Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Global texture sensitive convolutional transformer for medical image steganalysis

    Steganography is often used by hackers or illegal organizations as a vehicle for information interception of medical images. Exchanged between PACS or communicated during telemedicine sessions, images are modi...

    Zhengyuan Zhou, Kai Chen, Dianlin Hu, Huazhong Shu, Gouenou Coatrieux in Multimedia Systems (2024)

  2. Article

    Open Access

    Automatic de-identification of French electronic health records: a cost-effective approach exploiting distant supervision and deep learning models

    Electronic health records (EHRs) contain valuable information for clinical research; however, the sensitive nature of healthcare data presents security and confidentiality challenges. De-identification is ther...

    Mohamed El Azzouzi, Gouenou Coatrieux in BMC Medical Informatics and Decision Making (2024)

  3. No Access

    Article

    Multipath neural networks for anomaly detection in cyber-physical systems

    An Intrusion Detection System (IDS) is a core element for securing critical systems. An IDS can use signatures of known attacks, or an anomaly detection model for detecting unknown attacks. Attacking an IDS is...

    Raphaël M. J. I. Larsen, Marc-Oliver Pahl in Annals of Telecommunications (2023)

  4. No Access

    Chapter and Conference Paper

    Robust and Imperceptible Watermarking Scheme for GWAS Data Traceability

    This paper proposes the first robust watermarking method of outsourced or shared genomic data in the context of genome-wide association studies (GWAS) with the primary purpose of identifying the individual or ...

    Reda Bellafqira, Musab Al-Ghadi, Emmanuelle Genin in Digital Forensics and Watermarking (2023)

  5. No Access

    Article

    Automatic source scanner identification using 1D convolutional neural network

    In this digital world, digitized documents can be considered original or a piece of evidence; checking the authenticity of any suspicious image has become an unavoidable concern to preserve the trust in its le...

    Chaima Ben Rabah, Gouenou Coatrieux, Riadh Abdelfattah in Multimedia Tools and Applications (2022)

  6. No Access

    Chapter and Conference Paper

    A Hybrid Cloud Deployment Architecture for Privacy-Preserving Collaborative Genome-Wide Association Studies

    The increasing availability of sequenced human genomes is enabling health professionals and genomics researchers to well understand the implication of genetic variants in the development of common diseases, no...

    Fatima-zahra Boujdad, David Niyitegeka in Digital Forensics and Cyber Crime (2022)

  7. No Access

    Chapter and Conference Paper

    Longitudinal Detection of Diabetic Retinopathy Early Severity Grade Changes Using Deep Learning

    Longitudinal medical image analysis is crucial for identifying the unobvious emergence and evolution of early lesions, towards earlier and better patient-specific pathology management. However, traditional com...

    Yutong Yan, Pierre-Henri Conze, Gwenolé Quellec in Ophthalmic Medical Image Analysis (2021)

  8. No Access

    Chapter and Conference Paper

    Deep Active Learning for Dual-View Mammogram Analysis

    Supervised deep learning on medical imaging requires massive manual annotations, which are expertise-needed and time-consuming to perform. Active learning aims at reducing annotation efforts by adaptively sele...

    Yutong Yan, Pierre-Henri Conze, Mathieu Lamard in Machine Learning in Medical Imaging (2021)

  9. No Access

    Article

    Discriminative feature representation for Noisy image quality assessment

    Blind image quality assessment (BIQA) is one of the most challenging and difficult tasks in the field of IQA. Given that sparse representation through dictionary learning can learn the image feature well, this...

    Yunbo Gu, Hui Tang, Tianling Lv, Yang Chen in Multimedia Tools and Applications (2020)

  10. No Access

    Chapter and Conference Paper

    Multi-tasking Siamese Networks for Breast Mass Detection Using Dual-View Mammogram Matching

    In clinical practice, radiologists use multiple views of routine mammograms for breast cancer screening. Similarly, computer-aided diagnosis (CAD) systems could be enhanced by integrating information arising f...

