Tent-Henon-Map double chaos watermarking encryption method and designed a medical image encryption watermarking algorithm based on ridgelet-DCT transform. The watermark images were encrypted by the Tent-Henon-Map double chaos which had the characteristics of sensitive initial values and large key space. Then, the feature vectors of the medical images were extracted through ridgelet-DCT transform. On the basis of ordinary watermarking technology, combined with zero watermarking, third-party concepts, and cryptographic technology, watermarking had a good ability to resist image processing attacks. The experimental results showed that the key space of the algorithm was <jats:inline-formula><jats:alternatives><jats:tex-math>$${10}^{116}$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:msup>\n                    <mml:mrow>\n                      <mml:mn>10<\/mml:mn>\n                    <\/mml:mrow>\n                    <mml:mn>116<\/mml:mn>\n                  <\/mml:msup>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula>, which had better encryption and hard to crack. The time of watermark embedding and extraction were only 0.336\u00a0s and 0.439\u00a0s, with lower computational cost. And under high-strength conventional attacks and geometric attacks, the NC values of the algorithm were all greater than 0.55, which could effectively extract watermark information. It shown that the algorithm proposed had good robustness against conventional and geometric attacks It shown that the algorithm proposed had good robustness against conventional and geometric attacks, while taking into account the security.<\/jats:p>","DOI":"10.1186\/s13677-022-00331-4","type":"journal-article","created":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T11:02:44Z","timestamp":1664622164000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos"],"prefix":"10.1186","volume":"11","author":[{"given":"Zilong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jingbing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Ai","sequence":"additional","affiliation":[]},{"given":"Yuancai","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,1]]},"reference":[{"key":"331_CR1","unstructured":"Borovska P, Ivanova D, Kadurin V (2018) Experimental Framework for the Investigations in Internet of Medical Imaging Things Ecosystem. in QED'17 UNESCO International Workshop, Sofia, Bulgaria."},{"key":"331_CR2","doi-asserted-by":"publisher","first-page":"51","DOI":"10.36548\/JIIP.2019.1.006","volume":"1","author":"A Chandy","year":"2019","unstructured":"Chandy A (2019) A review on iot based medical imaging technology for healthcare applications. JIIP 1:51\u201360. https:\/\/doi.org\/10.36548\/JIIP.2019.1.006","journal-title":"JIIP"},{"issue":"115","key":"331_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.mehy.2018.03.023","volume":"7","author":"W Yufeng","year":"2018","unstructured":"Yufeng W, Liwei W, Changao X (2018) Medical information security in the era of artificial intelligence. Med Hypotheses 7(115):1\u20136. https:\/\/doi.org\/10.1016\/j.mehy.2018.03.023","journal-title":"Med Hypotheses"},{"key":"331_CR4","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.comcom.2020.01.038","volume":"152","author":"A Ashima","year":"2020","unstructured":"Ashima A, Amit Kumar S (2020) An improved DWT-SVD domain watermarking for medical information security. Comput Commun 152:72\u201380. https:\/\/doi.org\/10.1016\/j.comcom.2020.01.038","journal-title":"Comput Commun"},{"key":"331_CR5","doi-asserted-by":"publisher","unstructured":"Begum M, Uddin M S (2020) Digital image watermarking techniques: a review. information 11(2): 1\u201338 https:\/\/doi.org\/10.3390\/info11020110.","DOI":"10.3390\/info11020110"},{"issue":"4","key":"331_CR6","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s13735-020-00197-9","volume":"9","author":"R Arkadip","year":"2020","unstructured":"Arkadip R, Somaditya R (2020) Recent trends in image watermarking techniques for copyright protection: a survey. IJMIR 9(4):249\u2013270. https:\/\/doi.org\/10.1007\/s13735-020-00197-9","journal-title":"IJMIR"},{"key":"331_CR7","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.jksuci.2016.12.004","volume":"31","author":"A