A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems
References
[1]
Dang T.M., Nguyen T.D., Hoang T., Kim H., Teoh A.B.J., Choi D., AVET: A novel transform function to improve cancellable biometrics security, IEEE Trans Inf Forensics Secur 18 (2022) 758–772.
[2]
Begum M., Uddin M.S., Digital image watermarking techniques: A review, Information 11 (2) (2020) 110.
[3]
Mandal P.C., Mukherjee I., Paul G., Chatterji B., Digital image steganography: A literature survey, Inform Sci (2022).
[4]
Li S., Tu Z., Chen Y., Yu T., Multi-scale attention encoder for street-to-aerial image geo-localization, CAAI Trans Intell Technol 8 (1) (2023) 166–176.
[5]
Murmu A., Kumar P., A novel gateaux derivatives with efficient DCNN-resunet method for segmenting multi-class brain tumor, Med Biol Eng Comput (2023) 1–24.
[6]
Kumar P., Parmar A., Versatile approaches for medical image compression: A review, Procedia Comput Sci 167 (2020) 1380–1389.
[7]
Kumar P., Rahman M., Namasudra S., Moparthi N.R., Enhancing security of medical images using deep learning, chaotic map, and hash table, Mob Netw Appl (2023) 1–15.
[8]
Parashar A., Rishi R., Parashar A., Rida I., Medical imaging in rheumatoid arthritis: A review on deep learning approach, Open Life Sci 18 (1) (2023).
[9]
Namasudra S., Nath S., Majumder A., Profile based access control model in cloud computing environment, in: 2014 international conference on green computing communication and electrical engineering, IEEE, 2014, pp. 1–5.
[10]
Parashar A., Parashar A., Abate A.F., Shekhawat R.S., Rida I., Real-time gait biometrics for surveillance applications: A review, Image Vis Comput (2023).
[11]
Murmu A., Kumar P., Deep learning model-based segmentation of medical diseases from MRI and CT images, in: TENCON 2021-2021 IEEE region 10 conference, IEEE, 2021, pp. 608–613.
[12]
Goodfellow I., Pouget-Abadie J., Mirza M., Xu B., Warde-Farley D., Ozair S., et al., Generative adversarial networks, Commun ACM 63 (11) (2020) 139–144.
[13]
Trabelsi S., Samai D., Dornaika F., Benlamoudi A., Bensid K., Taleb-Ahmed A., Efficient palmprint biometric identification systems using deep learning and feature selection methods, Neural Comput Appl 34 (14) (2022) 12119–12141.
[14]
Yi T., Shi M., Zhu H., Medical data publishing based on average distribution and clustering, CAAI Trans Intell Technol 7 (3) (2022) 381–394.
[15]
Ding Y., Tan F., Qin Z., Cao M., Choo K.-K.R., Qin Z., DeepKeyGen: A deep learning-based stream Cipher generator for medical image encryption and decryption, IEEE Trans Neural Netw Learn Syst 33 (9) (2021) 4915–4929.
[16]
Malviya S., Kumar P., Namasudra S., Tiwary U.S., Experience replay-based deep reinforcement learning for dialogue management optimisation, Trans Asian Low-Res Lang Inform Process (2022).
[17]
Hajjaji M.A., Dridi M., Mtibaa A., A medical image crypto-compression algorithm based on neural network and PWLCM, Multimedia Tools Appl 78 (2019) 14379–14396.
[18]
Vallabhadas D.K., Sandhya M., Securing multimodal biometric template using local random projection and homomorphic encryption, J Inform Secur Appl 70 (2022).
[19]
Yang F., Mou J., Sun K., Chu R., Lossless image compression-encryption algorithm based on BP neural network and chaotic system, Multimedia Tools Appl 79 (2020) 19963–19992.
[20]
Belazi A., Talha M., Kharbech S., Xiang W., Novel medical image encryption scheme based on chaos and DNA encoding, IEEE access 7 (2019) 36667–36681.
[21]
Ayoobkhan M.U.A., Chikkannan E., Ramakrishnan K., Feed-forward neural network-based predictive image coding for medical image compression, Arab J Sci Eng 43 (2018) 4239–4247.
[22]
Das S., Gangwani P., Upadhyay H., Integration of machine learning with cybersecurity: Applications and challenges, Artif Intell Cyber Secur: Theories Appl (2023) 67–81.
[23]
Selvi C.T., Amudha J., Sudhakar R., Medical image encryption and compression by adaptive sigma filterized synorr certificateless signcryptive levenshtein entropy-coding-based deep neural learning, Multimedia Syst (2021) 1–16.
[24]
Singh M., Baranwal N., Singh K., Singh A., Zhou H., Deep learning-based biometric image feature extraction for securing medical images through data hiding and joint encryption–compression, J Inform Secur Appl 79 (2023).
[25]
Liu Z, Xu X, Liu T, Liu Q, Wang Y, Shi Y, et al. Machine vision guided 3d medical image compression for efficient transmission and accurate segmentation in the clouds. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2019, p. 12687–96.
[26]
Arab A., Rostami M.J., Ghavami B., An image encryption method based on chaos system and AES algorithm, J Supercomput 75 (2019) 6663–6682.
[27]
Khasim S., Basha S.S., An improved fast and secure CAMEL based authenticated key in smart health care system, Cloud Comput Data Sci (2022) 77–91.
