Privacy Protection of Patient Medical Images using Digital Watermarking Technique for E-healthcare System

Author(s):  
Asokan Sivaprakash ◽  
Samuel Nadar Edward Rajan ◽  
Sundaramoorthy Selvaperumal

Background: Privacy protection has been a critical issue in the delivery of medical images for telemedicine, e-health care and other remote medical systems. Objective: The aim of this proposed work is to implement a secure, reversible, digital watermarking technique for the transmission of medical data remotely in health care systems. Methods: In this research work, we employed a novel optimized digital watermarking scheme using discrete wavelet transform and singular value decomposition using cuckoo search algorithm based on Lévy flight for embedding watermark into the grayscale medical images of the patient. The performance of our proposed algorithm is evaluated on four different 256 × 256 grayscale host medical images and a 32 × 32 binary logo image. Results: The performance of the proposed scheme in terms of peak signal to noise ratio was remarkably high, with an average of 55.022dB compared to other methods. Conclusion: Experimental results reveal that the proposed method is capable of achieving superior performance compared to some of the state-of-art schemes in terms of robustness, security and high embedding capacity which is required in the field of telemedicine and e-health care system.

2020 ◽  
Vol 14 (6) ◽  
pp. 1351-1380
Author(s):  
Sakthivel V.P. ◽  
Suman M. ◽  
Sathya P.D.

Purpose Economic load dispatch (ELD) is one of the crucial optimization problems in power system planning and operation. The ELD problem with valve point loading (VPL) and multi-fuel options (MFO) is defined as a non-smooth and non-convex optimization problem with equality and inequality constraints, which obliges an efficient heuristic strategy to be addressed. The purpose of this study is to present a new and powerful heuristic optimization technique (HOT) named as squirrel search algorithm (SSA) to solve non-convex ELD problems of large-scale power plants. Design/methodology/approach The suggested SSA approach is aimed to minimize the total fuel cost consumption of power plant considering their generation values as decision variables while satisfying the problem constraints. It confers a solution to the ELD issue by anchoring with foraging behavior of squirrels based on the dynamic jumping and gliding strategies. Furthermore, a heuristic approach and selection rules are used in SSA to handle the constraints appropriately. Findings Empirical results authenticate the superior performance of SSA technique by validating on four different large-scale systems. Comparing SSA with other HOTs, numerical results depict its proficiencies with high-qualitative solution and by its excellent computational efficiency to solve the ELD problems with non-smooth fuel cost function addressing the VPL and MFO. Moreover, the non-parametric tests prove the robustness and efficacy of the suggested SSA and demonstrate that it can be used as a competent optimizer for solving the real-world large-scale non-convex ELD problems. Practical implications This study has compared various HOTs to determine optimal generation scheduling for large-scale ELD problems. Consequently, its comparative analysis will be beneficial to power engineers for accurate generation planning. Originality/value To the best of the authors’ knowledge, this manuscript is the first research work of using SSA approach for solving ELD problems. Consequently, the solution to this problem configures the key contribution of this paper.


2017 ◽  
Vol 29 (4) ◽  
pp. 1103-1123 ◽  
Author(s):  
Qixiang Liao ◽  
Shudao Zhou ◽  
Hanqing Shi ◽  
Weilai Shi

In order to address with the problem of the traditional or improved cuckoo search (CS) algorithm, we propose a dynamic adaptive cuckoo search with crossover operator (DACS-CO) algorithm. Normally, the parameters of the CS algorithm are kept constant or adapted by empirical equation that may result in decreasing the efficiency of the algorithm. In order to solve the problem, a feedback control scheme of algorithm parameters is adopted in cuckoo search; Rechenberg’s 1/5 criterion, combined with a learning strategy, is used to evaluate the evolution process. In addition, there are no information exchanges between individuals for cuckoo search algorithm. To promote the search progress and overcome premature convergence, the multiple-point random crossover operator is merged into the CS algorithm to exchange information between individuals and improve the diversification and intensification of the population. The performance of the proposed hybrid algorithm is investigated through different nonlinear systems, with the numerical results demonstrating that the method can estimate parameters accurately and efficiently. Finally, we compare the results with the standard CS algorithm, orthogonal learning cuckoo search algorithm (OLCS), an adaptive and simulated annealing operation with the cuckoo search algorithm (ACS-SA), a genetic algorithm (GA), a particle swarm optimization algorithm (PSO), and a genetic simulated annealing algorithm (GA-SA). Our simulation results demonstrate the effectiveness and superior performance of the proposed algorithm.


