1
|
Chen K, Zhou Z, Li Y, Ji X, Wu J, Coatrieux JL, Chen Y, Coatrieux G. RED-Net: Residual and Enhanced Discriminative Network for Image Steganalysis in the Internet of Medical Things and Telemedicine. IEEE J Biomed Health Inform 2024; 28:1611-1622. [PMID: 37721892 DOI: 10.1109/jbhi.2023.3316468] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 09/20/2023]
Abstract
Internet of Medical Things (IoMT) and telemedicine technologies utilize computers, communications, and medical devices to facilitate off-site exchanges between specialists and patients, specialists, and medical staff. If the information communicated in IoMT is illegally steganography, tampered or leaked during transmission and storage, it will directly impact patient privacy or the consultation results with possible serious medical incidents. Steganalysis is of great significance for the identification of medical images transmitted illegally in IoMT and telemedicine. In this article, we propose a Residual and Enhanced Discriminative Network (RED-Net) for image steganalysis in the internet of medical things and telemedicine. RED-Net consists of a steganographic information enhancement module, a deep residual network, and steganographic information discriminative mechanism. Specifically, a steganographic information enhancement module is adopted by the RED-Net to boost the illegal steganographic signal in texturally complex high-dimensional medical image features. A deep residual network is utilized for steganographic feature extraction and compression. A steganographic information discriminative mechanism is employed by the deep residual network to enable it to recalibrate the steganographic features and drop high-frequency features that are mistaken for steganographic information. Experiments conducted on public and private datasets with data hiding payloads ranging from 0.1bpp/bpnzac-0.5bpp/bpnzac in the spatial and JPEG domain led to RED-Net's steganalysis error PE in the range of 0.0732-0.0010 and 0.231-0.026, respectively. In general, qualitative and quantitative results on public and private datasets demonstrate that the RED-Net outperforms 8 state-of-art steganography detectors.
Collapse
|
2
|
Alarood AA, Faheem M, Al‐Khasawneh MA, Alzahrani AIA, Alshdadi AA. Secure medical image transmission using deep neural network in e-health applications. Healthc Technol Lett 2023; 10:87-98. [PMID: 37529409 PMCID: PMC10388229 DOI: 10.1049/htl2.12049] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/28/2023] [Revised: 06/13/2023] [Accepted: 07/03/2023] [Indexed: 08/03/2023] Open
Abstract
Recently, medical technologies have developed, and the diagnosis of diseases through medical images has become very important. Medical images often pass through the branches of the network from one end to the other. Hence, high-level security is required. Problems arise due to unauthorized use of data in the image. One of the methods used to secure data in the image is encryption, which is one of the most effective techniques in this field. Confusion and diffusion are the two main steps addressed here. The contribution here is the adaptation of the deep neural network by the weight that has the highest impact on the output, whether it is an intermediate output or a semi-final output in additional to a chaotic system that is not detectable using deep neural network algorithm. The colour and grayscale images were used in the proposed method by dividing the images according to the Region of Interest by the deep neural network algorithm. The algorithm was then used to generate random numbers to randomly create a chaotic system based on the replacement of columns and rows, and randomly distribute the pixels on the designated area. The proposed algorithm evaluated in several ways, and compared with the existing methods to prove the worth of the proposed method.
Collapse
Affiliation(s)
| | - Muhammad Faheem
- School of Technology and InnovationsUniversity of VaasaVaasaFinland
| | - Mahmoud Ahmad Al‐Khasawneh
- School of Information TechnologySkyline University CollegeUniversity City SharjahSharjahUnited Arab Emirates
| | - Abdullah I. A. Alzahrani
- Department of Computer Science, Collage of Science and Humanities in Al QuwaiiyahShaqra UniversityShaqraSaudi Arabia
| | - Abdulrahman A. Alshdadi
- Department of Information Systems and Technology, College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia
| |
Collapse
|
3
|
Abd-El-Atty B. A robust medical image steganography approach based on particle swarm optimization algorithm and quantum walks. Neural Comput Appl 2022. [DOI: 10.1007/s00521-022-07830-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
Abstract
AbstractMedical information plays an essential task in our everyday lives, in which medical data privacy and security constitute an important issue. The confidentiality of medical data can be achieved by applying one or more encryption and data hiding methods. Amidst the development of quantum computers, most medical data confidentiality techniques may be hacked because their construction is based on mathematical models. Most medical data have a long lifetime exceeding 25 years. Therefore, it is an important issue to design a new medical data hiding technique that has the capability to withstand the probable attacks from the side of quantum or digital devices. In this article, we aim to present a novel medical image steganography strategy based on quantum walks, chaotic systems, and particle swarm optimization algorithm. A 3-D chaotic system and quantum walks are utilized for operating particle swarm optimization algorithm, in which the generated velocity sequence is utilized for substituting the confidential data, and the position sequence is utilized for selecting which position in the hosting image will be employed to host the substituted confidential data. The payload capacity of the suggested mechanism is 2 bits per 1 byte, and the average value for PSNR is 44.1, which is big enough for the naked eye to not differentiate the difference between the carrier image and its stego one.
