{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T12:43:01Z","timestamp":1771072981182,"version":"3.50.1"},"reference-count":33,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2003,5,1]],"date-time":"2003-05-01T00:00:00Z","timestamp":1051747200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers in Biology and Medicine"],"published-print":{"date-parts":[[2003,5]]},"DOI":"10.1016\/s0010-4825(02)00094-x","type":"journal-article","created":{"date-parts":[[2003,4,30]],"date-time":"2003-04-30T22:23:46Z","timestamp":1051741426000},"page":"277-292","source":"Crossref","is-referenced-by-count":69,"title":["Confidential storage and transmission of medical image data"],"prefix":"10.1016","volume":"33","author":[{"given":"R.","family":"Norcen","sequence":"first","affiliation":[]},{"given":"M.","family":"Podesser","sequence":"additional","affiliation":[]},{"given":"A.","family":"Pommer","sequence":"additional","affiliation":[]},{"given":"H.-P.","family":"Schmidt","sequence":"additional","affiliation":[]},{"given":"A.","family":"Uhl","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/S0010-4825(02)00094-X_BIB1","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1109\/5.364466","article-title":"Radiologic image compression\u2014a review","volume":"83","author":"Wong","year":"1995","journal-title":"Proc. IEEE"},{"issue":"6","key":"10.1016\/S0010-4825(02)00094-X_BIB2","doi-asserted-by":"crossref","first-page":"919","DOI":"10.1109\/5.286196","article-title":"Evaluating quality of compressed medical images","volume":"82","author":"Cosman","year":"1994","journal-title":"Proc. IEEE"},{"issue":"3","key":"10.1016\/S0010-4825(02)00094-X_BIB3","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/S0010-4825(00)00004-4","article-title":"Selective medical image compression techniques for telemedical and archiving applications","volume":"30","author":"Bruckmann","year":"2000","journal-title":"Comput. Biol. Med."},{"key":"10.1016\/S0010-4825(02)00094-X_BIB4","unstructured":"I.L. Bajec, P. Trunk, N. Zimic, D. Oseli, Virtual coronary cineangiography, Comput. Biol. Med. (2003), to appear."},{"key":"10.1016\/S0010-4825(02)00094-X_BIB5","doi-asserted-by":"crossref","unstructured":"P. Trunk, B. Gersak, R. Trobec, Topical cardiac cooling\u2014computer simulation of myocardial temperature changes, Comput. Biol. Med. (2003), to appear.","DOI":"10.1016\/S0010-4825(02)00087-2"},{"key":"10.1016\/S0010-4825(02)00094-X_BIB6","series-title":"The Design of Rijndael: AES\u2014the Advanced Encryption Standard","author":"Daemen","year":"2002"},{"key":"10.1016\/S0010-4825(02)00094-X_BIB7","unstructured":"B. Schneier, Applied Cryptography, 2nd Edition: Protocols, Algorithms and Source Code in C, Wiley Publishers, New York, 1996."},{"issue":"3","key":"10.1016\/S0010-4825(02)00094-X_BIB8","first-page":"437","article-title":"Comparison of MPEG encryption algorithms","volume":"22","author":"Qiao","year":"1998","journal-title":"Int. J. Comput. Graphics (Special Issue Data Security Image Commun. Networks)"},{"key":"10.1016\/S0010-4825(02)00094-X_BIB9","doi-asserted-by":"crossref","unstructured":"I. Agi, L. Gong, An empirical study of secure MPEG video transmissions, in: ISOC Symposium on Network and Distributed Systems Security, San Diego, CA, 1996, pp. 137\u2013144.","DOI":"10.1109\/NDSS.1996.492420"},{"key":"10.1016\/S0010-4825(02)00094-X_BIB10","doi-asserted-by":"crossref","unstructured":"A.M. Alattar, G.I. Al-Regib, S.A. Al-Semari, Improved selective encryption techniques for secure transmission of MPEG video bit-streams, in: Proceedings of the 1999 IEEE International Conference on Image Processing (ICIP\u201999), IEEE Signal Processing Society, 1999.","DOI":"10.1109\/ICIP.1999.819590"},{"key":"10.1016\/S0010-4825(02)00094-X_BIB11","unstructured":"Thomas Kunkelmann, Applying encryption to video communication, in: Proceedings of the Multimedia and Security Workshop at ACM Multimedia \u201998, Bristol, England, September 1998, pp. 41\u201347."