{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:25:22Z","timestamp":1743060322038,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319598574"},{"type":"electronic","value":"9783319598581"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59858-1_21","type":"book-chapter","created":{"date-parts":[[2017,5,25]],"date-time":"2017-05-25T06:33:53Z","timestamp":1495694033000},"page":"217-229","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Robust Watermarking Algorithm for Medical Images in the Encrypted Domain"],"prefix":"10.1007","author":[{"given":"Jiangtao","family":"Dong","sequence":"first","affiliation":[]},{"given":"Jingbing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,26]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.jvcir.2015.03.009","volume":"30","author":"J Guo","year":"2015","unstructured":"Guo, J., Zheng, P., Huang, J.: Secure watermarking scheme against watermark attacks in the encrypted domain. J. Vis. Commun. Image R. 30, 125\u2013135 (2015)","journal-title":"J. Vis. Commun. Image R."},{"issue":"8","key":"21_CR2","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1016\/j.sigpro.2009.02.005","volume":"89","author":"C Deng","year":"2009","unstructured":"Deng, C., Gao, X., Li, X., Tao, D.: A local tchebichef moments-based robust image watermarking. Sig. Process. 89(8), 1531\u20131539 (2009)","journal-title":"Sig. Process."},{"issue":"3","key":"21_CR3","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1109\/TSMCC.2009.2037512","volume":"40","author":"X Gao","year":"2010","unstructured":"Gao, X., Deng, C., Li, X., Tao, D.: Geometric distortion insensitive image watermarking in affine covariant regions. IEEE Trans. Syst. Man Cybernet. Part C: Appl. Rev. 40(3), 278\u2013286 (2010)","journal-title":"IEEE Trans. Syst. Man Cybernet. Part C: Appl. Rev."},{"issue":"11","key":"21_CR4","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. Found. Secure Comput. 4(11), 169\u2013180 (1978)","journal-title":"Found. Secure Comput."},{"key":"21_CR5","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/MSP.2012.2230219","volume":"30","author":"C Aguilar-Melchor","year":"2013","unstructured":"Aguilar-Melchor, C., Fau, S., Fontaine, C., Gogniat, G., Sirdey, R.: Recent advances in homomorphic encryption: a possible future for signal processing in the encrypted domain. IEEE Signal Process. Mag. 30, 108\u2013117 (2013)","journal-title":"IEEE Signal Process. Mag."},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, ACM, pp. 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"issue":"1","key":"21_CR7","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/TIFS.2008.2011087","volume":"4","author":"T Bianchi","year":"2009","unstructured":"Bianchi, T., Piva, A., Barni, M.: On the implementation of the discrete fourier transform in the encrypted domain. IEEE Trans. Inform. Forensics Secur. 4(1), 86\u201397 (2009)","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"key":"21_CR8","volume-title":"Encrypted domain DCT based on homomorphic cryptosystems","author":"T Bianchi","year":"2009","unstructured":"Bianchi, T., Piva, A., Barni, M.: Encrypted domain DCT based on homomorphic cryptosystems. EURASIP J. Inform., Secur (2009)"},{"key":"21_CR9","doi-asserted-by":"crossref","first-page":"2455","DOI":"10.1109\/TIP.2013.2253474","volume":"22","author":"P Zheng","year":"2013","unstructured":"Zheng, P., Huang, J.: Discrete wavelet transform and data expansion reduction in homomorphic encrypted domain. IEEE Trans. Image Process. 22, 2455\u20132468 (2013)","journal-title":"IEEE Trans. Image Process."},{"issue":"1","key":"21_CR10","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1109\/TIFS.2009.2036230","volume":"5","author":"T Bianchi","year":"2010","unstructured":"Bianchi, T., Piva, A., Barni, M.: Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE Trans. Inform. Forensics Secur. 5(1), 180\u2013187 (2010)","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"key":"21_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-642-03168-7_14","volume-title":"Privacy Enhancing Technologies","author":"Z Erkin","year":"2009","unstructured":"Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I., Toft, T.: Privacy-preserving face recognition. In: Goldberg, I., Atallah, Mikhail J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 235\u2013253. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-03168-7_14"},{"key":"21_CR12","doi-asserted-by":"crossref","first-page":"4593","DOI":"10.1109\/TIP.2012.2204272","volume":"21","author":"C-Y Hsu","year":"2012","unstructured":"Hsu, C.-Y., Lu, C.-S., Pei, S.-C.: Image feature extraction in encrypted domain with privacy-preserving sift. IEEE Trans. Image Process. 21, 4593\u20134607 (2012)","journal-title":"IEEE Trans. Image Process."},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Shieh, J.-R., Lin, C.-Y., Wu, J.-L.: Recommendation in the end-to-end encrypted domain. In: Proceedings of the 20th ACM International Conference on Information and Knowledge Management, ACM, pp. 915\u2013924 (2011)","DOI":"10.1145\/2063576.2063708"},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-642-36373-3_16","volume-title":"Information Hiding","author":"P Zheng","year":"2013","unstructured":"Zheng, P., Huang, J.: Walsh-hadamard transform in the homomorphic encrypted domain and its application in image watermarking. In: Kirchner, M., Ghosal, D. (eds.) IH 2012. LNCS, vol. 7692, pp. 240\u2013254. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-36373-3_16"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Sabery, M., Yaghoobi, K.M.: A new approach for image encryption using chaotic logistic map. In: Proceedings of 2008 International Conference of the IEEE on Advanced Computer Theory and Engineering, pp. 585\u2013590 (2008)","DOI":"10.1109\/ICACTE.2008.177"}],"container-title":["Lecture Notes in Computer Science","Smart Health"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59858-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T21:46:02Z","timestamp":1569361562000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59858-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319598574","9783319598581"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59858-1_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}