{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:34:27Z","timestamp":1763642067415},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2016,5,11]],"date-time":"2016-05-11T00:00:00Z","timestamp":1462924800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Med Syst"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s10916-016-0514-5","type":"journal-article","created":{"date-parts":[[2016,5,11]],"date-time":"2016-05-11T04:04:55Z","timestamp":1462939495000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images"],"prefix":"10.1007","volume":"40","author":[{"given":"Petros L. K.","family":"Mantos","sequence":"first","affiliation":[]},{"given":"Ilias","family":"Maglogiannis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,11]]},"reference":[{"issue":"7","key":"514_CR1","doi-asserted-by":"publisher","first-page":"070901","DOI":"10.1118\/1.4811272","volume":"40","author":"GC Kagadis","year":"2013","unstructured":"Kagadis, G. C., Kloukinas, C., Moore, K., Philbin, J., Papadimitroulas, P., Alexakos, C., Nagy, P. G., Visvikis, D., and Hendee, W. R., Cloud computing in medical imaging. Med. Phys. 40(7):070901, 2013. doi: 10.1118\/1.4811272 .","journal-title":"Med. Phys."},{"key":"514_CR2","doi-asserted-by":"publisher","unstructured":"Teng, C., Mitchell, J., Walker, C., Swan, A., Davila, C., Howard, D., and Needham, T, A medical image archive solution in the cloud. In: IEEE international conference on software engineering and service sciences (ICSESS), Beijing, China, pp 431\u2013434, 2010 doi: 10.1109\/ICSESS.2010.5552343 .","DOI":"10.1109\/ICSESS.2010.5552343"},{"key":"514_CR3","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/s10916-005-7984-1","volume":"30","author":"I Maglogiannis","year":"2006","unstructured":"Maglogiannis, I., Delakouridis, C., and Kazatzopoulos, L., Enabling collaborative medical diagnosis over the internet via peer-to-peer distribution of electronic health records. J. Med. Syst. 30:107\u2013116, 2006. doi: 10.1007\/s10916-005-7984-1 .","journal-title":"J. Med. Syst."},{"key":"514_CR4","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1007\/s10916-009-9332-3","volume":"34","author":"M Nergui","year":"2010","unstructured":"Nergui, M., Acharya, U. S., Acharya, R., and Yu, W., Reliable and robust transmission and storage techniques for medical images with patient information. J. Med. Syst. 34:1129\u20131139, 2010. doi: 10.1007\/s10916-009-9332-3 .","journal-title":"J. Med. Syst."},{"key":"514_CR5","unstructured":"National Electrical Manufacturers Association. Digital imaging and communications in medicine (DICOM). http:\/\/dicom.nema.org\/standard.html . Accessed 16 December 2015, 2015."},{"key":"514_CR6","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s10278-009-9253-1","volume":"24","author":"OM Al-Qershi","year":"2011","unstructured":"Al-Qershi, O. M., and Khoo, B. E., Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images. J. Digit. Imaging 24:114\u2013125, 2011. doi: 10.1007\/s10278-009-9253-1 .","journal-title":"J. Digit. Imaging"},{"key":"514_CR7","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s10278-007-9043-6","volume":"22","author":"X Guo","year":"2007","unstructured":"Guo, X., and Zhuang, T. G., A region-based lossless watermarking scheme for enhancing security of medical data. J. Digit. Imaging 22:53\u201364, 2007. doi: 10.1007\/s10278-007-9043-6 .","journal-title":"J. Digit. Imaging"},{"issue":"4","key":"514_CR8","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1109\/TITB.2006.875655","volume":"10","author":"A Giakoumaki","year":"2006","unstructured":"Giakoumaki, A., Pavlopoulos, S., and Koutsouris, D., Multiple image watermarking applied to health information management. IEEE Trans. Inf. Technol. Biomed. 10(4):722\u2013732, 2006. doi: 10.1109\/TITB.2006.875655 .","journal-title":"IEEE Trans. Inf. Technol. Biomed."