{"id":"https://openalex.org/W2756620518","doi":"https://doi.org/10.1515/jisys-2017-0266","title":"An Efficient Medical Image Watermarking Technique in E-healthcare Application Using Hybridization of Compression and Cryptography Algorithm","display_name":"An Efficient Medical Image Watermarking Technique in E-healthcare Application Using Hybridization of Compression and Cryptography Algorithm","publication_year":2017,"publication_date":"2017-09-26","ids":{"openalex":"https://openalex.org/W2756620518","doi":"https://doi.org/10.1515/jisys-2017-0266","mag":"2756620518"},"language":"en","primary_location":{"id":"doi:10.1515/jisys-2017-0266","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jisys-2017-0266","pdf_url":null,"source":{"id":"https://openalex.org/S2764846071","display_name":"Journal of Intelligent Systems","issn_l":"0334-1860","issn":["0334-1860","2191-026X"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315148","host_organization_name":"IlmuKomputer.Com","host_organization_lineage":["https://openalex.org/P4310315148"],"host_organization_lineage_names":["IlmuKomputer.Com"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1515/jisys-2017-0266","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010895287","display_name":"P. Aparna","orcid":null},"institutions":[{"id":"https://openalex.org/I875944469","display_name":"Koneru Lakshmaiah Education Foundation","ror":"https://ror.org/02k949197","country_code":"IN","type":"education","lineage":["https://openalex.org/I875944469"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Puvvadi Aparna","raw_affiliation_strings":["K L University , Vijayawada, Andhra Pradesh , India","K L University, Vijayawada, Andhra Pradesh, India"],"affiliations":[{"raw_affiliation_string":"K L University , Vijayawada, Andhra Pradesh , India","institution_ids":["https://openalex.org/I875944469"]},{"raw_affiliation_string":"K L University, Vijayawada, Andhra Pradesh, India","institution_ids":["https://openalex.org/I875944469"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040608966","display_name":"P. V. V. Kishore","orcid":"https://orcid.org/0000-0002-3247-3043"},"institutions":[{"id":"https://openalex.org/I875944469","display_name":"Koneru Lakshmaiah Education Foundation","ror":"https://ror.org/02k949197","country_code":"IN","type":"education","lineage":["https://openalex.org/I875944469"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Polurie Venkata Vijay Kishore","raw_affiliation_strings":["Department of Electronics and Communication Engineering , K L University , Vijayawada, Andhra Pradesh , India","Department of Electronics and Communication Engineering, K L University, Vijayawada, Andhra Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communication Engineering , K L University , Vijayawada, Andhra Pradesh , India","institution_ids":["https://openalex.org/I875944469"]},{"raw_affiliation_string":"Department of Electronics and Communication Engineering, K L University, Vijayawada, Andhra Pradesh, India","institution_ids":["https://openalex.org/I875944469"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5010895287"],"corresponding_institution_ids":["https://openalex.org/I875944469"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":1.4564,"has_fulltext":false,"cited_by_count":39,"citation_normalized_percentile":{"value":0.8951371,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"27","issue":"1","first_page":"115","last_page":"133"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.7691195607185364},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7286264896392822},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6860496997833252},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6689201593399048},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6273340582847595},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5498377084732056},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.533907949924469},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.4810886085033417},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.467672199010849},{"id":"https://openalex.org/keywords/peak-signal-to-noise-ratio","display_name":"Peak signal-to-noise ratio","score":0.4650396406650543},{"id":"https://openalex.org/keywords/data-extraction","display_name":"Data extraction","score":0.45424896478652954},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4180188477039337},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.3894059658050537},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.36766886711120605},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.36364424228668213},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3203481137752533},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.22573614120483398},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.07086741924285889}],"concepts":[{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.7691195607185364},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7286264896392822},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6860496997833252},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6689201593399048},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6273340582847595},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5498377084732056},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.533907949924469},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.4810886085033417},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.467672199010849},{"id":"https://openalex.org/C154579607","wikidata":"https://www.wikidata.org/wiki/Q3373850","display_name":"Peak