-
1
-
-
78751704723
-
Medical record search engines, using pseudonymised patient identity: an alternative to centralised medical records
-
[1] Quantin, C., Jaquet-Chiffelle, D.O., Coatrieux, G., Benzenine, E., Allaërt, F.A., Medical record search engines, using pseudonymised patient identity: an alternative to centralised medical records. Int. J. Med. Inform. 80:2 (2011), 6–11.
-
(2011)
Int. J. Med. Inform.
, vol.80
, Issue.2
, pp. 6-11
-
-
Quantin, C.1
Jaquet-Chiffelle, D.O.2
Coatrieux, G.3
Benzenine, E.4
Allaërt, F.A.5
-
2
-
-
84945449361
-
A teleassistance protocol based on joint watermarking-encryption evidence for identification of liabilities in case of litigation
-
[2] Bouslimi, D., Coatrieux, G., Quantin, C., Allaërt, F.-A., Cozic, M., Roux, Ch, A teleassistance protocol based on joint watermarking-encryption evidence for identification of liabilities in case of litigation. Innov. Res. Biomed. Eng. 36:5 (2015), 279–286.
-
(2015)
Innov. Res. Biomed. Eng.
, vol.36
, Issue.5
, pp. 279-286
-
-
Bouslimi, D.1
Coatrieux, G.2
Quantin, C.3
Allaërt, F.-A.4
Cozic, M.5
Roux, C.6
-
3
-
-
84866611349
-
A joint encryption/watermarking system for verifying the reliability of medical images
-
[3] Bouslimi, D., Coatrieux, G., Cozic, M., Roux, C., A joint encryption/watermarking system for verifying the reliability of medical images. IEEE Trans. Inf. Technol. Biomed. 16 (2012), 891–899.
-
(2012)
IEEE Trans. Inf. Technol. Biomed.
, vol.16
, pp. 891-899
-
-
Bouslimi, D.1
Coatrieux, G.2
Cozic, M.3
Roux, C.4
-
4
-
-
44349153580
-
Watermarking medical images with anonymous patient identification to verify authenticity
-
[4] Coatrieux, G., Quantin, C., Montagner, J., Fassa, M., Allaërt, F.-A., Roux, Ch, Watermarking medical images with anonymous patient identification to verify authenticity. Stud. Health Technol. Inf. 136 (2008), 667–672.
-
(2008)
Stud. Health Technol. Inf.
, vol.136
, pp. 667-672
-
-
Coatrieux, G.1
Quantin, C.2
Montagner, J.3
Fassa, M.4
Allaërt, F.-A.5
Roux, C.6
-
5
-
-
33746967065
-
Secure and efficient health data management through multiple watermarking on medical images
-
[5] Giakoumaki, A., Pavlopoulos, S., Koutsouris, D., Secure and efficient health data management through multiple watermarking on medical images. Med. Biol. Eng. Comput. 44:8 (2006), 619–631.
-
(2006)
Med. Biol. Eng. Comput.
, vol.44
, Issue.8
, pp. 619-631
-
-
Giakoumaki, A.1
Pavlopoulos, S.2
Koutsouris, D.3
-
6
-
-
84872116919
-
Reversible watermarking based on invariant image classification and dynamical error histogram shifting
-
[6] Coatrieux, G., Pan, W., Montagner, J., Cuppens, N., Cuppens, F., Roux, C., Reversible watermarking based on invariant image classification and dynamical error histogram shifting. IEEE Trans. Inf. Forensics Secur. 8:1 (2013), 111–120.
-
(2013)
IEEE Trans. Inf. Forensics Secur.
, vol.8
, Issue.1
, pp. 111-120
-
-
Coatrieux, G.1
Pan, W.2
Montagner, J.3
Cuppens, N.4
Cuppens, F.5
Roux, C.6
-
7
-
-
84976279012
-
-
Multiple watermark method for privacy control and tamper detection in medical images, in: Proceedings of the APRS Workshop on Digital Image Computing, Australia, 2005, pp. 59–64.
-
[7] C.-S. Woo, J. Du, B. Pham, Multiple watermark method for privacy control and tamper detection in medical images, in: Proceedings of the APRS Workshop on Digital Image Computing, Australia, 2005, pp. 59–64.
-
-
-
Woo, C.-S.1
Du, J.2
Pham, B.3
-
8
-
-
4143061391
-
Simultaneous storage of patient information with medical images in the frequency domain
-
[8] Rajendra Acharya, U., Niranjan, U.C., Iyengar, S.S., Kannathal, N., Choo Min, Lim, Simultaneous storage of patient information with medical images in the frequency domain. Comput. Methods Prog. Biomed. 76 (2004), 13–19.
