Journal ArticleDOI
Hybrid optimization with cryptography encryption for medical image security in Internet of Things
Reads0
Chats0
TLDR
This paper investigated the security of medical images in IoT by utilizing an innovative cryptographic model with optimization strategies, and identified a diverse encryption algorithm with its optimization methods with the most extreme peak signal-to-noise ratio values.Abstract:
The development of the Internet of Things (IoT) is predicted to change the healthcare industry and might lead to the rise of the Internet of Medical Things. The IoT revolution is surpassing the present-day human services with promising mechanical, financial, and social prospects. This paper investigated the security of medical images in IoT by utilizing an innovative cryptographic model with optimization strategies. For the most part, the patient data are stored as a cloud server in the hospital due to which the security is vital. So another framework is required for the secure transmission and effective storage of medical images interleaved with patient information. For increasing the security level of encryption and decryption process, the optimal key will be chosen using hybrid swarm optimization, i.e., grasshopper optimization and particle swarm optimization in elliptic curve cryptography. In view of this method, the medical images are secured in IoT framework. From this execution, the results are compared and contrasted, whereas a diverse encryption algorithm with its optimization methods from the literature is identified with the most extreme peak signal-to-noise ratio values, i.e., 59.45 dB and structural similarity index as 1.read more
Citations
More filters
Journal ArticleDOI
An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy
Sachi Nandan Mohanty,K.C. Ramya,S. Sheeba Rani,Deepak Gupta,K. Shankar,S. K. Lakshmanaprabu,Ashish Khanna +6 more
TL;DR: Efficient Lightweight integrated Blockchain (ELIB) model is developed to meet necessitates of IoT and shows maximum performance under several evaluation parameters, and is deployed in a smart home environment.
Journal ArticleDOI
Optimal bilateral filter and Convolutional Neural Network based denoising method of medical image measurements
Mohamed Elhoseny,K. Shankar +1 more
TL;DR: An inventive bio-inspired optimization based filtering system is considered for the MI denoising process, the filter named as Bilateral Filter (BF), and Gaussian and spatial weights are chosen by utilizing swarm based optimization that is Dragonfly (DF) and Modified Firefly (MFF) algorithm.
Journal ArticleDOI
Deep learning model for real-time image compression in Internet of Underwater Things (IoUT)
TL;DR: This paper model and implement a discrete wavelet transform (DWT) based deep learning model for image compression in IoUT and validate DWT–CNN model using extensive set of experimentations and depict that it is superior to existing methods such as super-resolution convolutional neural networks (SRCNN), JPEG and JPEG2000 in terms of compression performance as well as reconstructed image quality.
Journal ArticleDOI
A Comprehensive Survey of the Internet of Things (IoT) and AI-Based Smart Healthcare
Fatima Alshehri,Ghulam Muhammad +1 more
TL;DR: A comprehensive survey of IoT-and IoMT-based edge-intelligent smart health care, mainly focusing on journal articles published between 2014 and 2020, is presented in this article.
Journal ArticleDOI
Reliable Data Transmission Model for Mobile Ad Hoc Network Using Signcryption Technique
Mohamed Elhoseny,K. Shankar +1 more
TL;DR: This paper focuses on improving reliable data transmission with high security in the MANET using an optimization technique and demonstrates that the MANet with optimization techniques achieves a high transmission rate and improves the reliable data security.
References
More filters
Journal ArticleDOI
The Internet of Things for Health Care: A Comprehensive Survey
TL;DR: An intelligent collaborative security model to minimize security risk is proposed; how different innovations such as big data, ambient intelligence, and wearables can be leveraged in a health care context is discussed; and various IoT and eHealth policies and regulations are addressed to determine how they can facilitate economies and societies in terms of sustainable development.
Journal ArticleDOI
Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things
Amir M. Rahmani,Tuan Nguyen Gia,Behailu Negash,Arman Anzanpour,Iman Azimi,Mingzhe Jiang,Pasi Liljeberg +6 more
TL;DR: This paper proposes to exploit the concept of Fog Computing in Healthcare IoT systems by forming a Geo-distributed intermediary layer of intelligence between sensor nodes and Cloud and presents a prototype of a Smart e-Health Gateway called UT-GATE.
Journal ArticleDOI
Secure Medical Data Transmission Model for IoT-Based Healthcare Systems
Mohamed Elhoseny,Gustavo Ramirez-Gonzalez,Osama Abu-Elnasr,Shihab A. Shawkat,N. Arunkumar,Ahmed Farouk +5 more
TL;DR: The proposed hybrid security model for securing the diagnostic text data in medical images proved its ability to hide the confidential patient’s data into a transmitted cover image with high imperceptibility, capacity, and minimal deterioration in the received stego-image.
Journal ArticleDOI
Wireless Communication Technologies for Safe Cooperative Cyber Physical Systems
Ali Balador,Anis Kouba,Dajana Cassioli,Fotis Foukalas,Ricardo Severino,Daria Stepanova,Giovanni Agosta,Jing Xie,Luigi Pomante,Maurizio Mongelli,Pierluigi Pierini,Stig Petersen,Timo Sukuvaara +12 more
TL;DR: An overview of five Co-CPS use cases, as introduced in the SafeCOP EU project, and a comprehensive analysis of the main existing wireless communication technologies giving details about the protocols developed within particular standardization bodies are provided.
Journal ArticleDOI
Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain
Aiqing Zhang,Xiaodong Lin +1 more
TL;DR: A blockchain-based secure and privacy-preserving PHI sharing (BSPP) scheme for diagnosis improvements in e-Health systems and security analysis demonstrates that the proposed protocol can meet with the security goals.