[28]
Wang X., Yin S., Shafiq M., Laghari A.A., Karim S., Cheikhrouhou O., et al., A new V-net convolutional neural network based on four-dimensional hyperchaotic system for medical image encryption, Secur Commun Netw 2022 (2022) 1–14.
[29]
Akkasaligar P.T., Biradar S., Selective medical image encryption using DNA cryptography, Inform Secur J: A Glob Perspect 29 (2) (2020) 91–101.
[30]
Maliyaem M., Tuan N.M., Lockhart D., Muenthong S., A study of using machine learning in predicting COVID-19 cases, Cloud Comput Data Sci (2022) 92–99.
[31]
Ding Y., Wu G., Chen D., Zhang N., Gong L., Cao M., et al., DeepEDN: A deep-learning-based image encryption and decryption network for internet of medical things, IEEE Internet Things J 8 (3) (2020) 1504–1518.
[32]
Khemchandani M.A., Jadhav S.M., Iyer B., Brain tumor segmentation and identification using particle imperialist deep convolutional neural network in MRI images, IJIMAI 7 (7) (2022) 38–47.
[33]
Martín Merino M., López Rivero A.J., Alonso V., Vallejo M., Ferreras A., A clustering algorithm based on an ensemble of dissimilarities: An application in the bioinformatics domain, Int J Interact Multim Artif Intell (2022).
[34]
Sharma R.S., Mannava P.N., Wingreen S.C., Reverse-engineering the design rules for cloud-based big data platforms, Cloud Comput Data Sci (2022) 39–59.
[35]
Devi S.A., Felix A., Narayanamoorthy S., Ahmadian A., Balaenu D., Kang D., An intuitionistic fuzzy decision support system for COVID-19 lockdown relaxation protocols in India, Comput Electr Eng 102 (2022).
[36]
Zheng M., Zhi K., Zeng J., Tian C., You L., A hybrid CNN for image denoising, J Artif Intell Technol 2 (3) (2022) 93–99.
[37]
Meng J., Li Y., Liang H., Ma Y., Single-image dehazing based on two-stream convolutional neural network, J Artif Intell Technol 2 (3) (2022) 100–110.
[38]
Hosny K.M., Kamal S.T., Darwish M.M., A color image encryption technique using block scrambling and chaos, Multimedia Tools Appl (2022) 1–21.
[39]
Kumar C.M., Vidhya R., Brindha M., An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function, Appl Intell 52 (3) (2022) 2556–2585.
[40]
Jeevitha S., Amutha Prabha N., Novel medical image encryption using DWT block-based scrambling and edge maps, J Ambient Intell Humaniz Comput 12 (2021) 3373–3388.
[41]
Priyadarshini R., Md A.Q., Mohan S., Alghamdi A., Alrizq M., Mohamad U.H., et al., Novel framework based on ensemble classification and secure feature extraction for COVID-19 critical health prediction, Eng Appl Artif Intell 126 (2023).
[42]
Zhang Q., Xiao J., Tian C., Chun-Wei Lin J., Zhang S., A robust deformed convolutional neural network (CNN) for image denoising, CAAI Trans Intell Technol 8 (2) (2023) 331–342.
[43]
Shafqat S., Majeed H., Javaid Q., Ahmad H.F., Standard ner tagging scheme for big data healthcare analytics built on unified medical corpora, J Artif Intell Technol 2 (4) (2022) 152–157.
[44]
Mooney P., Chest x-ray images (Covid-19), Kaggle, 2020, https://www.kaggle.com/paultimothymooney/chest-xray-pneumonia. [Accessed: 04 August 2023].
[45]
Ruizgara P., Sokoto coventry fingerprint dataset (socofing), Kaggle, 2018, https://www.kaggle.com/datasets/ruizgara/socofing. [Accessed: 04 August 2023].
[46]
Kayalvizhi S., Malarvizhi S., A novel encrypted compressive sensing of images based on fractional order hyper chaotic Chen system and DNA operations, Multimedia Tools Appl 79 (2020) 3957–3974.
[47]
El-Shafai W., Khallaf F., El-Rabaie E.-S.M., El-Samie F.E.A., Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications, J Ambient Intell Humaniz Comput 12 (2021) 9007–9035.
[48]
Hua Z., Zhou Y., Design of image cipher using block-based scrambling and image filtering, Inform Sci 396 (2017) 97–113.
[49]
Dagadu J.C., Li J.-P., Aboagye E.O., Medical image encryption based on hybrid chaotic DNA diffusion, Wirel Pers Commun 108 (2019) 591–612.
Recommendations
Cancelable electrocardiogram biometric system based on chaotic encryption using three‐dimensional logistic map for biometric‐based cloud services
AbstractBiometric features are extensively employed for security purposes, but they are vulnerable to threats and can be lost or compromised. Electrocardiogram (ECG) has been utilized as one of the most favorable biometrics. However, it contains ...
Enhancing security and privacy in biometrics-based authentication systems
End-to-end securityBecause biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. It is important that such biometrics-based ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Elsevier Ltd.
Publisher
Elsevier Science Inc.
United States
Publication History
Published: 17 April 2024
Author Tags
Qualifiers
- Research-article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Reflects downloads up to 15 Jan 2025