iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/S00034-023-02416-0
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T15:12:00Z","timestamp":1726413120719},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T00:00:00Z","timestamp":1686700800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T00:00:00Z","timestamp":1686700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Circuits Syst Signal Process"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s00034-023-02416-0","type":"journal-article","created":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T19:01:46Z","timestamp":1686769306000},"page":"6701-6725","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Reversible Medical Image Watermarking for ROI Tamper Detection and Recovery"],"prefix":"10.1007","volume":"42","author":[{"given":"Siddharth","family":"Bhalerao","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2991-0908","authenticated-orcid":false,"given":"Irshad Ahmad","family":"Ansari","sequence":"additional","affiliation":[]},{"given":"Anil","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,14]]},"reference":[{"key":"2416_CR1","doi-asserted-by":"publisher","first-page":"104863","DOI":"10.1016\/J.DIB.2019.104863","volume":"28","author":"W Al-Dhabyani","year":"2019","unstructured":"W. Al-Dhabyani, M. Gomaa, H. Khaled, A. Fahmy, Dataset of breast ultrasound images. Data Brief. 28, 104863 (2019). https:\/\/doi.org\/10.1016\/J.DIB.2019.104863","journal-title":"Data Brief."},{"key":"2416_CR2","doi-asserted-by":"publisher","DOI":"10.7937\/K9\/TCIA.2015.LO9QL9SX","author":"LP Armato III","year":"2015","unstructured":"L.P. Armato III., S.G. McLennan, L. Bidaut, M.F. McNitt-Gray, C.R. Meyer, A.P. Reeves, B. Zhao, D.R. Aberle, C.I. Henschke, E.A. Hoffman, E.A. Kazerooni, H. MacMahon, E.J.R. Van Beek, D. Yankelevitz, A.M. Biancardi, P.H. Bland, Br, Data From LIDC-IDRI. The Cancer Imaging Archive (2015). https:\/\/doi.org\/10.7937\/K9\/TCIA.2015.LO9QL9SX","journal-title":"The Cancer Imaging Archive"},{"key":"2416_CR3","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/s10278-015-9822-4","volume":"29","author":"G Badshah","year":"2016","unstructured":"G. Badshah, S.C. Liew, J.M. Zain, M. Ali, Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique. J Digit Imaging 29, 216\u2013225 (2016)","journal-title":"J Digit Imaging"},{"key":"2416_CR4","doi-asserted-by":"publisher","first-page":"4431","DOI":"10.1007\/s10586-018-1991-8","volume":"22","author":"K Balasamy","year":"2019","unstructured":"K. Balasamy, S. Ramakrishnan, An intelligent reversible watermarking system for authenticating medical images using Wavelet and PSO. Cluster Comput. 22, 4431\u20134442 (2019)","journal-title":"Cluster Comput."},{"key":"2416_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03299-2","author":"R Bhardwaj","year":"2021","unstructured":"R. Bhardwaj, Hiding patient information in medical images: an enhanced dual image separable reversible data hiding algorithm for E-healthcare. J. Ambient Intell. Humaniz Comput. (2021). https:\/\/doi.org\/10.1007\/s12652-021-03299-2","journal-title":"J. Ambient Intell. Humaniz Comput."},{"key":"2416_CR6","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0140381","volume":"10","author":"J Cheng","year":"2015","unstructured":"J. Cheng, W. Huang, S. Cao, R. Yang, W. Yang, Z. Yun, Z. Wang, Q. Feng, Enhanced performance of brain tumor classification via tumor region augmentation and partition. PLoS ONE 10, e0140381 (2015)","journal-title":"PLoS ONE"},{"key":"2416_CR7","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1007\/s10278-013-9622-7","volume":"26","author":"K Clark","year":"2013","unstructured":"K. Clark, B. Vendt, K. Smith, J. Freymann, J. Kirby, P. Koppel, S. Moore, S. Phillips, D. Maffitt, M. Pringle, L. Tarbox, F. Prior, The