一种高效的基于水印的矩阵处理和基于优化的生物医学数据隐私保护加密方法

S. Vairaprakash, A. Shenbagavalli, S. Rajagopal
{"title":"一种高效的基于水印的矩阵处理和基于优化的生物医学数据隐私保护加密方法","authors":"S. Vairaprakash, A. Shenbagavalli, S. Rajagopal","doi":"10.1166/jmihi.2021.3888","DOIUrl":null,"url":null,"abstract":"The biomedical processing of images is an important aspect of the modern medicine field and has an immense influence on the modern world. Automatic device assisted systems are immensely useful in order to diagnose biomedical images easily, accurately and effectively. Remote health care\n systems allow medical professionals and patients to work from different locations. In addition, expert advice on a patient can be received within a prescribed period of time from a specialist in a foreign country or in a remote area. Digital biomedical images must be transmitted over the network\n in remote healthcare systems. But the delivery of the biomedical goods entails many security challenges. Patient privacy must be protected by ensuring that images are secure from unwanted access. Furthermore, it must be effectively maintained so that nothing will affect the content of biomedical\n images. In certain instances, data manipulation can yield dramatic effects. A biomedical image safety method was suggested in this work. The suggested method will initially be used to construct a binary pixel encoding matrix and then to adjust matrix with the use of decimation mutation DNA\n watermarking principle. Afterwards to defend the sub keys couple privacy which was considered over the logical uplift utilization of tent maps and purpose. As acknowledged by chaotic (C-function) development, the security was investigated similar to transmission in addition to uncertainty.\n Depending on the preliminary circumstances, various numbers of random were generated intended for every map as of chaotic maps. An algorithm of Multi scale grasshopper optimization resource with correlation coefficient fitness function and PSNR was projected for choosing the optimal public\n key and secret key of system over random numbers. For choosing the validation process of optimization is to formulate novel model more relative stable to the conventional approach. In conclusion, the considered suggested findings were contrasted with current approaches protection that was\n appear to be successful extremely.","PeriodicalId":393031,"journal":{"name":"J. Medical Imaging Health Informatics","volume":"63 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Efficient Watermarking Based Matrix Manipulation and Optimization Based Cryptographic Method for Privacy Preservation in Biomedical Data\",\"authors\":\"S. Vairaprakash, A. Shenbagavalli, S. Rajagopal\",\"doi\":\"10.1166/jmihi.2021.3888\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The biomedical processing of images is an important aspect of the modern medicine field and has an immense influence on the modern world. Automatic device assisted systems are immensely useful in order to diagnose biomedical images easily, accurately and effectively. Remote health care\\n systems allow medical professionals and patients to work from different locations. In addition, expert advice on a patient can be received within a prescribed period of time from a specialist in a foreign country or in a remote area. Digital biomedical images must be transmitted over the network\\n in remote healthcare systems. But the delivery of the biomedical goods entails many security challenges. Patient privacy must be protected by ensuring that images are secure from unwanted access. Furthermore, it must be effectively maintained so that nothing will affect the content of biomedical\\n images. In certain instances, data manipulation can yield dramatic effects. A biomedical image safety method was suggested in this work. The suggested method will initially be used to construct a binary pixel encoding matrix and then to adjust matrix with the use of decimation mutation DNA\\n watermarking principle. Afterwards to defend the sub keys couple privacy which was considered over the logical uplift utilization of tent maps and purpose. As acknowledged by chaotic (C-function) development, the security was investigated similar to transmission in addition to uncertainty.\\n Depending on the preliminary circumstances, various numbers of random were generated intended for every map as of chaotic maps. An algorithm of Multi scale grasshopper optimization resource with correlation coefficient fitness function and PSNR was projected for choosing the optimal public\\n key and secret key of system over random numbers. For choosing the validation process of optimization is to formulate novel model more relative stable to the conventional approach. In conclusion, the considered suggested findings were contrasted with current approaches protection that was\\n appear to be successful extremely.\",\"PeriodicalId\":393031,\"journal\":{\"name\":\"J. Medical Imaging Health Informatics\",\"volume\":\"63 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"J. Medical Imaging Health Informatics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1166/jmihi.2021.3888\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Medical Imaging Health Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1166/jmihi.2021.3888","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

图像的生物医学处理是现代医学领域的一个重要方面,对现代世界有着巨大的影响。为了方便、准确和有效地诊断生物医学图像,自动设备辅助系统非常有用。远程医疗保健系统允许医疗专业人员和患者在不同地点工作。此外,可以在规定的时间内从外国或偏远地区的专家那里获得有关患者的专家意见。在远程医疗系统中,数字生物医学图像必须通过网络传输。但是,生物医药产品的运送会带来许多安全挑战。必须通过确保图像不受不必要的访问来保护患者隐私。此外,必须有效地维护它,使其不影响生物医学图像的内容。在某些情况下,数据操作可以产生戏剧性的效果。本文提出了一种生物医学图像安全方法。该方法首先构造二值像素编码矩阵,然后利用抽取突变DNA水印原理对矩阵进行调整。之后为了保护子密钥对的隐私,从逻辑上考虑了提升帐篷地图的利用和目的。正如混沌(c函数)开发所承认的那样,除了不确定性之外,安全性也类似于传输。根据初步的情况,不同数量的随机生成用于每个地图,如混沌地图。提出了一种具有相关系数适应度函数和PSNR的多尺度蝗虫优化资源算法,用于在随机数字上选择系统的最优公钥和私钥。对于选择优化的验证过程,是为了建立比传统方法更相对稳定的新模型。综上所述,所考虑的建议结果与目前看来非常成功的保护方法进行了对比。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An Efficient Watermarking Based Matrix Manipulation and Optimization Based Cryptographic Method for Privacy Preservation in Biomedical Data
The biomedical processing of images is an important aspect of the modern medicine field and has an immense influence on the modern world. Automatic device assisted systems are immensely useful in order to diagnose biomedical images easily, accurately and effectively. Remote health care systems allow medical professionals and patients to work from different locations. In addition, expert advice on a patient can be received within a prescribed period of time from a specialist in a foreign country or in a remote area. Digital biomedical images must be transmitted over the network in remote healthcare systems. But the delivery of the biomedical goods entails many security challenges. Patient privacy must be protected by ensuring that images are secure from unwanted access. Furthermore, it must be effectively maintained so that nothing will affect the content of biomedical images. In certain instances, data manipulation can yield dramatic effects. A biomedical image safety method was suggested in this work. The suggested method will initially be used to construct a binary pixel encoding matrix and then to adjust matrix with the use of decimation mutation DNA watermarking principle. Afterwards to defend the sub keys couple privacy which was considered over the logical uplift utilization of tent maps and purpose. As acknowledged by chaotic (C-function) development, the security was investigated similar to transmission in addition to uncertainty. Depending on the preliminary circumstances, various numbers of random were generated intended for every map as of chaotic maps. An algorithm of Multi scale grasshopper optimization resource with correlation coefficient fitness function and PSNR was projected for choosing the optimal public key and secret key of system over random numbers. For choosing the validation process of optimization is to formulate novel model more relative stable to the conventional approach. In conclusion, the considered suggested findings were contrasted with current approaches protection that was appear to be successful extremely.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信