25,066 research outputs found

    Digital watermarking in medical images

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/12/2005.This thesis addresses authenticity and integrity of medical images using watermarking. Hospital Information Systems (HIS), Radiology Information Systems (RIS) and Picture Archiving and Communication Systems (P ACS) now form the information infrastructure for today's healthcare as these provide new ways to store, access and distribute medical data that also involve some security risk. Watermarking can be seen as an additional tool for security measures. As the medical tradition is very strict with the quality of biomedical images, the watermarking method must be reversible or if not, region of Interest (ROI) needs to be defined and left intact. Watermarking should also serve as an integrity control and should be able to authenticate the medical image. Three watermarking techniques were proposed. First, Strict Authentication Watermarking (SAW) embeds the digital signature of the image in the ROI and the image can be reverted back to its original value bit by bit if required. Second, Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) uses the same principal as SAW, but is able to survive some degree of JPEG compression. Third, Authentication Watermarking with Tamper Detection and Recovery (AW-TDR) is able to localise tampering, whilst simultaneously reconstructing the original image

    Digital watermarking in medical images

    Get PDF
    This thesis addresses authenticity and integrity of medical images using watermarking. Hospital Information Systems (HIS), Radiology Information Systems (RIS) and Picture Archiving and Communication Systems (P ACS) now form the information infrastructure for today's healthcare as these provide new ways to store, access and distribute medical data that also involve some security risk. Watermarking can be seen as an additional tool for security measures. As the medical tradition is very strict with the quality of biomedical images, the watermarking method must be reversible or if not, region of Interest (ROI) needs to be defined and left intact. Watermarking should also serve as an integrity control and should be able to authenticate the medical image. Three watermarking techniques were proposed. First, Strict Authentication Watermarking (SAW) embeds the digital signature of the image in the ROI and the image can be reverted back to its original value bit by bit if required. Second, Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) uses the same principal as SAW, but is able to survive some degree of JPEG compression. Third, Authentication Watermarking with Tamper Detection and Recovery (AW-TDR) is able to localise tampering, whilst simultaneously reconstructing the original image.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Religion and the Moral Meaning of Euthanasia

    Get PDF

    The gray matter structural connectome and its relationship to alcohol relapse: Reconnecting for recovery.

    Get PDF
    Gray matter (GM) atrophy associated with alcohol use disorders (AUD) affects predominantly the frontal lobes. Less is known how frontal lobe GM loss affects GM loss in other regions and how it influences drinking behavior or relapse after treatment. The profile similarity index (PSI) combined with graph analysis allows to assess how GM loss in one region affects GM loss in regions connected to it, ie, GM connectivity. The PSI was used to describe the pattern of GM connectivity in 21 light drinkers (LDs) and in 54 individuals with AUD (ALC) early in abstinence. Effects of abstinence and relapse were determined in a subgroup of 36 participants after 3 months. Compared with LD, GM losses within the extended brain reward system (eBRS) at 1-month abstinence were similar between abstainers (ABST) and relapsers (REL), but REL had also GM losses outside the eBRS. Lower GM connectivities in ventro-striatal/hypothalamic and dorsolateral prefrontal regions and thalami were present in both ABST and REL. Between-networks connectivity loss of the eBRS in ABST was confined to prefrontal regions. About 3 months later, the GM volume and connectivity losses had resolved in ABST, and insula connectivity was increased compared with LD. GM losses and GM connectivity losses in REL were unchanged. Overall, prolonged abstinence was associated with a normalization of within-eBRS connectivity and a reconnection of eBRS structures with other networks. The re-formation of structural connectivities within and across networks appears critical for cognitive-behavioral functioning related to the capacity to maintain abstinence after outpatient treatment

    Leveraging OpenStack and Ceph for a Controlled-Access Data Cloud

    Full text link
    While traditional HPC has and continues to satisfy most workflows, a new generation of researchers has emerged looking for sophisticated, scalable, on-demand, and self-service control of compute infrastructure in a cloud-like environment. Many also seek safe harbors to operate on or store sensitive and/or controlled-access data in a high capacity environment. To cater to these modern users, the Minnesota Supercomputing Institute designed and deployed Stratus, a locally-hosted cloud environment powered by the OpenStack platform, and backed by Ceph storage. The subscription-based service complements existing HPC systems by satisfying the following unmet needs of our users: a) on-demand availability of compute resources, b) long-running jobs (i.e., >30> 30 days), c) container-based computing with Docker, and d) adequate security controls to comply with controlled-access data requirements. This document provides an in-depth look at the design of Stratus with respect to security and compliance with the NIH's controlled-access data policy. Emphasis is placed on lessons learned while integrating OpenStack and Ceph features into a so-called "walled garden", and how those technologies influenced the security design. Many features of Stratus, including tiered secure storage with the introduction of a controlled-access data "cache", fault-tolerant live-migrations, and fully integrated two-factor authentication, depend on recent OpenStack and Ceph features.Comment: 7 pages, 5 figures, PEARC '18: Practice and Experience in Advanced Research Computing, July 22--26, 2018, Pittsburgh, PA, US
    • …
    corecore