{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T13:59:38Z","timestamp":1771509578944,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T00:00:00Z","timestamp":1663200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T00:00:00Z","timestamp":1663200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s11042-022-13686-2","type":"journal-article","created":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T07:03:41Z","timestamp":1663225421000},"page":"9533-9547","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Deep anonymization of medical imaging"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5387-7100","authenticated-orcid":false,"given":"Lobna","family":"Fezai","sequence":"first","affiliation":[]},{"given":"Thierry","family":"Urruty","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Bourdon","sequence":"additional","affiliation":[]},{"given":"Chrsitine","family":"Fernandez-Maloigne","sequence":"additional","affiliation":[]},{"name":"for the Alzheimer\u2019s Disease Neuroimaging Initiative","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,15]]},"reference":[{"key":"13686_CR1","doi-asserted-by":"crossref","unstructured":"Bengio Y (2009) Learning deep architectures for AI. Now Publishers Inc","DOI":"10.1561\/9781601982957"},{"issue":"8","key":"13686_CR2","doi-asserted-by":"publisher","first-page":"1798","DOI":"10.1109\/TPAMI.2013.50","volume":"35","author":"Y Bengio","year":"2013","unstructured":"Bengio Y, Courville A, Vincent P (2013) Representation learning: a review and new perspectives. IEEE Trans Pattern Anal Mach Intell 35(8):1798\u20131828","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"13686_CR3","unstructured":"Bernau D, Grassal P-W, Robl J, Kerschbaum F (2019) Assessing differentially private deep learning with membership inference. arXiv:1912.11328"},{"key":"13686_CR4","unstructured":"Chen M, Shi X, Zhang Y, Wu D, Guizani M (2017) Deep features learning for medical image analysis with convolutional autoencoder neural network. IEEE Transactions on Big Data"},{"key":"13686_CR5","unstructured":"Doersch C (2016) Tutorial on variational autoencoders. arXiv:1606.05908"},{"issue":"6433","key":"13686_CR6","doi-asserted-by":"publisher","first-page":"1287","DOI":"10.1126\/science.aaw4399","volume":"363","author":"SG Finlayson","year":"2019","unstructured":"Finlayson S G, Bowers J D, Ito J, Zittrain J L, Beam A L, Kohane I S (2019) Adversarial attacks on medical machine learning. Science 363 (6433):1287\u20131289","journal-title":"Science"},{"key":"13686_CR7","doi-asserted-by":"crossref","unstructured":"Gatys L A, Ecker A S, Bethge M (2016) Image style transfer using convolutional neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2414\u20132423","DOI":"10.1109\/CVPR.2016.265"},{"key":"13686_CR8","doi-asserted-by":"publisher","first-page":"103528","DOI":"10.1016\/j.jbi.2020.103528","volume":"110","author":"CE Gillies","year":"2020","unstructured":"Gillies C E, Taylor D F, Cummings B C, Ansari S, Islim F, Kronick S L, Medlin Jr R P, Ward K R (2020) Demonstrating the consequences of learning missingness patterns in early warning systems for preventative health care: a novel simulation and solution. J Biomed Inform 110:103528","journal-title":"J Biomed Inform"},{"key":"13686_CR9","doi-asserted-by":"crossref","unstructured":"Gondara L (2016) Medical image denoising using convolutional denoising autoencoders. In: 2016 IEEE 16th International conference on data mining workshops (ICDMW). IEEE, pp 241\u2013246","DOI":"10.1109\/ICDMW.2016.0041"},{"key":"13686_CR10","doi-asserted-by":"crossref","unstructured":"Hamidian S, Sahiner B, Petrick N, Pezeshk A (2017) 3d convolutional neural network for automatic detection of lung nodules in chest ct. In: Medical imaging 2017: computer-aided diagnosis, vol 10134. International Society for Optics and Photonics, p 1013409","DOI":"10.1117\/12.2255795"},{"issue":"5","key":"13686_CR11","first-page":"576","volume":"5","author":"JP Howard","year":"2019","unstructured":"Howard J P, Fisher L, Shun-Shin M J, Keene D, Arnold A D, Ahmad Y, Cook C M, Moon J C, Manisty C H, Whinnett Z I et al (2019) Cardiac rhythm device identification using neural networks. JACC: Clin Electrophysiol 5(5):576\u2013586","journal-title":"JACC: Clin Electrophysiol"},{"key":"13686_CR12","doi-asserted-by":"crossref","unstructured":"Jafari H, Omotere O, Adesina D, Wu H-H, Qian L (2018) Iot devices fingerprinting using deep learning. In: MILCOM 2018-2018 IEEE military communications conference (MILCOM). IEEE, pp 1\u20139","DOI":"10.1109\/MILCOM.2018.8599826"},{"issue":"12","key":"13686_CR13","first-page":"e22739","volume":"22","author":"YU Jeong","year":"2020","unstructured":"Jeong Y U, Yoo S, Kim