Skip to main content

and
  1. No Access

    Article

    Global texture sensitive convolutional transformer for medical image steganalysis

    Steganography is often used by hackers or illegal organizations as a vehicle for information interception of medical images. Exchanged between PACS or communicated during telemedicine sessions, images are modi...

    Zhengyuan Zhou, Kai Chen, Dianlin Hu, Huazhong Shu, Gouenou Coatrieux in Multimedia Systems (2024)

  2. No Access

    Article

    Multipath neural networks for anomaly detection in cyber-physical systems

    An Intrusion Detection System (IDS) is a core element for securing critical systems. An IDS can use signatures of known attacks, or an anomaly detection model for detecting unknown attacks. Attacking an IDS is...

    Raphaël M. J. I. Larsen, Marc-Oliver Pahl in Annals of Telecommunications (2023)

  3. No Access

    Chapter and Conference Paper

    Robust and Imperceptible Watermarking Scheme for GWAS Data Traceability

    This paper proposes the first robust watermarking method of outsourced or shared genomic data in the context of genome-wide association studies (GWAS) with the primary purpose of identifying the individual or ...

    Reda Bellafqira, Musab Al-Ghadi, Emmanuelle Genin in Digital Forensics and Watermarking (2023)

  4. No Access

    Article

    Automatic source scanner identification using 1D convolutional neural network

    In this digital world, digitized documents can be considered original or a piece of evidence; checking the authenticity of any suspicious image has become an unavoidable concern to preserve the trust in its le...

    Chaima Ben Rabah, Gouenou Coatrieux, Riadh Abdelfattah in Multimedia Tools and Applications (2022)

  5. No Access

    Chapter and Conference Paper

    A Hybrid Cloud Deployment Architecture for Privacy-Preserving Collaborative Genome-Wide Association Studies

    The increasing availability of sequenced human genomes is enabling health professionals and genomics researchers to well understand the implication of genetic variants in the development of common diseases, no...

    Fatima-zahra Boujdad, David Niyitegeka in Digital Forensics and Cyber Crime (2022)

  6. No Access

    Article

    Discriminative feature representation for Noisy image quality assessment

    Blind image quality assessment (BIQA) is one of the most challenging and difficult tasks in the field of IQA. Given that sparse representation through dictionary learning can learn the image feature well, this...

    Yunbo Gu, Hui Tang, Tianling Lv, Yang Chen in Multimedia Tools and Applications (2020)

  7. No Access

    Article

    Real-time analysis of cataract surgery videos using statistical models

    The automatic analysis of the surgical process, from videos recorded during surgeries, could be very useful to surgeons, both for training and for acquiring new techniques. The training process could be optimi...

    Katia Charrière, Gwénolé Quellec, Mathieu Lamard in Multimedia Tools and Applications (2017)

  8. No Access

    Article

    Deployment of a posteriori access control using IHE ATNA

    In healthcare information management, privacy and confidentiality are two major concerns usually satisfied by access control means. Traditional access control mechanisms prevent illegal access by controlling a...

    Hanieh Azkia, Nora Cuppens-Boulahia in International Journal of Information Secur… (2015)

  9. No Access

    Chapter and Conference Paper

    Using Requirements Engineering in an Automatic Security Policy Derivation Process

    Traditionally, a security policy is defined from an informal set of requirements, generally written using natural language. It is then difficult to appreciate the compatibility degree of the manually generated...

    Mariem Graa, Nora Cuppens-Boulahia in Data Privacy Management and Autonomous Spo… (2012)

  10. No Access

    Chapter and Conference Paper

    Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking

    Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security mechanism to guarantee their...

    Wei Pan, Gouenou Coatrieux in Data Privacy Management and Autonomous Spo… (2010)

  11. No Access

    Article

    Images médicales, sécurité et tatouage

    Dans cet article, après avoir rappelé les conditions de sécurité régissant les images médicales et les solutions techniques pour protéger ces données sur les systèmes d’information, nous introduisons le tatoua...

    Gouenou Coatrieux, Henri Maître in Annales Des Télécommunications (2003)