{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T13:56:57Z","timestamp":1770559017679,"version":"3.49.0"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2013,11,1]],"date-time":"2013-11-01T00:00:00Z","timestamp":1383264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2013,11,1]],"date-time":"2013-11-01T00:00:00Z","timestamp":1383264000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2013,11,1]],"date-time":"2013-11-01T00:00:00Z","timestamp":1383264000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Biomed. Health Inform."],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/jbhi.2013.2263533","type":"journal-article","created":{"date-parts":[[2013,5,30]],"date-time":"2013-05-30T18:07:26Z","timestamp":1369937246000},"page":"1057-1067","source":"Crossref","is-referenced-by-count":64,"title":["A Watermarking-Based Medical Image Integrity Control System and an Image Moment Signature for Tampering Characterization"],"prefix":"10.1109","volume":"17","author":[{"given":"Gouenou","family":"Coatrieux","sequence":"first","affiliation":[{"name":"Institut Telecom, Telecom Bretagne, Unite INSERM 1101 Latim, Technopole Brest-Iroise, Brest Cedex, France"}]},{"given":"Hui","family":"Huang","sequence":"additional","affiliation":[{"name":"Institut Mines-Telecom, Telecom Bretagne, Brest Cedex, France"}]},{"given":"Huazhong","family":"Shu","sequence":"additional","affiliation":[{"name":"Laboratory of Image Science and Technology, Southeast University, Nanjing, China"}]},{"given":"Limin","family":"Luo","sequence":"additional","affiliation":[{"name":"Laboratory of Image Science and Technology, Southeast University, Nanjing, China"}]},{"given":"Christian","family":"Roux","sequence":"additional","affiliation":[{"name":"Institut Telecom, Telecom Bretagne, Unite INSERM 1101 Latim, Technopole Brest-Iroise, Brest Cedex, France"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1142\/9789812816092"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/1049-9652(92)90027-U"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2007.4353629"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/HEALTH.2010.5556561"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2006.875655"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2012.2207435"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1962.1057692"},{"key":"ref36","author":"leon-garcia","year":"1994","journal-title":"Probability and Random Processes for Electrical Engineering"},{"key":"ref35","author":"lin","year":"0","journal-title":"Error Control Coding Fundamentals and Applications"},{"key":"ref34","article-title":"Tatouage d?images m\ufffddicales : Perception d?une marque","author":"coatrieux","year":"2003","journal-title":"Proc Int Conf Sci Electron Technol Inf Telecommun"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.931079"},{"key":"ref40","first-page":"255","author":"kressel","year":"1999","journal-title":"Advances in Kernel Methods"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CISP.2008.374"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.879829"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1117\/12.435403","article-title":"Strict integrity control of biomedical images","volume":"4314","author":"coatrieux","year":"2001","journal-title":"Proc SPIE Security Watermarking Multimedia Contents III"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0923-5965(00)00010-2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2006.11.002"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPIT.2007.4458073"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2003.1279900"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2008.2007199"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994129"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/42.310885"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2003.10093"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.acra.2005.11.041"},{"key":"ref27","first-page":"2645","article-title":"A classifier design for detecting image manipulations","volume":"4","author":"avcibas","year":"2004","journal-title":"Proc IEEE Int Conf Imag Process"},{"key":"ref6","year":"0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1118\/1.598783"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1117\/1.2401138"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S1363-4127(97)81327-1"},{"key":"ref7","author":"schneier","year":"1996","journal-title":"Applied Cryptography Protocols Algorithms and Source Code in C"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-008-9103-6"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-008-9120-5"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ITAB.2000.892396"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.833105"},{"key":"ref20","first-page":"404","article-title":"Digital watermarking of medical image using ROI information","author":"lee","year":"2005","journal-title":"Proc IEEE Int Workshop Healthcom"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2010.2089383"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2007.50"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.4153\/CMB-1992-058-1"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-007-9012-0"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC.2007.544"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1007\/978-3-642-04431-1_10","article-title":"Self-recovery fragile watermarking using block-neighborhood tampering characterization","author":"he","year":"2009","journal-title":"Proc Inf Hiding"},{"key":"ref41","doi-asserted-by":"crossref","DOI":"10.1007\/b95439","author":"wang","year":"2005","journal-title":"Support Vector Machines Theory and Applications"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2009.5383118"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/78.875477"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2009.2028251"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/11922841_15","article-title":"Detection of image splicing based on Hilbert-Huang transform and moments of characteristic functions with wavelet decomposition","volume":"4283","author":"fu","year":"2006","journal-title":"Digital Watermarking"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-009-9253-1"}],"container-title":["IEEE Journal of Biomedical and Health Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221020\/6661393\/06522126.pdf?arnumber=6522126","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T17:42:03Z","timestamp":1745343723000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6522126\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":47,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/jbhi.2013.2263533","relation":{},"ISSN":["2168-2194","2168-2208"],"issn-type":[{"value":"2168-2194","type":"print"},{"value":"2168-2208","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,11]]}}}