{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T15:40:02Z","timestamp":1748706002090,"version":"3.41.0"},"publisher-location":"Cham","reference-count":98,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319236322"},{"type":"electronic","value":"9783319236339"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23633-9_19","type":"book-chapter","created":{"date-parts":[[2015,11,26]],"date-time":"2015-11-26T06:47:58Z","timestamp":1448520478000},"page":"493-526","source":"Crossref","is-referenced-by-count":3,"title":["Encryption and Watermarking for medical Image Protection"],"prefix":"10.1007","author":[{"given":"Dalel","family":"Bouslimi","sequence":"first","affiliation":[]},{"given":"Gouenou","family":"Coatrieux","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Abbas, A., Khan, S.: A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE J. Biomed. Health Inform. 18(4), 1431\u20131441 (2014)","DOI":"10.1109\/JBHI.2014.2300846"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Adelsbach, A., Huber, U., Sadeghi, A.: Fingercasting-joint fingerprinting and decryption of broadcast messages. Transactions on DHMS II. Lecture Notes in Computer Science, vol.\u00a04499 pp.\u00a01\u201334. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-73092-7_1"},{"issue":"8","key":"19_CR3","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1109\/TIP.2004.828418","volume":"13","author":"A.M. Alattar","year":"2004","unstructured":"Alattar, A.M.: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Process. 13(8), 1147\u20131156 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"19_CR4","first-page":"201","volume":"35","author":"F.A. Alla\u00ebrt","year":"1994","unstructured":"Alla\u00ebrt, F.A., Dusserre, L.: Security of health information system in France: what we do will no longer be different from what we tell. Int. J. Biomed. Comput. 35, 201\u2013204 (1994)","journal-title":"Int. J. Biomed. Comput."},{"issue":"4","key":"19_CR5","doi-asserted-by":"publisher","first-page":"219","DOI":"10.3917\/jgem.124.0219","volume":"30","author":"A. Alla\u00ebrt","year":"2012","unstructured":"Alla\u00ebrt, A., Quantin, C.: Responsabilit\u00e9s et r\u00e9mun\u00e9rations des actes de t\u00e9l\u00e9-expertise. Journal de Gestion et d\u2019Economie M\u00e9dicales 30(4), 219\u2013229 (2012)","journal-title":"Journal de Gestion et d\u2019Economie M\u00e9dicales"},{"key":"19_CR6","unstructured":"Alliance, W.F.: Wi-fi Protected Access: Strong, Standards-Based, Interoperable Security for Today\u2019s Wi-Fi Networks, pp. 492\u2013495. White paper, University of Cape Town (2003)"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Anderson, R.J., Manifavas, C.: Chameleon: a new kind of stream cipher. In: 4th Int. Workshop Fast Software Encryption (FSE), pp.\u00a0107\u2013113 (1997)","DOI":"10.1007\/BFb0052339"},{"issue":"2","key":"19_CR8","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/83.136597","volume":"1","author":"M. Antonini","year":"1992","unstructured":"Antonini, M., Barlaud, M., Mathieu, P., Daubechies, I.: Image coding using wavelet transform. IEEE Trans. Image Process. 1(2), 205\u2013220 (1992)","journal-title":"IEEE Trans. Image Process."},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3.4), 313\u2013336 (1996)","DOI":"10.1147\/sj.353.0313"},{"issue":"2","key":"19_CR10","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/MSP.2012.2230220","volume":"30","author":"A. Boho","year":"2013","unstructured":"Boho, A., Van\u00a0Wallendael, G., Dooms, A., De\u00a0Cock, J., Braeckman, G., Schelkens, P., Preneel, B., Van\u00a0de Walle, R.: End-to-end security for video distribution, the combination of encryption, watermarking, and video adaptation. IEEE Signal Process. Mag. 30(2), 97\u2013107 (2013)","journal-title":"IEEE Signal Process. Mag."