참고문헌
- "Health information networks gain wider use." [Online]. Available: http://www.amaassn.org/amednews/2009/08/17/bisb0817.htm.
- F. A. Allaert and L. Dusserre, "Security of health information system in France: what we do will no longer be different from what we tell," International Journal of Bio-Medical Computing, vol. 35, pp. 201-204, Feb. 1994.
- A. Armoni, Healthcare information systems: challenges of the new millennium. Idea Group Inc (IGI), 2000.
- P. Jennett, M. Watanabe, E. Igras, K. Premkumar, and W. Hall, "Telemedicine and security. Confidentiality, integrity, and availability: a Canadian perspective," Studies in Health Technology and Informatics, vol. 29, pp. 286-298, 1996.
- S. K. Katsikas and D. Gritzalis, Information systems security: facing the information society of the 21st century. Chapman & Hall, 1996.
- Mousavi, S.M.; Naghsh, A.; Abu-Bakar, S.A.R. Watermarking techniques used in medical images: A survey. J. Digit. Imaging 2014, 27, 714-729. [CrossRef] [PubMed] https://doi.org/10.1007/s10278-014-9700-5
- Nyeem, H.; Boles,W.; Boyd, C. A review of medical image watermarking requirements for teleradiology. J. Digit. Imaging 2013, 26, 326-343. [CrossRef] https://doi.org/10.1007/s10278-012-9527-x
- Pan, J.S., Huang, H.-C., Jain, L.C. (eds.): Intelligent Watermarking Techniques. World Scientific, Singapore (2004)
- van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark. Proc. IEEE Int. Conf. Image Processing (ICIP 1994), November 1994, vol. 2, pp. 86-90 (1994)
- Tirkel, A.Z., Rankin, G.A., van Schyndel, R.M., Ho, W.J., Mee, N.R.A., Osborne, C.F.: Electronic water mark. In: Digital Image Computing Techniques and Applications 1993, pp. 666-672 (1993)
- Wolfgang, R.B., Delp, E.J.: Overview of image security techniques with applications in multimedia systems. In: Proc. SPIE Conf. Multimedia Networks: Security,Displays, Terminals, and Gateways, pp. 297-308 (1997)
- Voyatzis, G., Pitas, I.: Chaotic watermarks for embedding in the spatial digitalimage domain. In: Proc. IEEE Int'l Conf. Image Processing, pp. 432-436 (1998)
- Langelaar, G.C., Setyawan, I., Lagendijk, R.L.: Watermarking digital image andvideo data: A state-of-the-art overview. IEEE Signal Processing Magazine 17, 20-46 (2000) https://doi.org/10.1109/79.879337
- Hernandez, J.R., Perez-Gonzalez, F., Rodriguez, J.M.: The impact of channel coding on the performance of spatial watermarking for copyright protection. In: Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, pp. 2973-2976
- Wang, F.H., Jain, L.C., Pan, J.S.: Genetic watermarking techniques based on spatial domain. In: Proc. 6th Int. Conf. on Knowledge-Based Intelligent Information and Engineering System (KES 2002), Crema, Italy, September 2002, pp.417-422. IOS Press, Amsterdam (2002)
- Navas KA, Sasikumar M: Survey of medical image watermarking algorithms, in International Conference: Sciences of Electronic Technologies of Information and Telecommunications. TUNISIA, 2007, pp 1-6.
- Al-Qershi OM, Khoo BE: Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOMimages. J Digit Imaging 24(1):114-125, 2011 https://doi.org/10.1007/s10278-009-9253-1
- Memon NA, Gilani SAM: Watermarking of chest CT scan medical images for content authentication. Int J Comput Math 88(2):265-280, 2010 https://doi.org/10.1080/00207161003596690
- Zain JM, Clarke M: Reversible region of non-interest (RONI) watermarking for authentication of DICOM images. Int J Comput Sci Netw Secur 7(9):19-28, 2007
- Wakatani A: Digital watermarking for ROI medical images by using compressed signature image, in System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on. pp 2043-2048,2002.
- Viswanathan P, Krishna PV: Fusion of cryptographic watermarking medical image system with reversible property, in Computer Networks and Intelligent Computing.In: Venugopal KR, Patnaik LM Eds. Springer Berlin: Heidelberg, 2011, pp 533-540.
- Memon NA, Chaudhry A, Ahmad M, Keerio ZA: Hybrid watermarking of medical images for ROI authentication and recovery. Int J Comput Math 88(10):2057-2071, 2011 https://doi.org/10.1080/00207160.2010.543677