{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:56:43Z","timestamp":1764997003010,"version":"3.40.4"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T00:00:00Z","timestamp":1401408000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Digit Imaging"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s10278-014-9709-9","type":"journal-article","created":{"date-parts":[[2014,5,29]],"date-time":"2014-05-29T18:33:09Z","timestamp":1401388389000},"page":"737-750","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":56,"title":["Secured Telemedicine Using Region-Based Watermarking with Tamper Localization"],"prefix":"10.1007","volume":"27","author":[{"given":"Ali","family":"Al-Haj","sequence":"first","affiliation":[]},{"given":"Alaa\u2019","family":"Amer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,30]]},"reference":[{"issue":"3","key":"9709_CR1","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/4236.935176","volume":"5","author":"B Davie","year":"2001","unstructured":"Davie B, Florence V, Friede A, Sheehan J, Sisk J: Bringing health-care applications to the internet. IEEE Internet Comput 5(3):42\u201346, 2001","journal-title":"IEEE Internet Comput"},{"doi-asserted-by":"crossref","unstructured":"McEvoy F, Svalastoga E: Security of patient and study data associated with DICOM images when transferred using compact disc media. J Digit Imaging 22(1):65\u201370, 2007","key":"9709_CR2","DOI":"10.1007\/s10278-007-9068-x"},{"key":"9709_CR3","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/S0010-4825(02)00094-X","volume":"33","author":"R Norcen","year":"2003","unstructured":"Norcen R, Podesser M, Pommer A, Schmidt HP, Uhl A: Confidential storage and transmission of medical image data. Comput Biol Med 33:277\u2013292, 2003","journal-title":"Comput Biol Med"},{"issue":"4","key":"9709_CR4","doi-asserted-by":"crossref","first-page":"582","DOI":"10.1109\/TITB.2009.2014751","volume":"13","author":"L Kobayashi","year":"2009","unstructured":"Kobayashi L, Furuie S, Barreto P: Providing integrity and authenticity in DICOM images: a novel approach. IEEE Trans Inf Technol Biomed 13(4):582\u2013589, 2009","journal-title":"IEEE Trans Inf Technol Biomed"},{"unstructured":"Rodrigues JM,Puech W, Fiorio C: Lossless crypto-data hiding in medical images without increasing the original image size. In: Proc. 2nd Int. Conf. Adv. Med. Signal Inf. Process., Sep. 2004, pp 358\u2013365","key":"9709_CR5"},{"key":"9709_CR6","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/S1386-5056(01)00213-1","volume":"64","author":"J Bernarding","year":"2001","unstructured":"Bernarding J, Thiel A, Grzesik A: A JAVA-based DICOM server with integration of clinical findings and DICOM-conform data encryption. Int J Med Inform 64:429\u2013438, 2001","journal-title":"Int J Med Inform"},{"doi-asserted-by":"crossref","unstructured":"Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R: Relevance of watermarking in medical imaging. In: Proceedings of the IEEE EMBS Conf. on Information Technology Applications in Biomedicine. Arlington, USA, Nov. 2000, pp 250\u2013255","key":"9709_CR7","DOI":"10.1109\/ITAB.2000.892396"},{"key":"9709_CR8","volume-title":"Cryptography and Network Security\u2014Principles and Practice","author":"W Stallings","year":"1999","unstructured":"Stallings W: Cryptography and Network Security\u2014Principles and Practice. Prentice-Hall, Englewood Cliffs, 1999"},{"unstructured":"Digital Imaging and Communications in Medicine (DICOM) Standard, DICOM: 2006. [Online]. Available: http:\/\/medical.nema.org\/dicom\/2006\/","key":"9709_CR9"},{"unstructured":"Digital Imaging and Communications in Medicine (DICOM): part 15: security profiles ed., National Electrical Manufacturers Association (NEMA), 2001, pS 3.15\u20132001","key":"9709_CR10"},{"key":"9709_CR11","first-page":"26","volume-title":"Digital Watermarking","author":"IJ Cox","year":"2002","unstructured":"Cox IJ, Miller ML, Bloom JA: Digital Watermarking. Morgan Kaufmann, San Francisco, 2002, pp 26\u201336"},{"doi-asserted-by":"crossref","unstructured":"Hartung F, Kutter M: Multimedia watermarking techniques. In: Proc. IEEE, vol. 87, no. 7, pp 1069\u20131107, July 2006","key":"9709_CR12","DOI":"10.1109\/5.771066"},{"doi-asserted-by":"crossref","unstructured":"Coatrieux G, Lecornu L, Sankur B, Roux Ch: A review of image watermarking applications in healthcare. Porc. of IEEE-EMBC Conf., New York, USA, 2006, pp 4691\u20134694","key":"9709_CR13","DOI":"10.1109\/IEMBS.2006.4398500"},{"unstructured":"Coatrieux G, Quantin C, Montagner J, Fassa M, Allaert FA, Roux Ch: \u201cWatermarking medical images with anonymous patient identification to verify authenticity,\u201d Studies Health Technol. Inf 136:667\u2013672, 2008","key":"9709_CR14"},{"doi-asserted-by":"crossref","unstructured":"Coatrieux G, Maitre H, Sankur B: Strict integrity control of biomedical images. In: Proc. SPIE Security Watermarking Multimedia Contents III, SPIE 2001, vol. 4314, San Jose, CA January 2001, pp 229\u2013240","key":"9709_CR15","DOI":"10.1117\/12.435403"},{"issue":"1","key":"9709_CR16","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/4233.992161","volume":"6","author":"H