{"id":"https://openalex.org/W3194011934","doi":"https://doi.org/10.1145/3465481.3470072","title":"Risks and Opportunities for Information Hiding in DICOM Standard","display_name":"Risks and Opportunities for Information Hiding in DICOM Standard","publication_year":2021,"publication_date":"2021-08-16","ids":{"openalex":"https://openalex.org/W3194011934","doi":"https://doi.org/10.1145/3465481.3470072","mag":"3194011934"},"language":"en","primary_location":{"id":"doi:10.1145/3465481.3470072","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3465481.3470072","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004771056","display_name":"Aleksandra Mileva","orcid":"https://orcid.org/0000-0003-0706-6355"},"institutions":[{"id":"https://openalex.org/I4210161475","display_name":"Goce Delcev University","ror":"https://ror.org/058q1cn43","country_code":"MK","type":"education","lineage":["https://openalex.org/I4210161475"]}],"countries":["MK"],"is_corresponding":true,"raw_author_name":"Aleksandra Mileva","raw_affiliation_strings":["Faculty of Computer Science, University Goce Delcev, Stip, MK"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, University Goce Delcev, Stip, MK","institution_ids":["https://openalex.org/I4210161475"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082854095","display_name":"Luca Caviglione","orcid":"https://orcid.org/0000-0001-6466-3354"},"institutions":[{"id":"https://openalex.org/I4210155236","display_name":"National Research Council","ror":"https://ror.org/04zaypm56","country_code":"IT","type":"funder","lineage":["https://openalex.org/I4210155236"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Luca Caviglione","raw_affiliation_strings":["National Research Council of Italy, IT"],"affiliations":[{"raw_affiliation_string":"National Research Council of Italy, IT","institution_ids":["https://openalex.org/I4210155236"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067682131","display_name":"Aleksandar Velinov","orcid":"https://orcid.org/0000-0002-5940-8655"},"institutions":[{"id":"https://openalex.org/I4210161475","display_name":"Goce Delcev University","ror":"https://ror.org/058q1cn43","country_code":"MK","type":"education","lineage":["https://openalex.org/I4210161475"]}],"countries":["MK"],"is_corresponding":false,"raw_author_name":"Aleksandar Velinov","raw_affiliation_strings":["Faculty of Computer Science, University Goce Delcev, Stip, MK"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, University Goce Delcev, Stip, MK","institution_ids":["https://openalex.org/I4210161475"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072118587","display_name":"Steffen Wendzel","orcid":"https://orcid.org/0000-0002-1913-5912"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Steffen Wendzel","raw_affiliation_strings":["Hochschule Worms,Worms; FernUniversit\u00e4t in Hagen, Hagen, DE"],"affiliations":[{"raw_affiliation_string":"Hochschule Worms,Worms; FernUniversit\u00e4t in Hagen, Hagen, DE","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046161546","display_name":"Vesna Dimitrova","orcid":"https://orcid.org/0000-0003-4393-5589"},"institutions":[{"id":"https://openalex.org/I76245029","display_name":"Saints Cyril and Methodius University of Skopje","ror":"https://ror.org/02wk2vx54","country_code":"MK","type":"education","lineage":["https://openalex.org/I76245029"]}],"countries":["MK"],"is_corresponding":false,"raw_author_name":"Vesna Dimitrova","raw_affiliation_strings":["FCSE, University Ss.Cyril and Methodius, Skopje, MK"],"affiliations":[{"raw_affiliation_string":"FCSE, University Ss.Cyril and Methodius, Skopje, MK","institution_ids":["https://openalex.org/I76245029"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5004771056"],"corresponding_institution_ids":["https://openalex.org/I4210161475"],"apc_list":null,"apc_paid":null,"fwci":0.3884,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.6097222,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dicom","display_name":"DICOM","score":0.9565447568893433},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.729036271572113},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.6146350502967834},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.5469366312026978},{"id":"https://openalex.org/keywords/digital-imaging","display_name":"Digital imaging","score":0.47371548414230347},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.42252886295318604},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.42249324917793274},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.38411659002304077},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3300870656967163},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24606949090957642},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.22918224334716797},{"id":"https://openalex.org/keywords/image-processing","display_name":"Image processing","score":0.13720431923866272},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.11180984973907471},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.09223899245262146}],"concepts":[{"id":"https://openalex.org/C77331912","wikidata":"https://www.wikidata.org/wiki/Q81095","display_name":"DICOM","level":2,"score":0.9565447568893433},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.729036271572113},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.6146350502967834},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.5469366312026978},{"id":"https://openalex.org/C112416745","wikidata":"https://www.wikidata.org/wiki/Q974213","display_name":"Digital