{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:28:17Z","timestamp":1772555297610,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/icacci.2017.8125936","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T22:26:11Z","timestamp":1512426371000},"page":"777-782","source":"Crossref","is-referenced-by-count":6,"title":["A robust reversible watermarking technique based on prediction error expansion using ECC"],"prefix":"10.1109","author":[{"given":"Jinal H.","family":"Mehta","sequence":"first","affiliation":[]},{"given":"Vishakha","family":"Kelkar","sequence":"additional","affiliation":[]},{"given":"Kushal","family":"Tuckley","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Reversible data hiding","author":"shi","year":"2004","journal-title":"International Workshop on Digital Watermarking"},{"key":"ref11","article-title":"A review of fragile image watermarks","author":"lin","year":"1999","journal-title":"Proceedings of the Multimedia and Security Workshop (ACM Multimedia'99) Multimedia Contents"},{"key":"ref12","article-title":"Architectures for arithmetic coding in image compression","author":"osorio","year":"2000","journal-title":"Signal Processing Conference 2000 10th European"},{"key":"ref13","article-title":"Teledermatology based medical images with A WGN Channel in Wireless Telemedicine System","author":"serener","year":"0","journal-title":"Proceedings of the 1st WSEAS Inter-national Conference on Manufacturing Engineering Quality and Production Systems"},{"key":"ref14","first-page":"199","article-title":"Reversible digital image watermarking scheme using bit replacement and majority algorithm technique","volume":"4 3","author":"koushik","year":"2012","journal-title":"Journal of In-telligent Learning Systems and Applications"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISWPC.2007.342654"},{"key":"ref16","article-title":"Error detection and correction: An introduction","volume":"2 11","author":"vikas","year":"2012","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"ref4","article-title":"Alternate embedding method for difference expansion reversible watermarking","author":"tudor","year":"2015","journal-title":"Signals Circuits and Systems (ISSCS) 2015 International Sym-posium on IEEE"},{"key":"ref3","first-page":"229","article-title":"Sankur B: Strict integrity control of biomedical images","volume":"4314","author":"coatrieux","year":"2001","journal-title":"Proc SPIE Security Watermarking Multimedia Contents III SPIE 2001"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1109\/I2CT.2017.8226231","article-title":"Comparison of Reversible watermarking using Prediction error expansion and Prediction error expansion considering Region of interest for Medical images","author":"mehta","year":"2017","journal-title":"2017 2nd International Conference for Convergence in Technology (I2CT) I2CT"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2004.1421361"},{"key":"ref8","article-title":"High capacity, reversible data hiding in medical images","author":"mehdi","year":"2009","journal-title":"Image Processing (ICIP) 2009 16th IEEE International Conference"},{"key":"ref7","first-page":"617","article-title":"A comparative study of various types of image noise and efficient noise removal techniques","volume":"3 10","author":"rohit","year":"2013","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1016\/j.ins.2014.03.118","article-title":"A recent survey of reversible watermarking techniques","volume":"279","author":"asifullah","year":"2014","journal-title":"Information Sciences"},{"key":"ref1","first-page":"737","article-title":"Secured telemedicine using region-based watermarking with tamper localization","volume":"27 6","author":"al-raj","year":"2014","journal-title":"Journal of Digital Imaging"},{"key":"ref9","article-title":"A review of image watermarking applications in healthcare","author":"gouenou","year":"2006","journal-title":"Engineering in Medicine and Biology Society 2006 EMBS'06 28th Annual International Conference of the IEEE"}],"event":{"name":"2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","location":"Udupi","start":{"date-parts":[[2017,9,13]]},"end":{"date-parts":[[2017,9,16]]}},"container-title":["2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8119306\/8125802\/08125936.pdf?arnumber=8125936","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T11:26:41Z","timestamp":1570447601000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8125936\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icacci.2017.8125936","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}