{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:45:46Z","timestamp":1764978346467,"version":"3.46.0"},"reference-count":42,"publisher":"Walter de Gruyter GmbH","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1,26]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>\n                    Increased growth of information technology in healthcare has led to a situation where the security of patient information is more important and is a critical issue. The aim of the proposed algorithm is to provide a framework to verify the integrity of the medical images. In this paper, the integrity of the medical images is verified by embedding hash signatures using the sequential square embedding technique. This technique is as efficient as the diamond encoding technique but with increased payload capability. The medical image is first divided into the region of interest (ROI) block and the signature block. The hash signatures are determined by dividing the ROI into nonoverlapping blocks. During the data hiding stage, the hash signatures are embedded in randomly chosen pixel pairs in the signature block using the sequential square encoding (SSE) technique. In the experimental results, the data hiding capacity of the proposed SSE technique is verified in terms of peak signal-to-noise ratio. Also, the medical image integrity is substantiated by comparing the\n                    <jats:italic>L<\/jats:italic>\n                    <jats:sup>2<\/jats:sup>\n                    norm between computed and extracted hash signatures. Modifications such as contrast enhancement, rotation, scaling, and changing the image information result in increased\n                    <jats:italic>L<\/jats:italic>\n                    <jats:sup>2<\/jats:sup>\n                    norm; thus, the integrity of the medical images can be verified. The parameters required for embedding, such as the embedding parameter and the seed for random sequence generation, are encrypted and communicated to the receiving end. Hence, the proposed algorithm provides a secure framework for medical image integrity verification.\n                  <\/jats:p>","DOI":"10.1515\/jisys-2017-0019","type":"journal-article","created":{"date-parts":[[2017,7,19]],"date-time":"2017-07-19T06:01:20Z","timestamp":1500444080000},"page":"19-30","source":"Crossref","is-referenced-by-count":5,"title":["Medical Image Reliability Verification Using Hash Signatures and Sequential Square Encoding"],"prefix":"10.1515","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8555-929X","authenticated-orcid":false,"given":"J. Jennifer","family":"Ranjani","sequence":"first","affiliation":[{"name":"School of Computing , SASTRA University , Thanjavur 613 401 , India"}]},{"given":"M.","family":"Babu","sequence":"additional","affiliation":[{"name":"Department of Mechanical Engineering, Kings College of Engineering , Punalkulam 613 303 , India"}]}],"member":"374","published-online":{"date-parts":[[2017,7,19]]},"reference":[{"key":"2025120523414626050_j_jisys-2017-0019_ref_001_w2aab3b7b3b1b6b1ab1b4b1Aa","doi-asserted-by":"crossref","unstructured":"A. Al-Haj, G. Abandah and N. Hussein, Crypto-based algorithms for secured medical image transmission, IET Inf. Security9 (2015), 365\u2013373.10.1049\/iet-ifs.2014.0245","DOI":"10.1049\/iet-ifs.2014.0245"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_002_w2aab3b7b3b1b6b1ab1b4b2Aa","doi-asserted-by":"crossref","unstructured":"A. Andreopoulos and J. K. Tsotsos, Efficient and generalizable statistical models of shape and appearance for analysis of cardiac MRI, Med. Image Anal.12 (2008), 