},{"issue":"8","key":"514_CR9","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","volume":"13","author":"J Tian","year":"2003","unstructured":"Tian, J., Reversible data embedding using a difference expansion. IEEE Trans. Circ. Syst. Video 13(8):890\u2013896, 2003. doi: 10.1109\/TCSVT.2003.815962 .","journal-title":"IEEE Trans. Circ. Syst. Video"},{"key":"514_CR10","doi-asserted-by":"publisher","unstructured":"Coatrieux, G., Lecornu, L., Roux. Ch., and Sankur, B, A review of image watermarking applications in healthcare. In: Proc. of 28thAnnual International Conference Engineering in Medicine and Biology Society, EMBS \u201906. New York: IEEE, pp. 4691\u20134694, 2006. doi: 10.1109\/IEMBS.2006.259305 .","DOI":"10.1109\/IEMBS.2006.259305"},{"issue":"10","key":"514_CR11","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/1022594.1022597","volume":"47","author":"H Wang","year":"2004","unstructured":"Wang, H., and Wang, S., Cyber warfare: Steganography vs. steganalysis. Commun. ACM 47(10):76\u201382, 2004. doi: 10.1145\/1022594.1022597 .","journal-title":"Commun. ACM"},{"issue":"5","key":"514_CR12","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1109\/LSP.2006.870357","volume":"13","author":"J Mielikainen","year":"2006","unstructured":"Mielikainen, J., LSB matching revisited. IEEE Signal Proc. Lett. 13(5):285\u2013287, 2006. doi: 10.1109\/LSP.2006.870357 .","journal-title":"IEEE Signal Proc. Lett."},{"issue":"3","key":"514_CR13","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","volume":"37","author":"CK Chan","year":"2004","unstructured":"Chan, C. K., and Cheng, L. M., Hiding data in images by simple LSB substitution. Pattern Recogn. 37(3):469\u2013474, 2004. doi: 10.1016\/j.patcog.2003.08.007 .","journal-title":"Pattern Recogn."},{"issue":"11","key":"514_CR14","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","volume":"10","author":"X Zhang","year":"2006","unstructured":"Zhang, X., and Wang, S., Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11):781\u2013783, 2006. doi: 10.1109\/LCOMM.2006.060863 .","journal-title":"IEEE Commun. Lett."},{"key":"514_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2009\/658047","volume":"2009","author":"RM Chao","year":"2009","unstructured":"Chao, R. M., Wu, H. C., Lee, C. C., and Chu, Y. P., A novel image data hiding scheme with diamond encoding. EURASIP J. Inf. Secur. 2009:1\u20139, 2009. doi: 10.1155\/2009\/658047 .","journal-title":"EURASIP J. Inf. Secur."},{"key":"514_CR16","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TIFS.2011.2155062","volume":"7","author":"W Hong","year":"2012","unstructured":"Hong, W., and Chen, T., A novel data embedding method using adaptive pixel pair matching. IEEE Trans. Inf. Forensic Secur. 7:176\u2013184, 2012. doi: 10.1109\/TIFS.2011.2155062 .","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"9\u201310","key":"514_CR17","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1016\/S0167-8655(02)00402-6","volume":"24","author":"DC Wu","year":"2003","unstructured":"Wu, D. C., and Tsai, W. H., A steganographic method for images by pixel-value differencing. Pattern Recogn. Lett. 24(9\u201310):1613\u20131626, 2003. doi: 10.1016\/S0167-8655(02)00402-6 .","journal-title":"Pattern Recogn. Lett."},{"issue":"3","key":"514_CR18","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1109\/TIFS.2008.926097","volume":"3","author":"CH Yang","year":"2008","unstructured":"Yang, C. H., Weng, C. Y., Wang, S. J., and Sun, H. M., Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Trans. Inf. Forensic Secur. 3(3):488\u2013497, 2008. doi: 10.1109\/TIFS.2008.926097 .","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"2","key":"514_CR19","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/TIFS.2010.2041812","volume":"5","author":"W Luo","year":"2010","unstructured":"Luo, W., Huang, F., and Huang, J., Edge adaptive image steganography based on LSB matching revisited. IEEE Trans Inf Forensics 5(2):201\u2013214, 2010. doi: 10.1109\/TIFS.2010.2041812 .","journal-title":"IEEE Trans Inf Forensics"},{"issue":"5","key":"514_CR20","doi-asserted-by":"publisher","first-page":"1166","DOI":"10.1016\/j.jss.2011.12.045","volume":"85","author":"W Hong","year":"2012","unstructured":"Hong, W., Chen, T. S., and Luo, C. W., Data embedding using pixel value differencing and diamond encoding with multiple-base notational system. J Syst. Softw. 85(5):1166\u20131175, 2012. doi: 10.1016\/j.jss.2011.12.045 .","journal-title":"J Syst. Softw."},{"key":"514_CR21","doi-asserted-by":"publisher","first-page":"9918","DOI":"10.1007\/s10916-012-9918-z","volume":"37","author":"J Liu","year":"2013","unstructured":"Liu, J., Tang, G., and Sun, Y., A secure steganography for privacy protection in healthcare system. J. Med. Syst. 37:9918, 2013. doi: 10.1007\/s10916-012-9918-z .","journal-title":"J. Med. Syst."