{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:13:44Z","timestamp":1725808424901},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120119"},{"type":"electronic","value":"9783319120126"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_27","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T15:09:45Z","timestamp":1414768185000},"page":"245-253","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Fragile Medical Image Watermarking Technique for Tamper Detection and Recovery Using Variance"],"prefix":"10.1007","author":[{"given":"R.","family":"Eswaraiah","sequence":"first","affiliation":[]},{"given":"E. Sreenivasa","family":"Reddy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","first-page":"5653","volume-title":"29th IEEE International Conference of EMBS","author":"G. Coatrieux","year":"2007","unstructured":"Coatrieux, G., Montagner, J., Huang, H.: Ch. Roux.: Mixed reversible and RONI watermarking for medical image reliability protection. In: 29th IEEE International Conference of EMBS, pp. 5653\u20135656. IEEE Press, Lyon (2007)"},{"key":"27_CR2","first-page":"3270","volume-title":"Proceedings of the 28th IEEE EMBS Annual International Conference","author":"J.M. Zain","year":"2006","unstructured":"Zain, J.M., Fauzi, A.R.M.: Medical image watermarking with tamper detection and recovery. In: Proceedings of the 28th IEEE EMBS Annual International Conference, pp. 3270\u20133273. IEEE Press, New York (2006)"},{"key":"27_CR3","first-page":"417","volume-title":"3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT)","author":"S.C. Liew","year":"2010","unstructured":"Liew, S.C., Zain, J.M.: Reversible medical image watermarking for tamper detection and recovery. In: 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), pp. 417\u2013420. IEEE Press, Chengdu (2010)"},{"key":"27_CR4","unstructured":"Liew, S.C., Zain, J.M.: Reversible medical image watermarking for tamper detection and recovery with Run Length Encoding compression. World Academy of Science, Engineering and Technology, 799\u2013803 (2010)"},{"key":"27_CR5","first-page":"167","volume-title":"IEEE International Conference on Communication, Networks and Satellite","author":"T. Agung","year":"2012","unstructured":"Agung, T., AdiWijaya, B.W., Fermana, F.B.: Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and Run Length Encoding compression. In: IEEE International Conference on Communication, Networks and Satellite, pp. 167\u2013171. IEEE Press, Bali (2012)"},{"key":"27_CR6","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s10278-007-9011-1","volume":"21","author":"J.H.K. Wu","year":"2008","unstructured":"Wu, J.H.K., Chang, R.-F., Chen, C.-J., Wang, C.-L., Kuo, T.-H., Moon, W.K., Chen, D.-R.: Tamper detection and recovery for medical images using near-lossless information hiding technique. Journal of Digital Imaging\u00a021, 59\u201376 (2008)","journal-title":"Journal of Digital Imaging"},{"key":"27_CR7","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10278-007-9012-0","volume":"21","author":"K.-H. Chiang","year":"2008","unstructured":"Chiang, K.-H., Chang-Chien, K.-C., Chang, R.-F., Yen, H.-Y.: Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. Journal of Digital Imaging\u00a021, 77\u201390 (2008)","journal-title":"Journal of Digital Imaging"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Al-Qershi, O.M., Khoo, B.E.: Authentication and data hiding using a reversible ROI-based watermarking scheme for DICOM images. In: Proceedings of International Conference on Medical Systems Engineering (ICMSE), pp. 829\u2013834 (2009)","DOI":"10.1007\/s10278-009-9253-1"},{"issue":"3","key":"27_CR9","doi-asserted-by":"publisher","first-page":"2099","DOI":"10.1166\/jnn.2013.6872","volume":"13","author":"X. Deng","year":"2013","unstructured":"Deng, X., Chen, Z., Zeng, F., Zhang, Y., Mao, Y.: Authentication and recovery of medical diagnostic image using dual reversible digital watermarking. Journal of Nanoscience and Nanotechnology\u00a013(3), 2099\u20132107 (2013)","journal-title":"Journal of Nanoscience and Nanotechnology"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Al-Qershi, O.M., Khoo, B.E.: ROI-based tamper detection and recovery for medical images using reversible watermarking