Jobin","year":"2019","unstructured":"Jobin A, Varghese P (2019) An imperceptible spatial domain color image watermarking scheme. J King Saud Univ-Com 31:125\u2013133. https:\/\/doi.org\/10.1016\/j.jksuci.2016.12.004","journal-title":"J King Saud Univ-Com"},{"issue":"2","key":"331_CR8","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"MU Celik","year":"2005","unstructured":"Celik MU, Sharma G, Tekalp AM (2005) Lossless generalized-LSB data embedding. IEEE Trans Image Process 14(2):253\u2013266. https:\/\/doi.org\/10.1109\/TIP.2004.840686","journal-title":"IEEE Trans Image Process"},{"key":"331_CR9","doi-asserted-by":"publisher","unstructured":"Mohammed G N, Yasin A, Zeki A Z (2014) Robust Image Watermarking Based on Dual Intermediate Significant Bit (DISB). In 2014 6th International Conference on Computer Science and Information Technology, Amman, Jordan, pp.18\u201322 https:\/\/doi.org\/10.1109\/CSIT.2014.6805973.","DOI":"10.1109\/CSIT.2014.6805973"},{"issue":"2","key":"331_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40064-016-2371-6","volume":"5","author":"A Zeki","year":"2016","unstructured":"Zeki A, Abubakar A, Chiroma H (2016) An intermediate significant bit (ISB) watermarking technique using neural networks. Springerplus 5(2):1\u201325. https:\/\/doi.org\/10.1186\/s40064-016-2371-6","journal-title":"Springerplus"},{"key":"331_CR11","doi-asserted-by":"publisher","unstructured":"Pun C M (2009) High Capacity and Robust Digital Image Watermarking. In: Proceedings Of The 5th International Joint Conference on INC, IMS and IDC, Seoul, South Korea 1457\u20131461 https:\/\/doi.org\/10.1109\/NCM.2009.85","DOI":"10.1109\/NCM.2009.85"},{"key":"331_CR12","doi-asserted-by":"publisher","unstructured":"Zhen Z, Shuyu C, Guiping W (2015) A Robust Digital Image watermarking algorithm based on DCT domain for copyright protection. in: smart graphics 2015: International Symposium on Smart Graphics, Chengdu, China 132\u2013142 https:\/\/doi.org\/10.1007\/978-3-319-53838-9_11.","DOI":"10.1007\/978-3-319-53838-9_11"},{"key":"331_CR13","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1007\/s11760-013-0555-x","volume":"9","author":"M Cedillo-Hernandez","year":"2015","unstructured":"Cedillo-Hernandez M, Garcia-Ugalde F, Nakano-Miyatake M (2015) Robust watermarking method in DFT domain for effective management of medical imaging. Signal Image Video 9:1163\u20131178. https:\/\/doi.org\/10.1007\/s11760-013-0555-x","journal-title":"Signal Image Video"},{"key":"331_CR14","doi-asserted-by":"publisher","first-page":"8","DOI":"10.5120\/ijca2016908559","volume":"136","author":"MT Gaata","year":"2016","unstructured":"Gaata MT (2016) An Efficient Image Watermarking Approach based on Fourier Transform. IJCA 136:8\u201311. https:\/\/doi.org\/10.5120\/ijca2016908559","journal-title":"IJCA"},{"key":"331_CR15","doi-asserted-by":"publisher","unstructured":"Zhiyun C, Ya C, Wenxin H, Dongming Q (2015) Wavelet Domain Digital Watermarking Algorithm Based on Threshold Classification. In: 6th International Conference on Swarm Intelligence, Beijing, China, 129\u2013136 https:\/\/doi.org\/10.1007\/978-3-319-20469-7_15.","DOI":"10.1007\/978-3-319-20469-7_15"},{"key":"331_CR16","doi-asserted-by":"publisher","first-page":"5135","DOI":"10.1007\/s00034-019-01112-2","volume":"38","author":"Z Yifeng","year":"2019","unstructured":"Yifeng Z, Yingying L, Yibo S (2019) Digital Watermarking Based on Joint DWT-DCT and OMP Reconstruction. Circ Syst Singal Pr 38:5135\u20135148. https:\/\/doi.org\/10.1007\/s00034-019-01112-2","journal-title":"Circ Syst Singal Pr"},{"key":"331_CR17","doi-asserted-by":"publisher","first-page":"1577","DOI":"10.1016\/j.patrec.2005.01.004","volume":"60","author":"C ChinChen","year":"2005","unstructured":"ChinChen C, Piyu T, ChiaChen L (2005) SVD-based digital image watermarking scheme. Pattern Recogn Lett 60:1577\u20131586. https:\/\/doi.org\/10.1016\/j.patrec.2005.01.004","journal-title":"Pattern Recogn Lett"},{"key":"331_CR18","doi-asserted-by":"publisher","first-page":"1770","DOI":"10.1016\/j.procs.2015.02.130","volume":"46","author":"D Vaishnavi","year":"2015","unstructured":"Vaishnavi