{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:16:43Z","timestamp":1761581803193,"version":"3.40.5"},"reference-count":31,"publisher":"IGI Global","issue":"2","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"am","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/deed.en_US"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4,1]]},"abstract":"<p>In this article, a blind and robust medical image watermarking technique based on Finite Ridgelet Transform (FRT) and Singular Value Decomposition (SVD) is proposed. A host medical image is first transformed into 16 \u00d7 16 non-overlapping blocks and then ridgelet transform is applied on the individual blocks to obtain sets of ridgelet coefficients. SVD is then applied on these sets, to obtain the corresponding U, S and V matrix. The watermark information is embedded into the host medical image by modification of the value of the significant elements of U matrix. This proposed technique is tested on various types of medical images such as X-ray and CT scan. The simulation results revealed that this technique provides better imperceptibility, with an average PSNR being 42.95 dB for all test medical images. This technique also overcomes the limitation of the existing technique which is applicable on only the Region of Interest (ROI) of the medical image.<\/p>","DOI":"10.4018\/ijdcf.2019040102","type":"journal-article","created":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T15:12:45Z","timestamp":1550848365000},"page":"13-33","source":"Crossref","is-referenced-by-count":28,"title":["A FRT - SVD Based Blind Medical Watermarking Technique for Telemedicine Applications"],"prefix":"10.4018","volume":"11","author":[{"given":"Surekah","family":"Borra","sequence":"first","affiliation":[{"name":"K. S. Institute of Technology, Bengaluru, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0645-6266","authenticated-orcid":true,"given":"Rohit","family":"Thanki","sequence":"additional","affiliation":[{"name":"C. U. Shah University, Wadhwan, India"}]}],"member":"2432","reference":[{"key":"IJDCF.2019040102-0","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/136034"},{"journal-title":"The promise of telehealth for hospitals, health systems, and their communities","year":"2015","key":"IJDCF.2019040102-1"},{"key":"IJDCF.2019040102-2","first-page":"450","article-title":"Digital image watermarking tools: State-of-the-art.","volume":"296","author":"S.Borra","year":"2017","journal-title":"Frontiers in Artificial Intelligence and Applications"},{"key":"IJDCF.2019040102-3","first-page":"29","article-title":"Visual cryptography based lossless watermarking for sensitive images.","author":"S.Borra","year":"2015","journal-title":"International Conference on Swarm, Evolutionary, and Memetic Computing"},{"key":"IJDCF.2019040102-4","unstructured":"Borra, S., Swamy, G., & Reddy, K. R. L. (2012, July). A novel copyright protection scheme based on visual secret sharing. In 2012 Third International Conference on Computing Communication & Networking Technologies (ICCCNT) (pp. 1-5). IEEE."},{"issue":"9","key":"IJDCF.2019040102-5","first-page":"3","article-title":"Visual secret sharing based digital image watermarking.","author":"S.Borra","year":"2012","journal-title":"International Journal of Computational Science"},{"key":"IJDCF.2019040102-6","unstructured":"Borra, S., & Swamy, G. N. (2014, December). Security analysis of \u2018A novel copyright protection scheme using visual cryptography. In 2014 International Conference on Computer and Communications Technologies (ICCCT) (pp. 1-5). IEEE."},{"issue":"6","key":"IJDCF.2019040102-7","first-page":"470","article-title":"A watermarking technique based on visual cryptography.","volume":"4","author":"S.Borra","year":"2009","journal-title":"Journal of Information Assurance and Security"},{"key":"IJDCF.2019040102-8","unstructured":"Candes, E. (1998). Ridgelets theory and application [PhD Thesis]. Stanford University, Stanford, CA."