335\u2013357.10.1016\/j.media.2007.12.003","DOI":"10.1016\/j.media.2007.12.003"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_003_w2aab3b7b3b1b6b1ab1b4b3Aa","doi-asserted-by":"crossref","unstructured":"H. C. Andrew and C. L. Patterson, Singular value decompositions and digital image processing, IEEE Trans. Acoustics Speech Signal Process.24 (1976), 26\u201353.10.1109\/TASSP.1976.1162766","DOI":"10.1109\/TASSP.1976.1162766"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_004_w2aab3b7b3b1b6b1ab1b4b4Aa","doi-asserted-by":"crossref","unstructured":"D. Bouslimi, G. Coatrieux, M. Cozic and C. Roux, A joint encryption\/watermarking system for verifying the reliability of medical image, IEEE Trans. Inf. Technol. Biomed.16 (2012), 891\u2013899.10.1109\/TITB.2012.2207730","DOI":"10.1109\/TITB.2012.2207730"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_005_w2aab3b7b3b1b6b1ab1b4b5Aa","doi-asserted-by":"crossref","unstructured":"J. Buchmann, Introduction to Cryptography, Springer-Verlag, New York, 2001.","DOI":"10.1007\/978-1-4684-0496-8"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_006_w2aab3b7b3b1b6b1ab1b4b6Aa","doi-asserted-by":"crossref","unstructured":"R. M. Chao, H. C. Wu, C. C. Lee and Y. P. Chu, A novel image data hiding scheme with diamond encoding, EURASIP J. Inf.Security2009 (2009), 1\u20139.10.1155\/2009\/658047","DOI":"10.1155\/2009\/658047"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_007_w2aab3b7b3b1b6b1ab1b4b7Aa","doi-asserted-by":"crossref","unstructured":"G. Coatrieux, C. Le Guillou, J.-M. Cauvin and C. Roux, Reversible watermarking for knowledge digest embedding and reliability control in medical images, IEEE Trans. Inf. Technol. Biomed.13 (2009), 158\u2013165.10.1109\/TITB.2008.2007199","DOI":"10.1109\/TITB.2008.2007199"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_008_w2aab3b7b3b1b6b1ab1b4b8Aa","doi-asserted-by":"crossref","unstructured":"G. Coatrieux, H. Huang, H. Shu, L. Luo and C. Roux, A watermarking-based medical image integrity control system and an image moment signature for tampering characterization, IEEE J. Biomed. Health Inform.17 (2013), 1057\u20131067.10.1109\/JBHI.2013.2263533","DOI":"10.1109\/JBHI.2013.2263533"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_009_w2aab3b7b3b1b6b1ab1b4b9Aa","doi-asserted-by":"crossref","unstructured":"Y. Dai and X. Wang, Medical image encryption based on a composition of logistic maps and Chebyshev maps, Proc. IEEE Conf. Inf. Automat. (2012), 210\u2013214.","DOI":"10.1109\/ICInfA.2012.6246810"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_010_w2aab3b7b3b1b6b1ab1b4c10Aa","doi-asserted-by":"crossref","unstructured":"R. Eswaraiah and E. S. Reddy, Robust medical image watermarking techniques for accurate detection of tampers inside region of interest and recovering original region of interest, IET Image Process.9 (2015), 615\u2013625.10.1049\/iet-ipr.2014.0986","DOI":"10.1049\/iet-ipr.2014.0986"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_011_w2aab3b7b3b1b6b1ab1b4c11Aa","doi-asserted-by":"crossref","unstructured":"H. Farid, Image forgery detection: a survey, IEEE Signal Process. Mag.26 (2009), 16\u201325.10.1109\/MSP.2008.931079","DOI":"10.1109\/MSP.2008.931079"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_012_w2aab3b7b3b1b6b1ab1b4c12Aa","doi-asserted-by":"crossref","unstructured":"A. Giakoumaki, S. Pavlopoulos and D. Koutsouris, Multiple image watermarking applied to health information management, IEEE Trans. Inf. Technol. Biomed.10 (2006), 722\u2013732.10.1109\/TITB.2006.875655","DOI":"10.1109\/TITB.2006.875655"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_013_w2aab3b7b3b1b6b1ab1b4c13Aa","doi-asserted-by":"crossref","unstructured":"W. Hong, Adaptive reversible data hiding method based on error energy control and histogram