{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:43:41Z","timestamp":1771613021691,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,17]]},"DOI":"10.1145\/3465481.3470072","type":"proceedings-article","created":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T17:57:21Z","timestamp":1629136641000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Risks and Opportunities for Information Hiding in DICOM Standard"],"prefix":"10.1145","author":[{"given":"Aleksandra","family":"Mileva","sequence":"first","affiliation":[{"name":"Faculty of Computer Science, University Goce Delcev, Stip, MK"}]},{"given":"Luca","family":"Caviglione","sequence":"additional","affiliation":[{"name":"National Research Council of Italy, IT"}]},{"given":"Aleksandar","family":"Velinov","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science, University Goce Delcev, Stip, MK"}]},{"given":"Steffen","family":"Wendzel","sequence":"additional","affiliation":[{"name":"Hochschule Worms,Worms; FernUniversit\u00e4t in Hagen, Hagen, DE"}]},{"given":"Vesna","family":"Dimitrova","sequence":"additional","affiliation":[{"name":"FCSE, University Ss.Cyril and Methodius, Skopje, MK"}]}],"member":"320","published-online":{"date-parts":[[2021,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2012.11.002"},{"key":"e_1_3_2_1_2_1","volume-title":"Wireless Personal Communications","author":"Bala Krishnan R.","year":"2021","unstructured":"[2] R. Bala Krishnan, N. Rajesh Kumar, N.R. Raajan, et al.: \u201c An Approach for Attaining Content Confidentiality on Medical Images Through Image Encryption with Steganography,\u201d Wireless Personal Communications, 2021."},{"key":"e_1_3_2_1_3_1","volume-title":"McAfee blogs. https:\/\/securingtomorrow.mcafee.com\/otherblogs\/mcafee-labs\/mcafee-researchers-findpoor-security-exposes-medical-data-tocybercriminals\/","author":"Beek C.","year":"2021","unstructured":"[3] C. Beek: \u201cMcAfee Researchers Find Poor Security Exposes Medical Data to Cybercriminals,\u201d McAfee blogs. https:\/\/securingtomorrow.mcafee.com\/otherblogs\/mcafee-labs\/mcafee-researchers-findpoor-security-exposes-medical-data-tocybercriminals\/, 2021. (Accessed on 17\/02\/2021)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0895-6111(02)00073-3"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3048319"},{"key":"e_1_3_2_1_6_1","volume-title":"HITBSecConf","author":"Duggal A.","year":"2017","unstructured":"[6] A. Duggal: \u201cIs There a Doctor in The House? Hacking Medical Devices and Healthcare Infrastructure,\u201d HITBSecConf 2017."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2019.00091"},{"key":"e_1_3_2_1_8_1","first-page":"40","article-title":"Sensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images","author":"Mantos P. L. K.","unstructured":"[8] P. L. K. Mantos, I. Maglogiannis: \u201cSensitive Patient Data Hiding using a ROI Reversible Steganography Scheme for DICOM Images,\u201d J Med Syst, pp. 40-156, DOI 10.1007\/s10916-016-0514-5, 2016.","journal-title":"J Med Syst"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2350994"},{"key":"e_1_3_2_1_10_1","first-page":"461","volume-title":"Proceedings of the 28th USENIX Conference on Security Symposium","author":"Mirsky Y.","year":"2019","unstructured":"[10] Y. Mirsky, T. Mahler, I. Shelef, Y. Elovici: \u201cCT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning,\u201d in Proceedings of the 28th USENIX Conference on Security Symposium, pp. 461-478, 2019."},{"key":"e_1_3_2_1_11_1","unstructured":"[11] M. P. Ortiz (d00rt): \u201cAttacking Digital Imaging and Communication in Medicine (DICOM) file format standard \u201d. https:\/\/github.com\/d00rt\/pedicom\/doc."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10850-1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CONIELECOMP.2007.14"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-010-9295-4"},{"key":"e_1_3_2_1_15_1","first-page":"168774","volume-title":"Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain,\u00b4\u00b4 IEEE Access","author":"Razaque A.","year":"2019","unstructured":"[15] A. Razaque, F. Amsaad, M. J. Khan, S. Hariri, S. Chen, C. Siting, X. Ji, \u201cSurvey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain,\u00b4\u00b4 IEEE Access, Vol. 7, pp. 168774-168797, 2019."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2009.5334807"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3341493"}],"event":{"name":"ARES 2021: The 16th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2021"},"container-title":["Proceedings of the 16th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465481.3470072","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3465481.3470072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:24Z","timestamp":1750191444000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465481.3470072"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,17]]},"references-count":17,"alternative-id":["10.1145\/3465481.3470072","10.1145\/3465481"],"URL":"https:\/\/doi.org\/10.1145\/3465481.3470072","relation":{},"subject":[],"published":{"date-parts":[[2021,8,17]]},"assertion":[{"value":"2021-08-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}