-
1
-
-
85032751036
-
Data hiding for fighting piracy
-
M. Bami, F. Bartolini, "Data hiding for fighting piracy," IEEE Signal Processing Magazine, vol. 21, no2, pp.28-39, 2004.
-
(2004)
IEEE Signal Processing Magazine
, vol.21
, Issue.NO2
, pp. 28-39
-
-
Bami, M.1
Bartolini, F.2
-
2
-
-
0034450986
-
Relevance of Watermarking in Medical Imaging
-
IT AB, USA
-
G. Coatrieux, H. Maître, B. Sankur, Y. Rolland, R. Collorec, "Relevance of Watermarking in Medical Imaging," in Proc. IEEE Int. Conf. IT AB, USA,2000, pp. 250-255.
-
(2000)
Proc. IEEE Int. Conf
, pp. 250-255
-
-
Coatrieux, G.1
Maître, H.2
Sankur, B.3
Rolland, Y.4
Collorec, R.5
-
3
-
-
30744459113
-
-
E-.J. Delp, Multimedia security: the 22nd century approach!, in Proc. workshop on Multimedia Systems, 11, no2, pp.95-97, 2005.
-
E-.J. Delp, "Multimedia security: the 22nd century approach!," in Proc. workshop on Multimedia Systems, vol. 11, no2, pp.95-97, 2005.
-
-
-
-
4
-
-
2442687789
-
Information Assurance in Biomedical Informatics Systems
-
C.D. Schou, J. Frost, W.V. Maconachy, "Information Assurance in Biomedical Informatics Systems," IEEE Engineering in Medicine and Biology Magazine, vol. 23, no1, pp. 110-118, 2004.
-
(2004)
IEEE Engineering in Medicine and Biology Magazine
, vol.23
, Issue.NO1
, pp. 110-118
-
-
Schou, C.D.1
Frost, J.2
Maconachy, W.V.3
-
5
-
-
0034775562
-
Strict Integrity Control of Biomedical Images
-
SPIE, USA
-
G. Coatrieux, B. Sankur, H. Maître, "Strict Integrity Control of Biomedical Images," in Proc. Electronic Imaging, Security and Watermarking of Multimedia Contents, SPIE, USA, 2001, pp.229-240.
-
(2001)
Proc. Electronic Imaging, Security and Watermarking of Multimedia Contents
, pp. 229-240
-
-
Coatrieux, G.1
Sankur, B.2
Maître, H.3
-
6
-
-
24144463679
-
-
Journal of Information Sciences, Elsevier
-
F. Y. Shih, Y-.Ta Wu, "Robust watermarking and compression for medical images based on genetic algorithms," Journal of Information Sciences, Elsevier, 2005, vol. 175, no3, pp.200-216.
-
(2005)
Robust watermarking and compression for medical images based on genetic algorithms
, vol.175
, Issue.NO3
, pp. 200-216
-
-
Shih, F.Y.1
Wu, Y.T.2
-
7
-
-
34047166643
-
Multiple watermark method for privacy control and tamper detection in medical images
-
Australia
-
C.-S. Woo, J. Du, B. Pham, "Multiple watermark method for privacy control and tamper detection in medical images," in Proc. APRS Workshop on Digital Image Computing, Australia, 2005, pp. 59-64.
-
(2005)
Proc. APRS Workshop on Digital Image Computing
, pp. 59-64
-
-
Woo, C.-S.1
Du, J.2
Pham, B.3
-
8
-
-
0035413322
-
Authenticity and integrity of digital mammography images
-
X. Q. Zhou, H. K. Huang, S. L. Lou, "Authenticity and integrity of digital mammography images," IEEE Trans. on Medical Imaging, vol. 20, no8, pp.784-791, 2001.
-
(2001)
IEEE Trans. on Medical Imaging
, vol.20
, Issue.NO8
, pp. 784-791
-
-
Zhou, X.Q.1
Huang, H.K.2
Lou, S.L.3
-
9
-
-
0036489322
-
A data-hiding technique with authentication, integration, and confidentiality for electronic patient records
-
H-.M. Chao, C-.M. Hsu, S-.G. Miaou, "A data-hiding technique with authentication, integration, and confidentiality for electronic patient records," IEEE Trans. on Information Technology in Biomedicine, vol.6, no1, pp.46-53, 2002.
-
(2002)
IEEE Trans. on Information Technology in Biomedicine
, vol.6
, Issue.NO1
, pp. 46-53
-
-
Chao, H.M.1
Hsu, C.M.2
Miaou, S.G.3
-
10
-
-
1542302504
-
A lossless data embedding scheme for medical images in application of e-diagnosis
-
X. Luo, Q. Cheng, J. Tan, "A lossless data embedding scheme for medical images in application of e-diagnosis," in Proc. 25th Annual Int. Conf. of the IEEE EMBS, vol. 1, 2003, pp.852-855.
