This study aims to hide patient’s privacy details of digital imaging and communications in medicine (DICOM) files using the quick response (QR) code images with the same size using steganographic technique. The proposed method is based on the properties of the discrete cosine transform (DCT) of the DICOM images to embed a QR code image. The proposed method includes two parts: data embedding and extraction process. Moreover, the stego DICOM image could be blindly used to produce the embedded QR code image without the existence of the original DICOM image. The performances of proposed method were evaluated using the metrics of the peak signal to noise ratio (PSNR), the structural similarity index (SSIM), the universal quality index (UQI), the correlation coefficient (R) and the bit error rate (BER) values. The experimental results scored a high PSNR after the embedding process by embedding a QR code image into the DICOM image with the same size.
Lightweight digital imaging and communications in medicine image encryption f...TELKOMNIKA JOURNAL
Diagnosis in healthcare systems relies heavily on the use of medical images. Images such as X-rays, ultrasounds, computed tomography (CT) scans, magnetic resonance imaging (MRIs), and other scans of the brain and other internal organs of patients include private and personal information. However, these images are vulnerable to unauthorized users who unlawfully use them for non-diagnostic reasons due to the lack of security in communication routes and the gaps in the storage systems of hospitals or medical centers. Image encryption is a prominent technique used to protect medical images from unauthorized access in addition to enhancing the security of communication networks. In this paper, researchers offer a lightweight cryptosystem for the secure encryption of medical images that makes use of the present block cipher and a five-dimensional chaotic map. More than 25 images from the open science framework (OSF) public database of patients with coronavirus disease 2019 (COVID-19) were used to evaluate the proposed system. DICOM stands for “digital imaging and communications in medicine”. The efficiency of the proposed system is proved in terms of adjacent pixels’ correlation analysis, National Institute of Standards and Technology (NIST) analysis, mean square error, information entropy, unified average changing intensity, peak-to-signal noise ratio, entropy, and structure similarity index image.
This paper proposes an encryption-based image watermarking scheme for medical images using a
customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of
Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra
security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the
watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding,
an R-level discrete wavelet transform was applied to the host image.
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEijcsit
This paper proposes an encryption-based image watermarking scheme for medical images using a customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding, an R-level discrete wavelet transform was applied to the host image. The high frequency wavelet coefficients are selected to carry these scrambled-watermarks by using adaptive quantization low bit modulation (LBM). The proposed image watermarking method endures entirety attacks and rightly extracts the hidden watermark without significant degradation in the image quality, Thus, when the Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) performance of the proposed algorithm is compared with other related techniques.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Iris images encryption based on QR code and chaotic mapTELKOMNIKA JOURNAL
In this paper an Iris image is encrypted based on QR (quick response) code and chaotic map. The main idea of the proposed system is generating a QR code depending on the input text and then extract the features from QR code by using convolution, these features are used for key generation. After that the permuted iris image is encrypted by using generated key, after that the resulting image will be encrypts using 2D logistic map. The randomness of generated key is tested using the measures of NIST, and quality of images that encrypted in this method are tested by using security analysis tests such as PSNR, UACI, NPCR, histogram, correlation and entropy. The security analysis shows that the proposed system is secure for iris image encryption.
Embedding and Extraction Techniques for Medical Images-Issues and Challenges csandit
New technologies in multimedia and communication fields have introduced new ways to transfer and save the medical image data through open networks, which has introduced new risks of inappropriate use of medical information. Medical images are highly sensitive hence secured transmission and reception of data is needed with minimal distortion. Medical image security plays an important role in the field of Telemedicine. Telemedicine has numerous applications in teleconsulting, teleradiology, telediagnosis, telesurgery and remote medical
education. Our work is to analyze about the different embedding techniques that can be used for embedding the personal and diagnosed details of a person within the medical images
without any visual discrepancy. Also to survey about the blind extraction algorithm utilizing genetic algorithm for optimization of the key parameters.
Lightweight digital imaging and communications in medicine image encryption f...TELKOMNIKA JOURNAL
Diagnosis in healthcare systems relies heavily on the use of medical images. Images such as X-rays, ultrasounds, computed tomography (CT) scans, magnetic resonance imaging (MRIs), and other scans of the brain and other internal organs of patients include private and personal information. However, these images are vulnerable to unauthorized users who unlawfully use them for non-diagnostic reasons due to the lack of security in communication routes and the gaps in the storage systems of hospitals or medical centers. Image encryption is a prominent technique used to protect medical images from unauthorized access in addition to enhancing the security of communication networks. In this paper, researchers offer a lightweight cryptosystem for the secure encryption of medical images that makes use of the present block cipher and a five-dimensional chaotic map. More than 25 images from the open science framework (OSF) public database of patients with coronavirus disease 2019 (COVID-19) were used to evaluate the proposed system. DICOM stands for “digital imaging and communications in medicine”. The efficiency of the proposed system is proved in terms of adjacent pixels’ correlation analysis, National Institute of Standards and Technology (NIST) analysis, mean square error, information entropy, unified average changing intensity, peak-to-signal noise ratio, entropy, and structure similarity index image.
This paper proposes an encryption-based image watermarking scheme for medical images using a
customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of
Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra
security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the
watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding,
an R-level discrete wavelet transform was applied to the host image.
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEijcsit
This paper proposes an encryption-based image watermarking scheme for medical images using a customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding, an R-level discrete wavelet transform was applied to the host image. The high frequency wavelet coefficients are selected to carry these scrambled-watermarks by using adaptive quantization low bit modulation (LBM). The proposed image watermarking method endures entirety attacks and rightly extracts the hidden watermark without significant degradation in the image quality, Thus, when the Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) performance of the proposed algorithm is compared with other related techniques.
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Iris images encryption based on QR code and chaotic mapTELKOMNIKA JOURNAL
In this paper an Iris image is encrypted based on QR (quick response) code and chaotic map. The main idea of the proposed system is generating a QR code depending on the input text and then extract the features from QR code by using convolution, these features are used for key generation. After that the permuted iris image is encrypted by using generated key, after that the resulting image will be encrypts using 2D logistic map. The randomness of generated key is tested using the measures of NIST, and quality of images that encrypted in this method are tested by using security analysis tests such as PSNR, UACI, NPCR, histogram, correlation and entropy. The security analysis shows that the proposed system is secure for iris image encryption.
Embedding and Extraction Techniques for Medical Images-Issues and Challenges csandit
New technologies in multimedia and communication fields have introduced new ways to transfer and save the medical image data through open networks, which has introduced new risks of inappropriate use of medical information. Medical images are highly sensitive hence secured transmission and reception of data is needed with minimal distortion. Medical image security plays an important role in the field of Telemedicine. Telemedicine has numerous applications in teleconsulting, teleradiology, telediagnosis, telesurgery and remote medical
education. Our work is to analyze about the different embedding techniques that can be used for embedding the personal and diagnosed details of a person within the medical images
without any visual discrepancy. Also to survey about the blind extraction algorithm utilizing genetic algorithm for optimization of the key parameters.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Hiding algorithm based fused images and Caesar cipher with intelligent securi...IJECEIAES
The process of sending confidential data through the communication media and in complete secrecy is now necessary, whether the data is related to patients, a particular military operation, or a specified office. On the other hand, with the development of various ciphering algorithms, and information hiding algorithms, there is a need to obtain ciphered and hidden data securely without the need to exchange secret keys between the two ends of the communication. In this paper, a hiding algorithm based on fused images and Caesar cipher with intelligent methods to strengthen the security of confidential information is proposed. Firstly, fused image scattering is obtained using 1’s complement and circularly shifting the bits of fused pixels by specified positions before the hiding process. Secondly, the keys for the Caesar cipher are derived from the length of secret information according to the mathematical equation. Thirdly, strengthen the security of Caesar’s cipher by taking a 1’s complement of each letter in the cipher data. The results guarantee the security of the presented algorithm.
