{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:46:14Z","timestamp":1767339974822,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T00:00:00Z","timestamp":1669075200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T00:00:00Z","timestamp":1669075200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,22]]},"DOI":"10.1109\/acit57182.2022.9994105","type":"proceedings-article","created":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T18:38:43Z","timestamp":1672857523000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["A Blind Medical Image Watermarking using SWT and Arnold Transform"],"prefix":"10.1109","author":[{"given":"Imane","family":"Assini","sequence":"first","affiliation":[{"name":"Hassan II University of Casablanca,EEA&#x0026;TI laboratory Faculty of Sciences and Techniques (FSTM),Mohammedia,Morocco"}]},{"given":"Abdelmajid","family":"Badri","sequence":"additional","affiliation":[{"name":"Hassan II University of Casablanca,EEA&#x0026;TI laboratory Faculty of Sciences and Techniques (FSTM),Mohammedia,Morocco"}]},{"given":"Aicha","family":"Sahel","sequence":"additional","affiliation":[{"name":"Hassan II University of Casablanca,EEA&#x0026;TI laboratory Faculty of Sciences and Techniques (FSTM),Mohammedia,Morocco"}]},{"given":"Abdennaceur","family":"Baghdad","sequence":"additional","affiliation":[{"name":"Hassan II University of Casablanca,EEA&#x0026;TI laboratory Faculty of Sciences and Techniques (FSTM),Mohammedia,Morocco"}]}],"member":"263","reference":[{"key":"ref1","article-title":"A Watermarking of Medical Image: Method Based LSB","author":"Hajjaji","year":"2011","journal-title":"International Journal of Computer Science Issues"},{"issue":"12","key":"ref2","article-title":"Adaptation of Different Techniques on Digital Image Watermarking in Medical Domain: A review","volume":"5","author":"Assini","year":"2015","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11914-0_10"},{"issue":"9","key":"ref4","first-page":"19","article-title":"Reversible region of non-interest (roni) watermarking for authentication of dicom images","volume":"7","author":"Zain","year":"2007","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/1475-925X-3-17"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-009-9253-1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14738\/tmlai.54.3219"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ATSIP.2017.8075569"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90639-9_45"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.11.005"},{"issue":"9","key":"ref11","first-page":"19","article-title":"Reversible region of non-interest (roni) watermarking for authentication of dicom images","volume":"7","author":"Zain","year":"2007","journal-title":"IJCSNS International Journal of Computer Science and Network Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2012.2230"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IC3.2013.6612238"},{"issue":"3","key":"ref14","first-page":"676","article-title":"A Robust Blind Watermarking Scheme Based On Stationary Wavelet Transform","volume":"8","author":"Shokrollahi","year":"2017","journal-title":"J. Inf. Hiding Multim. Signal Process."},{"key":"ref15","first-page":"29","article-title":"Digital watermarking with the singular value decomposition","volume":"843","author":"Matthew","year":"2006","journal-title":"universit\u00e9 Math"},{"issue":"2","key":"ref16","article-title":"Performance Evaluation and Watermark Security Assessment of Digital Watermarking Techniques","volume":"27","author":"Naveed","year":"2015","journal-title":"Science International"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15887-3_6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-018-3246-7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02450-9"}],"event":{"name":"2022 International Arab Conference on Information Technology (ACIT)","start":{"date-parts":[[2022,11,22]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2022,11,24]]}},"container-title":["2022 International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9994070\/9994081\/09994105.pdf?arnumber=9994105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T11:04:18Z","timestamp":1709377458000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9994105\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,22]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/acit57182.2022.9994105","relation":{},"subject":[],"published":{"date-parts":[[2022,11,22]]}}}