{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:00:51Z","timestamp":1775577651614,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T00:00:00Z","timestamp":1472083200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Digit Imaging"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s10278-016-9901-1","type":"journal-article","created":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T19:15:26Z","timestamp":1472152526000},"page":"26-38","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["Crypto-Watermarking of Transmitted Medical Images"],"prefix":"10.1007","volume":"30","author":[{"given":"Ali","family":"Al-Haj","sequence":"first","affiliation":[]},{"given":"Ahmad","family":"Mohammad","sequence":"additional","affiliation":[]},{"given":"Alaa\u2019","family":"Amer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"issue":"3","key":"9901_CR1","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/MITP.2016.45","volume":"18","author":"J Fiaidhi","year":"2016","unstructured":"Fiaidhi J, Kuziemsky C, Mohammed S, Weber J, Topaloglou T: Emerging IT trends in healthcare and well-being. IT Prof 18(3):9\u201313, 2016","journal-title":"IT Prof"},{"key":"9901_CR2","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/RBME.2012.2228312","volume":"6","author":"N Saranummi","year":"2013","unstructured":"Saranummi N: In the spotlight: health information systems. IEEE Rev Biomed Eng 6:21\u201323, 2013","journal-title":"IEEE Rev Biomed Eng"},{"key":"9901_CR3","volume-title":"PACS and imaging informatics: basic principles and applications","author":"HK Huang","year":"2010","unstructured":"Huang HK: PACS and imaging informatics: basic principles and applications. Wiley-Blackwell, New York, 2010"},{"issue":"3","key":"9901_CR4","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1109\/TCBB.2016.2520933","volume":"13","author":"O Kocabas","year":"2016","unstructured":"Kocabas O, Soyata T, Aktas M: Emerging security mechanisms for medical cyber physical systems. IEEE\/ACM Trans Comput Biol Bioinform 13(3):401\u2013416, 2016","journal-title":"IEEE\/ACM Trans Comput Biol Bioinform"},{"key":"9901_CR5","unstructured":"The Health Insurance Portability and Accountability Act (HIPAA), March 2009. [Online]. Available at: http:\/\/www.hhs.gov\/ocr\/privacy\/index.html"},{"issue":"1","key":"9901_CR6","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/TITB.2007.906101","volume":"12","author":"W Lee","year":"2008","unstructured":"Lee W, et al: A cryptographic key management solution for HIPAA privacy\/security regulations. IEEE Trans Inf Technol Biomed 12(1):34\u201341, 2008","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"9901_CR7","unstructured":"Schneier B. Applied cryptography. Wiley, 1995"},{"issue":"6","key":"9901_CR8","doi-asserted-by":"crossref","first-page":"714","DOI":"10.1007\/s10278-014-9700-5","volume":"27","author":"S Mousavi","year":"2014","unstructured":"Mousavi S, Naghsh A, Abu-Bakar S: Watermarking techniques used in medical images: a survey. J Digit Imaging 27(6):714\u2013729, 2014","journal-title":"J Digit Imaging"},{"key":"9901_CR9","unstructured":"Digital Imaging and Communications in Medicine (DICOM) Standard, DICOM. (2006). [Online]. Available: http:\/\/medical.nema.org\/dicom\/2006\/"},{"issue":"2","key":"9901_CR10","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/s10278-014-9734-8","volume":"28","author":"A Al-Haj","year":"2014","unstructured":"Al-Haj A: Providing integrity, authenticity, and confidentiality for header and pixel data of DICOM images. J Digit Imaging 28(2):179\u2013187, 2014","journal-title":"J Digit Imaging"},{"issue":"6","key":"9901_CR11","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1049\/iet-ifs.2014.0245","volume":"9","author":"A Al-Haj","year":"2015","unstructured":"Al-Haj A, Abandah G, Hussein N: Crypto-based algorithms for secured medical image transmission. IET Inf Secur 9(6):365\u2013373, 2015","journal-title":"IET Inf Secur"},{"key":"9901_CR12","doi-asserted-by":"crossref","unstructured":"Coatrieux G, Maitre H, Sankur B, Rolland Y, Collorec R: Relevance of watermarking in medical imaging. In: Proceedings of the IEEE EMBS Conf. on Information Technology Applications in Biomedicine. USA, 2000, pp. 