},{"key":"IJDCF.2019040102-9","doi-asserted-by":"crossref","unstructured":"Candes, E., Donoho, D. (1999). Ridgelets: a key to higher dimensional intermittency? Philosophical Transactions of the Royal Society A, 357(1760), 2495\u20132509.","DOI":"10.1098\/rsta.1999.0444"},{"journal-title":"A Surprisingly effective non-adaptive representation for objects with edges, Curves and Surfaces","year":"2000","author":"E.Candes","key":"IJDCF.2019040102-10"},{"key":"IJDCF.2019040102-11","unstructured":"Color X-ray [Image]. (n.d.). Retrieved from https:\/\/in.pinterest.com\/pin\/13088655138462036\/"},{"key":"IJDCF.2019040102-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2006.08.002"},{"key":"IJDCF.2019040102-13","doi-asserted-by":"crossref","unstructured":"Dey, N., Biswas, D., Roy, A., Das, A., & Chaudhuri, S. (2012). DWT-DCT-SVD based blind watermarking technique of gray image in electrooculogram signal. In 2012 12th International Conference on Intelligent Systems Design and Applications (ISDA) (pp. 680\u2013685).","DOI":"10.1109\/ISDA.2012.6416619"},{"key":"IJDCF.2019040102-14","doi-asserted-by":"publisher","DOI":"10.1109\/WICT.2012.6409079"},{"key":"IJDCF.2019040102-15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2000.899394"},{"key":"IJDCF.2019040102-16","doi-asserted-by":"publisher","DOI":"10.1006\/jath.2001.3568"},{"key":"IJDCF.2019040102-17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmaa.2005.05.069"},{"key":"IJDCF.2019040102-18","first-page":"226","article-title":"Fair benchmark for image watermarking systems","author":"M.Kutter","year":"1999","journal-title":"Electronic Imaging\u201999"},{"key":"IJDCF.2019040102-19","doi-asserted-by":"publisher","DOI":"10.1109\/IACC.2016.104"},{"key":"IJDCF.2019040102-20","unstructured":"MedPix. (n.d.). Medical Image Database. Retrieved from http:\/\/rad.usuhs.mil\/medpix\/medpix.html"},{"key":"IJDCF.2019040102-21","unstructured":"PET\/CT scan through the chest demonstrating locally aggressive lung cancer represented by color [image]. (n.d.). Retrieved from https:\/\/in.pinterest.com\/pin\/65302263319817052\/"},{"key":"IJDCF.2019040102-22","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3902-4"},{"key":"IJDCF.2019040102-23","unstructured":"Singh, A. (2015). Some new techniques of improved wavelet domain watermarking for medical images [Ph.D. Thesis]. NIT Kurukshetra."},{"key":"IJDCF.2019040102-24","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2014.065739"},{"key":"IJDCF.2019040102-25","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2013.03.013"},{"key":"IJDCF.2019040102-26","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3928-7"},{"key":"IJDCF.2019040102-27","doi-asserted-by":"crossref","unstructured":"Thanki, R., Borra, S., Dwivedi, V., & Borisagar, K. (2017). An efficient medical image watermarking scheme based on FDCuT\u2013DCT. Engineering Science and Technology, an International Journal, 20(4), 1366-1379.","DOI":"10.1016\/j.jestch.2017.06.001"},{"key":"IJDCF.2019040102-28","unstructured":"Thanki, R., Kher, R., & Vyas, D. (2011, January). Performance Analysis of Correlation based Watermarking Technique for Medical Images in presence of WGN. In 2nd International Conference on Signals, Systems & Automation (ICSSA-2011), GCET, VV Nagar, India."},{"key":"IJDCF.2019040102-29","first-page":"288","article-title":"Blind medical image watermarking with LWT-SVD for Telemedicine Applications.","volume":"10","author":"N.Venkatram","year":"2014","journal-title":"WSEAS Transactions on Signal Processing"},{"key":"IJDCF.2019040102-30","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2015907183"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=223939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T01:48:37Z","timestamp":1651888117000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2019040102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,4,1]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2019040102","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"type":"print","value":"1941-6210"},{"type":"electronic","value":"1941-6229"}],"subject":[],"published":{"date-parts":[[2019,4,1]]}}}