{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:58:59Z","timestamp":1764997139834,"version":"3.46.0"},"reference-count":27,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2017,9,26]],"date-time":"2017-09-26T00:00:00Z","timestamp":1506384000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1,26]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The main objective of this paper is to propose a medical image watermarking technique in E-healthcare application based on the hybridization of compression and cryptography algorithm. Basically, the proposed system consists of two stages: (i) watermark embedding process and (ii) watermark extraction process. In the embedding process, at first, we segment the tumor part separately using a region growing algorithm. Then, we encrypt the region of interest part using Secure Hash Algorithm-256 and encrypt the electronic health record (EHR) using the elliptical curve cryptography algorithm. Thereafter, we concatenate and compress the information using an arithmetic coding algorithm. Finally, we embed the compressed bit into the original image. The same process is repeated for the extraction process. The experimental results are shown for different medical images with EHR and the effectiveness of the proposed algorithm is analyzed with the help of the peak signal-to-noise ratio and normalized correlation.<\/jats:p>","DOI":"10.1515\/jisys-2017-0266","type":"journal-article","created":{"date-parts":[[2017,9,26]],"date-time":"2017-09-26T06:01:20Z","timestamp":1506405680000},"page":"115-133","source":"Crossref","is-referenced-by-count":26,"title":["An Efficient Medical Image Watermarking Technique in E-healthcare Application Using Hybridization of Compression and Cryptography Algorithm"],"prefix":"10.1515","volume":"27","author":[{"given":"Puvvadi","family":"Aparna","sequence":"first","affiliation":[{"name":"K L University , Vijayawada, Andhra Pradesh , India"}]},{"given":"Polurie Venkata Vijay","family":"Kishore","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering , K L University , Vijayawada, Andhra Pradesh , India"}]}],"member":"374","published-online":{"date-parts":[[2017,9,26]]},"reference":[{"key":"2025120523342717806_j_jisys-2017-0266_ref_001_w2aab3b7b9b1b6b1ab1b7b1Aa","doi-asserted-by":"crossref","unstructured":"H.-M. Chao, C.-M. Hsu and S.-G. Miaou, A data-hiding technique with authentication, integration, and confidentiality for electronic patient records, IEEE Trans. Inform. Technol. Biomed.6 (2002), 46\u201353.10.1109\/4233.992161","DOI":"10.1109\/4233.992161"},{"key":"2025120523342717806_j_jisys-2017-0266_ref_002_w2aab3b7b9b1b6b1ab1b7b2Aa","unstructured":"G. Coatrieux, H. Maitre and B. Sankur, Strict integrity control of biomedical images, in: Proceedings of SPIE Security Watermarking Multimedia Contents III, pp. 229\u2013240, San Jose, CA, 2001."},{"key":"2025120523342717806_j_jisys-2017-0266_ref_003_w2aab3b7b9b1b6b1ab1b7b3Aa","doi-asserted-by":"crossref","unstructured":"G. Coatrieux, M. Lamard, W. Daccache, W. Puentes and C. Roux, A low distortion and reversible watermark: application to angiographic images of the retina, in: 27th Annual International Conference of the Engineering in Medicine and Biology Society, pp. 2224\u20132227, 2006.","DOI":"10.1109\/IEMBS.2005.1616905"},{"key":"2025120523342717806_j_jisys-2017-0266_ref_004_w2aab3b7b9b1b6b1ab1b7b4Aa","doi-asserted-by":"crossref","unstructured":"M. Hasnaoui and M. Mitrea, Multi-symbol QIM video watermarking, Signal Process. Image Commun.29 (2014), 107\u2013127.10.1016\/j.image.2013.07.007","DOI":"10.1016\/j.image.2013.07.007"},{"key":"2025120523342717806_j_jisys-2017-0266_ref_005_w2aab3b7b9b1b6b1ab1b7b5Aa","unstructured":"HEMA, DICOM: Digital Imaging and Communication in Medicine, [Online], Available: http:\/\/medical.nema.org\/."},{"key":"2025120523342717806_j_jisys-2017-0266_ref_006_w2aab3b7b9b1b6b1ab1b7b6Aa","doi-asserted-by":"crossref","unstructured":"L.-Y. Hsu and H.