6 research outputs found

    Efficient and secure image encryption using key substitution process with discrete wavelet transform

    Get PDF
    Over the past few years, there has been a rise in the utilization of chaotic encryption algorithms for securing images. The majority of chaos-based encryption algorithms adhere to the conventional model of confusion and diffusion, which typically involves either implementing multiple encryption rounds or employing a single round of intricate encryption to guarantee robust security. However, such kind of approaches reduces the computational efficiency of the encryption process but compromises security. There is a trade-off between security and computational efficiency. Prioritizing security may require high computational processes. To overcome this issue, a key substitution encryption process with discrete wavelet transform (KSP-DWT) is developed in the proposed image encryption technique (IET). Based on KSP-DWT and IET, the abbreviation of the proposed work is used in this paper as KSP-DWT-IET. The proposed KSP-DWT algorithm employs a key scheming technique to update the initial keys and uses a novel substitution method to encrypt digital images of different sizes. Additionally, the integration of DWT can result in the compression of frequency sub-bands of the source image, leading to lower computational overheads without compromising the security of the encryption. The KSP-DWT-IET performs a single encryption round and is highly secure and efficient. The simulation results and security analysis conducted on KSP-DWT-IET confirm its effectiveness in ensuring high-security image encryption while minimizing computational overhead. The proposed encryption technique undergoes various security analyses, including entropy, contrast, correlation, energy, NPCR (Number of Pixel Changes Rate), UACI (Unified Average Change Intensity) and computational complexity. The statistical values obtained for such parameters are 7.9991, 10.9889, 0.0001, 0.0152, 33.6767, and 33.6899, respectively, which indicate that the encryption technique performs very well in terms of security and computational efficiency. The proposed encryption scheme is also analyzed for its computational time in addition to its security. The analysis shows that the scheme can efficiently encrypt images of varying sizes with a high level of security in a short amount of time (i.e., 2 ms). Therefore, it is feasible to use this encryption scheme in real-time applications without causing any significant delays. Moreover, the key space of the proposed encryption scheme is large enough (i.e. Keyspace ) to resist the brute force attack

    Chaos and Cellular Automata-Based Substitution Box and Its Application in Cryptography

    Get PDF
    Substitution boxes are the key factor in symmetric-key cryptosystems that determines their ability to resist various cryptanalytic attacks. Creating strong substitution boxes that have multiple strong cryptographic properties at the same time is a challenging task for cryptographers. A significant amount of research has been conducted on S-boxes in the past few decades, but the resulting S-boxes have been found to be vulnerable to various cyberattacks. This paper proposes a new method for creating robust S-boxes that exhibit superior performance and possess high scores in multiple cryptographic properties. The hybrid S-box method presented in this paper is based on Chua’s circuit chaotic map, two-dimensional cellular automata, and an algebraic permutation group structure. The proposed 16×16 S-box has an excellent performance in terms of security parameters, including a minimum nonlinearity of 102, the absence of fixed points, the satisfaction of bit independence and strict avalanche criteria, a low differential uniformity of 5, a low linear approximation probability of 0.0603, and an auto-correlation function of 28. The analysis of the performance comparison indicates that the proposed S-box outperforms other state-of-the-art S-box techniques in several aspects. It possesses better attributes, such as a higher degree of inherent security and resilience, which make it more secure and less vulnerable to potential attacks

    Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model

    Get PDF
    This article presents non-invasive sensing-based diagnoses of pneumonia disease, exploiting a deep learning model to make the technique non-invasive coupled with security preservation. Sensing and securing healthcare and medical images such as X-rays that can be used to diagnose viral diseases such as pneumonia is a challenging task for researchers. In the past few years, patients’ medical records have been shared using various wireless technologies. The wireless transmitted data are prone to attacks, resulting in the misuse of patients’ medical records. Therefore, it is important to secure medical data, which are in the form of images. The proposed work is divided into two sections: in the first section, primary data in the form of images are encrypted using the proposed technique based on chaos and convolution neural network. Furthermore, multiple chaotic maps are incorporated to create a random number generator, and the generated random sequence is used for pixel permutation and substitution. In the second part of the proposed work, a new technique for pneumonia diagnosis using deep learning, in which X-ray images are used as a dataset, is proposed. Several physiological features such as cough, fever, chest pain, flu, low energy, sweating, shaking, chills, shortness of breath, fatigue, loss of appetite, and headache and statistical features such as entropy, correlation, contrast dissimilarity, etc., are extracted from the X-ray images for the pneumonia diagnosis. Moreover, machine learning algorithms such as support vector machines, decision trees, random forests, and naive Bayes are also implemented for the proposed model and compared with the proposed CNN-based model. Furthermore, to improve the CNN-based proposed model, transfer learning and fine tuning are also incorporated. It is found that CNN performs better than other machine learning algorithms as the accuracy of the proposed work when using naive Bayes and CNN is 89% and 97%, respectively, which is also greater than the average accuracy of the existing schemes, which is 90%. Further, K-fold analysis and voting techniques are also incorporated to improve the accuracy of the proposed model. Different metrics such as entropy, correlation, contrast, and energy are used to gauge the performance of the proposed encryption technology, while precision, recall, F1 score, and support are used to evaluate the effectiveness of the proposed machine learning-based model for pneumonia diagnosis. The entropy and correlation of the proposed work are 7.999 and 0.0001, respectively, which reflects that the proposed encryption algorithm offers a higher security of the digital data. Moreover, a detailed comparison with the existing work is also made and reveals that both the proposed models work better than the existing work

