{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T16:32:13Z","timestamp":1774974733445,"version":"3.50.1"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Ministry Subsidy for Research, Gda\u0144sk University of Technology"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3074254","type":"journal-article","created":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T04:39:28Z","timestamp":1618979968000},"page":"60503-60515","source":"Crossref","is-referenced-by-count":7,"title":["Reversible Data Hiding in Encrypted DICOM Images Using Cyclic Binary Golay (23, 12) Code"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3580-7448","authenticated-orcid":false,"given":"Mariusz","family":"Dzwonkowski","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3814-3640","authenticated-orcid":false,"given":"Roman","family":"Rykaczewski","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"2012","journal-title":"Philips CT Scanners and Workstations V2\/V3 Rev 7"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.2967\/jnumed.109.064592"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2017.09.020"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2799381"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2016.2585580"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2014.04.032"},{"key":"ref37","year":"2021","journal-title":"Products and Services"},{"key":"ref36","year":"2021","journal-title":"Technical Guide"},{"key":"ref35","year":"2021","journal-title":"Guide to the General Data Protection Regulation (GDPR)"},{"key":"ref34","year":"2021","journal-title":"Summary of the HIPAA Security Rule"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2012.07.025"},{"key":"ref40","first-page":"67","article-title":"Notes on digital coding","volume":"37","author":"golay","year":"1949","journal-title":"Proc IRE"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2015.01.002"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.07.043"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1810-8_42"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2022781"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43886-2_10"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015MUP0009"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/656251"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2248725"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2114651"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1734961"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","article-title":"Reversible data hiding","volume":"16","author":"ni","year":"2006","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2015.10.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2573308"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"2016","DOI":"10.1109\/TIFS.2015.2444354","article-title":"Efficient reversible data hiding based on multiple histograms modification","volume":"10","author":"li","year":"2015","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2176120"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2246179"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.828418"},{"key":"ref7","first-page":"19","article-title":"Reversible watermarking by difference expansion","author":"tian","year":"2002","journal-title":"Proceedings of the Workshop on Multimedia and Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/sym12010001"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2008.2007341"},{"key":"ref1","year":"2020","journal-title":"Digital Imaging and Communications in Medicine (DICOM) Part 15 Security and System Management Profiles"},{"key":"ref46","year":"2020","journal-title":"An Open-Source Windows Program for Cryptography and Cryptanalysis"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2015.06.009"},{"key":"ref45","author":"marsaglia","year":"1995","journal-title":"Diehard battery of tests of randomness"},{"key":"ref48","author":"armitage","year":"2008","journal-title":"Statistical Methods in Medical Research"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2598528"},{"key":"ref47","year":"0","journal-title":"Free stock photos"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2418611"},{"key":"ref42","author":"rorden","year":"2021","journal-title":"Introduction to the DICOM Format"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31960-5_30"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com:20080037"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2014.04.003"},{"key":"ref44","author":"barre","year":"2003","journal-title":"Medical Image Samples"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.08.021"},{"key":"ref43","author":"hewett","year":"1997","journal-title":"CAR &#x2019;97 Computer Assisted Radiology and Surgery 11th International Symposium and Exhibition"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2433194"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09408571.pdf?arnumber=9408571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:42Z","timestamp":1639770942000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9408571\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3074254","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}