Intelligent Deep Detection Method for Malicious Tampering of Cancer Imagery

被引:3
|
作者
Alheeti, Khattab M. Ali [1 ]
Alzahrani, Abdulkareem [2 ]
Khoshnaw, Najmaddin [3 ]
Al-Dosary, Duaa [4 ]
机构
[1] Univ Anbar, Coll Comp & Informat Technol, Comp Networking Syst Dept, Ramadi, Iraq
[2] Al Baha Univ, Fac Comp Sci & Informat Technol, Comp Engn & Sci Dept, Al Baha, Saudi Arabia
[3] Komar Univ Sci & technol, Hiwa Canc Hosp, Dept heamtol hiwa & MLS Komar, Sulaymaniyah, Iraq
[4] Univ Anbar, Coll Comp Sci & Informat Technol, Ramadi, Iraq
来源
2022 7TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND MACHINE LEARNING APPLICATIONS (CDMA 2022) | 2022年
关键词
deepfake; medical image tampering; machine learning; DNN; detection accuracy; false alarms; FORGERY DETECTION; MEDICAL IMAGES; WATERMARKING;
D O I
10.1109/CDMA54072.2022.00010
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, deep generative networks have reinforced the need for caution while consuming different formats of digital information. One method of deepfake generation involves the insertion and removal of tumors from medical scans. Significant drains on hospital resources or even loss of life are the consequences of failure to detect medical deepfakes. This research attempts to evaluate machine learning algorithms and pre-trained deep neural networks' (DNN) ability to distinguish tampered data and authentic data. Moreover, this research aims to classify cancer scans based on DNN. The experimental results show that the proposed method based on using DNN can enhance performance detection. Furthermore, the proposed system increased the detection accuracy rate and reduced the number of false alarms.
引用
收藏
页码:25 / 28
页数:4
相关论文
共 50 条
  • [1] CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
    Mirsky, Yisroel
    Mahler, Tom
    Shelef, Ilan
    Elovici, Yuval
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 461 - 478
  • [2] Intelligent detection method on network malicious traffic based on sample enhancement
    Chen T.
    Jin C.
    Lyu M.
    Zhu T.
    2020, Editorial Board of Journal on Communications (41): : 128 - 138
  • [3] A Hybrid Malicious Code Detection Method based on Deep Learning
    Li, Yuancheng
    Ma, Rong
    Jiao, Runhai
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (05): : 205 - 215
  • [4] Deep Learning Based Detection Method for SDN Malicious Applications
    Chi Yaping
    Yu Yuzhou
    Yang Jianxi
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, CSPS 2018, VOL III: SYSTEMS, 2020, 517 : 96 - 104
  • [5] An Intelligent Detection of Malicious Intrusions in IoT Based on Machine Learning and Deep Learning Techniques
    Iftikhar, Saman
    Khan, Danish
    Al-Madani, Daniah
    Alheeti, Khattab M. Ali
    Fatima, Kiran
    COMPUTER SCIENCE JOURNAL OF MOLDOVA, 2022, 30 (03) : 288 - 307
  • [6] Research on malicious domain name detection method based on deep learning
    Ren, Fei
    Jiao, Di
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 81 - 85
  • [7] Intelligent Malicious URL Detection with Feature Analysis
    Chen, Yu-Chen
    Ma, Yi-Wei
    Chen, Jiann-Liang
    2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2020, : 1142 - 1146
  • [8] Deep Learning for Malicious Flow Detection
    Chen, Yun-Chun
    Li, Yu-Jhe
    Tseng, Aragorn
    Lin, Tsungnan
    2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [9] Intelligent Detection Method for Wildlife Based on Deep Learning
    Li, Shuang
    Zhang, Haiyan
    Xu, Fu
    SENSORS, 2023, 23 (24)
  • [10] Image mosaic tampering detection based on deep learning
    Bian L.
    Luo X.
    Li S.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2020, 46 (05): : 1039 - 1044