Collapse
|
4
|
Abd-El-Atty B, ElAffendi M, El-Latif AAA. A novel image cryptosystem using Gray code, quantum walks, and Henon map for cloud applications. COMPLEX INTELL SYST 2022. [DOI: 10.1007/s40747-022-00829-z] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/13/2023]
Abstract
AbstractCloud computing plays a vital task in our daily lives, in which an enormous amount of data is stored daily on cloud storage. The highest priority for cloud data storage is guaranteeing the security of confidential data. The security of confidential data can be realised through utilising one of the cryptographic mechanisms including encryption and data hiding. With the rapid development for the realization of quantum computers, modern cryptosystems may be cracked including cloud systems. Accordingly, it is a crucial task for achieving confidentiality of data stored on cloud storage before the availability of quantum computers. Therefore, this study aims to utilise one of the quantum computational models, as a quantum-inspired system, to layout a new data confidentiality technique that can be applied in digital devices to have the capability for resisting the potential attacks from quantum and digital computers. In this paper, a new image security algorithm for real-time cloud applications using Gray code, quantum walks (QW), and Henon map is proposed. In the proposed image cryptosystem, the generated key streams from QW and Henon map is related to the plain image with high sensitivity of slight bit changes on the plain image. The outcomes based on deep analysis proves that the presented algorithm is efficient with high security for real-time application.
Collapse
|
5
|
A Novel Virtual Optical Image Encryption Scheme Created by Combining Chaotic S-Box with Double Random Phase Encoding. SENSORS 2022; 22:s22145325. [PMID: 35891004 PMCID: PMC9317148 DOI: 10.3390/s22145325] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/12/2022] [Revised: 07/12/2022] [Accepted: 07/14/2022] [Indexed: 02/05/2023]
Abstract
The double random phase encoding (DRPE) system plays a significant role in encrypted systems. However, it is a linear system that leads to security holes in encrypted systems. To tackle this issue, this paper proposes a novel optical image encryption scheme that combines a chaotic S-box, DRPE, and an improved Arnold transformation (IAT). In particular, the encryption scheme designs a chaotic S-box to substitute an image. The chaotic S-box has the characteristics of high nonlinearity and low differential uniformity and is then introduced to enhance the security of the DRPE system. Chaotic S-boxes are resistant to algebraic attacks. An IAT is used to scramble an image encoded by the DRPE system. Meanwhile, three chaotic sequences are obtained by a nonlinear chaotic map in the proposed encryption scheme. One of them is used for XOR operation, and the other two chaotic sequences are explored to generate two random masks in the DRPE system. Simulation results and performance analysis show that the proposed encryption scheme is efficient and secure.
Collapse
|
6
|
A Systematic Survey on Energy-Efficient Techniques in Sustainable Cloud Computing. SUSTAINABILITY 2022. [DOI: 10.3390/su14106256] [Citation(s) in RCA: 13] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
Global warming is one of the most compelling environmental threats today, as the rise in energy consumption and CO2 emission caused a dreadful impact on our environment. The data centers, computing devices, network equipment, etc., consume vast amounts of energy that the thermal power plants mainly generate. Primarily fossil fuels like coal and oils are used for energy generation in these power plants that induce various environmental problems such as global warming ozone layer depletion, which can even become the cause of premature deaths of living beings. The recent research trend has shifted towards optimizing energy consumption and green fields since the world recognized the importance of these concepts. This paper aims to conduct a complete systematic mapping analysis on the impact of high energy consumption in cloud data centers and its effect on the environment. To answer the research questions identified in this paper, one hundred nineteen primary studies published until February 2022 were considered and further categorized. Some new developments in green cloud computing and the taxonomy of various energy efficiency techniques used in data centers have also been discussed. It includes techniques like VM Virtualization and Consolidation, Power-aware, Bio-inspired methods, Thermal-management techniques, and an effort to evaluate the cloud data center’s role in reducing energy consumption and CO2 footprints. Most of the researchers proposed software level techniques as with these techniques, massive infrastructures are not required as compared with hardware techniques, and it is less prone to failure and faults. Also, we disclose some dominant problems and provide suggestions for future enhancements in green computing.
