{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T17:35:39Z","timestamp":1775324139651,"version":"3.50.1"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030000141","type":"print"},{"value":"9783030000158","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00015-8_29","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T16:14:23Z","timestamp":1536768863000},"page":"334-345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Medical Image Watermarking Based on SIFT-DCT Perceptual Hashing"],"prefix":"10.1007","author":[{"given":"Jialing","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jingbing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiangxi","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Jieren","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"issue":"4","key":"29_CR1","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1109\/TITB.2006.875655","volume":"10","author":"A Giakoumaki","year":"2006","unstructured":"Giakoumaki, A., Pavlopoulos, S., Koutsouris, D.: Multiple image watermarking applied to health information management. IEEE Trans. Inf Technol. Biomed. 10(4), 722\u2013732 (2006)","journal-title":"IEEE Trans. Inf Technol. Biomed."},{"issue":"1","key":"29_CR2","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s10278-007-9011-1","volume":"21","author":"JHK Wu","year":"2008","unstructured":"Wu, J.H.K., Chang, R.F., Chen, C.J.: Tamper detection and recovery for medical images using near-lossless information hiding technique. J. Digital Imaging 21(1), 59\u201376 (2008)","journal-title":"J. Digital Imaging"},{"issue":"3","key":"29_CR3","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/s10278-010-9295-4","volume":"24","author":"CK Tan","year":"2011","unstructured":"Tan, C.K., Ng, J.C., Xu, X.: Security protection of DICOM medical images using dual-Layer reversible watermarking with tamper detection capability. J. Digital Imaging 24(3), 528\u2013540 (2011)","journal-title":"J. Digital Imaging"},{"issue":"2","key":"29_CR4","first-page":"287","volume":"6","author":"QL Li","year":"2012","unstructured":"Li, Q.L., Wang, G.Y., Liu, J.G.: Robust scale-invariant feature matching for remote sensing image registration. IEEE Geosci. Remote Sens. 6(2), 287\u2013291 (2012)","journal-title":"IEEE Geosci. Remote Sens."},{"issue":"6","key":"29_CR5","first-page":"280","volume":"26","author":"Y Lei","year":"2011","unstructured":"Lei, Y., Wang, Y., Huang, J.: Robust image hash in radon transform domain for authentication. Signal Process.: Image Comm. 26(6), 280\u2013288 (2011)","journal-title":"Signal Process.: Image Comm."},{"issue":"2","key":"29_CR6","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe, D.G.: Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vis. 60(2), 91\u2013110 (2004)","journal-title":"Int. J. Comput. Vis."},{"issue":"4","key":"29_CR7","first-page":"533","volume":"58","author":"H-D Kim","year":"2012","unstructured":"Kim, H.-D., Lee, J.-W., Oh, T.-W.: Robust dt-cwt watermarking for dibr 3D images. IEEE Trans. 58(4), 533\u2013543 (2012)","journal-title":"IEEE Trans."},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Sun, J.G., Lan, S.S.: Geometrical attack robust spatial digital watermarking based on improved SIFT. In: IEEE International Computer Society, pp. 98\u2013101 (2010)","DOI":"10.1109\/CICC-ITOE.2010.33"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Priyatham, B., Nilkanta, S., Arijit, S.: SIFT based robust image watermarking resistant to resolution scaling. In: IEEE International Conference Image Processing (ICIP), pp. 5507\u20135510 (2014)","DOI":"10.1109\/ICIP.2014.7026114"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Han, L., Zhou, G.Y., Xu, L., Fang, L.: Beyond SIFT using binary features in loop closure detection. In: IEEE International Conference on Intelligent Robots and Systems, pp. 4057\u20134063 (2017)","DOI":"10.1109\/IROS.2017.8206261"},{"key":"29_CR11","unstructured":"Zhao, M., Jiang, J.G., Hong, R.C.: SIFT matching optimization based on RANSAC. In: Optoelectronic Engineering, pp. 62\u201369 (2014)"},{"issue":"11","key":"29_CR12","doi-asserted-by":"publisher","first-page":"3452","DOI":"10.1109\/TIP.2006.881948","volume":"15","author":"M Vishal","year":"2006","unstructured":"Vishal, M., Brian, L.E.: Perceptual image hashing via feature points performance evaluation and trade-offs. IEEE Trans. Image Process. 15(11), 3452\u20133455 (2006)","journal-title":"IEEE Trans. Image Process."},{"issue":"3","key":"29_CR13","doi-asserted-by":"publisher","first-page":"1081","DOI":"10.1109\/TIFS.2012.2190594","volume":"7","author":"XD Lv","year":"2012","unstructured":"Lv, X.D., Wang, J.: Perceptual image hashing based on shape contexts and local feature points. IEEE Trans. Inf. Forensics Secur. 7(3), 1081\u20131093 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"29_CR14","first-page":"2024","volume":"32","author":"ZQ Liu","year":"2011","unstructured":"Liu, Z.Q., Li, Q., Liu, J.R.: SIFT based image hashing algorithm. Chin. J. Sci. Instrum. 32(9), 2024\u20132028 (2011)","journal-title":"Chin. J. Sci. Instrum."},{"key":"29_CR15","unstructured":"Dai, S.S., Tian, Y.L.: Research on SIFT algorithm based on image texture features. In: Semiconductor Optoelectronics, pp. 107\u2013110 (2014)"},{"issue":"3","key":"29_CR16","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1109\/TIFS.2007.902670","volume":"2","author":"V Monga","year":"2007","unstructured":"Monga, V., Mhcak, M.K.: Robust and secure image hashing via non-negative matrix factorizations. Proc. IEEE Trans. Inf. Forensics Secur. 2(3), 376\u2013390 (2007)","journal-title":"Proc. IEEE Trans. Inf. Forensics Secur."},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Kozat, S., Venkatesan, R., Mihcak, M.: Robust perceptual image hashing via matrix invariants. In: IEEE International Conference on Image Processing (ICIP), pp. 3443\u20133446 (2004)","DOI":"10.1109\/ICIP.2004.1421855"},{"key":"29_CR18","unstructured":"Chen, Y., Li, B., Dong, R.: Contourlet-SIFT feature matching algorithm. J. Electron. Inf. Technol. 203\u2013209 (2013)"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00015-8_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T03:33:33Z","timestamp":1751859213000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00015-8_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000141","9783030000158"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00015-8_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}