-
1
-
-
34047185865
-
A review of image watermarking applications in healthcare
-
DOI 10.1109/IEMBS.2006.259305, 4030475, 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS'06
-
G. Coatrieux, L. Lecornu, B. Sankur, and Ch. Roux, "A Review of Image Watermarking Applications in Healthcare," in Proc. of the IEEE EMBC Conf., New York, USA, 2006, pp. 4691-4694. (Pubitemid 46520961)
-
(2006)
Annual International Conference of the IEEE Engineering in Medicine and Biology - Proceedings
, pp. 4691-4694
-
-
Coatrieux, G.1
Lecornu, L.2
Sankur, B.3
Roux, Ch.4
-
2
-
-
7644241281
-
A review of watermarking principles and practices
-
Ed. K. K. Parhi and T. Nishitani, Marcell Dekker Inc.
-
M. L. Miller, I. J. Cox, "A review of watermarking principles and practices," Digi. Sign. Proc. in Mult. Syst., Ed. K. K. Parhi and T. Nishitani, Marcell Dekker Inc., 461-485, 1999.
-
(1999)
Digi. Sign. Proc. in Mult. Syst.
, pp. 461-485
-
-
Miller, M.L.1
Cox, I.J.2
-
3
-
-
0032656890
-
Copy protection for DVD video
-
J. A. Bloom, I. J. Cox, T. Kalker, J-P Linnartz, M. L. Miller, and B. Traw, "Copy protection for DVD video," Proc. of IEEE, 87(7):1267-1276, 1999.
-
(1999)
Proc. of IEEE
, vol.87
, Issue.7
, pp. 1267-1276
-
-
Bloom, J.A.1
Cox, I.J.2
Kalker, T.3
Linnartz, J.-P.4
Miller, M.L.5
Traw, B.6
-
4
-
-
85032751517
-
Digital rights management in consumer electronics products
-
MAR.
-
Willem Jonker and Jean-Paul Linnartz, "Digital rights management in consumer electronics products," IEEE SIGN. PROC. MAGA., MAR. 2004,p 82-91.
-
(2004)
IEEE SIGN. PROC. MAGA
, pp. 82-91
-
-
Jonker, W.1
Linnartz, J.-P.2
-
5
-
-
34047166643
-
Multiple watermark method for privacy control and tamper detection in medical images
-
Australia
-
Woo, C.-S., J. Du, and B. Pham, "Multiple watermark method for privacy control and tamper detection in medical images," Proc. of the APRS Workshop on Digital Image Computing, 2005, Australia, pp.59-64.
-
(2005)
Proc. of the APRS Workshop on Digital Image Computing
, pp. 59-64
-
-
Woo, C.-S.1
Du, J.2
Pham, B.3
-
6
-
-
29444439337
-
Tailored reversible watermarking schemes for authentication of electronic clinical atlas
-
DOI 10.1109/TITB.2005.855556
-
Bao, F., R. H. Deng, B.C. Ooi, and Y. Yang, "Tailored reversible watermarking schemes for authentication of electronic clinical atlas," IEEE Trans. on Inf. Technol. Biomed., 2005, vol. 9(4), pp.554-563. (Pubitemid 43009862)
-
(2005)
IEEE Transactions on Information Technology in Biomedicine
, vol.9
, Issue.4
, pp. 554-563
-
-
Bao, F.1
Deng, R.H.2
Ooi, B.C.3
Yang, Y.4
-
7
-
-
63349083498
-
Reversible watermarking for knowledge digest embedding and reliability control in medical images
-
Mar.
-
G. Coatrieux, C. Le Guillou, J.-M. Cauvin, C. Roux, "Reversible watermarking for knowledge digest embedding and reliability control in medical images," IEEE Trans. Inf. Technol. Biomed., 2009 Mar., 13(2):158-165.
-
(2009)
IEEE Trans. Inf. Technol. Biomed.
, vol.13
, Issue.2
, pp. 158-165
-
-
Coatrieux, G.1
Le Guillou, C.2
Cauvin, J.-M.3
Roux, C.4
-
9
-
-
0003400251
-
-
Technical Report ESD-TR-75-306, MTR- 2997, MITRE, Bedford, Mass
-
D. Bell and L. LaPadula, "Secure Computer Systems: Unified Exposition and Multics Interpretation," Technical Report ESD-TR-75-306, MTR- 2997, MITRE, Bedford, Mass, 1975.
-
(1975)
Secure Computer Systems: Unified Exposition and Multics Interpretation
-
-
Bell, D.1
Lapadula, L.2
-
10
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, Coyne E. J., Feinstein H. L., Youman C. E, "Role-Based Access Control Models," IEEE Computer, vol. 29, no 2, 1996, p. 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
11
-
-
77952407814
-
Organization based access control (Or-BAC)
-
Lake Come, Italy, June
-
A. E. Kalam, Baida R. E., Balbiani P., Benferhat S., Cuppens F., Deswarte Y., Miège A., Saurel C., Trouessin G, "Organization Based Access Control (Or-BAC)," IEEE 4th International Workshop on Policies for Distributed Systems and Networks (Policy 2003), Lake Come, Italy, June 2003.
-
(2003)
IEEE 4th International Workshop on Policies for Distributed Systems and Networks (Policy 2003)
-
-
Kalam, A.E.1
Baida, R.E.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miège, A.7
Saurel, C.8
Trouessin, G.9
-
12
-
-
79951630468
-
O2O: Virtual private organizations to manage security policy interoperability
-
December
-
F. Cuppens, N. Cuppens-Boulahia, and C. Coma, "O2O: Virtual Private Organizations to Manage Security Policy Interoperability," In 2nd ICISS, December 2006.
