Reversible encryption and lossless data hiding for medical imaging aiding smart health care
E-health solutions for smart cities seem quite promising in resolving health problems, however, there are many challenges associated with it and one of the challenge is the secure and reliable error-free transmission/reception of medical images and associated data. In this paper, we have proposed an...
Gespeichert in:
Veröffentlicht in: | Cluster computing 2023-10, Vol.26 (5), p.2977-2991 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2991 |
---|---|
container_issue | 5 |
container_start_page | 2977 |
container_title | Cluster computing |
container_volume | 26 |
creator | Basit, Abdul Toor, Waqas Tariq Saadi, Muhammad Maroof, Naeem Khan, Saqib Ali Otaibi, Sattam Al |
description | E-health solutions for smart cities seem quite promising in resolving health problems, however, there are many challenges associated with it and one of the challenge is the secure and reliable error-free transmission/reception of medical images and associated data. In this paper, we have proposed an efficient technique to securely as well as reliably transfer medical images. In our proposed technique, we use singular value decomposition (SVD) and Discrete Wavelet Haar Transformation (DWT) for hiding the data while encryption is done through standard cipher key. At the receiving end, SVD, DWT, and the key are used to decrypt the image and extract both the image and hidden data. Extensive simulations are carried out on MATLAB in order to evaluate various parameters such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Bit Error Rate (BER) and robustness test, in order to illustrate the robustness and imperceptibility of the proposed technique. Our simulation results have proven the suitability of our algorithm for data hiding in medical images. |
doi_str_mv | 10.1007/s10586-022-03792-z |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918250254</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2918250254</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-a3732883548c636315a644872270bdbb4d5c3df93efd3efb4a0d83312ea2802e3</originalsourceid><addsrcrecordid>eNp9kMFKAzEQhoMoWKsv4CngOZpkNpvsUYpaoSCInjyE7Ga23bLdrclWaJ_e1BW8eRhmmJn_H-Yj5FrwW8G5vouCK5MzLiXjoAvJDidkIpQGplUGp6mGNNZG6XNyEeOac15oWUzIxyt-YYhN2SLFrgr77dD0HXWdp20fY4sxUu8GR1eNb7olrftAN-ibyrW02bjlsefGUdy4MNAVunZY0coFvCRntWsjXv3mKXl_fHibzdni5el5dr9gFYhiYA40SGNAZabKIQehXJ5lRkupeenLMvOqAl8XgLVPUWaOewMgJDppuESYkpvRdxv6zx3Gwa77XejSSSsLYaTiMkGYEjluVSE9FrC225A-CHsruD1CtCNEmyDaH4j2kEQwimJa7pYY_qz_UX0Db4F1rw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918250254</pqid></control><display><type>article</type><title>Reversible encryption and lossless data hiding for medical imaging aiding smart health care</title><source>ProQuest Central UK/Ireland</source><source>SpringerLink Journals - AutoHoldings</source><source>ProQuest Central</source><creator>Basit, Abdul ; Toor, Waqas Tariq ; Saadi, Muhammad ; Maroof, Naeem ; Khan, Saqib Ali ; Otaibi, Sattam Al</creator><creatorcontrib>Basit, Abdul ; Toor, Waqas Tariq ; Saadi, Muhammad ; Maroof, Naeem ; Khan, Saqib Ali ; Otaibi, Sattam Al</creatorcontrib><description>E-health solutions for smart cities seem quite promising in resolving health problems, however, there are many challenges associated with it and one of the challenge is the secure and reliable error-free transmission/reception of medical images and associated data. In this paper, we have proposed an efficient technique to securely as well as reliably transfer medical images. In our proposed technique, we use singular value decomposition (SVD) and Discrete Wavelet Haar Transformation (DWT) for hiding the data while encryption is done through standard cipher key. At the receiving end, SVD, DWT, and the key are used to decrypt the image and extract both the image and hidden data. Extensive simulations are carried out on MATLAB in order to evaluate various parameters such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Bit Error Rate (BER) and robustness test, in order to illustrate the robustness and imperceptibility of the proposed technique. Our simulation results have proven the suitability of our algorithm for data hiding in medical images.