{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T16:16:39Z","timestamp":1774973799688,"version":"3.50.1"},"reference-count":27,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T00:00:00Z","timestamp":1566864000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12,18]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>A reliable medical image management must provide proper security for patient information. Protecting the medical information of the patients is a major concern in all hospitals. Digital watermarking is a procedure prevalently used to secure the confidentiality of medical information and maintain them, which upgrades patient health awareness. To protect the medical information, the robust and lossless patient medical information sharing system using crypto-watermarking method is proposed. The proposed system consists of two phases: (i) embedding and (ii) extraction. In this paper, we securely share three types of patient information, medical image, electronic health record (EHR), and face image from one hospital to another hospital. Initially, all the three inputs are encrypted and the information is concordant. In order to enhance the robustness of the crypto-watermarking system, the obtained bit stream is compressed, and the compressed bit streams are embedded into the cover image. The same process is repeated for the extraction process. The experimentation result is carried out using different medical images with EHR, and the effectiveness of the proposed algorithm is analyzed with the help of peak signal to noise ratio.<\/jats:p>","DOI":"10.1515\/jisys-2018-0370","type":"journal-article","created":{"date-parts":[[2019,8,27]],"date-time":"2019-08-27T05:05:25Z","timestamp":1566882325000},"page":"1558-1575","source":"Crossref","is-referenced-by-count":7,"title":["A Blind Medical Image Watermarking for Secure E-Healthcare Application Using Crypto-Watermarking System"],"prefix":"10.1515","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9400-340X","authenticated-orcid":false,"given":"Puvvadi","family":"Aparna","sequence":"first","affiliation":[{"name":"K L University , Vijayawada, Andhra Pradesh , India"}]},{"given":"Polurie Venkata Vijay","family":"Kishore","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering , K L University , Vijayawada, Andhra Pradesh , India"}]}],"member":"374","published-online":{"date-parts":[[2019,8,27]]},"reference":[{"key":"2025120523341666819_j_jisys-2018-0370_ref_001","doi-asserted-by":"crossref","unstructured":"S. K. Amirgholipour and A. R. NaghshNilchi, Robust digital image watermarking based on joint DWT-DCT, JDCTA 3 (2009), 42\u201354.","DOI":"10.4156\/jdcta.vol3.issue2.amirgholipour"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_002","doi-asserted-by":"crossref","unstructured":"P. Aparna and P. V. V. Kishore, An efficient medical image watermarking technique in E-healthcare application using hybridization of compression and cryptography algorithm, J. Intell. Syst. 27 (2018), 115\u2013133.","DOI":"10.1515\/jisys-2017-0266"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_003","doi-asserted-by":"crossref","unstructured":"K.-H. Chiang, K.-C. Chang-Chien, R.-F. Chang and H.-Y. Yen, Tamper detection and restoring system for medical images using wavelet-based reversible data embedding, J. Digit. Imaging 21 (2008), 77\u201390.","DOI":"10.1007\/s10278-007-9012-0"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_004","doi-asserted-by":"crossref","unstructured":"Chitrasen and T. Kashyap, Digital video watermarking using DWT for data security, IJARCCE 4 (2015), 307\u2013309.","DOI":"10.17148\/IJARCCE.2015.4170"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_005","doi-asserted-by":"crossref","unstructured":"A. Giakoumaki, S. Pavlopoulos and D. Koutouris, A medical image watermarking scheme based on wavelet transform. in: Engineering in Medicine and Biology Society, 2003. Proceedings of the 25th Annual International Conference of the IEEE, 1, pp. 856\u2013859, 2003.","DOI":"10.1109\/IEMBS.2003.1279900"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_006","doi-asserted-by":"crossref","unstructured":"H. Golpira and H. Danyali, Reversible blind watermarking for medical images based on wavelet histogram shifting, in: 2009 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2009), pp. 31\u201336, 2009.","DOI":"10.1109\/ISSPIT.2009.5407489"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_007","doi-asserted-by":"crossref","unstructured":"B. Kumar, H. V. Singh, S. P. Singh and A. Mohan, Secure spread-spectrum watermarking for telemedicine applications, J. Inf. Secur. 2 (2011), 91.","DOI":"10.4236\/jis.2011.22009"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_008","doi-asserted-by":"crossref","unstructured":"S. Lee, C. D. Yoo and T. Kalker, Reversible image watermarking based on integer-to-integer wavelet transform, IEEE Trans. Inf. Forensics Secur. 2 (2007), 321\u2013330.","DOI":"10.1109\/TIFS.2007.905146"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_009","doi-asserted-by":"crossref","unstructured":"S.-C. Liew and J. M. Zain, Reversible medical image watermarking for tamper detection and recovery, in: Proceedings of the 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT \u201910), 5, pp. 417\u2013420, 2010.","DOI":"10.1109\/ICCSIT.2010.5564078"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_010","doi-asserted-by":"crossref","unstructured":"S. Lin and C. Chin, A robust DCT-based watermarking for copyright protection, IEEE Trans. Consum. Electr. 46 (2000), 415\u2013421.","DOI":"10.1109\/30.883387"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_011","doi-asserted-by":"crossref","unstructured":"S. Low and N. Maxemchuk, Performance comparison of two text marking methods, IEEE J. Sel. Areas Commun. 