technique. In: International Conference on Information Theory and Information Security (ICITIS), pp. 151\u2013155 (2010)","DOI":"10.1109\/ICITIS.2010.5688743"},{"key":"27_CR11","unstructured":"Luo, X., Cheng, Q., Tan, J.: A lossless data embedding scheme for medical images in application of e-Diagnosis. In: Proceedings of the 25th Annual International Conference of the IEEE EMBS, pp. 852\u2013855 (2003)"},{"issue":"4","key":"27_CR12","doi-asserted-by":"publisher","first-page":"1003","DOI":"10.1109\/TSP.2003.809366","volume":"151","author":"J.J. Eggers","year":"2003","unstructured":"Eggers, J.J., Bauml, R., Tzschoppe, R., Girod, B.: Scalar SOSTA scheme for information hiding. IEEE Transactions on Signal Processing\u00a0151(4), 1003\u20131019 (2003)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Memon, N.A., Gilani, S.A.M.: NROI watermarking of medical images for content authentication. In: Poceedings of 12th IEEE International Mutitopic Conference (INMIC 2008), Karachi, Pakistan, pp. 106\u2013110 (2008)","DOI":"10.1109\/INMIC.2008.4777717"},{"issue":"4","key":"27_CR14","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1109\/TITB.2006.875655","volume":"10","author":"Giakoumaki","year":"2006","unstructured":"Giakoumaki, Pavlopulos, S., Koutouris, D.: Multiple image watermaking applied to health information management. IEEE Transactions on Information Technology and Biomedicine\u00a010(4), 722\u2013732 (2006)","journal-title":"IEEE Transactions on Information Technology and Biomedicine"},{"issue":"10","key":"27_CR15","doi-asserted-by":"publisher","first-page":"2057","DOI":"10.1080\/00207160.2010.543677","volume":"88","author":"N.A. Memon","year":"2011","unstructured":"Memon, N.A., Chaudhry, A., Ahmad, M.: Hybrid watermarking of medical images for ROI authentication and recovery. International Journal of Computer Mathematics\u00a088(10), 2057\u20132071 (2011)","journal-title":"International Journal of Computer Mathematics"},{"issue":"1","key":"27_CR16","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s10278-009-9253-1","volume":"24","author":"O.M. Al-Qershi","year":"2011","unstructured":"Al-Qershi, O.M., Khoo, B.E.: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. Journal of Digital Imaging\u00a024(1), 114\u2013125 (2011)","journal-title":"Journal of Digital Imaging"},{"key":"27_CR17","doi-asserted-by":"publisher","first-page":"3178","DOI":"10.1016\/j.eswa.2013.11.019","volume":"41","author":"B. Lei","year":"2014","unstructured":"Lei, B., Tan, E.-L., Chen, S., Ni, D., Wang, T., Lei, H.: Reversible watermarking scheme for medical image based on differential evolution. Expert Systems with Applications\u00a041, 3178\u20133188 (2014)","journal-title":"Expert Systems with Applications"},{"key":"27_CR18","first-page":"1","volume-title":"International Conference on Digital Image Computing: Techniques and Applications (DICTA)","author":"H. Nyeem","year":"2013","unstructured":"Nyeem, H., Boles, W., Boyd, C.: Ultilizing least significant bit-planes of RONI pixels for medical image watermarking. In: International Conference on Digital Image Computing: Techniques and Applications (DICTA), pp. 1\u20138. IEEE Press, Hobart (2013)"},{"key":"27_CR19","doi-asserted-by":"publisher","first-page":"1308","DOI":"10.1016\/j.cviu.2011.05.001","volume":"115","author":"K.-S. Kim","year":"2011","unstructured":"Kim, K.-S., Lee, M.-J., Lee, J.-W., Oh, T.-W., Lee, H.-Y.: Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging. Computer Vision and Image Understanding\u00a0115, 1308\u20131323 (2011)","journal-title":"Computer Vision and Image Understanding"},{"issue":"3","key":"27_CR20","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/s10278-010-9295-4","volume":"24","author":"C.K. Tan","year":"2011","unstructured":"Tan, C.K., Ng, J.C., Xu, X., Poh, C.L., Guan, Y.L., Sheah, K.: Security Protection of DICOM Medical Images Using Dual-Layer Reversible Watermarking with Tamper Detection Capability. Journal of Digital Imaging\u00a024(3), 528\u2013540 (2011)","journal-title":"Journal of Digital Imaging"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T09:24:38Z","timestamp":1674552278000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_27","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}