{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T19:41:00Z","timestamp":1771962060979,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,1,3]],"date-time":"2017-01-03T00:00:00Z","timestamp":1483401600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Digit Imaging"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s10278-016-9930-9","type":"journal-article","created":{"date-parts":[[2017,1,3]],"date-time":"2017-01-03T17:50:06Z","timestamp":1483465806000},"page":"328-349","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["Region of Interest-Based Tamper Detection and Lossless Recovery Watermarking Scheme (ROI-DR) on Ultrasound Medical Images"],"prefix":"10.1007","volume":"30","author":[{"given":"Hui Liang","family":"Khor","sequence":"first","affiliation":[]},{"given":"Siau-Chuin","family":"Liew","sequence":"additional","affiliation":[]},{"given":"Jasni Mohd.","family":"Zain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,3]]},"reference":[{"key":"9930_CR1","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1007\/s10278-008-9120-5","volume":"22","author":"X Guo","year":"2008","unstructured":"Guo X, Zhuang T: Lossless watermarking for verifying the integrity of medical images with tamper localization. J Digit Imaging 22:620\u2013628, 2008","journal-title":"J Digit Imaging"},{"issue":"2","key":"9930_CR2","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/s10278-012-9484-4","volume":"26","author":"SC Liew","year":"2013","unstructured":"Liew SC, Liew SW, Jasni MZ: Tamper localization and lossless recovery watermarking scheme with roi segmentation and multilevel authentication. J Digit Imaging 26(2):316\u2013325, 2013","journal-title":"J Digit Imaging"},{"issue":"8","key":"9930_CR3","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1049\/iet-ipr.2014.0986","volume":"9","author":"E Rayachoti","year":"2015","unstructured":"Rayachoti E, Edara SR: Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest. IET Image Process 9(8):615\u2013625, 2015","journal-title":"IET Image Process"},{"issue":"6","key":"9930_CR4","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1007\/s10278-012-9518-y","volume":"25","author":"D Wenbo","year":"2012","unstructured":"Wenbo D, Chueh LP, Yong LG: An improved tamper detection and localization scheme for volumetric DICOM images. J Digit Imaging 25(6):751\u2013763, 2012","journal-title":"J Digit Imaging"},{"issue":"3","key":"9930_CR5","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/s10278-010-9295-4","volume":"24","author":"CK Tan","year":"2011","unstructured":"Tan CK, Ng JC, Xu X, Poh CL, Guan YL, Sheah K: Security protection of dicom medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging 24(3):528\u2013540, 2011","journal-title":"J Digit Imaging"},{"key":"9930_CR6","doi-asserted-by":"publisher","unstructured":"Memon NA, Gilani SAM, Asad Ali: Watermarking of chest CT scan medical images for content authentication. Proceeding of 2009 International Conference on Information and Communication Technologies, IEEE, 2009, pp. 175\u2013180","DOI":"10.1109\/ICICT.2009.5268167"},{"key":"9930_CR7","doi-asserted-by":"publisher","unstructured":"Fotopoulos V, Stavrinou ML, Skodras AN: Medical Image Authetication and Self Correction through an Adaptive Reversible Watermarking Technique. Proceedings of the 8th IEEE International Conference on BioInformatics and BioEngineering, IEEE, 2008, pp. 1\u20135. doi: 10.1109\/BIBE.2008.4696803","DOI":"10.1109\/BIBE.2008.4696803"},{"key":"9930_CR8","doi-asserted-by":"publisher","unstructured":"Huang H, Coatrieux G, Montagner J, Shu HZ, Luo LM, Roux Ch: Medical image integrity control seeking into the detail of the tampering. 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, IEEE, 2008, pp. 414\u2013417. doi: 10.1109\/IEMBS.2008.4649178","DOI":"10.1109\/IEMBS.2008.4649178"},{"key":"9930_CR9","doi-asserted-by":"crossref","unstructured":"Jasni MZ and Abdul RF: Medical image watermarking with tamper detection and recovery. Proceedings of the 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, IEEE, 2006, pp. 3270\u20133273","DOI":"10.1109\/IEMBS.2006.260767"},{"issue":"1","key":"9930_CR10","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s10278-009-9253-1","volume":"24","author":"OM Al-Qershi","year":"2011","unstructured":"Al-Qershi OM, Khoo BE: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J Digit Imaging 24(1):114\u2013125, 2011","journal-title":"J Digit Imaging"},{"key":"9930_CR11","unstructured":"Badran EF, Sharkas MA and Attallah OA: Multiple watermark embedding scheme in wavelet-spatial domains based on ROI of medical images. In Radio Science Conference, 2009. NRSC 2009. National, IEEE, 2009, pp. 1\u20138"},{"key":"9930_CR12","doi-asserted-by":"crossref","unstructured":"Coatrieux G, Puentes J, Roux C, Lamard M and Daccache W: January. A low distorsion and reversible watermark: application to angiographic images of the retina. In 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference, IEEE, 2006, pp. 2224\u20132227","DOI":"10.1109\/IEMBS.2005.1616905"},{"issue":"3","key":"9930_CR13","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1016\/j.ins.2005.01.013","volume":"175","author":"FY Shih","year":"2005","unstructured":"Shih FY, Wu YT: Robust watermarking and compression for medical images based on genetic algorithms. J Inf Sci 175(3):200\u2013216, 2005","journal-title":"J Inf Sci"},{"key":"9930_CR14","doi-asserted-by":"publisher","unstructured":"Lim SJ, Moon HM, Chae SH, Pan SB, Chung Y and Chang MH: December. Dual watermarking method for integrity of medical images. In 2008 Second International Conference on Future Generation Communication and Networking, Vol. 2, IEEE, 2008, pp. 70\u201373","DOI":"10.1109\/FGCN.2008.213"},{"key":"9930_CR15","unstructured":"Liew SC: Tamper Localization and recovery watermarking schemes for medical images in PACS. Ph.D. Thesis. Malayisa: Universiti Malayisa Pahang, 2011"},{"key":"9930_CR16","doi-asserted-by":"crossref","unstructured":"Cox IJ, Miller ML, Bloom JA and Honsinger C: Digital watermarking (Vol. 1558607145). San Francisco: Morgan Kaufmann, 2002","DOI":"10.1016\/B978-155860714-9\/50009-2"},{"key":"9930_CR17","doi-asserted-by":"publisher","unstructured":"Smitha B and Navas KA: Spatial domain-high capacity data hiding in ROI images. In 2007 International Conference on Signal Processing, Communications and Networking, IEEE, 2007, pp. 528\u2013533","DOI":"10.1109\/ICSCN.2007.350657"}],"container-title":["Journal of Digital Imaging"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10278-016-9930-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10278-016-9930-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10278-016-9930-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T03:56:00Z","timestamp":1568692560000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10278-016-9930-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,3]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["9930"],"URL":"https:\/\/doi.org\/10.1007\/s10278-016-9930-9","relation":{},"ISSN":["0897-1889","1618-727X"],"issn-type":[{"value":"0897-1889","type":"print"},{"value":"1618-727X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,3]]}}}