},{"key":"514_CR22","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s10916-016-0473-x","volume":"40","author":"K Muhammad","year":"2016","unstructured":"Muhammad, K., Sajjad, M., and Baik, S. W., Dual-level security based cyclic18 steganographic method and its application for secure transmission of keyframes during wireless capsule endoscopy. J. Med. Syst. 40:114, 2016. doi: 10.1007\/s10916-016-0473-x .","journal-title":"J. Med. Syst."},{"key":"514_CR23","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.ins.2013.08.012","volume":"254","author":"HD Yuan","year":"2014","unstructured":"Yuan, H. D., Secret sharing with multi-cover adaptive steganography. Inf. Sci. 254:197\u2013212, 2014. doi: 10.1016\/j.ins.2013.08.012 .","journal-title":"Inf. Sci."},{"issue":"12","key":"514_CR24","doi-asserted-by":"publisher","first-page":"3685","DOI":"10.1007\/s00330-015-3794-0","volume":"25","author":"KY Aryanto","year":"2015","unstructured":"Aryanto, K. Y., Oudkerk, M., and van Ooijen, P. M., Free DICOM de-identification tools in clinical research: Functioning and safety of patient privacy. Eur. Radiol. 25(12):3685\u20133695, 2015. doi: 10.1007\/s00330-015-3794-0 .","journal-title":"Eur. Radiol."},{"key":"514_CR25","first-page":"291","volume":"2","author":"MK Vairalkar","year":"2012","unstructured":"Vairalkar, M. K., and Nimbhorkar, S. U., Edge detection of images using Sobel operator. Int. J. Emerg. Technol. Adv. Eng. 2:291\u2013293, 2012. ISSN 2250\u20132459.","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"key":"514_CR26","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of rijndael: AES - the advanced encryption standard","author":"J Daemen","year":"2002","unstructured":"Daemen, J., and Rijmen, V., The design of rijndael: AES - the advanced encryption standard. Springer, Berlin Germany, 2002."},{"issue":"2","key":"514_CR27","first-page":"6","volume":"1","author":"J Thakur","year":"2011","unstructured":"Thakur, J., and Kumar, N., DES, AES and blowfish: Symmetric key cryptography algorithms simulation based performance analysis. Int. J. Emerg. Technol. Adv. Eng. 1(2):6\u201312, 2011. ISSN 2250\u20132459.","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"key":"514_CR28","doi-asserted-by":"publisher","unstructured":"Ker, A. D., and B\u00f6hme, R., Revisiting weighted stego-image steganalysis. In: Delp, E. J., Wong, P. W., Dittmann, J., Memon, N. D. (Ed.) Security, Forensics, Steganography, and Watermarking of Multimedia Contents X (Proc of SPIE), Volume 6819, San Jose, CA, 2008. doi: 10.1117\/12.766820 .","DOI":"10.1117\/12.766820"},{"key":"514_CR29","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/11558859_22","volume-title":"Lect notes comput Sc, 7th international workshop","author":"AD Ker","year":"2005","unstructured":"Ker, A. D., A general framework for the structural steganalysis of LSB replacement. In: Barni, M., Herrera, J., Katzenbeisser, S., and P\u00e9rez-Gonz\u00e1lez, F. (Eds.), Lect notes comput Sc, 7th international workshop, vol. 3727. Springer, Berlin, pp. 296\u2013311, 2005. doi: 10.1007\/11558859_22 ."},{"key":"514_CR30","unstructured":"Jessica Fridrich. Structural LSB detectors. http:\/\/dde.binghamton.edu\/download\/structural_lsb_detectors\/ . Accessed 16 December 2015."},{"issue":"3","key":"514_CR31","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s10916-008-9176-2","volume":"33","author":"J Nayak","year":"2009","unstructured":"Nayak, J., Bhat, P. S., Rajendra Acharya, U., and Sathish Kumar, M., Efficient storage and transmission of digital fundus images with patient information using reversible watermarking technique and error control codes. J. Med. Syst. 33(3):163\u2013171, 2009. doi: 10.1007\/s10916-008-9176-2 .","journal-title":"J. Med. Syst."}],"container-title":["Journal of Medical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0514-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10916-016-0514-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10916-016-0514-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T04:51:03Z","timestamp":1559451063000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10916-016-0514-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,11]]},"references-count":31,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["514"],"URL":"https:\/\/doi.org\/10.1007\/s10916-016-0514-5","relation":{},"ISSN":["0148-5598","1573-689X"],"issn-type":[{"value":"0148-5598","type":"print"},{"value":"1573-689X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,11]]},"article-number":"156"}}