},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Bouslimi, D., Coatrieux, G., Roux, C.: A telemedicine protocol based on watermarking evidences for identification of liabilities in case of litigation. In: IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom), pp. 506\u2013509 (2012)","DOI":"10.1109\/HealthCom.2012.6379473"},{"key":"19_CR12","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1109\/TITB.2012.2207730","volume":"16","author":"D. Bouslimi","year":"2012","unstructured":"Bouslimi, D., Coatrieux, G., Cozic, M., Roux, C.: A joint encryption\/watermarking system for verifying the reliability of medical images. IEEE Trans. Inf. Technol. Biomed. 16, 891\u2013899 (2012)","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"19_CR13","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cmpb.2011.09.015","volume":"106","author":"D. Bouslimi","year":"2012","unstructured":"Bouslimi, D., Coatrieux, G., Roux, C.: A joint encryption\/watermarking algorithm for verifying the reliability of medical images: application to echographic images. Comput. Methods Programs Biomed. 106, 47\u201354 (2012)","journal-title":"Comput. Methods Programs Biomed."},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Cancellaro, M., Battisti, F., Carli, M., Boato, G., De\u00a0Natale, F.G.B., Neri, A.: A joint digital watermarking and encryption method. SPIE 6819, 68, 191C (2008)","DOI":"10.1117\/12.766650"},{"issue":"1","key":"19_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.image.2010.11.001","volume":"26","author":"M. Cancellaro","year":"2011","unstructured":"Cancellaro, M., Battisti, F., Carli, M., Boato, G., De\u00a0Natale, F.G.B., Neri, A.: A commutative digital image watermarking and encryption method in the tree structured haar transform domain. Signal Process. Image Commun. 26(1), 1\u201312 (2011)","journal-title":"Signal Process. Image Commun."},{"key":"19_CR16","first-page":"157","volume":"2","author":"M. Celik","year":"2002","unstructured":"Celik, M., Sharma, G., Tekalp, A.M., Saber, E.: Reversible data hiding. Proc. IEEE ICIP 2, 157\u2013160 (2002)","journal-title":"Proc. IEEE ICIP"},{"issue":"3","key":"19_CR17","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1109\/TIFS.2008.926988","volume":"3","author":"M. Celik","year":"2008","unstructured":"Celik, M., Lemma, A., Katzenbeisser, S., van\u00a0der Veen, M.: Look-up table based secure client-side embedding for spread-spectrum watermarks. IEEE Trans. Inf. Forensics Secur. 3(3), 475\u2013487 (2008)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Charpentier, A., Fontaine, C., Furon, T., Cox, I.: An asymmetric fingerprinting scheme based on tardos codes. In: 13th International Conference on Information Hiding (IH), vol.\u00a06958, pp.\u00a043\u201358 (2011)","DOI":"10.1007\/978-3-642-24178-9_4"},{"issue":"2","key":"19_CR19","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/BF00925498","volume":"14","author":"C. Chakrabarti","year":"1996","unstructured":"Chakrabarti, C., Vishwanath, M., Owens, R.: Architectures for wavelet transforms: a survey. J. VLSI Signal Process. Syst. Signal Image Video Technol. 14(2), 171\u2013192 (1996)","journal-title":"J. VLSI Signal Process. Syst. Signal Image Video Technol."},{"issue":"4","key":"19_CR20","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B. Chen","year":"2001","unstructured":"Chen, B., Wornell, G.: Quantization Index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47(4), 1423\u20131443 (2001)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Chen, C., Wu, X.: An angle QIM watermarking algorithm based on Watson perceptual model. In: Fourth International Conference on Image and Graphics, pp.