{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T12:00:38Z","timestamp":1747224038298,"version":"3.40.5"},"reference-count":43,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10,1]]},"abstract":"<p>The growth and emergence of telemedicine has resulted into considerable increase in the transfer of medical images between various health centers over computer networks for various purposes, such as diagnosis, clinical interpretation, and archives. The security of these images is a serious concern since these images can be manipulated during their transmission over the network. Moreover, as the authentication of the medical images is required for various legal purposes; the information security requirement specifications specified by various legislative rules must be adhered by the concerned stakeholders. In this research, a discrete wavelet-based watermarking scheme has been proposed for the authentication of medical images. The experimental results obtained have shown that the proposed scheme is a secure one and robust against various common image processing attacks.<\/p>","DOI":"10.4018\/ijehmc.2019100103","type":"journal-article","created":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T16:59:38Z","timestamp":1565715578000},"page":"30-38","source":"Crossref","is-referenced-by-count":14,"title":["A Discrete Wavelet Based Watermarking Scheme for Authentication of Medical Images"],"prefix":"10.4018","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8792-5011","authenticated-orcid":true,"given":"Kaiser J.","family":"Giri","sequence":"first","affiliation":[{"name":"Islamic University of Science and Technology, Awantipora, India"}]},{"given":"Rumaan","family":"Bashir","sequence":"additional","affiliation":[{"name":"Islamic University of Science and Technology, Awantipora, India"}]},{"given":"Javaid Iqbal","family":"Bhat","sequence":"additional","affiliation":[{"name":"Islamic University of Science and Technology, Awantipora, India"}]}],"member":"2432","reference":[{"key":"IJEHMC.2019100103-0","doi-asserted-by":"publisher","DOI":"10.1109\/ISTEL.2010.5734139"},{"key":"IJEHMC.2019100103-1","unstructured":"Abdullah, N. A., & Abduljaleel, M. (2014). Adaptive medical image watermarking technique based on wavelet transform. Iraqi Journal of Science, 55(2A), 548\u2013555."},{"key":"IJEHMC.2019100103-2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.249"},{"key":"IJEHMC.2019100103-3","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2007.740.746"},{"key":"IJEHMC.2019100103-4","first-page":"4253","article-title":"Reversible image watermarking based on full context prediction","author":"M.Chen","year":"2009","journal-title":"16th IEEE International Conference of Image Processing"},{"key":"IJEHMC.2019100103-5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.04.086"},{"key":"IJEHMC.2019100103-6","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.870624"},{"key":"IJEHMC.2019100103-7","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2006.875655"},{"issue":"2","key":"IJEHMC.2019100103-8","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/s41870-017-0075-y","article-title":"A block based watermarking approach for color images using discrete wavelet transformation.","volume":"10","author":"K. J.Giri","year":"2018","journal-title":"International Journal of Information Technology"},{"key":"IJEHMC.2019100103-9","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2006.262850"},{"key":"IJEHMC.2019100103-10","doi-asserted-by":"crossref","unstructured":"Hu, A., & Chen, N. (2008). A Blind Watermarking Algorithm for Color Image Based on Wavelet Transform and Fourier Transform. The 9th International Conference for Young Computer Scientists.","DOI":"10.1109\/ICYCS.2008.100"},{"key":"IJEHMC.2019100103-11","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1016\/j.compeleceng.2015.04.014","article-title":"Reversible steganography using extended image interpolation technique.","volume":"46","author":"J.Hu","year":"2015","journal-title":"Computers & Electrical Engineering"},{"key":"IJEHMC.2019100103-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.06.001"},{"key":"IJEHMC.2019100103-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.12.019"},{"key":"IJEHMC.2019100103-14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2035975"},{"key":"IJEHMC.2019100103-15","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3913-1"},{"key":"IJEHMC.2019100103-16","doi-asserted-by":"publisher","DOI":"10.1007\/s40012-013-0031-3"},{"issue":"4","key":"IJEHMC.2019100103-17","first-page":"166","article-title":"Imprecise