Entity

Time filter

Source Type

Plougastel-Daoulas, France

Sanchez De La Rosa R.,Telecom Bretagne | Lamard M.,French Institute of Health and Medical Research | Lamard M.,University of Western Brittany | Cazuguel G.,French Institute of Health and Medical Research | And 3 more authors.
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS | Year: 2015

This paper describes an experimental computer-aided detection and diagnosis system for breast cancer, the most common form of cancer among women, using mammography. The system relies on the Multiple-Instance Learning (MIL) paradigm, which has proven useful for medical decision support in previous works from our team. In the proposed framework, the breasts are first partitioned adaptively into regions. Then, either textural features, or features derived from the detection of masses and microcalcifications, are extracted from each region. Finally, feature vectors extracted from each region are combined using an MIL algorithm (Citation k-NN or mi-Graph), in order to recognize 'normal' mammography examinations or to categorize examinations as 'normal', 'benign' or 'cancer'. An accuracy of 91.1% (respectively 62.1%) was achieved for normality recognition (respectively three-class categorization) in a subset of 720 mammograms from the DDSM dataset. The paper also discusses future improvements, that will make the most of the MIL paradigm, in order to improve 'benign' versus 'cancer' discrimination in particular. © 2015 IEEE. Source


Bouslimi D.,Telecom Bretagne | Bouslimi D.,French Institute of Health and Medical Research | Coatrieux G.,Telecom Bretagne | Coatrieux G.,French Institute of Health and Medical Research | And 4 more authors.
IRBM | Year: 2015

Objectives: Teleassistance is defined as the help provided through a telemedicine network by a practitioner to another one faced with a difficult situation. Beyond securing communication, another main issue is to provide evidence that some data have been exchanged in order to determine the liabilities of each practitioner involved in a telemedicine session in case of litigation. Material and methods: The purpose of this work is the definition of a teleassistance protocol that allows achieving these goals. To do so, we first identify needs in terms of security and evidence considering the example of the French legislation and then propose a secure teleassistance protocol that takes advantage of the Joint Watermarking-Encryption (JWE) approach. The originality of this approach is that it offers watermarking functionalities in both encrypted and decrypted domains and is compliant with the DICOM standard. Results: We describe the functioning of the proposed teleassistance protocol. This protocol is able to secure exchanged data and bring evidence that an exchange took place and that data have been communicated. The security analysis of our protocol shows that it is resistant to non-repudiation issues and collusion attacks. Conclusion: The use of joint watermarking-encryption allows i) ensuring confidentiality of exchanged data while giving access to proofs of their integrity and of their origins even though data are encrypted; and ii) identifying which data were involved in a telemedicine session by means of secure links established between them. The proposed protocol is compliant with the DICOM standard. © 2015 Elsevier Masson SAS. Source


Bouslimi D.,Telecom Bretagne | Coatrieux G.,Telecom Bretagne | Cozic M.,MEDECOM | Roux Ch.,Ecole Nationale Superieure des Mines de Saint - Etienne CMP
2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2014 | Year: 2014

In this paper, we propose a novel crypto-watermarking system for the purpose of verifying the reliability of images and tracing them, i.e. identifying the person at the origin of an illegal distribution. This system couples a common watermarking method, based on Quantization Index Modulation (QIM), and a joint watermarking-decryption (JWD) approach. At the emitter side, it allows the insertion of a watermark as a proof of reliability of the image before sending it encrypted; at the reception, another watermark, a proof of traceability, is embedded during the decryption process. The scheme we propose makes interoperate such a combination of watermarking approaches taking into account risks of interferences between embedded watermarks, allowing the access to both reliability and traceability proofs. Experimental results confirm the efficiency of our system, and demonstrate it can be used to identify the physician at the origin of a disclosure even if the image has been modified. © 2014 IEEE. Source


Bouslimi D.,Telecom Bretagne | Bouslimi D.,French Institute of Health and Medical Research | Coatrieux G.,Telecom Bretagne | Coatrieux G.,French Institute of Health and Medical Research | And 3 more authors.
Signal Processing: Image Communication | Year: 2016

In this paper, we propose a novel approach which allows embedding a message into an encrypted image; a message that can be accessed whether the image is encrypted or not. To do so, the proposed solution relies on the insertion into the image of a predefined watermark, a “pre-watermark”, before the encryption process. Message insertion (resp. extraction) is then commonly conducted into (resp. from) the encrypted image. It is the impact of this data hiding process onto the “pre-watermark” that gives us access to the message into the spatial domain, i.e. after the decryption process. By doing so, the watermark processing process is independent of the knowledge of the encryption key and one only just has to know the watermarking key so as to embed the message and extract it from the encrypted or decrypted image. Reciprocally, encryption/decryption processes are completely independent from message embedding/extraction. We illustrate the feasibility of our approach considering the RC4 stream cipher algorithm and the Least Significant Bit substitution watermarking modulation. Experiments conducted on natural test images and ultrasound medical images demonstrate the general capabilities of our system to securely make available a message in both spatial and encrypted domains while minimizing image distortion. We further discuss the use of different encryption and watermarking algorithms and we illustrate how our system can be used for ensuring image integrity and authenticity control. © 2016 Elsevier B.V. Source


Bouslimi D.,Telecom Bretagne | Coatrieux G.,Telecom Bretagne | Quantin C.,CHRU Dijon | Quantin C.,University of Burgundy | And 2 more authors.
Studies in Health Technology and Informatics | Year: 2014

Teleassistance is defined by the help provided through a telemedicine network by a medical practitioner to one other medical practitioner faced to a difficult case. One of the main limiting factors of its development is the fear of the practitioners to be involved in a litigation. In such a situation, the main issue is to determine as quick and as certain as possible if the damage is in relation with the tort of negligence and the liabilities of each involved physician. After a brief summary of the legal context, we present a protocol combining joint watermarking-encryption and a third party to enforce exchange traceability and therefore to bring valuable electronic evidence in case of teleassistance litigations. © 2014 European Federation for Medical Informatics and IOS Press. Source

Discover hidden collaborations