{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T04:53:50Z","timestamp":1769576030194,"version":"3.49.0"},"reference-count":26,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Computer Mathematics"],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1080\/00207161003596690","type":"journal-article","created":{"date-parts":[[2010,12,3]],"date-time":"2010-12-03T04:23:07Z","timestamp":1291350187000},"page":"265-280","source":"Crossref","is-referenced-by-count":34,"title":["Watermarking of chest CT scan medical images for content authentication"],"prefix":"10.1080","volume":"88","author":[{"given":"Nisar Ahmed","family":"Memon","sequence":"first","affiliation":[{"name":"a   Faculty of Computer Science and Engineering , Ghulam Ishaq Khan (GIK) Institute of Engineering Sciences and Technology , Topi, 23460, Swabi,  Pakistan"}]},{"given":"S. A.M.","family":"Gilani","sequence":"additional","affiliation":[{"name":"b   Department of Computer Science , National University of Computer and Emerging Sciences , Lahore,  Pakistan"}]}],"member":"301","published-online":{"date-parts":[[2010,12,2]]},"reference":[{"key":"CIT0001","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1016\/S0010-4825(02)00083-5","volume":"33","author":"Achariya U. R.","year":"2003","journal-title":"J. Comput. Biol. Med."},{"key":"CIT0002","volume-title":"Cryptographic Hash Functions: A Survey","author":"Bakhtiari S."},{"key":"CIT0003","first-page":"100","volume":"1","author":"Boucherkha S.","year":"2005","journal-title":"Proc. World Acad. Sci. Eng. Technol."},{"key":"CIT0004","first-page":"7","volume-title":"IEEE 2008 Congress on Image and Signal Processing","author":"Chang-Ri P."},{"key":"CIT0005","first-page":"4691","volume-title":"Proceedings of IEEE-EMBC Conference","author":"Coatrieux G."},{"key":"CIT0006","volume-title":"29th IEEE International Conference of EMBS, Cite Internationale","author":"Coatrieux G."},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"CIT0008","volume-title":"Digital Image Watermarking","author":"Cox I. J.","year":"2004"},{"key":"CIT0009","first-page":"919","volume-title":"Canadian Conference on Electrical and Computer Engineering","volume":"2","author":"Deepakumara J."},{"key":"CIT0010","first-page":"1","volume-title":"Proceedings of 8th IEEE International Conference on Bio Informatics and Bio Engineering (BIBE2008)","author":"Fotopoulos V."},{"key":"CIT0011","volume-title":"IEEE 2005 Asia-Pacific Conference on Communications","author":"Lee H. K."},{"key":"CIT0012","volume-title":"Proceedings of Multimedia and Security Workshop at ACM Multimedia \u201998","author":"Lin C.-Y."},{"key":"CIT0013","volume-title":"IEEE Conference","author":"Memon N. A."},{"key":"CIT0014","volume-title":"Proceedings of 2006 Enformatika, XIV International Conference Prague","author":"Memon N. A."},{"key":"CIT0015","first-page":"292","volume-title":"Proc. of the World Academy of Science, Engineering and Technology","author":"Navas K. A."},{"key":"CIT0016","volume-title":"International Conference on Signal Processing and Communication (SPCOM)","author":"Nayak J."},{"key":"CIT0017","doi-asserted-by":"crossref","DOI":"10.17487\/rfc1321","volume-title":"The MD5 Message Digest Algorithm","author":"Rivest R.","year":"1992"},{"key":"CIT0018","volume-title":"IEEE 17th International Conference on Electronics, Communications and Computers (CONIELECOMP)","author":"Rodriguez C. R."},{"key":"CIT0019","first-page":"227","volume-title":"Proceedings of ICIP-96","volume":"3","author":"Schneider M."},{"key":"CIT0020","first-page":"528","volume-title":"Proc. Int. Conf on Signal Processing, Communication and Networking IEEE-ICSCN-2007","author":"Smitha B."},{"issue":"4","key":"CIT0021","first-page":"18","volume":"20","author":"Walton S.","year":"1995","journal-title":"Dr Dobbs J."},{"key":"CIT0022","first-page":"425","volume-title":"Proceedings of ICIP\u201998","author":"Wong P."},{"issue":"1","key":"CIT0023","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/s10278-007-9043-6","volume":"22","author":"Xiaota G.","year":"2009","journal-title":"J. Digit. Imaging"},{"key":"CIT0024","first-page":"75","volume-title":"Proceedings of 2005 Australian Workshop on grid computing and e-research","volume":"44","author":"Xiaoyun W."},{"key":"CIT0025","first-page":"17","volume-title":"Proceedings of the 25th Annual International Conference of the IEEE EMBS Cancun","author":"Xuanwen L."},{"issue":"8","key":"CIT0026","doi-asserted-by":"crossref","first-page":"784","DOI":"10.1109\/42.938246","volume":"20","author":"Zhou X. Q.","year":"2001","journal-title":"IEEE Trans. Med. Imag."}],"container-title":["International Journal of Computer Mathematics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207161003596690","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,29]],"date-time":"2018-06-29T10:48:59Z","timestamp":1530269339000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00207161003596690"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,2]]},"references-count":26,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2010,11,26]]},"published-print":{"date-parts":[[2011,1]]}},"alternative-id":["10.1080\/00207161003596690"],"URL":"https:\/\/doi.org\/10.1080\/00207161003596690","relation":{},"ISSN":["0020-7160","1029-0265"],"issn-type":[{"value":"0020-7160","type":"print"},{"value":"1029-0265","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,12,2]]}}}