{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:23:57Z","timestamp":1742984637057,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811666155"},{"type":"electronic","value":"9789811666162"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6616-2_21","type":"book-chapter","created":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T12:03:01Z","timestamp":1650715381000},"page":"223-232","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Recovering ROI of Medical Image Through Curvelet Transform-Based Watermarking Method"],"prefix":"10.1007","author":[{"given":"Rayachoti","family":"Eswaraiah","sequence":"first","affiliation":[]},{"given":"Tirumalasetty","family":"Sudhir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,24]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Coatrieux, G., Lecornu, L., Sankur, B., Roux, Ch.: A Review of image watermarking applications in healthcare. In: International Conference of the IEEE EMBS, pp. 4691\u20134694 (2006)","DOI":"10.1109\/IEMBS.2006.259305"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Chao, H.M., Hsu, C.M., Miaou, A.G.: A data hiding technique with authentication, integration and confidentiality for electronic patient records. In: IEEE Transactions on Information Technology in Biomedicine, pp. 46\u201353 (2002)","DOI":"10.1109\/4233.992161"},{"key":"21_CR3","unstructured":"American Hospital Association, The Promise of Tele-health for Hospitals, Health Systems and their Communities, TrendWatch (2015)"},{"key":"21_CR4","volume-title":"Health Informatics: e-Health and Telemedicine","author":"E Dinya","year":"2013","unstructured":"Dinya, E., Toth, T.: Health Informatics: e-Health and Telemedicine. Semmelweis University, Institute of Health Informatics (2013)"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Pan, W., Coatrieux, G., Cuppens-Boulahia, N., Cuppens, F., Roux, C.: Medical image integrity control combining digital signature and lossless watermarking. In: International Conference on Data Privacy Management and Autonomous Spontaneous Security, pp. 153\u2013162. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-11207-2_12"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Al-Haj, A., Amer, A.: Secured telemedicine using region-based watermarking with tamper localization. J. Dig. Imag. 737\u2013750 (2014)","DOI":"10.1007\/s10278-014-9709-9"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Khor, H.L., Liew, S.C., Zain, J.M.: Region of interest-based tamper detection and lossless recovery watermarking scheme (ROI-DR) on ultrasound medical images. J. Dig. Imag. 328\u2013349 (2017)","DOI":"10.1007\/s10278-016-9930-9"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Surekha, B., Rohit, T.: Crypto-watermarking scheme for tamper detection of medical images. Comput. Methods Biomech. Biomed. Eng. Imag. Vis. 345\u2013355 (2019)","DOI":"10.1080\/21681163.2019.1595730"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Thabit, R., Khoo, B.E.: Medical image authentication using SLT and IWT schemes. Multimed. Tools Appl. 309\u2013332 (2017)","DOI":"10.1007\/s11042-015-3055-x"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Arda, U., Guzin, U.: A new medical image watermarking technique with finer tamper localization. J. Dig. Imag. 665\u2013680 (2017)","DOI":"10.1007\/s10278-017-9960-y"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Al-Haj, A., Mohammad, A., Amer, A.: Crypto-watermarking of transmitted medical images. J. Dig. Imag. 26\u201338 (2016)","DOI":"10.1007\/s10278-016-9901-1"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Badshah, G., Liew, S. C., Zain, J. M., Ali, M.: Watermark compression in medical image watermarking using lempel-ziv-welch (LZW) lossless compression technique. J. Dig. Imag. 216\u2013225 (2016)","DOI":"10.1007\/s10278-015-9822-4"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Liu, Y., Qu, X., Xin, G., Liu, P.: ROI-based reversible data hiding scheme for medical images with tamper detection. IEICE Trans. Inf. Syst. 769\u2013774 (2015)","DOI":"10.1587\/transinf.2014ICP0001"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Candes, E.J., Donoho, D.L.: New tight frames of curvelets and optimal representations of objects with piecewise C2 singularities. Commun. Pure Appl. Math. 219\u2013266 (2004)","DOI":"10.1002\/cpa.10116"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Leung, H.Y., Cheng, L.M., Cheng, L.L.: A robust watermarking scheme using selective curvelet coefficients. Int. J. Wavelets Multi Resolut. Inf. Process. 163\u2013181 (2009)","DOI":"10.1142\/S0219691309002830"}],"container-title":["Smart Innovation, Systems and Technologies","Evolution in Computational Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6616-2_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T12:11:39Z","timestamp":1650715899000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6616-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811666155","9789811666162"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6616-2_21","relation":{},"ISSN":["2190-3018","2190-3026"],"issn-type":[{"type":"print","value":"2190-3018"},{"type":"electronic","value":"2190-3026"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}