scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

A Study on the Applications of the Biomedical Image Encryption Methods for Secured Computer Aided Diagnostics

TL;DR: In this work, some application of cryptographic methods have been discussed which are used to protect biomedical images from unwanted modifications and access and can be highly beneficial in future research in the field of biomedical image protection as well as multimedia data security.
Abstract: Computer aided diagnostic is one of the most active research area and has huge impact on the health care industry. With the advent of intelligent methods, biomedical data processing becomes easier and less error prone. Moreover, remote health care is also possible using the IoT infrastructure. However, data security over the network is always considered as a challenge. Biomedical data are generally sensitive to external disturbances and small manipulation in the data may cause huge difference in the ultimate result. Wrong diagnosis can be life threatening in some scenarios or can be severe in almost every instance. Therefore, biomedical data security is one of the major challenge and necessary for remote health care. In this work, some application of cryptographic methods have been discussed which are used to protect biomedical images from unwanted modifications and access. This work can be highly beneficial in future research in the field of biomedical image protection as well as multimedia data security.
Citations
More filters
Book ChapterDOI
01 Jan 2020
TL;DR: In this chapter, chaotic skew-tent map is adapted to encode an image and the values of various test parameters show the power and efficiency of the proposed algorithm, which can be used as a safeguard for sensitive image data and a secure method of image transmission.
Abstract: Encryption is one of the most frequently used tools in data communications to prevent unwanted access to the data. In the field of image encryption, chaos-based encryption methods have become very popular in the recent years. Chaos-based methods provide a good security mechanism in image communication. In this chapter, chaotic skew-tent map is adapted to encode an image. Seventy-two bit external key is considered (besides the initial parameters of the chaotic system) initially, and after some processing operations, 64 bit internal key is obtained. Using this key, every pixel is processed. The internal key is transformed using some basic operations to enhance the security. The decryption method is very simple so that authentic users can retrieve the information very fast. Every pixel is encrypted using some basic mathematical operations. The values of various test parameters show the power and efficiency of the proposed algorithm, which can be used as a safeguard for sensitive image data and a secure method of image transmission.

11 citations

Journal ArticleDOI
TL;DR: The results showed that the method is more successful than the lightweight cryptology method and the proposed methods in the literature to solve security and privacy of the data in medical applications with user roles.

5 citations

Book ChapterDOI
01 Jan 2021
TL;DR: In this article, a new image segmentation method is proposed which is based on galactic swarm optimization, which is a metaheuristic method based on the movement of stars, galaxies and other objects of space.
Abstract: Image segmentation is one of the most challenging and interesting research topics and draws the attention of the many researchers. Different methods have been proposed but a single method is not sufficient enough to segment a wide variety of images. Due to this reason, continuous research need to be carried out to improve the efficiency and the real life acceptability. In this work, a new image segmentation method is proposed which is based on galactic swarm optimization. Galactic swarm optimization is new metaheuristic method which is based on the movement of stars, galaxies and other objects of space. The proposed method use thresholding with the galactic swarm optimization where, the value of the threshold is to be determined by the metaheuristic algorithm. The optimal threshold value can efficiently segment an image. Experiments shows the efficiency and drawbacks of the proposed method. The advantages and problems of this method is discussed along with the future research directions.

4 citations

References
More filters
Journal ArticleDOI
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Abstract: In this paper we show how to divide data D into n pieces in such a way that D is easily reconstructable from any k pieces, but even complete knowledge of k - 1 pieces reveals absolutely no information about D. This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.

14,340 citations


"A Study on the Applications of the ..." refers methods in this paper

  • ...This method is based on the Shamir’s method [45] of secret key sharing....

    [...]

Journal ArticleDOI
01 Nov 1994-Science
TL;DR: This experiment demonstrates the feasibility of carrying out computations at the molecular level by solving an instance of the directed Hamiltonian path problem with standard protocols and enzymes.
Abstract: The tools of molecular biology were used to solve an instance of the directed Hamiltonian path problem. A small graph was encoded in molecules of DNA, and the "operations" of the computation were performed with standard protocols and enzymes. This experiment demonstrates the feasibility of carrying out computations at the molecular level.

4,266 citations


"A Study on the Applications of the ..." refers background in this paper

  • ...DNA encryption is one of recent branch of cryptography that uses parallel computing environment [47], [48]....

    [...]

Journal ArticleDOI
TL;DR: This paper aims to provide a useful survey on watermarking and offer a clear perspective for interested researchers by analyzing the strengths and weaknesses of different existing methods.
Abstract: The ever-growing numbers of medical digital images and the need to share them among specialists and hospitals for better and more accurate diagnosis require that patients’ privacy be protected. As a result of this, there is a need for medical image watermarking (MIW). However, MIW needs to be performed with special care for two reasons. Firstly, the watermarking procedure cannot compromise the quality of the image. Secondly, confidential patient information embedded within the image should be flawlessly retrievable without risk of error after image decompressing. Despite extensive research undertaken in this area, there is still no method available to fulfill all the requirements of MIW. This paper aims to provide a useful survey on watermarking and offer a clear perspective for interested researchers by analyzing the strengths and weaknesses of different existing methods.

157 citations


"A Study on the Applications of the ..." refers background in this paper

  • ...Security to the medical images can be provided in two broader ways [14]....

    [...]

Journal ArticleDOI
TL;DR: The proposed scheme introduces a substitution mechanism in the permutation process through a bit-level shuffling algorithm to address the efficiency problem encountered by many existing permutation-substitution type image ciphers.

154 citations


"A Study on the Applications of the ..." refers methods in this paper

  • ...Another chaos based method is proposed in [38]....

    [...]

Journal ArticleDOI
TL;DR: The method has been extensively tested and analyzed against known attacks and is found to be giving superior performance for robustness, capacity and reduced storage and bandwidth requirements compared to reported techniques suggested by other authors.
Abstract: This paper presents a new robust hybrid multiple watermarking technique using fusion of discrete wavelet transforms (DWT), discrete cosine transforms (DCT), and singular value decomposition (SVD) instead of applying DWT, DCT and SVD individually or combination of DWT-SVD / DCT-SVD. For identity authentication purposes, multiple watermarks are embedded into the same medical image / multimedia objects simultaneously, which provides extra level of security with acceptable performance in terms of robustness and imperceptibility. In the embedding process, the cover image is decomposed into first level discrete wavelet transforms where the A (approximation/lower frequency sub-band) is transformed by DCT and SVD. The watermark image is also transformed by DWT, DCT and SVD. The S vector of watermark information is embedded in the S component of the cover image. The watermarked image is generated by inverse SVD on modified S vector and original U, V vectors followed by inverse DCT and inverse DWT. The watermark is extracted using an extraction algorithm. Furthermore, the text watermark is embedding at the second level of the D (diagonal sub-band) of the cover image. The security of the text watermark considered as EPR (Electronic Patient Record) data is enhanced by using encryption method before embedding into the cover. The results are obtained by varying the gain factor, size of the text watermark, and cover medical images. The method has been extensively tested and analyzed against known attacks and is found to be giving superior performance for robustness, capacity and reduced storage and bandwidth requirements compared to reported techniques suggested by other authors.

142 citations


"A Study on the Applications of the ..." refers methods in this paper

  • ...A singular value decomposition based method has been proposed in [31]....

    [...]