Collapse
|
7
|
Jain A, Nadeem A, Majdi Altoukhi H, Jamal SS, Atiglah HK, Elwahsh H. Personalized Liver Cancer Risk Prediction Using Big Data Analytics Techniques with Image Processing Segmentation. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:8154523. [PMID: 35387251 PMCID: PMC8979737 DOI: 10.1155/2022/8154523] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/27/2021] [Revised: 12/29/2021] [Accepted: 01/29/2022] [Indexed: 11/17/2022]
Abstract
A technology known as data analytics is a massively parallel processing approach that may be used to forecast a wide range of illnesses. Many scientific research methodologies have the problem of requiring a significant amount of time and processing effort, which has a negative impact on the overall performance of the system. Virtual screening (VS) is a drug discovery approach that makes use of big data techniques and is based on the concept of virtual screening. This approach is utilised for the development of novel drugs, and it is a time-consuming procedure that includes the docking of ligands in several databases in order to build the protein receptor. The proposed work is divided into two modules: image processing-based cancer segmentation and analysis using extracted features using big data analytics, and cancer segmentation and analysis using extracted features using image processing. This statistical approach is critical in the development of new drugs for the treatment of liver cancer. Machine learning methods were utilised in the prediction of liver cancer, including the MapReduce and Mahout algorithms, which were used to prefilter the set of ligand filaments before they were used in the prediction of liver cancer. This work proposes the SMRF algorithm, an improved scalable random forest algorithm built on the MapReduce foundation. Using a computer cluster or cloud computing environment, this new method categorises massive datasets. With SMRF, small amounts of data are processed and optimised over a large number of computers, allowing for the highest possible throughput. When compared to the standard random forest method, the testing findings reveal that the SMRF algorithm exhibits the same level of accuracy deterioration but exhibits superior overall performance. The accuracy range of 80 percent using the performance metrics analysis is included in the actual formulation of the medicine that is utilised for liver cancer prediction in this study.
Collapse
Affiliation(s)
- Anurag Jain
- Computer Science and Engineering Department, Radharaman Engineering College, Bhopal, Madhya Pradesh, India
| | - Ahmed Nadeem
- Department of Pharmacology & Toxicology, College of Pharmacy, King Saud University, PO Box 2455, Riyadh 11451, Saudi Arabia
| | - Huda Majdi Altoukhi
- Affiliation: Department of Radiology, Faculty of Medicine, King Abdulaziz University Hospital, Jeddah, 21589, Saudi Arabia
| | - Sajjad Shaukat Jamal
- Department of Mathematics, College of Science, King Khalid University, Abha, Saudi Arabia
| | - Henry kwame Atiglah
- Department of Electrical and Electronics Engineering, Tamale Technical University, Tamale, Ghana
| | - Haitham Elwahsh
- Computer Science Department, Faculty of Computers and Information, Kafrelsheikh University, Kafrelsheikh, Egypt
| |
Collapse
|
8
|
Sonar R, Swain G. A hybrid steganography technique based on RR, AQVD, and QVC. INFORMATION SECURITY JOURNAL: A GLOBAL PERSPECTIVE 2022. [DOI: 10.1080/19393555.2021.1912219] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
Affiliation(s)
- Reshma Sonar
- Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Guntur, Andhra Pradesh, India
| | - Gandharba Swain
- Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Guntur, Andhra Pradesh, India
| |
Collapse
|
9
|
Biosensor-Assisted Method for Abdominal Syndrome Classification Using Machine Learning Algorithm. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022; 2022:4454226. [PMID: 35126492 PMCID: PMC8816582 DOI: 10.1155/2022/4454226] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/03/2021] [Revised: 12/21/2021] [Accepted: 12/28/2021] [Indexed: 12/29/2022]
