Security and privacy are major concerns in this modern world. Medical documentation of patient data needs to be transmitted between hospitals for medical experts opinions on critical cases which may cause threats to t...
详细信息
Security and privacy are major concerns in this modern world. Medical documentation of patient data needs to be transmitted between hospitals for medical experts opinions on critical cases which may cause threats to the data. Nowadays most of the hospitals use electronic methods to store and transmit data with basic security measures, but these methods are still vulnerable. There is no perfect solution that solves the security problems in any industry, especially healthcare. So, to cope with the arising need to increase the security of the data from being manipulated the proposed method uses a hybrid image encryption technique to hide the data in an image so it becomes difficult to sense the presence of data in the image while transmission. It combines Least Significant Bit (LSB) Algorithm using Arithmetic Division Operation along with Canny edge detection to embed the patient data in medical images. The image is subsequently encrypted using keys of six different chaotic maps sequentially to increase the integrity and robustness of the system. Finally, an encrypted image is converted into DNA sequence using DNA encoding rule to improve reliability. The experimentation is done on the Chest XRay image, Knee Magnetic Resonance Imaging (MRI) image, Neck MRI image, Lungs Computed Tomography (CT) Scan image datasets and patient medical data with 500 characters, 1000 characters and 1500 characters. And, it is evaluated based on time coefficient of encryption and decryption, histogram, entropy, similarity score (Mean Square Error), quality score (peak signal-to-noise ratio), motion activity index (number of changing pixel rate), unified average changing intensity, image similarity score (structure similarity index measurement) between original and encrypted images. Also, the proposed technique is compared with other recent state of arts methods for 500 characters embedding and performed better than those techniques. The proposed method is more stable and embeds comparativel
Clustering strategies for reducing the energy consumption and extending the network life have been employed widely in Wireless Sensor Network (WSN). The clustering mechanism can extend the network’s service life and ...
详细信息
In the last decade, due to the widespread and inexpensive availability of digital video cameras, digital videos (DV) are employed for security purposes daily, and they are generally regarded as a more credible form of...
详细信息
In the last decade, due to the widespread and inexpensive availability of digital video cameras, digital videos (DV) are employed for security purposes daily, and they are generally regarded as a more credible form of evidence than still photographs. Due to the tremendous growth of video editing tools, anyone with access to advanced editing software and a modern Smartphone can easily do digital video manipulations and fake it. As a result, to utilize video content as proof in court, it is necessary to evaluate and determine whether it is original or modified. To check the integrity and validity of video recordings, digital forgery detection techniques are required. The objective of the study is to present a systematic review of techniques for detecting forgery in digital videos. We conducted a systematic literature review (SLR) in this study to present a detailed review of the initial and recent research efforts in Digital video forgery detection, summarizing 260 relevant papers from 2000 to 2023 that have presented a variety of techniques. For analysis, we have presented our references in three different ways: according to the type of forgery detected, according to the type of model or technique used and according to the feature used for forgery detection. We look through the several datasets that are cited in articles and determine their applicable domain. Then, we looked at the numerous measuring metrics employed by different research papers and compared the effectiveness of deep and non-deep models in each category of forgery that was found. Finally, research gaps concerning passive video forgery detection are classified and highlighted. A comparison between our survey and other existing survey articles has been presented in the paper. Researchers who wish to work on video forgery detection will get assistance to determine what kind of efforts in forgery detection work is still required. This survey will also help to select techniques and features based on their
Cervical cancer remains the top killer of women at a young age in the world, 85% of cases are detected in low-income countries. Preventive measures and therapeutic response are enhanced if potential hazards are identi...
详细信息
In our study,we present a novel method for automating the segmentation and classification of bone marrow images to distinguish between normal and Acute Lymphoblastic Leukaemia(ALL).Built upon existing segmentation tec...