-
(2004)
Comput. Methods Prog. Biomed.
, vol.76
, pp. 13-19
-
-
Rajendra Acharya, U.1
Niranjan, U.C.2
Iyengar, S.S.3
Kannathal, N.4
Choo Min, L.5
-
9
-
-
51349140801
-
-
Analyzing the secure and energy efficient transmissions of compressed fingerprint images using encryption and watermarking, in: Proceedings of International Conference on Information Security and Assurance, 2008, pp. 316–320.
-
[9] H. Seungwoo, K. Hakjae, L. Sungju, C. Yongwha, Analyzing the secure and energy efficient transmissions of compressed fingerprint images using encryption and watermarking, in: Proceedings of International Conference on Information Security and Assurance, 2008, pp. 316–320.
-
-
-
Seungwoo, H.1
Hakjae, K.2
Sungju, L.3
Yongwha, C.4
-
10
-
-
84892526118
-
-
Digital image security improvement by integrating watermarking and encryption technique, in: Proceedings of IEEE International Conference on Signal Processing, Computing and Control (ISPCC), Solan, September 2013, pp. 1–6.
-
[10] S.P. Metkar, M.V. Lichade, Digital image security improvement by integrating watermarking and encryption technique, in: Proceedings of IEEE International Conference on Signal Processing, Computing and Control (ISPCC), Solan, September 2013, pp. 1–6.
-
-
-
Metkar, S.P.1
Lichade, M.V.2
-
11
-
-
84960158497
-
-
On secure image transmission combining chaotic encryption and watermarking using dead beat synchronization of 4D Henon maps, in: Proceedings of the 3rd International Conference on Control, Engineering & Information Technology (CEIT), May 2015, pp. 1–4.
-
[11] N. Khalifa, R. L. Filali, M. Benrejeb, On secure image transmission combining chaotic encryption and watermarking using dead beat synchronization of 4D Henon maps, in: Proceedings of the 3rd International Conference on Control, Engineering & Information Technology (CEIT), May 2015, pp. 1–4.
-
-
-
Khalifa, N.1
Filali, R.L.2
Benrejeb, M.3
-
12
-
-
0035307977
-
A buyer-seller watermarking protocol
-
[12] Memon, N.D., Wong, P.W., A buyer-seller watermarking protocol. IEEE Trans. Image Process. 10:4 (2001), 643–649.
-
(2001)
IEEE Trans. Image Process.
, vol.10
, Issue.4
, pp. 643-649
-
-
Memon, N.D.1
Wong, P.W.2
-
13
-
-
78649400346
-
A provably secure anonymous buyer–seller watermarking protocol
-
[13] Rial, A., Deng, M., Bianchi, T., Piva, A., Preneel, B., A provably secure anonymous buyer–seller watermarking protocol. IEEE Trans. Inf. Forensics Secur. 5:4 (2010), 920–931.
-
(2010)
IEEE Trans. Inf. Forensics Secur.
, vol.5
, Issue.4
, pp. 920-931
-
-
Rial, A.1
Deng, M.2
Bianchi, T.3
Piva, A.4
Preneel, B.5
-
14
-
-
42949161065
-
-
A reversible data hiding method for encrypted images, in: Proceedings of SPIE Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, p. 68191E.
-
[14] W. Puech, M. Chaumont, O. Strauss, A reversible data hiding method for encrypted images, in: Proceedings of SPIE Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents, San Jose, CA, USA, 2008, p. 68191E.
-
-
-
Puech, W.1
Chaumont, M.2
Strauss, O.3
-
15
-
-
84863379693
-
Separable reversible data hiding in encrypted image
-
[15] Zhang, X., Separable reversible data hiding in encrypted image. IEEE Trans. Inf. Forensics Secur. 7:2 (2012), 826–832.
-
(2012)
IEEE Trans. Inf. Forensics Secur.
, vol.7
, Issue.2
, pp. 826-832
-
-
Zhang, X.1
-
16
-
-
84927666715
-
-
Ch. Roux, An a priori and a posteriori protection by means of data hiding of encrypted images: application to ultrasound images, in: Proceedings of International Conference on Health Informatics (ICHI), Vilamoura, Portugal, Vol. 42, November 2013, pp. 220-223.
-
[16] D. Bouslimi, G. Coatrieux, M. Cozic, Ch. Roux, An a priori and a posteriori protection by means of data hiding of encrypted images: application to ultrasound images, in: Proceedings of International Conference on Health Informatics (ICHI), Vilamoura, Portugal, Vol. 42, November 2013, pp. 220-223.
