Chapter 10: Hybrid Coding Using Encryption, Data Hiding and Compression for the Security of Medical Information
暂无分享,去创建一个
[1] Andreas Uhl,et al. Confidential storage and transmission of medical image data , 2003, Comput. Biol. Medicine.
[2] C. Roux,et al. A Low Distorsion and Reversible Watermark: Application to Angiographic Images of the Retina , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.
[3] Amir Said. Measuring the strength of partial encryption schemes , 2005, IEEE International Conference on Image Processing 2005.
[4] Max H. M. Costa,et al. Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.
[5] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[6] Dinu Coltuc. Improved Capacity Reversible Watermarking , 2007, 2007 IEEE International Conference on Image Processing.
[7] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[8] Douglas R. Stinson,et al. Cryptographie - Théorie et Pratique , 1996 .
[9] Nikolaos G. Bourbakis,et al. Lossless compression and information hiding in images , 2004, Pattern Recognit..
[10] L Dusserre,et al. Security of health information system in France: what we do will no longer be different from what we tell. , 1994, International journal of bio-medical computing.
[11] William Puech,et al. A new crypto-watermarking method for medical images safe transfer , 2004, 2004 12th European Signal Processing Conference.
[12] Michel Dumas,et al. Tatouage d'images cryptées pour l'aide au télédiagnostic , 2001 .
[13] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[14] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[15] R. Collorec,et al. Relevance of watermarking in medical imaging , 2000, Proceedings 2000 IEEE EMBS International Conference on Information Technology Applications in Biomedicine. ITAB-ITIS 2000. Joint Meeting Third IEEE EMBS International Conference on Information Technol.
[16] Lei Tang,et al. Methods for encrypting and decrypting MPEG video data efficiently , 1997, MULTIMEDIA '96.
[17] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[18] C. Roux,et al. Compliant Secured Specialized Electronic Patient Record Platform , 2006, 1st Transdisciplinary Conference on Distributed Diagnosis and Home Healthcare, 2006. D2H2..
[19] Marc Van Droogenbroeck,et al. Techniques for a selective encryption of uncompressed and compressed images , 2002 .
[20] Mauro Barni,et al. Data hiding technologies for digital radiography , 2005 .
[21] Bülent Sankur,et al. Strict integrity control of biomedical images , 2001, IS&T/SPIE Electronic Imaging.
[22] William Stallings,et al. THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.
[23] William Puech,et al. A Selective Encryption for Heterogenous Color JPEG Images Based on VLC and AES Stream Cipher , 2006, CGIV.
[24] Henri Maître,et al. Images médicales, sécurité et tatouage , 2003, Ann. des Télécommunications.
[25] William Puech,et al. Crypto-compression of medical images by selective encryption of DCT , 2005, 2005 13th European Signal Processing Conference.
[26] Andreas Uhl,et al. Layered encryption techniques for DCT-coded visual data , 2004, 2004 12th European Signal Processing Conference.