imaging","level":5,"score":0.47371548414230347},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.42252886295318604},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.42249324917793274},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.38411659002304077},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3300870656967163},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24606949090957642},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.22918224334716797},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.13720431923866272},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.11180984973907471},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.09223899245262146}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3465481.3470072","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3465481.3470072","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.ugd.edu.mk:28393","is_oa":false,"landing_page_url":"https://dl.acm.org/doi/abs/10.1145/3465481.3470072","pdf_url":null,"source":{"id":"https://openalex.org/S4306402353","display_name":"Goce Delchev University Repository (Goce Del\u010dev University of \u0160tip)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210161475","host_organization_name":"Goce Delcev University","host_organization_lineage":["https://openalex.org/I4210161475"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2019144803","https://openalex.org/W2049043878","https://openalex.org/W2069887067","https://openalex.org/W2076003763","https://openalex.org/W2117197462","https://openalex.org/W2171882680","https://openalex.org/W2373489519","https://openalex.org/W2485092916","https://openalex.org/W2910333870","https://openalex.org/W2914630606","https://openalex.org/W2968388194","https://openalex.org/W2969281952","https://openalex.org/W3114468998","https://openalex.org/W3156263119","https://openalex.org/W4211117143"],"related_works":["https://openalex.org/W3203504906","https://openalex.org/W2497446005","https://openalex.org/W2171676767","https://openalex.org/W4312890355","https://openalex.org/W2189589914","https://openalex.org/W1716757876","https://openalex.org/W83713408","https://openalex.org/W4293373802","https://openalex.org/W4318577714","https://openalex.org/W2067360213"],"abstract_inverted_index":{"The":[0],"increasing":[1],"application":[2],"of":[3,34,75,83,135,176,203,213],"ICT":[4],"technologies":[5,79],"to":[6,30,50,59,64,113,117,139,162,180,193],"medicine":[7],"opens":[8],"new":[9],"usage":[10],"patterns.":[11],"Among":[12],"the":[13,16,35,65,72,81,84,126,129,133,163,201,210],"various":[14],"standards,":[15],"Digital":[17],"Imaging":[18],"and":[19,45,53,67,78,98,123,156],"COmmunication":[20],"in":[21,103,150],"Medicine":[22],"(DICOM)":[23],"has":[24],"been":[25],"gaining":[26],"momentum,":[27],"mainly":[28],"due":[29,63],"its":[31,51,93],"complete":[32],"coverage":[33],"diagnostic":[36,115],"pipeline,":[37],"including":[38],"key":[39],"applications":[40],"such":[41],"as":[42,171,173],"CT,":[43],"MRI":[44],"ultrasound":[46],"scanners.":[47],"However,":[48],"owing":[49],"complex":[52,68],"multifaceted":[54],"nature,":[55],"DICOM":[56,87,136,164,178,225],"is":[57],"prone":[58],"many":[60],"risks":[61,155],"especially":[62],"vast":[66],"attack":[69],"surface":[70],"characterizing":[71],"composite":[73],"interplay":[74],"services,":[76],"formats":[77],"at":[80,132],"basis":[82,134],"standard.":[85,165],"Luckily,":[86],"exhibits":[88],"some":[89,169],"room":[90],"for":[91],"improving":[92],"security.":[94],"Specifically,":[95],"information":[96],"hiding":[97],"steganography":[99,221],"can":[100,111,137,190],"be":[101,191],"used":[102,192],"a":[104,214],"twofold":[105],"manner.":[106],"On":[107,125],"one":[108],"hand,":[109,128],"they":[110],"help":[112],"watermark":[114],"images":[116,179],"improve":[118],"their":[119],"resistance":[120],"against":[121],"tampering":[122],"alterations.":[124],"other":[127],"digital":[130],"infrastructure":[131],"lead":[138],"data":[140,195],"leaks":[141],"or":[142,196],"malicious":[143],"manipulations":[144],"via":[145],"artificial":[146],"intelligence":[147],"techniques.":[148],"Therefore,":[149],"this":[151,206],"work":[152],"we":[153],"introduce":[154],"opportunities":[157,170],"when":[158],"applying":[159,219],"information-hiding-based":[160],"techniques":[161],"Our":[166],"investigation":[167],"highlights":[168],"well":[172],"introduces":[174],"possibilities":[175],"exploiting":[177],"set":[181],"up":[182],"covert":[183,215],"channels,":[184],"i.e.,":[185],"hidden":[186],"communication":[187],"paths":[188],"that":[189],"exfiltrate":[194],"launch":[197],"attacks.":[198],"To":[199],"prove":[200],"effectiveness":[202],"our":[204],"vision,":[205],"paper":[207],"also":[208],"showcases":[209],"performance":[211],"evaluation":[212],"channel":[216],"built":[217],"by":[218],"text":[220],"principles":[222],"on":[223],"realistic":[224],"images.":[226]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