cancer imaging archive (TCIA): maintaining and operating a public information repository. J. Digit. Imaging 26, 1045\u20131057 (2013)","journal-title":"J. Digit. Imaging"},{"key":"2416_CR8","doi-asserted-by":"crossref","unstructured":"G. Coatrieux, L. Lecornu, B. Sankur, C. Roux, A review of image watermarking applications in healthcare, in Annual International Conference of the IEEE Engineering in Medicine and Biology\u2014Proceedings, pp. 4691\u20134694 (2006)","DOI":"10.1109\/IEMBS.2006.259305"},{"key":"2416_CR9","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1109\/TIP.2014.2307482","volume":"23","author":"IC Dragoi","year":"2014","unstructured":"I.C. Dragoi, D. Coltuc, Local-prediction-based difference expansion reversible watermarking. IEEE Trans. Image Process. 23, 1779\u20131790 (2014)","journal-title":"IEEE Trans. Image Process."},{"key":"2416_CR10","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/984646","author":"R Eswaraiah","year":"2014","unstructured":"R. Eswaraiah, E. Sreenivasa Reddy, Medical image watermarking technique for accurate tamper detection in ROI and exact recovery of ROI. Int J Telemed Appl (2014). https:\/\/doi.org\/10.1155\/2014\/984646","journal-title":"Int J Telemed Appl"},{"key":"2416_CR11","doi-asserted-by":"publisher","first-page":"166589","DOI":"10.1109\/ACCESS.2020.3022779","volume":"8","author":"O Evsutin","year":"2020","unstructured":"O. Evsutin, A. Melman, R. Meshcheryakov, Digital steganography and watermarking for digital images: a review of current research directions. IEEE Access. 8, 166589\u2013166611 (2020)","journal-title":"IEEE Access."},{"key":"2416_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107817","volume":"178","author":"G Gao","year":"2021","unstructured":"G. Gao, S. Tong, Z. Xia, B. Wu, L. Xu, Z. Zhao, Reversible data hiding with automatic contrast enhancement for medical images. Signal Process. 178, 107817 (2021)","journal-title":"Signal Process."},{"key":"2416_CR13","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.ins.2017.01.009","volume":"385\u2013386","author":"G Gao","year":"2017","unstructured":"G. Gao, X. Wan, S. Yao, Z. Cui, C. Zhou, X. Sun, Reversible data hiding with contrast enhancement and tamper localization for medical images. Inf. Sci. (N Y) 385\u2013386, 250\u2013265 (2017)","journal-title":"Inf. Sci. (N Y)"},{"key":"2416_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106933","volume":"89","author":"PVS Govind","year":"2021","unstructured":"P.V.S. Govind, M.V. Judy, A secure framework for remote diagnosis in health care: a high capacity reversible data hiding technique for medical images. Comput. Electr. Eng. 89, 106933 (2021)","journal-title":"Comput. Electr. Eng."},{"key":"2416_CR15","doi-asserted-by":"publisher","DOI":"10.1038\/S41467-020-17971-2","author":"SA Harmon","year":"2020","unstructured":"S.A. Harmon, T.H. Sanford, S. Xu, E.B. Turkbey, H. Roth, Z. Xu, D. Yang, A. Myronenko, V. Anderson, A. Amalou, M. Blain, M. Kassin, D. Long, N. Varble, S.M. Walker, U. Bagci, A.M. Ierardi, E. Stellato, G.G. Plensich, G. Franceschelli, C. Girlando, G. Irmici, D. Labella, D. Hammoud, A. Malayeri, E. Jones, R.M. Summers, P.L. Choyke, D. Xu, M. Flores, K. Tamura, H. Obinata, H. Mori, F. Patella, M. Cariati, G. Carrafiello, P. An, B.J. Wood, B. Turkbey, Artificial intelligence for the detection of COVID-19 pneumonia on chest CT using multinational datasets. Nat. Commun. (2020). https:\/\/doi.org\/10.1038\/S41467-020-17971-2","journal-title":"Nat. Commun."},{"key":"2416_CR16","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/9943402","author":"JH Horng","year":"2021","unstructured":"J.H. Horng, C.C. Chang, G.L. Li, W.K. Lee, S.O. Hwang, Blockchain-based reversible data hiding for securing medical images. J. Healthc. Eng. (2021). https:\/\/doi.org\/10.1155\/2021\/9943402","journal-title":"J. Healthc. Eng."