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYacijjournal
The art of information hiding has become an important issue in the recent years as security of information
has become a big concern in this internet era. Cryptography and Steganography play major role for
secured data transfer. Steganography stands for concealed writing; it hides the message inside a cover
medium. Cryptography conceals the content of a message by encryption. QR (Quick Response) Codes are
2-dimensional bar codes that encode text strings. They are able to encode information in both vertical and
horizontal direction, thus able to encode more information. In this paper a novel approach is proposed for
secret communication by combining the concepts of Steganography and QR codes. The suggested method
includes two phases: (i) Encrypting the message by a QR code encoder and thus creating a QR code (ii)
Hiding the QR code inside a colour image. This hiding process embeds the quantised QR code so that it
will not make any visible distortion in the cover image and it introduces very minimum Bit Error Rate
(BER). Experimental result shows that the proposed method has high imperceptibility, integrity and
security..
Advanced watermarking technique to improve medical images’ securityTELKOMNIKA JOURNAL
Advances in imaging technology have made medical images become one of the important
sources for information in supporting accurate diagnoses and treatment decisions by doctors for their
patients. However, the vulnerability of medical images’ security is high. The images can be easily
‘attacked’, which altered their information that can lead to incorrect diagnoses or treatment. In order to
make the images less vulnerable from outside attacks, this study proposes to secure them by advancing
the watermarking using dual-layer fragile technique. It is expected that this dual-layer fragile watermarking
will guarantee the integrity, authenticity, and confidentiality of patient’s and any other important information
and also the pixel data of the medical images. The work in this study implements two LSBs of image where
the role of the first LSB is as a tamper detector, and the second LSB is used to store patient’s and any
other important information. Medical images of four deadliest diseases in Indonesia were used to test
the proposed watermarking technique. Results from the conducted tests show that the proposed technique
able to generate a watermarked image that has no noticeable changes compared to its original image, with
PSNR value more than 44 dB and SSIM value of almost 1, where the tamper detector can correctly detect
and localize any tampering on the watermarked image. Furthermore, the proposed technique has shown to
have a higher level of security on medical images, compared to DICOM standard and standard
watermarking method.
Telemedicine; use of telecommunication and information technological services, which permits the
communication between the users with convenience and fidelity, as well transmitting medical, images and
health informatics data. Numerous image processing applications like Satellite Imaging, Medical Imaging
and Video has images with too large size or stream size, with a large amount of space or high bandwidth
for communication in its original form. Integrity of the transmitted medical images and the informatics
data, without any compromise in the data is an essential product of telecommunication and information
technology. A colossal need for an adequate compression methodology, in adoption for the compression of
medical images /data, to domicile for various metrics like high bandwidth, resolution factors, storage of the
images/data, the obligation to perpetuate the validity and precision of data for subsequent perceived
diagnosis transactions. This leverages exacting coercions on the restoration error. In this paper we survey
the literature related to the Image Processing Methodologies based on ROI technique/s for Digital Imaging
and Communication for Medicine (DICOM). A scrutiny as such persuades with the several congestions
related to prospective techniques of lossless compression, recommending for a better and a unique image
compression technique.
DISTRIBUTED SYSTEM FOR 3D REMOTE MONITORING USING KINECT DEPTH CAMERAScscpconf
This article describes the design and development ofa system for remote indoor 3D monitoring
using an undetermined number of Microsoft® Kinect sensors. In the proposed client-server
system, the Kinect cameras can be connected to different computers, addressing this way the
hardware limitation of one sensor per USB controller. The reason behind this limitation is the
high bandwidth needed by the sensor, which becomes also an issue for the distributed system
TCP/IP communications. Since traffic volume is too high, 3D data has to be compressed before
it can be sent over the network. The solution consists in self-coding the Kinect data into RGB
images and then using a standard multimedia codec to compress color maps. Information from
different sources is collected into a central client computer, where point clouds are transformed
to reconstruct the scene in 3D. An algorithm is proposed to conveniently merge the skeletons
detected locally by each Kinect, so that monitoring of people is robust to self and inter-user
occlusions. Final skeletons are labeled and trajectories of every joint can be saved for event
reconstruction or further analysis.
An efficient data masking for securing medical data using DNA encoding and ch...IJECEIAES
Data security is of utmost importance for ubiquitous computing of medical/diagnostic data or images. Along with that must consider preserving the privacy of patients. Recently, deoxyribose nucleic acid (DNA) sequences and CSs are jointly used for building efficient data masking models. However, the state-of-art method is not robust against cropping attack (CA) and noise. Since in the existing model most of the digits of each pixel are not changed. This work represents efficient-data-masking (EDM) using chaos and the DNA based encryption technique for securing the healthcaredata. For overcoming the research challenges the effective-bit-scrambling technique is needed. At first, this work represents an efficient bit-scrambling using the logistic-sin-map, and the PS-utilizing the chaotic system. Then the substitution is carried out between them to resist against SA, DA, and CA. the experiments are conducted on the standard assuming the diverse images. The gained result represents that the introduced model is very efficient when compared to the existing models.
Image processing analysis of sigmoidal Hadamard wavelet with PCA to detect hi...TELKOMNIKA JOURNAL
Innovative tactics are employed by terrorists to conceal weapons and explosives to perpetrate violent attacks, accounting for the deaths of millions of lives every year and contributing to huge economic losses to the global society. Achieving a high threat detection rate during an inspection of crowds to recognize and detect threat elements from a secure distance is the motivation for the development of intelligent image data analysis from a machine learning perspective. A method proposed to reduce the image dimensions with support vector, linearity and orthogonal. The functionality of CWD is contingent upon the plenary characterization of fusion data from multiple image sensors. The proposed method combines multiple sensors by hybrid fusion of sigmoidal Hadamard wavelet transform and PCA basis functions. Weapon recognition and the detection system, using Image segmentation and K means support vector machine A classifier is an autonomous process for the recognition of threat weapons regardless of make, variety, shape, or position on the suspect’s body despite concealment.
Survey on information hiding techniques using qr barcodecsandit
Nowadays, the information processing system plays c
rucial part in the internet. Online
information security has become the top priority in
all sectors. Failing to provide online
information security may cause loss of critical inf
ormation or someone may use or distribute
such information for malicious purpose. Recently QR
barcodes have been used as an effective
way to securely share information. This paper prese
nts the survey on information hiding
techniques which can share high security informatio
n over network using QR barcode
.
Image encryption algorithm based on the density and 6D logistic map IJECEIAES
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are generated depending on the chaotic logistic with the image density to encrypt the gray and color images, and the second stage is the decryption, which is the opposite of the encryption process to obtain the original image. The proposed method has been tested on two standard gray and color images publicly available. The test results indicate to the highest value of peak signal-to-noise ratio (PSNR), unified average changing intensity (UACI), number of pixel change rate (NPCR) are 7.7268, 50.2011 and 100, respectively. While the encryption and decryption speed up to 0.6319 and 0.5305 second respectively.
Color image encryption based on chaotic shit keying with lossless compression IJECEIAES
In order to protect valuable data from undesirable readers or against illegal reproduction and modifications, there have been various data encryption techniques. Many methods are developed to perform image encryption. The use of chaotic map for image encryption is very effective, since it increases the security, due to its random behavior. The most attractive feature of deterministic chaotic systems is the extremely unexpected and random-look nature of chaotic signals that may lead to novel applications. A novel algorithm for image encryption based on compression and hyper chaotic map techniques is suggested. First, the RGB image is broken down into R, G and B subbands after that each band is compressed using lossless technique. The generated chaotic sequences from the 3D chaotic system are employed to code the compressed results by employing the idea of chaotic shift encoding (CSK) modulation to encode the three bands to generate the encrypted image. The experiments show that the proposed method give good results in term of security, feasibility, and robustness.