Abstract
The digestive system is one of the essential systems in human physiology where the stomach has a significant part to play with its accessories like the esophagus, duodenum, small intestines, and large intestinal tract. Many individuals across the globe suffer from gastric dysrhythmia in combination with dyspepsia (improper digestion), unexplained nausea (feeling), vomiting, abdominal discomfort, ulcer of the stomach, and gastroesophageal reflux illnesses. Some of the techniques used to identify anomalies include clinical analysis, endoscopy, electrogastrogram, and imaging. Electrogastrogram is the registration of electrical impulses that pass through the stomach muscles and regulate the contraction of the muscle. The electrode senses the electrical impulses from the stomach muscles, and the electrogastrogram is recorded. A computer analyzes the captured electrogastrogram (EGG) signals. The usual electric rhythm produces an enhanced current in the typical stomach muscle after a meal. Postmeal electrical rhythm is abnormal in those with stomach muscles or nerve anomalies. This study considers EGG of ordinary individuals, bradycardia, dyspepsia, nausea, tachycardia, ulcer, and vomiting for analysis. Data are collected in collaboration with the doctor for preprandial and postprandial conditions for people with diseases and everyday individuals. In CWT with a genetic algorithm, db4 is utilized to obtain an EGG signal wave pattern in a 3D plot using MATLAB. The figure shows that the existence of the peak reflects the EGG signal cycle. The number of present peaks categorizes EGG. Adaptive Resonance Classifier Network (ARCN) is utilized to identify EGG signals as normal or abnormal subjects, depending on the parameter of alertness (μ). This study may be used as a medical tool to diagnose digestive system problems before proposing invasive treatments. Accuracy of the proposed work comes up with 95.45%, and sensitivity and specificity range is added as 92.45% and 87.12%.
Collapse
|
10
|
Li L, Abd El-Latif AA, Jafari S, Rajagopal K, Nazarimehr F, Abd-El-Atty B. Multimedia Cryptosystem for IoT Applications Based on a Novel Chaotic System around a Predefined Manifold. SENSORS (BASEL, SWITZERLAND) 2022; 22:334. [PMID: 35009876 PMCID: PMC8749863 DOI: 10.3390/s22010334] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/23/2021] [Revised: 12/21/2021] [Accepted: 12/28/2021] [Indexed: 06/14/2023]
Abstract
Multimedia data play an important role in our daily lives. The evolution of internet technologies means that multimedia data can easily participate amongst various users for specific purposes, in which multimedia data confidentiality and integrity have serious security issues. Chaos models play an important role in designing robust multimedia data cryptosystems. In this paper, a novel chaotic oscillator is presented. The oscillator has a particular property in which the chaotic dynamics are around pre-located manifolds. Various dynamics of the oscillator are studied. After analyzing the complex dynamics of the oscillator, it is applied to designing a new image cryptosystem, in which the results of the presented cryptosystem are tested from various viewpoints such as randomness, time encryption, correlation, plain image sensitivity, key-space, key sensitivity, histogram, entropy, resistance to classical types of attacks, and data loss analyses. The goal of the paper is proposing an applicable encryption method based on a novel chaotic oscillator with an attractor around a pre-located manifold. All the investigations confirm the reliability of using the presented cryptosystem for various IoT applications from image capture to use it.
Collapse
Affiliation(s)
- Li Li
- Shenzhen Institute of Information Technology, Shenzhen 518172, China;
| | - Ahmed A. Abd El-Latif
- Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom 32511, Egypt
| | - Sajad Jafari
- Department of Biomedical Engineering, Amirkabir University of Technology, 424 Hafez Ave., Tehran 15875-4413, Iran; (S.J.); (F.N.)
