{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T16:53:20Z","timestamp":1772470400473,"version":"3.50.1"},"reference-count":46,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T00:00:00Z","timestamp":1496793600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1,26]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>\n                    This paper discusses a safe and secure watermarking technique using a machine learning algorithm. In this paper, the propagation of a watermarked image is simulated over the third-generation partnership project (3GPP)\/long-term evolution (LTE) downlink physical layer. The watermark data are scrambled and a transform domain-based hybrid watermarking technique is used to embed this watermark into the transform coefficients of the host image and transmitted over the orthogonal frequency division multiplexing (OFDM) downlink physical layer. Support vector machine (SVM) is used as a classifier for the classification of non-region of interest (NROI) and region of interest (ROI) in a medical image. The result achieved in this experiment revealed that a 10\n                    <jats:sup>\u22126<\/jats:sup>\n                    bit error rate (BER) value is realizable for a greater value of signal-to-noise ratio (SNR; i.e. more than 10.4 dB of SNR). The peak SNR (PSNR) of the received cover image is more than 35 dB, which is acceptable for clinical applications.\n                  <\/jats:p>","DOI":"10.1515\/jisys-2017-0068","type":"journal-article","created":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T06:01:25Z","timestamp":1496815285000},"page":"105-114","source":"Crossref","is-referenced-by-count":20,"title":["Machine Learning-Based Robust Watermarking Technique for Medical Image Transmitted Over LTE Network"],"prefix":"10.1515","volume":"27","author":[{"given":"Ankur","family":"Rai","sequence":"first","affiliation":[{"name":"Electronics Engineering Department , Kamla Nehru Institute of Technology , Sultanpur , Uttar Pradesh, India"}]},{"given":"Harsh Vikram","family":"Singh","sequence":"additional","affiliation":[]}],"member":"374","published-online":{"date-parts":[[2017,6,7]]},"reference":[{"key":"2026030215571155036_j_jisys-2017-0068_ref_001_w2aab3b7b8b1b6b1ab1b5b1Aa","unstructured":"3GPP TS 23.402, UTRAN- and E-UTRAN-Based Systems, Architecture Enhancement for Non-3GPP Access (Release 8)."},{"key":"2026030215571155036_j_jisys-2017-0068_ref_002_w2aab3b7b8b1b6b1ab1b5b2Aa","unstructured":"3GPP TS 36.211, Evolved Universal Terrestrial Radio Access (EUTRA); Physical Channels and Modulations (Release 8)."},{"key":"2026030215571155036_j_jisys-2017-0068_ref_003_w2aab3b7b8b1b6b1ab1b5b3Aa","unstructured":"3GPP TS 36.300, Evolved Universal Terrestrial Radio Access (EUTRA); Overall Description (Release 8)."},{"key":"2026030215571155036_j_jisys-2017-0068_ref_004_w2aab3b7b8b1b6b1ab1b5b4Aa","doi-asserted-by":"crossref","unstructured":"D. Astely, E. Dahlman, A. Furuskar, Y. Jading, M. Lindstr\u00f6m and S. Parkvall, LTE: the evolution of mobile broadband, IEEE Commun. Mag.47 (2009), 44\u201351.10.1109\/MCOM.2009.4907406","DOI":"10.1109\/MCOM.2009.4907406"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_005_w2aab3b7b8b1b6b1ab1b5b5Aa","doi-asserted-by":"crossref","unstructured":"C. J. C. Burges, A tutorial on support vector machines for pattern recognition, Data Mining Knowl. Discov.2 (1998), 