{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:14:31Z","timestamp":1761581671094,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/icecs.2017.8292084","type":"proceedings-article","created":{"date-parts":[[2018,2,22]],"date-time":"2018-02-22T21:14:16Z","timestamp":1519334056000},"page":"397-400","source":"Crossref","is-referenced-by-count":13,"title":["Medical images protection and authentication using hybrid DWT-DCT and SHA256-MD5 hash functions"],"prefix":"10.1109","author":[{"given":"Alavi","family":"Kunhu","sequence":"first","affiliation":[]},{"given":"Hussain","family":"Al-Ahmad","sequence":"additional","affiliation":[]},{"given":"Fatma","family":"Taher","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"185","article-title":"A Robust Digital Image Watermarking Scheme Using Hybrid DWT-DCT- SVD Technique","volume":"10","author":"murty","year":"2010","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/NCIS.2011.91"},{"key":"ref6","first-page":"313","article-title":"A DWT based image watermarking algorithm","author":"daren","year":"2001","journal-title":"IEEE International Conference on Multimedia and Expo (ICME)"},{"key":"ref5","article-title":"Hybrid DWT-DCT Video Watermarking Algorithm for Copyright Protection of Multimedia Colour Video","volume":"4","author":"kunhu","year":"2015","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref7","first-page":"1","article-title":"Robust Watermarking Technique based on DCT to Protect the Ownership of DubaiSat-1 Images against Attacks","volume":"12","author":"al-mansoori","year":"2012","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5120\/699-980"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.7763\/IJCEE.2012.V4.519"},{"key":"ref1","first-page":"59","article-title":"Multiple watermark method for privacy control and tamper detection in medical images","author":"woo","year":"2005","journal-title":"proceeding of APRS Workshop on Digital Image Computing (WDIC)"}],"event":{"name":"2017 24th IEEE International Conference on Electronics, Circuits and Systems (ICECS)","start":{"date-parts":[[2017,12,5]]},"location":"Batumi","end":{"date-parts":[[2017,12,8]]}},"container-title":["2017 24th IEEE International Conference on Electronics, Circuits and Systems (ICECS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8283844\/8291994\/08292084.pdf?arnumber=8292084","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,19]],"date-time":"2018-03-19T22:10:40Z","timestamp":1521497440000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8292084\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/icecs.2017.8292084","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}