scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

A Study on the Applications of the Biomedical Image Encryption Methods for Secured Computer Aided Diagnostics

TL;DR: In this work, some application of cryptographic methods have been discussed which are used to protect biomedical images from unwanted modifications and access and can be highly beneficial in future research in the field of biomedical image protection as well as multimedia data security.
Abstract: Computer aided diagnostic is one of the most active research area and has huge impact on the health care industry. With the advent of intelligent methods, biomedical data processing becomes easier and less error prone. Moreover, remote health care is also possible using the IoT infrastructure. However, data security over the network is always considered as a challenge. Biomedical data are generally sensitive to external disturbances and small manipulation in the data may cause huge difference in the ultimate result. Wrong diagnosis can be life threatening in some scenarios or can be severe in almost every instance. Therefore, biomedical data security is one of the major challenge and necessary for remote health care. In this work, some application of cryptographic methods have been discussed which are used to protect biomedical images from unwanted modifications and access. This work can be highly beneficial in future research in the field of biomedical image protection as well as multimedia data security.
Citations
More filters
Book ChapterDOI
01 Jan 2020
TL;DR: In this chapter, a comprehensive overview of the deep learning-assisted biomedical image analysis methods is presented and can be helpful for the researchers to understand the recent developments and drawbacks of the present systems.
Abstract: Biomedical image analysis methods are gradually shifting towards computer-aided solutions from manual investigations to save time and improve the quality of the diagnosis. Deep learning-assisted biomedical image analysis is one of the major and active research areas. Several researchers are working in this domain because deep learning-assisted computer-aided diagnostic solutions are well known for their efficiency. In this chapter, a comprehensive overview of the deep learning-assisted biomedical image analysis methods is presented. This chapter can be helpful for the researchers to understand the recent developments and drawbacks of the present systems. The discussion is made from the perspective of the computer vision, pattern recognition, and artificial intelligence. This chapter can help to get future research directions to exploit the blessings of deep learning techniques for biomedical image analysis.

28 citations

Book ChapterDOI
01 Jan 2020
TL;DR: This chapter proposes a new filter (kernel), and the compass operator is applied on it to detect edges more efficiently, and the results are compared with some of the previously proposed filters both qualitatively and quantitatively.
Abstract: Image segmentation has been an active topic of research for many years. Edges characterize boundaries, and therefore, detection of edges is a problem of fundamental importance in image processing. Edge detection in images significantly reduces the amount of data and filters out useless information while preserving the important structural properties in an image. Edges carry significant information about the image structure and shape, which is useful in various applications related with computer vision. In many applications, the edge detection is used as a pre-processing step. Edge detection is highly beneficial in automated cell counting, structural analysis of the image, automated object detection, shape analysis, optical character recognition, etc. Different filters are developed to find the gradients and detect edges. In this chapter, a new filter (kernel) is proposed, and the compass operator is applied on it to detect edges more efficiently. The results are compared with some of the previously proposed filters both qualitatively and quantitatively.

24 citations

Book ChapterDOI
17 Aug 2019
TL;DR: In this work, DNA encryption and its different approaches are discussed to give a brief overview on the data security methods based on DNA encryption.
Abstract: Security of the digital data is one of the major concerns of the today’s world. There are several methods for digital data security that can be found in the literature. Biological sequences have some features that make it worthy for the digital data security processes. In this work, DNA encryption and its different approaches are discussed to give a brief overview on the data security methods based on DNA encryption. This work can be highly beneficial for future research on DNA encryption and can be applied on different domains.

20 citations

Book ChapterDOI
17 Aug 2019
TL;DR: A secure and lossless encryption method is developed in this work and various numerical parameters are used to evaluate the performance of the proposed method which proves the effectiveness of the algorithm.
Abstract: Biomedical image analysis is an integral part of the modern healthcare industry and has a huge impact on the modern world. Automated computer-aided systems are highly beneficial for fast, accurate and efficient diagnosis of the biomedical images. Remote healthcare systems allow doctors and patients to perform their jobs from separate geographic locations. Moreover, expert opinion about a patient can be obtained from a doctor who is in a different country or in some distant location within stipulated amount of time. Remote healthcare systems require digital biomedical images to be transferred over the network. But several security threats are associated with the transmission of the biomedical images. Privacy of the patients must be preserved by keeping the images safe from any unauthorized access. Moreover, the contents of the biomedical images must be preserved efficiently so that no one can tamper it. Data tampering can produce drastic results in many cases. In this work, a method for biomedical image security has been proposed. DNA encryption method is one of the emerging methods in the field of cryptography. A secure and lossless encryption method is developed in this work. Various numerical parameters are used to evaluate the performance of the proposed method which proves the effectiveness of the algorithm.