16 (1998), 561\u2013572.","DOI":"10.1109\/49.668978"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_012","unstructured":"X. Luo, Q. Cheng and J. Tan, A lossless data embedding scheme for medical images in application of e-diagnosis, in: Proceedings of the 25th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 1, pp. 852\u2013855, 2003."},{"key":"2025120523341666819_j_jisys-2018-0370_ref_013","unstructured":"K. V. Mahesan, S. Bhargavi and D. Jayadevappa, Segmentation of MR images using active contours: methods, challenges and applications, Int. J. Innov. Res. Adv. Eng. 2 (2014), 13\u201321."},{"key":"2025120523341666819_j_jisys-2018-0370_ref_014","unstructured":"K. Matsui, J. Ohnishi and Y. Nakamura, Embedding a signature to pictures under wavelet transform, IEICE Trans. J79-D-II (1996), 1017\u20131024."},{"key":"2025120523341666819_j_jisys-2018-0370_ref_015","doi-asserted-by":"crossref","unstructured":"Z. Ni, Y. Q. Shi, N. Ansari and W. Su, Reversible data hiding, IEEE Trans. Circuits Syst. Video Technol. 16 (2006), 354\u2013362.","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_016","doi-asserted-by":"crossref","unstructured":"R. Ohbuchi, H. Masuda and M. Aono, Watermarking three-dimensional polygonal models through geometric and topological modifications, IEEE J. Sel. Areas Commun. 16 (1998), 551\u2013560.","DOI":"10.1109\/49.668977"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_017","doi-asserted-by":"crossref","unstructured":"J. Ohnishi and K. Matsui, Embedding a seal into a picture under orthogonal wavelet transform, in: The Proceedings of IEEE International Conference on Multimedia Computing and Systems, pp. 514\u2013512, 1996.","DOI":"10.1109\/MMCS.1996.535017"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_018","doi-asserted-by":"crossref","unstructured":"S. A. Parah, J. A. Sheikh, F. Ahad, N. A. Loan and G. M. Bhat, Information hiding in medical images: a robust medical image watermarking system for E-healthcare, Multimed. Tools Appl. 76 (2017), 10599\u201310633.","DOI":"10.1007\/s11042-015-3127-y"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_019","unstructured":"M. Pooja Prakash, R. Sreeraj, F. AthishMon and K. Suthendran, Combined cryptography and digital watermarking for secure transmission of medical images in EHR systems, Int. J. Pure Appl. Math. 118 (2018), 265\u2013269."},{"key":"2025120523341666819_j_jisys-2018-0370_ref_020","doi-asserted-by":"crossref","unstructured":"P. Selvam, S. Balachandran, S. P. Iyer and R. Jayabal, Hybrid transform based reversible watermarking technique for medical images in telemedicine applications, Optik-Int. J. Light Electron Optics 145 (2017), 655\u2013671.","DOI":"10.1016\/j.ijleo.2017.07.060"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_021","doi-asserted-by":"crossref","unstructured":"M. D. Swanson, B. Zhu and A. H. Tewfik, Transparent robust image watermarking, in: The Proceedings of IEEE International Conference on Image Processing, 3, pp. 211\u2013214, 1996.","DOI":"10.1109\/ICIP.1996.560421"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_022","doi-asserted-by":"crossref","unstructured":"M. J. Vidya and K. V. Padmaja, Enhancing security of electronic patient record using watermarking technique, Mat. Today: Proc. 5 (2018), 10660\u201310664.","DOI":"10.1016\/j.matpr.2017.12.341"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_023","doi-asserted-by":"crossref","unstructured":"P. Viswanathan and P. V. Krishna, A joint FED watermarking system using spatial fusion for verifying the security issues of teleradiology, IEEE J. Biomed. Health Inform. 18 (2014), 753\u2013764.","DOI":"10.1109\/JBHI.2013.2281322"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_024","doi-asserted-by":"crossref","unstructured":"G. Voyatzis and I. Pitas, Applications of toral auto morphisms in image watermarking, in: The Proceedings of IEEE International Conference on Image Processing, 2, pp. 237\u2013240, 1996.","DOI":"10.1109\/ICIP.1996.560753"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_025","doi-asserted-by":"crossref","unstructured":"J. H. K. Wu, R.-F. Chang, C.-J. Chen, C. L. Wang, T. H. Kuo, W. K. Moon and D. R. Chen, Tamper detection and recovery for medical images using near-lossless information hiding technique, J. Digit. Imaging 21 (2008), 59\u201376.","DOI":"10.1007\/s10278-007-9011-1"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_026","doi-asserted-by":"crossref","unstructured":"N. I. Yassin, N. M. Salem and M. I. El Adawy, QIM blind video watermarking scheme based on wavelet transform and principal component analysis, Alex. Eng. J. 53 (2014), 833\u2013842.","DOI":"10.1016\/j.aej.2014.07.008"},{"key":"2025120523341666819_j_jisys-2018-0370_ref_027","doi-asserted-by":"crossref","unstructured":"J. M. Zain and A. R. M. Fauzi, Medical image watermarking with tamper detection and recovery, in: Proceedings of the 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBS \u201906), pp. 3270\u20133273, September, 2006.","DOI":"10.1109\/IEMBS.2006.260767"}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/view\/journals\/jisys\/29\/1\/article-p1558.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2018-0370\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2018-0370\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:34:45Z","timestamp":1764977685000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2018-0370\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,27]]},"references-count":27,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2019,9,20]]},"published-print":{"date-parts":[[2019,12,18]]}},"alternative-id":["10.1515\/jisys-2018-0370"],"URL":"https:\/\/doi.org\/10.1515\/jisys-2018-0370","relation":{},"ISSN":["2191-026X","0334-1860"],"issn-type":[{"value":"2191-026X","type":"electronic"},{"value":"0334-1860","type":"print"}],"subject":[],"published":{"date-parts":[[2019,8,27]]}}}