},{"key":"2416_CR17","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1109\/TCSVT.2008.2009252","volume":"19","author":"Y Hu","year":"2009","unstructured":"Y. Hu, H.K. Lee, J. Li, DE-based reversible data hiding with improved overflow location map. IEEE Trans. Circuits Syst. Video Technol. 19, 250\u2013260 (2009)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2416_CR18","doi-asserted-by":"publisher","first-page":"25101","DOI":"10.1007\/s11042-022-11956-7","volume":"81","author":"M Magdy","year":"2022","unstructured":"M. Magdy, K.M. Hosny, N.I. Ghali, S. Ghoniemy, Security of medical images for telemedicine: a systematic review. Multimed. Tools Appl. 81, 25101\u201325145 (2022)","journal-title":"Multimed. Tools Appl."},{"key":"2416_CR19","doi-asserted-by":"publisher","first-page":"75448","DOI":"10.1109\/ACCESS.2020.2989175","volume":"8","author":"NA Memon","year":"2020","unstructured":"N.A. Memon, A. Alzahrani, Prediction-based reversible watermarking of CT scan images for content authentication and copyright protection. IEEE Access. 8, 75448\u201375462 (2020)","journal-title":"IEEE Access."},{"key":"2416_CR20","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TCSVT.2006.869964","volume":"16","author":"Z Ni","year":"2006","unstructured":"Z. Ni, Y.Q. Shi, N. Ansari, W. Su, Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16, 354\u2013361 (2006)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2416_CR21","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/s10278-012-9527-x","volume":"26","author":"H Nyeem","year":"2013","unstructured":"H. Nyeem, W. Boles, C. Boyd, A review of medical image watermarking requirements for teleradiology. J. Digit. Imaging 26, 326\u2013343 (2013)","journal-title":"J. Digit. Imaging"},{"key":"2416_CR22","unstructured":"V. M. Potdar, H. Song, C. Elizabeth, A survey of digital image watermarking techniques, in 2005 3rd IEEE International Conference on Industrial Informatics, INDIN pp. 709\u2013716 (2005)"},{"key":"2416_CR23","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3461382","author":"A Attaur-Rahman","year":"2018","unstructured":"A. Attaur-Rahman, K. Sultan, N. Aldhafferi, A. Alqahtani, M. Mahmud, Reversible and fragile watermarking for medical images. Math. Methods Med. Comput. (2018). https:\/\/doi.org\/10.1155\/2018\/3461382","journal-title":"Math. Methods Med. Comput."},{"key":"2416_CR24","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1038\/s41416-018-0185-8","volume":"119","author":"A Saha","year":"2018","unstructured":"A. Saha, M.R. Harowicz, L.J. Grimm, C.E. Kim, S.V. Ghate, R. Walsh, M.A. Mazurowski, A machine learning approach to radiogenomics of breast cancer: a study of 922 subjects and 529 dce-mri features. Br. J. Cancer 119, 508\u2013516 (2018)","journal-title":"Br. J. Cancer"},{"key":"2416_CR25","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1016\/j.ijleo.2017.07.060","volume":"145","author":"P Selvam","year":"2017","unstructured":"P. Selvam, S. Balachandran, S.P. Iyer, R. Jayabal, Hybrid transform based reversible watermarking technique for medical images in telemedicine applications. Optik (Stuttg) 145, 655\u2013671 (2017)","journal-title":"Optik (Stuttg)"},{"key":"2416_CR26","doi-asserted-by":"publisher","first-page":"24631","DOI":"10.1007\/s11042-021-10853-9","volume":"80","author":"H Shi","year":"2021","unstructured":"H. Shi, Y. Wang, Y. Li, Y. Ren, C. Guo, Region-based reversible medical image watermarking algorithm for privacy protection and integrity authentication. Multimedia Tools Appl. 80, 24631\u201324667 (2021)","journal-title":"Multimedia Tools Appl."