{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:00:36Z","timestamp":1730343636651,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.23919\/icact.2018.8323796","type":"proceedings-article","created":{"date-parts":[[2018,4,11]],"date-time":"2018-04-11T17:11:35Z","timestamp":1523466695000},"page":"463-467","source":"Crossref","is-referenced-by-count":2,"title":["Secure medical image-sharing mechanism based on visual cryptography in EHR system"],"prefix":"10.23919","author":[{"given":"Dana","family":"Yang","sequence":"first","affiliation":[]},{"given":"Inshil","family":"Doh","sequence":"additional","affiliation":[]},{"given":"KiJoon","family":"Chae","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Security Analysis of salt|| password Hashes","author":"praveen","year":"2012","journal-title":"Advanced Computer Science Applications and Technologies (ACSAT) 2012 International Conference on"},{"key":"ref11","article-title":"Securing telehealth applications in a Web-based e-health portal","author":"qian","year":"2008","journal-title":"Availability Reliability and Security 2008 ARES 08 Third International Conference on"},{"journal-title":"openEMR Homepage","year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/S0031-3203(98)00091-0","article-title":"An overlap invariant entropy measure of 3D medical image alignment","volume":"32","author":"colin","year":"1999","journal-title":"Pattern Recognition"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICBECS.2010.5462323"},{"key":"ref3","article-title":"Privacy protection and security in eHealth cloud platform for medical image sharing","author":"johann","year":"2016","journal-title":"The 2nd International Conference on Advanced Technologies for Signal and Image Processing - ATSIP'2016"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICETECT.2011.5760187"},{"key":"ref5","first-page":"1","article-title":"Visual Cryptography","author":"naor","year":"1995","journal-title":"Advances in Cryptology &#x2014; Eurocrypt &#x2018;94 Proceedings (Lecture Notes in Computer Science 950)"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"adi","year":"1979","journal-title":"Communications of the ACM"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1109\/ICOIN.2017.7899514","article-title":"Enhanced password processing scheme based on visual cryptography and OCR","author":"dana","year":"2017","journal-title":"Information Networking (ICOIN) 2017 International Conference on"},{"key":"ref2","article-title":"Security models and requirements for healthcare application clouds","author":"rui","year":"2010","journal-title":"Cloud Computing (CLOUD) 2010 IEEE 3rd International Conference on"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1145\/1118890.1118891","article-title":"A survey and analysis of electronic healthcare record standards","volume":"37","author":"marco","year":"2005","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1109\/TIFS.2011.2167229","article-title":"A Probabilistic Model of (t, n) Visual Cryptography Scheme With Dynamic Group","volume":"7","author":"sian-jheng","year":"2012","journal-title":"IEEE Transactions on Information Forensics and Security"}],"event":{"name":"2018 20th International Conference on Advanced Communications Technology (ICACT)","start":{"date-parts":[[2018,2,11]]},"location":"Chuncheon-si Gangwon-do, Korea (South)","end":{"date-parts":[[2018,2,14]]}},"container-title":["2018 20th International Conference on Advanced Communication Technology (ICACT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8318543\/8323471\/08323796.pdf?arnumber=8323796","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T02:11:33Z","timestamp":1598235093000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8323796\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":13,"URL":"https:\/\/doi.org\/10.23919\/icact.2018.8323796","relation":{},"subject":[],"published":{"date-parts":[[2018,2]]}}}