{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T18:28:42Z","timestamp":1773080922414,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/iembs.2011.6091988","type":"proceedings-article","created":{"date-parts":[[2011,12,6]],"date-time":"2011-12-06T20:55:55Z","timestamp":1323204955000},"page":"8062-8065","source":"Crossref","is-referenced-by-count":6,"title":["Medical image integrity control and forensics based on watermarking &amp;#x2014; Approximating local modifications and identifying global image alterations"],"prefix":"10.1109","author":[{"given":"H.","family":"Huang","sequence":"first","affiliation":[]},{"given":"G.","family":"Coatrieux","sequence":"additional","affiliation":[]},{"given":"H. Z.","family":"Shu","sequence":"additional","affiliation":[]},{"given":"L. M.","family":"Luo","sequence":"additional","affiliation":[]},{"given":"C.","family":"Roux","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"crossref","DOI":"10.1007\/b95439","author":"wang","year":"2005","journal-title":"Support Vector Machines Theory and Applications"},{"key":"14","first-page":"255","article-title":"Pairwise classification and support vector machines","author":"kressel","year":"1999","journal-title":"Advances in Kernel Methods"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1962.1057692"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1142\/9789812816092"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2008.4649178"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2003.1279900"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-008-9103-6"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1117\/1.2401138"},{"key":"7","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1117\/12.435403","article-title":"Strict integrity control of biomedical images","volume":"4314","author":"coatrieux","year":"2001","journal-title":"Proceedings of SPIE"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931079"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-008-9120-5"},{"key":"4","author":"schneier","year":"1996","journal-title":"Applied Cryptography Protocols Algorithms and Source Code in C"},{"key":"9","first-page":"249","article-title":"Reversible tamper localization and recovery watermarking scheme with secure hash","volume":"49","author":"liew","year":"2011","journal-title":"European Journal of Scientific Research"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/HEALTH.2010.5556561"}],"event":{"name":"2011 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society","location":"Boston, MA","start":{"date-parts":[[2011,8,30]]},"end":{"date-parts":[[2011,9,3]]}},"container-title":["2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6067544\/6089866\/06091988.pdf?arnumber=6091988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T12:25:04Z","timestamp":1561033504000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6091988\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iembs.2011.6091988","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}