-
(2003)
Proc. 25th Annual Int. Conf. of the IEEE EMBS
, vol.1
, pp. 852-855
-
-
Luo, X.1
Cheng, Q.2
Tan, J.3
-
11
-
-
1542272402
-
A medical image watermarking scheme based on wavelet transform
-
A. Giakoumaki, S. Pavlopoulos, D. Koutsouris, "A medical image watermarking scheme based on wavelet transform," in Proc. of the 25th Annual Int. Conf. of the IEEE EMBS, vol. 1, 2003, pp. 856-859.
-
(2003)
Proc. of the 25th Annual Int. Conf. of the IEEE EMBS
, vol.1
, pp. 856-859
-
-
Giakoumaki, A.1
Pavlopoulos, S.2
Koutsouris, D.3
-
12
-
-
33749637890
-
Non-ubiquitous digital watermarking for record indexing and integrity protection of medical images
-
S. Cheng, Q. Wu, K.R. Castleman, "Non-ubiquitous digital watermarking for record indexing and integrity protection of medical images," in Proc. ICIP, vol. 2, 2005, pp.1062-1065.
-
(2005)
Proc. ICIP
, vol.2
, pp. 1062-1065
-
-
Cheng, S.1
Wu, Q.2
Castleman, K.R.3
-
13
-
-
24144489961
-
Security mechanism for medical image information on PACS using invisible watermark
-
G.T. Oh, Y-.B. Lee, S.J. Yeom, "Security mechanism for medical image information on PACS using invisible watermark," in Proc. of Int. Conf. High Performance Computing for Computational Science, VECPAR, 2005, pp.315-324.
-
(2005)
Proc. of Int. Conf. High Performance Computing for Computational Science, VECPAR
, pp. 315-324
-
-
Oh, G.T.1
Lee, Y.B.2
Yeom, S.J.3
-
14
-
-
29444439337
-
Tailored reversible watermarking schemes for authentication of electronic clinical atlas
-
F. Bao, R. H. Deng, B.C. Ooi, Y. Yang, "Tailored reversible watermarking schemes for authentication of electronic clinical atlas," IEEE Trans. on Information Technology in Biomedicine, vol. 9, no4, pp.554-563, 2005.
-
(2005)
IEEE Trans. on Information Technology in Biomedicine
, vol.9
, Issue.NO4
, pp. 554-563
-
-
Bao, F.1
Deng, R.H.2
Ooi, B.C.3
Yang, Y.4
-
15
-
-
34047104692
-
Applied Cryptography
-
second edition, Paris: International Thomson Publishing
-
nd second edition, Paris: International Thomson Publishing, 1997.
-
(1997)
nd
-
-
Schneier, B.1
-
16
-
-
33645004780
-
The NTMAC for authentication of noisy messages
-
C.G. Boncelet, "The NTMAC for authentication of noisy messages," IEEE Trans. on Information Forensics and Security, vol. 1, no1, pp.320-323, 2006.
-
(2006)
IEEE Trans. on Information Forensics and Security
, vol.1
, Issue.NO1
, pp. 320-323
-
-
Boncelet, C.G.1
-
17
-
-
1842421975
-
Comparative Assessment of Semifragile Watermarking Methods
-
O. Ekici, B. Sankur, B. Coskun, U. Naci, M. Akcay, "Comparative Assessment of Semifragile Watermarking Methods," Journal of Electronic Imaging, 13(1), pp. 209-216, 2004.
-
(2004)
Journal of Electronic Imaging
, vol.13
, Issue.1
, pp. 209-216
-
-
Ekici, O.1
Sankur, B.2
Coskun, B.3
Naci, U.4
Akcay, M.5
-
18
-
-
84863690117
-
Image manipulation detection with binary similarity measures
-
S. Bayram, I. Avcibas, B. Sankur, N. Memon, "Image manipulation detection with binary similarity measures," in proc. EUSIPCO2005, pp.752-755.
-
proc. EUSIPCO2005
, pp. 752-755
-
-
Bayram, S.1
Avcibas, I.2
Sankur, B.3
Memon, N.4
-
19
-
-
0037333489
-
Medical image security in a HIPAA mandated PACS environment
-
F. Cao, H.K. Huang, X.Q. Zhou, "Medical image security in a HIPAA mandated PACS environment," Computerized Medical Imaging and Graphics, vol. 27, no2-3, pp. 185-196, 2003.
-
(2003)
Computerized Medical Imaging and Graphics
, vol.27
, Issue.NO2-3
, pp. 185-196
-
-
Cao, F.1
Huang, H.K.2
Zhou, X.Q.3
-
20
-
-
34047144115
-
-
G. Coatrieux, J. Puentes, L. Lecomu, C. Cheze Le Rest, C. roux, Compliant secured specialized electronic patient record platform, in Proc. of D2H2, USA, 2006, accepted.
