{"id":"https://openalex.org/W7119465182","doi":"https://doi.org/10.1186/s42400-025-00535-6","title":"A controllable medical image security scheme using selective encryption and watermarking for bit-planes in the TSH domain","display_name":"A controllable medical image security scheme using selective encryption and watermarking for bit-planes in the TSH domain","publication_year":2026,"publication_date":"2026-01-09","ids":{"openalex":"https://openalex.org/W7119465182","doi":"https://doi.org/10.1186/s42400-025-00535-6"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00535-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00535-6","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00535-6.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00535-6.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5122352451","display_name":"Conghuan Ye","orcid":null},"institutions":[{"id":"https://openalex.org/I4210099437","display_name":"Hubei University Of Economics","ror":"https://ror.org/012a84b59","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210099437"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Conghuan Ye","raw_affiliation_strings":["Hubei Internet Finance Information Engineering Technology Research Center, Hubei University of Economics, Wuhan, 430205, Hubei, China","Hubei Key Laboratory of Digital Finance Innovation, Hubei University of Economics, Wuhan, 430205, Hubei, China","School of Information Engineering, Hubei University of Economics, Wuhan, 430205, Hubei, China"],"affiliations":[{"raw_affiliation_string":"Hubei Internet Finance Information Engineering Technology Research Center, Hubei University of Economics, Wuhan, 430205, Hubei, China","institution_ids":["https://openalex.org/I4210099437"]},{"raw_affiliation_string":"Hubei Key Laboratory of Digital Finance Innovation, Hubei University of Economics, Wuhan, 430205, Hubei, China","institution_ids":["https://openalex.org/I4210099437"]},{"raw_affiliation_string":"School of Information Engineering, Hubei University of Economics, Wuhan, 430205, Hubei, China","institution_ids":["https://openalex.org/I4210099437"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122345576","display_name":"Li Shi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210099437","display_name":"Hubei University Of Economics","ror":"https://ror.org/012a84b59","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210099437"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Shi","raw_affiliation_strings":["Hubei Internet Finance Information Engineering Technology Research Center, Hubei University of Economics, Wuhan, 430205, Hubei, China","Hubei Key Laboratory of Digital Finance Innovation, Hubei University of Economics, Wuhan, 430205, Hubei, China","School of Information Engineering, Hubei University of Economics, Wuhan, 430205, Hubei, China"],"affiliations":[{"raw_affiliation_string":"Hubei Internet Finance Information Engineering Technology Research Center, Hubei University of Economics, Wuhan, 430205, Hubei, China","institution_ids":["https://openalex.org/I4210099437"]},{"raw_affiliation_string":"Hubei Key Laboratory of Digital Finance Innovation, Hubei University of Economics, Wuhan, 430205, Hubei, China","institution_ids":["https://openalex.org/I4210099437"]},{"raw_affiliation_string":"School of Information Engineering, Hubei University of Economics, Wuhan, 430205, Hubei, China","institution_ids":["https://openalex.org/I4210099437"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063594000","display_name":"Shenglong Tan","orcid":"https://orcid.org/0000-0002-6599-7230"},"institutions":[{"id":"https://openalex.org/I4210099437","display_name":"Hubei University Of Economics","ror":"https://ror.org/012a84b59","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210099437"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shenglong Tan","raw_affiliation_strings":["Hubei Internet Finance Information Engineering Technology Research Center, Hubei University of Economics, Wuhan, 430205, Hubei, China","Hubei Key Laboratory of Digital Finance Innovation, Hubei University of Economics, Wuhan, 430205, Hubei, China","School of Information Engineering, Hubei University of Economics, Wuhan, 430205, Hubei, China"],"affiliations":[{"raw_affiliation_string":"Hubei Internet Finance Information Engineering Technology Research Center, Hubei University of Economics, Wuhan, 430205, Hubei, China","institution_ids":["https://openalex.org/I4210099437"]},{"raw_affiliation_string":"Hubei Key Laboratory of Digital Finance Innovation, Hubei University of Economics, Wuhan, 430205, Hubei, China","institution_ids":["https://openalex.org/I4210099437"]},{"raw_affiliation_string":"School of Information Engineering, Hubei University of Economics, Wuhan, 430205, Hubei, China","institution_ids":["https://openalex.org/I4210099437"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122380976","display_name":"Jun Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210099437","display_name":"Hubei University Of