{"id":"https://openalex.org/W2532575766","doi":"https://doi.org/10.1109/embc.2016.7591237","title":"Data hiding in homomorphically encrypted medical images for verifying their reliability in both encrypted and spatial domains","display_name":"Data hiding in homomorphically encrypted medical images for verifying their reliability in both encrypted and spatial domains","publication_year":2016,"publication_date":"2016-08-01","ids":{"openalex":"https://openalex.org/W2532575766","doi":"https://doi.org/10.1109/embc.2016.7591237","mag":"2532575766","pmid":"https://pubmed.ncbi.nlm.nih.gov/28268831"},"language":"en","primary_location":{"id":"doi:10.1109/embc.2016.7591237","is_oa":false,"landing_page_url":"https://doi.org/10.1109/embc.2016.7591237","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009493124","display_name":"Dalel Bouslimi","orcid":"https://orcid.org/0000-0002-8680-280X"},"institutions":[{"id":"https://openalex.org/I205703379","display_name":"Institut Mines-T\u00e9l\u00e9com","ror":"https://ror.org/025vp2923","country_code":"FR","type":"facility","lineage":["https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"D. Bouslimi","raw_affiliation_strings":["Telecom Bretagne, Institut Mines - Telecom, Brest Cedex 3, France"],"affiliations":[{"raw_affiliation_string":"Telecom Bretagne, Institut Mines - Telecom, Brest Cedex 3, France","institution_ids":["https://openalex.org/I205703379"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069264855","display_name":"Reda Bellafqira","orcid":"https://orcid.org/0000-0002-1131-4115"},"institutions":[{"id":"https://openalex.org/I205703379","display_name":"Institut Mines-T\u00e9l\u00e9com","ror":"https://ror.org/025vp2923","country_code":"FR","type":"facility","lineage":["https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"R. Bellafqira","raw_affiliation_strings":["Telecom Bretagne, Institut Mines - Telecom, Brest Cedex 3, France"],"affiliations":[{"raw_affiliation_string":"Telecom Bretagne, Institut Mines - Telecom, Brest Cedex 3, France","institution_ids":["https://openalex.org/I205703379"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062289182","display_name":"Gouenou Coatrieux","orcid":"https://orcid.org/0000-0002-5643-0224"},"institutions":[{"id":"https://openalex.org/I205703379","display_name":"Institut Mines-T\u00e9l\u00e9com","ror":"https://ror.org/025vp2923","country_code":"FR","type":"facility","lineage":["https://openalex.org/I205703379"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"G. Coatrieux","raw_affiliation_strings":["Telecom Bretagne, Institut Mines - Telecom, Brest Cedex 3, France"],"affiliations":[{"raw_affiliation_string":"Telecom Bretagne, Institut Mines - Telecom, Brest Cedex 3, France","institution_ids":["https://openalex.org/I205703379"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5009493124"],"corresponding_institution_ids":["https://openalex.org/I205703379"],"apc_list":null,"apc_paid":null,"fwci":0.835,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.80913622,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2016","issue":null,"first_page":"2496","last_page":"2499"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8705360889434814},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.8047771453857422},{"id":"https://openalex.org/keywords/information-hiding","display_name":"Information hiding","score":0.7670660614967346},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.6916035413742065},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.6297194361686707},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6176275014877319},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.48984071612358093},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.39213699102401733},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3841700553894043},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3617880940437317},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3267049193382263},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.16297966241836548},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15289029479026794}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8705360889434814},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.8047771453857422},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.7670660614967346},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.6916035413742065},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.6297194361686707},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6176275014877319},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.48984071612358093},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.39213699102401733},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3841700553894043},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3617880940437317},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3267049193382263},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.16297966241836548},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15289029479026794}],"mesh":[{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D000465","descriptor_name":"Algorithms","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D003952","descriptor_name":"Diagnostic