基于蚁群优化的医学图像安全管理

IF 2 4区 计算机科学 Q3 AUTOMATION & CONTROL SYSTEMS Information Technology and Control Pub Date : 2023-07-15 DOI:10.5755/j01.itc.52.2.32532
S. Karthikeyini, R. Sagayaraj, N. Rajkumar, Punitha Kumaresa Pillai
{"title":"基于蚁群优化的医学图像安全管理","authors":"S. Karthikeyini, R. Sagayaraj, N. Rajkumar, Punitha Kumaresa Pillai","doi":"10.5755/j01.itc.52.2.32532","DOIUrl":null,"url":null,"abstract":"Data encryption before transmission is still a crucial step in lowering security concerns in cloud-based environments. Steganography and image encryption methods validate the security of confidential data while it is being transmitted over the Internet. The paper presents the Ant Colony Optimization with Encryption Curve cryptography-based steganography technique to enhance the security of medical image management (ACO-ECC-SMIM). The initial stage is to create the stego images for the used cover image, the ACO algorithm-based image steganography technique is used. The creation of the encryption process is a key focus of the suggested ACO-ECC-SMIM strategy. The encryption process is initially carried out using an ECC technique, or elliptic curve cryptography. To maximize PSNR, the ACO technique is employed to optimize the crucial production process in the ECC model. The host image is subjected to an integer wavelet transform, and the coefficients have been altered. To determine the ideal coefficients where to conceal the data, the ACO optimization technique is utilized. The decryption and sharing reconstruction procedures are then carried out on the receiver side to create the original images. In image 1, the ACO-ECC-SMIM model showed an improved PSNR of 59.37dB. Image 5 has an improved PSNR of 59.53dB thanks to the ACO-ECC-SMIM model. A large-scale experimental investigation was conducted to show the improved performance of the proposed PIOE-SMIM method, and the findings demonstrated the superiority of the ACO-ECC-SMIM model over other approaches.","PeriodicalId":54982,"journal":{"name":"Information Technology and Control","volume":"160 1","pages":"276-287"},"PeriodicalIF":2.0000,"publicationDate":"2023-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security in Medical Image Management Using Ant Colony Optimization\",\"authors\":\"S. Karthikeyini, R. Sagayaraj, N. Rajkumar, Punitha Kumaresa Pillai\",\"doi\":\"10.5755/j01.itc.52.2.32532\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data encryption before transmission is still a crucial step in lowering security concerns in cloud-based environments. Steganography and image encryption methods validate the security of confidential data while it is being transmitted over the Internet. The paper presents the Ant Colony Optimization with Encryption Curve cryptography-based steganography technique to enhance the security of medical image management (ACO-ECC-SMIM). The initial stage is to create the stego images for the used cover image, the ACO algorithm-based image steganography technique is used. The creation of the encryption process is a key focus of the suggested ACO-ECC-SMIM strategy. The encryption process is initially carried out using an ECC technique, or elliptic curve cryptography. To maximize PSNR, the ACO technique is employed to optimize the crucial production process in the ECC model. The host image is subjected to an integer wavelet transform, and the coefficients have been altered. To determine the ideal coefficients where to conceal the data, the ACO optimization technique is utilized. The decryption and sharing reconstruction procedures are then carried out on the receiver side to create the original images. In image 1, the ACO-ECC-SMIM model showed an improved PSNR of 59.37dB. Image 5 has an improved PSNR of 59.53dB thanks to the ACO-ECC-SMIM model. A large-scale experimental investigation was conducted to show the improved performance of the proposed PIOE-SMIM method, and the findings demonstrated the superiority of the ACO-ECC-SMIM model over other approaches.\",\"PeriodicalId\":54982,\"journal\":{\"name\":\"Information Technology and Control\",\"volume\":\"160 1\",\"pages\":\"276-287\"},\"PeriodicalIF\":2.0000,\"publicationDate\":\"2023-07-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information Technology and Control\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.5755/j01.itc.52.2.32532\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Technology and Control","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.5755/j01.itc.52.2.32532","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

在基于云的环境中,传输前的数据加密仍然是降低安全担忧的关键一步。隐写术和图像加密方法验证了机密数据在互联网上传输时的安全性。提出了一种基于蚁群优化的加密曲线隐写技术(ACO-ECC-SMIM),以提高医学图像管理的安全性。初始阶段是对使用的封面图像创建隐写图像,使用基于蚁群算法的图像隐写技术。加密过程的创建是建议的ACO-ECC-SMIM策略的关键焦点。加密过程最初是使用ECC技术或椭圆曲线加密进行的。为了最大化PSNR,在ECC模型中采用蚁群算法对关键生产过程进行优化。对主图像进行整数小波变换,并改变系数。为了确定隐藏数据的理想系数,采用蚁群优化技术。然后在接收端进行解密和共享重建过程,以创建原始图像。在图1中,ACO-ECC-SMIM模型显示改进的PSNR为59.37dB。由于ACO-ECC-SMIM模型,图像5的PSNR提高到59.53dB。大规模的实验研究表明,所提出的PIOE-SMIM方法的性能得到了改善,结果表明ACO-ECC-SMIM模型优于其他方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Security in Medical Image Management Using Ant Colony Optimization
Data encryption before transmission is still a crucial step in lowering security concerns in cloud-based environments. Steganography and image encryption methods validate the security of confidential data while it is being transmitted over the Internet. The paper presents the Ant Colony Optimization with Encryption Curve cryptography-based steganography technique to enhance the security of medical image management (ACO-ECC-SMIM). The initial stage is to create the stego images for the used cover image, the ACO algorithm-based image steganography technique is used. The creation of the encryption process is a key focus of the suggested ACO-ECC-SMIM strategy. The encryption process is initially carried out using an ECC technique, or elliptic curve cryptography. To maximize PSNR, the ACO technique is employed to optimize the crucial production process in the ECC model. The host image is subjected to an integer wavelet transform, and the coefficients have been altered. To determine the ideal coefficients where to conceal the data, the ACO optimization technique is utilized. The decryption and sharing reconstruction procedures are then carried out on the receiver side to create the original images. In image 1, the ACO-ECC-SMIM model showed an improved PSNR of 59.37dB. Image 5 has an improved PSNR of 59.53dB thanks to the ACO-ECC-SMIM model. A large-scale experimental investigation was conducted to show the improved performance of the proposed PIOE-SMIM method, and the findings demonstrated the superiority of the ACO-ECC-SMIM model over other approaches.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Information Technology and Control
Information Technology and Control 工程技术-计算机:人工智能
CiteScore
2.70
自引率
9.10%
发文量
36
审稿时长
12 months
期刊介绍: Periodical journal covers a wide field of computer science and control systems related problems including: -Software and hardware engineering; -Management systems engineering; -Information systems and databases; -Embedded systems; -Physical systems modelling and application; -Computer networks and cloud computing; -Data visualization; -Human-computer interface; -Computer graphics, visual analytics, and multimedia systems.
期刊最新文献
Model construction of big data asset management system for digital power grid regulation Melanoma Diagnosis Using Enhanced Faster Region Convolutional Neural Networks Optimized by Artificial Gorilla Troops Algorithm A Scalable and Stacked Ensemble Approach to Improve Intrusion Detection in Clouds Traffic Sign Detection Algorithm Based on Improved Yolox Apply Physical System Model and Computer Algorithm to Identify Osmanthus Fragrans Seed Vigor Based on Hyperspectral Imaging and Convolutional Neural Network
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1