D, Subashini TS (2015) Robust and Invisible Image Watermarking in RGB Color Space Using SVD. Procedia Computer Science 46:1770\u20131777. https:\/\/doi.org\/10.1016\/j.procs.2015.02.130","journal-title":"Procedia Computer Science"},{"key":"331_CR19","doi-asserted-by":"publisher","first-page":"182391","DOI":"10.1109\/ACCESS.2020.3004841","volume":"8","author":"R Wang","year":"2020","unstructured":"Wang R, Shaocheng H, Zhang P (2020) A Novel zero-watermarking scheme based on variable parameter chaotic mapping in NSPD-DCT domain. IEEE Access 8:182391\u2013182411","journal-title":"IEEE Access"},{"key":"331_CR20","doi-asserted-by":"publisher","first-page":"701","DOI":"10.3390\/app9040700","volume":"9","author":"L Jing","year":"2019","unstructured":"Jing L, Jingbing L, Jixin M et al (2019) A robust multi-watermarking algorithm for medical images based on DTCWT-DCT and Henon Map. Appl Sci 9:701\u2013723. https:\/\/doi.org\/10.3390\/app9040700","journal-title":"Appl Sci"},{"key":"331_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1088\/1742-6596\/1952\/2\/022049","volume":"1952","author":"X Siming","year":"2021","unstructured":"Siming X, Tongyi L, Jing L (2021) A zero-watermark hybrid algorithm for remote sensing images based on DCT and DFT. JPCS 1952:1\u201312. https:\/\/doi.org\/10.1088\/1742-6596\/1952\/2\/022049","journal-title":"JPCS"},{"key":"331_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.forsciint.2021.110691","volume":"320","author":"Z Narima","year":"2021","unstructured":"Narima Z, Amine K, Redouane K,et al, (2021) A DWT-SVD based robust digital watermarking for medical image security. Forensic Sci Int 320:1\u20139. https:\/\/doi.org\/10.1016\/j.forsciint.2021.110691","journal-title":"Forensic Sci Int"},{"key":"331_CR23","doi-asserted-by":"publisher","first-page":"7167","DOI":"10.1007\/s11042-020-09981-5","volume":"80","author":"K Balasamy","year":"2021","unstructured":"Balasamy K, Suganyadevi S (2021) A fuzzy based ROI selection for encryption and watermarking in medical image using DWT and SVD. Multimed Tools Appl 80:7167\u20137186. https:\/\/doi.org\/10.1007\/s11042-020-09981-5","journal-title":"Multimed Tools Appl"},{"key":"331_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.bspc.2020.102403","volume":"66","author":"K Fares","year":"2021","unstructured":"Fares K, Khaldi A, Redouaneet K et al (2021) DCT & DWT based watermarking scheme for medical information security. Bopmed Signal Proces 66:1\u20139. https:\/\/doi.org\/10.1016\/j.bspc.2020.102403","journal-title":"Bopmed Signal Proces"},{"key":"331_CR25","doi-asserted-by":"publisher","unstructured":"Fengming Q, Jingbing L, Hui L, .et al (2020) A Robust Zero-Watermarking Algorithm for Medical Images Using Curvelet-Dct and RSA Pseudo-random Sequences. In: International Conference on Artificial Intelligence and Security, Dublin, Ireland 179\u2013190 https:\/\/doi.org\/10.1007\/978-3-030-57881-7_16.","DOI":"10.1007\/978-3-030-57881-7_16"},{"key":"331_CR26","doi-asserted-by":"publisher","first-page":"16863","DOI":"10.1007\/s11042-022-12592-x","volume":"81","author":"F Yangxiu","year":"2022","unstructured":"Yangxiu F, Jing L, Jingbing L,et al, (2022) Robust zero-watermarking algorithm for medical images based on SIFT and Bandelet-DCT. Multimedia Tools and Applications 81:16863\u201316879. https:\/\/doi.org\/10.1007\/s11042-022-12592-x","journal-title":"Multimedia Tools and Applications"},{"key":"331_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12652-021-03539-5","volume":"4","author":"Z Cheng","year":"2022","unstructured":"Cheng Z, Jing L, Jingbing L,et al, (2022) Multi-watermarking algorithm for medical image based on KAZE-DCT. J AMB INTEL HUM COMP 4:1\u20139. https:\/\/doi.org\/10.1007\/s12652-021-03539-5","journal-title":"J AMB INTEL HUM COMP"},{"key":"331_CR28","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/j.jisa.2019.03.017","volume":"46","author":"R Thanki","year":"2019","unstructured":"Thanki R, Kothari A, Trivedi D (2019) Hybrid and blind watermarking scheme in DCuT-RDWT domain. JISA 46:231\u2013249. https:\/\/doi.org\/10.1016\/j.jisa.2019.03.017","journal-title":"JISA"},{"key":"331_CR29","doi-asserted-by":"publisher","first-page":"4307","DOI":"10.1007\/s11042-020-09941-z","volume":"80","author":"R