9 research outputs found
Recommended from our members
Robust watermarking algorithm for medical volume data in internet of medical things
The advancement of 5G technology, big data and cloud storage has promoted the rapid development of the Internet of Medical Things (IoMT). Based on the strict security requirements and high level of accuracy required for disease diagnosis and pathological analysis, 3D medical volume data have been created in large numbers. The IoMT facilitates the rapid transfer of medical information and also makes the protection of pathological information and privacy information of patients increasingly prominent. To solve the security problem, a robust zero-watermarking algorithm based on 3D hyperchaos and 3D dual-tree complex wavelet transform is proposed according to the selected feature of medical volume data. The feature combines human visual features with improved perceptual hashing techniques. It is a robust and efficient binary sequence. When implementing the proposed algorithm, the watermark is first scrambled with 3D hyperchaos to enhance security. Then, 3D DTCWT-DCT transformation is applied to medical volume data, and the low-frequency coefficients that can represent the features are selected and binarized to generate the secret key to complete the watermark embedding and extraction. Zero embedding and blind extraction ensure that the original medical volume data is not altered in any form, which meets the special requirements for diagnosis. Simulation results show that the algorithm is robust and can effectively resist common attacks and geometric attacks. It used fewer robust features to effectively bound medical volume data and watermark information, saved bandwidth, and satisfied the security of transmission and storage of medical volume data in the Internet of medical things. In particular, compared with state-of-the-art technology, the proposed algorithm improves the average NC value by 46.67% under geometric attacks
Optimization of medical image steganography using n-decomposition genetic algorithm
Protecting patients' confidential information is a critical concern in medical image steganography. The Least Significant Bits (LSB) technique has been widely used for secure communication. However, it is susceptible to imperceptibility and security risks due to the direct manipulation of pixels, and ASCII patterns present limitations. Consequently, sensitive medical information is subject to loss or alteration. Despite attempts to optimize LSB, these issues persist due to (1) the formulation of the optimization suffering from non-valid implicit constraints, causing inflexibility in reaching optimal embedding, (2) lacking convergence in the searching process, where the message length significantly affects the size of the solution space, and (3) issues of application customizability where different data require more flexibility in controlling the embedding process. To overcome these limitations, this study proposes a technique known as an n-decomposition genetic algorithm. This algorithm uses a variable-length search to identify the best location to embed the secret message by incorporating constraints to avoid local minimum traps. The methodology consists of five main phases: (1) initial investigation, (2) formulating an embedding scheme, (3) constructing a decomposition scheme, (4) integrating the schemes' design into the proposed technique, and (5) evaluating the proposed technique's performance based on parameters using medical datasets from kaggle.com. The proposed technique showed resistance to statistical analysis evaluated using Reversible Statistical (RS) analysis and histogram. It also demonstrated its superiority in imperceptibility and security measured by MSE and PSNR to Chest and Retina datasets (0.0557, 0.0550) and (60.6696, 60.7287), respectively. Still, compared to the results obtained by the proposed technique, the benchmark outperforms the Brain dataset due to the homogeneous nature of the images and the extensive black background. This research has contributed to genetic-based decomposition in medical image steganography and provides a technique that offers improved security without compromising efficiency and convergence. However, further validation is required to determine its effectiveness in real-world applications
A novel robust reversible watermarking scheme for protecting authenticity and integrity of medical images
It is of great importance in telemedicine to protect authenticity and
integrity of medical images. They are mainly addressed by two technologies, which
are region of interest (ROI) lossless watermarking and reversible watermarking.
However, the former causes biases on diagnosis by distorting region of none interest
(RONI) and introduces security risks by segmenting image spatially for watermark
embedding. The latter fails to provide reliable recovery function for the tampered
areas when protecting image integrity. To address these issues, a novel robust
reversible watermarking scheme is proposed in this paper. In our scheme, a reversible
watermarking method is designed based on recursive dither modulation (RDM) to
avoid biases on diagnosis. In addition, RDM is combined with Slantlet transform and
singular value decomposition to provide a reliable solution for protecting image
authenticity. Moreover, ROI and RONI are divided for watermark generation to
design an effective recovery function under limited embedding capacity. Finally,
watermarks are embedded into whole medical images to avoid the risks caused by
segmenting image spatially. Experimental results demonstrate that our proposed
lossless scheme not only has remarkable imperceptibility and sufficient robustness,
but also provides reliable authentication, tamper detection, localization and recovery
functions, which outperforms existing schemes for protecting medical image
Intelligent Circuits and Systems
ICICS-2020 is the third conference initiated by the School of Electronics and Electrical Engineering at Lovely Professional University that explored recent innovations of researchers working for the development of smart and green technologies in the fields of Energy, Electronics, Communications, Computers, and Control. ICICS provides innovators to identify new opportunities for the social and economic benefits of society.  This conference bridges the gap between academics and R&D institutions, social visionaries, and experts from all strata of society to present their ongoing research activities and foster research relations between them. It provides opportunities for the exchange of new ideas, applications, and experiences in the field of smart technologies and finding global partners for future collaboration. The ICICS-2020 was conducted in two broad categories, Intelligent Circuits & Intelligent Systems and Emerging Technologies in Electrical Engineering
Education and Social Work handbook
2006 handbook for the faculty of Education and Social Wor
Education and Social Work handbook
2006 handbook for the faculty of Education and Social Wor