121\u2013167.10.1023\/A:1009715923555","DOI":"10.1023\/A:1009715923555"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_006_w2aab3b7b8b1b6b1ab1b5b6Aa","doi-asserted-by":"crossref","unstructured":"X. B. Cao, Y. W. Xu, D. Chen and H. Qiao, Associated evolution of a support vector machine-based classifier for pedestrian detection, Inf. Sci.179 (2009), 1070\u20131077.10.1016\/j.ins.2008.10.020","DOI":"10.1016\/j.ins.2008.10.020"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_007_w2aab3b7b8b1b6b1ab1b5b7Aa","unstructured":"N. H. Divecha and N. N. Jani, Image watermarking algorithm using DCT, DWT and SVD, In: IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology, NCIPET-2012, 2012."},{"key":"2026030215571155036_j_jisys-2017-0068_ref_008_w2aab3b7b8b1b6b1ab1b5b8Aa","doi-asserted-by":"crossref","unstructured":"F. C. A. Fernandes, R. L. V. Spaendonck and C. S. Burrus, Shiftable, projection-based complex wavelet transforms, In: Acoustics, Speech, and Signal Processing (ICASSP) on IEEE International Conference, Orlando, FL, USA, 2002.","DOI":"10.1109\/ICASSP.2002.1005977"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_009_w2aab3b7b8b1b6b1ab1b5b9Aa","doi-asserted-by":"crossref","unstructured":"A. Furuskar, T. Jonsson and M. Lundevall, The LTE Radio Interface: Key Characteristics and Performance: Personal, Indoor and Mobile Radio Communications, IEEE, Ericsson Research, Sweden, 2008.","DOI":"10.1109\/PIMRC.2008.4699492"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_010_w2aab3b7b8b1b6b1ab1b5c10Aa","doi-asserted-by":"crossref","unstructured":"E. Ganic and A. M. Eskicioglu, Robust DWT-SVD domain image watermarking: embedding data in all frequencies, In: Proc. Workshop Multimedia Security, Magdeburg, Germany, 2004, 166\u2013174.","DOI":"10.1145\/1022431.1022461"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_011_w2aab3b7b8b1b6b1ab1b5c11Aa","doi-asserted-by":"crossref","unstructured":"A. Giakoumaki, S. Pavlopoulos and D. Koutsouris, A medical image watermarking scheme based on wavelet transform, In: Proc. 25th Annu. Int. Conf. IEEE-EMBS, Cancun, Mexico, 2003, pp. 856\u2013859.","DOI":"10.1109\/IEMBS.2003.1279900"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_012_w2aab3b7b8b1b6b1ab1b5c12Aa","doi-asserted-by":"crossref","unstructured":"E. Kazi, R. Pillai, U. Qureshi and A. Faikh, Long term evolution. IOSR J. Electron. Commun. Eng.7 (2013), 36\u201342.10.9790\/2834-0733642","DOI":"10.9790\/2834-0733642"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_013_w2aab3b7b8b1b6b1ab1b5c13Aa","doi-asserted-by":"crossref","unstructured":"B. Kumar, H. V. Singh, S. P. Singh and A. Mohan, Novel efficient and secure medical data transmission on WiMAX, Telemed. J E Health14 (2008), 1063\u20131069.10.1089\/tmj.2008.0033","DOI":"10.1089\/tmj.2008.0033"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_014_w2aab3b7b8b1b6b1ab1b5c14Aa","doi-asserted-by":"crossref","unstructured":"A. Larmo, M. Lindstr\u00f6m, M. Meyer, G. Pelletier, J. Torsner and H. Wiemann, The LTE link-layer design, IEEE Commun. Mag.47 (2009), 52\u201359.10.1109\/MCOM.2009.4907407","DOI":"10.1109\/MCOM.2009.4907407"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_015_w2aab3b7b8b1b6b1ab1b5c15Aa","doi-asserted-by":"crossref","unstructured":"Y. S. Le, H. J. Kang and Y.