\u00a0324\u2013328 (2007)","DOI":"10.1109\/ICIG.2007.140"},{"issue":"1","key":"19_CR22","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10278-007-9012-0","volume":"21","author":"K. Chiang","year":"2008","unstructured":"Chiang, K., Chang-Chien, K., Chang, R., Yen, H.: Tamper detection and restoring system for medical images using wavelet-based reversible data embedding. J. Digit. Imaging 21(1), 77\u201390 (2008)","journal-title":"J. Digit. Imaging"},{"key":"19_CR23","unstructured":"Chrysochos, E., Fotopoulos, V., Skodras, A.N., Xenos, M.: Reversible image watermarking based on histogram modification. In: 11th Panhellenic Conf. of Informatics (PCI), pp.\u00a093\u2013104 (2007)"},{"key":"19_CR24","first-page":"782","volume":"58","author":"M. Costa","year":"2003","unstructured":"Costa, M.: Writing on dirty paper. IEEE Trans. Inf. Theory 58, 782\u2013800 (2003)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Coatrieux, G., Ma\u00eetre, H., Sankur, B., Rolland, Y., Collorec, R.: Relevance of watermarking in medical imaging. In: IEEE EMBS Conference on Information Technology Applications in Biomedicine, pp.\u00a0250\u2013255 (2000)","DOI":"10.1109\/ITAB.2000.892396"},{"key":"19_CR26","volume-title":"Tatouage d\u2019images m\u00e9dicales: perception d\u2019une marque","author":"G. Coatrieux","year":"2003","unstructured":"Coatrieux, G., Ma\u00eetre, H., Rolland, Y.: Tatouage d\u2019images m\u00e9dicales: perception d\u2019une marque. In: SETIT (2003)"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Coatrieux, G., Puentes, J., Lecornu, L., Cheze Le\u00a0Rest, C., Roux, C.: Compliant secured specialized electronic patient record platform. In: 1st International Transdisciplinary Conference on Distributed Diagnosis and Home Healthcare (D2H2), pp.\u00a0156\u2013159 (2006)","DOI":"10.1109\/DDHH.2006.1624820"},{"issue":"2","key":"19_CR28","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/TITB.2008.2007199","volume":"13","author":"G. Coatrieux","year":"2009","unstructured":"Coatrieux, G., Le\u00a0Guillou, C., Cauvin, J.M., Roux, C.: Reversible watermarking for knowledge digest embedding and reliability control in medical images. IEEE Trans. Inf. Technol. Biomed. 13(2), 158\u2013165 (2009)","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"issue":"6","key":"19_CR29","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1109\/JBHI.2013.2263533","volume":"17","author":"G. Coatrieux","year":"2013","unstructured":"Coatrieux, G., Huang, H., Shu, H., Roux, C., Luo, L.: A watermarking based medical image integrity control system and an image moment signature for tampering characterization. IEEE J. Biomed. Health Inform. 17(6), 1057\u20131067 (2013)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"19_CR30","volume-title":"Digital Watermarking","author":"I. Cox","year":"2002","unstructured":"Cox, I., Miller, M., Bloom, J., Honsinger, C.: Digital Watermarking, vol. 53. Springer, Berlin (2002)"},{"issue":"12","key":"19_CR31","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I. Cox","year":"1997","unstructured":"Cox, I., Kilian, J., Leighton, F., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. Image Process."},{"key":"19_CR32","volume-title":"Digital Watermarking and Steganography","author":"I. Cox","year":"2007","unstructured":"Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Los Altos (2007)"},{"key":"19_CR33","unstructured":"Daemen, J., Rijmen, V.: AES Proposal: The Rijndael Block Cipher. Technical report, Proton World Int.1, Katholieke Universiteit Leuven, ESAT-COSIC, Belgique (2002)"},{"key":"19_CR34","volume-title":"RSNA Image Share 2012","author":"S. David","year":"2012","unstructured":"David, S., Mendelson, M.: RSNA Image Share 2012. In: SIIM (2012)"},{"key":"19_CR35","first-page":"1","volume":"6","author":"G. De Moor","year":"1993","unstructured":"De Moor, G.: Standardisation in health care informatics and telematics in Europe: CEN TC 251 activities. Stud. Health Technol. Inform. 