Chao","year":"2002","unstructured":"Chao H, Hsu C, Miaou S: A data-hiding technique with authentication, integration, and confidentiality for electronic patient records. IEEE Trans Inf Technol Biomed 6(1):46\u201353, 2002","journal-title":"IEEE Trans Inf Technol Biomed"},{"issue":"8","key":"9709_CR17","doi-asserted-by":"crossref","first-page":"784","DOI":"10.1109\/42.938246","volume":"20","author":"XQ Zhou","year":"2001","unstructured":"Zhou XQ, Huang HK, Lou SL: Authenticity and integrity of digital mammography images. IEEE Trans Med Imaging 20(8):784\u2013791, 2001","journal-title":"IEEE Trans Med Imaging"},{"key":"9709_CR18","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/TMM.2003.809729","volume":"5","author":"C Vleeschouwer De","year":"2003","unstructured":"De Vleeschouwer C, Delaigle J, Macq B: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans Multimed 5:97\u2013105, 2003","journal-title":"IEEE Trans Multimed"},{"issue":"3","key":"9709_CR19","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1007\/s10278-010-9295-4","volume":"24","author":"C Tan","year":"2011","unstructured":"Tan C, Ng C, Xu X, Poh C, Yong L, Sheah K: Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24(3):528\u2013540, 2011","journal-title":"J Digit Imaging"},{"issue":"1","key":"9709_CR20","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/s10278-007-9043-6","volume":"22","author":"X Guo","year":"2009","unstructured":"Guo X, Zhuang T: A region-based lossless watermarking scheme for enhancing security of medical data. J Digit Imaging 22(1):53\u201364, 2009","journal-title":"J Digit Imaging"},{"key":"9709_CR21","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"A Alattar","year":"2004","unstructured":"Alattar A: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13:1147\u20131156, 2004","journal-title":"IEEE Trans Image Process"},{"key":"9709_CR22","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"D Thodi","year":"2007","unstructured":"Thodi D, Rodr\u00edguez J: Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16:721\u2013730, 2007","journal-title":"IEEE Trans Image Process"},{"key":"9709_CR23","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"M Celik","year":"2005","unstructured":"Celik M, Sharma G, Tekalp M, Saber E: Lossless generalized-LSB data embedding. IEEE Trans Image Process 14:253\u2013266, 2005","journal-title":"IEEE Trans Image Process"},{"key":"9709_CR24","doi-asserted-by":"crossref","first-page":"1042","DOI":"10.1109\/TIP.2005.863053","volume":"15","author":"M Celik MU","year":"2006","unstructured":"Celik MU M, Sharma G, Tekalp A: Lossless watermarking for image authentication: a new framework and an implementation. IEEE Trans Image Process 15:1042\u20131049, 2006","journal-title":"IEEE Trans Image Process"},{"key":"9709_CR25","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1117\/12.595408","volume":"5748","author":"Z Zhou","year":"2005","unstructured":"Zhou Z, Huang H, Liu B: Digital signature embedding (DSE) for medical image integrity in a data grid off-site backup archive. Proc SPIE 5748:306\u2013317, 2005","journal-title":"Proc SPIE"},{"issue":"1","key":"9709_CR26","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1007\/978-3-642-22170-5_48","volume":"179","author":"S Liew","year":"2011","unstructured":"Liew S, Zain J: Tamper localization and lossless recovery watermarking scheme. Commun Comput Inf Sci 179(1):555\u2013566, 2011","journal-title":"Commun Comput Inf Sci"},{"key":"9709_CR27","first-page":"114","volume":"24","author":"S Liew","year":"2012","unstructured":"Liew S, Way S, Zain J: Tamper localization and lossless recovery watermarking scheme with ROI Segmentation and Multilevel Authentication. J Digit Imaging 24:114\u2013125, 2012","journal-title":"J Digit Imaging"},{"key":"9709_CR28","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/s10278-009-9253-1","volume":"24","author":"M Osamah","year":"2011","unstructured":"Osamah M, Khoo B: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging 24:114\u2013125, 2011","journal-title":"J Digit Imaging"},{"issue":"6","key":"9709_CR29","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1007\/s10278-008-9120-5","volume":"22","author":"X Guo","year":"2009","unstructured":"Guo X, Zhuang T: Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digit Imaging 22(6):620\u2013628, 2009","journal-title":"J Digit Imaging"}],"container-title":["Journal of Digital Imaging"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10278-014-9709-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10278-014-9709-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10278-014-9709-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T04:58:54Z","timestamp":1746248334000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10278-014-9709-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,30]]},"references-count":29,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["9709"],"URL":"https:\/\/doi.org\/10.1007\/s10278-014-9709-9","relation":{},"ISSN":["0897-1889","1618-727X"],"issn-type":[{"type":"print","value":"0897-1889"},{"type":"electronic","value":"1618-727X"}],"subject":[],"published":{"date-parts":[[2014,5,30]]}}}