{"id":"https://openalex.org/W3192571048","doi":"https://doi.org/10.1109/iccta43079.2017.9497148","title":"Irregular ROI\u2013Based Tamper Detection and Recovery of Medical Images using Data Hiding","display_name":"Irregular ROI\u2013Based Tamper Detection and Recovery of Medical Images using Data Hiding","publication_year":2017,"publication_date":"2017-10-28","ids":{"openalex":"https://openalex.org/W3192571048","doi":"https://doi.org/10.1109/iccta43079.2017.9497148","mag":"3192571048"},"language":"en","primary_location":{"id":"doi:10.1109/iccta43079.2017.9497148","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccta43079.2017.9497148","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 27th International Conference on Computer Theory and Applications (ICCTA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069721729","display_name":"Shimaa S. Younes","orcid":null},"institutions":[{"id":"https://openalex.org/I84058292","display_name":"Helwan University","ror":"https://ror.org/00h55v928","country_code":"EG","type":"education","lineage":["https://openalex.org/I84058292"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Shimaa S. Younes","raw_affiliation_strings":["Faculty of Computers & Information, Helwan University, Egypt"],"affiliations":[{"raw_affiliation_string":"Faculty of Computers & Information, Helwan University, Egypt","institution_ids":["https://openalex.org/I84058292"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079846740","display_name":"Taha M. Mohamed","orcid":"https://orcid.org/0000-0002-2752-9663"},"institutions":[{"id":"https://openalex.org/I84058292","display_name":"Helwan University","ror":"https://ror.org/00h55v928","country_code":"EG","type":"education","lineage":["https://openalex.org/I84058292"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Taha M. Mohamed","raw_affiliation_strings":["Faculty of Computers & Information, Helwan University, Egypt"],"affiliations":[{"raw_affiliation_string":"Faculty of Computers & Information, Helwan University, Egypt","institution_ids":["https://openalex.org/I84058292"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032664507","display_name":"Rowyda A. Sadek","orcid":null},"institutions":[{"id":"https://openalex.org/I84058292","display_name":"Helwan University","ror":"https://ror.org/00h55v928","country_code":"EG","type":"education","lineage":["https://openalex.org/I84058292"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Rowyda A. Sadek","raw_affiliation_strings":["Faculty of Computers & Information, Helwan University, Egypt"],"affiliations":[{"raw_affiliation_string":"Faculty of Computers & Information, Helwan University, Egypt","institution_ids":["https://openalex.org/I84058292"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028368881","display_name":"Khaled Elsayed","orcid":"https://orcid.org/0000-0002-3942-8042"},"institutions":[{"id":"https://openalex.org/I145487455","display_name":"Cairo University","ror":"https://ror.org/03q21mh05","country_code":"EG","type":"education","lineage":["https://openalex.org/I145487455"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Khaled M. Elsayed","raw_affiliation_strings":["Faculty of Computers & Information, Cairo University, Egypt"],"affiliations":[{"raw_affiliation_string":"Faculty of Computers & Information, Cairo University, Egypt","institution_ids":["https://openalex.org/I145487455"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5069721729"],"corresponding_institution_ids":["https://openalex.org/I84058292"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.31224723,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"11","issue":null,"first_page":"27","last_page":"31"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.788063108921051},{"id":"https://openalex.org/keywords/region-of-interest","display_name":"Region of interest","score":0.7734923362731934},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.7527703046798706},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7282043099403381},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6865293383598328},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.5222697854042053},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5172742009162903},{"id":"https://openalex.org/keywords/image-quality","display_name":"Image quality","score":0.5001664161682129},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.4979062080383301},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.4885750710964203},{"id":"https://openalex.org/keywords/peak-signal-to-noise-ratio","display_name":"Peak signal-to-noise