shifting, Opt. Commun.285 (2012), 101\u2013108.10.1016\/j.optcom.2011.09.005","DOI":"10.1016\/j.optcom.2011.09.005"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_014_w2aab3b7b3b1b6b1ab1b4c14Aa","doi-asserted-by":"crossref","unstructured":"W. Hong and T. S. Chen, A novel data embedding method using adaptive pixel pair matching, IEEE Trans. Inf. Forens. Security7 (2012), 176\u2013184.10.1109\/TIFS.2011.2155062","DOI":"10.1109\/TIFS.2011.2155062"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_015_w2aab3b7b3b1b6b1ab1b4c15Aa","doi-asserted-by":"crossref","unstructured":"H. Huang, G. Coatrieux, H. Shu, L. Luo and C. Roux, Blind integrity verification of medical images, IEEE Trans. Inf. Technol. Biomed.16 (2012), 1122\u20131126.10.1109\/TITB.2012.2207435","DOI":"10.1109\/TITB.2012.2207435"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_016_w2aab3b7b3b1b6b1ab1b4c16Aa","unstructured":"T. Kauppi, V. Kalesnykiene, J.-K. Kamarainen, L. Lensu, I. Sorri, H. Uusitalo, H. Kalviainen and J. Pietila, DIARETDB0: Evaluation Database and Methodology for Diabetic Retinopathy Algorithms, 2007, Available at: http:\/\/www.it.lut.fi\/project\/imageret\/diaretdb0\/index.html."},{"key":"2025120523414626050_j_jisys-2017-0019_ref_017_w2aab3b7b3b1b6b1ab1b4c17Aa","doi-asserted-by":"crossref","unstructured":"T. Kauppi, V. Kalesnykiene, J.-K. Kamarainen, L. Lensu, I. Sorri, A. Raninen, R. Voutilainen, H. Uusitalo, H. Kalviainen and J. Pietila, DIARETDB1: Diabetic Retinopathy Database and Evaluation Protocol, 2007, Available at: http:\/\/www.it.lut.fi\/project\/imageret\/diaretdb1\/index.html.","DOI":"10.5244\/C.21.15"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_018_w2aab3b7b3b1b6b1ab1b4c18Aa","doi-asserted-by":"crossref","unstructured":"L. O. M. Kobayashi, S. S. Furuie and P. S. L. M. Barreto, Providing integrity and authenticity in DICOM images: a novel approach, IEEE Trans. Inf. Technol. Biomed.13 (2009), 582\u2013589.10.1109\/TITB.2009.2014751","DOI":"10.1109\/TITB.2009.2014751"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_019_w2aab3b7b3b1b6b1ab1b4c19Aa","doi-asserted-by":"crossref","unstructured":"S. S. Kozat, R. Venkatesan and M. K. Mihcak, Robust perceptual image hashing via matrix invariants, Proc. IEEE Conf. Image Process. (2004), 3443\u20133446.","DOI":"10.1109\/ICIP.2004.1421855"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_020_w2aab3b7b3b1b6b1ab1b4c20Aa","unstructured":"L. Laouamer, L. T. Nana, M. Al Shakh and A. C. Pascu, Informed symmetric encryption algorithm for DICOM medical image based on N-grams, Proc. IEEE Conf. Sci. Inf. (2013), 353\u2013357."},{"key":"2025120523414626050_j_jisys-2017-0019_ref_021_w2aab3b7b3b1b6b1ab1b4c21Aa","doi-asserted-by":"crossref","unstructured":"X. Li, B. Yang and T. Zeng, Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection, IEEE Trans. Image Process.20 (2011), 3524\u20133533.10.1109\/TIP.2011.2150233","DOI":"10.1109\/TIP.2011.2150233"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_022_w2aab3b7b3b1b6b1ab1b4c22Aa","doi-asserted-by":"crossref","unstructured":"X. Li, B. Li, B. Yang and T. Zeng, General framework to histogram-shifting-based reversible data hiding, IEEE Trans. Image Process.22 (2013), 2181\u20132191.10.1109\/TIP.2013.2246179","DOI":"10.1109\/TIP.2013.2246179"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_023_w2aab3b7b3b1b6b1ab1b4c23Aa","unstructured":"A. B. Mahmood and R. D. Dony, Segmentation based encryption method for medical images, Proc. IEEE Conf. Internet Technol. Secured Trans. (2011), 596\u2013601."