{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T00:10:25Z","timestamp":1758759025229,"version":"3.44.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032054715","type":"print"},{"value":"9783032054722","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T00:00:00Z","timestamp":1758758400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T00:00:00Z","timestamp":1758758400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-05472-2_29","type":"book-chapter","created":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T09:26:14Z","timestamp":1758705974000},"page":"298-307","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Frequency-Calibrated Membership Inference Attacks on\u00a0Medical Image Diffusion Models"],"prefix":"10.1007","author":[{"given":"Xinkai","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Yuta","family":"Tokuoka","sequence":"additional","affiliation":[]},{"given":"Junichiro","family":"Iwasawa","sequence":"additional","affiliation":[]},{"given":"Keita","family":"Oda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,25]]},"reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Akbar, M.U., Wang, W., Eklund, A.: Beware of diffusion models for synthesizing medical images-a comparison with GANs in terms of memorizing brain MRI and chest X-ray images. Mach. Learn. Sci. Technol. 6(1), 015022 (2025)","DOI":"10.1088\/2632-2153\/ad9a3a"},{"key":"29_CR2","doi-asserted-by":"publisher","first-page":"98","DOI":"10.20517\/ch.2022.15","volume":"1","author":"SM Ayyoubzadeh","year":"2022","unstructured":"Ayyoubzadeh, S.M., Ayyoubzadeh, S.M., Esmaeili, M.: Clinical data sharing using generative adversarial networks. Conn Health 1, 98\u2013105 (2022)","journal-title":"Conn Health"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Carlini, N., Chien, S., Nasr, M., Song, S., Terzis, A., Tramer, F.: Membership inference attacks from first principles. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 1897\u20131914. IEEE (2022)","DOI":"10.1109\/SP46214.2022.9833649"},{"key":"29_CR4","unstructured":"Carlini, N., et al.: Extracting training data from diffusion models. In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 5253\u20135270 (2023)"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Chang, Q., et al.: Synthetic learning: learn from distributed asynchronized discriminator GAN without sharing medical image data. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 13856\u201313866 (2020)","DOI":"10.1109\/CVPR42600.2020.01387"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Daum, D., Osuala, R., Riess, A., Kaissis, G., Schnabel, J.A., Di\u00a0Folco, M.: On differentially private 3D medical image synthesis with controllable latent diffusion models. In: MICCAI Workshop on Deep Generative Models, pp. 139\u2013149. Springer (2024)","DOI":"10.1007\/978-3-031-72744-3_14"},{"key":"29_CR7","unstructured":"Duan, J., Kong, F., Wang, S., Shi, X., Xu, K.: Are diffusion models vulnerable to membership inference attacks? In: International Conference on Machine Learning, pp. 8717\u20138730. PMLR (2023)"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Dutt, R., Bohdal, O., Sanchez, P., Tsaftaris, S.A., Hospedales, T.: MemControl: mitigating memorization in diffusion models via automated parameter selection. In: 2025 IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV), pp. 4491\u20134501. IEEE (2025)","DOI":"10.1109\/WACV61041.2025.00441"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Fernandez, V., Sanchez, P., Pinaya, W.H.L., Jacenk\u00f3w, G., Tsaftaris, S.A., Cardoso, M.J.: Privacy distillation: reducing re-identification risk of diffusion models. In: International Conference on Medical Image Computing and Computer-Assisted Intervention, pp. 3\u201313. Springer (2023)","DOI":"10.1007\/978-3-031-53767-7_1"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Gonzalez, R.C.: Digital image processing. Pearson education (2009)","DOI":"10.1117\/1.3115362"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"He, Y., Li, B., Wang, Y., Yang, M., Wang, J., Hu, H., Zhao, X.: Is difficulty calibration all we need? Towards more practical membership inference attacks. In: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, pp. 1226\u20131240 (2024)","DOI":"10.1145\/3658644.3690316"},{"key":"29_CR12","first-page":"6840","volume":"33","author":"J Ho","year":"2020","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. Adv. Neural. Inf. Process. Syst. 33, 6840\u20136851 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"29_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2023.102846","volume":"88","author":"A Kazerouni","year":"2023","unstructured":"Kazerouni, A., et al.: Diffusion models in medical imaging: a comprehensive survey. Med. Image Anal. 88, 102846 (2023)","journal-title":"Med. Image Anal."