-
(2006)
2nd ICISS
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Coma, C.3
-
13
-
-
0034775562
-
Strict integrity control of biomedical images
-
DOI 10.1117/12.435403
-
Coatrieux, G., B. Sankur, and H. Maître, "Strict Integrity Control of Biomedical Images," in Proc. of Electronic Imaging, Security and Watermarking of Multimedia Contents, SPIE, 2001, USA, pp.229-240. (Pubitemid 33012240)
-
(2001)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.4314
, pp. 229-240
-
-
Coatrieux, G.1
Maitre, H.2
Sankur, B.3
-
14
-
-
0035413322
-
Authenticity and integrity of digital mammography images
-
DOI 10.1109/42.938246, PII S0278006201065855
-
Zhou, X. Q., H. K. Huang, and S. L. Lou, "Authenticity and integrity of digital mammography images," IEEE Trans. on Medical Imaging, 2001, vol. 20(8) pp.784-791. (Pubitemid 32819119)
-
(2001)
IEEE Transactions on Medical Imaging
, vol.20
, Issue.8
, pp. 784-791
-
-
Zhou, X.Q.1
Huang, H.K.2
Lou, S.L.3
-
15
-
-
0013316594
-
Safeguarding digital library contents and users: Digital watermarking
-
Mintzer, F., J. Lotspiech, and N. Morimoto, "Safeguarding digital library contents and users: Digital watermarking," D-Lib Mag., 1997.
-
(1997)
D-Lib Mag.
-
-
Mintzer, F.1
Lotspiech, J.2
Morimoto, N.3
-
16
-
-
0038421787
-
Reversible data hiding
-
May
-
Z. Ni, Y. Shi, N. Ansari, S.Wei, "Reversible data hiding," in Proc. of IEEE Int. Symp. Circuits and Systems, May 2003, vol. 2, pp. 912-915.
-
(2003)
Proc. of IEEE Int. Symp. Circuits and Systems
, vol.2
, pp. 912-915
-
-
Ni, Z.1
Shi, Y.2
Ansari, N.3
Wei, S.4
-
17
-
-
0034765589
-
Invertible authentication
-
DOI 10.1117/12.435400
-
J. Fridrich, J. Goljan, R. Du, "Invertible authentication," in Proc. of Int. Conf. SPIE, Security and Watermarking of Multimedia Content, San Jose, CA, Jan. 2001, pp. 197-208. (Pubitemid 33017701)
-
(2001)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.4314
, pp. 197-208
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
18
-
-
0141862029
-
Reversible data embedding using a difference expansion
-
Aug.
-
J. Tian, "Reversible data embedding using a difference expansion," IEEE Trans. on Circuits Syst. Video Technol., 13(8), pp. 890-896, Aug. 2003.
-
(2003)
IEEE Trans. on Circuits Syst. Video Technol.
, vol.13
, Issue.8
, pp. 890-896
-
-
Tian, J.1
-
19
-
-
78650816021
-
An additive and lossless watermarking method based on invariant image approximation and haar wavelet transform
-
accepted, Buenos Aires, Argentina
-
W. Pan, G. Coatrieux, N. Cuppens, F. Cuppens and Ch. Roux, "An Additive and Lossless Watermarking Method Based on Invariant Image Approximation and Haar Wavelet Transform," accepted in Proc. of the IEEE EMBC Conf., Buenos Aires, Argentina, 2010.
-
(2010)
Proc. of the IEEE EMBC Conf.
-
-
Pan, W.1
Coatrieux, G.2
Cuppens, N.3
Cuppens, F.4
Roux, Ch.5
-
20
-
-
47649083260
-
Modeling contextual security policies
-
F. Cuppens and N. Cuppens-Boulahia, "Modeling contextual security policies," Int. J. Inf. Secur., 7(4):285-305, 2008.
-
(2008)
Int. J. Inf. Secur.
, vol.7
, Issue.4
, pp. 285-305
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
-
21
-
-
70350388459
-
MotOrBAC 2: A security policy tool
-
Loctudy, France, 13-17 October
-
F. Autrel, F. Cuppens, N. Cuppens-Boulahia et C. Coma, "MotOrBAC 2: a security policy tool," Third Joint Conf. on Secu. in Networks Archi. and Secu. of Infor. Syst., Loctudy, France, 13-17 October 2008.
-
(2008)
Third Joint Conf. on Secu. in Networks Archi. and Secu. of Infor. Syst.
-
-
Autrel, F.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Coma, C.4
-
22
-
-
1542267916
-
E-Consent: The Design and Implementation of Consumer Consent Mechanisms in an Electronic Environment
-
DOI 10.1197/jamia.M1480
-
Coiera, E, "e-Consent: The Design and Implementation of Consumer Consent Mechanisms in an Electronic Environment," Journal of the American Medical Informatics Association, 11 (2004), pp. 129-140. (Pubitemid 38327502)
-
(2004)
Journal of the American Medical Informatics Association
, vol.11
, Issue.2
, pp. 129-140
-
-
Coiera, E.1
Clarke, R.2
-
24
-
-
77950967404
-
Comparison of some reversible watermarking methods in application to medical images
-
Mineapolis, United States, Sept.
-
W. Pan, G. Coatrieux, N. Cuppens, F. Cuppens and Ch. Roux, "Comparison of some reversible watermarking methods in application to medical images," in Proc. of the IEEE EMBC Conf., Mineapolis, United States, Sept. 2009, pp 2172-2175.
-
(2009)
Proc. of the IEEE EMBC Conf.
, pp. 2172-2175
-
-
Pan, W.1
Coatrieux, G.2
Cuppens, N.3
Cuppens, F.4
Roux, Ch.5
|