},{"key":"2025120523414626050_j_jisys-2017-0019_ref_024_w2aab3b7b3b1b6b1ab1b4c24Aa","doi-asserted-by":"crossref","unstructured":"V. Monga and M. K. Mihcak, Robust and secure image hashing via non-negative matrix factorizations, IEEE Trans. Inf. Forens. Security2 (2007), 377\u2013390.","DOI":"10.1109\/TIFS.2007.902670"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_025_w2aab3b7b3b1b6b1ab1b4c25Aa","doi-asserted-by":"crossref","unstructured":"T.-S. Nguyen, C.-C. Chang and N.-T. Huynh, A novel reversible data hiding scheme based on difference histogram modification and optimal EMD algorithm, J. Vis. Commun. Image Represent.33 (2015), 389\u2013397.10.1016\/j.jvcir.2015.10.008","DOI":"10.1016\/j.jvcir.2015.10.008"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_026_w2aab3b7b3b1b6b1ab1b4c26Aa","doi-asserted-by":"crossref","unstructured":"N. Otsu, A threshold selection method from gray-level histograms, IEEE Trans. Syst. Man Cybernet.9 (1979), 62\u201366.10.1109\/TSMC.1979.4310076","DOI":"10.1109\/TSMC.1979.4310076"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_027_w2aab3b7b3b1b6b1ab1b4c27Aa","doi-asserted-by":"crossref","unstructured":"W. Pan, G. Coatrieux, N. Cuppens-Boulahia, F. Cuppens and C. Roux, Medical image integrity control combining digital signature and lossless watermarking, In: Data Privacy Management and Autonomous Spontaneous Security, Lecture Notes in Computer Science, J. Garcia-Alfaro, G. Navarro-Arribas, N. Cuppens-Boulahia and Y. Roudier, eds., vol. 5939, Springer, Berlin, 2010, pp. 153\u2013162.","DOI":"10.1007\/978-3-642-11207-2_12"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_028_w2aab3b7b3b1b6b1ab1b4c28Aa","doi-asserted-by":"crossref","unstructured":"R. Pandey, A. K. Singh, B. Kumar and A. Mohan, Iris based secure NROI multiple eye image watermarking for teleophthalmology, Multimedia Tools Appl.75 (2017), 14381\u201314397.","DOI":"10.1007\/s11042-016-3536-6"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_029_w2aab3b7b3b1b6b1ab1b4c29Aa","doi-asserted-by":"crossref","unstructured":"J. J. Ranjani and M. S. Chithra, Bayesian denoising of ultrasound images using heavy-tailed Levy distribution, IET Image Process.9 (2015), 338\u2013345.10.1049\/iet-ipr.2013.0863","DOI":"10.1049\/iet-ipr.2013.0863"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_030_w2aab3b7b3b1b6b1ab1b4c30Aa","doi-asserted-by":"crossref","unstructured":"V. Sachnev, H. J. Kim, J. Nam, S. Suresh and Y. Q. Shi, Reversible watermarking algorithm using sorting and prediction, IEEE Trans. Circuit Syst. Video Technol.19 (2009), 989\u2013999.10.1109\/TCSVT.2009.2020257","DOI":"10.1109\/TCSVT.2009.2020257"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_031_w2aab3b7b3b1b6b1ab1b4c31Aa","unstructured":"B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, Wiley, New Jersey, 1996."},{"key":"2025120523414626050_j_jisys-2017-0019_ref_032_w2aab3b7b3b1b6b1ab1b4c32Aa","doi-asserted-by":"crossref","unstructured":"A. Sharma, A. K. Singh and S. P. Ghrera, Robust and secure multiple watermarking technique for medical images, Wireless Pers. Commun.92 (2017), 1611\u20131624.10.1007\/s11277-016-3625-x","DOI":"10.1007\/s11277-016-3625-x"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_033_w2aab3b7b3b1b6b1ab1b4c33Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, Improved hybrid technique for robust and imperceptible multiple watermarking using medical images, Multimedia Tools Appl.76 (2017), 8881\u20138900.10.1007\/s11042-016-3514-z","DOI":"10.1007\/s11042-016-3514-z"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_034_w2aab3b7b3b1b6b1ab1b4c34Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, M. Dave and A. Mohan, Hybrid technique for robust and imperceptible image watermarking in DWT-DCT-SVD domain, Natl. Acad. Sci. Lett.37 (2014), 