Medical Imaging Data Security using Modified Honey Encryption Algorithm with Ant-Lion Optimization Technique
DOI:
https://doi.org/10.61841/5v7nqg85Keywords:
Medical Imaging data,, Modified Honey Encryption Algorithm,, Ant-Lion OptimizationAbstract
Security is the one of the significant thing for transmitting the restorative information. Since it contains some extra data of patients. Medical Imaging Data Security is a Necessary system for secure or safeguards the sensitive information and their related patient data and the information are put away and transmitted over the open system. Numerous cryptographic calculations are accessible, and they fall under symmetric, asymmetric and other procedures. To choose an algorithm for secure information correspondence, the algorithm should to give higher Privacy, security and better effectiveness. Here in medical imaging data, modified honey encryption uses DTE (Distribution Transforming Encoder). DTE encodes or decodes the message space using the Specified function and is used to scramble the restorative medical data. After that the Ant-Lion optimization is used to overhaul the keys. The presentation of the proposed methodology is assessed utilizing different parameters such as Entropy, Peak Signal to Noise ratio (PSNR), Correlation Coefficient (CC) and Mean Square error (MSE)
Downloads
References
1. T. Avudaiappan , R. Balasubramanian , S. Sundara Pandiyan, M. Saravanan,S. K. Lakshmanaprabu ,K. Shankar.,Medical Image Security Using Dual Encryption with Oppositional Based Optimization Algorithm Journal of Medical Systems (2018) 42:208 ,2018
2. Annaby, M. H., Rushdi, M. A., and Nehary,E.A.,Color image encryption using random transforms, phase retrieval, chaotic maps, and diffusion. Opt. Lasers Eng. 103:9–23, 2018.
3. k.shankar , mohamed elhoseny, e. dhiravida chelvi,s. k. lakshmanaprabu,wanqing wu.,An Efficient Optimal Key Based Chaos Function for Medical Image Security. Digital Object Identifier, vol.6,pp 77145-77154,2018
4. S. Guhan ,S. Arumugham ,S. Janakiraman A. Rengarajan S. Rajagopalan., A Trio Approach Satisfying CIA Triad for Medical Image Security.2018
5. Abdulaziz shehab,mohamed elhoseny, khan muhammad,arun kumar sangaiah, po yang, haojun huang, and guolin hou., Secure and Robust Fragile Watermarking Scheme for Medical Images.Digital Object Identifier, 2018.
6. Zhongyun Hua,Shuang Yib,Yicong Zhou.,Medical image encryption using high-speed scrambling and pixel adaptive diffusion.2017
7. Padmapriya,Praveenkumar,N.KerthanaDevi ,Dhivya Ravichandran, J.Avila1, K. Thenmozhi, John Bosco Balaguru Rayappan1,Rengarajan,Amirtharajan.,Transreceiving of encrypted medical image – a cognitive approach.,2018
8. Ahmed, a. abd el-latif, Bassem abd-el-atty, muhammad talh., Robust Encryption of Quantum Medical Images.,2017
9. Ahmed a. abd el-latif, bassem abd-el-atty, m. shamim hossain md. abdur rahman atif alamri, b. b.gupta.,Efficient Quantum Information Hiding for Remote Medical Image Sharing,2018
10. 1Shankar K, Lakshmanaprabu S.K.,Optimal key based homomorphic encryption for color image Security aid of ant lion optimization algorithm, International Journal of Engineering & Technology, 7 (1.9) (2018) 22-27
11. Thakur,A. K. Singh,S.P.Ghrera,A.Mohan.,Chaotic based secure watermarking approach for medical images,Multimedia Tools and Applications, 2018.
12. Amiya Halder,AvranilMaity,Apurba Sarkar and Ananya Das.,A Dynamic Spatial Fuzzy C-Means Clustering-Based Medical Image Segmentation,2019
13. Samar M. Ismail, Lobna A. Saidb, Ahmed G,Radwan,Ahmed H,Madianb,Mohamed,F.Abu-Elyazeede. Generalized Double-Humped Logistic Map-based Medical Image Encryption,2018.
14. Lisha Ma1, Lei Chen,Shihong Wang., Security analysis of a reversible watermarking algorithm for encrypted images in wavelet domain, Multimedia Tools and Applications ,2018
15. Med Karim Abdmouleha, Ali Khalfallaha, Med Salim Bouhlela. A Novel Selective Encryption Scheme for Medical Images Transmission based-on JPEG Compression Algorithm, Procedia Computer Science 112 (2017) 369–376,2017
16. K. Shankar P. Eswaran.,RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique, Journal of Circuits, Systems, and Computer, 2016
17. Shankar K, Eswaran P.,Sharing a Secret Image with Encapsulated Shares in Visual Cryptography, Procedia Computer Science 70 (2015) 462 – 468, 2015
18. A.Kanso, M. Ghebleh. An efficient and robust image encryption scheme for medical Applications, Communication Nonlinear Sci Numeric Simulator 24 (2015) 98–116.
19. Maryam Jaberi, George Bebis, Muhammad Hussai, Ghulam Muhammad., Accurate and robust localization of duplicated region in copy–move image forgery, 2013
20. Shankar K, Lakshmana Prabu S. K, Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm, International Journal of Engineering & Technology, 2018.
21. Sharma, A., & Rai, A. (2019). Improved attribute based encryption scheme in cloud to representative authorization framework for EHR services. International Journal of Control and Automation, 12(6), 1-8. doi:10.33832/ijca.2019.12.6.01
22. Bhardwaj, A., Som, S., & Muttoo, S. K. (2019). Sponge function based authentication encryption technique (SAFE) using robust initialization vector and ChaCha stream cipher. International Journal of Advanced Science and Technology, 28(20), 568-579. Retrieved from www.scopus.com
23. Ernest Ravindran, R. S., Priyadarshini, K. M., Sai, A. T., Shiny, P., & Sabeena, S. (2019). Design of finite field multiplier for efficient data encryption. International Journal of Advanced Science and Technology, 28(20), 42-52. Retrieved from www.scopus.com
24. Jaswanth Kumar Reddy, R., Rene Beulah, J., & Nalini, M. (2020). Applying attribute - based encryption to eliminate duplicate copies of identical data in cloud. Test Engineering and Management, 82, 10579- 10584. Retrieved from www.scopus.com
25. Ibraheem, I. N., Hassan, S. M., & Abead, S. A. (2020). Comparative analysis & implementation of image encryption & decryption for mobile cloud security. International Journal of Advanced Science and Technology, 29(3 Special Issue), 109-121. Retrieved from www.scopus.com
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.