-
G. Coatrieux, J. Puentes, L. Lecomu, C. Cheze Le Rest, C. roux, "Compliant secured specialized electronic patient record platform," in Proc. of D2H2, USA, 2006, accepted.
-
-
-
-
22
-
-
19744378027
-
Protecting patient privacy against unauthorized release of medical images in a group communication environment
-
M. Li, R. Poovendran, S. Narayanan, "Protecting patient privacy against unauthorized release of medical images in a group communication environment," Computerized Medical Imaging and Graphics, vol. 29, no5, pp. 367-383, 2005.
-
(2005)
Computerized Medical Imaging and Graphics
, vol.29
, Issue.NO5
, pp. 367-383
-
-
Li, M.1
Poovendran, R.2
Narayanan, S.3
-
23
-
-
4143061391
-
Simultaneous storage of patient information with medical images in the frequency domain
-
R. Acharya, U.C. Niranjan, S.S. Iyengar, N. Kannathal, L.C. Min, "Simultaneous storage of patient information with medical images in the frequency domain," Computer Methods and Programs in Biomedicine, vol. 76, pp.13-19, 2004.
-
(2004)
Computer Methods and Programs in Biomedicine
, vol.76
, pp. 13-19
-
-
Acharya, R.1
Niranjan, U.C.2
Iyengar, S.S.3
Kannathal, N.4
Min, L.C.5
-
24
-
-
28444476669
-
Reliable transmission and storage of medical images with patient information using error control codes
-
J. Nayak, P.S. Bhat, M.S. Kumar, R. Acharya, "Reliable transmission and storage of medical images with patient information using error control codes," in Proc. IEEE INDICON, 2004, pp.147-150.
-
(2004)
Proc. IEEE INDICON
, pp. 147-150
-
-
Nayak, J.1
Bhat, P.S.2
Kumar, M.S.3
Acharya, R.4
-
25
-
-
4544276321
-
Secure transmission of medical records using high capacity steganography
-
Y. Srinivasan, B. Nutter, S. Mitra, B. Phillips, D. Ferris, "Secure transmission of medical records using high capacity steganography," in Proc. 17th IEEE Symposium on Computer Based Medical Systems, 2004, p. 122-127.
-
(2004)
Proc. 17th IEEE Symposium on Computer Based Medical Systems
, pp. 122-127
-
-
Srinivasan, Y.1
Nutter, B.2
Mitra, S.3
Phillips, B.4
Ferris, D.5
-
26
-
-
0000525637
-
Watermarking Medical Images with Patient Information
-
D. Anand, U.C. Niranjan, "Watermarking Medical Images with Patient Information," in Proc. Int. Conf. IEEE-EMBS, 1998, pp. 703-706.
-
(1998)
Proc. Int. Conf. IEEE-EMBS
, pp. 703-706
-
-
Anand, D.1
Niranjan, U.C.2
-
27
-
-
33846920429
-
A low distortion and reversible watermark: Application to angiographic images of the retina
-
G. Coatrieux, M. Lamard, W. Daccache, J. Puentes, C. Roux, "A low distortion and reversible watermark: Application to angiographic images of the retina," in Proc. Int. Conf. of the IEEE-EMBS, 2005, pp.2224-2227.
-
(2005)
Proc. Int. Conf. of the IEEE-EMBS
, pp. 2224-2227
-
-
Coatrieux, G.1
Lamard, M.2
Daccache, W.3
Puentes, J.4
Roux, C.5
-
28
-
-
84948707475
-
Digital watermarking for ROI medical images by using compressed signature image
-
A. Wakatani, "Digital watermarking for ROI medical images by using compressed signature image," in Proc. 35th Hawaii International Conference on System Sciences, 2002, pp.2043-2048.
-
(2002)
Proc. 35th Hawaii International Conference on System Sciences
, pp. 2043-2048
-
-
Wakatani, A.1
-
29
-
-
0038273964
-
Circular interpretation of bijective transformations in lossless watermarking for media asset management
-
C. De Vleeschouwer, J.-F. Delaigle, B. Macq, "Circular interpretation of bijective transformations in lossless watermarking for media asset management," IEEE trans. on Multimedia, vol.5, no1, pp.97-105, 2003.
-
(2003)
IEEE trans. on Multimedia
, vol.5
, Issue.NO1
, pp. 97-105
-
-
De Vleeschouwer, C.1
Delaigle, J.-F.2
Macq, B.3
-
30
-
-
27144477838
-
Data hiding technologies for digital radiography
-
A. Piva, M. Barni, F. Bartolini, A. De Rosa, "Data hiding technologies for digital radiography," in IEE Proc. Vision, Image and Signal Processing, vol. 152, no5, pp.604-610, 2005.
-
(2005)
IEE Proc. Vision, Image and Signal Processing
, vol.152
, Issue.NO5
, pp. 604-610
-
-
Piva, A.1
Barni, M.2
Bartolini, F.3
De Rosa, A.4
|