-H. Kim, Copyright Authentication Enhancement of Digital Watermarking Based on Intelligent Human Visual System Scheme, Springer-Verlag, Berlin\/Heidelberg, 2005, KES 2005, LNAI 3682, pp. 567\u2013572.","DOI":"10.1007\/11552451_77"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_016_w2aab3b7b8b1b6b1ab1b5c16Aa","doi-asserted-by":"crossref","unstructured":"J. Lee, J. Han and J. Zhang, MIMO technologies in 3GPP LTE and LTE-advanced, EURASIP J. Wireless Commun. Netw. (2009), 1\u201310.","DOI":"10.1155\/2009\/302092"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_017_w2aab3b7b8b1b6b1ab1b5c17Aa","doi-asserted-by":"crossref","unstructured":"T. C. Lin and C. M. Lin, Wavelet-based copyright-protection scheme for digital images based on local features, Inf. Sci.179 (2009), 3349\u20133358.10.1016\/j.ins.2009.05.022","DOI":"10.1016\/j.ins.2009.05.022"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_018_w2aab3b7b8b1b6b1ab1b5c18Aa","doi-asserted-by":"crossref","unstructured":"N. A. Memon, S. A. M. Gilani and A. Ali, Watermarking of chest CT scan medical images for content authentication, In: ICICT, 2009, pp. 175\u2013180.","DOI":"10.1109\/ICICT.2009.5268167"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_019_w2aab3b7b8b1b6b1ab1b5c19Aa","doi-asserted-by":"crossref","unstructured":"N. A. Memon, S. A. M. Gilani and S. Qayoom, Multiple watermarking of medical images for content authentication and recovery, In: IEEE: 13th International, INMIC, 2009, pp. 1\u20136, 14\u201315","DOI":"10.1109\/INMIC.2009.5383112"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_020_w2aab3b7b8b1b6b1ab1b5c20Aa","doi-asserted-by":"crossref","unstructured":"M. Morelli, C.-C. J. Kuo and M.-O. Pun, Synchronization techniques for orthogonal frequency division multiple access (OFDMA): a tutorial review, In: Proc. IEEE, vol. 95, 2007, pp. 1394\u20131427.10.1109\/JPROC.2007.897979","DOI":"10.1109\/JPROC.2007.897979"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_021_w2aab3b7b8b1b6b1ab1b5c21Aa","doi-asserted-by":"crossref","unstructured":"B. M. Planitz and A. J. Maeder, A study of block-based medical image watermarking using a perceptual similarity metric. In: Proceedings in DICTA, 2005.","DOI":"10.1109\/DICTA.2005.7"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_022_w2aab3b7b8b1b6b1ab1b5c22Aa","doi-asserted-by":"crossref","unstructured":"A. Rai and H. V. Singh, SVM based robust watermarking for enhanced medical image security, Multimedia Tools. Appl. (2017), 1\u201314. DOI: 10.1007\/s11042-016-4215-3.","DOI":"10.1007\/s11042-016-4215-3"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_023_w2aab3b7b8b1b6b1ab1b5c23Aa","doi-asserted-by":"crossref","unstructured":"S. Ramly, S. A. Aljunid and H. S. Hussain, SVM-SS watermarking model for medical images, CCIS194 (2011), 372\u2013386.","DOI":"10.1007\/978-3-642-22603-8_34"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_024_w2aab3b7b8b1b6b1ab1b5c24Aa","doi-asserted-by":"crossref","unstructured":"J. J. K. O. Ruanaidh and T. Pun, Rotation, scale and translation invariant digital image watermarking, Signal Process.66 (1998), 303\u2013317.10.1016\/S0165-1684(98)00012-7","DOI":"10.1016\/S0165-1684(98)00012-7"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_025_w2aab3b7b8b1b6b1ab1b5c25Aa","unstructured":"Transition to 4G: 3GPP Broadband Evolution to IMT-Advanced, Rysavy Research\/3G Americas, September 2010."},{"key":"2026030215571155036_j_jisys-2017-0068_ref_026_w2aab3b7b8b1b6b1ab1b5c26Aa","unstructured":"M. Seetha, I. V. Murali Krishna and B. L. Deekshatulu, Comparison of advanced techniques of image classification, Map World Forum, 2007."