您目前的位置: 首页» 公共目录» 学术活动

学术报告:Protection and secure processing of medical data

    人: Gouenou Coatrieux教授


      : js8金沙登入网址二层小会议室

位: js8金沙登入网址


    Gouenou Coatrieux received the Ph.D. degree in signal processing and telecommunication from the University of Rennes I, Rennes, France, in collaboration with the Institut Mines Telecom, Telecom Paris-Tech, Paris, France, in 2002. His Ph.D. focused on watermarking in medical imaging.

    He is currently an Full Professor in the Information and Image Processing Department, Institut Mines-Telecom, Telecom Bretagne, Brest, France, and his research is conducted in the Laboratoire de Traitement de l’Information Médicale, Unité INSERM U1101, Brest. His primary research interests include medical information system security, watermarking (images and database), digital content forensics, secure processing of outsourced data.

    He is the head of the Joint Laboratory on Security and Processing of Externalized Medical Image Data. Pr. Coatrieux is actually associate editor of the IEEE Journal of Biomedical and Health Informatics and of the Elsevier journal. He has been associate editor of the Elsevier journals Digital Signal Processing. He is also member of the IFMBE “Global Citizen Safety and Security Working Group”, of the European Federation for Medical Informatics (EFMI) "Security, Safety and Ethics (SSE) Working Group", and has contributed to the Technical Committee of “Information Technology for Health (IT4H)” of the IEEE Engineering in Medicine and Biology Society.



Advances in information and communication technologies provide new means to access, share, duplicate and manipulate medical data and genetic data as well. But, if practices ranging from patient cares to big health data studies take advantage of such an evolution, this facility to handle data also compromises their security. In this lecture, we will focus on the security of medical data. It will first come back on the general needs for medical data protection, before introducing various solutions for protecting these data against information leaks by authorized users and securely processing outsourced data in the cloud or by a smart phone under some computation complexity constraints.