- Health Technology Research Institute, Amirkabir University of Technology, No. 350, Hafez Ave., Valiasr Square, Tehran 159163-4311, Iran
| | - Karthikeyan Rajagopal
- Center for Nonlinear Systems, Chennai Institute of Technology, Chennai 600069, India;
| | - Fahimeh Nazarimehr
- Department of Biomedical Engineering, Amirkabir University of Technology, 424 Hafez Ave., Tehran 15875-4413, Iran; (S.J.); (F.N.)
| | - Bassem Abd-El-Atty
- Department of Computer Science, Faculty of Computers and Information, Luxor University, Luxor 85957, Egypt;
| |
Collapse
|
11
|
Abounassar EM, El-Kafrawy P, Abd El-Latif AA. Security and Interoperability Issues with Internet of Things (IoT) in Healthcare Industry: A Survey. STUDIES IN BIG DATA 2022:159-189. [DOI: 10.1007/978-3-030-85428-7_7] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]
|
12
|
Artificial Intelligence in Medicine Using Quantum Computing in the Future of Healthcare. Artif Intell Med 2022. [DOI: 10.1007/978-3-030-64573-1_338] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
|
13
|
An Oscillator without Linear Terms: Infinite Equilibria, Chaos, Realization, and Application. MATHEMATICS 2021. [DOI: 10.3390/math9243315] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
Oscillations and oscillators appear in various fields and find applications in numerous areas. We present an oscillator with infinite equilibria in this work. The oscillator includes only nonlinear elements (quadratic, absolute, and cubic ones). It is different from common oscillators, in which there are linear elements. Special features of the oscillator are suitable for secure applications. The oscillator’s dynamics have been discovered via simulations and an electronic circuit. Chaotic attractors, bifurcation diagrams, Lyapunov exponents, and the boosting feature are presented while measurements of the implemented oscillator are reported by using an oscilloscope. We introduce a random number generator using such an oscillator, which is applied in biomedical image encryption. Moreover, the security and performance analysis are considered to confirm the correctness of encryption and decryption processes.
Collapse
|
14
|
An IoMT-Enabled Smart Healthcare Model to Monitor Elderly People Using Machine Learning Technique. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2021; 2021:2487759. [PMID: 34868288 PMCID: PMC8639263 DOI: 10.1155/2021/2487759] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/27/2021] [Revised: 11/03/2021] [Accepted: 11/12/2021] [Indexed: 12/02/2022]
Abstract
The Internet of Medical Things (IoMT) enables digital devices to gather, infer, and broadcast health data via the cloud platform. The phenomenal growth of the IoMT is fueled by many factors, including the widespread and growing availability of wearables and the ever-decreasing cost of sensor-based technology. The cost of related healthcare will rise as the global population of elderly people grows in parallel with an overall life expectancy that demands affordable healthcare services, solutions, and developments. IoMT may bring revolution in the medical sciences in terms of the quality of healthcare of elderly people while entangled with machine learning (ML) algorithms. The effectiveness of the smart healthcare (SHC) model to monitor elderly people was observed by performing tests on IoMT datasets. For evaluation, the precision, recall, fscore, accuracy, and ROC values are computed. The authors also compare the results of the SHC model with different conventional popular ML techniques, e.g., support vector machine (SVM), K-nearest neighbor (KNN), and decision tree (DT), to analyze the effectiveness of the result.
Collapse
|
15
|
El-Latif AAA, Iliyasu AM, Abd-El-Atty B. An Efficient Visually Meaningful Quantum Walks-Based Encryption Scheme for Secure Data Transmission on IoT and Smart Applications. MATHEMATICS 2021; 9:3131. [DOI: 10.3390/math9233131] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
Abstract
Smart systems and technologies have become integral parts of modern society. Their ubiquity makes it paramount to prioritise securing the privacy of data transferred between smart devices. Visual encryption is a technique employed to obscure images by rendering them meaningless to evade attention during transmission. However, the astounding computing power ascribed to quantum technology implies that even the best visually encrypted systems can be effortlessly violated. Consequently, the physical realisation quantum hardware portends great danger for visually encrypted date on smart systems. To circumvent this, our study proposes the integration of quantum walks (QWs) as a cryptographic mechanism to forestall violation of the integrity of images on smart systems. Specifically, we use QW first to substitute the original image and to subsequently permutate and embed it onto the reference image. Based on this structure, our proposed quantum walks visually meaningful cryptosystem facilities confidential transmission of visual information. Simulation-based experiments validate the performance of the proposed system in terms of visual quality, efficiency, robustness, and key space sensitivity, and by that, its potential to safeguard smart systems now and as we transition to the quantum era.
