{"id":"https://openalex.org/W4298394736","doi":"https://doi.org/10.1186/s13677-022-00331-4","title":"A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos","display_name":"A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos","publication_year":2022,"publication_date":"2022-10-01","ids":{"openalex":"https://openalex.org/W4298394736","doi":"https://doi.org/10.1186/s13677-022-00331-4"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-022-00331-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-022-00331-4","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00331-4","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00331-4","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100629534","display_name":"Zilong Liu","orcid":"https://orcid.org/0000-0003-3637-1586"},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zilong Liu","raw_affiliation_strings":["Haikou University of Economics, Haikou, 571127, Hainan, China","School of Information and Communication Engineering, Hainan University, Haikou, 570228, China"],"affiliations":[{"raw_affiliation_string":"Haikou University of Economics, Haikou, 571127, Hainan, China","institution_ids":["https://openalex.org/I20942203"]},{"raw_affiliation_string":"School of Information and Communication Engineering, Hainan University, Haikou, 570228, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101812452","display_name":"Jingbing Li","orcid":null},"institutions":[{"id":"https://openalex.org/I20942203","display_name":"Hainan University","ror":"https://ror.org/03q648j11","country_code":"CN","type":"education","lineage":["https://openalex.org/I20942203"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingbing Li","raw_affiliation_strings":["School of Information and Communication Engineering, Hainan University, Haikou, 570228, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Communication Engineering, Hainan University, Haikou, 570228, China","institution_ids":["https://openalex.org/I20942203"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014746276","display_name":"Yang Ai","orcid":"https://orcid.org/0009-0006-0157-4980"},"institutions":[{"id":"https://openalex.org/I135768898","display_name":"Ritsumeikan University","ror":"https://ror.org/0197nmd03","country_code":"JP","type":"education","lineage":["https://openalex.org/I135768898","https://openalex.org/I4390039241"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yang Ai","raw_affiliation_strings":["College of Information Science and Engineering, Ritsumeikan University, Shiga, Japan"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Ritsumeikan University, Shiga, Japan","institution_ids":["https://openalex.org/I135768898"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100801731","display_name":"Yuancai Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I152033890","display_name":"Hainan Normal University","ror":"https://ror.org/031dhcv14","country_code":"CN","type":"education","lineage":["https://openalex.org/I152033890"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuancai Zheng","raw_affiliation_strings":["School of Mathematics and Statistics, Hainan Normal University, Haikou, 571158, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Statistics, Hainan Normal University, Haikou, 571158, China","institution_ids":["https://openalex.org/I152033890"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100375073","display_name":"Jing Liu","orcid":"https://orcid.org/0000-0002-9031-6433"},"institutions":[{"id":"https://openalex.org/I4210123185","display_name":"Zhejiang Lab","ror":"https://ror.org/02m2h7991","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210123185"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Liu","raw_affiliation_strings":["Research Center for Healthcare Data Science, Zhejiang Lab, Hangzhou, 311121, China"],"affiliations":[{"raw_affiliation_string":"Research Center for Healthcare Data Science, Zhejiang Lab, Hangzhou, 311121, China","institution_ids":["https://openalex.org/I4210123185"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100629534"],"corresponding_institution_ids":["https://openalex.org/I20942203"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":2.8583,"has_fulltext":true,"cited_by_count":31,"citation_normalized_percentile":{"value":0.92159477,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"11","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7511211633682251},{"id":"https://openalex.org/keywords/key-space","display_name":"Key space","score":0.7428768277168274},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7352660894393921},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7260685563087463},{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.7157971858978271},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.664039671421051},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.56109619140625},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.5588896870613098},{"id":"https://openalex.org/keywords/chaos","display_name":"CHAOS (operating system)","score":0.5285112857818604},{"id":"https://openalex.org/keywords/h\u00e9non-map","display_name":"H\u00e9non map","score":0.489075243473053},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47349247336387634},{"id":"https://openalex.org/keywords/watermarking-attack","display_name":"Watermarking attack","score":0.46558088064193726},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4510674476623535},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40569913387298584},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29933077096939087},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.24279072880744934},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.11139845848083496},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.10326579213142395}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7511211633682251},{"id":"https://openalex.org/C105322999","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key space","level":3,"score":0.7428768277168274},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7352660894393921},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7260685563087463},{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.7157971858978271},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.664039671421051},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.56109619140625},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.5588896870613098},{"id":"https://openalex.org/C2779374083","wikidata":"https://www.wikidata.org/wiki/Q5011038","display_name":"CHAOS (operating system)","level":2,"score":0.5285112857818604},{"id":"https://openalex.org/C2781402108","wikidata":"https://www.wikidata.org/wiki/Q1642961","display_name":"H\u00e9non