{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:38:13Z","timestamp":1775745493419,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2017,5,8]],"date-time":"2017-05-08T00:00:00Z","timestamp":1494201600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Digit Imaging"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s10278-017-9961-x","type":"journal-article","created":{"date-parts":[[2017,5,8]],"date-time":"2017-05-08T15:07:45Z","timestamp":1494256065000},"page":"695-709","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Medical Image Tamper Detection Based on Passive Image Authentication"],"prefix":"10.1007","volume":"30","author":[{"given":"Guzin","family":"Ulutas","sequence":"first","affiliation":[]},{"given":"Arda","family":"Ustubioglu","sequence":"additional","affiliation":[]},{"given":"Beste","family":"Ustubioglu","sequence":"additional","affiliation":[]},{"given":"Vasif","family":"V. Nabiyev","sequence":"additional","affiliation":[]},{"given":"Mustafa","family":"Ulutas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,8]]},"reference":[{"key":"9961_CR1","doi-asserted-by":"crossref","unstructured":"Das S, Kundu MK: Effective management of medical information through ROI-lossless fragile image watermarking technique. Computer Methods and Programs in Biomedicine 111(3):662\u201375, 2013","DOI":"10.1016\/j.cmpb.2013.05.027"},{"issue":"2","key":"9961_CR2","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/s10278-012-9527-x","volume":"26","author":"H Nyeem","year":"2013","unstructured":"Nyeem H, Boles W, Boyd C: A review of medical image watermarking requirements for teleradiology. J Digit Imaging 26(2):326\u201343, 2013","journal-title":"J Digit Imaging."},{"issue":"4","key":"9961_CR3","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1016\/j.jss.2011.11.005","volume":"85","author":"M Arsalan","year":"2012","unstructured":"Arsalan M, Malik SA, Khan A: Intelligent reversible watermarking in integer wavelet domain for medical images. J Syst Softw. 85(4):883\u201394, 2012","journal-title":"J Syst Softw."},{"key":"9961_CR4","unstructured":"Fridrich AJ, Soukal BD, and Luk\u00e1\u0161 AJ: Detection of copy-move forgery in digital images. Proceedings of Digital Forensic Research Workshop 3(2):652\u201363, 2003"},{"key":"9961_CR5","doi-asserted-by":"crossref","unstructured":"Zain JM, Fauzi AM: Medical image watermarking with tamper detection and recovery. Engineering in Medicine and Biology Society, 2006. EMBS'06. 28th Annual International Conference of the IEEE 1:3270\u20133, 2006","DOI":"10.1109\/IEMBS.2006.260767"},{"issue":"1","key":"9961_CR6","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/s10278-007-9011-1","volume":"21","author":"JHK Wu","year":"2008","unstructured":"Wu JHK, Chang RF, Chen CJ, Wang CL, Kuo TH, Moon WK, et al: Tamper detection and recovery for medical images using near-lossless information hiding technique. J Digit Imaging 21(1):59\u201376, 2008","journal-title":"J Digit Imaging."},{"key":"9961_CR7","doi-asserted-by":"crossref","unstructured":"Chiang K-H, Chang-Chien K-C, Chang R-F, Yen H-Y: Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. J. Digit. Imaging. p. 77\u201390, 2008","DOI":"10.1007\/s10278-007-9012-0"},{"key":"9961_CR8","doi-asserted-by":"crossref","unstructured":"Al-Qershi OM, Khoo BE: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. Journal of Digital Imaging 24(1):114\u201325, 2011","DOI":"10.1007\/s10278-009-9253-1"},{"key":"9961_CR9","doi-asserted-by":"crossref","unstructured":"Al-Qershi OM, Khoo BE: ROI-based tamper detection and recovery for medical images using reversible watermarking technique. 2010 I.E. Int Conf Inf Theory Inf Secur 151\u20135, 2010","DOI":"10.1109\/ICITIS.2010.5688743"},{"key":"9961_CR10","doi-asserted-by":"crossref","unstructured":"Liew SC, Zain JM: Reversible medical image watermarking for tamper detection and recovery. Proc - 2010 3rd IEEE Int Conf Comput Sci Inf Technol ICCSIT 2010. p. 417\u201320, 2010","DOI":"10.1109\/ICCSIT.2010.5564078"},{"key":"9961_CR11","doi-asserted-by":"crossref","unstructured":"Memon NA, Chaudhry A, Ahmad M, Keerio ZA. Hybrid watermarking of medical images for ROI authentication and recovery. International Journal of Computer Mathematics. 2011; 88(10):2057\u201371.","DOI":"10.1080\/00207160.2010.543677"},{"issue":"3","key":"9961_CR12","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1007\/s10278-010-9295-4","volume":"24","author":"CK Tan","year":"2011","unstructured":"Tan CK, Ng JC, Xu X, Poh CL, Guan YL, Sheah K: Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability. J Digit Imaging. 