Intelligent Deep Detection Method for Malicious Tampering of Cancer Imagery

被引:3
|
作者
Alheeti, Khattab M. Ali [1 ]
Alzahrani, Abdulkareem [2 ]
Khoshnaw, Najmaddin [3 ]
Al-Dosary, Duaa [4 ]
机构
[1] Univ Anbar, Coll Comp & Informat Technol, Comp Networking Syst Dept, Ramadi, Iraq
[2] Al Baha Univ, Fac Comp Sci & Informat Technol, Comp Engn & Sci Dept, Al Baha, Saudi Arabia
[3] Komar Univ Sci & technol, Hiwa Canc Hosp, Dept heamtol hiwa & MLS Komar, Sulaymaniyah, Iraq
[4] Univ Anbar, Coll Comp Sci & Informat Technol, Ramadi, Iraq
来源
2022 7TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND MACHINE LEARNING APPLICATIONS (CDMA 2022) | 2022年
关键词
deepfake; medical image tampering; machine learning; DNN; detection accuracy; false alarms; FORGERY DETECTION; MEDICAL IMAGES; WATERMARKING;
D O I
10.1109/CDMA54072.2022.00010
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, deep generative networks have reinforced the need for caution while consuming different formats of digital information. One method of deepfake generation involves the insertion and removal of tumors from medical scans. Significant drains on hospital resources or even loss of life are the consequences of failure to detect medical deepfakes. This research attempts to evaluate machine learning algorithms and pre-trained deep neural networks' (DNN) ability to distinguish tampered data and authentic data. Moreover, this research aims to classify cancer scans based on DNN. The experimental results show that the proposed method based on using DNN can enhance performance detection. Furthermore, the proposed system increased the detection accuracy rate and reduced the number of false alarms.
引用
收藏
页码:25 / 28
页数:4
相关论文
共 50 条
  • [31] Malicious Code Classification Method Based on Deep Forest
    Lu X.-D.
    Duan Z.-M.
    Qian Y.-K.
    Zhou W.
    Ruan Jian Xue Bao/Journal of Software, 2020, 31 (05): : 1454 - 1464
  • [32] Adaptive unknown input observer-based detection and identification method for intelligent transportation under malicious attack
    Cheng, PengFei
    Pan, Jinyan
    Zhang, Yi
    MEASUREMENT & CONTROL, 2023, 56 (7-8): : 1377 - 1386
  • [33] A Malicious URL Detection Method Based on CNN
    Chen, Yu
    Zhou, Yajian
    Dong, Qingqing
    Li, Qi
    2020 IEEE CONFERENCE ON TELECOMMUNICATIONS, OPTICS AND COMPUTER SCIENCE (TOCS), 2020, : 23 - 28
  • [34] Application of intelligent algorithms in library resource malicious download detection system
    Zhang, Xueqi
    INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS, 2024, 18 (03): : 2495 - 2509
  • [35] Malicious Node Identification Method Based on Intelligent Algorithm for Edge Computing
    Chen, Jie
    Xu, Ai-dong
    Wen, Hong
    Liu, Wen-jie
    Jiang, Yi-xin
    Li, Peng
    Li, Yu-shan
    2019 INTERNATIONAL CONFERENCE ON ENERGY, POWER, ENVIRONMENT AND COMPUTER APPLICATION (ICEPECA 2019), 2019, 334 : 363 - 367
  • [36] Androanalyzer: Android Malicious Software Detection Based on Deep Learning
    Arslan R.S.
    PeerJ Computer Science, 2021, 7 : 1 - 20
  • [37] A Malicious Domain Detection Model Based on Improved Deep Learning
    Huang, XiangDong
    Li, Hao
    Liu, Jiajia
    Liu, FengChun
    Wang, Jian
    Xie, BaoShan
    Chen, BaoPing
    Zhang, Qi
    Xue, Tao
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [38] Malicious code clone detection technology based on deep learning
    Shen Y.
    Yan H.
    Xia C.
    Han Z.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2022, 48 (02): : 282 - 290
  • [39] AndroAnalyzer: android malicious software detection based on deep learning
    Arslan, Recep Sinan
    PEERJ COMPUTER SCIENCE, 2021,
  • [40] Deep-Forest-Based Encrypted Malicious Traffic Detection
    Zhang, Xueqin
    Zhao, Min
    Wang, Jiyuan
    Li, Shuang
    Zhou, Yue
    Zhu, Shinan
    ELECTRONICS, 2022, 11 (07)