Imaging","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D003952","descriptor_name":"Diagnostic Imaging","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D003952","descriptor_name":"Diagnostic Imaging","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D006801","descriptor_name":"Humans","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D006801","descriptor_name":"Humans","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D006801","descriptor_name":"Humans","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D014463","descriptor_name":"Ultrasonography","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D014463","descriptor_name":"Ultrasonography","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D014463","descriptor_name":"Ultrasonography","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D015203","descriptor_name":"Reproducibility of Results","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D015203","descriptor_name":"Reproducibility of Results","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D015203","descriptor_name":"Reproducibility of Results","qualifier_ui":null,"qualifier_name":null,"is_major_topic":false},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true},{"descriptor_ui":"D016494","descriptor_name":"Computer Security","qualifier_ui":null,"qualifier_name":null,"is_major_topic":true}],"locations_count":2,"locations":[{"id":"doi:10.1109/embc.2016.7591237","is_oa":false,"landing_page_url":"https://doi.org/10.1109/embc.2016.7591237","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)","raw_type":"proceedings-article"},{"id":"pmid:28268831","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/28268831","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Annual International Conference of the IEEE Engineering in Medicine and Biology Society. IEEE Engineering in Medicine and Biology Society. Annual International Conference","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1482140978","https://openalex.org/W1998279455","https://openalex.org/W2005554859","https://openalex.org/W2017365570","https://openalex.org/W2034810379","https://openalex.org/W2054720400","https://openalex.org/W2099778990","https://openalex.org/W2107465879","https://openalex.org/W2132172731","https://openalex.org/W2162719060","https://openalex.org/W2322525404","https://openalex.org/W6700734538"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W1559740347","https://openalex.org/W2098152888","https://openalex.org/W2040356834","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288","https://openalex.org/W2183032046"],"abstract_inverted_index":{"In":[0],"this":[1,82],"paper,":[2],"we":[3],"propose":[4],"a":[5,54,57,72,127,149],"new":[6],"scheme":[7,31],"of":[8,11,17,21,53,75,81],"data":[9],"hiding":[10,126],"encrypted":[12,26,69,131],"images":[13,138],"for":[14,125],"the":[15,19,33,39,45,48,68,79,86,92,95,100,122,130,141],"purpose":[16],"verifying":[18],"reliability":[20],"an":[22],"image":[23,70,101,142],"into":[24,47,65,129],"both":[25],"and":[27,38],"spatial":[28,96],"domains.":[29],"This":[30],"couples":[32],"Quantization":[34],"Index":[35],"Modulation":[36],"(QIM)":[37],"Paillier":[40],"cryptosystem.":[41],"It":[42,77],"relies":[43],"on":[44,135],"insertion":[46,60,83],"image,":[49],"before":[50],"its":[51],"encryption,":[52],"predefined":[55],"watermark,":[56],"\"pre-watermark\".":[58],"Message":[59],"(resp.":[61,66],"extraction)":[62],"is":[63,78,144],"conducted":[64,134],"from)":[67],"using":[71],"modified":[73],"version":[74],"QIM.":[76],"impact":[80],"process":[84],"onto":[85],"\"pre-watermark\"":[87],"that":[88,140,152],"gives":[89],"access":[90],"to":[91,120],"message":[93,114,128],"in":[94],"domain,":[97],"i.e.":[98],"after":[99],"has":[102],"been":[103],"decrypted.":[104],"With":[105],"our":[106],"scheme,":[107],"encryption/decryption":[108,123],"processes":[109],"are":[110],"completely":[111],"independent":[112],"from":[113],"embedding/extraction.":[115],"One":[116],"does":[117],"not":[118],"need":[119],"know":[121],"key":[124],"image.":[132],"Experiments":[133],"ultrasound":[136],"medical":[137],"show":[139],"distortion":[143],"very":[145],"low":[146],"while":[147],"offering":[148],"high":[150],"capacity":[151],"can":[153],"support":[154],"different":[155],"watermarking":[156],"based":[157],"security":[158],"objectives.":[159]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
