![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking
Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security mechanism to guarantee their...
-
Chapter and Conference Paper
A Fuzzy Similarity Based Image Segmentation Scheme Using Self-organizing Map with Iterative Region Merging
This paper presents a new region-based segmentation scheme which considers homogeneous regions as constituted of pixel blocks that are highly similar to their neighborhoods. Based on the postulate that each ho...
-
Chapter and Conference Paper
Using Requirements Engineering in an Automatic Security Policy Derivation Process
Traditionally, a security policy is defined from an informal set of requirements, generally written using natural language. It is then difficult to appreciate the compatibility degree of the manually generated...
-
Chapter and Conference Paper
Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation
In this paper, we adapt the reversible watermarking modulation originally proposed by De Vleeschouwer et al. for images to the protection of relational databases. Message embedding is achieved by modulating the r...
-
Chapter and Conference Paper
Adapted Quantization Index Modulation for Database Watermarking
In this paper, we adapt the robust Quantization Index Modulation (QIM) originally proposed by Chen and Wornell for images to the protection of relational databases. In order to embed a bit of the watermark, we...
-
Chapter and Conference Paper
Databases Traceability by Means of Watermarking with Optimized Detection
In this paper, we propose a robust lossless database watermarking scheme the detection of which is optimized for the traceability of databases merged into, for example, shared data warehouses. We basically aim...
-
Chapter and Conference Paper
Scanner Model Identification of Official Documents Using Noise Parameters Estimation in the Wavelet Domain
In this article, we propose a novel approach for discerning which scanner has been used to scan a particular document. Its originality relates to a signature extracted in the wavelet domain of the digitized do...
-
Chapter and Conference Paper
Low-Dose CT Post-processing Based on 2D Residual Network
Low-dose CT is an effective solution to alleviate radiation risk to patients; it also introduces additional noise and streak artifacts. In order to maintain a high image quality for low-dose scanned CT data, w...
-
Chapter and Conference Paper
Secure Multilayer Perceptron Based on Homomorphic Encryption
In this work, we propose an outsourced Secure Multilayer Perceptron (SMLP) scheme where privacy and confidentiality of the data and the model are ensured during its training and the classification phases. More...
-
Chapter and Conference Paper
Dynamic Watermarking-Based Integrity Protection of Homomorphically Encrypted Databases – Application to Outsourced Genetic Data
In this paper, we propose a dynamic database crypto-watermarking scheme that enables a cloud service provider (CSP) to verify the integrity of encrypted databases outsourced by different users. This scheme tak...
-
Chapter and Conference Paper
Multi-tasking Siamese Networks for Breast Mass Detection Using Dual-View Mammogram Matching
In clinical practice, radiologists use multiple views of routine mammograms for breast cancer screening. Similarly, computer-aided diagnosis (CAD) systems could be enhanced by integrating information arising f...
-
Chapter and Conference Paper
Longitudinal Detection of Diabetic Retinopathy Early Severity Grade Changes Using Deep Learning
Longitudinal medical image analysis is crucial for identifying the unobvious emergence and evolution of early lesions, towards earlier and better patient-specific pathology management. However, traditional com...
-
Chapter and Conference Paper
Deep Active Learning for Dual-View Mammogram Analysis
Supervised deep learning on medical imaging requires massive manual annotations, which are expertise-needed and time-consuming to perform. Active learning aims at reducing annotation efforts by adaptively sele...
-
Chapter and Conference Paper
A Hybrid Cloud Deployment Architecture for Privacy-Preserving Collaborative Genome-Wide Association Studies
The increasing availability of sequenced human genomes is enabling health professionals and genomics researchers to well understand the implication of genetic variants in the development of common diseases, no...
-
Chapter and Conference Paper
Robust and Imperceptible Watermarking Scheme for GWAS Data Traceability
This paper proposes the first robust watermarking method of outsourced or shared genomic data in the context of genome-wide association studies (GWAS) with the primary purpose of identifying the individual or ...