Cryptographic Encryption and Optimization for Internet of Things Based Medical Image Security

被引:3
|
作者
Selvaraj, Jeeva [1 ]
Lai, Wen-Cheng [2 ,3 ]
Kavin, Balasubramanian Prabhu [1 ]
Kavitha, C. [4 ]
Seng, Gan Hong [5 ]
机构
[1] SRM Inst Sci & Technol, Dept Data Sci & Business Syst, Kattankulathur Campus, Chennai 603203, Tamil Nadu, India
[2] Natl Yunlin Univ Sci & Technol, Bachelor Program Ind Projects, Touliu 640301, Taiwan
[3] Natl Yunlin Univ Sci & Technol, Dept Elect Engn, Touliu 640301, Taiwan
[4] Sathyabama Inst Sci & Technol, Dept Comp Sci & Engn, Chennai 600119, Tamil Nadu, India
[5] Xian Jiaotong Liverpool Univ, XJTLU Entrepreneur Coll Taicang, Sch AI & Adv Comp, Suzhou 215400, Peoples R China
关键词
Internet of Things; Rivest-Shamir-Adleman-based Arnold map; hostile orchestration; obstruction bloom breeding optimization; SCHEME;
D O I
10.3390/electronics12071636
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The expansion of the Internet of Things is expected to lead to the emergence of the Internet of Medical Things (IoMT), which will revolutionize the health-care industry (IoT). The Internet of Things (IoT) revolution is outpacing current human services thanks to its bright mechanical, economical, and social future. Security is essential because most patient information is housed on a cloud platform in the hospital. The security of medical images in the Internet of Things was investigated in this research using a new cryptographic model and optimization approaches. For the effective storage and safe transfer of patient data along with medical images, a separate framework is required. The key management and optimization will be chosen utilizing the Rivest-Shamir-Adleman-based Arnold map (RSA-AM), hostile orchestration (HO), and obstruction bloom breeding optimization (OBBO) to increase the encryption and decryption processes' level of security. The effectiveness of the suggested strategy is measured using peak signal-to-noise ratio (PSNR), entropy, mean square error (MSE), bit error rate (BER), structural similarity index (SSI), and correlation coefficient (CC). The investigation shows that the recommended approach provides greater security than other current systems.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Retraction Note: Hybrid optimization with cryptography encryption for medical image security in Internet of Things
    Mohamed Elhoseny
    K. Shankar
    S. K. Lakshmanaprabu
    Andino Maseleno
    N. Arunkumar
    Neural Computing and Applications, 2023, 35 : 3573 - 3573
  • [2] RETRACTED ARTICLE: Hybrid optimization with cryptography encryption for medical image security in Internet of Things
    Mohamed Elhoseny
    K. Shankar
    S. K. Lakshmanaprabu
    Andino Maseleno
    N. Arunkumar
    Neural Computing and Applications, 2020, 32 : 10979 - 10993
  • [3] Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications
    Hasan, Mohammad Kamrul
    Islam, Shayla
    Sulaiman, Rossilawati
    Khan, Sheroz
    Hashim, Aisha-Hassan Abdalla
    Habib, Shabana
    Islam, Mohammad
    Alyahya, Saleh
    Ahmed, Musse Mohamed
    Kamil, Samar
    Hassan, Md Arif
    IEEE ACCESS, 2021, 9 : 47731 - 47742
  • [4] Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications
    Hasan, Mohammad Kamrul
    Islam, Shayla
    Sulaiman, Rossilawati
    Khan, Sheroz
    Hashim, Aisha-Hassan Abdalla
    Habib, Shabana
    Islam, Mohammad
    Alyahya, Saleh
    Ahmed, Musse Mohamed
    Kamil, Samar
    Hassan, Md Arif
    IEEE Access, 2021, 9 : 47731 - 47742
  • [5] Security of internet of things based on cryptographic algorithm
    Mittal, Sonam
    Singh, Soni
    Balakumaran, D.
    Hemalatha, K.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (01) : 28 - 39
  • [6] Security of internet of things based on cryptographic algorithms: a survey
    Mousavi, Seyyed Keyvan
    Ghaffari, Ali
    Besharat, Sina
    Afshari, Hamed
    WIRELESS NETWORKS, 2021, 27 (02) : 1515 - 1555
  • [7] Security of internet of things based on cryptographic algorithms: a survey
    Seyyed Keyvan Mousavi
    Ali Ghaffari
    Sina Besharat
    Hamed Afshari
    Wireless Networks, 2021, 27 : 1515 - 1555
  • [8] Encryption and Hash based Security in Internet of Things
    Sundaram, B. Vinayaga
    Ramnath, M.
    Prasanth, M.
    Sundaram, Varsha J.
    2015 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2015,
  • [9] On the security of MQ cryptographic systems for constructing secure Internet of medical things
    Haibo Yi
    Zhe Nie
    Personal and Ubiquitous Computing, 2018, 22 : 1075 - 1081
  • [10] On the security of MQ cryptographic systems for constructing secure Internet of medical things
    Yi, Haibo
    Nie, Zhe
    PERSONAL AND UBIQUITOUS COMPUTING, 2018, 22 (5-6) : 1075 - 1081