},{"key":"29_CR14","unstructured":"Kong, F., et al.: An efficient membership inference attack for the diffusion model by proximal initialization. arXiv preprint arXiv:2305.18355 (2023)"},{"key":"29_CR15","unstructured":"Krizhevsky, A., Hinton, G., et\u00a0al.: Learning multiple layers of features from tiny images (2009)"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Liu, Z., Zhang, T., He, Y., Zhang, G.: Generating progressive images from pathological transitions via diffusion model. In: International Conference on Medical Image Computing and Computer-Assisted Intervention, pp. 308\u2013318. Springer (2024)","DOI":"10.1007\/978-3-031-72120-5_29"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Luo, X., Jiang, Y., Wei, F., Wu, Y., Xiao, X., Ooi, B.C.: Exploring privacy and fairness risks in sharing diffusion models: An adversarial perspective. arXiv preprint arXiv:2402.18607 (2024)","DOI":"10.1109\/TIFS.2024.3453555"},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Matsumoto, T., Miura, T., Yanai, N.: Membership inference attacks against diffusion models. In: 2023 IEEE Security and Privacy Workshops (SPW), pp. 77\u201383. IEEE (2023)","DOI":"10.1109\/SPW59333.2023.00013"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Mokady, R., Hertz, A., Aberman, K., Pritch, Y., Cohen-Or, D.: Null-text inversion for editing real images using guided diffusion models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 6038\u20136047 (2023)","DOI":"10.1109\/CVPR52729.2023.00585"},{"key":"29_CR20","unstructured":"Pati, S., et\u00a0al.: The federated tumor segmentation (FeTS) challenge. arXiv preprint arXiv:2105.05874 (2021)"},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3\u201318. IEEE (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"29_CR22","unstructured":"Song, J., Meng, C., Ermon, S.: Denoising diffusion implicit models. arXiv preprint arXiv:2010.02502 (2020)"},{"key":"29_CR23","doi-asserted-by":"crossref","unstructured":"Wang, S., et al.: A semantic conditional diffusion model for enhanced personal privacy preservation in medical images. IEEE Journal of Biomedical and Health Informatics (2024)","DOI":"10.1109\/JBHI.2024.3511583"},{"key":"29_CR24","doi-asserted-by":"crossref","unstructured":"Wang, X., Peng, Y., Lu, L., Lu, Z., Bagheri, M., Summers, R.M.: ChestX-Ray8: hospital-scale chest X-ray database and benchmarks on weakly-supervised classification and localization of common thorax diseases. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2097\u20132106 (2017)","DOI":"10.1109\/CVPR.2017.369"},{"issue":"4","key":"29_CR25","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"29_CR26","unstructured":"Watson, L., Guo, C., Cormode, G., Sablayrolles, A.: On the importance of difficulty calibration in membership inference attacks. In: International Conference on Learning Representations (2022)"},{"key":"29_CR27","doi-asserted-by":"crossref","unstructured":"Ye, J., Ni, H., Jin, P., Huang, S.X., Xue, Y.: Synthetic augmentation with large-scale unconditional pre-training. In: International Conference on Medical Image Computing and Computer-Assisted Intervention, pp. 754\u2013764. Springer (2023)","DOI":"10.1007\/978-3-031-43895-0_71"},{"key":"29_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, G., Lewis, J.P., Kleijn, W.B.: Exact diffusion inversion via bidirectional integration approximation. In: European Conference on Computer Vision, pp. 19\u201336. Springer (2024)","DOI":"10.1007\/978-3-031-72998-0_2"},{"key":"29_CR29","unstructured":"Zhong, N., Xu, Y., Li, S., Qian, Z., Zhang, X.: PatchCraft: Exploring texture patch for efficient AI-generated image detection. arXiv preprint arXiv:2311.12397 (2023)"}],"container-title":["Lecture Notes in Computer Science","Deep Generative Models"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-05472-2_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T09:26:31Z","timestamp":1758705991000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-05472-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,25]]},"ISBN":["9783032054715","9783032054722"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-05472-2_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,25]]},"assertion":[{"value":"25 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DGM4MICCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"MICCAI Workshop on Deep Generative Models","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Daejeon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dgm4miccai2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dgm4miccai.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}