Collapse
|
16
|
A New Secure Model for Data Protection over Cloud Computing. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2021; 2021:8113253. [PMID: 35646109 PMCID: PMC9135553 DOI: 10.1155/2021/8113253] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/01/2021] [Accepted: 09/27/2021] [Indexed: 11/17/2022]
Abstract
The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.
Collapse
|
17
|
Double layer security using crypto-stego techniques: a comprehensive review. HEALTH AND TECHNOLOGY 2021; 12:9-31. [PMID: 34660167 PMCID: PMC8512592 DOI: 10.1007/s12553-021-00602-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/03/2021] [Accepted: 09/20/2021] [Indexed: 11/29/2022]
Abstract
Recent advancement in the digital technology and internet has facilitated usage of multimedia objects for data communication. However, interchanging information through the internet raises several security concerns and needs to be addressed. Image steganography has gained huge attention from researchers for data security. Image steganography secures the data by imperceptibly embedding data bits into image pixels with a lesser probability of detection. Additionally, the encryption of data before embedding provides double-layer protection from the potential eavesdropper. Several steganography and cryptographic approaches have been developed so far to ensure data safety during transmission over a network. The purpose of this work is to succinctly review recent progress in the area of information security utilizing combination of cryptography and steganography (crypto-stego) methods for ensuring double layer security for covert communication. The paper highlights the pros and cons of the existing image steganography techniques and crypto-stego methods. Further, a detailed description of commonly using evaluations parameters for both steganography and cryptography, are given in this paper. Overall, this work is an attempt to create a better understanding of image steganography and its coupling with the encryption methods for developing state of art double layer security crypto-stego systems.
Collapse
|
18
|
Gupta BB, Prajapati V, Nedjah N, Vijayakumar P, El-Latif AAA, Chang X. Machine learning and smart card based two-factor authentication scheme for preserving anonymity in telecare medical information system (TMIS). Neural Comput Appl 2021. [DOI: 10.1007/s00521-021-06152-x] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
19
|
An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps. Soft comput 2021. [DOI: 10.1007/s00500-021-05781-7] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
|
20
|
Alanezi A, Abd-El-Atty B, Kolivand H, Abd El-Latif AA. Quantum based encryption approach for secure images. 2021 1ST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND DATA ANALYTICS (CAIDA) 2021. [DOI: 10.1109/caida51941.2021.9425127] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
|
21
|
Abd-El-Atty B, Iliyasu AM, Alanezi A, Abd El-latif AA. Optical image encryption based on quantum walks. OPTICS AND LASERS IN ENGINEERING 2021; 138:106403. [DOI: 10.1016/j.optlaseng.2020.106403] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
|
22
|
Alanezi A, Abd-El-Atty B, Kolivand H, Abd El-Latif AA, Abd El-Rahiem B, Sankar S, S. Khalifa H. Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment. SECURITY AND COMMUNICATION NETWORKS 2021; 2021:1-17. [DOI: 10.1155/2021/6615512] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
Abstract
Data security plays a significant role in data transfer in cloud-based smart cities. Chaotic maps are commonly used in designing modern cryptographic applications, in which one-dimensional (1D) chaotic systems are widely used due to their simple design and low computational complexity. However, 1D chaotic maps suffer from different kinds of attacks because of their chaotic discontinuous ranges and small key-space. To own the benefits of 1D chaotic maps and avoid their drawbacks, the cascading of two integrated 1D chaotic systems has been utilized. In this paper, we report an image cryptosystem for data transfer in cloud-based smart cities using the cascading of Logistic-Chebyshev and Logistic-Sine maps. Logistic-Sine map has been utilized to permute the plain image, and Logistic-Chebyshev map has been used to substitute the permuted image, while the cascading of both integrated maps has been utilized in performing XOR procedure on the substituted image. The security analyses of the suggested approach prove that the encryption mechanism has good efficiency as well as lower encryption time compared with other related algorithms.