ratio","score":0.474148690700531},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.4343957006931305}],"concepts":[{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.788063108921051},{"id":"https://openalex.org/C19609008","wikidata":"https://www.wikidata.org/wiki/Q2138203","display_name":"Region of interest","level":2,"score":0.7734923362731934},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.7527703046798706},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7282043099403381},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6865293383598328},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.5222697854042053},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5172742009162903},{"id":"https://openalex.org/C55020928","wikidata":"https://www.wikidata.org/wiki/Q3813865","display_name":"Image quality","level":3,"score":0.5001664161682129},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.4979062080383301},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.4885750710964203},{"id":"https://openalex.org/C154579607","wikidata":"https://www.wikidata.org/wiki/Q3373850","display_name":"Peak signal-to-noise ratio","level":3,"score":0.474148690700531},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.4343957006931305},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccta43079.2017.9497148","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccta43079.2017.9497148","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 27th International Conference on Computer Theory and Applications (ICCTA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1509355250","https://openalex.org/W1776334297","https://openalex.org/W2016529389","https://openalex.org/W2028197392","https://openalex.org/W2048847385","https://openalex.org/W2069197448","https://openalex.org/W2083836657","https://openalex.org/W2099778990","https://openalex.org/W2192130050","https://openalex.org/W2207230803","https://openalex.org/W2322191343","https://openalex.org/W2407786055","https://openalex.org/W2534300561","https://openalex.org/W2548698097","https://openalex.org/W2587707025","https://openalex.org/W2597428219","https://openalex.org/W3045033941","https://openalex.org/W6662422845","https://openalex.org/W6735078813"],"related_works":["https://openalex.org/W2361629745","https://openalex.org/W2107922825","https://openalex.org/W3094285444","https://openalex.org/W1568204688","https://openalex.org/W2381262728","https://openalex.org/W2111592878","https://openalex.org/W1535080110","https://openalex.org/W2183753013","https://openalex.org/W2405106204","https://openalex.org/W2133102185"],"abstract_inverted_index":{"Protecting":[0],"Medical":[1],"image":[2,26,86,96,101,159],"against":[3],"tampering":[4],"has":[5],"highly":[6,47],"importance":[7],"in":[8,76,83,94],"the":[9,18,25,38,63,84,95,100,104,107,112,122,130,136,141,149,157,167,174,177],"coming":[10],"digital":[11],"hospitals":[12],"era.":[13],"Embedding":[14],"additional":[15],"data":[16,40,64],"inside":[17],"medical":[19,85],"images":[20],"should":[21],"not":[22,31,180],"perceptually":[23],"affect":[24],"quality.":[27,102],"The":[28,67,119,144],"ability":[29],"of":[30,41,43,80,111,121,156,176],"only":[32],"localizing":[33],"tampers,":[34],"but":[35],"also":[36],"recovering":[37],"real":[39],"region":[42,79,114],"interest":[44,81],"(ROI),":[45],"is":[46,163,179,186],"significant":[48],"for":[49],"diagnosis.":[50],"In":[51],"this":[52],"paper,":[53],"we":[54],"propose":[55],"a":[56],"novel":[57],"ROI":[58,123,178],"reconstruction":[59],"algorithm":[60,69],"based":[61],"on":[62,166],"hiding":[65],"technique.":[66],"proposed":[68],"can":[70],"efficiently":[71],"detect":[72],"and":[73,117],"recover":[74],"distortions":[75],"an":[77],"irregular":[78],"(IROI)":[82],"with":[87],"its":[88],"vertices.":[89],"IROI":[90,113],"pixels":[91,110,127],"are":[92,115],"embedded":[93],"itself":[97],"while":[98],"preserving":[99],"At":[103],"receiver":[105],"side,":[106],"possibly":[108],"corrupted":[109],"detected":[116],"recovered.":[118],"irregularity":[120],"saves":[124],"embedding":[125],"unimportant":[126],"compared":[128,169],"to":[129,152,170,182,189],"other":[131,171],"developed":[132],"algorithms":[133],"that":[134,162],"use":[135],"rectangular":[137,183],"ROI.":[138],"This":[139],"increases":[140],"payload":[142],"capacity.":[143],"experimental":[145],"results":[146],"show":[147],"that,":[148],"peak":[150],"signal":[151],"noise":[153],"ratio":[154],"(PSNR)":[155],"marked":[158],"exceeds":[160],"50db,":[161],"3%":[164],"increase":[165],"average":[168],"methods.":[172],"Moreover,":[173],"shape":[175],"limited":[181],"shapes":[184],"which":[185],"more":[187],"comfortable":[188],"physicians.":[190]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