    Mortality from gastrointestinal congenital anomalies at 264 hospitals in 74 low-income, middle-income, and high-income countries: a multicentre, international, prospective cohort study

    Get PDF
    Summary Background Congenital anomalies are the fifth leading cause of mortality in children younger than 5 years globally. Many gastrointestinal congenital anomalies are fatal without timely access to neonatal surgical care, but few studies have been done on these conditions in low-income and middle-income countries (LMICs). We compared outcomes of the seven most common gastrointestinal congenital anomalies in low-income, middle-income, and high-income countries globally, and identified factors associated with mortality. Methods We did a multicentre, international prospective cohort study of patients younger than 16 years, presenting to hospital for the first time with oesophageal atresia, congenital diaphragmatic hernia, intestinal atresia, gastroschisis, exomphalos, anorectal malformation, and Hirschsprung’s disease. Recruitment was of consecutive patients for a minimum of 1 month between October, 2018, and April, 2019. We collected data on patient demographics, clinical status, interventions, and outcomes using the REDCap platform. Patients were followed up for 30 days after primary intervention, or 30 days after admission if they did not receive an intervention. The primary outcome was all-cause, in-hospital mortality for all conditions combined and each condition individually, stratified by country income status. We did a complete case analysis. Findings We included 3849 patients with 3975 study conditions (560 with oesophageal atresia, 448 with congenital diaphragmatic hernia, 681 with intestinal atresia, 453 with gastroschisis, 325 with exomphalos, 991 with anorectal malformation, and 517 with Hirschsprung’s disease) from 264 hospitals (89 in high-income countries, 166 in middleincome countries, and nine in low-income countries) in 74 countries. Of the 3849 patients, 2231 (58·0%) were male. Median gestational age at birth was 38 weeks (IQR 36–39) and median bodyweight at presentation was 2·8 kg (2·3–3·3). Mortality among all patients was 37 (39·8%) of 93 in low-income countries, 583 (20·4%) of 2860 in middle-income countries, and 50 (5·6%) of 896 in high-income countries (p<0·0001 between all country income groups). Gastroschisis had the greatest difference in mortality between country income strata (nine [90·0%] of ten in lowincome countries, 97 [31·9%] of 304 in middle-income countries, and two [1·4%] of 139 in high-income countries; p≤0·0001 between all country income groups). Factors significantly associated with higher mortality for all patients combined included country income status (low-income vs high-income countries, risk ratio 2·78 [95% CI 1·88–4·11], p<0·0001; middle-income vs high-income countries, 2·11 [1·59–2·79], p<0·0001), sepsis at presentation (1·20 [1·04–1·40], p=0·016), higher American Society of Anesthesiologists (ASA) score at primary intervention (ASA 4–5 vs ASA 1–2, 1·82 [1·40–2·35], p<0·0001; ASA 3 vs ASA 1–2, 1·58, [1·30–1·92], p<0·0001]), surgical safety checklist not used (1·39 [1·02–1·90], p=0·035), and ventilation or parenteral nutrition unavailable when needed (ventilation 1·96, [1·41–2·71], p=0·0001; parenteral nutrition 1·35, [1·05–1·74], p=0·018). Administration of parenteral nutrition (0·61, [0·47–0·79], p=0·0002) and use of a peripherally inserted central catheter (0·65 [0·50–0·86], p=0·0024) or percutaneous central line (0·69 [0·48–1·00], p=0·049) were associated with lower mortality. Interpretation Unacceptable differences in mortality exist for gastrointestinal congenital anomalies between lowincome, middle-income, and high-income countries. Improving access to quality neonatal surgical care in LMICs will be vital to achieve Sustainable Development Goal 3.2 of ending preventable deaths in neonates and children younger than 5 years by 2030

    Abstracts from the 3rd International Genomic Medicine Conference (3rd IGMC 2015)

    Get PDF

    Securing High-Resolution Images From Unmanned Aerial Vehicles With DNA Encoding and Bit-Plane Extraction Method

    Get PDF
    Unmanned aerial vehicles (UAVs) are getting more popular for deployment in surveillance related operations owing to their flexibility and ability to reach hazardous areas. Moreover, the quality of digital cameras is getting better, and they can capture and store more visual information in high-resolution images. Unfortunately, due to the resource-constrained nature of UAVs, storing such large images can exhaust memory and related resources; whereas, the transmission of these images over the public link can pose several security threats. Securing these critical images during transmission from unauthorized access can be achieved through the use of efficient encryption techniques. This article proposes a novel encryption scheme incorporating both confusion and diffusion for encrypting both grey-scale and color images. In the proposed- encryption scheme, the image blocks are rearranged using a combination of random permutation, rotation, DNA encoding and zigzag pattern. Next, a bit-plane extraction method is used to obtain eight different bit-planes, including the most and least significant ones, from the scrambled image. These extracted bit-planes are then processed using confusion and diffusion techniques with a secret key, which is created using a hyper-chaotic map. The proposed method for encrypting the images taken by unmanned ariel vehicles is evaluated by examining its security level and time complexity using evaluation metrics such as correlation, entropy, energy, histogram analysis, keyspace and key sensitivity. The results and analysis demonstrated that the proposed encryption algorithm is able to effectively secure digital images. Additionally, the proposed work is also found to be superior to existing methods when compared using statistical security metrics
    corecore