Thanki","year":"2021","unstructured":"Thanki R, Kothari A (2021) Multi-level security of medical images based on encryption and watermarking for telemedicine applications. Multimed Tools Appl 80:4307\u20134325. https:\/\/doi.org\/10.1007\/s11042-020-09941-z","journal-title":"Multimed Tools Appl"},{"key":"331_CR30","doi-asserted-by":"publisher","first-page":"72650","DOI":"10.1109\/ACCESS.2020.2988160","volume":"8","author":"I Celestine","year":"2020","unstructured":"Celestine I, Zunera J, Abdul RJ et al (2020) KeySplitWatermark: zero watermarking algorithm for software protection against cyber-attacks. Journals & Magazines 8:72650\u201372660. https:\/\/doi.org\/10.1109\/ACCESS.2020.2988160","journal-title":"Journals & Magazines"},{"issue":"1","key":"331_CR31","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s10489-021-02476-2","volume":"52","author":"X Zhiqiu","year":"2022","unstructured":"Zhiqiu X, Xingyuan W, Chunpeng W et al (2022) A robust zero-watermarking algorithm for lossless copyright protection of medical images. APPL INTELL 52(1):607\u2013621. https:\/\/doi.org\/10.1007\/s10489-021-02476-2","journal-title":"APPL INTELL"},{"issue":"9","key":"331_CR32","first-page":"2188","volume":"4","author":"W Baowei","year":"2022","unstructured":"Baowei W, Jiawei S, Weishen W et al (2022) Image copyright protection based on Blockchain and zero-watermark. Trans Netw Sci Eng 4(9):2188\u20132199","journal-title":"Trans Netw Sci Eng"},{"key":"331_CR33","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2022.3178629","author":"C Rupa","year":"2022","unstructured":"Rupa C, Harshitha M, Gautam S et al (2022) Securing Multimedia using a Deep Learning based Chaotic Logistic Map. IEEE J BIOMED HEALTH. https:\/\/doi.org\/10.1109\/JBHI.2022.3178629","journal-title":"IEEE J BIOMED HEALTH"},{"key":"331_CR34","first-page":"1510","volume":"7","author":"Z Hegui","year":"2019","unstructured":"Hegui Z, Baoming P, Zhiliang Zhu.et al, (2019) Two-dimensional sine-tent-based hyper chaotic map and its application in image encryption. J Chin Comput Syst 7:1510\u20131518 (1000-1220(2019) 07-1510-09)","journal-title":"J Chin Comput Syst"},{"key":"331_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/sym10090399","volume":"10","author":"Z Congxu","year":"2018","unstructured":"Congxu Z, Guojun W, Kehui S (2018) Cryptanalysis and improvement on an image encryption algorithm design using a novel chaos based S-box. Symmetry 10:1\u201315. https:\/\/doi.org\/10.3390\/sym10090399","journal-title":"Symmetry"},{"key":"331_CR36","doi-asserted-by":"publisher","first-page":"4863","DOI":"10.1007\/s11042-016-3862-8","volume":"77","author":"A Zea","year":"2018","unstructured":"Zea A, Singh AK, Kumar P (2018) A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine. Multimed Tools Appl 77:4863\u20134882. https:\/\/doi.org\/10.1007\/s11042-016-3862-8","journal-title":"Multimed Tools Appl"},{"key":"331_CR37","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.sigpro.2018.03.007","volume":"149","author":"Y Xiaochen","year":"2018","unstructured":"Xiaochen Y, Mianjie L (2018) Local multi-watermarking method based on robust and adaptive feature extraction. Signal Process 149:103\u2013117. https:\/\/doi.org\/10.1016\/j.sigpro.2018.03.007","journal-title":"Signal Process"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-022-00331-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-022-00331-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-022-00331-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T11:09:22Z","timestamp":1664622562000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-022-00331-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,1]]},"references-count":37,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["331"],"URL":"https:\/\/doi.org\/10.1186\/s13677-022-00331-4","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,1]]},"assertion":[{"value":"16 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest to report regarding the present study.\u00a0","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"60"}}