351\u2013358.10.1007\/s40009-014-0241-8","DOI":"10.1007\/s40009-014-0241-8"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_035_w2aab3b7b3b1b6b1ab1b4c35Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, M. Dave and A. Mohan, Robust and secure multiple watermarking in wavelet domain, J. Med. Imaging Health Inform.5 (2015), 406\u2013414.10.1166\/jmihi.2015.1407","DOI":"10.1166\/jmihi.2015.1407"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_036_w2aab3b7b3b1b6b1ab1b4c36Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, B. Kumar, M. Dave and A. Mohan, Multiple watermarking on medical images using selective discrete wavelet transform coefficients, J. Med. Imaging Health Inform.5 (2015), 607\u2013614.10.1166\/jmihi.2015.1432","DOI":"10.1166\/jmihi.2015.1432"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_037_w2aab3b7b3b1b6b1ab1b4c37Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, B. Kumar and M. Dave, Robust and imperceptible dual watermarking for telemedicine applications, Wireless Pers. Commun.80 (2015), 1415\u20131433.10.1007\/s11277-014-2091-6","DOI":"10.1007\/s11277-014-2091-6"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_038_w2aab3b7b3b1b6b1ab1b4c38Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, M. Dave and A. Mohan, Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain, Wireless Pers. Commun.83 (2015), 2133\u20132150.10.1007\/s11277-015-2505-0","DOI":"10.1007\/s11277-015-2505-0"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_039_w2aab3b7b3b1b6b1ab1b4c39Aa","doi-asserted-by":"crossref","unstructured":"J. J. Staal, M. D. Abramoff, M. Niemeijer, M. A. Viergever and B. Van Ginneken, Ridge based vessel segmentation in color images of the retina, IEEE Trans. Med. Imaging23 (2004), 501\u2013509.10.1109\/TMI.2004.825627","DOI":"10.1109\/TMI.2004.825627"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_040_w2aab3b7b3b1b6b1ab1b4c40Aa","doi-asserted-by":"crossref","unstructured":"A. Zear, A. K. Singh and P. Kumar, A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine, Multimedia Tools Appl. (2016), doi: 10.1007\/s11042-016-3862-8 (Online First).","DOI":"10.1007\/s11042-016-3862-8"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_041_w2aab3b7b3b1b6b1ab1b4c41Aa","doi-asserted-by":"crossref","unstructured":"A. Zear, A. K. Singh and P. Kumar, Multiple watermarking for healthcare applications, J. Intell. Syst. 27 (2018), 5\u201318.10.1515\/jisys-2016-0036","DOI":"10.1515\/jisys-2016-0036"},{"key":"2025120523414626050_j_jisys-2017-0019_ref_042_w2aab3b7b3b1b6b1ab1b4c42Aa","doi-asserted-by":"crossref","unstructured":"A. Zear, A. K. Singh and P. Kumar, Robust watermarking technique using back propagation neural network: a security protection mechanism for social applications, Int. J. Inf. Comput. Security9 (2017), 20\u201337.10.1504\/IJICS.2017.082837","DOI":"10.1504\/IJICS.2017.082837"}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.degruyter.com\/view\/j\/jisys.2018.27.issue-1\/jisys-2017-0019\/jisys-2017-0019.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2017-0019\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2017-0019\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:42:11Z","timestamp":1764978131000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2017-0019\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,19]]},"references-count":42,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2017,7,20]]},"published-print":{"date-parts":[[2018,1,26]]}},"alternative-id":["10.1515\/jisys-2017-0019"],"URL":"https:\/\/doi.org\/10.1515\/jisys-2017-0019","relation":{},"ISSN":["2191-026X","0334-1860"],"issn-type":[{"type":"electronic","value":"2191-026X"},{"type":"print","value":"0334-1860"}],"subject":[],"published":{"date-parts":[[2017,7,19]]}}}