reversible dual watermarking scheme, Journal of Advances in Information Technology","volume":"4","author":"N.Mehra","year":"2013","journal-title":"Academy Press North America"},{"key":"IJEHMC.2019100103-18","doi-asserted-by":"crossref","unstructured":"Mehto, A., & Mehra, N. (2015). Techniques of digital image watermarking: A review. International Journal of Computer Applications, 128(9), 21Y33.","DOI":"10.5120\/ijca2015906629"},{"key":"IJEHMC.2019100103-19","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.02.015"},{"key":"IJEHMC.2019100103-20","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3622-9"},{"key":"IJEHMC.2019100103-21","doi-asserted-by":"publisher","DOI":"10.5815\/ijmecs.2016.04.06"},{"key":"IJEHMC.2019100103-22","first-page":"281","author":"T.Naheed","year":"2011","journal-title":"Lossless data hiding using optimized interpolation error expansion. In 2011 Frontiers of Information Technology"},{"key":"IJEHMC.2019100103-23","doi-asserted-by":"publisher","DOI":"10.1166\/jmihi.2014.1265"},{"key":"IJEHMC.2019100103-24","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.04.021"},{"key":"IJEHMC.2019100103-25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2017.01.006"},{"key":"IJEHMC.2019100103-26","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4196-2"},{"key":"IJEHMC.2019100103-27","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3127-y"},{"key":"IJEHMC.2019100103-28","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4253-x"},{"key":"IJEHMC.2019100103-29","doi-asserted-by":"publisher","DOI":"10.4018\/JGIM.2017100106"},{"key":"IJEHMC.2019100103-30","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.11.006"},{"key":"IJEHMC.2019100103-31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.06.055"},{"issue":"7","key":"IJEHMC.2019100103-32","doi-asserted-by":"crossref","first-page":"1019","DOI":"10.1016\/j.patrec.2004.09.047","article-title":"A new wavelet based logo-watermarking scheme.","volume":"26","author":"A. A.Reddy","year":"2005","journal-title":"Pattern Recognition Letters"},{"key":"IJEHMC.2019100103-33","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2020257"},{"issue":"2","key":"IJEHMC.2019100103-34","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/s11045-015-0358-z","article-title":"Hiding in encrypted images: A three tier security data hiding system.","volume":"28","author":"A. P.Shabir","year":"2017","journal-title":"Multidimensional Systems and Signal Processing"},{"key":"IJEHMC.2019100103-35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.03.031"},{"key":"IJEHMC.2019100103-36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2014.01.149"},{"issue":"3","key":"IJEHMC.2019100103-37","doi-asserted-by":"crossref","first-page":"3669","DOI":"10.1007\/s11042-016-3928-7","article-title":"A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications.","volume":"76","author":"F. N.Thakkar","year":"2017","journal-title":"Multimedia Tools and Applications"},{"key":"IJEHMC.2019100103-38","first-page":"1549","article-title":"Prediction-error based reversible watermarking.","author":"D. M.Thodi","year":"2004","journal-title":"International Conference on Image Processing"},{"key":"IJEHMC.2019100103-39","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815962"},{"issue":"14","key":"IJEHMC.2019100103-40","doi-asserted-by":"crossref","first-page":"2460","DOI":"10.1016\/j.ins.2009.03.014","article-title":"Prediction-based reversible data hiding.","volume":"179","author":"H. W.Tseng","year":"2009","journal-title":"Information Science"},{"key":"IJEHMC.2019100103-41","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2012.06.015"},{"key":"IJEHMC.2019100103-42","doi-asserted-by":"publisher","DOI":"10.1109\/WiCom.2008.2913"}],"container-title":["International Journal of E-Health and Medical Communications"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=235439","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T20:59:12Z","timestamp":1651870752000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJEHMC.2019100103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,10,1]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijehmc.2019100103","relation":{},"ISSN":["1947-315X","1947-3168"],"issn-type":[{"type":"print","value":"1947-315X"},{"type":"electronic","value":"1947-3168"}],"subject":[],"published":{"date-parts":[[2019,10,1]]}}}