-T. Hu, Blind image watermarking via exploitation of inter-block prediction and visibility threshold in DCT domain, Int. J. Sci. Direct32 (2015), 130\u2013143.","DOI":"10.1016\/j.jvcir.2015.07.017"},{"key":"2025120523342717806_j_jisys-2017-0266_ref_007_w2aab3b7b9b1b6b1ab1b7b7Aa","doi-asserted-by":"crossref","unstructured":"S. Kaihara, Realisation of the computerised patient record; relevance and unsolved problems, Int. J. Med. Inform.49 (1998), 1\u20138.10.1016\/S1386-5056(98)00004-5","DOI":"10.1016\/S1386-5056(98)00004-5"},{"key":"2025120523342717806_j_jisys-2017-0266_ref_008_w2aab3b7b9b1b6b1ab1b7b8Aa","unstructured":"H. K. Lee, H. J. Kim, K. R. Kwon and J. K. Lee, Digital watermarking of medical image using ROI information, in: Proceedings of 7th International Workshop on Enterprise networking and Computing in Healthcare Industry, pp. 404\u2013407, 2005."},{"key":"2025120523342717806_j_jisys-2017-0266_ref_009_w2aab3b7b9b1b6b1ab1b7b9Aa","doi-asserted-by":"crossref","unstructured":"B. Lei, T. E.-L. Tan, S. Chen, D. Ni, T. Wang and H. Lei, Reversible watermarking scheme for medical image based on differential evolution, Exp. Syst. Appl.41 (2014), 3178\u20133188.10.1016\/j.eswa.2013.11.019","DOI":"10.1016\/j.eswa.2013.11.019"},{"key":"2025120523342717806_j_jisys-2017-0266_ref_010_w2aab3b7b9b1b6b1ab1b7c10Aa","unstructured":"M. Li, S. Narayanan and R. Poovendran, Tracing medical images using multi-band watermarks, Conf. Proc. IEEE Eng. Med. Biol. Soc.5 (2004), 3233\u20133236."},{"key":"2025120523342717806_j_jisys-2017-0266_ref_011_w2aab3b7b9b1b6b1ab1b7c11Aa","doi-asserted-by":"crossref","unstructured":"E. Maiorana, P. Campisi and A. Neri, Biometric signature authentication using randon transform-based watermarking techniques, in: IEEE Biometric Symposium, pp. 1\u20136, 2007.","DOI":"10.1109\/BCC.2007.4430543"},{"key":"2025120523342717806_j_jisys-2017-0266_ref_012_w2aab3b7b9b1b6b1ab1b7c12Aa","unstructured":"V. Mehan, R. Dhir and Y. S. Brar, Watermarking for health management system, Int. J. Adv. Res. Comput. Sci. Softw. Eng.3 (2013), 224\u2013228."},{"key":"2025120523342717806_j_jisys-2017-0266_ref_013_w2aab3b7b9b1b6b1ab1b7c13Aa","doi-asserted-by":"crossref","unstructured":"R. Pandey, A. K. Singh, B. Kumar and A. Mohan, Iris based secure NROI multiple eye image watermarking for teleophthalmology, J. Multimed. Tools Appl.75 (2016), 14381\u201314397.10.1007\/s11042-016-3536-6","DOI":"10.1007\/s11042-016-3536-6"},{"key":"2025120523342717806_j_jisys-2017-0266_ref_014_w2aab3b7b9b1b6b1ab1b7c14Aa","doi-asserted-by":"crossref","unstructured":"S. A. Parah, J. A. Sheikh and G. M. Bhat, Fragility evaluation of intermediate significant bit embedding (ISBE) based digital image watermarking scheme for content authentication, in: International Conference on Advances in Electronics, Computers and Communications (ICAECC), pp. 1\u20136, 2014.","DOI":"10.1109\/ICAECC.2014.7002424"},{"key":"2025120523342717806_j_jisys-2017-0266_ref_015_w2aab3b7b9b1b6b1ab1b7c15Aa","doi-asserted-by":"crossref","unstructured":"S. A. Parah, J. A. Sheikh, F. Ahad, N. A. Loan and G. M. Bhat, Information hiding in medical images: a robust medical image watermarking system for E-healthcare, J. Multimed. Tools Appl.76 (2017), 10599\u201310633.10.1007\/s11042-015-3127-y","DOI":"10.1007\/s11042-015-3127-y"},{"key":"2025120523342717806_j_jisys-2017-0266_ref_016_w2aab3b7b9b1b6b1ab1b7c16Aa","doi-asserted-by":"crossref","unstructured":"F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, Information hiding \u2013 a survey, in: Proceedings of IEEE Special Issue on Protection of Multimedia Content, vol. 87, pp. 1062\u20131078, 1999.","DOI":"10.1109\/5.771065"},{"key":"2025120523342717806_j_jisys-2017-0266_ref_017_w2aab3b7b9b1b6b1ab1b7c17Aa","doi-asserted-by":"crossref","unstructured":"C. Qin, H. Wang, X. Zhang and X. Sun, Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode, Int. J. Sci.373 (2016), 233\u2013250.","DOI":"10.1016\/j.ins.2016.09.001"},{"key":"2025120523342717806_j_jisys-2017-0266_ref_018_w2aab3b7b9b1b6b1ab1b7c18Aa","doi-asserted-by":"crossref","unstructured":"P. Rasti, S. Samiei and M. Agoyi, Robust non-blind color video watermarking using QR decomposition and entropy analysis, Int. J. Sci. Direct38 (2016), 838\u2013847.","DOI":"10.1016\/j.jvcir.2016.05.001"},{"key":"2025120523342717806_j_jisys-2017-0266_ref_019_w2aab3b7b9b1b6b1ab1b7c19Aa","doi-asserted-by":"crossref","unstructured":"R. Rodriguez-Colin, F.