-
-
-
Bouslimi, D.1
Coatrieux, G.2
Cozic, M.3
-
17
-
-
84928975189
-
High capacity reversible data hiding in encrypted images by patch-level sparse representation
-
[17] Cao, X., Du, L., Wei, X., Meng, D., Guo, X., High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans. Cybern., 46(5), 2015.
-
(2015)
IEEE Trans. Cybern.
, vol.46
, Issue.5
-
-
Cao, X.1
Du, L.2
Wei, X.3
Meng, D.4
Guo, X.5
-
18
-
-
84875018020
-
Reversible data hiding in encrypted images by reserving room before encryption
-
[18] Ma, K., Zhang, W., Zhao, X., Yu, N., Li, F., Reversible data hiding in encrypted images by reserving room before encryption. IEEE Trans. Inf. Forensics Secur. 8:3 (2013), 553–562.
-
(2013)
IEEE Trans. Inf. Forensics Secur.
, vol.8
, Issue.3
, pp. 553-562
-
-
Ma, K.1
Zhang, W.2
Zhao, X.3
Yu, N.4
Li, F.5
-
19
-
-
84880868167
-
Reversibility improved data hiding in encrypted images
-
[19] Zhang, W., Ma, K., Yu, N., Reversibility improved data hiding in encrypted images. Signal Process. 94 (2014), 118–127.
-
(2014)
Signal Process.
, vol.94
, pp. 118-127
-
-
Zhang, W.1
Ma, K.2
Yu, N.3
-
20
-
-
43949118608
-
A survey of homomorphic encryption for nonspecialists
-
[20] Fontaine, C., Galand, F., A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur. 2007:1 (2007), 1–15.
-
(2007)
EURASIP J. Inf. Secur.
, vol.2007
, Issue.1
, pp. 1-15
-
-
Fontaine, C.1
Galand, F.2
-
21
-
-
84947921901
-
-
Chameleon – a new kind of stream cipher, in: Proceedings of the 4th International Workshop on Fast Software Encryption, Vol. 1267, 1997, pp. 107–113.
-
[21] R. Anderson, C. Manifavas, Chameleon – a new kind of stream cipher, in: Proceedings of the 4th International Workshop on Fast Software Encryption, Vol. 1267, 1997, pp. 107–113.
-
-
-
Anderson, R.1
Manifavas, C.2
-
22
-
-
77249113281
-
Secure client-side ST-DM watermark embedding
-
[22] Piva, A., Bianchi, T., De Rosa, A., Secure client-side ST-DM watermark embedding. IEEE Trans. Inf. Forensics Secur. 5:1 (2010), 13–26.
-
(2010)
IEEE Trans. Inf. Forensics Secur.
, vol.5
, Issue.1
, pp. 13-26
-
-
Piva, A.1
Bianchi, T.2
De Rosa, A.3
-
23
-
-
34547554409
-
-
M. van der Veen, Secure embedding of spread spectrum watermarks using look-up-tables, in: Proceedings of the International Conference on Acoustics, Speech and Signal Processing (ICASSP), Hawaii, USA, Vol. 2, April 2007, pp. 153–156.
-
[23] M. Celik, A.N. Lemma, S. Katzenbeisser, M. van der Veen, Secure embedding of spread spectrum watermarks using look-up-tables, in: Proceedings of the International Conference on Acoustics, Speech and Signal Processing (ICASSP), Hawaii, USA, Vol. 2, April 2007, pp. 153–156.
-
-
-
Celik, M.1
Lemma, A.N.2
Katzenbeisser, S.3
-
24
-
-
84905234288
-
-
TTP-free asymmetric fingerprinting protocol based on client side embedding, in: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, May 2014, pp. 3987–3991.
-
[24] T. Bianchi, A. Piva, TTP-free asymmetric fingerprinting protocol based on client side embedding, in: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, May 2014, pp. 3987–3991.
-
-
-
Bianchi, T.1
Piva, A.2
-
25
-
-
84900869831
-
A joint fed watermarking system using spatial fusion for verifying the security issues of teleradiology
-
[25] Viswanathan, P., Krishna, P.V., A joint fed watermarking system using spatial fusion for verifying the security issues of teleradiology. IEEE J. Biomed. Health Inf. 18:3 (2014), 753–764.
-
(2014)
IEEE J. Biomed. Health Inf.
, vol.18
, Issue.3
, pp. 753-764
-
-
Viswanathan, P.1
Krishna, P.V.2
-
26
-
-
0035333687
-
Quantization index modulation: a class of provably good methods for digital watermarking and information embedding
-
[26] Chen, B., Wornell, G.W., Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47:4 (2001), 1423–1443.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
27
-
-
77951595347
-
Medical image integrity control combining digital signature and lossless watermarking
-
[27] Pan, W., Coatrieux, G., Cuppens-Boulahia, N., Cuppens, F., Roux, Ch, Medical image integrity control combining digital signature and lossless watermarking. Lect. Notes Comput. Sci. 5939 (2010), 153–162.
