Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 8 de 8
Filtrar
1.
Comput Methods Programs Biomed ; 160: 119-128, 2018 Jul.
Artigo em Inglês | MEDLINE | ID: mdl-29728239

RESUMO

BACKGROUND AND OBJECTIVE: Advances in information and communication technologies boost the sharing and remote access to medical images. Along with this evolution, needs in terms of data security are also increased. Watermarking can contribute to better protect images by dissimulating into their pixels some security attributes (e.g., digital signature, user identifier). But, to take full advantage of this technology in healthcare, one key problem to address is to ensure that the image distortion induced by the watermarking process does not endanger the image diagnosis value. To overcome this issue, reversible watermarking is one solution. It allows watermark removal with the exact recovery of the image. Unfortunately, reversibility does not mean that imperceptibility constraints are relaxed. Indeed, once the watermark removed, the image is unprotected. It is thus important to ensure the invisibility of reversible watermark in order to ensure a permanent image protection. METHODS: We propose a new fragile reversible watermarking scheme for digital radiographic images, the main originality of which stands in masking a reversible watermark into the image quantum noise (the dominant noise in radiographic images). More clearly, in order to ensure the watermark imperceptibility, our scheme differentiates the image black background, where message embedding is conducted into pixel gray values with the well-known histogram shifting (HS) modulation, from the anatomical object, where HS is applied to wavelet detail coefficients, masking the watermark with the image quantum noise. In order to maintain the watermark embedder and reader synchronized in terms of image partitioning and insertion domain, our scheme makes use of different classification processes that are invariant to message embedding. RESULTS: We provide the theoretical performance limits of our scheme into the image quantum noise in terms of image distortion and message size (i.e. capacity). Experiments conducted on more than 800 12 bits radiographic images of different anatomical structures show that our scheme induces a very low image distortion (PSNR∼ 76.5 dB) for a relatively important capacity (capacity∼ 0.02 bits of message per pixel). CONCLUSIONS: The proposed watermarking scheme, while being reversible, preserves the diagnosis value of radiographic images by masking the watermark into the quantum noise. As theoretically and experimentally established our scheme offers a good capacity/image quality compromise that can support different watermarking based security services such as integrity and authenticity control. The watermark can be kept into the image during the interpretation of the image, offering thus a continuous protection. Such a masking strategy can be seen as the first psychovisual model for radiographic images. The reversibility allows the watermark update when necessary.


Assuntos
Segurança Computacional/estatística & dados numéricos , Segurança Computacional/normas , Intensificação de Imagem Radiográfica/normas , Bases de Dados Factuais/normas , Bases de Dados Factuais/estatística & dados numéricos , Humanos , Modelos Estatísticos , Teoria Quântica , Razão Sinal-Ruído
2.
IEEE J Biomed Health Inform ; 21(4): 1039-1048, 2017 07.
Artigo em Inglês | MEDLINE | ID: mdl-27295695

RESUMO

In this paper, we focus on the "blind" identification of the computed tomography (CT) scanner that has produced a CT image. To do so, we propose a set of noise features derived from the image chain acquisition and which can be used as CT-scanner footprint. Basically, we propose two approaches. The first one aims at identifying a CT scanner based on an original sensor pattern noise (OSPN) that is intrinsic to the X-ray detectors. The second one identifies an acquisition system based on the way this noise is modified by its three-dimensional (3-D) image reconstruction algorithm. As these reconstruction algorithms are manufacturer dependent and kept secret, our features are used as input to train a support vector machine (SVM) based classifier to discriminate acquisition systems. Experiments conducted on images issued from 15 different CT-scanner models of 4 distinct manufacturers demonstrate that our system identifies the origin of one CT image with a detection rate of at least 94% and that it achieves better performance than sensor pattern noise (SPN) based strategy proposed for general public camera devices.


Assuntos
Imageamento Tridimensional/métodos , Tomografia Computadorizada por Raios X/métodos , Algoritmos , Humanos , Máquina de Vetores de Suporte
3.
Stud Health Technol Inform ; 245: 303-307, 2017.
Artigo em Inglês | MEDLINE | ID: mdl-29295104

RESUMO

Sharing and exploiting Health Big Data (HBD) allow tackling challenges: data protection/governance taking into account legal, ethical, and deontological aspects enables trust, transparent and win-win relationship between researchers, citizens, and data providers. Lack of interoperability: compartmentalized and syntactically/semantica heterogeneous data. INSHARE project using experimental proof of concept explores how recent technologies overcome such issues. Using 6 data providers, platform is designed via 3 steps to: (1) analyze use cases, needs, and requirements; (2) define data sharing governance, secure access to platform; and (3) define platform specifications. Three use cases - from 5 studies and 11 data sources - were analyzed for platform design. Governance derived from SCANNER model was adapted to data sharing. Platform architecture integrates: data repository and hosting, semantic integration services, data processing, aggregate computing, data quality and integrity monitoring, Id linking, multisource query builder, visualization and data export services, data governance, study management service and security including data watermarking.


