Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Images médicales, sécurité et tatouage

    Dans cet article, après avoir rappelé les conditions de sécurité régissant les images médicales et les solutions techniques pour protéger ces données sur les systèmes d’information, nous introduisons le tatoua...

    Gouenou Coatrieux, Henri Maître in Annales Des Télécommunications (2003)

  2. No Access

    Chapter and Conference Paper

    Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking

    Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security mechanism to guarantee their...

    Wei Pan, Gouenou Coatrieux in Data Privacy Management and Autonomous Spo… (2010)

  3. No Access

    Chapter and Conference Paper

    A Fuzzy Similarity Based Image Segmentation Scheme Using Self-organizing Map with Iterative Region Merging

    This paper presents a new region-based segmentation scheme which considers homogeneous regions as constituted of pixel blocks that are highly similar to their neighborhoods. Based on the postulate that each ho...

    Wooi-Haw Tan, Gouenou Coatrieux in Visual Informatics: Sustaining Research an… (2011)

  4. Article

    Open Access

    Medical record: systematic centralization versus secure on demand aggregation

    As patients often see the data of their medical histories scattered among various medical records hosted in several health-care establishments, the purpose of our multidisciplinary study was to define a pragma...

    Catherine Quantin in BMC Medical Informatics and Decision Making (2011)

  5. No Access

    Chapter and Conference Paper

    Using Requirements Engineering in an Automatic Security Policy Derivation Process

    Traditionally, a security policy is defined from an informal set of requirements, generally written using natural language. It is then difficult to appreciate the compatibility degree of the manually generated...

    Mariem Graa, Nora Cuppens-Boulahia in Data Privacy Management and Autonomous Spo… (2012)

  6. No Access

    Chapter

    L’administration Conjointe du Dossier Patient: Une Responsabilité Partagée Entre le Patient et le Praticien

    The main problem faced by patients, health practitioners and the authorities, is namely the gathering and updating of administrative and medical data in order to accurately reconstitute a patient’s medical his...

    Catherine Quantin, Éric Benzenine in Systèmes d’information pour l’amélioration… (2012)

  7. No Access

    Chapter and Conference Paper

    Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation

    In this paper, we adapt the reversible watermarking modulation originally proposed by De Vleeschouwer et al. for images to the protection of relational databases. Message embedding is achieved by modulating the r...

    Javier Franco-Contreras, Gouenou Coatrieux in Security and Trust Management (2013)

  8. No Access

    Article

    Color Image Analysis by Quaternion-Type Moments

    In this paper, by using the quaternion algebra, the conventional complex-type moments (CTMs) for gray-scale images are generalized to color images as quaternion-type moments (QTMs) in a holistic manner. We fir...

    Bei**g Chen, Huazhong Shu, Gouenou Coatrieux in Journal of Mathematical Imaging and Vision (2015)

  9. No Access

    Chapter

    Encryption and Watermarking for medical Image Protection

    Among security mechanisms studied today, a growing interest is given to the protection of digital content especially with the help of encryption, watermarking and, more recently, of their combination. If encry...

    Dalel Bouslimi, Gouenou Coatrieux in Medical Data Privacy Handbook (2015)

  10. No Access

    Chapter and Conference Paper

    Adapted Quantization Index Modulation for Database Watermarking

    In this paper, we adapt the robust Quantization Index Modulation (QIM) originally proposed by Chen and Wornell for images to the protection of relational databases. In order to embed a bit of the watermark, we...

    Javier Franco-Contreras, Gouenou Coatrieux in Digital-Forensics and Watermarking (2015)

  11. No Access

    Article

    Deployment of a posteriori access control using IHE ATNA

    In healthcare information management, privacy and confidentiality are two major concerns usually satisfied by access control means. Traditional access control mechanisms prevent illegal access by controlling a...

    Hanieh Azkia, Nora Cuppens-Boulahia in International Journal of Information Secur… (2015)

  12. No Access

    Chapter and Conference Paper

    Databases Traceability by Means of Watermarking with Optimized Detection

    In this paper, we propose a robust lossless database watermarking scheme the detection of which is optimized for the traceability of databases merged into, for example, shared data warehouses. We basically aim...

    Javier Franco-Contreras, Gouenou Coatrieux in Digital Forensics and Watermarking (2017)

  13. Article

    Open Access

    Discriminative Prior - Prior Image Constrained Compressed Sensing Reconstruction for Low-Dose CT Imaging

    X-ray computed tomography (CT) has been widely used to provide patient-specific anatomical information in the forms of tissue attenuation. However, the cumulative radiation induced in CT scan has raised extens...

    Yang Chen, ** Liu, Lizhe **e, Yining Hu, Huazhong Shu, Limin Luo in Scientific Reports (2017)

  14. No Access

    Article

    Real-time analysis of cataract surgery videos using statistical models

    The automatic analysis of the surgical process, from videos recorded during surgeries, could be very useful to surgeons, both for training and for acquiring new techniques. The training process could be optimi...

    Katia Charrière, Gwénolé Quellec, Mathieu Lamard in Multimedia Tools and Applications (2017)

  15. No Access

    Chapter and Conference Paper

    Scanner Model Identification of Official Documents Using Noise Parameters Estimation in the Wavelet Domain

    In this article, we propose a novel approach for discerning which scanner has been used to scan a particular document. Its originality relates to a signature extracted in the wavelet domain of the digitized do...

    Chaima Ben Rabah, Gouenou Coatrieux in Advanced Concepts for Intelligent Vision S… (2018)

  16. No Access

    Chapter and Conference Paper

    Low-Dose CT Post-processing Based on 2D Residual Network

    Low-dose CT is an effective solution to alleviate radiation risk to patients; it also introduces additional noise and streak artifacts. In order to maintain a high image quality for low-dose scanned CT data, w...

    Huijuan Zhang, Yunbo Gu, Wei Yang in The Proceedings of the International Confe… (2019)

  17. No Access

    Chapter and Conference Paper

    Secure Multilayer Perceptron Based on Homomorphic Encryption

    In this work, we propose an outsourced Secure Multilayer Perceptron (SMLP) scheme where privacy and confidentiality of the data and the model are ensured during its training and the classification phases. More...

    Reda Bellafqira, Gouenou Coatrieux, Emmanuelle Genin in Digital Forensics and Watermarking (2019)

  18. No Access

    Chapter

    Trust Assessment for the Security of Information Systems

    Recent development of   various sensors and communicating devices has significantly enhanced information systems (IS). However, the security of  objects as well as the confidence   the information they produ...

    Benjamin Costé, Cyril Ray, Gouenou Coatrieux in Advances in Knowledge Discovery and Manage… (2019)

  19. No Access

    Chapter and Conference Paper

    Dynamic Watermarking-Based Integrity Protection of Homomorphically Encrypted Databases – Application to Outsourced Genetic Data

    In this paper, we propose a dynamic database crypto-watermarking scheme that enables a cloud service provider (CSP) to verify the integrity of encrypted databases outsourced by different users. This scheme tak...

    David Niyitegeka, Gouenou Coatrieux, Reda Bellafqira in Digital Forensics and Watermarking (2019)

  20. No Access

    Chapter and Conference Paper

    Multi-tasking Siamese Networks for Breast Mass Detection Using Dual-View Mammogram Matching

    In clinical practice, radiologists use multiple views of routine mammograms for breast cancer screening. Similarly, computer-aided diagnosis (CAD) systems could be enhanced by integrating information arising f...

    Yutong Yan, Pierre-Henri Conze, Mathieu Lamard in Machine Learning in Medical Imaging (2020)

previous disabled Page of 2