scispace - formally typeset
Search or ask a question
Author

Redouane Kafi

Bio: Redouane Kafi is an academic researcher. The author has contributed to research in topics: Digital watermarking & Watermark. The author has an hindex of 3, co-authored 3 publications receiving 30 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: A blind and robust watermarking technique that allows the integration of the electronic patient’s record into a computerized tomography scan and offers excellent imperceptibility and very good robustness against several geometric and destructive attacks is presented.
Abstract: In order to contribute to the security of medical image, we present in this paper a blind and robust watermarking technique that allows the integration of the electronic patient’s record into a computerized tomography scan. In this approach, a discrete wavelet transform is applied to the image before the integration process, then, a topological reorganization of the coefficients of the LL sub-bands is done by the ZigZag scanning method. The obtained coefficients are then combined to integrate the watermark bits. A hash of the electronic patient record being integrated in the image, the integrity of the watermark can easily be verified. After the evaluation of our approach in terms of invisibility and robustness, the experimental results obtained show that our approach offers excellent imperceptibility (with a PSNR above 70 dB) and very good robustness against several geometric and destructive attacks.

47 citations

Journal ArticleDOI
TL;DR: In this article, a blind watermarking approach for medical image protection is proposed, which consists of the Electronic Patient Record and the image acquisition data, and the watermark is then integrated into the least significant bits of the S component obtained by combining the parity of the successive coefficients.

45 citations

Journal ArticleDOI
TL;DR: The proposed blind and robust approach for medical image protection consists in embedding patient information and image acquisition data in the image and the integration was performed in the medium frequencies of the image.
Abstract: In order to enhance the security of exchanged medical images in telemedicine, we propose in this paper a blind and robust approach for medical image protection. This approach consists in embedding patient information and image acquisition data in the image. This imperceptible integration must generate the least possible distortion. The watermarked image must present the same clinical reading as the original image. The proposed approach is applied in the frequency domain. For this purpose, four transforms were used: discrete wavelets transform, non-subsampled contourlet transform, non-subsampled shearlet transform and discreet cosine transform. All these transforms was combined with Schur decomposition and the watermark bits were integrated in the upper triangular matrix. To obtain a satisfactory compromise between robustness and imperceptibility, the integration was performed in the medium frequencies of the image. Imperceptibility and robustness experimental results shows that the proposed methods maintain a high quality of watermarked images and are remarkably robust against several conventional attacks.

38 citations

Journal ArticleDOI
TL;DR: In this article , the authors focus on the remaining useful life prediction of the "Spurious closure of the downhole safety valve" fault and propose a scheme based on the use of unsupervised machine learning approach and a drift detection mechanism is employed in order to predict the time to failure.
Abstract: The production of Oil & Gas from underground reservoirs involves chemical and mechanical processes that affect well drilling and operation. Many of these processes may eventually cause a problem with the well, resulting in a decrease in production or in equipment failure. This paper deals with fault prognosis during the practical operation of Oil & Gas wells. This work focus on the remaining useful life prediction of the “Spurious Closure of the Downhole Safety Valve” fault. This paper proposes a scheme based on the use of unsupervised machine learning approach and a drift detection mechanism is employed in order to predict the time to failure, real fault scenarios data are used, the proposed scheme is evaluated using different prognosis performance metrics.

Cited by
More filters
Journal ArticleDOI
TL;DR: A Pigeon Inspired Optimization with Encryption-based Secure Medical Image Management (PIOE-SMIM) technique is presented and the results highlighted the supremacy of the PIOE -SMIM model over other techniques.
Abstract: Presently, technological advancements in the healthcare sector pose a challenging problem relevant to the security and privacy of health-related applications. Medical images can be considered significant and sensitive data in the medical informatics system. In order to transmit medical images in an open medium, the design of secure encryption algorithms becomes essential. Encryption can be considered one of the effective solutions for accomplishing security. Although numerous models have existed in the literature, they could not adaptable to the rising number of medicinal images in the health sector. At the same time, the optimal key generation process acts as a vital part in defining the performance of the encryption techniques. Therefore, this article presents a Pigeon Inspired Optimization with Encryption-based Secure Medical Image Management (PIOE-SMIM) technique. The proposed PIOE-SMIM approach majorly concentrates on the development of secret share creation (SSC) and the encryption process. At the initial stage, the medical images are converted into a collection of 12 shares using the SSC approach. In addition, an elliptic curve cryptography (ECC) scheme is employed for the encryption process. In order to optimum key creation procedure in the ECC model, the PIO technique is exploited with the aim of maximizing PSNR. Finally, on the receiver side, the decryption and share reconstruction processes are performed to construct the original images. The PIOE-SMIM model displayed an enhanced PSNR of 59.37 dB in image 1. Improved PSNR of 59.53 dB is given for image 5 using the PIOE-SMIM model. For demonstrating an enhanced performance of the PIOE-SMIM method, a widespread experimental study is made and the results highlighted the supremacy of the PIOE-SMIM model over other techniques.

68 citations

Proceedings Article
01 Jan 2003
TL;DR: Cluster Computing addresses the latest results in these fields that support High Performance Distributed Computing (HPDC) and provides a forum for presenting the latest research and technology in the fields of parallel processing, distributed computing systems and computer networks.
Abstract: Cluster Computing addresses the latest results in these fields that support High Performance Distributed Computing (HPDC). In HPDC environments, parallel and/ or distributed computing techniques are applied to the solution of computationally intensive applications across networks of computers. The journal represents an important source of information for the growing number of researchers, developers and users of HPDC environments. Cluster Computing: the Journal of Networks, Software Tools and Applications provides a forum for presenting the latest research and technology in the fields of parallel processing, distributed computing systems and computer networks.

65 citations

Journal ArticleDOI
TL;DR: Experimental results shows that the proposed methods maintain a high quality watermarked images and are very robust against several conventional attacks.

55 citations

Journal ArticleDOI
TL;DR: In this article, a blind watermarking approach for medical image protection is proposed, which consists of the Electronic Patient Record and the image acquisition data, and the watermark is then integrated into the least significant bits of the S component obtained by combining the parity of the successive coefficients.

45 citations

Journal ArticleDOI
TL;DR: The proposed blind and robust approach for medical image protection consists in embedding patient information and image acquisition data in the image and the integration was performed in the medium frequencies of the image.
Abstract: In order to enhance the security of exchanged medical images in telemedicine, we propose in this paper a blind and robust approach for medical image protection. This approach consists in embedding patient information and image acquisition data in the image. This imperceptible integration must generate the least possible distortion. The watermarked image must present the same clinical reading as the original image. The proposed approach is applied in the frequency domain. For this purpose, four transforms were used: discrete wavelets transform, non-subsampled contourlet transform, non-subsampled shearlet transform and discreet cosine transform. All these transforms was combined with Schur decomposition and the watermark bits were integrated in the upper triangular matrix. To obtain a satisfactory compromise between robustness and imperceptibility, the integration was performed in the medium frequencies of the image. Imperceptibility and robustness experimental results shows that the proposed methods maintain a high quality of watermarked images and are remarkably robust against several conventional attacks.

38 citations