Innovative Low-Cost Perimeter Security Gadget With In-built Mechanism to Ensu...IJCNCJournal
The concept is to capture and preserve the intruder’s details in unattended mode. A camera is integrated with a processing unit and counter arrangement to ensure authenticity and non-repudiation of the captured images of the intruder before court of law. Ownership claim is justified concocting confidential data sharing of visual cryptography. Signal quality is retained and unauthorized tampering of secret data resisted. Entire procedure indulges: Message Digest M is generated using SHA-2 from the date and time stamp of the acquired image, two shares are generated from MAC address (K) of the network card and encryption is done using AES involving encoding using Hamming 1 – bit technique. The cover image is prepared in DCT domain to restrict JPEG compression. Sensitive data is embedded in restricted areas of DCT transformed image. Extraction of secret data verifies an intruder. The experimental results prove its efficacy over existing conventional system.
INNOVATIVE LOW-COST PERIMETER SECURITY GADGET WITH IN-BUILT MECHANISM TO ENSU...IJCNCJournal
The concept is to capture and preserve the intruder’s details in unattended mode. A camera is integrated
with a processing unit and counter arrangement to ensure authenticity and non-repudiation of the captured
images of the intruder before court of law. Ownership claim is justified concocting confidential data
sharing of visual cryptography. Signal quality is retained and unauthorized tampering of secret data
resisted. Entire procedure indulges: Message Digest M is generated using SHA-2 from the date and time
stamp of the acquired image, two shares are generated from MAC address (K) of the network card and
encryption is done using AES involving encoding using Hamming 1 – bit technique. The cover image is
prepared in DCT domain to restrict JPEG compression. Sensitive data is embedded in restricted areas of
DCT transformed image. Extraction of secret data verifies an intruder. The experimental results prove its
efficacy over existing conventional system.
Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...sipij
Medical image security provides challenges and opportunities, watermarking and encryption of medical
images provides the necessary control over the flow of medical information. In this paper a dual security approach is employed .A medical image is considered as watermark and is watermarked inside a natural image. This approach is to wean way the potential attacker by disguising the medical image as a natural image. To further enhance the security the watermarked image is encrypted using encryption algorithms. In this paper a multi–objective optimization approach optimized using different metaheuristic approaches like Genetic Algorithm (GA), Differential Evolution ( DE) and Bacterial Foraging Optimization (BFOA) is proposed. Such optimization helps in preserving the structural integrity of the medical images, which is of utmost importance. The water marking is proposed to be implemented using both Lifted Wavelet
Transforms (LWT) and Singular Value Decomposition (SVD) technique. The encryption is done using RSA
and AES encryption algorithms. A Graphical User Interface (GUI) which enables the user to have ease of
operation in loading the image, watermark it, encrypt it and also retrieve the original image whenever necessary is also designed and presented in this paper.
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
More Related Content
Similar to A blind steganography approach for hiding privacy details in images of digital imaging and communications in medicine using QR code
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Hiding algorithm based fused images and Caesar cipher with intelligent securi...IJECEIAES
The process of sending confidential data through the communication media and in complete secrecy is now necessary, whether the data is related to patients, a particular military operation, or a specified office. On the other hand, with the development of various ciphering algorithms, and information hiding algorithms, there is a need to obtain ciphered and hidden data securely without the need to exchange secret keys between the two ends of the communication. In this paper, a hiding algorithm based on fused images and Caesar cipher with intelligent methods to strengthen the security of confidential information is proposed. Firstly, fused image scattering is obtained using 1’s complement and circularly shifting the bits of fused pixels by specified positions before the hiding process. Secondly, the keys for the Caesar cipher are derived from the length of secret information according to the mathematical equation. Thirdly, strengthen the security of Caesar’s cipher by taking a 1’s complement of each letter in the cipher data. The results guarantee the security of the presented algorithm.
DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHYacijjournal
The art of information hiding has become an important issue in the recent years as security of information
has become a big concern in this internet era. Cryptography and Steganography play major role for
secured data transfer. Steganography stands for concealed writing; it hides the message inside a cover
medium. Cryptography conceals the content of a message by encryption. QR (Quick Response) Codes are
2-dimensional bar codes that encode text strings. They are able to encode information in both vertical and
horizontal direction, thus able to encode more information. In this paper a novel approach is proposed for
secret communication by combining the concepts of Steganography and QR codes. The suggested method
includes two phases: (i) Encrypting the message by a QR code encoder and thus creating a QR code (ii)
Hiding the QR code inside a colour image. This hiding process embeds the quantised QR code so that it
will not make any visible distortion in the cover image and it introduces very minimum Bit Error Rate
(BER). Experimental result shows that the proposed method has high imperceptibility, integrity and
security..
Advanced watermarking technique to improve medical images’ securityTELKOMNIKA JOURNAL
Advances in imaging technology have made medical images become one of the important
sources for information in supporting accurate diagnoses and treatment decisions by doctors for their
patients. However, the vulnerability of medical images’ security is high. The images can be easily
‘attacked’, which altered their information that can lead to incorrect diagnoses or treatment. In order to
make the images less vulnerable from outside attacks, this study proposes to secure them by advancing
the watermarking using dual-layer fragile technique. It is expected that this dual-layer fragile watermarking
will guarantee the integrity, authenticity, and confidentiality of patient’s and any other important information
and also the pixel data of the medical images. The work in this study implements two LSBs of image where
the role of the first LSB is as a tamper detector, and the second LSB is used to store patient’s and any
other important information. Medical images of four deadliest diseases in Indonesia were used to test
the proposed watermarking technique. Results from the conducted tests show that the proposed technique
able to generate a watermarked image that has no noticeable changes compared to its original image, with
PSNR value more than 44 dB and SSIM value of almost 1, where the tamper detector can correctly detect
and localize any tampering on the watermarked image. Furthermore, the proposed technique has shown to
have a higher level of security on medical images, compared to DICOM standard and standard
watermarking method.
Telemedicine; use of telecommunication and information technological services, which permits the
communication between the users with convenience and fidelity, as well transmitting medical, images and
health informatics data. Numerous image processing applications like Satellite Imaging, Medical Imaging
and Video has images with too large size or stream size, with a large amount of space or high bandwidth
for communication in its original form. Integrity of the transmitted medical images and the informatics
data, without any compromise in the data is an essential product of telecommunication and information
technology. A colossal need for an adequate compression methodology, in adoption for the compression of
medical images /data, to domicile for various metrics like high bandwidth, resolution factors, storage of the
images/data, the obligation to perpetuate the validity and precision of data for subsequent perceived
diagnosis transactions. This leverages exacting coercions on the restoration error. In this paper we survey
the literature related to the Image Processing Methodologies based on ROI technique/s for Digital Imaging
and Communication for Medicine (DICOM). A scrutiny as such persuades with the several congestions
related to prospective techniques of lossless compression, recommending for a better and a unique image
compression technique.