Collapse
Affiliation(s)
- Ahmad Alanezi
- Department of Computer Science, Faculty of Engineering and Technology, Liverpool John Moores University (LJMU), Liverpool L3 3AF, UK
| | - Bassem Abd-El-Atty
- Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Al Minufiyah 32511, Egypt
- Center of Excellence in Cybersecurity, Quantum Information Processing, and Artificial Intelligence, Menoufia University, Al Minufiyah 32511, Egypt
| | - Hoshang Kolivand
- Department of Computer Science, Faculty of Engineering and Technology, Liverpool John Moores University (LJMU), Liverpool L3 3AF, UK
| | - Ahmed A. Abd El-Latif
- Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Al Minufiyah 32511, Egypt
- Center of Excellence in Cybersecurity, Quantum Information Processing, and Artificial Intelligence, Menoufia University, Al Minufiyah 32511, Egypt
| | - Basma Abd El-Rahiem
- Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Al Minufiyah 32511, Egypt
- Center of Excellence in Cybersecurity, Quantum Information Processing, and Artificial Intelligence, Menoufia University, Al Minufiyah 32511, Egypt
| | - Syam Sankar
- Department of Computer Science and Engineering, NSS College of Engineering, Palakkad, Kerala, India
| | - Hany S. Khalifa
- Computer Science Department, Misr Higher Institute of Commerce and Computers, Mansoura, Egypt
| |
Collapse
|
23
|
Kordov K, Zhelezov S. Steganography in color images with random order of pixel selection and encrypted text message embedding. PeerJ Comput Sci 2021; 7:e380. [PMID: 33817027 PMCID: PMC7924441 DOI: 10.7717/peerj-cs.380] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/14/2020] [Accepted: 01/10/2021] [Indexed: 06/12/2023]
Abstract
Information security is major concern in modern digital ages, and the outdated algorithms need to be replaced with new ones or to be improved. In this article a new approach for hiding secret text message in color images is presented, combining steganography and cryptography. The location and the order of the image pixels chosen for information embedding are randomly selected using chaotic pseudo-random generator. Encrypting the secret message before embedding is another level of security designed to misguide the attackers in case of analyzing for traces of steganography. Evaluating the proposed stegoalgorithm. The standard statistical and empirical tests are used for randomness tests, key-space analysis, key-sensitivity analysis, visual analysis, histogram analysis, peak signal-to-noise ratio analysis, chi-square analysis, etc. The obtained results are presented and explained in the present article.
Collapse
Affiliation(s)
- Krasimir Kordov
- Department of Computer Informatics, Faculty of Mathematics and Computer Science, Konstantin Preslavski University of Shumen, Shumen, Shumen, Bulgaria
| | - Stanimir Zhelezov
- Department of Computer Systems and Technologies, Faculty of Mathematics and Computer Science, Konstantin Preslavsky University of Shumen, Shumen, Shumen, Bulgaria
| |
Collapse
|
24
|
Vaidyanathan S, Sambas A, Abd-El-Atty B, El-Latif AAA, Tlelo-Cuautle E, Guillen-Fernandez O, Mamat M, Mohamed MA, Alcin M, Tuna M, Pehlivan I, Koyuncu I, Ibrahim MAH. A 5-D Multi-Stable Hyperchaotic Two-Disk Dynamo System With No Equilibrium Point: Circuit Design, FPGA Realization and Applications to TRNGs and Image Encryption. IEEE ACCESS 2021; 9:81352-81369. [DOI: 10.1109/access.2021.3085483] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]
|
25
|
Davids J, Lidströmer N, Ashrafian H. Artificial Intelligence in Medicine Using Quantum Computing in the Future of Healthcare. Artif Intell Med 2021. [DOI: 10.1007/978-3-030-58080-3_338-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
|
26
|
Vaidyanathan S, Sambas A, Tlelo-Cuautle E, El-Latif AAA, Abd-El-Atty B, Guillen-Fernandez O, Benkouider K, Mohamed MA, Mamat M, Ibrahim MAH. A New 4-D Multi-Stable Hyperchaotic System With No Balance Point: Bifurcation Analysis, Circuit Simulation, FPGA Realization and Image Cryptosystem. IEEE ACCESS 2021; 9:144555-144573. [DOI: 10.1109/access.2021.3121428] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
|
27
|
Tsafack N, Sankar S, Abd-El-Atty B, Kengne J, C. JK, Belazi A, Mehmood I, Bashir AK, Song OY, El-Latif AAA. A New Chaotic Map With Dynamic Analysis and Encryption Application in Internet of Health Things. IEEE ACCESS 2020; 8:137731-137744. [DOI: 10.1109/access.2020.3010794] [Citation(s) in RCA: 29] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
|