{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T06:51:53Z","timestamp":1759042313267},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2017,2,27]],"date-time":"2017-02-27T00:00:00Z","timestamp":1488153600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Digit Imaging"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s10278-017-9960-y","type":"journal-article","created":{"date-parts":[[2017,2,27]],"date-time":"2017-02-27T15:04:45Z","timestamp":1488207885000},"page":"665-680","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["A New Medical Image Watermarking Technique with Finer Tamper Localization"],"prefix":"10.1007","volume":"30","author":[{"given":"Arda","family":"Ustubioglu","sequence":"first","affiliation":[]},{"given":"Guzin","family":"Ulutas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,27]]},"reference":[{"issue":"8","key":"9960_CR1","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J., \"Reversible watermarking using a difference expansion\", IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890-896, 2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"8","key":"9960_CR2","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"AM Alattar","year":"2004","unstructured":"Alattar, A. M., \"Reversible watermark using the difference expansion of a generalized integer transform\", IEEE Trans. Image Process., vol. 13, no. 8, pp. 1147-1156, 2004","journal-title":"IEEE Trans. Image Process."},{"key":"9960_CR3","unstructured":"Woo, C-S, Du, J, Pham, B, \u201cMultiple Watermark Method for Privacy Control and Tamper Detection in Medical Images\u201d. In Proceedings of the APRS Workshop on Digital Image Computing Pattern Recognition and Imaging for Medical Applications. 2005"},{"issue":"1","key":"9960_CR4","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/s10278-007-9011-1","volume":"21","author":"JHK Wu","year":"2008","unstructured":"Wu, J. H. K., Chang, R.-F., Chen, C.-J., Wang, C.-L., Kuo, T.-H., Moon, W. K., & Chen, D.-R. Tamper detection and recovery for medical images using near-lossless information hiding technique. Journal of Digital Imaging, 21(1), 59\u201376, (2008).","journal-title":"Journal of Digital Imaging"},{"issue":"1","key":"9960_CR5","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/s10278-007-9043-6","volume":"22","author":"X Guo","year":"2009","unstructured":"Guo, X., Zhuang, T. . A region-based lossless watermarking scheme for enhancing security of medical data. Journal of Digital Imaging: The Official Journal of the Society for Computer Applications in Radiology, 22(1), 53\u201364, (2009).","journal-title":"Journal of Digital Imaging: The Official Journal of the Society for Computer Applications in Radiology"},{"issue":"6","key":"9960_CR6","doi-asserted-by":"crossref","first-page":"620","DOI":"10.1007\/s10278-008-9120-5","volume":"22","author":"X Guo","year":"2009","unstructured":"Guo, X., Zhuang, T. . Lossless watermarking for verifying the integrity of medical images with tamper localization. Journal of Digital Imaging: The Official Journal of the Society for Computer Applications in Radiology, 22(6), 620\u2013628, (2009)","journal-title":"Journal of Digital Imaging: The Official Journal of the Society for Computer Applications in Radiology"},{"key":"9960_CR7","doi-asserted-by":"crossref","unstructured":"Al-Qershi, O. M., Khoo, B. E., \"ROI-based tamper detection and recovery for medical images using reversible watermarking technique,\" Information Theory and Information Security (ICITIS), 2010 I.E. International Conference on Beijing, 2010, pp. 151\u2013155.","DOI":"10.1109\/ICITIS.2010.5688743"},{"issue":"1","key":"9960_CR8","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s10278-009-9253-1","volume":"24","author":"OM Al-Qershi","year":"2011","unstructured":"Al-Qershi, O. M., & Khoo, B. E. Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. Journal of Digital Imaging, 24(1), 114\u2013125, (2011). doi: \n10.1007\/s10278-009-9253-1","journal-title":"Journal of Digital Imaging"},{"key":"9960_CR9","unstructured":"Al-Qershi, O. M., & Khoo, B. E., Authentication and data hiding using a reversible ROI-based watermarking scheme for DICOM images, Proceedings of International Conference on Medical Systems Engineering (ICMSE 2009) (2009), pp. 829\u2013834"},{"issue":"3","key":"9960_CR10","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1007\/s10278-010-9295-4","volume":"24","author":"CK Tan","year":"2011","unstructured":"Tan, C. K., Ng, J. C., Xu, X., Poh, C. L., Guan, Y. L., & Sheah, K. . Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. Journal of Digital Imaging, 24(3), 528\u2013540, (2011).","journal-title":"Journal of Digital Imaging"},{"issue":"3","key":"9960_CR11","first-page":"370","volume":"2","author":"MB Kulkarni","year":"2012","unstructured":"Kulkarni, M. B., Patil, R. T., Tamper Detection & Recovery in medical image with secure data hiding using reversible watermarking, International Journal of Emerging Technology and Advanced Engineering, vol. 2, no. 3, pp. 370-373, 2012.","journal-title":"International Journal of Emerging Technology and Advanced Engineering"},{"issue":"3","key":"9960_CR12","doi-asserted-by":"crossref","first-page":"662","DOI":"10.1016\/j.cmpb.2013.05.027","volume":"111","author":"S Das","year":"2013","unstructured":"Sudeb Das and Malay Kumar Kundu, Effective management of medical information through ROI-lossless fragile image watermarking technique. Comput. Methods Prog. Biomed. 111, 3 , 662-675, (2013).","journal-title":"Comput. Methods Prog. Biomed."},{"key":"9960_CR13","first-page":"114","volume":"24","author":"S Liew","year":"2012","unstructured":"Liew S, Way S, Zain J, Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication. J Digit Imaging 24:114\u2013125, 2012","journal-title":"J Digit Imaging"},{"issue":"9","key":"9960_CR14","first-page":"2043","volume":"9","author":"H Liangyong","year":"2014","unstructured":"Liangyong, Huang A fragile watermark method for improving medical images security: Journal of Computers, Vol. 9, No. 9, pp 2043-2049, (2014), Academy Publisher.","journal-title":"Journal of Computers"},{"key":"9960_CR15","doi-asserted-by":"publisher","unstructured":"R. Eswaraiah and E. Sreenivasa Reddy, \u201cMedical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI\u201d International Journal of Telemedicine and Applications, vol. 2014, 2014. doi:\n10.1155\/2014\/984646\n\n, Article ID 984646, 10 pages","DOI":"10.1155\/2014\/984646"},{"issue":"6","key":"9960_CR16","doi-asserted-by":"crossref","first-page":"737","DOI":"10.1007\/s10278-014-9709-9","volume":"27","author":"A Al-Haj","year":"2014","unstructured":"Al-Haj A. Secured telemedicine using region-based watermarking with tamper localization. J Digit Imaging.;27(6):737\u201350, 2014.","journal-title":"J Digit Imaging."},{"key":"9960_CR17","doi-asserted-by":"publisher","unstructured":"Thabit R, Khoo BE. Medical image authentication using SLT and IWT schemes. Multimed Tools App., ;1\u201324, 2015 \n10.1007\/s11042-015-3055-x\n\n.","DOI":"10.1007\/s11042-015-3055-x"},{"issue":"8","key":"9960_CR18","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1049\/iet-ipr.2014.0986","volume":"9","author":"R Eswaraiah","year":"2015","unstructured":"R. Eswaraiah and E. Sreenivasa Reddy, \"Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest,\" in IET Image Processing, , vol. 9, no. 8, pp. 615-625, 2015.","journal-title":"in IET Image Processing"}],"container-title":["Journal of Digital Imaging"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10278-017-9960-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10278-017-9960-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10278-017-9960-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,10]],"date-time":"2017-11-10T15:34:02Z","timestamp":1510328042000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10278-017-9960-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,27]]},"references-count":18,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["9960"],"URL":"https:\/\/doi.org\/10.1007\/s10278-017-9960-y","relation":{},"ISSN":["0897-1889","1618-727X"],"issn-type":[{"value":"0897-1889","type":"print"},{"value":"1618-727X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,27]]}}}