},{"key":"10.1016\/S0010-4825(02)00094-X_BIB12","unstructured":"T. Maples, G. Spanos, Performance study of a selective encryption scheme for the security of networked real-time video, in: Proceedings of the Fourth International Conference on Computer Communications and Networks (ICCCN\u201995), Las Vegas, NV, 1995."},{"key":"10.1016\/S0010-4825(02)00094-X_BIB13","unstructured":"P.A. Schneck, K. Schwan, Authenticast: an adaptive protocol for high-performance, secure network applications, Technical Report, Georgia Institute of Technology, Atlanta, GA, USA, 1997."},{"key":"10.1016\/S0010-4825(02)00094-X_BIB14","doi-asserted-by":"crossref","unstructured":"C. Shi, B. Bhargava, A fast MPEG video encryption algorithm, in: Proceedings of the ACM Multimedia 1998, Boston, USA, 1998, pp. 81\u201388.","DOI":"10.1145\/290747.290758"},{"key":"10.1016\/S0010-4825(02)00094-X_BIB15","doi-asserted-by":"crossref","unstructured":"L. Tang, Methods for encrypting and decrypting MPEG video data efficiently, in: Proceedings of the ACM Multimedia 1996, Boston, USA, November 1996, pp. 219\u2013229.","DOI":"10.1145\/244130.244209"},{"key":"10.1016\/S0010-4825(02)00094-X_BIB16","unstructured":"Tsung-Li Wu, S. Felix Wu, Selective encryption and watermarking of MPEG video (extended abstract), in: H.R. Arabnia (Ed.), Proceedings of the International Conference on Image Science, Systems, and Technology, CISST \u201997, Las Vegas, USA, February 1997."},{"key":"10.1016\/S0010-4825(02)00094-X_BIB17","doi-asserted-by":"crossref","unstructured":"Wenjun Zeng, Shawmin Lei, Efficient frequency domain video scrambling for content access control, in: Proceedings of ACM Multimedia, 1999, Orlando, FL, USA, November 1999, pp. 285\u2013293.","DOI":"10.1145\/319463.319627"},{"key":"10.1016\/S0010-4825(02)00094-X_BIB18","unstructured":"Rapha\u00ebl Grosbois, Pierre Gerbelot, Touradj Ebrahimi, Authentication and access control in the JPEG 2000 compressed domain, in: A.G. Tescher (Ed.), Applications of Digital Image Processing XXIV, Proceedings of SPIE, Vol. 4472, San Diego, CA, USA, July 2001."},{"key":"10.1016\/S0010-4825(02)00094-X_BIB19","doi-asserted-by":"crossref","unstructured":"A. Pommer, A. Uhl, Wavelet packet methods for multimedia compression and encryption, in: Proceedings of the 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Victoria, Canada, August 2001, IEEE Signal Processing Society, 2001, pp. 1\u20134.","DOI":"10.1109\/PACRIM.2001.953508"},{"key":"10.1016\/S0010-4825(02)00094-X_BIB20","unstructured":"A. Pommer, A. Uhl, Selective encryption of wavelet packet subband structures for obscured transmission of visual data, in: Proceedings of the Third IEEE Benelux Signal Processing Symposium (SPS 2002), Leuven, Belgium, March 2002, IEEE Benelux Signal Processing Chapter, 2002, pp. 25\u201328."},{"key":"10.1016\/S0010-4825(02)00094-X_BIB21","unstructured":"T. Uehara, R. Safavi-Naini, P. Ogunbona, Securing wavelet compression with random permutations, in: Proceedings of the 2000 IEEE Pacific Rim Conference on Multimedia, Sydney, December 2000, IEEE Signal Processing Society, pp. 332\u2013335."},{"key":"10.1016\/S0010-4825(02)00094-X_BIB22","doi-asserted-by":"crossref","unstructured":"H. Cheng, X. Li, On the application of image decomposition to image compression and encryption, in: P. Horster (Ed.), Communications and Multimedia Security II, IFIP TC6\/TC11 Second Joint Working Conference on Communications and Multimedia Security, CMS \u201996, Essen, Germany, September 1996, Chapman & Hall, London, pp. 116\u2013127.","DOI":"10.1007\/978-0-387-35083-7_11"},{"issue":"8","key":"10.1016\/S0010-4825(02)00094-X_BIB23","doi-asserted-by":"crossref","first-page":"2439","DOI":"10.1109\/78.852023","article-title":"Partial encryption of compressed images and videos","volume":"48","author":"Cheng","year":"2000","journal-title":"IEEE Trans. Signal Process."