{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T14:27:38Z","timestamp":1749220058366},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030141172"},{"type":"electronic","value":"9783030141189"}],"license":[{"start":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T00:00:00Z","timestamp":1552780800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-14118-9_62","type":"book-chapter","created":{"date-parts":[[2019,3,16]],"date-time":"2019-03-16T15:02:59Z","timestamp":1552748579000},"page":"623-632","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Blind Fragile Based Medical Image Authentication Using Schur Decomposition"],"prefix":"10.1007","author":[{"given":"Abdallah","family":"Soualmi","sequence":"first","affiliation":[]},{"given":"Adel","family":"Alti","sequence":"additional","affiliation":[]},{"given":"Lamri","family":"Laouamer","sequence":"additional","affiliation":[]},{"given":"Morad","family":"Benyoucef","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,17]]},"reference":[{"key":"62_CR1","unstructured":"Al-shaikh, M.: Protection des contenue des images m\u00e9dicales par camouflage d\u2019information secr\u00e8te pour l\u2019aide \u00e0 la t\u00e9l\u00e9m\u00e9decine, Ph.D thesis (2016)"},{"key":"62_CR2","doi-asserted-by":"crossref","unstructured":"Saini, S.: A survey on watermarking web contents for protecting copyright. In: The IEEE Second International Conference on Innovations in Information Embedded and Communication Systems ICIIECS, pp. 1\u20134. IEEE (2015)","DOI":"10.1109\/ICIIECS.2015.7193239"},{"issue":"23","key":"62_CR3","doi-asserted-by":"publisher","first-page":"6255","DOI":"10.1016\/j.ijleo.2013.05.013","volume":"124","author":"Q Su","year":"2013","unstructured":"Su, Q., Niu, Y., Wang, Q., Sheng, G.: A blind color image watermarking based on DC component in the spatial domain. Optik Int. J. Light Electron Opt. 124(23), 6255\u20136260 (2013)","journal-title":"Optik Int. J. Light Electron Opt."},{"key":"62_CR4","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1007\/s11042-011-0772-7","volume":"59","author":"A Mohammad","year":"2012","unstructured":"Mohammad, A.: A new digital image watermarking scheme based on Schur decomposition. Multimed. Tools Appl. 59, 851\u2013883 (2012)","journal-title":"Multimed. Tools Appl."},{"key":"62_CR5","volume-title":"Matrix Computations","author":"GH Golub","year":"1989","unstructured":"Golub, G.H., Van Loan, C.F.: Matrix Computations. Johns Hopkins Univ Press, Baltimore (1989)"},{"key":"62_CR6","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.ins.2013.07.035","volume":"256","author":"A Kamran","year":"2014","unstructured":"Kamran, A., Khan, A., Malik, S.: A high capacity reversible watermarking approach for authenticating images: Exploiting down-sampling, histogram processing, and block selection. Inf. Sci. 256, 162\u2013183 (2014)","journal-title":"Inf. Sci."},{"issue":"17","key":"62_CR7","doi-asserted-by":"publisher","first-page":"6897","DOI":"10.1007\/s11042-014-1934-1","volume":"74","author":"H Agarwal","year":"2014","unstructured":"Agarwal, H., Raman, B., Venkat, I.: Blind reliable invisible watermarking method in wavelet domain for face image watermark. Multimed. Tools Appl. 74(17), 6897\u20136935 (2014)","journal-title":"Multimed. Tools Appl."},{"key":"62_CR8","doi-asserted-by":"crossref","unstructured":"Kurniawan, F., Khalil, M.S., Khan, M.K., Alginahi, Y.M.: DWT\u2009+\u2009LSB-based fragile watermarking method for digital Quran images. In: International Symposium on Biometrics and Security Technologies (ISBAST), pp. 290\u2013297. IEEE (2014)","DOI":"10.1109\/ISBAST.2014.7013137"},{"key":"62_CR9","doi-asserted-by":"crossref","unstructured":"Khalil, M.S., Kurniawan, F., Khan, M.K., Alginahi, Y.M.: Two-layer fragile watermarking method secured with chaotic map for authentication of digital holy Quran. Sci. World J. 1\u201329 (2014)","DOI":"10.1155\/2014\/803983"},{"key":"62_CR10","doi-asserted-by":"crossref","unstructured":"Lin, C., Liu, X.L., Lin, C.H., Yuan, S.M.: Fragile watermarking-based authentication scheme for demosaicked images. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 97\u2013100. IEEE (2015)","DOI":"10.1109\/IIH-MSP.2015.98"},{"key":"62_CR11","unstructured":"http:\/\/dicom.nema.org\n                    \n                  . Accessed 15 Oct 2018"},{"key":"62_CR12","unstructured":"http:\/\/deanvaughan.org\/wordpress\/2013\/07\/dicom-sample-images\/\n                    \n                  . Accessed 15 Oct 2018"},{"key":"62_CR13","doi-asserted-by":"crossref","unstructured":"Pinjari, S.A., Patil, N.N.: A pixel based fragile watermarking technique using LBP (Local Binary Pattern). In: International Conference on Global Trends in Signal Processing, Information Computing and Communication, pp. 194\u2013196. IEEE (2016)","DOI":"10.1109\/ICGTSPICC.2016.7955296"},{"issue":"27","key":"62_CR14","first-page":"1","volume":"10","author":"H Zhang","year":"2017","unstructured":"Zhang, H., Wang, C., Zhou, X.: Fragile watermarking for image authentication using the characteristic of SVD. Algorithms 10(27), 1\u201312 (2017)","journal-title":"Algorithms"},{"key":"62_CR15","doi-asserted-by":"crossref","unstructured":"Sikder, I., Kumar Dhar, P., Shimamura, T.: A semi-fragile watermarking method using slant transform and LU decomposition for image authentication. In: International Conference on Electrical, Computer and Communication Engineering (ECCE), IEEE, Cox\u2019s Bazar, Bangladesh, 16\u201318 February (2017)","DOI":"10.1109\/ECACE.2017.7913027"},{"key":"62_CR16","doi-asserted-by":"crossref","unstructured":"Soualmi, A., Alti, A., Laouamer, L.: A new blind medical image watermarking based on weber descriptors and Arnold chaotic map. Arab. J. Sci. Eng. 1\u201313 (2018)","DOI":"10.1007\/s13369-018-3246-7"},{"key":"62_CR17","unstructured":"AL-Nabhani, Y., Jalab, H., Wahid, A., Noor, R.: Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network. J. King Saud Univ. Comput. Inf. Sci. 27(4), 393\u2013401 (2015)"},{"issue":"1","key":"62_CR18","first-page":"62","volume":"16","author":"M Ghadi","year":"2016","unstructured":"Ghadi, M., Laouamer, L., Nana, L., Pascu, A.C.: A novel zero-watermarking approach of medical images based on Jacobian matrix model. Secur. Commun. Netw. 16(1), 62\u201371 (2016)","journal-title":"Secur. Commun. Netw."}],"container-title":["Advances in Intelligent Systems and Computing","The International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2019)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-14118-9_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T06:56:08Z","timestamp":1558162568000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-14118-9_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,17]]},"ISBN":["9783030141172","9783030141189"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-14118-9_62","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,3,17]]},"assertion":[{"value":"17 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AMLTA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Machine Learning Technologies and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cairo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Egypt","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 March 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 March 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"amlta2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/egyptscience.net\/AMLTA19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}