-
(2010)
Lect. Notes Comput. Sci.
, vol.5939
, pp. 153-162
-
-
Pan, W.1
Coatrieux, G.2
Cuppens-Boulahia, N.3
Cuppens, F.4
Roux, C.5
-
28
-
-
44049086946
-
-
Capacity bounds and rate-distortion-analysis in dither vector QIM watermarkingwith JPEG and JPEG2000 Attack, in: Proceedings of the 40th Annual Conference on Information Sciences and Systems, Princeton, NJ, 2006, pp. 766–770.
-
[28] Y. Xiang, M. Salehi, Capacity bounds and rate-distortion-analysis in dither vector QIM watermarkingwith JPEG and JPEG2000 Attack, in: Proceedings of the 40th Annual Conference on Information Sciences and Systems, Princeton, NJ, 2006, pp. 766–770.
-
-
-
Xiang, Y.1
Salehi, M.2
-
29
-
-
0038447029
-
-
Optimal probabilistic fingerprint codes, in: Proceedings of the Thirty-fifth Annual ACM Symposium on Theory of Computing (STOC), 2003, pp. 116–125.
-
[29] G. Tardos, Optimal probabilistic fingerprint codes, in: Proceedings of the Thirty-fifth Annual ACM Symposium on Theory of Computing (STOC), 2003, pp. 116–125.
-
-
-
Tardos, G.1
-
30
-
-
0028495791
-
Near-lossless compression of medical images through entropy coded DPCM
-
[30] Chen, K., Ramabadran, T.V., Near-lossless compression of medical images through entropy coded DPCM. IEEE Trans. Med. Imaging, 1994.
-
(1994)
IEEE Trans. Med. Imaging
-
-
Chen, K.1
Ramabadran, T.V.2
-
31
-
-
0642305414
-
Is digital image compression acceptable within diabetic retinopathy screening?
-
[31] Basu, A., Kamal, A.D., Illahi, W., Khan, M., Stavrou, P., Ryder, R.E.J., Is digital image compression acceptable within diabetic retinopathy screening?. Diabet. Med. 20 (2003), 766–771.
-
(2003)
Diabet. Med.
, vol.20
, pp. 766-771
-
-
Basu, A.1
Kamal, A.D.2
Illahi, W.3
Khan, M.4
Stavrou, P.5
Ryder, R.E.J.6
-
32
-
-
79952539535
-
-
Watermarking to enforce medical image access and usage control policy, in: Proceedings of Signal-Image Technology and Internet-Based Systems (SITIS), Kuala Lampur, Malaysia, December 2010, pp. 251–260.
-
[32] W. Pan, G. Coatrieux, N. Cuppens-Boulahia, F. Cuppens, C. Roux, Watermarking to enforce medical image access and usage control policy, in: Proceedings of Signal-Image Technology and Internet-Based Systems (SITIS), Kuala Lampur, Malaysia, December 2010, pp. 251–260.
-
-
-
Pan, W.1
Coatrieux, G.2
Cuppens-Boulahia, N.3
Cuppens, F.4
Roux, C.5
-
33
-
-
84979950600
-
-
A new crypto-watermarking method for medical images safe transfer, in: Proceedings of the 12th European Signal Processing Conference (EUSIPCO'04), Vienna, Austria, September 2004, pp. 1481–1484.
-
[33] W. Puech, J.M. Rodrigues, A new crypto-watermarking method for medical images safe transfer, in: Proceedings of the 12th European Signal Processing Conference (EUSIPCO'04), Vienna, Austria, September 2004, pp. 1481–1484.
-
-
-
Puech, W.1
Rodrigues, J.M.2
-
34
-
-
84905234288
-
-
TTP-free asymmetric fingerprinting protocol based on client side embedding, in: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), May 2014, pp. 3987–3991.
-
[34] T. Bianchi, A. Piva, TTP-free asymmetric fingerprinting protocol based on client side embedding, in: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), May 2014, pp. 3987–3991.
-
-
-
Bianchi, T.1
Piva, A.2
-
35
-
-
84976301208
-
-
Lecture notes on cryptography, Summer Course “Cryptography and Computer security”, MIT, Vol. 1999, 1996.
-
[35] S. Goldwasser, M. Bellare, Lecture notes on cryptography, Summer Course “Cryptography and Computer security”, MIT, Vol. 1999, 1996.
-
-
-
Goldwasser, S.1
Bellare, M.2
|