-
1
-
-
0034450986
-
Relevance of watermarking in medical imaging
-
G. Coatrieux, H. Maître, B. Sankur, Y. Rolland, and R. Collorec, "Relevance of watermarking in medical imaging," in Proc. IEEE EMBS Int. Conf. Inf. Technol. Appl. Biomed., 2000, pp. 250-255. (Pubitemid 32302628)
-
(2000)
Proceedings of the IEEE/EMBS Region 8 International Conference on Information Technology Applications in Biomedicine, ITAB
, pp. 250-255
-
-
Coatrieux, G.1
Maitre, H.2
Sankur, B.3
Rolland, Y.4
Collorec, R.5
-
2
-
-
63349083498
-
Reversible watermarking for knowledge digest embedding and reliability control in medical images
-
Mar.
-
G. Coatrieux, C. Le Guillou, J.-M. Cauvin, and C. Roux, "Reversible watermarking for knowledge digest embedding and reliability control in medical images," IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 2, pp. 158-165, Mar. 2009.
-
(2009)
IEEE Trans. Inf. Technol. Biomed.
, vol.13
, Issue.2
, pp. 158-165
-
-
Coatrieux, G.1
Le Guillou, C.2
Cauvin, J.-M.3
Roux, C.4
-
3
-
-
0035605834
-
Compact storage of medical images with patient information
-
Dec.
-
U. Rajendra Acharya, D. Acharya, P. Subbanna Bhat, and U. C. Niranjan, "Compact storage of medical images with patient information," IEEE Trans. Inf. Technol. Biomed., vol. 5, no. 4, pp. 320-323, Dec. 2001.
-
(2001)
IEEE Trans. Inf. Technol. Biomed.
, vol.5
, Issue.4
, pp. 320-323
-
-
Rajendra Acharya, U.1
Acharya, D.2
Subbanna Bhat, P.3
Niranjan, U.C.4
-
4
-
-
77951595347
-
Medical image integrity control combining digital signature and losslesswatermarking
-
W. Pan, G. Coatrieux, N. Cuppens-Boulahia, F. Cuppens, and C. Roux, "Medical image integrity control combining digital signature and losslesswatermarking," Data Privacy Manage. Autonom. Spontaneous Sec. (LNCS), vol. 5939/2010, pp. 153-162, 2010.
-
(2010)
Data Privacy Manage. Autonom. Spontaneous Sec. (LNCS)
, vol.5939
, Issue.2010
, pp. 153-162
-
-
Pan, W.1
Coatrieux, G.2
Cuppens-Boulahia, N.3
Cuppens, F.4
Roux, C.5
-
5
-
-
4143061391
-
Simultaneous storage of patient information with medical images in the frequency domain
-
DOI 10.1016/j.cmpb.2004.02.009, PII S0169260704000707
-
U. Rajendra Acharya, U. C. Niranjan, S. S. Iyengar, N. Kannathal, and L. C. Min, "Simultaneous storage of patient information with medical images in the frequency domain," Comput. Methods Programs Biomed., vol. 76, pp. 13-19, 2004. (Pubitemid 39094636)
-
(2004)
Computer Methods and Programs in Biomedicine
, vol.76
, Issue.1
, pp. 13-19
-
-
Rajendra Acharya, U.1
Niranjan, U.C.2
Iyengar, S.S.3
Kannathal, N.4
Min, L.C.5
-
6
-
-
43249121872
-
Lossless crypto-data hiding in medical images without increasing the original image size
-
Sep.
-
J. M. Rodrigues,W. Puech, and C. Fiorio, "Lossless crypto-data hiding in medical images without increasing the original image size," in Proc. 2nd Int. Conf. Adv. Med. Signal Inf. Process., Sep. 2004, pp. 358-365.
-
(2004)
Proc. 2nd Int. Conf. Adv. Med. Signal Inf. Process.