},{"key":"10.1016\/S0010-4825(02)00094-X_BIB24","unstructured":"M. Podesser, H.-P. Schmidt, A. Uhl, Selective bitplane encryption for secure transmission of image data in mobile environments, CD-ROM in: Proceedings of the Fifth IEEE Nordic Signal Processing Symposium (NORSIG 2002), Tromso-Trondheim, Norway, October 2002, file cr1037.pdf, IEEE Norway Section."},{"key":"10.1016\/S0010-4825(02)00094-X_BIB25","doi-asserted-by":"crossref","unstructured":"Ali Saman Tosun, Wu Chi Feng, On error preserving encryption algorithms for wireless video transmission, in: ACM Multimedia 2001, Ottawa, Canada, October 2001, pp. 302\u2013307.","DOI":"10.1145\/500141.500187"},{"key":"10.1016\/S0010-4825(02)00094-X_BIB26","unstructured":"J. Wen, M. Severa, W. Zeng, M. Luttrell, W. Jin, A format-compliant configurable encryption framework for access control of multimedia, in: Proceedings of the IEEE Workshop on Multimedia Signal Processing, MMSP \u201901, Cannes, France, October 2001, pp. 435\u2013440."},{"key":"10.1016\/S0010-4825(02)00094-X_BIB27","doi-asserted-by":"crossref","unstructured":"C.J. Skrepth, A. Uhl, Selective encryption of visual data: classification of application scenarios and comparison of techniques for lossless environments, in: B. Jerman-Blazic, T. Klobucar (Eds.), Advanced Communications and Multimedia Security, IFIP TC6\/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS \u201902, Portoroz, Slovenia, September 2002, Kluwer Academic Publishing, Dordrecht, 2002, pp. 213\u2013226.","DOI":"10.1007\/978-0-387-35612-9_16"},{"issue":"4","key":"10.1016\/S0010-4825(02)00094-X_BIB28","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1109\/5.488704","article-title":"A review of wavelets in biomedical applications","volume":"84","author":"Unser","year":"1996","journal-title":"Proc. IEEE"},{"key":"10.1016\/S0010-4825(02)00094-X_BIB29","unstructured":"A. Aldroubi, M. Unser (Eds.), Wavelets in Medicine and Biology, CRC, Boca Raton, FL, USA, 1996."},{"key":"10.1016\/S0010-4825(02)00094-X_BIB30","unstructured":"P.N. Topiwala (Ed.), Wavelet Image and Video Compression, Kluwer Academic Publishers Group, Boston, 1998."},{"key":"10.1016\/S0010-4825(02)00094-X_BIB31","series-title":"JPEG2000\u2014Image Compression Fundamentals, Standards and Practice","author":"Taubman","year":"2002"},{"issue":"2","key":"10.1016\/S0010-4825(02)00094-X_BIB32","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1109\/76.752092","article-title":"Scalable wavelet coding for synthetic\/natural hybrid coding","volume":"9","author":"Sodagar","year":"1999","journal-title":"IEEE Trans. Circuits Systems Video Technol."},{"issue":"7","key":"10.1016\/S0010-4825(02)00094-X_BIB33","doi-asserted-by":"crossref","first-page":"1158","DOI":"10.1109\/83.847830","article-title":"High performance scalable image compression with EBCOT","volume":"9","author":"Taubman","year":"2000","journal-title":"IEEE Trans. Image Process."}],"container-title":["Computers in Biology and Medicine"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S001048250200094X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S001048250200094X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,27]],"date-time":"2019-03-27T06:30:07Z","timestamp":1553668207000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S001048250200094X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,5]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2003,5]]}},"alternative-id":["S001048250200094X"],"URL":"https:\/\/doi.org\/10.1016\/s0010-4825(02)00094-x","relation":{},"ISSN":["0010-4825"],"issn-type":[{"value":"0010-4825","type":"print"}],"subject":[],"published":{"date-parts":[[2003,5]]}}}