Y-H, Shim W H (2020) De-identification of facial features in magnetic resonance images: software development using deep learning technology. J Med Int Res 22(12):e22739","journal-title":"J Med Int Res"},{"key":"13686_CR14","unstructured":"Jordon J, Jarrett D, Yoon J, Elbers P, Thoral P, Ercole A, Zhang C, Belgrave D, van der Schaar M (2020) Hide-and-seek privacy challenge synthetic data generation vs. patient re-identification with clinical time-series data"},{"key":"13686_CR15","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.media.2016.10.004","volume":"36","author":"K Kamnitsas","year":"2017","unstructured":"Kamnitsas K, Ledig C, Newcombe VF, Simpson J P, Kane A D, Menon D K, Rueckert D, Glocker B (2017) Efficient multi-scale 3d cnn with fully connected crf for accurate brain lesion segmentation. Med Image Anal 36:61\u201378","journal-title":"Med Image Anal"},{"key":"13686_CR16","doi-asserted-by":"crossref","unstructured":"Kharrazi M, Sencar H T, Memon N (2004) Blind source camera identification. In: 2004 International conference on image processing, 2004. ICIP\u201904, vol 1. IEEE, pp 709\u2013712","DOI":"10.1109\/ICIP.2004.1418853"},{"key":"13686_CR17","doi-asserted-by":"publisher","first-page":"84992","DOI":"10.1109\/ACCESS.2019.2924479","volume":"7","author":"T Kim","year":"2019","unstructured":"Kim T, Yang J (2019) Latent-space-level image anonymization with adversarial protector networks. IEEE Access 7:84992\u201384999. https:\/\/doi.org\/10.1109\/ACCESS.2019.2924479","journal-title":"IEEE Access"},{"key":"13686_CR18","doi-asserted-by":"crossref","unstructured":"Kotak J, Elovici Y (2020) Iot device identification using deep learning. In: Conference on complex, intelligent, and software intensive systems. Springer, pp 76\u201386","DOI":"10.1007\/978-3-030-57805-3_8"},{"key":"13686_CR19","doi-asserted-by":"crossref","unstructured":"Kuppa A, Aouad L, Le-Khac N-A (2021) Towards improving privacy of synthetic datasets. In: Annual privacy forum. Springer, pp 106\u2013119","DOI":"10.1007\/978-3-030-76663-4_6"},{"issue":"1","key":"13686_CR20","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/72.554195","volume":"8","author":"S Lawrence","year":"1997","unstructured":"Lawrence S, Giles C L, Tsoi A C, Back A D (1997) Face recognition: a convolutional neural-network approach. IEEE Trans Neur Netw 8(1):98\u2013113","journal-title":"IEEE Trans Neur Netw"},{"issue":"10","key":"13686_CR21","first-page":"1995","volume":"3361","author":"Y LeCun","year":"1995","unstructured":"LeCun Y, Bengio Y, et al. (1995) Convolutional networks for images, speech, and time series. Handbook Brain Theory Neural Netw 3361(10):1995","journal-title":"Handbook Brain Theory Neural Netw"},{"issue":"7553","key":"13686_CR22","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521(7553):436\u2013444","journal-title":"Nature"},{"key":"13686_CR23","doi-asserted-by":"crossref","unstructured":"Li A, Duan Y, Yang H, Chen Y, Yang J (2020) Tiprdc: task-independent privacy-respecting data crowdsourcing framework for deep learning with anonymized intermediate representations. In: Proceedings of the 26th ACM SIGKDD international conference on knowledge discovery & data mining, pp 824\u2013832","DOI":"10.1145\/3394486.3403125"},{"key":"13686_CR24","unstructured":"Livraga G, Paraboschi S First report on privacy metrics and data sanitisation"},{"key":"13686_CR25","doi-asserted-by":"crossref","unstructured":"Lu X, Tsao Y, Matsuda S, Hori C (2013) Speech enhancement based on deep denoising autoencoder. In: Interspeech, vol 2013, pp 436\u2013440","DOI":"10.21437\/Interspeech.2013-130"},{"key":"13686_CR26","unstructured":"Makhzani A, Frey B (2013) K-sparse autoencoders. arXiv:1312.5663"},{"key":"13686_CR27","unstructured":"Makhzani A, Shlens J, Jaitly N, Goodfellow I, Frey B (2015) Adversarial autoencoders. arXiv:1511.05644"},{"issue":"1","key":"13686_CR28","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1109\/JSTSP.2018.2796446","volume":"12","author":"K Merchant","year":"2018","unstructured":"Merchant K, Revay S, Stantchev G, Nousain B (2018) Deep learning for rf device fingerprinting in cognitive communication networks. IEEE J Selected Topics Signal Process 12(1):160\u2013167","journal-title":"IEEE J Selected Topics Signal Process"},{"issue":"5","key":"13686_CR29","doi-asserted-by":"publisher","first-page":"1240","DOI":"10.1109\/TMI.2016.2538465","volume":"35","author":"S Pereira","year":"2016","unstructured":"Pereira S, Pinto A, Alves V, Silva C A (2016) Brain tumor segmentation using convolutional neural networks in mri images. IEEE Trans Med Imag 35(5):1240\u20131251","journal-title":"IEEE Trans Med