6, 1\u201313 (1993)","journal-title":"Stud. Health Technol. Inform."},{"issue":"1","key":"19_CR36","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TMM.2003.809729","volume":"5","author":"C. De Vleeschouwer","year":"2003","unstructured":"De\u00a0Vleeschouwer, C., Delaigle, J., Macq, B.: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans. Multimedia 5(1), 97\u2013105 (2003)","journal-title":"IEEE Trans. Multimedia"},{"key":"19_CR37","unstructured":"D\u00e9cret n\u2218 2010-1229 du 19 octobre 2010 relatif \u00e0 la t\u00e9l\u00e9m\u00e9decine"},{"key":"19_CR38","volume-title":"Data warehouse: from architecture to implementation","author":"B. Devlin","year":"1996","unstructured":"Devlin, B., Cote, L.: Data warehouse: from architecture to implementation. Addison-Wesley Longman Publishing Co., Amsterdam (1996)"},{"key":"19_CR39","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol, Version 1.2 (2008)","DOI":"10.17487\/rfc5246"},{"key":"19_CR40","volume-title":"A Personal Perspective on the Origin(s) and Development of \u2018Big Data\u2019: The Phenomenon, the Term, and the Discipline","author":"F. Diebold","year":"2012","unstructured":"Diebold, F.: A Personal Perspective on the Origin(s) and Development of \u2018Big Data\u2019: The Phenomenon, the Term, and the Discipline. Sage, London (2012)"},{"key":"19_CR41","unstructured":"Dusserre, L. and Alla\u00ebrt, F.A. and Quantin, C.: Pmsi et d\u00e9ontologie. Le Pmsi: questions juridiques et \u00e9thiques. In: Actes du colloque Information M\u00e9dicale, Secret et droits d\u2019acc\u00e8s des acteurs, pp.\u00a075\u201379 (1991)"},{"key":"19_CR42","doi-asserted-by":"crossref","unstructured":"Eastlake III, D., Jones, P.: Us secure hash algorithm 1 (sha1). Technical report, RFC 3174 (Informational) (2001)","DOI":"10.17487\/rfc3174"},{"issue":"12","key":"19_CR43","doi-asserted-by":"publisher","first-page":"2959","DOI":"10.1109\/26.477498","volume":"43","author":"A. Eskicioglu","year":"1995","unstructured":"Eskicioglu, A., Fisher, P.: Image quality measures and their performance. IEEE Trans. Commun. 43(12), 2959\u20132965 (1995)","journal-title":"IEEE Trans. Commun."},{"issue":"1","key":"19_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2007\/13801","volume":"2007","author":"C. Fontaine","year":"2007","unstructured":"Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur. 2007(1), 1\u201315 (2007)","journal-title":"EURASIP J. Inf. Secur."},{"issue":"3","key":"19_CR45","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1109\/TIFS.2013.2294240","volume":"9","author":"J. Franco-Contreras","year":"2014","unstructured":"Franco-Contreras, J., Coatrieux, G., Cuppens, F., Roux, C., Cuppens-Boulahia, N.: Robust lossless watermarking of relational databases based on circular histogram modulation. IEEE Trans. Inf. Forensics Secur. 9(3), 397\u2013410 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"19_CR46","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903","volume-title":"Steganography in Digital Media: Principles, Algorithms, and Applications","author":"J. Fridrich","year":"2009","unstructured":"Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press, Cambridge (2009)"},{"key":"19_CR47","volume-title":"Protection of digital images using self embedding","author":"J. Fridrich","year":"1999","unstructured":"Fridrich, J., Goljan, M.: Protection of digital images using self embedding. In: Symposium on Content Security and Data Hiding in Digital Media (1999)"},{"key":"19_CR48","unstructured":"Fridrich, J., Goljan, J., Du, R.: Invertible authentication. In: Proceedings of International Conference SPIE, Security and Watermarking of Multimedia Content, pp. 197\u2013208 (2001)"},{"key":"19_CR49","unstructured":"Fung, C., Gortan, A., Godoy, Jr., W.: A review study on image digital watermarking. In: The Tenth International Conference on Networks (ICN 2011), pp. 24\u201328 (2011)"},{"key":"19_CR50","doi-asserted-by":"crossref","unstructured":"Furon, T., Bas, P.: Broken arrows. EURASIP J. Inf. Secur. 