DISTRIBUTED SYSTEM FOR 3D REMOTE MONITORING USING KINECT DEPTH CAMERAScscpconf
This article describes the design and development ofa system for remote indoor 3D monitoring
using an undetermined number of Microsoft® Kinect sensors. In the proposed client-server
system, the Kinect cameras can be connected to different computers, addressing this way the
hardware limitation of one sensor per USB controller. The reason behind this limitation is the
high bandwidth needed by the sensor, which becomes also an issue for the distributed system
TCP/IP communications. Since traffic volume is too high, 3D data has to be compressed before
it can be sent over the network. The solution consists in self-coding the Kinect data into RGB
images and then using a standard multimedia codec to compress color maps. Information from
different sources is collected into a central client computer, where point clouds are transformed
to reconstruct the scene in 3D. An algorithm is proposed to conveniently merge the skeletons
detected locally by each Kinect, so that monitoring of people is robust to self and inter-user
occlusions. Final skeletons are labeled and trajectories of every joint can be saved for event
reconstruction or further analysis.
An efficient data masking for securing medical data using DNA encoding and ch...IJECEIAES
Data security is of utmost importance for ubiquitous computing of medical/diagnostic data or images. Along with that must consider preserving the privacy of patients. Recently, deoxyribose nucleic acid (DNA) sequences and CSs are jointly used for building efficient data masking models. However, the state-of-art method is not robust against cropping attack (CA) and noise. Since in the existing model most of the digits of each pixel are not changed. This work represents efficient-data-masking (EDM) using chaos and the DNA based encryption technique for securing the healthcaredata. For overcoming the research challenges the effective-bit-scrambling technique is needed. At first, this work represents an efficient bit-scrambling using the logistic-sin-map, and the PS-utilizing the chaotic system. Then the substitution is carried out between them to resist against SA, DA, and CA. the experiments are conducted on the standard assuming the diverse images. The gained result represents that the introduced model is very efficient when compared to the existing models.
Image processing analysis of sigmoidal Hadamard wavelet with PCA to detect hi...TELKOMNIKA JOURNAL
Innovative tactics are employed by terrorists to conceal weapons and explosives to perpetrate violent attacks, accounting for the deaths of millions of lives every year and contributing to huge economic losses to the global society. Achieving a high threat detection rate during an inspection of crowds to recognize and detect threat elements from a secure distance is the motivation for the development of intelligent image data analysis from a machine learning perspective. A method proposed to reduce the image dimensions with support vector, linearity and orthogonal. The functionality of CWD is contingent upon the plenary characterization of fusion data from multiple image sensors. The proposed method combines multiple sensors by hybrid fusion of sigmoidal Hadamard wavelet transform and PCA basis functions. Weapon recognition and the detection system, using Image segmentation and K means support vector machine A classifier is an autonomous process for the recognition of threat weapons regardless of make, variety, shape, or position on the suspect’s body despite concealment.
Survey on information hiding techniques using qr barcodecsandit
Nowadays, the information processing system plays c
rucial part in the internet. Online
information security has become the top priority in
all sectors. Failing to provide online
information security may cause loss of critical inf
ormation or someone may use or distribute
such information for malicious purpose. Recently QR
barcodes have been used as an effective
way to securely share information. This paper prese
nts the survey on information hiding
techniques which can share high security informatio
n over network using QR barcode
.
Image encryption algorithm based on the density and 6D logistic map IJECEIAES
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are generated depending on the chaotic logistic with the image density to encrypt the gray and color images, and the second stage is the decryption, which is the opposite of the encryption process to obtain the original image. The proposed method has been tested on two standard gray and color images publicly available. The test results indicate to the highest value of peak signal-to-noise ratio (PSNR), unified average changing intensity (UACI), number of pixel change rate (NPCR) are 7.7268, 50.2011 and 100, respectively. While the encryption and decryption speed up to 0.6319 and 0.5305 second respectively.
Color image encryption based on chaotic shit keying with lossless compression IJECEIAES
In order to protect valuable data from undesirable readers or against illegal reproduction and modifications, there have been various data encryption techniques. Many methods are developed to perform image encryption. The use of chaotic map for image encryption is very effective, since it increases the security, due to its random behavior. The most attractive feature of deterministic chaotic systems is the extremely unexpected and random-look nature of chaotic signals that may lead to novel applications. A novel algorithm for image encryption based on compression and hyper chaotic map techniques is suggested. First, the RGB image is broken down into R, G and B subbands after that each band is compressed using lossless technique. The generated chaotic sequences from the 3D chaotic system are employed to code the compressed results by employing the idea of chaotic shift encoding (CSK) modulation to encode the three bands to generate the encrypted image. The experiments show that the proposed method give good results in term of security, feasibility, and robustness.
Innovative Low-Cost Perimeter Security Gadget With In-built Mechanism to Ensu...IJCNCJournal
The concept is to capture and preserve the intruder’s details in unattended mode. A camera is integrated with a processing unit and counter arrangement to ensure authenticity and non-repudiation of the captured images of the intruder before court of law. Ownership claim is justified concocting confidential data sharing of visual cryptography. Signal quality is retained and unauthorized tampering of secret data resisted. Entire procedure indulges: Message Digest M is generated using SHA-2 from the date and time stamp of the acquired image, two shares are generated from MAC address (K) of the network card and encryption is done using AES involving encoding using Hamming 1 – bit technique. The cover image is prepared in DCT domain to restrict JPEG compression. Sensitive data is embedded in restricted areas of DCT transformed image. Extraction of secret data verifies an intruder. The experimental results prove its efficacy over existing conventional system.
INNOVATIVE LOW-COST PERIMETER SECURITY GADGET WITH IN-BUILT MECHANISM TO ENSU...IJCNCJournal
The concept is to capture and preserve the intruder’s details in unattended mode. A camera is integrated
with a processing unit and counter arrangement to ensure authenticity and non-repudiation of the captured
images of the intruder before court of law. Ownership claim is justified concocting confidential data
sharing of visual cryptography. Signal quality is retained and unauthorized tampering of secret data
resisted. Entire procedure indulges: Message Digest M is generated using SHA-2 from the date and time
stamp of the acquired image, two shares are generated from MAC address (K) of the network card and
encryption is done using AES involving encoding using Hamming 1 – bit technique. The cover image is
prepared in DCT domain to restrict JPEG compression. Sensitive data is embedded in restricted areas of
DCT transformed image. Extraction of secret data verifies an intruder. The experimental results prove its
efficacy over existing conventional system.
Hybrid lwt svd watermarking optimized using metaheuristic algorithms along wi...sipij
Medical image security provides challenges and opportunities, watermarking and encryption of medical
images provides the necessary control over the flow of medical information. In this paper a dual security approach is employed .A medical image is considered as watermark and is watermarked inside a natural image. This approach is to wean way the potential attacker by disguising the medical image as a natural image. To further enhance the security the watermarked image is encrypted using encryption algorithms. In this paper a multi–objective optimization approach optimized using different metaheuristic approaches like Genetic Algorithm (GA), Differential Evolution ( DE) and Bacterial Foraging Optimization (BFOA) is proposed. Such optimization helps in preserving the structural integrity of the medical images, which is of utmost importance. The water marking is proposed to be implemented using both Lifted Wavelet
Transforms (LWT) and Singular Value Decomposition (SVD) technique. The encryption is done using RSA
and AES encryption algorithms. A Graphical User Interface (GUI) which enables the user to have ease of
operation in loading the image, watermark it, encrypt it and also retrieve the original image whenever necessary is also designed and presented in this paper.