, pp. 358-365
-
-
Rodrigues, J.M.1
Puech, W.2
Fiorio, C.3
-
7
-
-
84947921901
-
Chameleon - A New Kind of Stream Cipher
-
Fast Software Encryption
-
R. Anderson and C. Manifavas, "Chameleon: A new kind of stream cipher," in Proc. 4th Int. Workshop Fast Software Encryption, Haifa, Israel, Jan. 1997, vol. 1267, pp. 107-113. (Pubitemid 127100708)
-
(1997)
Lecture Notes In Computer Science
, Issue.1267
, pp. 107-113
-
-
Anderson, R.1
Manifavas, C.2
-
8
-
-
33746371748
-
Fingercasting - Joint fingerprinting and decryption of broadcast messages
-
DOI 10.1007/11780656-12, Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Proceedings
-
A. Adelsbach, U. Huber, and A. S. Sadeghi, "Fingercasting-joint fingerprinting and decryption of broadcast messags," in Proc. 11th AustralasianConf.Inf. Sec. Privacy,Melbourne,Australia, Jul. 2006, pp. 136-147. (Pubitemid 44113006)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4058
, pp. 136-147
-
-
Adelsbach, A.1
Huber, U.2
Sadeghi, A.-R.3
-
9
-
-
34547554409
-
Secure embedding of spread spectrum watermarks using look-up-tables
-
Apr.
-
M. Celik, A. N. Lemma, S. Katzenbeisser, and M. van der Veen, "Secure embedding of spread spectrum watermarks using look-up-tables," in Proc. Int. Conf. Acoust., Speech Signal Process., Apr. 2007, vol. 2, pp. 153-156.
-
(2007)
Proc. Int. Conf. Acoust., Speech Signal Process.
, vol.2
, pp. 153-156
-
-
Celik, M.1
Lemma, A.N.2
Katzenbeisser, S.3
Veen Der M.Van4
-
10
-
-
46449132725
-
Joint fingerprint embedding and decryption for video distribution
-
Jul.
-
L. Shiguo, L. Zhongxuan, R. Zhen, and W. Haila, "Joint fingerprint embedding and decryption for video distribution," in Proc. IEEE Int. Conf. Multimedia Expo., Jul. 2007, pp. 1523-1526.
-
(2007)
Proc. IEEE Int. Conf. Multimedia Expo.
, pp. 1523-1526
-
-
Shiguo, L.1
Zhongxuan, L.2
Zhen, R.3
Haila, W.4
-
11
-
-
34250017964
-
Commutative encryption and watermarking in video compression
-
Jun.
-
L. Shiguo, L. Zhongxuan, R. Zhen, and W. Haila, "Commutative encryption and watermarking in video compression," IEEE Trans. Circuits Syst. Video Technol., vol. 17, no. 6, pp. 774-778, Jun. 2007.
-
(2007)
IEEE Trans. Circuits Syst. Video Technol.
, vol.17
, Issue.6
, pp. 774-778
-
-
Shiguo, L.1
Zhongxuan, L.2
Zhen, R.3
Haila, W.4
-
13
-
-
84979950600
-
A new crypto-watermarking method for medical images safe transfer
-
Vienna, Austria, Sep.
-
W. Puech and J. M. Rodrigues, "A new crypto-watermarking method for medical images safe transfer," in Proc. 12th Eur. Signal Process. Conf., Vienna, Austria, Sep. 2004, pp. 1481-1484.
-
(2004)
Proc. 12th Eur. Signal Process. Conf.
, pp. 1481-1484
-
-
Puech, W.1
Rodrigues, J.M.2
-
14
-
-
42949147347
-
AES Proposal: The Rijndael block cipher
-
ESAT-COSIC, Katholieke Universiteit Leuven, Leuven-Heverlee, Belgium, Tech. Rep.
-
J. Daemen, V. Rijmen, "AES Proposal: The Rijndael block cipher," Proton World Int.1, ESAT-COSIC, Katholieke Universiteit Leuven, Leuven-Heverlee, Belgium, Tech. Rep., 2002.
-
(2002)
Proton World Int.
