{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T05:35:46Z","timestamp":1725946546597},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319746890"},{"type":"electronic","value":"9783319746906"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-74690-6_67","type":"book-chapter","created":{"date-parts":[[2018,1,25]],"date-time":"2018-01-25T06:48:37Z","timestamp":1516862917000},"page":"684-692","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Patient Fingerprint Minutiae Based Medical Image Watermarking and Adaptive Integrity"],"prefix":"10.1007","author":[{"given":"Lamri","family":"Laouamer","sequence":"first","affiliation":[]},{"given":"Meryam","family":"El Mouhtadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,26]]},"reference":[{"key":"67_CR1","doi-asserted-by":"crossref","unstructured":"Pasquini, C., Brunetta, C., Vinci, A.F., Conotter, V., Boato, G.: Towards the verification of image integrity in online news. In: 2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW) pp. 1\u20136 (2015)","DOI":"10.1109\/ICMEW.2015.7169801"},{"key":"67_CR2","doi-asserted-by":"crossref","unstructured":"Lim, S.J., Moon, H.M., Chae, S.H., Pan, S.B., Chung, Y., Chang, M.H.: Dual watermarking method for integrity of medical images. In: 2008 Second International Conference on Future Generation Communication and Networking, Hainan Island, China, pp. 70\u201373 (2008)","DOI":"10.1109\/FGCN.2008.213"},{"issue":"6","key":"67_CR3","doi-asserted-by":"crossref","first-page":"1122","DOI":"10.1109\/TITB.2012.2207435","volume":"16","author":"H Huang","year":"2012","unstructured":"Huang, H., Coatrieux, G., Shu, H., Luo, L., Roux, C.: Blind integrity verification of medical images. IEEE Trans. Inform. Technol. Biomed. 16(6), 1122\u20131126 (2012)","journal-title":"IEEE Trans. Inform. Technol. Biomed."},{"key":"67_CR4","doi-asserted-by":"crossref","unstructured":"Singh, A., Nigam, J., Thakur, R., Gupta, R., Kumar, A.: Wavelet based robust watermarking technique for integrity control in medical images. In: 2016 International Conference on Micro-Electronics and Telecommunication Engineering, Ghaziabad, India, pp. 222\u2013227 (2016)","DOI":"10.1109\/ICMETE.2016.103"},{"key":"67_CR5","doi-asserted-by":"crossref","unstructured":"Elmouhtadi, M., Elfkihi, S., Aboutajdine, D.: Fingerprint identification using hierarchical matching and topological structures. In: 2nd International Conference on Advanced Intelligent Systems and Informatics AISI 2016, pp. 714\u2013721 (2016)","DOI":"10.1007\/978-3-319-48308-5_68"},{"key":"67_CR6","unstructured":"Jain, A., Pankanti, S.: Fingerprint classification and matching. In: Handbook for Image and Video Processing. Academic Press, London (2000)"},{"key":"67_CR7","unstructured":"United States. Federal Bureau of Investigation: The science of fingerprints: classification and uses. United States Department of Justice, Federal Bureau of Investigation (1979)"},{"issue":"1","key":"67_CR8","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1117\/1.1631315","volume":"13","author":"M Sezgin","year":"2004","unstructured":"Sezgin, M., Sankur, B.: Survey over image thresholding techniques and quantitative performance evaluation. J. Electron. Imaging 13(1), 146\u2013165 (2004)","journal-title":"J. Electron. Imaging"},{"key":"67_CR9","series-title":"IT Pro","volume-title":"Algorithms for Image Processing and Computer Vision","author":"J Parker","year":"2010","unstructured":"Parker, J.: Algorithms for Image Processing and Computer Vision. IT Pro. Wiley, New York (2010)"},{"key":"67_CR10","doi-asserted-by":"crossref","unstructured":"Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. Lecture Notes in Computer Science, vol. 1525, pp. 15\u201317 (1998)","DOI":"10.1007\/3-540-49380-8_16"},{"key":"67_CR11","unstructured":"AlShaikh, M., Laouamer, L., Nana, L., Pascu, A.C.: Efficient and robust encryption and watermarking technique based on a new chaotic map approach. Multimedia Tools and Applications, vol. 75, pp. 1\u201314. Springer (2016)"}],"container-title":["Advances in Intelligent Systems and Computing","The International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2018)"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-74690-6_67","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T20:03:51Z","timestamp":1570651431000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-74690-6_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319746890","9783319746906"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-74690-6_67","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}