Skip to main content

and
  1. No Access

    Article

    Global texture sensitive convolutional transformer for medical image steganalysis

    Steganography is often used by hackers or illegal organizations as a vehicle for information interception of medical images. Exchanged between PACS or communicated during telemedicine sessions, images are modi...

    Zhengyuan Zhou, Kai Chen, Dianlin Hu, Huazhong Shu, Gouenou Coatrieux in Multimedia Systems (2024)

  2. No Access

    Chapter and Conference Paper

    Robust and Imperceptible Watermarking Scheme for GWAS Data Traceability

    This paper proposes the first robust watermarking method of outsourced or shared genomic data in the context of genome-wide association studies (GWAS) with the primary purpose of identifying the individual or ...

    Reda Bellafqira, Musab Al-Ghadi, Emmanuelle Genin in Digital Forensics and Watermarking (2023)

  3. No Access

    Chapter and Conference Paper

    Secure Multilayer Perceptron Based on Homomorphic Encryption

    In this work, we propose an outsourced Secure Multilayer Perceptron (SMLP) scheme where privacy and confidentiality of the data and the model are ensured during its training and the classification phases. More...

    Reda Bellafqira, Gouenou Coatrieux, Emmanuelle Genin in Digital Forensics and Watermarking (2019)

  4. No Access

    Chapter and Conference Paper

    Dynamic Watermarking-Based Integrity Protection of Homomorphically Encrypted Databases – Application to Outsourced Genetic Data

    In this paper, we propose a dynamic database crypto-watermarking scheme that enables a cloud service provider (CSP) to verify the integrity of encrypted databases outsourced by different users. This scheme tak...

    David Niyitegeka, Gouenou Coatrieux, Reda Bellafqira in Digital Forensics and Watermarking (2019)

  5. No Access

    Chapter and Conference Paper

    Databases Traceability by Means of Watermarking with Optimized Detection

    In this paper, we propose a robust lossless database watermarking scheme the detection of which is optimized for the traceability of databases merged into, for example, shared data warehouses. We basically aim...

    Javier Franco-Contreras, Gouenou Coatrieux in Digital Forensics and Watermarking (2017)

  6. No Access

    Article

    Deployment of a posteriori access control using IHE ATNA

    In healthcare information management, privacy and confidentiality are two major concerns usually satisfied by access control means. Traditional access control mechanisms prevent illegal access by controlling a...

    Hanieh Azkia, Nora Cuppens-Boulahia in International Journal of Information Secur… (2015)

  7. No Access

    Chapter and Conference Paper

    Adapted Quantization Index Modulation for Database Watermarking

    In this paper, we adapt the robust Quantization Index Modulation (QIM) originally proposed by Chen and Wornell for images to the protection of relational databases. In order to embed a bit of the watermark, we...

    Javier Franco-Contreras, Gouenou Coatrieux in Digital-Forensics and Watermarking (2015)

  8. No Access

    Chapter and Conference Paper

    Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation

    In this paper, we adapt the reversible watermarking modulation originally proposed by De Vleeschouwer et al. for images to the protection of relational databases. Message embedding is achieved by modulating the r...

    Javier Franco-Contreras, Gouenou Coatrieux in Security and Trust Management (2013)

  9. No Access

    Chapter and Conference Paper

    Using Requirements Engineering in an Automatic Security Policy Derivation Process

    Traditionally, a security policy is defined from an informal set of requirements, generally written using natural language. It is then difficult to appreciate the compatibility degree of the manually generated...

    Mariem Graa, Nora Cuppens-Boulahia in Data Privacy Management and Autonomous Spo… (2012)

  10. No Access

    Chapter and Conference Paper

    Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking

    Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security mechanism to guarantee their...

    Wei Pan, Gouenou Coatrieux in Data Privacy Management and Autonomous Spo… (2010)