{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:10:51Z","timestamp":1725408651492},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2003,5,1]],"date-time":"2003-05-01T00:00:00Z","timestamp":1051747200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2003,5,1]],"date-time":"2003-05-01T00:00:00Z","timestamp":1051747200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. T\u00e9l\u00e9commun."],"published-print":{"date-parts":[[2003,5]]},"DOI":"10.1007\/bf03001530","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T08:42:56Z","timestamp":1625647376000},"page":"782-800","source":"Crossref","is-referenced-by-count":3,"title":["Images m\u00e9dicales, s\u00e9curit\u00e9 et tatouage","Medical images, security and watermarking"],"prefix":"10.1007","volume":"58","author":[{"given":"Gouenou","family":"Coatrieux","sequence":"first","affiliation":[]},{"given":"Henri","family":"Ma\u00eetre","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF03001530_CR1","unstructured":"Europe, Council of Europe, Committee of Ministers, Recommendation No R (97) to Member States on the Protection of Medical Data, Adopted on 13 February 1997, 584th meeting of the Ministers Deputies, 1997."},{"key":"BF03001530_CR2","unstructured":"Dusserre (L.),Ducrot (H.),Alla\u00ebrt (F.A.), L\u2019Information M\u00e9dicale \u2014 l\u2019Ordinateur et la Loi, \u00c9ditions M\u00e9dicales Internationales, 1999."},{"issue":"3","key":"BF03001530_CR3","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/6.988704","volume":"39","author":"(G.) Weiss","year":"2002","unstructured":"Weiss (G.), Welcome to the (almost) digital hospital,IEEE Spectrum,39, no 3, 2002, pp. 44\u201349.","journal-title":"IEEE Spectrum"},{"key":"BF03001530_CR4","unstructured":"Beuscart (R.), Rapport sur les enjeux de la Soci\u00e9t\u00e9 de l\u2019Information dans le domaine de la Sant\u00e9 \u2014 Rapport au Premier Ministre, mai 2000."},{"key":"BF03001530_CR5","first-page":"278","volume-title":"Collection Informatique et Sant\u00e9: Informatique M\u00e9dicale et Strat\u00e9gies Hospitali\u00e8res,6","author":"(J.-F.) Mattei","year":"1993","unstructured":"Mattei (J.-F.), Syst\u00e8mes d\u2019information m\u00e9dicale \u2014 Probl\u00e8mes \u00e9thiques et juridiques \u00e0 propos de quelques exemples, Collection Informatique et Sant\u00e9: Informatique M\u00e9dicale et Strat\u00e9gies Hospitali\u00e8res,6, Springer-Verlag, Paris, France, 1993, pp. 278\u2013281."},{"key":"BF03001530_CR6","unstructured":"Lam\u00e8re (J.L.), S\u00e9curit\u00e9 des syst\u00e8mes d\u2019information, Ed. Dunod, 1991."},{"key":"BF03001530_CR7","unstructured":"cen\/tc 251,env 12924. Security Categorization and Protection for Healthcare Information Systems,cen, 1997"},{"key":"BF03001530_CR8","doi-asserted-by":"crossref","unstructured":"Householder (A.),Houle (K.),Dougherty (C.), Computer Attack Trends Challenge Internet Security, Supplement to Computer, IEEE Computer Society, 2001, pp. 5\u20137.","DOI":"10.1109\/MC.2002.1012422"},{"key":"BF03001530_CR9","doi-asserted-by":"crossref","unstructured":"Cox (I.J.),Miller (M.L.), The first 50 Years of Electronic Watermarking,eurasip Journal on Applied Signal Processing, 2002, pp. 126\u2013132.","DOI":"10.1155\/S1110865702000525"},{"key":"BF03001530_CR10","unstructured":"Ma\u00eetre (H.), Image Watermarking-Why is watermarking a hard problem, Korea-France Workshop on Multimedia, July 1999, pp. 6\u20139."},{"key":"BF03001530_CR11","unstructured":"Autrusseau (F.), Tatouage d\u2019image bas\u00e9 sur la mod\u00e9lisation du syst\u00e8me visuel humain, Th\u00e8se, Universit\u00e9 de Nantes, 2002."