signal-to-noise ratio","level":3,"score":0.4650396406650543},{"id":"https://openalex.org/C2777466982","wikidata":"https://www.wikidata.org/wiki/Q5227287","display_name":"Data extraction","level":3,"score":0.45424896478652954},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4180188477039337},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.3894059658050537},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.36766886711120605},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36364424228668213},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3203481137752533},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.22573614120483398},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.07086741924285889},{"id":"https://openalex.org/C2779473830","wikidata":"https://www.wikidata.org/wiki/Q1540899","display_name":"MEDLINE","level":2,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/jisys-2017-0266","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jisys-2017-0266","pdf_url":null,"source":{"id":"https://openalex.org/S2764846071","display_name":"Journal of Intelligent Systems","issn_l":"0334-1860","issn":["0334-1860","2191-026X"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315148","host_organization_name":"IlmuKomputer.Com","host_organization_lineage":["https://openalex.org/P4310315148"],"host_organization_lineage_names":["IlmuKomputer.Com"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:0b42765155f945ab9a01e173887138ed","is_oa":true,"landing_page_url":"https://doaj.org/article/0b42765155f945ab9a01e173887138ed","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Intelligent Systems, Vol 27, Iss 1, Pp 115-133 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/jisys-2017-0266","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jisys-2017-0266","pdf_url":null,"source":{"id":"https://openalex.org/S2764846071","display_name":"Journal of Intelligent Systems","issn_l":"0334-1860","issn":["0334-1860","2191-026X"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315148","host_organization_name":"IlmuKomputer.Com","host_organization_lineage":["https://openalex.org/P4310315148"],"host_organization_lineage_names":["IlmuKomputer.Com"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Clean water and sanitation","score":0.4699999988079071,"id":"https://metadata.un.org/sdg/6"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W902524098","https://openalex.org/W1125807710","https://openalex.org/W2040652278","https://openalex.org/W2057344030","https://openalex.org/W2064197051","https://openalex.org/W2075360702","https://openalex.org/W2093477075","https://openalex.org/W2102039730","https://openalex.org/W2117212229","https://openalex.org/W2139414064","https://openalex.org/W2288287109","https://openalex.org/W2312448392","https://openalex.org/W2333629918","https://openalex.org/W2343485503","https://openalex.org/W2345771023","https://openalex.org/W2508543527","https://openalex.org/W2513963685","https://openalex.org/W2514315863","https://openalex.org/W2541575037","https://openalex.org/W2546577791","https://openalex.org/W2551894759","https://openalex.org/W4293257673","https://openalex.org/W4296597176"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1559740347","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1577661458","https://openalex.org/W2040356834","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W2183032046"],"abstract_inverted_index":{"Abstract":[0],"The":[1,108,117],"main":[2],"objective":[3],"of":[4,22,32,66,131,140],"this":[5],"paper":[6],"is":[7,111,135],"to":[8],"propose":[9],"a":[10,57],"medical":[11,124],"image":[12],"watermarking":[13],"technique":[14],"in":[15],"E-healthcare":[16],"application":[17],"based":[18],"on":[19],"the":[20,28,45,52,64,75,81,91,101,105,114,129,132,138,141],"hybridization":[21],"compression":[23],"and":[24,39,73,89,128,145],"cryptography":[25,84],"algorithm.":[26,60,85,97],"Basically,":[27],"proposed":[29,133],"system":[30],"consists":[31],"two":[33],"stages:":[34],"(i)":[35],"watermark":[36,41],"embedding":[37,46],"process":[38,110],"(ii)":[40],"extraction":[42,115],"process.":[43,116],"In":[44],"process,":[47],"at":[48],"first,":[49],"we":[50,62,87,99],"segment":[51],"tumor":[53],"part":[54,68],"separately":[55],"using":[56,69,80,93],"region":[58,65],"growing":[59],"Then,":[61],"encrypt":[63,74],"interest":[67],"Secure":[70],"Hash":[71],"Algorithm-256":[72],"electronic":[76],"health":[77],"record":[78],"(EHR)":[79],"elliptical":[82],"curve":[83],"Thereafter,":[86],"concatenate":[88],"compress":[90],"information":[92],"an":[94],"arithmetic":[95],"coding":[96],"Finally,":[98],"embed":[100],"compressed":[102],"bit":[103],"into":[104],"original":[106],"image.":[107],"same":[109],"repeated":[112],"for":[113,122],"experimental":[118],"results":[119],"are":[120],"shown":[121],"different":[123],"images":[125],"with":[126,137],"EHR":[127],"effectiveness":[130],"algorithm":[134],"analyzed":[136],"help":[139],"peak":[142],"signal-to-noise":[143],"ratio":[144],"normalized":[146],"correlation.":[147]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":2}],"updated_date":"2025-12-06T23:10:59.065948","created_date":"2017-10-06T00:00:00"}
