Medical Imaging Data Security using Modified Honey Encryption Algorithm with Ant-Lion Optimization Technique

Authors

  • G. Jayahari Prabhu Kalasalingam Academy of Research and Education, Krishnankoil, India Author

DOI:

https://doi.org/10.61841/5v7nqg85

Keywords:

Medical Imaging data,, Modified Honey Encryption Algorithm,, Ant-Lion Optimization

Abstract

Security is the one of the significant thing for transmitting the restorative information. Since it contains some extra data of patients. Medical Imaging Data Security is a Necessary system for secure or safeguards the sensitive information and their related patient data and the information are put away and transmitted over the open system. Numerous cryptographic calculations are accessible, and they fall under symmetric, asymmetric and other procedures. To choose an algorithm for secure information correspondence, the algorithm should to give higher Privacy, security and better effectiveness. Here in medical imaging data, modified honey encryption uses DTE (Distribution Transforming Encoder). DTE encodes or decodes the message space using the Specified function and is used to scramble the restorative medical data. After that the Ant-Lion optimization is used to overhaul the keys. The presentation of the proposed methodology is assessed utilizing different parameters such as Entropy, Peak Signal to Noise ratio (PSNR), Correlation Coefficient (CC) and Mean Square error (MSE)

 

Downloads

Download data is not yet available.

References

1. T. Avudaiappan , R. Balasubramanian , S. Sundara Pandiyan, M. Saravanan,S. K. Lakshmanaprabu ,K. Shankar.,Medical Image Security Using Dual Encryption with Oppositional Based Optimization Algorithm Journal of Medical Systems (2018) 42:208 ,2018

2. Annaby, M. H., Rushdi, M. A., and Nehary,E.A.,Color image encryption using random transforms, phase retrieval, chaotic maps, and diffusion. Opt. Lasers Eng. 103:9–23, 2018.

3. k.shankar , mohamed elhoseny, e. dhiravida chelvi,s. k. lakshmanaprabu,wanqing wu.,An Efficient Optimal Key Based Chaos Function for Medical Image Security. Digital Object Identifier, vol.6,pp 77145-77154,2018

4. S. Guhan ,S. Arumugham ,S. Janakiraman A. Rengarajan S. Rajagopalan., A Trio Approach Satisfying CIA Triad for Medical Image Security.2018

5. Abdulaziz shehab,mohamed elhoseny, khan muhammad,arun kumar sangaiah, po yang, haojun huang, and guolin hou., Secure and Robust Fragile Watermarking Scheme for Medical Images.Digital Object Identifier, 2018.

6. Zhongyun Hua,Shuang Yib,Yicong Zhou.,Medical image encryption using high-speed scrambling and pixel adaptive diffusion.2017

7. Padmapriya,Praveenkumar,N.KerthanaDevi ,Dhivya Ravichandran, J.Avila1, K. Thenmozhi, John Bosco Balaguru Rayappan1,Rengarajan,Amirtharajan.,Transreceiving of encrypted medical image – a cognitive approach.,2018

8. Ahmed, a. abd el-latif, Bassem abd-el-atty, muhammad talh., Robust Encryption of Quantum Medical Images.,2017

9. Ahmed a. abd el-latif, bassem abd-el-atty, m. shamim hossain md. abdur rahman atif alamri, b. b.gupta.,Efficient Quantum Information Hiding for Remote Medical Image Sharing,2018

10. 1Shankar K, Lakshmanaprabu S.K.,Optimal key based homomorphic encryption for color image Security aid of ant lion optimization algorithm, International Journal of Engineering & Technology, 7 (1.9) (2018) 22-27

11. Thakur,A. K. Singh,S.P.Ghrera,A.Mohan.,Chaotic based secure watermarking approach for medical images,Multimedia Tools and Applications, 2018.

12. Amiya Halder,AvranilMaity,Apurba Sarkar and Ananya Das.,A Dynamic Spatial Fuzzy C-Means Clustering-Based Medical Image Segmentation,2019

13. Samar M. Ismail, Lobna A. Saidb, Ahmed G,Radwan,Ahmed H,Madianb,Mohamed,F.Abu-Elyazeede. Generalized Double-Humped Logistic Map-based Medical Image Encryption,2018.

14. Lisha Ma1, Lei Chen,Shihong Wang., Security analysis of a reversible watermarking algorithm for encrypted images in wavelet domain, Multimedia Tools and Applications ,2018

15. Med Karim Abdmouleha, Ali Khalfallaha, Med Salim Bouhlela. A Novel Selective Encryption Scheme for Medical Images Transmission based-on JPEG Compression Algorithm, Procedia Computer Science 112 (2017) 369–376,2017

16. K. Shankar P. Eswaran.,RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique, Journal of Circuits, Systems, and Computer, 2016

17. Shankar K, Eswaran P.,Sharing a Secret Image with Encapsulated Shares in Visual Cryptography, Procedia Computer Science 70 (2015) 462 – 468, 2015

18. A.Kanso, M. Ghebleh. An efficient and robust image encryption scheme for medical Applications, Communication Nonlinear Sci Numeric Simulator 24 (2015) 98–116.

19. Maryam Jaberi, George Bebis, Muhammad Hussai, Ghulam Muhammad., Accurate and robust localization of duplicated region in copy–move image forgery, 2013

20. Shankar K, Lakshmana Prabu S. K, Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm, International Journal of Engineering & Technology, 2018.

21. Sharma, A., & Rai, A. (2019). Improved attribute based encryption scheme in cloud to representative authorization framework for EHR services. International Journal of Control and Automation, 12(6), 1-8. doi:10.33832/ijca.2019.12.6.01

22. Bhardwaj, A., Som, S., & Muttoo, S. K. (2019). Sponge function based authentication encryption technique (SAFE) using robust initialization vector and ChaCha stream cipher. International Journal of Advanced Science and Technology, 28(20), 568-579. Retrieved from www.scopus.com

23. Ernest Ravindran, R. S., Priyadarshini, K. M., Sai, A. T., Shiny, P., & Sabeena, S. (2019). Design of finite field multiplier for efficient data encryption. International Journal of Advanced Science and Technology, 28(20), 42-52. Retrieved from www.scopus.com

24. Jaswanth Kumar Reddy, R., Rene Beulah, J., & Nalini, M. (2020). Applying attribute - based encryption to eliminate duplicate copies of identical data in cloud. Test Engineering and Management, 82, 10579- 10584. Retrieved from www.scopus.com

25. Ibraheem, I. N., Hassan, S. M., & Abead, S. A. (2020). Comparative analysis & implementation of image encryption & decryption for mobile cloud security. International Journal of Advanced Science and Technology, 29(3 Special Issue), 109-121. Retrieved from www.scopus.com

Downloads

Published

30.06.2020

How to Cite

Prabhu , G. J. (2020). Medical Imaging Data Security using Modified Honey Encryption Algorithm with Ant-Lion Optimization Technique. International Journal of Psychosocial Rehabilitation, 24(6), 8443-8456. https://doi.org/10.61841/5v7nqg85