Economics","ror":"https://ror.org/012a84b59","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210099437"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Wang","raw_affiliation_strings":["Hubei Internet Finance Information Engineering Technology Research Center, Hubei University of Economics, Wuhan, 430205, Hubei, China","Hubei Key Laboratory of Digital Finance Innovation, Hubei University of Economics, Wuhan, 430205, Hubei, China","School of Information Engineering, Hubei University of Economics, Wuhan, 430205, Hubei, China"],"affiliations":[{"raw_affiliation_string":"Hubei Internet Finance Information Engineering Technology Research Center, Hubei University of Economics, Wuhan, 430205, Hubei, China","institution_ids":["https://openalex.org/I4210099437"]},{"raw_affiliation_string":"Hubei Key Laboratory of Digital Finance Innovation, Hubei University of Economics, Wuhan, 430205, Hubei, China","institution_ids":["https://openalex.org/I4210099437"]},{"raw_affiliation_string":"School of Information Engineering, Hubei University of Economics, Wuhan, 430205, Hubei, China","institution_ids":["https://openalex.org/I4210099437"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074463471","display_name":"Qiankun Zuo","orcid":"https://orcid.org/0009-0002-8487-5762"},"institutions":[{"id":"https://openalex.org/I4210099437","display_name":"Hubei University Of Economics","ror":"https://ror.org/012a84b59","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210099437"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiankun Zuo","raw_affiliation_strings":["Hubei Internet Finance Information Engineering Technology Research Center, Hubei University of Economics, Wuhan, 430205, Hubei, China","Hubei Key Laboratory of Digital Finance Innovation, Hubei University of Economics, Wuhan, 430205, Hubei, China","School of Information Engineering, Hubei University of Economics, Wuhan, 430205, Hubei, China"],"affiliations":[{"raw_affiliation_string":"Hubei Internet Finance Information Engineering Technology Research Center, Hubei University of Economics, Wuhan, 430205, Hubei, China","institution_ids":["https://openalex.org/I4210099437"]},{"raw_affiliation_string":"Hubei Key Laboratory of Digital Finance Innovation, Hubei University of Economics, Wuhan, 430205, Hubei, China","institution_ids":["https://openalex.org/I4210099437"]},{"raw_affiliation_string":"School of Information Engineering, Hubei University of Economics, Wuhan, 430205, Hubei, China","institution_ids":["https://openalex.org/I4210099437"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5122319007","display_name":"Wei Feng","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108370","display_name":"Panzhihua University","ror":"https://ror.org/01h8y6y39","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210108370"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Feng","raw_affiliation_strings":["School of Mathematics and Computer Science, Panzhihua University, Panzhihua, 617000, Hubei, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Computer Science, Panzhihua University, Panzhihua, 617000, Hubei, China","institution_ids":["https://openalex.org/I4210108370"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5122319007"],"corresponding_institution_ids":["https://openalex.org/I4210108370"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04660342,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.8149999976158142,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.8149999976158142,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.11069999635219574,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13731","display_name":"Advanced Computing and Algorithms","score":0.005200000014156103,"subfield":{"id":"https://openalex.org/subfields/3322","display_name":"Urban Studies"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7379000186920166},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7250999808311462},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5209000110626221},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5206000208854675},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.43869999051094055},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.36890000104904175},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.35420000553131104}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7379000186920166},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7311000227928162},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7250999808311462},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6312999725341797},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5209000110626221},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5206000208854675},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.43869999051094055},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.36890000104904175},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.35420000553131104},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.3447999954223633},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3393000066280365},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.3292999863624573},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.29660001397132874},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2904999852180481},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.2741999924182892},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.2535000145435333}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00535-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00535-6","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00535-6.