map","level":3,"score":0.489075243473053},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47349247336387634},{"id":"https://openalex.org/C122760801","wikidata":"https://www.wikidata.org/wiki/Q2552011","display_name":"Watermarking attack","level":5,"score":0.46558088064193726},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4510674476623535},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40569913387298584},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29933077096939087},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.24279072880744934},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.11139845848083496},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.10326579213142395}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-022-00331-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-022-00331-4","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00331-4","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:09224532c8e04bfdbdaf76619aa62c06","is_oa":true,"landing_page_url":"https://doaj.org/article/09224532c8e04bfdbdaf76619aa62c06","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 11, Iss 1, Pp 1-20 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-022-00331-4","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-022-00331-4","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-022-00331-4","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G37568934","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320326677","display_name":"Education Department of Hainan Province","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4298394736.pdf","grobid_xml":"https://content.openalex.org/works/W4298394736.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W839775907","https://openalex.org/W1964864729","https://openalex.org/W2046141469","https://openalex.org/W2079650616","https://openalex.org/W2137288380","https://openalex.org/W2142554885","https://openalex.org/W2166933802","https://openalex.org/W2276198057","https://openalex.org/W2471366717","https://openalex.org/W2514315863","https://openalex.org/W2563257315","https://openalex.org/W2603489490","https://openalex.org/W2790780754","https://openalex.org/W2796166051","https://openalex.org/W2891995194","https://openalex.org/W2917859997","https://openalex.org/W2923365038","https://openalex.org/W2939608074","https://openalex.org/W2995921265","https://openalex.org/W3001831163","https://openalex.org/W3006625877","https://openalex.org/W3016481661","https://openalex.org/W3037806832","https://openalex.org/W3081722777","https://openalex.org/W3088689883","https://openalex.org/W3096324038","https://openalex.org/W3096594426","https://openalex.org/W3120383396","https://openalex.org/W3120487911","https://openalex.org/W3157094012","https://openalex.org/W3176038524","https://openalex.org/W4214924350","https://openalex.org/W4220899556","https://openalex.org/W4281784038"],"related_works":["https://openalex.org/W1967073369","https://openalex.org/W2080497454","https://openalex.org/W2281180546","https://openalex.org/W2547693587","https://openalex.org/W2349050058","https://openalex.org/W4387193533","https://openalex.org/W4247939459","https://openalex.org/W4317243208","https://openalex.org/W2352844164","https://openalex.org/W2004767398"],"abstract_inverted_index":{"Abstract":[0],"With":[1],"the":[2,14,19,28,39,67,75,81,105,141,147,158,162,171,201,205,253,257,273,287,302],"help":[3],"of":[4,18,32,35,50,55,69,78,107,149,161,173,204,229,256],"big":[5],"data,":[6],"cloud":[7,82],"computing,":[8],"artificial":[9],"intelligence":[10,17],"and":[11,16,30,58,110,123,153,183,223,232,238,250,281,295],"other":[12],"technologies,":[13],"informatization":[15],"wisdom":[20,70],"medical":[21,36,126,163],"have":[22,44],"been":[23],"gradually":[24],"realized.":[25],"However,":[26],"with":[27,178,241],"transmission":[29],"storage":[31],"massive":[33],"amounts":[34],"images":[37,137,164],"in":[38,80],"cloud,":[40],"information":[41,77],"security":[42],"issues":[43],"become":[45,62,85],"increasingly":[46],"prominent.":[47],"The":[48,135,196,227],"privacy":[49],"patients":[51,79],"is":[52,96],"at":[53],"risk":[54],"disclosure,":[56],"theft":[57],"tampering,":[59],"which":[60,145,219,264],"has":[61,84],"an":[63,86,97],"important":[64],"challenge":[65],"restricting":[66],"development":[68],"medical.":[71],"How":[72],"to":[73,89,100,191,225],"protect":[74],"personal":[76],"environment":[83],"urgent":[87],"problem":[88],"be":[90],"solved.":[91],"Medical":[92],"image":[93,127,193],"watermarking":[94,120,129,175,186],"technology":[95],"effective":[98],"method":[99,122],"solve":[101],"this":[102,113],"problem.":[103],"Combining":[104],"characteristics":[106,148],"Tent":[108],"chaos":[109,119,144],"Henon":[111],"chaos,":[112],"paper":[114],"designed":[115,124],"a":[116,125,188],"Tent-Henon-Map":[117,142],"double":[118,143],"encryption":[121,128,222],"algorithm":[130,206,258,274,288],"based":[131],"on":[132],"ridgelet-DCT":[133,168],"transform.":[134,169],"watermark":[136,230,268],"were":[138,165,234,259],"encrypted":[139],"by":[140],"had":[146,187,220,276,290],"sensitive":[150],"initial":[151],"values":[152,255],"large":[154],"key":[155,202],"space.":[156],"Then,":[157],"feature":[159],"vectors":[160],"extracted":[166],"through":[167],"On":[170],"basis":[172],"ordinary":[174],"technology,":[176,185],"combined":[177],"zero":[179],"watermarking,":[180],"third-party":[181],"concepts,":[182],"cryptographic":[184],"good":[189,277,291],"ability":[190],"resist":[192],"processing":[194],"attacks.":[195],"experimental":[197],"results":[198],"showed":[199],"that":[200,272,286],"space":[203],"was":[207],"$${10}^{116}$$":[208],"<mml:math":[209],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[210],"<mml:msup>":[211],"<mml:mrow>":[212],"<mml:mn>10</mml:mn>":[213],"</mml:mrow>":[214],"<mml:mn>116</mml:mn>":[215],"</mml:msup>":[216],"</mml:math>":[217],",":[218],"better":[221],"hard":[224],"crack.":[226],"time":[228],"embedding":[231],"extraction":[233],"only":[235],"0.336":[236],"s":[237],"0.439":[239],"s,":[240],"lower":[242],"computational":[243],"cost.":[244],"And":[245],"under":[246],"high-strength":[247],"conventional":[248,280,294],"attacks":[249,283],"geometric":[251,282,296],"attacks,":[252,297],"NC":[254],"all":[260],"greater":[261],"than":[262],"0.55,":[263],"could":[265],"effectively":[266],"extract":[267],"information.":[269],"It":[270,284],"shown":[271,285],"proposed":[275,289],"robustness":[278,292],"against":[279,293],"while":[298],"taking":[299],"into":[300],"account":[301],"security.":[303]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