},{"key":"BF03001530_CR12","doi-asserted-by":"crossref","unstructured":"Fridrich (J.),Goljan (M.),Du (R.), Lossless data embedding \u2014 new paradigm in digital watermarking, Special Issue on Emerging Applications of Multimedia Data Hiding, 2002, pp. 185\u2013196.","DOI":"10.1155\/S1110865702000537"},{"issue":"4","key":"BF03001530_CR13","first-page":"32","volume":"5","author":"(U.R.) Acharya","year":"2001","unstructured":"Acharya (U.R.), Acharya (D.), Subbanna Bhat (P.), Niranjan (U.C.), Compact storage of medical images with patient information,IEEE Transactions on Information Technology in Biomedicine,5, no 4, Dec. 2001, pp. 32\u2013323.","journal-title":"IEEE Transactions on Information Technology in Biomedicine"},{"issue":"6","key":"BF03001530_CR14","first-page":"1379","volume":"27","author":"(S.G.) Miaou","year":"2000","unstructured":"Miaou (S.G.), Hsu (C.H.), Tsai (Y.S.), Chao (H.M.), A Secure Data Hiding Technique with Heterogeneous Data-Combining Capability for Electronic Patient Records,Medical Physics,27, no 6, June 2000, pp. 1379.","journal-title":"Medical Physics"},{"key":"BF03001530_CR15","unstructured":"Macq (B.),Dewey (F.), Trusted Headers for Medical Images,dfg viii-dii Watermarking Workshop, Erlangen, Germany, 1999."},{"key":"BF03001530_CR16","doi-asserted-by":"crossref","unstructured":"Anand (D.),Niranjan (U.C.), Watermarking medical images with patient information,proc. IEEE\/EMBS Conference, oct. 1998, pp. 703\u2013706.","DOI":"10.1109\/IEMBS.1998.745518"},{"key":"BF03001530_CR17","unstructured":"Coatrieux (G.),Ma\u00eetre (H.),Sankur (B.),Rolland (Y.),Collorec (R.), Relevance of Watermarking in Medical Imaging, in Information Technology Applications in Biomedicine,IEEE-EMBS Conference., Arlington, USA, Nov. 2000, pp. 250\u2013255."},{"key":"BF03001530_CR18","unstructured":"Siegel (E.L.), Kolodner (R.M.), Filmless Radiology, ed. Springer, Collection Health Informatics, 1998."},{"issue":"2","key":"BF03001530_CR19","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/51.486722","volume":"15","author":"(W.) Lee","year":"1996","unstructured":"Lee (W.), Kim (Y.), Applying Multimedia to Medical Imaging,IEEE Engineering in Medicine and Biology Magazine,15, no 2, March\/April 1996, pp. 79\u201385.","journal-title":"IEEE Engineering in Medicine and Biology Magazine"},{"key":"BF03001530_CR20","unstructured":"Coatrieux (G.), Contribution \u00e0 la s\u00e9curit\u00e9 des images m\u00e9dicales par tatouage, Th\u00e8se, Universit\u00e9 de Rennes I, 2002."},{"key":"BF03001530_CR21","unstructured":"Zhao (J.),Koch (E.), Embedding Robust Labels into Images for Copyright Protection, Proc. Intern. Congress on Intellectual Property Rights for Specialized Information,Knowledge and New Technologies, Vienna, Austria, 1995."},{"key":"BF03001530_CR22","unstructured":"Coatrieux (G.),Ma\u00eetre (H.),Rolland (Y.), Tatouage d\u2019images m\u00e9dicales \u2014 Perception d\u2019une marque,settt 2003 \u2014 Sciences of Electronics,Technology of Information and Telecommunications, IEEE International Conference, 2003."},{"key":"BF03001530_CR23","first-page":"5","volume":"9","author":"(A.) Kerckhoffs","year":"1883","unstructured":"Kerckhoffs (A.), La cryptographie militaire, Journal des sciences militaires, 9:5\u201338, janvier 1883.","journal-title":"Journal des sciences militaires"},{"key":"BF03001530_CR24","unstructured":"Schneier (B.),Cryptographie Appliqu\u00e9e, 2 e \u00e9dition, \u00e9ditions Vuibert, International Thomson Publishing France, Paris, 1997."}],"container-title":["Annales Des T\u00e9l\u00e9communications"],"original-title":[],"language":"fr","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03001530.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/BF03001530\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03001530.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T15:32:12Z","timestamp":1725377532000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/BF03001530"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,5]]},"references-count":24,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2003,5]]}},"alternative-id":["BF03001530"],"URL":"https:\/\/doi.org\/10.1007\/bf03001530","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2003,5]]}}}