2018 IEEE 31st International Symposium on Computer-Based Medical Systems (CBMS) 2018
DOI: 10.1109/cbms.2018.00032
|View full text |Cite
|
Sign up to set email alerts
|

Face De-Identification Service for Neuroimaging Volumes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…In order to learn and consolidate these concepts, students have to execute a three-month long development projects related to the PACS/DICOM universe, for which most students have used Dicoogle and the Learning Pack. For instance, the projects "Workflow Management in Distributed Medical Imaging Environments" and "3D Defacing -Visual Anatomic Anonymization", which culminated into the production of scientific publications [32,33]. At the end of the academic year, it was sent an anonymous form to students to evaluate these tools as learning resources.…”
Section: Teaching Network and Services In Imagingmentioning
confidence: 99%
“…In order to learn and consolidate these concepts, students have to execute a three-month long development projects related to the PACS/DICOM universe, for which most students have used Dicoogle and the Learning Pack. For instance, the projects "Workflow Management in Distributed Medical Imaging Environments" and "3D Defacing -Visual Anatomic Anonymization", which culminated into the production of scientific publications [32,33]. At the end of the academic year, it was sent an anonymous form to students to evaluate these tools as learning resources.…”
Section: Teaching Network and Services In Imagingmentioning
confidence: 99%
“…Cloud providers are commonly seen as "honest-butcurious" [26]. To protect data in those environments, some common methods include, searchable encryption [27]- [29] and pseudonymity [30], [31] schemes. Nevertheless, high availability through fault tolerance is only within the reach of some distributed technologies.…”
Section: Introductionmentioning
confidence: 99%