Literatura científica selecionada sobre o tema "Medical image anonymization"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Medical image anonymization".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Medical image anonymization"
Ueda, Satoshi. "Activities for Anonymization in Image Medical Systems". Japanese Journal of Radiological Technology 75, n.º 9 (2019): 1109–11. http://dx.doi.org/10.6009/jjrt.2019_jsrt_75.9.1109.
Texto completo da fonteGießler, Fina, Maximilian Thormann, Bernhard Preim, Daniel Behme e Sylvia Saalfeld. "Facial Feature Removal for Anonymization of Neurological Image Data". Current Directions in Biomedical Engineering 7, n.º 1 (1 de agosto de 2021): 130–34. http://dx.doi.org/10.1515/cdbme-2021-1028.
Texto completo da fonteSun, Hanxi, Jason Plawinski, Sajanth Subramaniam, Amir Jamaludin, Timor Kadir, Aimee Readie, Gregory Ligozio, David Ohlssen, Mark Baillie e Thibaud Coroller. "A deep learning approach to private data sharing of medical images using conditional generative adversarial networks (GANs)". PLOS ONE 18, n.º 7 (6 de julho de 2023): e0280316. http://dx.doi.org/10.1371/journal.pone.0280316.
Texto completo da fonteShibata, Hisaichi, Shouhei Hanaoka, Takahiro Nakao, Tomohiro Kikuchi, Yuta Nakamura, Yukihiro Nomura, Takeharu Yoshikawa e Osamu Abe. "Practical Medical Image Generation with Provable Privacy Protection Based on Denoising Diffusion Probabilistic Models for High-Resolution Volumetric Images". Applied Sciences 14, n.º 8 (20 de abril de 2024): 3489. http://dx.doi.org/10.3390/app14083489.
Texto completo da fonteYordanova, Mariana. "Recent Applications of Cloud Computing in Medical Imaging: Advances in Medical Image Analysis and Storage of Medical Imaging Data". Advances in Social Sciences Research Journal 11, n.º 5 (31 de maio de 2024): 267–71. http://dx.doi.org/10.14738/assrj.115.16941.
Texto completo da fonteJeong, Yeon Uk, Soyoung Yoo, Young-Hak Kim e Woo Hyun Shim. "De-Identification of Facial Features in Magnetic Resonance Images: Software Development Using Deep Learning Technology". Journal of Medical Internet Research 22, n.º 12 (10 de dezembro de 2020): e22739. http://dx.doi.org/10.2196/22739.
Texto completo da fonteDavid Odera. "A survey on techniques, methods and security approaches in big data healthcare". Global Journal of Engineering and Technology Advances 14, n.º 2 (28 de fevereiro de 2023): 093–106. http://dx.doi.org/10.30574/gjeta.2023.14.2.0035.
Texto completo da fonteChin, Trisha J. M., Gillian X. M. Chin, James Sutherland, Andrew Coon, Colin Morton e Colin Fleming. "BT24 Pseudonymization for artificial intelligence skin lesion datasets: a real-world feasibility study". British Journal of Dermatology 191, Supplement_1 (28 de junho de 2024): i199—i200. http://dx.doi.org/10.1093/bjd/ljae090.421.
Texto completo da fonteSulema, Ye S., e A. I. Dychka. "Software system of automatic identification and distributed storage of patient medical data". System technologies 3, n.º 146 (11 de maio de 2023): 134–48. http://dx.doi.org/10.34185/1562-9945-3-146-2023-13.
Texto completo da fonteCordeiro, Natália, Gil Facina, Afonso Nazário, Vanessa Sanvido, Joaquim Araujo Neto, Morgana Silva e Simone Elias. "Abstract PO2-29-02: Towards Precision Medicine in Breast Imaging: A Novel Open Mammography Database with Tailor-Made 3D Image Retrieval for Artificial Intelligence and Teaching". Cancer Research 84, n.º 9_Supplement (2 de maio de 2024): PO2–29–02—PO2–29–02. http://dx.doi.org/10.1158/1538-7445.sabcs23-po2-29-02.
Texto completo da fonteTeses / dissertações sobre o assunto "Medical image anonymization"
Li, Huiyu. "Exfiltration et anonymisation d'images médicales à l'aide de modèles génératifs". Electronic Thesis or Diss., Université Côte d'Azur, 2024. http://www.theses.fr/2024COAZ4041.