Assuntos
Segurança Computacional , Armazenamento e Recuperação da Informação , Sistemas Computacionais , Humanos , Disseminação de Informação , Pesquisa
4.
Annu Int Conf IEEE Eng Med Biol Soc ; 2016: 2537-2540, 2016 Aug.
Artigo em Inglês | MEDLINE | ID: mdl-28268839

RESUMO

In this paper, we propose a new secure content based image retrieval (SCBIR) system adapted to the cloud framework. This solution allows a physician to retrieve images of similar content within an outsourced and encrypted image database, without decrypting them. Contrarily to actual CBIR approaches in the encrypted domain, the originality of the proposed scheme stands on the fact that the features extracted from the encrypted images are themselves encrypted. This is achieved by means of homomorphic encryption and two non-colluding servers, we however both consider as honest but curious. In that way an end to end secure CBIR process is ensured. Experimental results carried out on a diabetic retinopathy database encrypted with the Paillier cryptosystem indicate that our SCBIR achieves retrieval performance as good as if images were processed in their non-encrypted form.


Assuntos
Segurança Computacional , Bases de Dados Factuais , Retinopatia Diabética/epidemiologia , Retinopatia Diabética/terapia , Diagnóstico por Computador/métodos , Informática Médica/métodos , Algoritmos , Computação em Nuvem , Computadores , Registros Eletrônicos de Saúde , Humanos , Modelos Estatísticos , Distribuição Normal , Linguagens de Programação , Análise de Ondaletas
5.
Stud Health Technol Inform ; 210: 251-5, 2015.
Artigo em Inglês | MEDLINE | ID: mdl-25991144

RESUMO

Cloud computing promises medical imaging services offering large storage and computing capabilities for limited costs. In this data outsourcing framework, one of the greatest issues to deal with is data security. To do so, we propose to secure a public cloud platform devoted to medical image sharing by defining and deploying a security policy so as to control various security mechanisms. This policy stands on a risk assessment we conducted so as to identify security objectives with a special interest for digital content protection. These objectives are addressed by means of different security mechanisms like access and usage control policy, partial-encryption and watermarking.


Assuntos
Computação em Nuvem , Segurança Computacional , Confidencialidade , Armazenamento e Recuperação da Informação/métodos , Registro Médico Coordenado/métodos , Sistemas de Informação em Radiologia/organização & administração , Algoritmos , Processamento de Sinais Assistido por Computador
6.
Annu Int Conf IEEE Eng Med Biol Soc ; 2015: 2944-7, 2015 Aug.
Artigo em Inglês | MEDLINE | ID: mdl-26736909

RESUMO

In this paper, we propose a secure implementation of a content-based image retrieval (CBIR) method that makes possible diagnosis aid systems to work in externalized environment and with outsourced data as in cloud computing. This one works with homomorphic encrypted images from which it extracts wavelet based image features next used for subsequent image comparison. By doing so, our system allows a physician to retrieve the most similar images to a query image in an outsourced database while preserving data confidentiality. Our Secure CBIR is the first one that proposes to work with global image features extracted from encrypted images and does not induce extra communications in-between the client and the server. Experimental results show it achieves retrieval performance as good as if images were processed non-encrypted.


Assuntos
Bases de Dados Factuais , Computação em Nuvem , Confidencialidade , Armazenamento e Recuperação da Informação
7.
IEEE Trans Inf Technol Biomed ; 16(5): 891-9, 2012 Sep.
Artigo em Inglês | MEDLINE | ID: mdl-22801525

RESUMO

In this paper, we propose a joint encryption/water-marking system for the purpose of protecting medical images. This system is based on an approach which combines a substitutive watermarking algorithm, the quantization index modulation, with an encryption algorithm: a stream cipher algorithm (e.g., the RC4) or a block cipher algorithm (e.g., the AES in cipher block chaining (CBC) mode of operation). Our objective is to give access to the outcomes of the image integrity and of its origin even though the image is stored encrypted. If watermarking and encryption are conducted jointly at the protection stage, watermark extraction and decryption can be applied independently. The security analysis of our scheme and experimental results achieved on 8-bit depth ultrasound images as well as on 16-bit encoded positron emission tomography images demonstrate the capability of our system to securely make available security attributes in both spatial and encrypted domains while minimizing image distortion. Furthermore, by making use of the AES block cipher in CBC mode, the proposed system is compliant with or transparent to the DICOM standard.


Assuntos
Algoritmos , Segurança Computacional , Diagnóstico por Imagem/métodos , Registros Eletrônicos de Saúde , Processamento de Imagem Assistida por Computador/métodos , Bases de Dados Factuais , Humanos , Reprodutibilidade dos Testes
8.
Comput Methods Programs Biomed ; 106(1): 47-54, 2012 Apr.
Artigo em Inglês | MEDLINE | ID: mdl-22054815

RESUMO

In this paper we propose a joint encryption/watermarking algorithm for the purpose of protecting medical images. The proposed solution gives access to the outcomes of the image integrity and of its origins as its attachment to one patient even if the image is stored encrypted. In this study, the given solution combines the RC4 stream cipher and two substitutive watermarking modulations: the Least Significant Bit Method and the Quantization Index Modulation. If watermarking and encryption are conducted jointly at the protection stage, watermark extraction and decryption can be applied independently. Experimental results achieved on 8 bits encoded echographic images illustrate the overall performances of the proposed scheme. At least, a capacity rate of 1 and 0.5 bits of message per pixel of image can be embedded in the spatial and the encrypted domains respectively, with a peak signal to noise ratio greater than 49 dB.


Assuntos
Algoritmos , Segurança Computacional/estatística & dados numéricos , Ultrassonografia/estatística & dados numéricos , Segurança Computacional/normas , Humanos , Interpretação de Imagem Assistida por Computador/métodos , Reprodutibilidade dos Testes , Razão Sinal-Ruído
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...