Improvement of medical data security using SABES optimization algorithm

被引:3
|
作者
Sharma, Suvita Rani [1 ]
Singh, Birmohan [1 ]
Kaur, Manpreet [2 ]
机构
[1] St Longowal Inst Engn & Technol, Dept Comp Sci & Engn, Longowal 148106, Punjab, India
[2] St Longowal Inst Engn & Technol, Dept Elect & Instrumentat Engn, Longowal 148106, Punjab, India
来源
JOURNAL OF SUPERCOMPUTING | 2024年 / 80卷 / 09期
关键词
Chaotic system; Medical data; Metaheuristic optimization algorithm; Parameter optimization; ENCRYPTION SCHEME; IMAGE; MAP;
D O I
10.1007/s11227-024-05937-w
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a bit-level cryptographic model for encrypting medical signals, patient information, clinical data, and images of various modalities. The model has utilized chaotic maps due to properties like non-periodicity, nonlinearity, ergodicity, deterministic, unpredictable, and sensitive to the initial conditions. Three chaotic maps are employed in a chained sequence at different levels of the model to elevate the randomness and provide uniform key distribution with larger key space. Also, the self-adaptive bald eagle search optimization algorithm has been employed to enhance the properties of chaotic maps by optimizing the initialization and control parameters. The cyclic redundancy check approach is involved to detect any change in the data during the transmission at the receiver side along with circular shift to make encrypted data resilient of differential attack. Therefore, the encryption model boosts the unpredictability, security, and protection against a wide range of threats. The encryption model performance efficiency is demonstrated using different types of security analysis to show resistance against statistical, entropy, differential, cropping, and brute-force attacks.
引用
收藏
页码:12929 / 12965
页数:37
相关论文
共 50 条
  • [21] Enhanced Cloud Data Security Using AES Algorithm
    Akhil, K. M.
    Kumar, Praveen M.
    Pushpa, B. R.
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [22] Cloud Data Security using Balanced Genetic Algorithm
    Prasad, Rajeev Ranjan
    Kumari, Ankita
    2023 9TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENERGY SYSTEMS, ICEES, 2023, : 132 - 137
  • [23] Security Analysis and Improvement on an Image Encryption Algorithm Using Chebyshev Generator
    Wu, Tsu-Yang
    Fan, Xiaoning
    Wang, King-Hang
    Pan, Jeng-Shyang
    Chen, Chien-Ming
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (01): : 13 - 23
  • [24] Power system security improvement using an OPA model and IPSO algorithm
    Hasanvand, Saeed
    Fallahzadeh-Abarghouei, Hossein
    Mahboubi-Moghaddam, Esmaeil
    SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL, 2020, 96 (03): : 325 - 335
  • [25] Data clustering using multivariant optimization algorithm
    Qin-Hu Zhang
    Bao-Lei Li
    Ya-Jie Liu
    Lian Gao
    Lan-Juan Liu
    Xin-Ling Shi
    International Journal of Machine Learning and Cybernetics, 2016, 7 : 773 - 782
  • [26] Data clustering using multivariant optimization algorithm
    Zhang, Qin-Hu
    Li, Bao-Lei
    Liu, Ya-Jie
    Gao, Lian
    Liu, Lan-Juan
    Shi, Xin-Ling
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2016, 7 (05) : 773 - 782
  • [27] Computer network security and information security technology optimization by using Bayesian classification algorithm
    Fu, Rui
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023,
  • [28] An improvement in fruit fly optimization algorithm by using sign parameters
    Babalik, Ahmet
    Iscan, Hazim
    Babaoglu, Ismail
    Gunduz, Mesut
    SOFT COMPUTING, 2018, 22 (22) : 7587 - 7603
  • [29] An improvement in fruit fly optimization algorithm by using sign parameters
    Ahmet Babalık
    Hazim İşcan
    İsmail Babaoğlu
    Mesut Gündüz
    Soft Computing, 2018, 22 : 7587 - 7603
  • [30] QoS Improvement in MANET Using Particle Swarm Optimization Algorithm
    Trivedi, Munesh Chandra
    Sharma, Anupam Kumar
    PROCEEDINGS OF THE INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, ICICT 2015, VOL 2, 2016, 439 : 181 - 189