{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:13:37Z","timestamp":1725808417967},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120119"},{"type":"electronic","value":"9783319120126"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_53","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T15:09:45Z","timestamp":1414768185000},"page":"483-491","source":"Crossref","is-referenced-by-count":0,"title":["Swarm Optimization Based Dual Transform Algorithm for Secure Transaction of Medical Images"],"prefix":"10.1007","author":[{"given":"Anusudha","family":"Krishnamurthi","sequence":"first","affiliation":[]},{"given":"N.","family":"Venkateswaran","sequence":"additional","affiliation":[]},{"given":"J.","family":"Valarmathi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"53_CR1","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1258\/135763304773391594","volume":"10","author":"K. Youngberry","year":"2004","unstructured":"Youngberry, K.: Telemedicine Research. Journal of Telemedicine and Telecare\u00a010(2), 121\u2013123 (2004)","journal-title":"Journal of Telemedicine and Telecare"},{"issue":"3","key":"53_CR2","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1089\/153056203322502632","volume":"9","author":"S. Tachakra","year":"2003","unstructured":"Tachakra, S., Wang, X.H., Istepanian, R.S., Song, Y.H.: Mobile e-health: The Unwired Evaluation of Telemedicine. Telemedicine Journal of e-health\u00a09(3), 247\u2013257 (2003)","journal-title":"Telemedicine Journal of e-health"},{"key":"53_CR3","first-page":"1064","volume":"86","author":"M.D. Swanson","year":"1998","unstructured":"Swanson, M.D., Koayashi, M., Tew_k, A.H.: Multimedia Data Embedding and Watermarking Technologies. IEEE Transaction on Information Technology in Biomedicine\u00a086, 1064\u20131087 (1998)","journal-title":"IEEE Transaction on Information Technology in Biomedicine"},{"issue":"10","key":"53_CR4","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1109\/TCSVT.2006.882380","volume":"16","author":"C.C. Chang","year":"2000","unstructured":"Chang, C.C., Tai, W.L., Lin, C.C.: A reversible data hiding scheme based on side match vector quantization. IEEE Transactions on Circuits Systems Video Technology\u00a016(10), 1301\u20131308 (2000)","journal-title":"IEEE Transactions on Circuits Systems Video Technology"},{"issue":"7","key":"53_CR5","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/2.511977","volume":"29","author":"H. Berghel","year":"1996","unstructured":"Berghel, H., O\u2019Gorman, L.: Protecting ownership rights through digital watermarking. IEEE Computational Magazine\u00a029(7), 101\u2013103 (1996)","journal-title":"IEEE Computational Magazine"},{"issue":"3","key":"53_CR6","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/S0031-3203(00)00015-7","volume":"34","author":"R.Z. Wang","year":"2001","unstructured":"Wang, R.Z., Lin, C.F., Lin, J.C.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition\u00a034(3), 671\u2013683 (2001)","journal-title":"Pattern Recognition"},{"issue":"8","key":"53_CR7","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1109\/42.938246","volume":"20","author":"X.Q. Zkou","year":"2001","unstructured":"Zkou, X.Q., Huang, H.K., Lou, S.L.: Authenticity and integrity of digital mammography images. IEEE Transactions on Medical Imaging\u00a020(8), 784\u2013791 (2001)","journal-title":"IEEE Transactions on Medical Imaging"},{"key":"53_CR8","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/4233.992161","volume":"6","author":"H.M. Chao","year":"2002","unstructured":"Chao, H.M., Hsu, C.M., Miaou, S.G.: A data-hiding technique with authentication, integration, and confidentiality for electronic patients records. IEEE Transactions Information Technology in Biomedicine\u00a06, 46\u201353 (2002)","journal-title":"IEEE Transactions Information Technology in Biomedicine"},{"key":"53_CR9","first-page":"427","volume-title":"Proceedings of SPIE: Smart Structures, Devices and Systems","author":"D. Giakoumaki","year":"2003","unstructured":"Giakoumaki, D., Rogers, J., Mazumdar, R., Coutts, D.: Abbott.: An Overview of Wavelets for Image Processing for Wireless Applications. In: Proceedings of SPIE: Smart Structures, Devices and Systems, vol.\u00a04935, pp. 427\u2013435. University of Melbourne, Australia (2003)"},{"key":"53_CR10","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1016\/j.patcog.2003.07.003","volume":"37","author":"C. Shieh","year":"2004","unstructured":"Shieh, C., Huang, H., Wang, F., Pan, J.: Genetic watermarking based on transform domain techniques. Pattern Recogn.\u00a037, 555\u2013565 (2004)","journal-title":"Pattern Recogn."},{"key":"53_CR11","doi-asserted-by":"crossref","unstructured":"Piva, Bouridane, A., Ibrahim, M., Boussakta, S.: Digital image watermarking using balanced multiwavelets. IEEE Trans. Signal Process\u00a054(4), 1519\u20131536 (2006)","DOI":"10.1109\/TSP.2006.870624"},{"key":"53_CR12","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/TCSVT.2005.848312","volume":"15","author":"B. Paul","year":"2005","unstructured":"Paul, B., Xiaohu, M.: Image Adaptive Watermarking Using Wavelet Domain Singular Value Decomposition. IEEE Transactions on Circuits and Systems for Video Technology\u00a015, 96\u2013102 (2005)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"53_CR13","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TEVC.2004.831456","volume":"8","author":"M. Farina","year":"2004","unstructured":"Farina, M., Deb, K., Amota, P.: Dynamic multi-objective optimization problems test cases, approximations, and applications. IEEE Trans. Evol.Comp.\u00a08, 425\u2013442 (2004)","journal-title":"IEEE Trans. Evol.Comp."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T12:51:39Z","timestamp":1706187099000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_53","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}