Similar to A blind steganography approach for hiding privacy details in images of digital imaging and communications in medicine using QR code (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
A blind steganography approach for hiding privacy details in images of digital imaging and communications in medicine using QR code
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 12, No. 4, August 2022, pp. 3721~3729
ISSN: 2088-8708, DOI: 10.11591/ijece.v12i4.pp3721-3729 3721
Journal homepage: http://ijece.iaescore.com
A blind steganography approach for hiding privacy details in
images of digital imaging and communications in medicine
using QR code
Mahmoud Rashad1
, Ahmed Elhadad2,3
, Kamal El-Saady1
1
Department of Mathematics and Computer Science, Faculty of Science, South Valley University, Qena, Egypt
2
Department of Computer Science, Faculty of Computer and Information Sciences, South Valley University, Qena, Egypt
3
Department of Computer Science and Information, Faculty of Science and Art, Jouf University, Al Qurayyat, Kingdom of Saudi Arabia
Article Info ABSTRACT
Article history:
Received May 19, 2021
Revised Mar 17, 2022
Accepted Mar 30, 2022
This study aims to hide patient’s privacy details of digital imaging and
communications in medicine (DICOM) files using the quick response (QR)
code images with the same size using steganographic technique. The
proposed method is based on the properties of the discrete cosine transform
(DCT) of the DICOM images to embed a QR code image. The proposed
method includes two parts: data embedding and extraction process.
Moreover, the stego DICOM image could be blindly used to produce the
embedded QR code image without the existence of the original DICOM
image. The performances of proposed method were evaluated using the
metrics of the peak signal to noise ratio (PSNR), the structural similarity
index (SSIM), the universal quality index (UQI), the correlation coefficient
(R) and the bit error rate (BER) values. The experimental results scored a
high PSNR after the embedding process by embedding a QR code image
into the DICOM image with the same size.
Keywords:
Data hiding
DICOM
Discrete cosine transform
Medical images
QR code
This is an open access article under the CC BY-SA license.
Corresponding Author:
Ahmed Elhadad
Department of Computer Science, Faculty of Computer and Information Sciences, South Valley University
Qena, Egypt
Email: ahmed.elhadad@sci.svu.edu.eg
1. INTRODUCTION
Digital imaging and communications in medicine (DICOM) is the standard medical imaging data
format, which is most used for the exchanging, management and viewing of medical images, such as
computerized tomography (CT) scans, magnetic resonance imaging tests (MRIs), and ultrasound images [1].
The DICOM format was developed and copyrighted by the National Electrical Manufacturers Association
(NEMA) [2], [3]. It has been broadly espoused by hospitals and is making inroads into smaller applications
like labs and dentists' and doctors' offices. The DICOM frequently parsed and enables the integration
between different devices and platforms which using the picture archiving and communication system
(PACS) [4]–[8].
The medical information of patients must be protected from unauthorized access. Generally, the
medical information security refers to the rules of security policies that strict ethics rights and privacy of the
patient and must be concerned by entities. There are many widely used standards and tools for protecting
personal medical information such as the ISO27799 (security management in health using ISO/IEC/27799)
[9], cryptography and steganography techniques [10]–[13]. The ISO27799 is a standard which provides the
security management guidelines for health organizations to protect medical information. Cryptography is a
data protection using encryption provider which converts the medical information into unintelligible text
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 4, August 2022: 3721-3729
3722
using secure key. Steganography can be defined as the use of a host (container) data to hide or embed a piece
of information that is hidden directly in media content, in such a way that it is imperceptible to a human
observer but can be detected/extracted easily with a computer [14], [15].
The quick response code is always abbreviated to QR code which is a barcode that is readable by an
imaging device such as a camera and smartphones. The QR code system was originally invented and
designed in 1994 by the Japanese Company Denso Wave and it was registered as a trademark of the same
company [16], [17]. Simply, the QR code is a matrix code of two-dimensional barcodes and consists of black
squares arranged in a square grid on a white background. Unlike the one-dimensional barcodes that were
designed to be scanned by a narrow beam of light, the QR code is scanned by a digital image sensor and then
digitally analyzed by a programmed processor. The QR code includes three main distinct squares at the
corners to set up the image size normalization, orientation, and angle of viewing. Moreover, the small dots
throughout the QR code are then converted to binary numbers and validated with the Reed–Solomon
error-correcting algorithm [18] which are encoded as bytes of 8 bits. In practice, QR codes often contain data
for a locator, identifier, or tracker that points to a standard URL for a website or application. A QR code uses
four standardized encoding modes (numeric-Max. 7,089 characters, alphanumeric- Max. 4,296 characters,
byte/binary-Max. 2,953 characters, and kanji-Max. 1,817 characters) to store the amount of data efficiently;
extensions may also be used [18].
The rest of this paper is organized as follows: section 2 presents the used materials and methods.
The proposed method is illustrated in detail in section 3. Section 4 shows the experimental results and
discussions. Finally, the study and the main contributions are concluded in section 5.
2. MATERIALS AND METHODS
2.1. The cancer imaging archive (TCIA) COVID-19 dataset
This study aims to hide patient’s privacy details of DICOM files using the QR code images
therefore, TCIA COVID-19 dataset is used [19]–[22]. TCIA COVID-19 dataset is a chest radiology imaging
with CT imaging studies, a set of clinical data and key radiology findings for patients representing a rural
COVID-19 positive population in the state of Arkansas. These data are cross-linked to severe acute
respiratory syndrome coronavirus 2 (SARS-CoV-2) complimentary DNA (cDNA) sequence data extracted
from clinical isolates from the same population, uploaded to the GenBank repository. This collection dataset
includes 105 patient’s data with 31,935 total number of images, 256 number of studies, 461 number of series
and 19.0 GB images size. The TCIA COVID-19 dataset provides three study modality computed radiography
(CR): (26 images (0.1%), 19 patients), direct digital capture (DX): (236 images (0.7%), 100 patients) and
computed tomography (CT): (31673 images (99.2%), 23 patients). In addition, the dataset provides different
images size between 350×552 to 3366×3006 using DICOM standard format. Figure 1 shows image samples
description of the TCIA COVID-19 dataset.
Figure 1. DICOM images samples of TCIA COVID-19 dataset
3. Int J Elec & Comp Eng ISSN: 2088-8708
A blind steganography approach for hiding privacy details in … (Mahmoud Rashad)
3723
2.2. The QR code
In this paper, the QR Code generator is based on the zebra crossing (ZXing) library [23]–[25]. The
QR code generator is a software that creates data into a QR code image using the format information of two
things: the error correction level and the mask pattern used for the symbol. The mask patterns are specified
on a grid that is repeated as necessary to cover the whole symbol and protected from errors with a Bose-
Chaudhuri–Hocquenghem (BCH) code and a double of complete copies are included in each QR pattern.
Hence, ZXing is an open-source library project implemented in Java, with ports to other languages which
supports generating and decoding of multi-format 1D/2D barcode image processing such as QR code and
data matrix within images and all files can be imported on the fly from a maven repository or can be
downloaded via a command. Figure 2 shows the generated four QR codes of various size which are used as
an embedded image within the DICOM files.
Figure 2. QR code examples of various size and corresponding decoded text
3. THE PROPOSED METHOD
Figure 3 shows a high-level overall view of the main parts of the proposed method to embed patient
information into the DICOM image. The main idea of this method is to generate a new image (stego) whose
pixels are combination of two images with the same size where one of them is used as cover and the other is
the secret message (Msg). The generated stego image should be similar to the cove image with little
distortion as possible. Then this stego image could be blindly used to produce the embedded massage without
the existence of the original image. The proposed method includes two parts: data embedding and extraction
process.
3.1. Data embedding process
In this process, the data embedding process mainly focuses on embedding the QR code image into
the DICOM image. The proposed method collects patient information from the DICOM file and the
corresponding clinical data such as patient ID, image study description, study modality and radiologist key
findings. Next, the proposed method generates a QR code image using the collected patient data then it
resizes the QR code image to be compatible with the cover DICOM image. As a preprocessing stage, both
the QR code image and the cover DICOM image are normalized and adjusted to get float pixel values whose
pixels have float values that belong to the interval [0, 1] instead of the integer range and to avoid an overflow
in the embedded stego coefficients of saturated pixel values (0 or 1) using a small value (α) respectively.
