0000000001172861
AUTHOR
El-bey Bourennane
showing 3 related works from this author
Méthode de "Multicouches" Pour le Tatouage des Images Médicales
2012
International audience; Dans le but de contribuer á la sécurité du partage, au transfert et á l'indexation des images médicales, on a mis en œuvre une nouvelle approche de tatouage. Cette approche se base sur l'utilisation de diverses techniques tels que la technique du Code Division Multiple Access (CDMA), de la Transformation en Ondelette Discrète (TOD), des Codes Correcteurs d'Erreurs (CCE) et de la fonction de hachage (MD5),... Le but de notre contribution étant d'augmenter le taux d'intégration tout en conservant l'aspect visuel de l'image d'une part et de détecter et même corriger les différentes altérations qui peuvent avoir lieu de l'autre part. Cette approche sera testé sur des ima…
"Last Signification Bits" Method for Watermarking of Medical Image
2011
International audience; In this paper, we present a new approach for watermarking of medical image that we are trying to adapt to telemedicine. This approach is intended to insert a set of data in a medical image. These data should be imperceptible and robust to various attacks. It's containing the signature of the original image, the data specific to the patient and his diagnostic. The purpose of the watermarking method is to check the integrity and preservation of the confidentiality of patient data in a network sharing. This approach is based on the use the LSB (least significant bits) of the image and tools borrowed from cryptography.
A Digital Watermarking Algorithm Based on DCT: Application on Medical Image
2012
International audience; This work is a presentation of a new approach of robust watermarking applied in medical domain such as telemedicine hence the need to keep the visual aspect of medical images and other conservation of the various data substituted. For hiding information, the proposed method uses the Discrete Cosine Transform (DCT) space. To control identification and eventually the correction (if possible) of the data inserted, it should be noted that we used the series turbocode to recover the data inserted and after application of several attacks.