详细信息
In our study,we present a novel method for automating the segmentation and classification of bone marrow images to distinguish between normal and Acute Lymphoblastic Leukaemia(ALL).Built upon existing segmentation techniques,our approach enhances the dual threshold segmentation process,optimizing the isolation of nucleus and cytoplasm *** is achieved by adapting threshold values based on image characteristics,resulting in superior segmentation outcomes compared to previous *** address challenges,such as noise and incomplete white blood cells,we employ mathematical morphology and median filtering *** methods effectively denoise the images and remove incomplete cells,leading to cleaner and more precise ***,we propose a unique feature extraction method using a hybrid discrete wavelet transform,capturing both spatial and frequency *** allows for the extraction of highly discriminative features from segmented images,enhancing the reliability of *** classification purposes,we utilize an improved Adaptive Neuro-Fuzzy Inference System(ANFIS)that leverages the extracted *** enhanced classification algorithm surpasses traditional methods,ensuring accurate identification of acute lymphoblastic *** innovation lies in the comprehensive integration of segmentation techniques,advanced denoising methods,novel feature extraction,and improved *** extensive evaluation on bone marrow samples from the Acute Lymphoblastic Leukemia Image DataBase(ALL-IDB)for Image Processing database using MATLAB 10.0,our method demonstrates outstanding classification *** segmentation accuracy for various cell types,including Band cells(96%),Metamyelocyte(99%),Myeloblast(96%),***(97%),***(97%),and Neutrophil cells(98%),further underscores the potential of our approach as a high-quality tool for ALL diagnosis.
In various fields,different networks are used,most of the time not of a single kind;but rather a mix of at least two *** kinds of networks are called bridge networks which are utilized in interconnection networks of P...
详细信息
In various fields,different networks are used,most of the time not of a single kind;but rather a mix of at least two *** kinds of networks are called bridge networks which are utilized in interconnection networks of PC,portable networks,spine of internet,networks engaged with advanced mechanics,power generation interconnection,bio-informatics and substance intensify *** number that can be entirely calculated by a graph is called graph *** mathematical graph invariants have been portrayed and utilized for connection investigation during the latest twenty ***,no trustworthy evaluation has been embraced to pick,how much these invariants are associated with a network graph or subatomic *** this paper,it will discuss three unmistakable varieties of bridge networks with an incredible capacity of assumption in the field of computerscience,chemistry,physics,drug industry,informatics and arithmetic in setting with physical and manufactured developments and networks,since Contraharmonic-quadratic invariants(CQIs)are recently presented and have different figure qualities for different varieties of bridge graphs or *** study settled the geography of bridge graphs/networks of three novel sorts with two kinds of CQI and Quadratic-Contraharmonic Indices(QCIs).The deduced results can be used for the modeling of the above-mentioned networks.
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems (IDS). Data labeling difficulties, incorrect conclusions, and vulnerability to malicious data i...
详细信息
Intelligent Transportation Systems (ITS) generate massive amounts of Big Data through both sensory and non-sensory platforms. The data support batch processing as well as stream processing, which are essential for rel...
详细信息
Intelligent Transportation Systems (ITS) generate massive amounts of Big Data through both sensory and non-sensory platforms. The data support batch processing as well as stream processing, which are essential for reliable operations on the roads and connected vehicles in ITS. Despite the immense potential of Big Data intelligence in ITS, autonomous vehicles are largely confined to testing and trial phases. The research community is working tirelessly to improve the reliability of ITS by designing new protocols, standards, and connectivity paradigms. In the recent past, several surveys have been conducted that focus on Big Data Intelligence for ITS, yet none of them have comprehensively addressed the fundamental challenges hindering the widespread adoption of autonomous vehicles on the roads. Our survey aims to help readers better understand the technological advancements by delving deep into Big Data architecture, focusing on data acquisition, data storage, and data visualization. We reviewed sensory and non-sensory platforms for data acquisition, data storage repositories for archival and retrieval of large datasets, and data visualization for presenting the processed data in an interactive and comprehensible format. To this end, we discussed the current research progress by comprehensively covering the literature and highlighting challenges that urgently require the attention of the research community. Based on the concluding remarks, we argued that these challenges hinder the widespread presence of autonomous vehicles on the roads. Understanding these challenges is important for a more informed discussion on the future of self-driven technology. Moreover, we acknowledge that these challenges not only affect individual layers but also impact the functionality of subsequent layers. Finally, we outline our future work that explores how resolving these challenges could enable the realization of innovations such as smart charging systems on the roads and data centers
作者:
Meegada, RadhikaBhuyan, Hemanta Kumar
Department of Computer Science Engineering Andhra Pradesh Guntur India
Department of Information Technology and Computer Applications Andhra Pradesh Guntur India
The mortality of Breast cancer patients is issued based on lack of identification and treatment, and mammography is a useful tool for early screening. Deep learning-based computer-aided diagnosis (CAD) of mammography ...
详细信息
Automatic Speech Recognition (ASR) has been the regnant research area in the domain of Natural Language Processing for the last few decades. Past years’ advancement provides progress in this area of research. The acc...
详细信息
暂无评论