-U. Claudia and G. d. J. Trinidad-Blas, Data hiding scheme for medical image, in: IEEE 17th International Conference on Electronics Communications and Computers (CONIELECOMP\u201907), 2007.","DOI":"10.1109\/CONIELECOMP.2007.14"},{"key":"2025120523342717806_j_jisys-2017-0266_ref_020_w2aab3b7b9b1b6b1ab1b7c20Aa","doi-asserted-by":"crossref","unstructured":"A. Sharma, A. K. Singh and S. P. Ghrera, Robust and secure multiple watermarking technique for medical images, Wireless Pers. Commun.92 (2017), 1611\u20131624.10.1007\/s11277-016-3625-x","DOI":"10.1007\/s11277-016-3625-x"},{"key":"2025120523342717806_j_jisys-2017-0266_ref_021_w2aab3b7b9b1b6b1ab1b7c21Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, Improved hybrid technique for robust and imperceptible multiple watermarking using medical images, J. Multimed. Tools Appl.75 (2016), 8381\u20138401.10.1007\/s11042-015-2754-7","DOI":"10.1007\/s11042-015-2754-7"},{"key":"2025120523342717806_j_jisys-2017-0266_ref_022_w2aab3b7b9b1b6b1ab1b7c22Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, M. Dave and A. Mohan, Multilevel encrypted text watermarking on medical images using spread-spectrum in DWT domain, Wireless Pers. Commun.83 (2015), 2133\u20132150.10.1007\/s11277-015-2505-0","DOI":"10.1007\/s11277-015-2505-0"},{"key":"2025120523342717806_j_jisys-2017-0266_ref_023_w2aab3b7b9b1b6b1ab1b7c23Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, M. Dave and A. Mohan, Multiple watermarking on medical images using selective DWT coefficients, J. Med. Imaging Health Inform.5 (2015), 607\u2013614.10.1166\/jmihi.2015.1432","DOI":"10.1166\/jmihi.2015.1432"},{"key":"2025120523342717806_j_jisys-2017-0266_ref_024_w2aab3b7b9b1b6b1ab1b7c24Aa","doi-asserted-by":"crossref","unstructured":"A. K. Singh, M. Dave and A. Mohan, Robust and secure multiple watermarking in wavelet domain, J. Med. Imaging Health Inform.5 (2015), 406\u2013414.10.1166\/jmihi.2015.1407","DOI":"10.1166\/jmihi.2015.1407"},{"key":"2025120523342717806_j_jisys-2017-0266_ref_025_w2aab3b7b9b1b6b1ab1b7c25Aa","unstructured":"A. K. Singh, B. Kumar, S. K. Singh, S. P. Ghrera and A. Mohand, Multiple watermarking technique for securing online social network contents using back propagation neural network, J. Future Gen. Comput. Syst.25 (2016)."},{"key":"2025120523342717806_j_jisys-2017-0266_ref_026_w2aab3b7b9b1b6b1ab1b7c26Aa","unstructured":"United States Department of Health and Human Services, HIPAA: Medical Privacy \u2013 National Standards to Protect the Privacy of Personal Health Information, Available at http:\/\/www.hhs.gov\/ocr\/hipaa\/."},{"key":"2025120523342717806_j_jisys-2017-0266_ref_027_w2aab3b7b9b1b6b1ab1b7c27Aa","doi-asserted-by":"crossref","unstructured":"A. Zear, A. K. Singh and P. Kumar, A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine, Multimed. Tools Appl. (2016), 1\u201320.","DOI":"10.1007\/s11042-016-3862-8"}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.degruyter.com\/view\/j\/jisys.2018.27.issue-1\/jisys-2017-0266\/jisys-2017-0266.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2017-0266\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2017-0266\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:34:36Z","timestamp":1764977676000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2017-0266\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,26]]},"references-count":27,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2017,9,26]]},"published-print":{"date-parts":[[2018,1,26]]}},"alternative-id":["10.1515\/jisys-2017-0266"],"URL":"https:\/\/doi.org\/10.1515\/jisys-2017-0266","relation":{},"ISSN":["2191-026X","0334-1860"],"issn-type":[{"type":"electronic","value":"2191-026X"},{"type":"print","value":"0334-1860"}],"subject":[],"published":{"date-parts":[[2017,9,26]]}}}