</description><identifier>ISSN: 1386-7857</identifier><identifier>EISSN: 1573-7543</identifier><identifier>DOI: 10.1007/s10586-022-03792-z</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Bit error rate ; Computer Communication Networks ; Computer Science ; Cryptography ; Data integrity ; Electronic health records ; Encryption ; Errors ; Haar transformations ; Internet of Things ; Medical electronics ; Medical imaging ; Network topologies ; Neural networks ; Operating Systems ; Patients ; Processor Architectures ; Robustness ; Signal to noise ratio ; Singular value decomposition ; Wavelet transforms</subject><ispartof>Cluster computing, 2023-10, Vol.26 (5), p.2977-2991</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-a3732883548c636315a644872270bdbb4d5c3df93efd3efb4a0d83312ea2802e3</citedby><cites>FETCH-LOGICAL-c319t-a3732883548c636315a644872270bdbb4d5c3df93efd3efb4a0d83312ea2802e3</cites><orcidid>0000-0001-7901-7435</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s10586-022-03792-z$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918250254?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21386,27922,27923,33742,41486,42555,43803,51317,64383,64387,72239</link.rule.ids></links><search><creatorcontrib>Basit, Abdul</creatorcontrib><creatorcontrib>Toor, Waqas Tariq</creatorcontrib><creatorcontrib>Saadi, Muhammad</creatorcontrib><creatorcontrib>Maroof, Naeem</creatorcontrib><creatorcontrib>Khan, Saqib Ali</creatorcontrib><creatorcontrib>Otaibi, Sattam Al</creatorcontrib><title>Reversible encryption and lossless data hiding for medical imaging aiding smart health care</title><title>Cluster computing</title><addtitle>Cluster Comput</addtitle><description>E-health solutions for smart cities seem quite promising in resolving health problems, however, there are many challenges associated with it and one of the challenge is the secure and reliable error-free transmission/reception of medical images and associated data. In this paper, we have proposed an efficient technique to securely as well as reliably transfer medical images. In our proposed technique, we use singular value decomposition (SVD) and Discrete Wavelet Haar Transformation (DWT) for hiding the data while encryption is done through standard cipher key. At the receiving end, SVD, DWT, and the key are used to decrypt the image and extract both the image and hidden data. Extensive simulations are carried out on MATLAB in order to evaluate various parameters such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Bit Error Rate (BER) and robustness test, in order to illustrate the robustness and imperceptibility of the proposed technique. Our simulation results have proven the suitability of our algorithm for data hiding in medical images.</description><subject>Algorithms</subject><subject>Bit error rate</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Data integrity</subject><subject>Electronic health records</subject><subject>Encryption</subject><subject>Errors</subject><subject>Haar transformations</subject><subject>Internet of Things</subject><subject>Medical electronics</subject><subject>Medical imaging</subject><subject>Network topologies</subject><subject>Neural networks</subject><subject>Operating Systems</subject><subject>Patients</subject><subject>Processor Architectures</subject><subject>Robustness</subject><subject>Signal to noise ratio</subject><subject>Singular value decomposition</subject><subject>Wavelet transforms</subject><issn>1386-7857</issn><issn>1573-7543</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kMFKAzEQhoMoWKsv4CngOZpkNpvsUYpaoSCInjyE7Ga23bLdrclWaJ_e1BW8eRhmmJn_H-Yj5FrwW8G5vouCK5MzLiXjoAvJDidkIpQGplUGp6mGNNZG6XNyEeOac15oWUzIxyt-YYhN2SLFrgr77dD0HXWdp20fY4sxUu8GR1eNb7olrftAN-ibyrW02bjlsefGUdy4MNAVunZY0coFvCRntWsjXv3mKXl_fHibzdni5el5dr9gFYhiYA40SGNAZabKIQehXJ5lRkupeenLMvOqAl8XgLVPUWaOewMgJDppuESYkpvRdxv6zx3Gwa77XejSSSsLYaTiMkGYEjluVSE9FrC225A-CHsruD1CtCNEmyDaH4j2kEQwimJa7pYY_qz_UX0Db4F1rw</recordid><startdate>20231001</startdate><enddate>20231001</enddate><creator>Basit, Abdul</creator><creator>Toor, Waqas Tariq</creator><creator>Saadi, Muhammad</creator><creator>Maroof, Naeem</creator><creator>Khan, Saqib Ali</creator><creator>Otaibi, Sattam Al</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0000-0001-7901-7435</orcidid></search><sort><creationdate>20231001</creationdate><title>Reversible encryption and lossless data hiding for medical imaging aiding smart health care</title><author>Basit, Abdul ; Toor, Waqas Tariq ; Saadi, Muhammad ; Maroof, Naeem ; Khan, Saqib Ali ; Otaibi, Sattam Al</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-a3732883548c636315a644872270bdbb4d5c3df93efd3efb4a0d83312ea2802e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Algorithms</topic><topic>Bit error rate</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Data integrity</topic><topic>Electronic health records</topic><topic>Encryption</topic><topic>Errors</topic><topic>Haar transformations</topic><topic>Internet of Things</topic><topic>Medical electronics</topic><topic>Medical imaging</topic><topic>Network topologies</topic><topic>Neural networks</topic><topic>Operating Systems</topic><topic>Patients</topic><topic>Processor Architectures</topic><topic>Robustness</topic><topic>Signal to noise ratio</topic><topic>Singular value decomposition</topic><topic>Wavelet transforms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Basit, Abdul</creatorcontrib><creatorcontrib>Toor, Waqas Tariq</creatorcontrib><creatorcontrib>Saadi, Muhammad</creatorcontrib><creatorcontrib>Maroof, Naeem</creatorcontrib><creatorcontrib>Khan, Saqib Ali</creatorcontrib><creatorcontrib>Otaibi, Sattam Al</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Cluster computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Basit, Abdul</au><au>Toor, Waqas Tariq</au><au>Saadi, Muhammad</au><au>Maroof, Naeem</au><au>Khan, Saqib Ali</au><au>Otaibi, Sattam Al</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Reversible encryption and lossless data hiding for medical imaging aiding smart health care</atitle><jtitle>Cluster computing</jtitle><stitle>Cluster Comput</stitle><date>2023-10-01</date><risdate>2023</risdate><volume>26</volume><issue>5</issue><spage>2977</spage><epage>2991</epage><pages>2977-2991</pages><issn>1386-7857</issn><eissn>1573-7543</eissn><abstract>E-health solutions for smart cities seem quite promising in resolving health problems, however, there are many challenges associated with it and one of the challenge is the secure and reliable error-free transmission/reception of medical images and associated data. In this paper, we have proposed an efficient technique to securely as well as reliably transfer medical images. In our proposed technique, we use singular value decomposition (SVD) and Discrete Wavelet Haar Transformation (DWT) for hiding the data while encryption is done through standard cipher key. At the receiving end, SVD, DWT, and the key are used to decrypt the image and extract both the image and hidden data. Extensive simulations are carried out on MATLAB in order to evaluate various parameters such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Bit Error Rate (BER) and robustness test, in order to illustrate the robustness and imperceptibility of the proposed technique. Our simulation results have proven the suitability of our algorithm for data hiding in medical images.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s10586-022-03792-z</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0001-7901-7435</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1386-7857 |
ispartof | Cluster computing, 2023-10, Vol.26 (5), p.2977-2991 |
issn | 1386-7857 1573-7543 |
language | eng |
recordid | cdi_proquest_journals_2918250254 |
source | ProQuest Central UK/Ireland; SpringerLink Journals - AutoHoldings; ProQuest Central |
subjects | Algorithms Bit error rate Computer Communication Networks Computer Science Cryptography Data integrity Electronic health records Encryption Errors Haar transformations Internet of Things Medical electronics Medical imaging Network topologies Neural networks Operating Systems Patients Processor Architectures Robustness Signal to noise ratio Singular value decomposition Wavelet transforms |
title | Reversible encryption and lossless data hiding for medical imaging aiding smart health care |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T22%3A56%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Reversible%20encryption%20and%20lossless%20data%20hiding%20for%20medical%20imaging%20aiding%20smart%20health%20care&rft.jtitle=Cluster%20computing&rft.au=Basit,%20Abdul&rft.date=2023-10-01&rft.volume=26&rft.issue=5&rft.spage=2977&rft.epage=2991&rft.pages=2977-2991&rft.issn=1386-7857&rft.eissn=1573-7543&rft_id=info:doi/10.1007/s10586-022-03792-z&rft_dat=%3Cproquest_cross%3E2918250254%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918250254&rft_id=info:pmid/&rfr_iscdi=true |