{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:46:12Z","timestamp":1743003972712,"version":"3.40.3"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319265605"},{"type":"electronic","value":"9783319265612"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26561-2_52","type":"book-chapter","created":{"date-parts":[[2015,11,16]],"date-time":"2015-11-16T22:15:22Z","timestamp":1447712122000},"page":"436-444","source":"Crossref","is-referenced-by-count":4,"title":["A Medical Image Steganography Method Based on Integer Wavelet Transform and Overlapping Edge Detection"],"prefix":"10.1007","author":[{"given":"Hayat","family":"Al-Dmour","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"Al-Ani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,18]]},"reference":[{"key":"52_CR1","first-page":"49","volume":"8","author":"A Singh Brar","year":"2015","unstructured":"Singh Brar, A., Kaur, M.: High capacity, reversible data hiding using cdcs along with medical image authentication. Int. J. Sig. Proc. Image Proc. Pattern Recogn. 8, 49\u201360 (2015)","journal-title":"Int. J. Sig. Proc. Image Proc. Pattern Recogn."},{"key":"52_CR2","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","volume":"90","author":"A Cheddad","year":"2010","unstructured":"Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: Survey and analysis of current methods. Signal Proc. 90, 727\u2013752 (2010)","journal-title":"Signal Proc."},{"key":"52_CR3","doi-asserted-by":"crossref","unstructured":"Ramaiya, M.K., Hemrajani, N., Saxena, A.K.: Security improvisation in image steganography using des. In: 2013 IEEE 3rd International Advance Computing Conference (IACC), pp. 1094\u20131099. IEEE (2013)","DOI":"10.1109\/IAdCC.2013.6514379"},{"key":"52_CR4","doi-asserted-by":"crossref","unstructured":"Al-Dmour, H., Al-Ani, A., Nguyen, H.: An efficient steganography method for hiding patient confidential information. In: 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 222\u2013225. IEEE (2014)","DOI":"10.1109\/EMBC.2014.6943569"},{"key":"52_CR5","first-page":"168","volume":"6","author":"N Hamid","year":"2012","unstructured":"Hamid, N., Yahya, A., Ahmad, R.B., Al-Qershi, O.M.: Image steganography techniques: an overview. Int. J. Comput. Sci. Secur. (IJCSS) 6, 168\u2013187 (2012)","journal-title":"Int. J. Comput. Sci. Secur. (IJCSS)"},{"key":"52_CR6","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1109\/TSP.2003.812753","volume":"51","author":"S Dumitrescu","year":"2003","unstructured":"Dumitrescu, S., Wu, X., Wang, Z.: Detection of lsb steganography via sample pair analysis. Signal Proc. IEEE Trans. 51, 1995\u20132007 (2003)","journal-title":"Signal Proc. IEEE Trans."},{"key":"52_CR7","first-page":"44","volume":"3","author":"K Navas","year":"2008","unstructured":"Navas, K., Thampy, S.A., Sasikumar, M.: Epr hiding in medical images for telemedicine. Int. J. Biomed. Sci. 3, 44\u201347 (2008)","journal-title":"Int. J. Biomed. Sci."},{"key":"52_CR8","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/TCSVT.2006.881857","volume":"16","author":"D Zou","year":"2006","unstructured":"Zou, D., Shi, Y.Q., Ni, Z., Su, W.: A semi-fragile lossless digital watermarking scheme based on integer wavelet transform. IEEE Trans. Circuits Syst. Video Technol. 16, 1294\u20131300 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"52_CR9","doi-asserted-by":"crossref","unstructured":"Prabakaran, G., Bhavani, R., Rajeswari, P.: Multi secure and robustness for medical image based steganography scheme. In: 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT), pp. 1188\u20131193. IEEE (2013)","DOI":"10.1109\/ICCPCT.2013.6528835"},{"key":"52_CR10","first-page":"30","volume":"96","author":"N Solanki","year":"2014","unstructured":"Solanki, N., Malik, S.K., Chhikara, S.: Roni medical image watermarking using dwt and rsa. Int. J. Comput. Appl. 96, 30\u201335 (2014)","journal-title":"Int. J. Comput. Appl."}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26561-2_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T11:32:26Z","timestamp":1559302346000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26561-2_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319265605","9783319265612"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26561-2_52","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}