𝑁𝑜𝑟𝑚𝑎𝑙𝑖𝑧𝑎𝑡𝑖𝑜𝑛(𝐼𝑚𝑔) =
𝐼𝑚𝑔−𝑀𝑖𝑛(𝐼𝑚𝑔)
max(𝐼𝑚𝑔)−𝑀𝑖𝑛(𝐼𝑚𝑔)
(1)
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 4, August 2022: 3721-3729
3724
𝐴𝑑𝑗𝑢𝑠𝑡𝑚𝑒𝑛𝑡(𝐼𝑚𝑔) = {
1 − 𝛼, 𝐼𝑚𝑔 ≥ 1
𝛼, 𝐼𝑚𝑔 = 0
(2)
After normalization and adjustment are done, in preprocessing stage, the resultant cover and QR code images
are divided into small parts of 4×4 matrices called micro-blocks (MB). Then the embedding process stage is
ready to start.
In the embedding process, the main aim of this step is to embed the normalized MB of the QR code
image into the corresponding normalized MB of the cover DICOM image to construct integrated stego
DICOM image. Thus, 2-D discrete cosine transform (DCT) is applied on the cover’s MBs.
𝐷𝐶𝑇 𝑐𝑜𝑒𝑓𝑓𝑖𝑐𝑖𝑒𝑛𝑡𝑠 = 𝑇 × 𝑀𝐵𝐶𝑜𝑣𝑒𝑟 × 𝑇′
(3)
𝑇 =
[
1
√4
1
√4
1
√4
1
√4
√
2
4
𝐶𝑜𝑠(
𝜋
8
) √
2
4
𝐶𝑜𝑠(
3𝜋
8
) √
2
4
𝐶𝑜𝑠(
3𝜋
8
) √
2
4
𝐶𝑜𝑠(
3𝜋
8
)
√
2
4
𝐶𝑜𝑠(
3𝜋
8
) √
2
4
𝐶𝑜𝑠(
3𝜋
8
) √
2
4
𝐶𝑜𝑠(
3𝜋
8
) √
2
4
𝐶𝑜𝑠(
3𝜋
8
)
√
2
4
𝐶𝑜𝑠(
3𝜋
8
) √
2
4
𝐶𝑜𝑠(
3𝜋
8
) √
2
4
𝐶𝑜𝑠(
3𝜋
8
) √
2
4
𝐶𝑜𝑠(
3𝜋
8
)
]
The resultant matrix consists of 4×4 coefficients; one approximation and fifteen details coefficients. Next, the
embedding process is carried out on the cover DCT coefficients by replacing these coefficients with the
corresponding normalized QR code image’s MB pixel values using (4).
𝑆𝑡𝑒𝑔𝑜 𝑐𝑜𝑒𝑓𝑓𝑖𝑐𝑖𝑒𝑛𝑡 = 𝑠𝑖𝑔𝑛(𝐷𝐶𝑇 𝑐𝑜𝑒𝑓𝑓𝑖𝑐𝑖𝑒𝑛𝑡𝐶𝑜𝑣𝑒𝑟)[2
𝛽
(𝑀𝐵𝑄𝑅 𝑐𝑜𝑑𝑒 + 𝑖),
2𝑖
𝛽
≤|𝐷𝐶𝑇 𝑐𝑜𝑒𝑓𝑓𝑖𝑐𝑖𝑒𝑛𝑡𝐶𝑜𝑣𝑒𝑟|≤2(𝑖+1)
𝛽
] (4)
∀ 𝑖 = 0,1,2, … , 𝛽 − 1
Figure 3. A high-level overall view of the proposed method to embed patient information into DICOM image
5. Int J Elec & Comp Eng ISSN: 2088-8708
A blind steganography approach for hiding privacy details in … (Mahmoud Rashad)
3725
The absolute values of the DCT coefficients lies in the interval [0, 2] where the range is actually
determined by the minimum and maximum for each coefficient value Thus, β is an additional parameter that
will be used to divide the range [0, 2] of the absolute value of the cover DCT coefficients. To improve stego
image quality against noise, the approximation coefficient value of the cover image is kept without
modification during the embedding process for each MB. After the embedding process is done, the stego
DICOM image is obtained by applying the inverse DCT (Inv. DCT) then denormalization is applied to
convert the pixel values back to their original domain using (5).
𝑀𝐵𝑆𝑡𝑒𝑔𝑜 = 𝑇′
× 𝐷𝐶𝑇𝑆𝑡𝑒𝑔𝑜 𝑐𝑜𝑒𝑓𝑓𝑖𝑐𝑖𝑒𝑛𝑡𝑠 × 𝑇 (5)
Finally, the resultant stego image is saved as a medical image in DICOM format.
3.2. Data extraction process
The steps of extraction process are exactly the inverse of those followed during the embedding
phases. Therefore, these process starts by read the stego DICOM image then apply the normalization to
convert the pixel values to [0, 1] domain. Next, the normalized stego DICOM image is divided into 4×4 MB
and compute the DCT decomposition using (6).
𝐷𝐶𝑇 𝑐𝑜𝑒𝑓𝑓𝑖𝑐𝑖𝑒𝑛𝑡𝑠 = 𝑇 × 𝑀𝐵𝑆𝑡𝑒𝑔𝑜 × 𝑇′
(6)
After that, the extraction stage is applied on the stego DCT coefficients:
𝑀𝐵𝑅𝑒𝑐−𝑄𝑅 𝑐𝑜𝑑𝑒 = 𝛽
2
(𝐷𝐶𝑇 𝑐𝑜𝑒𝑓𝑓𝑖𝑐𝑖𝑒𝑛𝑡𝑆𝑡𝑒𝑔𝑜 − 2𝑖
𝛽
), 2𝑖
𝛽
≤|𝐷𝐶𝑇 𝑐𝑜𝑒𝑓𝑓𝑖𝑐𝑖𝑒𝑛𝑡𝑆𝑡𝑒𝑔𝑜|≤
2(𝑖+1)
𝛽
(7)
∀ 𝑖 = 0,1,2, … , 𝛽 − 1
where β is the same integer number is used in the embedding stage. In addition, to correctly reconstruct the
first element in MBRec-QR code, the mean value of three neighbors is calculated and replaced on it. Finally, the
resultant Rec-QR code is denormalized to set the pixel values back to their original domain which is similar to
the original QR code image.
4. RESULTS AND DISCUSSION
This section discusses and analysis the results of the proposed method using the TCIA COVID-19
dataset, which was obtained from [19]–[22] that includes 105 patient’s data with 31,935 total number of
images, 256 number of studies, 461 number of series and 19.0 GB images size. The simulation was
implemented using MATLAB version: 9.3.0.713579 (R2017b) with the image processing toolbox and
includes read DICOM image function for image importing and conversion.
Figure 4 shows the DICOM image, QR code image, stego DICOM and reconstructed QR code
image samples from two patients’ TCIA COVID-19 images of the proposed method. Figures 4(a) to (d)
illustrate the cover DICOM and the QR code images respectively however Figures 4(e) and 4(f) show the
resultant stego DICOM image after embedding the QR code image into the cover DICOM image. Moreover,
Figures 4(g) and 4(h) show the reconstructed QR code image after applying the extraction process from stego
DICOM images by an authorized person. The simple visual inspection of the results shows a very high
quality of the stego DICOM images while providing a scannable visual quality for the retrieved QR code
image.