2008, 3 (2008)","DOI":"10.1155\/2008\/597040"},{"key":"19_CR51","unstructured":"Guru, J., Damecha, H.: Digital watermarking classification: a survey. Int. J. Comput. Sci. Trends Technol. 2, 8\u201313"},{"key":"19_CR52","unstructured":"Herrera-Joancomart\u00ed, J., Katzenbeisser, S., Meg\u00edas, J., Minguill\u00f3n, D., Pommer, A., Steinebach, M., Uhl, A.: ECRYPT European network of excellence in cryptology. First summary report on hybrid systems, D.WVL.5 (2005)"},{"key":"19_CR53","unstructured":"Honsinger, C., Jones, P., Rabbani, M., Stoffel, J.: Lossless recovery of an original image containing embedded data. US Patent application, Docket No.: 77102\/E-D (1999)"},{"key":"19_CR54","first-page":"655","volume":"4","author":"H. Hwang","year":"2010","unstructured":"Hwang, H., Kim, H., Sachnev, V., Joo, S.: Reversible watermarking method using optimal histogram pair shifting based on prediction and sorting. KSII Trans. Internet Inf. Syst. 4, 655 (2010)","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"19_CR55","volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","author":"S. Katzenbeisser","year":"2000","unstructured":"Katzenbeisser, S., Petitcolas, F.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Boston (2000)"},{"key":"19_CR56","unstructured":"Kutter, M., Petitcolas, F.A.P.: A fair benchmark for image watermarking systems. In: Electronic Imaging \u201999. Security and Watermarking of Multimedia Contents, vol.\u00a03657 (1999)"},{"key":"19_CR57","doi-asserted-by":"crossref","unstructured":"Lashkari, A., Towhidi, F., Hosseini, R.: Wired equivalent privacy (WEP). In: International Conference on Future Computer and Communication (ICFCC), pp. 492\u2013495 (2009)","DOI":"10.1109\/ICFCC.2009.32"},{"key":"19_CR58","unstructured":"L\u00e9gifrance: Loi n 2002-303 du 4 mars 2002. http:\/\/www.legifrance.gouv.fr\/affichTexte.do? (2002)"},{"key":"19_CR59","doi-asserted-by":"crossref","unstructured":"Liu, K.: Human visual system based watermarking for color images. In: Fifth International Conference on Information Assurance and Security (IAS), vol. 2, pp. 623\u2013626. IEEE, New York (2009)","DOI":"10.1109\/IAS.2009.349"},{"key":"19_CR60","doi-asserted-by":"crossref","unstructured":"Loytynoja, M., Cvejic, N., Lahetkangas, E., Seppanen, T.: Audio encryption using fragile watermarking. In: Proc. IEEE Int. Conference on Information, Communications and Signal Processing, pp.\u00a0881\u2014885 (2005)","DOI":"10.1109\/ICICS.2005.1689175"},{"key":"19_CR61","unstructured":"Lee, H., Kim, H., Kwon, K., Lee, J.: Digital watermarking of medical image using ROI information. In: Proc. IEEE Int. Workshop Healthcom, pp.\u00a0404\u2013407 (2005)"},{"issue":"3","key":"19_CR62","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1109\/TIFS.2007.905146","volume":"2","author":"S. Lee","year":"2007","unstructured":"Lee, S., Yoo, C., Kalker, T.: Reversible image watermarking based on integer-to-integer wavelet transform information forensics and security. IEEE Trans. Inf. Forensics Secur. 2(3), 321\u2013330 (2007)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"19_CR63","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/TIFS.2007.897266","volume":"2","author":"Q. Li","year":"2007","unstructured":"Li, Q., Cox, I.: Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking. IEEE Trans. Inf. Forensics Secur. 