},{"key":"2026030215571155036_j_jisys-2017-0068_ref_027_w2aab3b7b8b1b6b1ab1b5c27Aa","unstructured":"A. P. Singh and A. Mishra, Wavelet based watermarking on digital image, Indian J. Comput. Sci. Eng.1 (2011), 86\u201391."},{"key":"2026030215571155036_j_jisys-2017-0068_ref_028_w2aab3b7b8b1b6b1ab1b5c28Aa","unstructured":"H. V. Singh, S. P. Gangwar and R. Yadav, Emerging trends in transformed based image compression \u2013 a review, Int. J. Inf. Sci. Appl.2 (2010), 591\u2013595."},{"key":"2026030215571155036_j_jisys-2017-0068_ref_029_w2aab3b7b8b1b6b1ab1b5c29Aa","unstructured":"H. V. Singh, S. P. Gangwar and R. Yadav, Study and analysis of wavelet based image compression techniques, Int. J. Eng. Sci. Technol.4 (2012), 1\u20137."},{"key":"2026030215571155036_j_jisys-2017-0068_ref_030_w2aab3b7b8b1b6b1ab1b5c30Aa","doi-asserted-by":"crossref","unstructured":"H. V. Singh, S. Yadav and A. Mohan, Intellectual property right protection of image data using DCT and spread spectrum-based watermarking, Int. J. Electron. Security Dig. Forens.5 (2013), 218\u201322810.1504\/IJESDF.2013.058655","DOI":"10.1504\/IJESDF.2013.058655"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_031_w2aab3b7b8b1b6b1ab1b5c31Aa","doi-asserted-by":"crossref","unstructured":"H. V. Singh, A. K. Singh, S. Yadav and A. Mohan, DCT based secure data hiding for intellectual property right protection, CSI Trans. ICT2 (2014), 163\u2013168.10.1007\/s40012-014-0052-6","DOI":"10.1007\/s40012-014-0052-6"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_032_w2aab3b7b8b1b6b1ab1b5c32Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, B. Kumar, M. Dave and A. Mohan, Robust and imperceptible dual watermarking for telemedicine applications, Wireless Pers. Commun.80 (2014), 1415\u20131433.","DOI":"10.1007\/s11277-014-2091-6"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_033_w2aab3b7b8b1b6b1ab1b5c33Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, M. Dave and A. Mohan, Robust and secure multiple watermarking in wavelet domain, J. Med. Imaging Health Inform.5 (2015), 406\u2013414.10.1166\/jmihi.2015.1407","DOI":"10.1166\/jmihi.2015.1407"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_034_w2aab3b7b8b1b6b1ab1b5c34Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, B. Kumar, M. Dave and A. Mohan, Multiple watermarking on medical images using selective discrete wavelet transform coefficients, J. Med. Imaging Health Inform.5 (2015), 607\u2013614.10.1166\/jmihi.2015.1432","DOI":"10.1166\/jmihi.2015.1432"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_035_w2aab3b7b8b1b6b1ab1b5c35Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, M. Dave and A. Mohan, Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain, Wireless Pers. Commun.83 (2015), 2133\u20132150.10.1007\/s11277-015-2505-0","DOI":"10.1007\/s11277-015-2505-0"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_036_w2aab3b7b8b1b6b1ab1b5c36Aa","doi-asserted-by":"crossref","unstructured":"M. Speth, S. Fechtel, G. Fock and H. Meyr, Optimum receiver design for wireless broadband systems using OFDM. Part I, IEEE Trans. Commun.47 (1999), 1668\u20131677.10.1109\/26.803501","DOI":"10.1109\/26.803501"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_037_w2aab3b7b8b1b6b1ab1b5c37Aa","unstructured":"State of the Mobile Web, Opera Tech Report, October 2013."