15 citations

Journal ArticleDOI
TL;DR: The proposed encryption framework provides a potential way to realize DNA-strand-displacement-based encryption via biological experiments and promotes the research on DNA- Strand-Displacement -based encryption.
Abstract: DeoxyriboNucleic Acid (DNA) encryption is a new encryption method that appeared along with the research of DNA nanotechnology in recent years. Due to the complexity of biology in DNA nanotechnology, DNA encryption brings in an additional difficulty in deciphering and, thus, can enhance information security. As a new approach in DNA nanotechnology, DNA strand displacement has particular advantages such as being enzyme free and self-assembly. However, the existing research on DNA-strand-displacement-based encryption has mostly stayed at a theoretical or simulation stage. To this end, this paper proposes a new DNA-strand-displacement-based encryption framework. This encryption framework involves three main strategies. The first strategy was a tri-phase conversion from plaintext to DNA sequences according to a Huffman-coding-based transformation rule, which enhances the concealment of the information. The second strategy was the development of DNA strand displacement molecular modules, which produce the initial key for information encryption. The third strategy was a cyclic-shift-based operation to extend the initial key long enough, and thus increase the deciphering difficulty. The results of simulation and biological experiments demonstrated the feasibility of our scheme for encryption. The approach was further validated in terms of the key sensitivity, key space, and statistic characteristic. Our encryption framework provides a potential way to realize DNA-strand-displacement-based encryption via biological experiments and promotes the research on DNA-strand-displacement-based encryption.

11 citations

References
More filters
Journal ArticleDOI
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Abstract: In this paper we show how to divide data D into n pieces in such a way that D is easily reconstructable from any k pieces, but even complete knowledge of k - 1 pieces reveals absolutely no information about D. This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.

14,340 citations


"A Study on the Applications of the ..." refers methods in this paper

  • ...This method is based on the Shamir’s method [45] of secret key sharing....

    [...]

Journal ArticleDOI
01 Nov 1994-Science
TL;DR: This experiment demonstrates the feasibility of carrying out computations at the molecular level by solving an instance of the directed Hamiltonian path problem with standard protocols and enzymes.
Abstract: The tools of molecular biology were used to solve an instance of the directed Hamiltonian path problem. A small graph was encoded in molecules of DNA, and the "operations" of the computation were performed with standard protocols and enzymes. This experiment demonstrates the feasibility of carrying out computations at the molecular level.

4,266 citations


"A Study on the Applications of the ..." refers background in this paper

  • ...DNA encryption is one of recent branch of cryptography that uses parallel computing environment [47], [48]....

    [...]

Journal ArticleDOI
TL;DR: This paper aims to provide a useful survey on watermarking and offer a clear perspective for interested researchers by analyzing the strengths and weaknesses of different existing methods.
Abstract: The ever-growing numbers of medical digital images and the need to share them among specialists and hospitals for better and more accurate diagnosis require that patients’ privacy be protected. As a result of this, there is a need for medical image watermarking (MIW). However, MIW needs to be performed with special care for two reasons. Firstly, the watermarking procedure cannot compromise the quality of the image. Secondly, confidential patient information embedded within the image should be flawlessly retrievable without risk of error after image decompressing. Despite extensive research undertaken in this area, there is still no method available to fulfill all the requirements of MIW. This paper aims to provide a useful survey on watermarking and offer a clear perspective for interested researchers by analyzing the strengths and weaknesses of different existing methods.

157 citations


"A Study on the Applications of the ..." refers background in this paper

  • ...Security to the medical images can be provided in two broader ways [14]....

    [...]

Journal ArticleDOI
TL;DR: The proposed scheme introduces a substitution mechanism in the permutation process through a bit-level shuffling algorithm to address the efficiency problem encountered by many existing permutation-substitution type image ciphers.

154 citations


"A Study on the Applications of the ..." refers methods in this paper

  • ...Another chaos based method is proposed in [38]....

    [...]

Journal ArticleDOI
TL;DR: The method has been extensively tested and analyzed against known attacks and is found to be giving superior performance for robustness, capacity and reduced storage and bandwidth requirements compared to reported techniques suggested by other authors.
Abstract: This paper presents a new robust hybrid multiple watermarking technique using fusion of discrete wavelet transforms (DWT), discrete cosine transforms (DCT), and singular value decomposition (SVD) instead of applying DWT, DCT and SVD individually or combination of DWT-SVD / DCT-SVD. For identity authentication purposes, multiple watermarks are embedded into the same medical image / multimedia objects simultaneously, which provides extra level of security with acceptable performance in terms of robustness and imperceptibility. In the embedding process, the cover image is decomposed into first level discrete wavelet transforms where the A (approximation/lower frequency sub-band) is transformed by DCT and SVD. The watermark image is also transformed by DWT, DCT and SVD. The S vector of watermark information is embedded in the S component of the cover image. The watermarked image is generated by inverse SVD on modified S vector and original U, V vectors followed by inverse DCT and inverse DWT. The watermark is extracted using an extraction algorithm. Furthermore, the text watermark is embedding at the second level of the D (diagonal sub-band) of the cover image. The security of the text watermark considered as EPR (Electronic Patient Record) data is enhanced by using encryption method before embedding into the cover. The results are obtained by varying the gain factor, size of the text watermark, and cover medical images. The method has been extensively tested and analyzed against known attacks and is found to be giving superior performance for robustness, capacity and reduced storage and bandwidth requirements compared to reported techniques suggested by other authors.

142 citations


"A Study on the Applications of the ..." refers methods in this paper

  • ...A singular value decomposition based method has been proposed in [31]....

    [...]