250\u2013255","DOI":"10.1109\/ITAB.2000.892396"},{"issue":"2","key":"9901_CR13","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/s10278-012-9527-x","volume":"26","author":"H Nyeem","year":"2012","unstructured":"Nyeem H, Boles W, Boyd C: A review of medical image watermarking requirements for teleradiology. J Digit Imaging 26(2):326\u2013343, 2012","journal-title":"J Digit Imaging"},{"issue":"3","key":"9901_CR14","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1007\/s10278-014-9709-9","volume":"8","author":"A Al-Haj","year":"2014","unstructured":"Al-Haj A, Amer A: Secured telemedicine using region-based watermarking with tamper localization. J Digit Imaging 8(3):737\u2013750, 2014","journal-title":"J Digit Imaging"},{"key":"9901_CR15","doi-asserted-by":"crossref","unstructured":"Pan W, Coatrieux G, Cuppens-Boulahia N, Cuppens F, Roux C: Medical image integrity control combining digital signature and lossless watermarking. Data Privacy Manage. Autonom. Spontaneous Sec. (LNCS), vol. 5939, 2010, pp. 153\u2013162","DOI":"10.1007\/978-3-642-11207-2_12"},{"issue":"11","key":"9901_CR16","doi-asserted-by":"crossref","first-page":"5388","DOI":"10.1109\/JSTARS.2015.2475169","volume":"8","author":"S Zope-Chaudhari","year":"2015","unstructured":"Zope-Chaudhari S, Venkatachalam P, Buddhiraju K: Secure dissemination and protection of multispectral images using crypto watermarking. IEEE J Sel Top Appl Earth Observ Remote Sens 8(11):5388\u20135394, 2015","journal-title":"IEEE J Sel Top Appl Earth Observ Remote Sens"},{"key":"9901_CR17","doi-asserted-by":"crossref","unstructured":"Al-Haj A, Hussein N, Abandah G: Combining cryptography and digital watermarking for secured transmission of Medical images. In: Proc. of the IEEE International Conference on Information Management. UK, 2016","DOI":"10.1109\/INFOMAN.2016.7477531"},{"issue":"8","key":"9901_CR18","doi-asserted-by":"crossref","first-page":"784","DOI":"10.1109\/42.938246","volume":"20","author":"XQ Zhou","year":"2001","unstructured":"Zhou XQ, Huang HK, Lou SL: Authenticity and integrity of digital mammography images. IEEE Trans Med Imaging 20(8):784\u2013791, 2001","journal-title":"IEEE Trans Med Imaging"},{"key":"9901_CR19","doi-asserted-by":"crossref","unstructured":"Patel P, Patel Y: Secure and authentic DCT image steganography through DWT-SVD Based Digital Watermarking with RSA Encryption. In: Proc. of the IEEE fifth International Conference on Communication Systems and Network Technologies, 2015, pp. 736\u2013739","DOI":"10.1109\/CSNT.2015.193"},{"issue":"1","key":"9901_CR20","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/s10278-007-9043-6","volume":"22","author":"X Guo","year":"2009","unstructured":"Guo X, Zhuang T: A region-based lossless watermarking scheme for enhancing security of medical data. J Digit Imaging 22(1):53\u201364, 2009","journal-title":"J Digit Imaging"},{"key":"9901_CR21","doi-asserted-by":"crossref","unstructured":"Guo X, Zhuang T: Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digital Imaging 22(6): 2009","DOI":"10.1007\/s10278-008-9120-5"},{"issue":"4","key":"9901_CR22","doi-asserted-by":"crossref","first-page":"1244","DOI":"10.1109\/TIP.2015.2395724","volume":"124","author":"I Dragoi","year":"2015","unstructured":"Dragoi I, Coltuc D: On local prediction based reversible watermarking. IEEE Trans Image Process 124(4):1244\u20131246, 2015","journal-title":"IEEE Trans Image Process"},{"key":"9901_CR23","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TIP.2006.891046","volume":"16","author":"D Thodi","year":"2007","unstructured":"Thodi D, Rodr\u00edguez J: Expansion embedding techniques for reversible watermarking. IEEE Trans Image Process 16:721\u201330, 2007","journal-title":"IEEE Trans Image Process"},{"key":"9901_CR24","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TIP.2004.840686","volume":"14","author":"M Celik","year":"2005","unstructured":"Celik M, Sharma G, Tekalp M, Saber E: Lossless generalized-LSB data embedding. IEEE Trans Image Process 14:253\u2013266, 2005","journal-title":"IEEE Trans Image Process"},{"key":"9901_CR25","doi-asserted-by":"crossref","unstructured":"Su C, Huang J, Shih C, Chen Y: Reversible and embedded watermarking of medical images for telemedicine. In: Proc. of the first IEEE International Conference on Industrial Networks and Intelligent Systems. 