Texto completo da fonteThis thesis aims to address some specific safety and privacy issues when dealing with sensitive medical images within data lakes. This is done by first exploring potential data leakage when exporting machine learning models and then by developing an anonymization approach that protects data privacy.Chapter 2 presents a novel data exfiltration attack, termed Data Exfiltration by Compression (DEC), which leverages image compression techniques to exploit vulnerabilities in the model exporting process. This attack is performed when exporting a trained network from a remote data lake, and is applicable independently of the considered image processing task. By exploring both lossless and lossy compression methods, this chapter demonstrates how DEC can effectively be used to steal medical images and reconstruct them with high fidelity, using two public CT and MR datasets. This chapter also explores mitigation measures that a data owner can implement to prevent the attack. It first investigates the application of differential privacy measures, such as Gaussian noise addition, to mitigate this attack, and explores how attackers can create attacks resilient to differential privacy. Finally, an alternative model export strategy is proposed which involves model fine-tuning and code verification.Chapter 3 introduces the Generative Medical Image Anonymization framework, a novel approach to balance the trade-off between preserving patient privacy while maintaining the utility of the generated images to solve downstream tasks. The framework separates the anonymization process into two key stages: first, it extracts identity and utility-related features from medical images using specially trained encoders; then, it optimizes the latent code to achieve the desired trade-off between anonymity and utility. We employ identity and utility encoders to verify patient identities and detect pathologies, and use a generative adversarial network-based auto-encoder to create realistic synthetic images from the latent space. During optimization, we incorporate these encoders into novel loss functions to produce images that remove identity-related features while maintaining their utility to solve a classification problem. The effectiveness of this approach is demonstrated through extensive experiments on the MIMIC-CXR chest X-ray dataset, where the generated images successfully support lung pathology detection.Chapter 4 builds upon the work from Chapter 4 by utilizing generative adversarial networks (GANs) to create a more robust and scalable anonymization solution. The framework is structured into two distinct stages: first, we develop a streamlined encoder and a novel training scheme to map images into a latent space. In the second stage, we minimize the dual-loss functions proposed in Chapter 3 to optimize the latent representation of each image. This method ensures that the generated images effectively remove some identifiable features while retaining crucial diagnostic information. Extensive qualitative and quantitative experiments on the MIMIC-CXR dataset demonstrate that our approach produces high-quality anonymized images that maintain essential diagnostic details, making them well-suited for training machine learning models in lung pathology classification.The conclusion chapter summarizes the scientific contributions of this work, and addresses remaining issues and challenges for producing secured and privacy preserving sensitive medical data
Capítulos de livros sobre o assunto "Medical image anonymization"
Shin, Hoo-Chang, Neil A. Tenenholtz, Jameson K. Rogers, Christopher G. Schwarz, Matthew L. Senjem, Jeffrey L. Gunter, Katherine P. Andriole e Mark Michalski. "Medical Image Synthesis for Data Augmentation and Anonymization Using Generative Adversarial Networks". In Simulation and Synthesis in Medical Imaging, 1–11. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00536-8_1.
Texto completo da fonte"Cybersecurity in Medical Sector". In Advances in Web Technologies and Engineering, 117–48. IGI Global, 2024. http://dx.doi.org/10.4018/978-1-6684-8686-3.ch005.
Texto completo da fonteKokomoto, Kazuma, Rena Okawa, Kazuhiko Nakano e Kazunori Nozaki. "Panoramic Radiograph Generation and Image Reconstruction from Latent Vectors Using a Generative Adversarial Network". In Studies in Health Technology and Informatics. IOS Press, 2024. http://dx.doi.org/10.3233/shti231263.
Texto completo da fonteAlicherif, Nora. "Privacy Preserving in the Medical Sector". In Advanced Bioinspiration Methods for Healthcare Standards, Policies, and Reform, 221–39. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-5656-9.ch012.
Texto completo da fonteHudedagaddi, Deepthi P., e B. K. Tripathy. "Clustering Approaches in Decision Making Using Fuzzy and Rough Sets". In Handbook of Research on Fuzzy and Rough Set Theory in Organizational Decision Making, 116–36. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-1008-6.ch006.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Medical image anonymization"
Chen, Wei-Yu, Mulder Yu e Ceasar Sun. "Architecture and Building the Medical Image Anonymization Service: Cloud, Big Data and Automation". In 2021 International Conference on Electronic Communications, Internet of Things and Big Data (ICEIB). IEEE, 2021. http://dx.doi.org/10.1109/iceib53692.2021.9686426.
Texto completo da fonteSuzuki, H., M. Amano, M. Kubo, Y. Kawata, N. Niki e H. Nishitani. "Anonymization server system for DICOM images". In Medical Imaging, editado por Steven C. Horii e Katherine P. Andriole. SPIE, 2007. http://dx.doi.org/10.1117/12.709947.
Texto completo da fontePiano, Luca, Pietro Basci, Fabrizio Lamberti e Lia Morra. "Harnessing Foundation Models for Image Anonymization". In 2024 IEEE Gaming, Entertainment, and Media Conference (GEM). IEEE, 2024. http://dx.doi.org/10.1109/gem61861.2024.10585484.
Texto completo da fonte