, vol.1
-
-
Daemen, J.1
Rijmen, V.2
-
15
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
DOI 10.1109/18.923725, PII S0018944801028346
-
B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001. (Pubitemid 32508483)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
16
-
-
44349153580
-
Watermarking medical images with anonymous patient identification to verify authenticity
-
G. Coatrieux, C. Quantin, J. Montagner, M. Fassa, F-.A. Allaërt, and Ch. Roux, "Watermarking medical images with anonymous patient identification to verify authenticity," Studies Health Technol. Inf., vol. 136, pp. 667-672, 2008.
-
(2008)
Studies Health Technol. Inf.
, vol.136
, pp. 667-672
-
-
Coatrieux, G.1
Quantin, C.2
Montagner, J.3
Fassa, M.4
Allaërt, F.-A.5
Roux, Ch.6
-
17
-
-
84863590326
-
Reversible watermarking based on invariant image classification and dynamical error histogram shifting
-
Boston, MA
-
W. Pan, G. Coatrieux, N. Cuppens-Boulahia, F. Cuppens, and C. Roux, "Reversible watermarking based on invariant image classification and dynamical error histogram shifting," in Proc. Annu. Conf. IEEE Eng. Med. Biol. Soc., Boston, MA, 2011, pp. 4477-4480.
-
(2011)
Proc. Annu. Conf. IEEE Eng. Med. Biol. Soc.
, pp. 4477-4480
-
-
Pan, W.1
Coatrieux, G.2
Cuppens-Boulahia, N.3
Cuppens, F.4
Roux, C.5
-
18
-
-
0028495791
-
Near-lossless compression of medical images through entropy coded DPCM
-
Sep.
-
K. Chen and T. V. Ramabadran, "Near-lossless compression of medical images through entropy coded DPCM," IEEE Trans. Med. Imag., vol. 13, no. 3, pp. 538-548, Sep. 1994.
-
(1994)
IEEE Trans. Med. Imag.
, vol.13
, Issue.3
, pp. 538-548
-
-
Chen, K.1
Ramabadran, T.V.2
-
19
-
-
79952539535
-
Watermarking to enforce medical image access and usage control policy
-
Kuala Lampur, Malaysia, Dec.
-
W. Pan, G. Coatrieux, N. Cuppens-Boulahia, F. Cuppens, and C. Roux, "Watermarking to enforce medical image access and usage control policy," in Proc. 6th Int. Conf. Signal-Image Technol. Internet-Based Syst., Kuala Lampur, Malaysia, Dec. 2010, pp. 251-260.
-
(2010)
Proc. 6th Int. Conf. Signal-Image Technol. Internet-Based Syst.
, pp. 251-260
-
-
Pan, W.1
Coatrieux, G.2
Cuppens-Boulahia, N.3
Cuppens, F.4
Roux, C.5
-
20
-
-
70349681076
-
Security theory and attack analysis for text watermarking
-
May
-
X. Zhou, W. Zhao, Z. Wang, and L. Pan, "Security theory and attack analysis for text watermarking," in Proc. Int. Conf. E-Business Inf. Syst. Security, May 2009, pp. 1-6.
-
(2009)
Proc. Int. Conf. E-Business Inf. Syst. Security
, pp. 1-6
-
-
Zhou, X.1
Zhao, W.2
Wang, Z.3
Pan, L.4
-
21
-
-
33845637704
-
Security of lattice-based data hiding against the known message attack
-
DOI 10.1109/TIFS.2006.885029
-
L. Perez-Freire and F. Perez-Gonzalez, "Security of lattice-based data hiding against the known message attack," IEEE Trans. Inf. Forensics Securiry, vol. 1, no. 4, pp. 421-439, Dec. 2006. (Pubitemid 44947728)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.4
, pp. 421-439
-
-
Perez-Freire, L.1
Perez-Gonzalez, F.2
Furon, T.3
Comesana, P.4
-
22
-
-
77951948410
-
Security evaluation of informed watermarking schemes
-
Nov.
-
S. Braci, R. Boyer, and C. Delpha, "Security evaluation of informed watermarking schemes," in Proc. 16th IEEE Int. Conf. Image Process., Nov. 2009, pp. 117-120.
-
(2009)
Proc. 16th IEEE Int. Conf. Image Process.
, pp. 117-120
-
-
Braci, S.1
Boyer, R.2
Delpha, C.3
|