“…Figure 18 a and 18 b show the framework for data embedding and extraction in authentication-based watermarking schemes. The state-of-the-art techniques along with evaluation parameters, pros, and cons of authentication-based watermarking techniques for medical image watermarking have been presented in Table 8 [ 30 , 41 , 44 , 51 , 61 , 63 , 68 , 79 , 81 , 85 ]. Further in Table 9 we present the comparative analysis of several existing schemes in terms of PSNR, SSIM, and computational complexity.…”