{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T04:07:48Z","timestamp":1777435668873,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T00:00:00Z","timestamp":1559692800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"University of Melbourne"},{"name":"CSIRO Data61"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,5]]},"DOI":"10.1145\/3323873.3325020","type":"proceedings-article","created":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T12:10:58Z","timestamp":1560168658000},"page":"53-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Integrity Verification in Medical Image Retrieval Systems using Spread Spectrum Steganography"],"prefix":"10.1145","author":[{"given":"Peter","family":"Eze","sequence":"first","affiliation":[{"name":"University of Melbourne, Melbourne, Australia"}]},{"given":"Udaya","family":"Parampalli","sequence":"additional","affiliation":[{"name":"University of Melbourne, Melbourne, Australia"}]},{"given":"Robin","family":"Evans","sequence":"additional","affiliation":[{"name":"University of Melbourne, Melbourne, Australia"}]},{"given":"Dongxi","family":"Liu","sequence":"additional","affiliation":[{"name":"CSIRO, Data61, , Australia"}]}],"member":"320","published-online":{"date-parts":[[2019,6,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of ICCS","author":"Areepongsa S.","year":"2000","unstructured":"S. Areepongsa , N. Kaewkamnerd , Y.F Syed , and K.R Rao . 2000 . Information Hiding in Image Retrieval Systems . In Proceedings of ICCS 2000. 1--5. https: \/\/pdfs.semanticscholar.org\/cbe9\/8fe9e6e2697d8d844fc3e4b98b352e31f389.pdf S. Areepongsa, N. Kaewkamnerd, Y.F Syed, and K.R Rao. 2000. Information Hiding in Image Retrieval Systems. In Proceedings of ICCS 2000. 1--5. https: \/\/pdfs.semanticscholar.org\/cbe9\/8fe9e6e2697d8d844fc3e4b98b352e31f389.pdf"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Noel C. F. Codella David Gutman M. Emre Celebi Brian Helba Michael A. Marchetti Stephen W. Dusza Aadi Kalloo Konstantinos Liopyris Nabin Mishra Harald Kittler and Allan Halpern. 2017. Skin Lesion Analysis Toward Melanoma Detection: A Challenge at the 2017 International Symposium on Biomedical Imaging (ISBI). In International Skin Imaging Collaboration (ISIC). arXiv:1710.05006.  Noel C. F. Codella David Gutman M. Emre Celebi Brian Helba Michael A. Marchetti Stephen W. Dusza Aadi Kalloo Konstantinos Liopyris Nabin Mishra Harald Kittler and Allan Halpern. 2017. Skin Lesion Analysis Toward Melanoma Detection: A Challenge at the 2017 International Symposium on Biomedical Imaging (ISBI). In International Skin Imaging Collaboration (ISIC). arXiv:1710.05006.","DOI":"10.1109\/ISBI.2018.8363547"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2014.0986"},{"key":"e_1_3_2_1_4_1","first-page":"107","article-title":"Medical Image Watermark and Tamper Detection Using Constant Correlation Spread Spectrum Watermarking. International Journal of Computer, Electrical","volume":"12","author":"Eze P.","year":"2018","unstructured":"P. Eze , U. Parampalli , and R. Evans . 2018 . Medical Image Watermark and Tamper Detection Using Constant Correlation Spread Spectrum Watermarking. International Journal of Computer, Electrical , Automation, Control and Information Engineering 12 (2018), 107 -- 114 . P. Eze, U. Parampalli, and R. Evans. 2018. Medical Image Watermark and Tamper Detection Using Constant Correlation Spread Spectrum Watermarking. International Journal of Computer, Electrical, Automation, Control and Information Engineering 12 (2018), 107--114.","journal-title":"Automation, Control and Information Engineering"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.14.0113.0171"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1962.1057692"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"H. Huang G. Coatrieux H.Z Shu L.M Luo and C. Roux. 2011. Medical Image Integrity Control and Forensics Based on Watermarking Approximating Local Modifications and Identifying Global Image Alteration. In International Conference of IEEE EMBS. EMBS IEEE Boston Massachusetts.  H. Huang G. Coatrieux H.Z Shu L.M Luo and C. Roux. 2011. Medical Image Integrity Control and Forensics Based on Watermarking Approximating Local Modifications and Identifying Global Image Alteration. In International Conference of IEEE EMBS. EMBS IEEE Boston Massachusetts.","DOI":"10.1109\/IEMBS.2011.6091988"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Q. Huynh-Thu and M. Ghanbari (Eds.). 