2015, pp. 145\u2013150","DOI":"10.4108\/icst.iniscom.2015.258307"},{"issue":"1","key":"9901_CR26","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/s10278-007-9011-1","volume":"21","author":"J Wu","year":"2008","unstructured":"Wu J, et al: Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21(1):59\u201376, 2008","journal-title":"J Digit Imaging"},{"key":"9901_CR27","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1007\/s10278-007-9012-0","volume":"21","author":"K Chiang","year":"2008","unstructured":"Chiang K, Chang K, Chang R, Yen H: Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. J Digit Imaging 21:77\u201390, 2008","journal-title":"J Digit Imaging"},{"issue":"1","key":"9901_CR28","first-page":"555","volume":"179","author":"S Liew","year":"2011","unstructured":"Liew S, Zain J: Tamper localization and lossless recovery watermarking scheme. Commun Comput Inf Sci 179(1):555\u2013566, 2011","journal-title":"Commun Comput Inf Sci"},{"key":"9901_CR29","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/s10278-009-9253-1","volume":"24","author":"S Liew","year":"2011","unstructured":"Liew S, Zain J: Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication. J Digit Imaging 24:114\u2013125, 2011","journal-title":"J Digit Imaging"},{"key":"9901_CR30","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/s10278-009-9253-1","volume":"24","author":"O Al-Qershi","year":"2011","unstructured":"Al-Qershi O, Khoo B: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging 24:114\u2013125, 2011","journal-title":"J Digit Imaging"},{"issue":"6","key":"9901_CR31","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1007\/s10278-008-9120-5","volume":"22","author":"X Guo","year":"2009","unstructured":"Guo X, Zhuang T: Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digit Imaging 22(6):620\u2013628, 2009","journal-title":"J Digit Imaging"},{"issue":"3","key":"9901_CR32","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1007\/s10278-010-9295-4","volume":"24","author":"C Tan","year":"2011","unstructured":"Tan C, Ng C, Xu X, Poh C, Yong L, Sheah K: Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24(3):528\u2013540, 2011","journal-title":"J Digit Imaging"},{"issue":"4","key":"9901_CR33","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/s10278-015-9770-z","volume":"28","author":"S Mousavi","year":"2015","unstructured":"Mousavi S, Naghsh A, Abu-Bakar S: A heuristic automatic and robust ROI detection method for medical image watermarking. J Digit Imaging 28(4):417\u2013427, 2015","journal-title":"J Digit Imaging"},{"key":"9901_CR34","unstructured":"Su PC, Wang HJ, Kuo CCJ: Digital image watermarking in regions of interest. In: Proceedings of the IS&T conference on image processing, image quality, image capture systems. Savannah, Georgia, 1999, pp 295\u2013300"},{"issue":"8","key":"9901_CR35","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1049\/iet-ipr.2014.0986","volume":"9","author":"R Eswaraiah","year":"2015","unstructured":"Eswaraiah R, Reddy E: Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest. IET Image Process 9(8):615\u2013625, 2015","journal-title":"IET Image Process"},{"key":"9901_CR36","unstructured":"Digital Imaging and Communications in Medicine (DICOM), part 15: security profiles ed., National Electrical Manufacturers Association (NEMA), pS 3.15\u20132001, 2001"}],"container-title":["Journal of Digital Imaging"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10278-016-9901-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10278-016-9901-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10278-016-9901-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10278-016-9901-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T23:38:01Z","timestamp":1568331481000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10278-016-9901-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["9901"],"URL":"https:\/\/doi.org\/10.1007\/s10278-016-9901-1","relation":{},"ISSN":["0897-1889","1618-727X"],"issn-type":[{"value":"0897-1889","type":"print"},{"value":"1618-727X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,25]]}}}