The performances of proposed method were evaluated using the peak signal to noise ratio (PSNR),
the structural similarity index (SSIM), the universal quality index (UQI), and the correlation coefficient (R)
values, whose details were explained:
𝑃𝑆𝑁𝑅 = 10 log10 (
𝑝𝑒𝑎𝑘𝑣𝑎𝑙2
𝑀𝑆𝐸
) (8)
𝑀𝑆𝐸 =
1
𝑀𝑁
∑ ∑ (𝑓(𝑥𝑖, 𝑦𝑗) − 𝑔(𝑥𝑖, 𝑦𝑗))
2
𝑁−1
𝑗=0
𝑀−1
𝑖=0
where f(x, y) and g(x, y) defined the cover and stego patients’ images. M and N are the height and width of
the images. The peakval is the range of the image data type (e.g., for uint16 image it is 65535). Figure 5
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 4, August 2022: 3721-3729
3726
shows the resultant mean of PSNR values to compare between cover and stego DICOM images in decibel
(dB). The mean PSNR values ranged between 63.47 dB and 81.97 dB for various values of β. The minimum
and maximum value of the mean PSNR are 50.41 dB and 95.33 dB respectively. Generally, PSNR higher
values refers that the invisibility of higher quality.
(a) (b) (c) (d)
(e) (f) (g) (h)
Figure 4. DICOM images samples of COVID-19-AR-16406494 and COVID-19-AR-16406561 and the
results DICOM images of the proposed data hiding method: (a) to (d) illustrate the cover DICOM and the QR
code images respectively, (e) and (f) the resultant stego DICOM image after embedding the QR code image
into the cover DICOM image, (g) and (h) the reconstructed QR code image
The PSNR is approach to human observation of invisibility quality with the human visual system
(HVS). On the other hand, the structural similarity (SSIM) index is a perceptual metric that quantifies image
quality degradation as perceived change in structural information [26], [27]. In addition, the universal image
quality index (UQI) proposed by Wang and Bovik evaluates the loss of correlation, luminance distortion, and
contrast distortion [28], [29]. Therefore, the performances of SSIM and UQI are better than the MSE and
PSNR. Equations (9) and (10) illustrate the SSIM and the UQI in details:
𝑆𝑆𝐼𝑀(𝑥, 𝑦) =
(2𝜇𝑥𝜇𝑦+𝑐1)(2𝜎𝑥𝑦+𝑐2)
(𝜇𝑥
2+𝜇𝑦
2+𝑐1)(𝜎𝑥
2+𝜎𝑦
2+𝑐2)
(9)
𝑈𝑄𝐼(𝑥, 𝑦) =
(4𝜇𝑥𝜇𝑦2𝜎𝑥𝑦)
(𝜇𝑥
2+𝜇𝑦
2)(𝜎𝑥
2+𝜎𝑦
2)
(10)
where µx and µy are the local means, σ2
x and σ2
y are the variance of x and y. σxy is the cross-covariance for
images x, y. c1 and c2 are variables to stabilize the division with weak denominator. The correlation
coefficient (R) is widely used in statistical analysis to compare two images in image processing purposes
[30]–[33]. Equation (11) describes R in detail:
7. Int J Elec & Comp Eng ISSN: 2088-8708
A blind steganography approach for hiding privacy details in … (Mahmoud Rashad)
3727
𝑅 =
∑ ∑ (𝑓𝑋𝑌− 𝑓̅)−(𝑔𝑋𝑌− 𝑔
̅)
𝑌
𝑋
√(∑ ∑ (𝑓𝑋𝑌− 𝑓̅)2
𝑌
𝑋 )(∑ ∑ (𝑔𝑋𝑌− 𝑔
̅)2
𝑌
𝑋 )
(11)
where 𝑓̅ and 𝑔̅ are the mean of cover and stego patients’ images pixels. Figure 6 shows the mean of the
obtained SSIM to compare between the cover and resultant stego images. The minimum and maximum mean
values of the SSIM confined between 0.979 and 1 while the overall mean SSIM values between 0.9964
and 1. Figure 7 and Figure 8 illustrate the obtained results of the mean UQI and the mean R respectively. The
minimum and maximum values of the mean UQI are ranged between 0.48 and 1 while the minimum and
maximum values of the mean R are recorded between 0.93 and 1. From the obtained PSNR, SSIM, UQI and
R results, the value of the parameter β always effects on the resultant quality of the stego patients’ image
where the high β values produce high quality stego DICOM image.
Figure 5. The mean of resultant PSNR for stego and
cover patients’ DICOM images
Figure 6. The mean of resultant SSIM for stego and
cover patients’ DICOM images
Figure 7. The mean of resultant UQI for stego and
cover patients’ DICOM images
Figure 8. The mean of resultant R for stego and cover
patients’ DICOM images
Finally, the bit error rate (BER), returned as a scalar which is the number of bit errors to the total
number of bits used in the binary representation. Figure 9 shows the mean BER between the cover and stego
patients’ DICOM images for various values of β. The mean BER values ranged between 0.1632 and 0.2820.
The minimum and maximum values of the mean BER are 0.03 and 0.34 respectively.
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 12, No. 4, August 2022: 3721-3729
3728
Figure 9. The mean of resultant BER for stego and cover patients’ DICOM images
5. CONCLUSION
Most DICOM objects contain images and associated demographic and medical information about
the patient, which need to be kept confidential. Cryptography and steganography are generally used to ensure
medical information of patients’ security. Therefore, this study aims to hide patient’s privacy details of
DICOM files using the QR code images. Different sized 31,935 images of 105 patients were used as cover
and embedded QR code images. The main idea of this method is to generate a new image (stego) whose
pixels are combination of two images with the same size where one of them is used as cover and the other is
the secret message (Msg). The generated stego image should be similar to the cove image with little
distortion as possible. Then this stego image could be blindly used to produce the embedded massage without
the existence of the original image. The performances of proposed method were evaluated using PSNR,
SSIM, UQI, R and BER metrics. The mean PSNR values ranged between 63.47 dB and 81.97 dB.
REFERENCES
[1] E. Seeram, “Medical imaging informatics: an overview,” in Digital Radiography, Springer Singapore, 2019, pp. 165–183.
[2] DICOM, “DICOM PS3.3 2019d-information object definitions,” dicomstandard.org, Accessed: Jan. 20, 2021. [Online].
Available: http://dicom.nema.org/medical/dicom/current/output/chtml/part03/sect_C.7.6.3.html
[3] D. E. Best, S. C. Horii, W. C. Bennett, and C. R. Parisot, “Update of the ACR-NEMA digital imaging and communications in
medicine standard,” in Medical Imaging VI: PACS Design and Evaluation, 1992, vol. 1654, pp. 356–361, doi: 10.1117/12.60322.
[4] Y. H. Su and C.-C. Jay Kuo, “Fast and robust camera’s auto exposure control using convex or concave model,” in 2015 IEEE
International Conference on Consumer Electronics (ICCE), Jan. 2015, pp. 13–14, doi: 10.1109/ICCE.2015.7066300.
[5] Y. Su and C. C. J. Kuo, “On extended long short-term memory and dependent bidirectional recurrent neural network,”
Neurocomputing, vol. 356, pp. 151–161, Sep. 2019, doi: 10.1016/j.neucom.2019.04.044.
[6] Y. Su, Y. Huang, and C.-C. J. Kuo, “Efficient text classification using tree-structured multi-linear principal component analysis,”
in 24th International Conference on Pattern Recognition (ICPR), Aug. 2018, pp. 585–590, doi: 10.1109/ICPR.2018.8545832.
[7] Y. Su, J. Y. Lin, and C.-C. J. Kuo, “A model-based approach to camera’s auto exposure control,” Journal of Visual
Communication and Image Representation, vol. 36, pp. 122–129, Apr. 2016, doi: 10.1016/j.jvcir.2016.01.011.
