{"id":"https://openalex.org/W7125017873","doi":"https://doi.org/10.1007/s44443-026-00480-5","title":"A medical image watermarking method based on the combination of DTCWT and PSO optimization","display_name":"A medical image watermarking method based on the combination of DTCWT and PSO optimization","publication_year":2026,"publication_date":"2026-01-20","ids":{"openalex":"https://openalex.org/W7125017873","doi":"https://doi.org/10.1007/s44443-026-00480-5"},"language":"en","primary_location":{"id":"doi:10.1007/s44443-026-00480-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-026-00480-5","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1007/s44443-026-00480-5","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123451937","display_name":"Ruilong Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I192868223","display_name":"Zhengzhou University of Aeronautics","ror":"https://ror.org/01qjyzh50","country_code":"CN","type":"education","lineage":["https://openalex.org/I192868223"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruilong Wang","raw_affiliation_strings":["School of Computer Science, Zhengzhou University of Aeronautics, Zhengzhou, 450046, Henan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Zhengzhou University of Aeronautics, Zhengzhou, 450046, Henan, China","institution_ids":["https://openalex.org/I192868223"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123422174","display_name":"Li Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I192868223","display_name":"Zhengzhou University of Aeronautics","ror":"https://ror.org/01qjyzh50","country_code":"CN","type":"education","lineage":["https://openalex.org/I192868223"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Li Liu","raw_affiliation_strings":["School of Computer Science, Zhengzhou University of Aeronautics, Zhengzhou, 450046, Henan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Zhengzhou University of Aeronautics, Zhengzhou, 450046, Henan, China","institution_ids":["https://openalex.org/I192868223"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073046922","display_name":"Xiaoju Li","orcid":null},"institutions":[{"id":"https://openalex.org/I192868223","display_name":"Zhengzhou University of Aeronautics","ror":"https://ror.org/01qjyzh50","country_code":"CN","type":"education","lineage":["https://openalex.org/I192868223"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoju Li","raw_affiliation_strings":["School of Computer Science, Zhengzhou University of Aeronautics, Zhengzhou, 450046, Henan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Zhengzhou University of Aeronautics, Zhengzhou, 450046, Henan, China","institution_ids":["https://openalex.org/I192868223"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101979319","display_name":"Xiang Yu","orcid":"https://orcid.org/0000-0003-3860-8989"},"institutions":[{"id":"https://openalex.org/I192868223","display_name":"Zhengzhou University of Aeronautics","ror":"https://ror.org/01qjyzh50","country_code":"CN","type":"education","lineage":["https://openalex.org/I192868223"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Xiang","raw_affiliation_strings":["School of Computer Science, Zhengzhou University of Aeronautics, Zhengzhou, 450046, Henan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Zhengzhou University of Aeronautics, Zhengzhou, 450046, Henan, China","institution_ids":["https://openalex.org/I192868223"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123438506","display_name":"Haiyan Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I192868223","display_name":"Zhengzhou University of Aeronautics","ror":"https://ror.org/01qjyzh50","country_code":"CN","type":"education","lineage":["https://openalex.org/I192868223"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiyan Wang","raw_affiliation_strings":["School of Computer Science, Zhengzhou University of Aeronautics, Zhengzhou, 450046, Henan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Zhengzhou University of Aeronautics, Zhengzhou, 450046, Henan, China","institution_ids":["https://openalex.org/I192868223"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5123422174"],"corresponding_institution_ids":["https://openalex.org/I192868223"],"apc_list":{"value":1350,"currency":"USD","value_usd":1350},"apc_paid":{"value":1350,"currency":"USD","value_usd":1350},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13658444,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"38","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.6614999771118164,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.6614999771118164,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12702","display_name":"Brain Tumor Detection and Classification","score":0.03700000047683716,"subfield":{"id":"https://openalex.org/subfields/2808","display_name":"Neurology"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T13345","display_name":"Advanced Technologies and Applied