    Yutong Yan, Pierre-Henri Conze, Mathieu Lamard in Machine Learning in Medical Imaging (2020)

  11. No Access

    Chapter and Conference Paper

    Low-Dose CT Post-processing Based on 2D Residual Network

    Low-dose CT is an effective solution to alleviate radiation risk to patients; it also introduces additional noise and streak artifacts. In order to maintain a high image quality for low-dose scanned CT data, w...

    Huijuan Zhang, Yunbo Gu, Wei Yang in The Proceedings of the International Confe… (2019)

  12. No Access

    Chapter and Conference Paper

    Secure Multilayer Perceptron Based on Homomorphic Encryption

    In this work, we propose an outsourced Secure Multilayer Perceptron (SMLP) scheme where privacy and confidentiality of the data and the model are ensured during its training and the classification phases. More...

    Reda Bellafqira, Gouenou Coatrieux, Emmanuelle Genin in Digital Forensics and Watermarking (2019)

  13. No Access

    Chapter

    Trust Assessment for the Security of Information Systems

    Recent development of   various sensors and communicating devices has significantly enhanced information systems (IS). However, the security of  objects as well as the confidence   the information they produ...

    Benjamin Costé, Cyril Ray, Gouenou Coatrieux in Advances in Knowledge Discovery and Manage… (2019)

  14. No Access

    Chapter and Conference Paper

    Dynamic Watermarking-Based Integrity Protection of Homomorphically Encrypted Databases – Application to Outsourced Genetic Data

    In this paper, we propose a dynamic database crypto-watermarking scheme that enables a cloud service provider (CSP) to verify the integrity of encrypted databases outsourced by different users. This scheme tak...

    David Niyitegeka, Gouenou Coatrieux, Reda Bellafqira in Digital Forensics and Watermarking (2019)

  15. No Access

    Chapter and Conference Paper

    Scanner Model Identification of Official Documents Using Noise Parameters Estimation in the Wavelet Domain

    In this article, we propose a novel approach for discerning which scanner has been used to scan a particular document. Its originality relates to a signature extracted in the wavelet domain of the digitized do...

    Chaima Ben Rabah, Gouenou Coatrieux in Advanced Concepts for Intelligent Vision S… (2018)

  16. No Access

    Article

    Real-time analysis of cataract surgery videos using statistical models

    The automatic analysis of the surgical process, from videos recorded during surgeries, could be very useful to surgeons, both for training and for acquiring new techniques. The training process could be optimi...

    Katia Charrière, Gwénolé Quellec, Mathieu Lamard in Multimedia Tools and Applications (2017)

  17. Article

    Open Access

    Discriminative Prior - Prior Image Constrained Compressed Sensing Reconstruction for Low-Dose CT Imaging

    X-ray computed tomography (CT) has been widely used to provide patient-specific anatomical information in the forms of tissue attenuation. However, the cumulative radiation induced in CT scan has raised extens...

    Yang Chen, ** Liu, Lizhe **e, Yining Hu, Huazhong Shu, Limin Luo in Scientific Reports (2017)

  18. No Access

    Chapter and Conference Paper

    Databases Traceability by Means of Watermarking with Optimized Detection

    In this paper, we propose a robust lossless database watermarking scheme the detection of which is optimized for the traceability of databases merged into, for example, shared data warehouses. We basically aim...

    Javier Franco-Contreras, Gouenou Coatrieux in Digital Forensics and Watermarking (2017)

  19. No Access

    Article

    Deployment of a posteriori access control using IHE ATNA

    In healthcare information management, privacy and confidentiality are two major concerns usually satisfied by access control means. Traditional access control mechanisms prevent illegal access by controlling a...

    Hanieh Azkia, Nora Cuppens-Boulahia in International Journal of Information Secur… (2015)

  20. No Access

    Article

    Color Image Analysis by Quaternion-Type Moments

    In this paper, by using the quaternion algebra, the conventional complex-type moments (CTMs) for gray-scale images are generalized to color images as quaternion-type moments (QTMs) in a holistic manner. We fir...

    Bei**g Chen, Huazhong Shu, Gouenou Coatrieux in Journal of Mathematical Imaging and Vision (2015)

previous disabled Page of 2