2(2), 127\u2013139 (2007)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"19_CR64","first-page":"249","volume":"49","author":"S.C. Liew","year":"2011","unstructured":"Liew, S.C., Zain, J.M.: Reversible tamper localization and recovery watermarking scheme with secure hash. Eur. J. Sci. Res. 49(2), 249\u2013264 (2011)","journal-title":"Eur. J. Sci. Res."},{"key":"19_CR65","doi-asserted-by":"crossref","unstructured":"Manasrah, T., Al-Haj, A.: Management of medical images using wavelets-based multi-watermarking algorithm. In: International Conference on Innovations in Information Technology, pp.\u00a0697\u2013701 (2008)","DOI":"10.1109\/INNOVATIONS.2008.4781697"},{"key":"19_CR66","doi-asserted-by":"crossref","unstructured":"Meerwald, P., Uhl, A.: Survey of wavelet-domain watermarking algorithms. In: Photonics West 2001-Electronic Imaging. International Society for Optics and Photonics, pp. 505\u2013516 (2001)","DOI":"10.1117\/12.435434"},{"key":"19_CR67","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/83.913598","volume":"10","author":"N. Memon","year":"2001","unstructured":"Memon, N., Wong, P.: A buyer-seller watermarking protocol. IEEE Trans. Image Process. 10, 643\u2013649 (2001)","journal-title":"IEEE Trans. Image Process."},{"key":"19_CR68","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Crytography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., Van\u00a0Oorshot, P., Vanstone, S.: Handbook of Applied Crytography. CRC Press, Boca Raton (1996)"},{"key":"19_CR69","doi-asserted-by":"crossref","unstructured":"Mintzer, F., Lotspiech, J., Morimoto, N.: Safeguarding digital library contents and users: digital watermarking. D-Lib Mag. (1997)","DOI":"10.1045\/december97-lotspiech"},{"key":"19_CR70","first-page":"912","volume":"2","author":"Z. Ni","year":"2003","unstructured":"Ni, Z., Shi, Y., Ansari, N., Wei, S.: Reversible data hiding. Proc. IEEE Int. Symp. Circuits Syst. 2, 912\u2013915 (2003)","journal-title":"Proc. IEEE Int. Symp. Circuits Syst."},{"key":"19_CR71","doi-asserted-by":"crossref","unstructured":"Paillier-99, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT), vol.\u00a01592, pp.\u00a0223\u2013238 (1999)","DOI":"10.1007\/3-540-48910-X_16"},{"key":"19_CR72","doi-asserted-by":"crossref","unstructured":"Pan, W., Coatrieux, G., Montagner, J., Cuppens, N., Cuppens, F., Roux, C.: Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking. Lecture Notes in Computer Science, vol.\u00a05939, pp.\u00a0153\u2013162. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-11207-2_12"},{"key":"19_CR73","doi-asserted-by":"crossref","unstructured":"Pan, W., Coatrieux, G., Montagner, J., Cuppens, N., Cuppens, F., Roux, C.: Reversible watermarking based on invariant image classification and dynamical error histogram shifting. In: Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp.\u00a04477\u20134480 (2011)","DOI":"10.1109\/IEMBS.2011.6091110"},{"issue":"10","key":"19_CR74","doi-asserted-by":"publisher","first-page":"3960","DOI":"10.1109\/TSP.2005.855407","volume":"53","author":"F. P\u00e9rez-Gonz\u00e1lez","year":"2005","unstructured":"P\u00e9rez-Gonz\u00e1lez, F., Mosquera, C., Barni, M., Abrardo, A.: Rational dither modulation: a high-rate data-hiding method invariant to gain attacks. IEEE Trans. Signal Process. 53(10), 3960\u20133975 (2005)","journal-title":"IEEE Trans. Signal Process."},{"issue":"5","key":"19_CR75","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1049\/ip-vis:20041240","volume":"152","author":"A. Piva","year":"2005","unstructured":"Piva, A., Barni, M., Bartolini, F., De\u00a0Rosa, A.: Data hiding technologies for digital radiography. Proc. IEE Vision Image Signal Process. 152(5), 604\u2013610 (2005)","journal-title":"Proc. IEE Vision Image Signal Process."},{"key":"19_CR76","unstructured":"Puech, W., Rodrigues, J.: A new crypto-watermarking method for medical images safe transfer. In: Proc. of the 12th European Signal Processing Conference (EUSIPCO\u201904), pp.