},{"key":"2026030215571155036_j_jisys-2017-0068_ref_038_w2aab3b7b8b1b6b1ab1b5c38Aa","doi-asserted-by":"crossref","unstructured":"H. H. Tsai and D.W. Sun, Color image watermark extraction based on support vector machines, Inf. Sci.177 (2007), 550\u2013569.10.1016\/j.ins.2006.05.002","DOI":"10.1016\/j.ins.2006.05.002"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_039_w2aab3b7b8b1b6b1ab1b5c39Aa","doi-asserted-by":"crossref","unstructured":"Z. Wang, A. C. Bovik, H. R. Sheikh and E. P. Simoncelli, Image quality assessment: from error visibility to structural similarity, IEEE Trans. Image Process.13 (2004), 600\u2013612.10.1109\/TIP.2003.819861","DOI":"10.1109\/TIP.2003.819861"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_040_w2aab3b7b8b1b6b1ab1b5c40Aa","unstructured":"S. H. Yen and C. J. Wang, SVM based watermarking technique, Tamkang J. Sci. Eng.9 (2006), 141\u2013150."},{"key":"2026030215571155036_j_jisys-2017-0068_ref_041_w2aab3b7b8b1b6b1ab1b5c41Aa","unstructured":"J. Zain and M. Clarke, Security in telemedicine: issues in watermarking medical images. In: 3rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications, Tunisia, 2005."},{"key":"2026030215571155036_j_jisys-2017-0068_ref_042_w2aab3b7b8b1b6b1ab1b5c42Aa","doi-asserted-by":"crossref","unstructured":"A. Zear, A. K. Singh and P. Kumar, A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine, Multimedia Tools Appl. (2016), DOI: 10.1007\/s11042-016-3862-8.","DOI":"10.1007\/s11042-016-3862-8"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_043_w2aab3b7b8b1b6b1ab1b5c43Aa","doi-asserted-by":"crossref","unstructured":"A. Zear, A. K. Singh and P. Kumar, Multiple watermarking for healthcare applications, J. Intell. Syst. 27 (2018), 5\u201318.10.1515\/jisys-2016-0036","DOI":"10.1515\/jisys-2016-0036"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_044_w2aab3b7b8b1b6b1ab1b5c44Aa","doi-asserted-by":"crossref","unstructured":"Y. Zhou and W. Jin, A robust digital image multi-watermarking scheme in the DWT domain, In: International Conference on Techniques and Informatics, (ICSAI 2012), 2012.","DOI":"10.1109\/ICSAI.2012.6223407"},{"key":"2026030215571155036_j_jisys-2017-0068_ref_045_w2aab3b7b8b1b6b1ab1b5c45Aa","unstructured":"Z. Zhou, B. Tang and X. Liu, A block SVD based image watermarking method, In: Proceedings of the 6th World Congress on Intelligent Control and Automation, Dalian, China, 2006."},{"key":"2026030215571155036_j_jisys-2017-0068_ref_046_w2aab3b7b8b1b6b1ab1b5c46Aa","unstructured":"J. Zyren and W. McCoy, White Paper on Overview of the 3GPP Long Term Evolution Physical Layer, Freescale Semiconductor, 2007."}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.degruyter.com\/view\/j\/jisys.2018.27.issue-1\/jisys-2017-0068\/jisys-2017-0068.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2017-0068\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2017-0068\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T15:57:26Z","timestamp":1772467046000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2017-0068\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,7]]},"references-count":46,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2017,6,7]]},"published-print":{"date-parts":[[2018,1,26]]}},"alternative-id":["10.1515\/jisys-2017-0068"],"URL":"https:\/\/doi.org\/10.1515\/jisys-2017-0068","relation":{},"ISSN":["2191-026X","0334-1860"],"issn-type":[{"value":"2191-026X","type":"electronic"},{"value":"0334-1860","type":"print"}],"subject":[],"published":{"date-parts":[[2017,6,7]]}}}