{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:54:48Z","timestamp":1729648488744,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/iembs.2011.6092021","type":"proceedings-article","created":{"date-parts":[[2011,12,6]],"date-time":"2011-12-06T15:55:55Z","timestamp":1323186955000},"page":"8195-8198","source":"Crossref","is-referenced-by-count":14,"title":["Lossless watermarking of categorical attributes for verifying medical data base integrity"],"prefix":"10.1109","author":[{"given":"G.","family":"Coatrieux","sequence":"first","affiliation":[]},{"given":"E.","family":"Chazard","sequence":"additional","affiliation":[]},{"given":"R.","family":"Beuscart","sequence":"additional","affiliation":[]},{"given":"C.","family":"Roux","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.111"},{"key":"2","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.cmpb.2004.02.009","article-title":"Simultaneous storage of patient information with medical images in the frequency domain","volume":"76","author":"rajendra","year":"2004","journal-title":"Computer Methods and Programs in Biomedicine"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815962"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ITAB.2000.892396"},{"key":"7","first-page":"24","article-title":"Reversible and blind database watermarking using difference expansion","author":"gupta","year":"2008","journal-title":"Proc of Int Conf on E-Forensics"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2005.06.003"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2004.1320029"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"9","first-page":"78","article-title":"Publicly verifiable ownership protection for relational databases","author":"li","year":"2006","journal-title":"Proc ACM Symp Information Computer Communications Security"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ISDPE.2010.16"},{"key":"11","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1117\/12.435400","article-title":"Invertible authentication","author":"fridrich","year":"2001","journal-title":"Proc SPIE Security and Watermarking of Multimedia Contents"},{"key":"12","first-page":"912","article-title":"Reversible data hiding","volume":"2","author":"ni","year":"2003","journal-title":"Proc IEEE Int Symp Circuits and Systems"}],"event":{"name":"2011 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society","start":{"date-parts":[[2011,8,30]]},"location":"Boston, MA","end":{"date-parts":[[2011,9,3]]}},"container-title":["2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6067544\/6089866\/06092021.pdf?arnumber=6092021","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T06:54:06Z","timestamp":1497941646000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6092021\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iembs.2011.6092021","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}