{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,7]],"date-time":"2025-08-07T20:45:02Z","timestamp":1754599502007,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/iembs.2011.6091109","type":"proceedings-article","created":{"date-parts":[[2011,12,6]],"date-time":"2011-12-06T15:55:55Z","timestamp":1323186955000},"page":"4473-4476","source":"Crossref","is-referenced-by-count":2,"title":["Blind forensics in medical imaging based on Tchebichef image moments"],"prefix":"10.1109","author":[{"given":"H.","family":"Huang","sequence":"first","affiliation":[]},{"given":"G.","family":"Coatrieux","sequence":"additional","affiliation":[]},{"given":"H. Z.","family":"Shu","sequence":"additional","affiliation":[]},{"given":"L. M.","family":"Luo","sequence":"additional","affiliation":[]},{"given":"C.","family":"Roux","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1962.1057692"},{"key":"14","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/T-C.1974.223784","article-title":"Discrete cosine transform","volume":"23","author":"ahmed","year":"1974","journal-title":"IEEE Trans Computers"},{"key":"11","first-page":"14","article-title":"Statistical modeling and steganalysis of DFT-based image steganography","volume":"6072","author":"wang","year":"2006","journal-title":"Proc SPIE"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.1996.488319"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2004.1421647"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-008-9120-5"},{"key":"1","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1117\/12.435403","article-title":"Strict integrity control of biomedical images","volume":"3","author":"coatrieux","year":"2001","journal-title":"Proc SPIE on SWMC"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2005.138"},{"key":"7","first-page":"270","article-title":"Transform coding using discrete tchebichef polynomials","author":"mukundan","year":"2006","journal-title":"Proc Int Conf IASTED"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2009.185"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1117\/1.2401138"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2003.10093"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1117\/12.476813","article-title":"Steganalysis of additive noise modelable information hiding","volume":"5022","author":"harmsen","year":"2003","journal-title":"Proc SPIE Electronic Imaging"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1007\/b95439","author":"wang","year":"2005","journal-title":"Support Vector Machines Theory and Applications"}],"event":{"name":"2011 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society","start":{"date-parts":[[2011,8,30]]},"location":"Boston, MA","end":{"date-parts":[[2011,9,3]]}},"container-title":["2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6067544\/6089866\/06091109.pdf?arnumber=6091109","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T08:21:31Z","timestamp":1561018891000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6091109\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iembs.2011.6091109","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}