{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:25:00Z","timestamp":1730237100290,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10,28]]},"DOI":"10.1109\/iccta43079.2017.9497148","type":"proceedings-article","created":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T21:22:47Z","timestamp":1627680167000},"page":"27-31","source":"Crossref","is-referenced-by-count":0,"title":["Irregular ROI\u2013Based Tamper Detection and Recovery of Medical Images using Data Hiding"],"prefix":"10.1109","author":[{"given":"Shimaa S.","family":"Younes","sequence":"first","affiliation":[]},{"given":"Taha M.","family":"Mohamed","sequence":"additional","affiliation":[]},{"given":"Rowyda A.","family":"Sadek","sequence":"additional","affiliation":[]},{"given":"Khaled M.","family":"Elsayed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Block Based Medical Image Watermarking Technique for Tamper Detection and Recovery","volume":"11","author":"eswaraiah","year":"2014","journal-title":"International Journal of Computer Science Issues(IJCSI)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/984646"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/489348"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2014ICP0001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.05.008"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1166\/jnn.2013.6872"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2006.260767"},{"journal-title":"Medical Images","year":"2017","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/42.310885"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4049-z"},{"key":"ref3","first-page":"4120","article-title":"Digital Image Tampering &#x2013; A Threat To Security Management","volume":"2","author":"sharma","year":"2013","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"ref6","first-page":"10","article-title":"Digital Image Steganography Survey and Analysis of Current Methods","volume":"6","author":"jindal","year":"2016","journal-title":"International Journal of Computer Science and Information Technology & Security (IJCSITS)"},{"key":"ref5","first-page":"1103","article-title":"Region Based Data Hiding in Medical Images","volume":"8","author":"mary shanthi rani","year":"2017","journal-title":"International Journal of Advanced Research in Computer Science(IJARCS)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3923\/jai.2017.1.21"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/s40064-015-1534-1"},{"key":"ref2","article-title":"Medical Image Watermarking using 2D-DWT with Enhanced security and capacity","author":"sharifara","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.09.032"},{"key":"ref9","first-page":"245","article-title":"A Novel Fragile Medical Image Watermarking Technique for Tamper Detection and Recovery Using Variance","volume":"2","author":"eswaraiah","year":"2014","journal-title":"Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA)"}],"event":{"name":"2017 27th International Conference on Computer Theory and Applications (ICCTA)","start":{"date-parts":[[2017,10,28]]},"location":"Alexandria, Egypt","end":{"date-parts":[[2017,10,30]]}},"container-title":["2017 27th International Conference on Computer Theory and Applications (ICCTA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9497128\/9497137\/09497148.pdf?arnumber=9497148","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T21:15:16Z","timestamp":1635282916000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9497148\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,28]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iccta43079.2017.9497148","relation":{},"subject":[],"published":{"date-parts":[[2017,10,28]]}}}