\u00a01481\u20131484 (2004)"},{"key":"19_CR77","doi-asserted-by":"crossref","unstructured":"Puech, W., Chaumont, M., Strauss, O.: A reversible data hiding method for encrypted images. In: SPIE Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents, p.\u00a068191E (2008)","DOI":"10.1117\/12.766754"},{"issue":"2","key":"19_CR78","doi-asserted-by":"publisher","first-page":"e6","DOI":"10.1016\/j.ijmedinf.2010.10.003","volume":"80","author":"C. Quantin","year":"2011","unstructured":"Quantin, C., Jaquet-Chiffelle, D., Coatrieux, G., Benzenine, E., Allaert, F.: Medical record search engines, using pseudonymised patient identity: an alternative to centralised medical records. Int. J. Med. Inform. 80(2), e6\u201311 (2011)","journal-title":"Int. J. Med. Inform."},{"issue":"4","key":"19_CR79","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1109\/4233.966107","volume":"5","author":"U. Rajendra-Acharya","year":"2001","unstructured":"Rajendra-Acharya, U., Acharya, D., Subbanna\u00a0Bhat, P., Niranjan, U.: Compact storage of medical images with patient information. IEEE Trans. Inf. Technol. Biomed. 5(4), 320\u2013323 (2001)","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"key":"19_CR80","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.cmpb.2004.02.009","volume":"76","author":"U. Rajendra-Acharya","year":"2004","unstructured":"Rajendra-Acharya, U., Niranjan, U., Iyengar, S., Kannathal, N., Min, L.: Simultaneous storage of patient information with medical images in the frequency domain. Comput. Methods Programs Biomed. 76, 13\u201319 (2004)","journal-title":"Comput. Methods Programs Biomed."},{"key":"19_CR81","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-092534-9.50007-2","volume-title":"Discrete Cosine Transform: Algorithms, Advantages","author":"K. Rao","year":"1990","unstructured":"Rao, K., Yip, P.: Discrete Cosine Transform: Algorithms, Advantages, Applications. Academic, San Diego (1990)"},{"issue":"4","key":"19_CR82","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/TIFS.2010.2072830","volume":"5","author":"A. Rial","year":"2010","unstructured":"Rial, A., Deng, M., Bianchi, T., Piva, A., Preneel, B.: A provably secure anonymous buyer\u2013seller watermarking protocol. IEEE Trans. Inf. Forensics Secur. 5(4), 920\u2013931 (2010)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"19_CR83","unstructured":"Rodrigues, J., Puech, W., Fiorio, C.: Lossless crypto-data hiding in medical images without increasing the original image size. In: 2nd International Conference on Advances in Medical Signal and Information Processing, pp.\u00a0358\u2013365 (2004)"},{"issue":"7","key":"19_CR84","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1109\/TCSVT.2009.2020257","volume":"19","author":"V. Sachnev","year":"2009","unstructured":"Sachnev, V., Kim, H., Nam, J., Suresh, S., Shi, Y.: Reversible watermarking algorithm using sorting and prediction. IEEE Trans. Circuit Syst. Video Technol. 19(7), 989\u2013999 (2009)","journal-title":"IEEE Trans. Circuit Syst. Video Technol."},{"key":"19_CR85","doi-asserted-by":"crossref","unstructured":"Schmitz, R., Li, S., Grecos, C., Zhang, X.: A new approach to commutative watermarking encryption. In: 13th Joint IFIP TC6 and TC11 Conf. Communications and Multimedia Security (2012)","DOI":"10.1007\/978-3-642-32805-3_10"},{"key":"19_CR86","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B. Schneier","year":"1997","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. International Thomson Publishing, Paris (1997)"},{"key":"19_CR87","volume-title":"Digital Watermarking and Steganography: Fundamentals and Techniques","author":"F. Shih","year":"2012","unstructured":"Shih, F.: Digital Watermarking and Steganography: Fundamentals and Techniques. CRC Press, Boca Raton (2012)"},{"key":"19_CR88","doi-asserted-by":"crossref","unstructured":"Singh, J., Dubey, A.: MPEG-2 video watermarking using quantization index modulation. In: IEEE 4th International Conference on Internet Multimedia Services Architecture and Application(IMSAA), pp.