Computing","score":0.01979999989271164,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7204999923706055},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.5954999923706055},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.5825999975204468},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.44119998812675476},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4410000145435333},{"id":"https://openalex.org/keywords/singular-value-decomposition","display_name":"Singular value decomposition","score":0.43650001287460327},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.43070000410079956},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.36480000615119934},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.3465999960899353},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.3352999985218048}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7204999923706055},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7095000147819519},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.5954999923706055},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5916000008583069},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.5825999975204468},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.520799994468689},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.44119998812675476},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4410000145435333},{"id":"https://openalex.org/C22789450","wikidata":"https://www.wikidata.org/wiki/Q420904","display_name":"Singular value decomposition","level":2,"score":0.43650001287460327},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.43070000410079956},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.36480000615119934},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.3465999960899353},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.3352999985218048},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3310999870300293},{"id":"https://openalex.org/C74050887","wikidata":"https://www.wikidata.org/wiki/Q848368","display_name":"Rotation (mathematics)","level":2,"score":0.32910001277923584},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.3285999894142151},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.3230000138282776},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.31839999556541443},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.3163999915122986},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3125999867916107},{"id":"https://openalex.org/C196216189","wikidata":"https://www.wikidata.org/wiki/Q2867","display_name":"Wavelet transform","level":3,"score":0.3073999881744385},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.30390000343322754},{"id":"https://openalex.org/C65892221","wikidata":"https://www.wikidata.org/wiki/Q1113935","display_name":"Gaussian filter","level":3,"score":0.3021000027656555},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.296999990940094},{"id":"https://openalex.org/C46286280","wikidata":"https://www.wikidata.org/wiki/Q2414958","display_name":"Discrete wavelet transform","level":4,"score":0.2906000018119812},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2890999913215637},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.28760001063346863},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.287200003862381},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.28049999475479126},{"id":"https://openalex.org/C169805256","wikidata":"https://www.wikidata.org/wiki/Q1361381","display_name":"Transform coding","level":4,"score":0.2770000100135803},{"id":"https://openalex.org/C31601959","wikidata":"https://www.wikidata.org/wiki/Q931309","display_name":"Medical imaging","level":2,"score":0.26980000734329224},{"id":"https://openalex.org/C47432892","wikidata":"https://www.wikidata.org/wiki/Q831390","display_name":"Wavelet","level":2,"score":0.2687000036239624},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.263700008392334},{"id":"https://openalex.org/C2781402108","wikidata":"https://www.wikidata.org/wiki/Q1642961","display_name":"H\u00e9non map","level":3,"score":0.2614000141620636},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.25949999690055847},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.25060001015663147},{"id":"https://openalex.org/C13481523","wikidata":"https://www.wikidata.org/wiki/Q412438","display_name":"Image compression","level":4,"score":0.25040000677108765}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s44443-026-00480-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-026-00480-5","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:22793b7b75bb44b39d697c6e4b557bed","is_oa":true,"landing_page_url":"https://doaj.org/article/22793b7b75bb44b39d697c6e4b557bed","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of King Saud University: Computer and Information Sciences, Vol 38, Iss 3 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s44443-026-00480-5","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s44443-026-00480-5","pdf_url":null,"source":{"id":"https://openalex.org/S2764955546","display_name":"Journal of King Saud University - Computer and Information Sciences","issn_l":"1319-1578","issn":["1319-1578","2213-1248"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of King Saud University Computer and Information