24(3):528\u201340, 2011","journal-title":"J Digit Imaging."},{"key":"9961_CR13","doi-asserted-by":"crossref","unstructured":"Tjokorda Agung BW, Adiwijaya Permana FP: Medical image watermarking with tamper detection and recovery using reversible watermarking with LSB modification and run length encoding (RLE) compression. Proceeding - COMNETSAT 2012 2012 I.E. Int Conf Commun Networks Satell. p. 167\u201371, 2012","DOI":"10.1109\/ComNetSat.2012.6380799"},{"key":"9961_CR14","doi-asserted-by":"crossref","unstructured":"Deng X, Chen Z, Zeng F, Zhang Y, Mao Y. Authentication and recovery of medical diagnostic image using dual reversible digital watermarking. Journal of nanoscience and nanotechnology. 13(3), 2099\u2013107, 2013.","DOI":"10.1166\/jnn.2013.6872"},{"key":"9961_CR15","doi-asserted-by":"crossref","unstructured":"Eswaraiah R, Sreenivasa Reddy E: Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. Int J Telemed Appl. Hindawi Publishing Corporation; 2014; 2014:1\u201310. Available from: http:\/\/www.hindawi.com\/journals\/ijta\/2014\/984646\/","DOI":"10.1155\/2014\/984646"},{"issue":"7","key":"9961_CR16","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1109\/TPAMI.2002.1017623","volume":"24","author":"T Ojala","year":"2002","unstructured":"Ojala T, Pietik\u00e4inen M, M\u00e4enp\u00e4\u00e4 T: Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell. 24(7):971\u201387, 2002","journal-title":"IEEE Trans Pattern Anal Mach Intell."},{"issue":"2","key":"9961_CR17","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"G Lowe","year":"2004","unstructured":"Lowe G: SIFT, the scale invariant feature transform. Int J. Of Computer Vision, 60(2), 91\u2013110, 2004","journal-title":"Int J. Of Computer Vision"},{"issue":"3 PART 2","key":"9961_CR18","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/TIFS.2011.2129512","volume":"6","author":"I Amerini","year":"2011","unstructured":"Amerini I, Ballan L, Caldelli R, Del Bimbo A, Serra G: A SIFT-based forensic method for copy-move attack detection and transformation recovery. IEEE Trans Inf Forensics Secur. 6(3 PART 2):1099\u2013110, 2011","journal-title":"IEEE Trans Inf Forensics Secur."},{"key":"9961_CR19","doi-asserted-by":"crossref","unstructured":"Bay H, Tuytelaars T, Van Gool L SURF: speeded up robust features. Lect Notes Comput Sci (including Subser Lect Notes Artif Intell Lect Notes Bioinformatics). p. 404\u201317, 2006","DOI":"10.1007\/11744023_32"},{"key":"9961_CR20","unstructured":"Barre S 1999 Available at: http:\/\/www.barre.nom.fr\/medical\/samples\/ ."},{"issue":"3","key":"9961_CR21","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/j.jss.2010.11.928","volume":"84","author":"M Ulutas","year":"2011","unstructured":"Ulutas M, Ulutas G, Nabiyev VV: Medical image security and EPR hiding using Shamir\u2019s secret sharing scheme, Journal of Systems and Software, 84, 3, 341\u2013353, doi: 10.1016\/j.jss.2010.11.928 , ISSN 0164-1212, 2011","journal-title":"Journal of Systems and Software"},{"key":"9961_CR22","doi-asserted-by":"publisher","unstructured":"Thabit R, Khoo BE: Medical image authentication using SLT and IWT schemes. Multimed Tools App 1\u201324,2015. Available from: doi: 10.1007\/s11042\u2013015-3055-x","DOI":"10.1007\/s11042-015-3055-x"},{"issue":"8","key":"9961_CR23","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1049\/iet-ipr.2014.0986","volume":"9","author":"R Eswaraiah","year":"2015","unstructured":"Eswaraiah R and Sreenivasa Reddy E: Robust medical image watermarking technique for accurate detection of tampers inside region of interest and recovering original region of interest, IET Image Processing, 9, 8, pp. 615\u2013625, 2015","journal-title":"IET Image Processing"}],"container-title":["Journal of Digital Imaging"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10278-017-9961-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10278-017-9961-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10278-017-9961-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:54:20Z","timestamp":1750236860000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10278-017-9961-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,8]]},"references-count":23,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["9961"],"URL":"https:\/\/doi.org\/10.1007\/s10278-017-9961-x","relation":{},"ISSN":["0897-1889","1618-727X"],"issn-type":[{"value":"0897-1889","type":"print"},{"value":"1618-727X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,8]]}}}