{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:26:18Z","timestamp":1742999178667,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811666155"},{"type":"electronic","value":"9789811666162"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6616-2_15","type":"book-chapter","created":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T12:03:01Z","timestamp":1650715381000},"page":"161-170","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Medical Image Protection Using Blockchain for E-healthcare System"],"prefix":"10.1007","author":[{"given":"Punam","family":"Prabha","sequence":"first","affiliation":[]},{"given":"Yash","family":"Janoria","sequence":"additional","affiliation":[]},{"given":"Harsh","family":"Raj","sequence":"additional","affiliation":[]},{"given":"Uday","family":"Patidar","sequence":"additional","affiliation":[]},{"given":"Kakali","family":"Chatterjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,24]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Peng, W., Yi, L., Fang, L., XinHua, D., Ping, C.: Secure and traceable copyright management system based on blockchain. In: IEEE 5th International Conference on Computer and Communications (ICCC) (2019)","DOI":"10.1109\/ICCC47050.2019.9064101"},{"key":"15_CR2","unstructured":"Jose, D.M., Karuppathal, R., Kumar, A.V.A.: Copyright protection using digital watermarking. In: National Conference on Advances in Computer Science and Applications with International Journal of Computer Applications (NCACSA), International Journal of Computer Applications (IJCA) (2012)"},{"issue":"3","key":"15_CR3","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1016\/j.clsr.2017.11.008","volume":"34","author":"A Savelyev","year":"2018","unstructured":"Savelyev, A.: Copyright in the blockchain era: promises and challenges. Comput. Law Secur. Rev. 34(3), 550\u2013561 (2018)","journal-title":"Comput. Law Secur. Rev."},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Fujimura, S., et al.: BRIGHT: A concept for a decentralized rights management system based on blockchain. In: 2015 IEEE 5th International Conference on Consumer Electronics-Berlin (ICCE-Berlin), Berlin (2015)","DOI":"10.1109\/ICCE-Berlin.2015.7391275"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Meng, Z., Morizumi, T., Miyata, S., Kinoshita, H.: Design scheme of copyright management system based on digital watermarking and blockchain. In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) (2018)","DOI":"10.1109\/COMPSAC.2018.10258"},{"key":"15_CR6","unstructured":"Zauner, C.: Implementation and benchmarking of perceptual image hash functions (2010)"},{"issue":"3","key":"15_CR7","first-page":"1530","volume":"5","author":"S Nishane","year":"2015","unstructured":"Nishane, S., Umale, V.M.: Digital image watermarking based on DWT using QR code. Int. J. Curr. Eng. Technol. 5(3), 1530\u20131532 (2015)","journal-title":"Int. J. Curr. Eng. Technol."},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Chow, Y.W., Susilo, W., Tonien, J., Zong, W.: A QR code watermarking approach based on the DWT-DCT technique. In: Australasian Conference on Information Security and Privacy, Cham, 2017, pp. 314\u2013331","DOI":"10.1007\/978-3-319-59870-3_18"},{"key":"15_CR9","unstructured":"Mahler, T., et al.: Know your enemy: characteristics of cyber-attacks on medical imaging devices. Comput. Res. Repos. (CoRR) (2018). arXiv:1801.05583"},{"issue":"8","key":"15_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-018-0995-5","volume":"42","author":"A Zhang","year":"2018","unstructured":"Zhang, A., Lin, X.: Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain. J. Med. Syst. 42(8), 1\u201318 (2018)","journal-title":"J. Med. Syst."},{"issue":"3","key":"15_CR11","doi-asserted-by":"publisher","first-page":"215","DOI":"10.53986\/ibjm.2020.0037","volume":"2","author":"A Azim","year":"2020","unstructured":"Azim, A., Islam, M.N., Spranger, P.E.: Blockchain and novel coronavirus: towards preventing COVID-19 and future pandemics. Iberoamerican J. Med. 2(3), 215\u2013218 (2020)","journal-title":"Iberoamerican J. Med."},{"key":"15_CR12","unstructured":"Solomon, S.: Israeli researchers show medical scans vulnerable to fake tumors (2019). https:\/\/www.timesofisrael.com\/israeli-researchers-show-medical-scans-vulnerable-to-fake-tumors\/"},{"issue":"5","key":"15_CR13","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1049\/cje.2018.07.003","volume":"27","author":"Z Ma","year":"2018","unstructured":"Ma, Z., Huang, W., Gao, H.: Secure DRM scheme based on blockchain with high credibility. Chin. J. Electron. 27(5), 1025\u20131036 (2018)","journal-title":"Chin. J. Electron."},{"issue":"8","key":"15_CR14","doi-asserted-by":"publisher","first-page":"10599","DOI":"10.1007\/s11042-015-3127-y","volume":"76","author":"SA Parah","year":"2017","unstructured":"Parah, S.A., Sheikh, J.A., Ahad, F., Loan, N.A., Bhat, G.M.: Information hiding in medical images: a robust medical image watermarking system for E-healthcare. Multimedia Tools Appl. 76(8), 10599\u201310633 (2017)","journal-title":"Multimedia Tools Appl."},{"key":"15_CR15","unstructured":"Benet, J.: IPFS-content addressed, versioned, p2p file system (2014)"}],"container-title":["Smart Innovation, Systems and Technologies","Evolution in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6616-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T12:11:22Z","timestamp":1650715882000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6616-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811666155","9789811666162"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6616-2_15","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}