\u00a01\u20136 (2010)","DOI":"10.1109\/IMSAA.2010.5729411"},{"key":"19_CR89","doi-asserted-by":"crossref","unstructured":"Singhal, N., Lee, Y., Kim, C., Lee, S.: Robust image watermarking based on local Zernike moments. In: IEEE 9th Workshop on Multimedia Signal Processing, pp.\u00a0401\u2013404 (2007)","DOI":"10.1109\/MMSP.2007.4412901"},{"key":"19_CR90","unstructured":"Smith, S.W.: The discrete fourier transform, Chap. 8 In: The Scientist and Engineer\u2019s Guide to Digital Signal Processing, 2nd edn. California Technical Publishing, San Diego (1999)"},{"key":"19_CR91","doi-asserted-by":"crossref","unstructured":"Snyder, A., Weaver, A.: The e-logistics of securing distributed medical data. In: Proceedings of IEEE International Conference on Industrial Informatics (INDIN 2003), pp. 207\u2013216. IEEE, New York (2003)","DOI":"10.1109\/INDIN.2003.1300271"},{"issue":"3","key":"19_CR92","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1109\/TMM.2011.2181342","volume":"14","author":"A. Subramanyam","year":"2012","unstructured":"Subramanyam, A., Emmanuel, S., Kankanhalli, M.: Robust watermarking of compressed and encrypted JPEG2000 images. IEEE Trans. Multimedia 14(3), 703\u2013716 (2012)","journal-title":"IEEE Trans. Multimedia"},{"issue":"8","key":"19_CR93","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J. Tian","year":"2003","unstructured":"Tian, J.: Reversible data embedding using a difference expansion,. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890\u2013896 (2003)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"19_CR94","doi-asserted-by":"crossref","unstructured":"Watson, A.B.: DCT quantization matrices optimized for individual images. In: Human Vision, Visual Processing, and Digital Display IV (SPIE\u20191993), vol. 1913, pp. 202\u2013216 (1993)","DOI":"10.2514\/6.1993-4512"},{"key":"19_CR95","doi-asserted-by":"crossref","unstructured":"Xuan, G., Chen, J., Zhu, J., Shi, Y., Ni, Z., Su, W.: Lossless data hiding based on integer wavelet transform. In: Proc. MMSP, pp.\u00a0312\u2013315 (2002)","DOI":"10.1049\/el:20021131"},{"key":"19_CR96","doi-asserted-by":"crossref","unstructured":"Xuan, G., Yao, Q., Yang, C., Gao, J.: Lossless data hiding using histogram shifting method based on integer wavelets. IWDW 2006. Lecture Notes in Computer Science, vol.\u00a04283, pp.\u00a0323\u2013332. Springer, Heidelberg (2006)","DOI":"10.1007\/11922841_26"},{"issue":"2","key":"19_CR97","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","volume":"7","author":"X. Zhang","year":"2012","unstructured":"Zhang, X.: Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7(2), 826\u2013832 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"19_CR98","doi-asserted-by":"crossref","unstructured":"Zhu, X.: A new spatial perceptual mask for image watermarking. In: 19th International Conference on Pattern Recognition (ICPR), pp. 1\u20134. IEEE, New York (2008)","DOI":"10.1109\/ICPR.2008.4761640"}],"container-title":["Medical Data Privacy Handbook"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23633-9_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T15:13:46Z","timestamp":1748704426000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23633-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319236322","9783319236339"],"references-count":98,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23633-9_19","relation":{},"subject":[],"published":{"date-parts":[[2015]]}}}