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:365848c66f8c4b9ba90c60ba2543a024","is_oa":true,"landing_page_url":"https://doaj.org/article/365848c66f8c4b9ba90c60ba2543a024","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1, Pp 1-21 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00535-6","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00535-6","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00535-6.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5412022121","display_name":null,"funder_award_id":"2024AFB544","funder_id":"https://openalex.org/F4320322186","funder_display_name":"Natural Science Foundation of Hubei Province"}],"funders":[{"id":"https://openalex.org/F4320322186","display_name":"Natural Science Foundation of Hubei Province","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7119465182.pdf","grobid_xml":"https://content.openalex.org/works/W7119465182.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W2054720400","https://openalex.org/W2128084896","https://openalex.org/W2809381512","https://openalex.org/W3001831163","https://openalex.org/W3088689883","https://openalex.org/W3129848661","https://openalex.org/W3157704896","https://openalex.org/W4207031003","https://openalex.org/W4210333779","https://openalex.org/W4282924988","https://openalex.org/W4288391520","https://openalex.org/W4300003347","https://openalex.org/W4312419528","https://openalex.org/W4312658206","https://openalex.org/W4319068643","https://openalex.org/W4319302560","https://openalex.org/W4366378559","https://openalex.org/W4376851356","https://openalex.org/W4378647973","https://openalex.org/W4380370685","https://openalex.org/W4383503870","https://openalex.org/W4386126984","https://openalex.org/W4387385625","https://openalex.org/W4387925138","https://openalex.org/W4389666611","https://openalex.org/W4389889497","https://openalex.org/W4390392760","https://openalex.org/W4390517532","https://openalex.org/W4390819739","https://openalex.org/W4390920104","https://openalex.org/W4390938953","https://openalex.org/W4400387492","https://openalex.org/W4402486756","https://openalex.org/W4402952594","https://openalex.org/W4415592002"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"With":[1],"the":[2,40,104],"rapid":[3],"adoption":[4],"of":[5,24,43,88,123,161],"smart":[6,70],"healthcare":[7,71,172],"systems,":[8],"medical":[9,48,79,115,124,162],"image":[10],"distribution":[11,20],"is":[12,76,106],"expected":[13],"to":[14,77,95,108],"become":[15],"increasingly":[16],"prevalent.":[17],"However,":[18],"such":[19],"faces":[21],"significant":[22,166],"threats":[23],"privacy":[25],"breaches.":[26],"Although":[27],"conventional":[28],"encryption":[29,68],"schemes":[30],"can":[31],"prevent":[32,47],"unauthorized":[33,54,129],"access":[34],"during":[35],"transmission,":[36],"they":[37],"cannot":[38],"control":[39],"illegal":[41],"redistribution":[42],"decrypted":[44],"content.":[45,102],"To":[46],"images":[49,80,163],"from":[50],"being":[51],"accessed":[52],"by":[53],"personnel,":[55],"we":[56],"propose":[57],"a":[58,155],"dual-level":[59,118],"security":[60,111,119,135,150,170],"scheme":[61,105],"that":[62,138],"integrates":[63],"robust":[64],"watermarking":[65,97],"with":[66],"selective":[67],"for":[69,158,168],"environments.":[72],"The":[73,85],"primary":[74],"objective":[75],"protect":[78],"throughout":[81],"their":[82],"entire":[83],"lifecycle.":[84],"key":[86],"innovation":[87],"our":[89,139],"approach":[90],"lies":[91],"in":[92,144,171],"its":[93],"ability":[94],"perform":[96],"operations":[98],"directly":[99],"on":[100],"encrypted":[101],"Additionally,":[103],"designed":[107],"satisfy":[109],"diverse":[110],"requirements":[112],"across":[113],"various":[114],"scenarios.":[116],"This":[117,152],"mechanism":[120],"enables":[121],"tracing":[122],"content":[125],"usage":[126],"and":[127,134,164],"controlling":[128],"redistribution.":[130],"Comprehensive":[131],"experimental":[132],"evaluations":[133],"analyses":[136],"demonstrate":[137],"method":[140],"outperforms":[141],"existing":[142],"approaches":[143],"computational":[145],"efficiency":[146],"while":[147],"maintaining":[148],"comparable":[149],"levels.":[151],"research":[153],"contributes":[154],"novel":[156],"methodology":[157],"end-to-end":[159],"protection":[160],"holds":[165],"implications":[167],"multimedia":[169],"contexts.":[173]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-09T00:00:00"}