2008. Scope of validity of PSNR in image\/video quality assessment. Electronics letters 44 13 (2008) 800--801 pages.  Q. Huynh-Thu and M. Ghanbari (Eds.). 2008. Scope of validity of PSNR in image\/video quality assessment. Electronics letters 44 13 (2008) 800--801 pages.","DOI":"10.1049\/el:20080522"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-013-9619-2"},{"key":"e_1_3_2_1_11_1","volume-title":"Smart and Innovative Trends in Next Generation Computing Technologies. Communications in Computer and Information Science.","author":"Kumar M.","unstructured":"M. Kumar and K.M Singh . 2017. Content-based Medical Image Retrieval System (CBMIRS) to Diagnose Hepatobiliary Images . In Smart and Innovative Trends in Next Generation Computing Technologies. Communications in Computer and Information Science. Vol. 828 . Springer , Singapore , 663--676. M. Kumar and K.M Singh. 2017. Content-based Medical Image Retrieval System (CBMIRS) to Diagnose Hepatobiliary Images. In Smart and Innovative Trends in Next Generation Computing Technologies. Communications in Computer and Information Science. Vol. 828. Springer, Singapore, 663--676."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2009.831.837"},{"key":"e_1_3_2_1_13_1","unstructured":"V. Monga D. Vats and B. L. Evans. 2006. Image Hashing Toobox in Matlab. Retrieved Jan 2 2019 from http:\/\/users.ece.utexas.edu\/~bevans\/projects\/hashing\/ toolbox\/index.html  V. Monga D. Vats and B. L. Evans. 2006. Image Hashing Toobox in Matlab. Retrieved Jan 2 2019 from http:\/\/users.ece.utexas.edu\/~bevans\/projects\/hashing\/ toolbox\/index.html"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1179\/1743131X11Y.0000000039"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"P. Tschandl C. Rosendahl and H. Kittler. 2018. The HAM10000 dataset a large collection of multi-source dermatoscopic images of common pigmented skin lesions. Science Data 5 (2018).  P. Tschandl C. Rosendahl and H. Kittler. 2018. The HAM10000 dataset a large collection of multi-source dermatoscopic images of common pigmented skin lesions. Science Data 5 (2018).","DOI":"10.1038\/sdata.2018.161"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of IEEE Conference on Image Processing. 664--666","author":"Venkatesan R.","unstructured":"R. Venkatesan , S. M. Koon , M. H. Jakubowski , and P. Moulin . 2000. Robust image hashing . In Proceedings of IEEE Conference on Image Processing. 664--666 . R. Venkatesan, S. M. Koon, M. H. Jakubowski, and P. Moulin. 2000. Robust image hashing. In Proceedings of IEEE Conference on Image Processing. 664--666."},{"key":"e_1_3_2_1_17_1","first-page":"140","article-title":"Novel Authentication Scheme with Pseudorandom Sequences in the Frquency Domain of Images. In Proceedings of International workshop on signal Design and its Application in Communication (IWDS 17). IEEE, Sapporo Japan","volume":"7","author":"Vicky P.","year":"2017","unstructured":"P. Vicky and U. Parampalli . 2017 . Novel Authentication Scheme with Pseudorandom Sequences in the Frquency Domain of Images. In Proceedings of International workshop on signal Design and its Application in Communication (IWDS 17). IEEE, Sapporo Japan , Article 7 , 140 -- 144 pages. P. Vicky and U. Parampalli. 2017. Novel Authentication Scheme with Pseudorandom Sequences in the Frquency Domain of Images. In Proceedings of International workshop on signal Design and its Application in Communication (IWDS 17). IEEE, Sapporo Japan, Article 7, 140--144 pages.","journal-title":"Article"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"}],"event":{"name":"ICMR '19: International Conference on Multimedia Retrieval","location":"Ottawa ON Canada","acronym":"ICMR '19","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 2019 on International Conference on Multimedia Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323873.3325020","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3323873.3325020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:22Z","timestamp":1750208542000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323873.3325020"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,5]]},"references-count":17,"alternative-id":["10.1145\/3323873.3325020","10.1145\/3323873"],"URL":"https:\/\/doi.org\/10.1145\/3323873.3325020","relation":{},"subject":[],"published":{"date-parts":[[2019,6,5]]},"assertion":[{"value":"2019-06-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}