Sciences","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1208481195","display_name":null,"funder_award_id":"252102211079","funder_id":"https://openalex.org/F4320328833","funder_display_name":"Henan Key Laboratory of Non-ferrous Metal Materials Science and Processing Technology"},{"id":"https://openalex.org/G3541455382","display_name":null,"funder_award_id":"62302463","funder_id":"https://openalex.org/F4320315254","funder_display_name":"Innovative Research Group Project of the National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320315254","display_name":"Innovative Research Group Project of the National Natural Science Foundation of China","ror":null},{"id":"https://openalex.org/F4320328833","display_name":"Henan Key Laboratory of Non-ferrous Metal Materials Science and Processing Technology","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1786686177","https://openalex.org/W1998423175","https://openalex.org/W2019144803","https://openalex.org/W2047568922","https://openalex.org/W2050247929","https://openalex.org/W2057546336","https://openalex.org/W2106366262","https://openalex.org/W2133169850","https://openalex.org/W2163177684","https://openalex.org/W2514315863","https://openalex.org/W2752517284","https://openalex.org/W2773348626","https://openalex.org/W2775354436","https://openalex.org/W2808671558","https://openalex.org/W2991500360","https://openalex.org/W3001831163","https://openalex.org/W3047027698","https://openalex.org/W3081024295","https://openalex.org/W3088689883","https://openalex.org/W3098705456","https://openalex.org/W3120383396","https://openalex.org/W3120487911","https://openalex.org/W3131742572","https://openalex.org/W3159294447","https://openalex.org/W3183302989","https://openalex.org/W3194324358","https://openalex.org/W3215111019","https://openalex.org/W4214604348","https://openalex.org/W4220899556","https://openalex.org/W4229032325","https://openalex.org/W4360618912","https://openalex.org/W4376870078","https://openalex.org/W4387925138","https://openalex.org/W4396841921","https://openalex.org/W4402468656","https://openalex.org/W4403721346"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"In":[1],"the":[2,54,110,138,153,213,226],"era":[3],"of":[4,57,144,163,219,228],"intelligent":[5,233],"healthcare,":[6],"medical":[7,58,76,220,229,234],"images":[8],"play":[9],"a":[10,142],"crucial":[11],"role":[12],"in":[13,232],"remote":[14],"diagnosis,":[15],"disease":[16],"detection,":[17],"cloud":[18],"storage,":[19],"and":[20,36,47,91,116,188,216],"data":[21,32,231],"sharing.":[22],"However,":[23],"they":[24],"are":[25],"vulnerable":[26],"to":[27,44,52,96,107,124],"security":[28,55,227],"threats":[29],"such":[30],"as":[31],"tampering,":[33],"copyright":[34],"disputes,":[35],"privacy":[37],"breaches.":[38],"Traditional":[39],"digital":[40,72],"watermarking":[41,73],"algorithms":[42],"struggle":[43],"balance":[45],"imperceptibility":[46,115],"robustness,":[48,158],"making":[49],"them":[50],"insufficient":[51],"meet":[53],"requirements":[56],"image":[59,98,230],"protection.":[60],"Motivated":[61],"by":[62],"these":[63],"challenges,":[64],"this":[65,208],"paper":[66],"proposes":[67],"an":[68,160],"efficient,":[69],"robust,":[70],"secure":[71,214],"scheme":[74],"for":[75,128,225],"images.":[77],"The":[78],"proposed":[79,139],"method":[80,140,209],"integrates":[81],"Dual-Tree":[82],"Complex":[83],"Wavelet":[84],"Transform":[85,89],"(DTCWT),":[86],"Discrete":[87],"Cosine":[88],"(DCT),":[90],"Singular":[92],"Value":[93],"Decomposition":[94],"(SVD)":[95],"extract":[97],"features.":[99],"Particle":[100],"Swarm":[101],"Optimization":[102],"(PSO)":[103],"is":[104,122],"then":[105],"employed":[106],"adaptively":[108],"adjust":[109],"watermark":[111,129,155],"embedding":[112],"parameters,":[113],"enhancing":[114,132],"robustness.":[117],"Moreover,":[118],"Henon":[119],"chaotic":[120],"mapping":[121],"introduced":[123],"generate":[125],"pseudo-random":[126],"sequences":[127],"encryption,":[130],"further":[131],"security.":[133],"Experimental":[134],"results":[135],"show":[136],"that":[137,207],"achieves":[141],"PSNR":[143],"34.59":[145],"dB,":[146],"ensuring":[147],"good":[148],"imperceptibility.":[149],"Under":[150],"various":[151],"attacks,":[152],"extracted":[154],"maintains":[156],"high":[157],"with":[159],"average":[161],"NC":[162],"0.99":[164,177],"under":[165,178,185,190],"Gaussian":[166,186],"low-pass":[167],"filtering":[168],"(5":[169],"$$\\times":[170],"$$":[171],"<mml:math":[172,196],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[173,197],"<mml:mo>\u00d7</mml:mo>":[174],"</mml:math>":[175,203],"5),":[176],"JPEG":[179],"compression":[180],"(QF":[181],"=":[182],"10),":[183],"0.97":[184],"noise,":[187],"0.98":[189],"rotation":[191],"attacks":[192],"(15":[193],"$$^{\\circ":[194],"}$$":[195],"<mml:mmultiscripts>":[198],"<mml:mrow/>":[199,200],"<mml:mo>\u2218</mml:mo>":[201],"</mml:mmultiscripts>":[202],").":[204],"Research":[205],"shows":[206],"can":[210],"effectively":[211],"improve":[212],"storage":[215],"transmission":[217],"capabilities":[218],"images,":[221],"providing":[222],"strong":[223],"support":[224],"environments.":[235]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-21T00:00:00"}