[8] Y. Su, R. Lin, and C.-C. Jay Kuo, “Tree-structured multi-stage principal component analysis (TMPCA): theory and applications,”
Expert Systems with Applications, vol. 118, pp. 355–364, Mar. 2019, doi: 10.1016/j.eswa.2018.10.020.
[9] ISO, “27799-health informatics-information security management in health using ISO,” ISO, Accessed: Mar. 14, 2019. [Online].
Available: https://www.iso.org/obp/ui/#iso:std:iso:27799:ed-2:v1:en
[10] A. Elhadad, A. Ghareeb, and S. Abbas, “A blind and high-capacity data hiding of DICOM medical images based on fuzzification
concepts,” Alexandria Engineering Journal, vol. 60, no. 2, pp. 2471–2482, Apr. 2021, doi: 10.1016/j.aej.2020.12.050.
[11] A. Elhadad, S. Hamad, A. Khalifa, and H. Abulkasim, “A steganography approach for hiding privacy in video surveillance
systems,” in Digital Media Steganography, Elsevier, 2020, pp. 165–187.
[12] O. H. Khalil, A. Elhadad, and A. Ghareeb, “A blind proposed 3D mesh watermarking technique for copyright protection,” The
Imaging Science Journal, vol. 68, no. 2, pp. 90–99, Feb. 2020, doi: 10.1080/13682199.2020.1740431.
[13] A. Elhadad, “Data sharing using proxy re-encryption based on DNA computing,” Soft Computing, vol. 24, no. 3, pp. 2101–2108,
Feb. 2020, doi: 10.1007/s00500-019-04041-z.
[14] G. J. Simmons, “The prisoners’ problem and the subliminal channel,” in Advances in Cryptology, MA: Springer US, 1984, pp.
51–67.
[15] A. Elhadad, S. Hamad, A. Khalifa, and A. Ghareeb, “High capacity information hiding for privacy protection in digital video
files,” Neural Computing and Applications, vol. 28, no. 1, pp. 91–95, Dec. 2017, doi: 10.1007/s00521-016-2323-7.
[16] K. Peng, H. Sanabria, D. Wu, and C. Zhu, “Security overview of QR codes,” Student project in the MIT course, vol. 6, pp. 1–20,
2014.
[17] S. Tiwari, “An introduction to QR code technology,” in 2016 International Conference on Information Technology (ICIT), Dec.
2016, pp. 39–44, doi: 10.1109/ICIT.2016.021.
[18] Denso Wave Inc. “QR code essentials.” Denso Wave, vol. 900, 2011.
9. Int J Elec & Comp Eng ISSN: 2088-8708
A blind steganography approach for hiding privacy details in … (Mahmoud Rashad)
3729
[19] S. Desai et al., “Data from chest imaging with clinical and genomic correlates representing a rural covid-19 positive population,”
The Cancer Imaging Archive, 2020.
[20] S. Desai et al., “Chest imaging representing a COVID-19 positive rural U.S. population,” Scientific Data, vol. 7, no. 1, Dec. 2020,
doi: 10.1038/s41597-020-00741-6.
[21] P. Jenjaroenpun et al., “Two SARS-CoV-2 genome sequences of isolates from rural U.S. patients harboring the D614G mutation,
obtained using nanopore sequencing,” Microbiology Resource Announcements, vol. 10, no. 1, 2021, doi: 10.1128/MRA.01109-20.
[22] K. Clark et al., “The cancer imaging archive (TCIA): maintaining and operating a public information repository,” Journal of
Digital Imaging, vol. 26, no. 6, pp. 1045–1057, Dec. 2013, doi: 10.1007/s10278-013-9622-7.
[23] J. Richter, “QR code generator 1.1 based on zxing,” 2020, Accessed: Jan. 18, 2021. [Online]. Available:
https://www.mathworks.com/matlabcentral/fileexchange/49808-qr-code-generator-1-1-based-on-zxing
[24] T. Dean and C. Dunn, “Quick layered response (QLR) codes.” Department of Electrical Engineering, Stanford University, Tech.
Rep., 2012.
[25] M. B. Hoy, “An introduction to QR codes: linking libraries and mobile patrons,” Medical Reference Services Quarterly, vol. 30,
no. 3, pp. 295–300, Jul. 2011, doi: 10.1080/02763869.2011.590423.
[26] M.-J. Chen and A. C. Bovik, “Fast structural similarity index algorithm,” Journal of Real-Time Image Processing, vol. 6, no. 4,
pp. 281–287, Dec. 2011, doi: 10.1007/s11554-010-0170-9.
[27] A. Hore and D. Ziou, “Image quality metrics: PSNR vs. SSIM,” in 2010 20th International Conference on Pattern Recognition,
Aug. 2010, pp. 2366–2369, doi: 10.1109/ICPR.2010.579.
[28] A. Toet and M. A. Hogervorst, “Performance comparison of different gray-level image fusion schemes through a universal image
quality index,” in Signal Processing, Sensor Fusion, and Target Recognition XII, Aug. 2003, vol. 5096, pp. 552–561, doi:
10.1117/12.484886.
[29] Zhou Wang and A. C. Bovik, “A universal image quality index,” IEEE Signal Processing Letters, vol. 9, no. 3, pp. 81–84, Mar.
2002, doi: 10.1109/97.995823.
[30] Y. K. Eugene and R. G. Johnston, “The ineffectiveness of the correlation coefficient for image comparisons,” Retrieved, pp. 1–13,
1996.
[31] A. M. Neto, A. C. Victorino, I. Fantoni, D. E. Zampieri, J. V Ferreira, and D. A. Lima, “Image processing using pearson’s
correlation coefficient: Applications on autonomous robotics,” in 2013 13th International Conference on Autonomous Robot
Systems, Apr. 2013, pp. 1–6, doi: 10.1109/Robotica.2013.6623521.
[32] A. M. Neto, A. C. Victorino, I. Fantoni, and D. E. Zampieri, “Real-time dynamic power management based on pearson’s
correlation coefficient,” in 15th Int. Conf. on Advanced Robotics (ICAR), 2011, pp. 304–309, doi: 10.1109/ICAR.2011.6088627.
[33] A. D. M. Neto, A. C. Victorino, I. Fantoni, and D. E. Zampieri, “Automatic regions-of-interest selection based on pearson’s
correlation coefficient,” in IROS Workshop on Visual Control of Mobile Robots (ViCoMoR), 2011, pp. 33–38.
BIOGRAPHIES OF AUTHORS
Mahmoud Rashad is a M.Sc. student at the Department of Mathematics and
Computer Science, Faculty of Science, South Valley University, Egypt. He received the
B.Sc. degree in computer science from South Valley University, Qena, Egypt, in 2007. He
was working as software developer. Now, his research is focused on the area of information
security and privacy. He can be contacted at email: nmrashad.eg@gmail.com.
Ahmed Elhadad received the B.Sc., M.Sc., and Ph.D. degrees from South
Valley University, Qena, Egypt, in 2007, 2010, and 2015 respectively. He was working as an
associate professor in the Computer Science Department, Faculty of Computer and
Information Sciences, South Valley University, Egypt. In 2017, He worked as a Post-Doc
Researcher at CRACS and INESC, Porto LA, Faculdade de Ciências, Universidade do Porto,
Porto, Portugal. In 2012, he was granted mobility scholarship to (IST), Lisbon, Portugal.
Now, his research is focused on the area of information security and privacy. He can be
contacted at email: ahmed.elhadad@sci.svu.edu.eg.
Kamal El-Saady is currently full Professor in the department of Mathematics
and Computer Science, Faculty of Science, South Valley University, Egypt. He received the
Ph.D. degree in Pure Mathematics. His primary research areas are fuzzy topology and
General topology. He can be contacted at email: Kehassan@sci.svu.edu.eg.