},{"issue":"10","key":"2416_CR27","doi-asserted-by":"publisher","first-page":"14045","DOI":"10.1007\/s11042-022-12082-0","volume":"81","author":"R Sinhal","year":"2022","unstructured":"R. Sinhal, S. Sharma, I.A. Ansari, Multipurpose medical image watermarking for effective security solutions. Multimedia Tools Appl. 81(10), 14045\u201314063 (2022)","journal-title":"Multimedia Tools Appl."},{"key":"2416_CR28","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5709513","author":"GD Su","year":"2021","unstructured":"G.D. Su, C.C. Lin, C.C. Chang, Privacy-preserving reversible data hiding for medical images employing local rotation. J Healthc Eng. (2021). https:\/\/doi.org\/10.1155\/2021\/5709513","journal-title":"J Healthc Eng."},{"key":"2416_CR29","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1109\/TCSVT.2009.2017409","volume":"19","author":"WL Tai","year":"2009","unstructured":"W.L. Tai, C.M. Yeh, C.C. Chang, Reversible data hiding based on histogram modification of pixel differences. IEEE Trans. Circuits Syst. Video Technol. 19, 906\u2013910 (2009)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2416_CR30","doi-asserted-by":"publisher","unstructured":"J.B. Tatum, J.L., Kalen, J.D., Ileva, L.V., Riffle, L.A., Jacobs, P.M., Hollingshead, M.G., Doroshow, J.H, Clunie, D.A, Smith, K.E, Wagner, U., Freymann, Imaging characterization of a metastatic patient derived model of bladder cancer: BL0293F (PDMR-BL0293-F563) [Data Set]. The Cancer Imaging Archive (2019). https:\/\/doi.org\/10.7937\/tcia.2019.b6u7wmqw.","DOI":"10.7937\/tcia.2019.b6u7wmqw"},{"key":"2416_CR31","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s11042-015-3055-x","volume":"76","author":"R Thabit","year":"2017","unstructured":"R. Thabit, B.E. Khoo, Medical image authentication using SLT and IWT schemes. Multimed. Tools Appl. 76, 309\u2013332 (2017)","journal-title":"Multimed. Tools Appl."},{"key":"2416_CR32","unstructured":"D.M. Thodi, J.J. Rodr\u00edguez, Prediction-error based reversible watermarking, in Proceedings\u2014International Conference on Image Processing, ICIP. vol. 3, pp. 1549\u20131552 (2004)"},{"key":"2416_CR33","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"J. Tian, Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13, 890\u2013896 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"2416_CR34","doi-asserted-by":"publisher","first-page":"11","DOI":"10.3390\/computers10110152","volume":"10","author":"CY Yang","year":"2021","unstructured":"C.Y. Yang, J.L. Wu, Two-bit embedding histogram-prediction-error based reversible data hiding for medical images with smooth area. Computers 10, 11\u2013152 (2021). https:\/\/doi.org\/10.3390\/computers10110152","journal-title":"Computers"},{"key":"2416_CR35","doi-asserted-by":"crossref","unstructured":"Y. Zhang, Digital watermarking technology: a review, in 2009 International Conference on Future Computer and Communication, FCC 2009, pp. 250\u2013252 (2009)","DOI":"10.1109\/FCC.2009.76"}],"container-title":["Circuits, Systems, and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-023-02416-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00034-023-02416-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00034-023-02416-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T19:05:16Z","timestamp":1696532716000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00034-023-02416-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,14]]},"references-count":35,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["2416"],"URL":"http:\/\/dx.doi.org\/10.1007\/s00034-023-02416-0","relation":{},"ISSN":["0278-081X","1531-5878"],"issn-type":[{"type":"print","value":"0278-081X"},{"type":"electronic","value":"1531-5878"}],"subject":[],"published":{"date-parts":[[2023,6,14]]},"assertion":[{"value":"23 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 May 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}