Imag"},{"issue":"1","key":"13686_CR30","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1038\/s41591-018-0272-7","volume":"25","author":"WN Price","year":"2019","unstructured":"Price W N, Cohen I G (2019) Privacy in the age of medical big data. Nat Med 25(1):37\u201343","journal-title":"Nat Med"},{"key":"13686_CR31","doi-asserted-by":"crossref","unstructured":"Riedmiller M, Braun H (1993) A direct adaptive method for faster backpropagation learning: the rprop algorithm. In: IEEE international conference on neural networks. IEEE, pp 586\u2013591","DOI":"10.1109\/ICNN.1993.298623"},{"issue":"9","key":"13686_CR32","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/MCOM.2018.1800153","volume":"56","author":"S Riyaz","year":"2018","unstructured":"Riyaz S, Sankhe K, Ioannidis S, Chowdhury K (2018) Deep learning convolutional neural networks for radio identification. IEEE Commun Mag 56(9):146\u2013152","journal-title":"IEEE Commun Mag"},{"key":"13686_CR33","doi-asserted-by":"crossref","unstructured":"Ronneberger O, Fischer P, Brox T (2015) U-net: convolutional networks for biomedical image segmentation. In: International conference on medical image computing and computer-assisted intervention. Springer, pp 234\u2013241","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"13686_CR34","doi-asserted-by":"crossref","unstructured":"Ryu J, Zheng Y, Gao Y, Abuadbba S, Kim J, Won D, Nepal S, Kim H, Wang C (2021) Can differential privacy practically protect collaborative deep learning inference for the internet of things? arXiv\u20132104","DOI":"10.1007\/s11276-022-03113-7"},{"key":"13686_CR35","doi-asserted-by":"crossref","unstructured":"Shen W, Zhou M, Yang F, Yang C, Tian J (2015) Multi-scale convolutional neural networks for lung nodule classification. In: International conference on information processing in medical imaging. Springer, pp 588\u2013599","DOI":"10.1007\/978-3-319-19992-4_46"},{"key":"13686_CR36","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.neubiorev.2017.01.002","volume":"74","author":"S Vieira","year":"2017","unstructured":"Vieira S, Pinaya WH, Mechelli A (2017) Using deep learning to investigate the neuroimaging correlates of psychiatric and neurological disorders: methods and applications. Neurosci Biobehav Rev 74:58\u201375","journal-title":"Neurosci Biobehav Rev"},{"key":"13686_CR37","unstructured":"Vinyals O, Blundell C, Lillicrap T, Wierstra D et al (2016) Matching networks for one shot learning. Advances in Neural Information Processing Systems, 29"},{"issue":"24","key":"13686_CR38","doi-asserted-by":"publisher","first-page":"1405","DOI":"10.1049\/el.2018.6404","volume":"54","author":"Q Wu","year":"2018","unstructured":"Wu Q, Feres C, Kuzmenko D, Zhi D, Yu Z, Liu X, et al. (2018) Deep learning based rf fingerprinting for device identification and wireless security. Electron Lett 54(24):1405\u20131407","journal-title":"Electron Lett"},{"key":"13686_CR39","unstructured":"Xie L, Lin K, Wang S, Wang F, Zhou J (2018) Differentially private generative adversarial network"},{"key":"13686_CR40","unstructured":"Xu R (2020) Functional encryption based approaches for practical privacy-preserving machine learning. Ph.D. Thesis. University of Pittsburgh"},{"issue":"8","key":"13686_CR41","doi-asserted-by":"publisher","first-page":"2378","DOI":"10.1109\/JBHI.2020.2980262","volume":"24","author":"J Yoon","year":"2020","unstructured":"Yoon J, Drumright L N, Van Der Schaar M (2020) Anonymization through data synthesis using generative adversarial networks (ads-gan). IEEE J Biomed Health Inform 24(8):2378\u20132388","journal-title":"IEEE J Biomed Health Inform"},{"key":"13686_CR42","unstructured":"Yu D, Zhang H, Chen W, Liu T-Y (2021) Do not let privacy overbill utility: gradient embedding perturbation for private learning. arXiv\u20132102"},{"key":"13686_CR43","doi-asserted-by":"crossref","unstructured":"Zhao H, Shi J, Qi X, Wang X, Jia J (2017) Pyramid scene parsing network. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 2881\u20132890","DOI":"10.1109\/CVPR.2017.660"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13686-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13686-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13686-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T09:39:40Z","timestamp":1677058780000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13686-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,15]]},"references-count":43,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["13686"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13686-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,15]]},"assertion":[{"value":"10 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 August 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}