Author(s):  
Ammar Wisam Altaher ◽  
Abdullah Hasan Hussein

<p>Monitoring the general public gathered in large numbers is one of the most challenging tasks faced by the law and order enforcement team. There is swiftly demand to that have inbuilt sensors which can detect the concealed weapon, from a standoff distance the system can locate the weapon with very high accuracy. Objects that are obscure and invisible from human vision can be seen vividly from enhanced artificial vision systems. Image Fusion is a computer vision technique that fuses images from multiple sensors to give accurate information. Image fusion using visual and infrared images has been employed for a safe, non-invasive standoff threat detection system. The fused imagery is further processed for specific identification of weapons. The unique approach to discover concealed weapon based on DWT in conjunction with Meta heuristic algorithm Harmony Search Algorithm and SVM classification is presented. It firstly uses the traditional discrete wavelet transform along with the hybrid Hoteling transform to obtain a fused imagery. Then a heuristic search algorithm is applied to search the best optimal harmony to generate the new principal components of the registered input images which is later classified using the K means support vector machines to build better classifiers for concealed weapon detection. Experimental results demonstrate the hybrid approach which shows the superior performance.</p>


Author(s):  
Akemi Gálvez ◽  
Iztok Fister ◽  
Iztok Fister ◽  
Eneko Osaba ◽  
Javier Del Ser ◽  
...  

Author(s):  
Goutam Kumar Bose ◽  
Pritam Pain

In the present research work selection of significant machining parameters depending on nature-inspired algorithm is prepared, during machining alumina-aluminum interpenetrating phase composites through electrochemical grinding process. Here during experimentation control parameters like electrolyte concentration (C), voltage (V), depth of cut (D) and electrolyte flow rate (F) are considered. The response data are initially trained and tested applying Artificial Neural Network. The paradoxical responses like higher material removal rate (MRR), lower surface roughness (Ra), lower overcut (OC) and lower cutting force (Fc) are accomplished individually by employing Cuckoo Search Algorithm. A multi response optimization for all the response parameters is compiled primarily by using Genetic algorithm. Finally, in order to achieve a single set of parametric combination for all the outputs simultaneously fuzzy based Grey Relational Analysis technique is adopted. These nature-driven soft computing techniques corroborates well during the parametric optimization of ECG process.


Author(s):  
Jagan Kumar. N ◽  
Agilandeeswari. L ◽  
Prabukumar. M

<p>The research work is to improve the segmentation of the color satellite images. In this proposed method the color satellite image can be segmented by using Tsallis entropy and granular computing methods with the help of cuckoo search algorithm. The Tsallis and granular computing methods will used to find the maximum possibility of threshold limits and the cuckoo search will find the optimized threshold values based on threshold limit that is calculated by the Tsallis entropy and granular computing methods and the multilevel thresholding  will used for the segmentation of color satellite images based on the optimized threshold value that will find by this work and these methods will help to select the optimized threshold values for multiple thresholding effectively.<strong></strong></p>


2019 ◽  
Vol 8 (11) ◽  
pp. 24858-24868
Author(s):  
Sandeepa K S ◽  
Basavaraj N Jagadale ◽  
J S Bhat

Image enhancement techniques are prominently used to analyze the image by enhancing key factors like contrast, resolution, and quality of the image. With the proper analysis of images, it is desirable to pre-process the image for resolution and contrast enhancement. We present here a new approach based on discrete wavelet transform (DWT), singular value decomposition (SVD) for image contrast and resolution enhancement, The contrast of the image is enhanced by maximum value fusion technique applied to the images created by using modified cuckoo search algorithm (CSA) and singular value decomposition separately. The masking approach is employed, for obtaining residual pixel value between original and scaled images independently. The resolution of the image is enhanced by combining interpolated high-frequency sub-band and maximum value fusion images. The proposed algorithm helps to minimize the noise artifacts and over enhancement problems. Experimental results are tested in terms of peak signal to noise ratio (PSNR) and absolute mean brightness error (AMBE). The proposed method shows better performance compared to other contrast and resolution enhancement techniques.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Sai Prasanthi Kasimsetti ◽  
Asdaque Hussain

Purpose The research work is attained by Spurious Transmission–based Enhanced Packet Reordering Method (ST-EPRM). The packet reordering necessity is evaded by presenting random linear network coding process on wireless network physical layer which function on basis of sequence numbers. The spurious retransmission happening over wireless network is obtained by presenting monitoring concept for reducing number of spurious retransmissions because it might need more than three DUPACKs for triggering fast retransmit. This monitoring node performs as centralized node as well variation amid buffer length and number of packets being sent can be predicted. This information helps in differentiating spurious retransmission from the packet loss. Design/methodology/approach Based on transmission detection, action is accomplished whether to retransmit or evade transmission. Monitoring node selection is achieved by presenting improved cuckoo search algorithm. The modified support vector machine algorithm is greatly used for variation-based spurious transmission. Findings The research work which is attained by ST-EPRM. The packet reordering necessity is evaded by presenting random linear network coding process on wireless network physical layer which function on basis of sequence numbers. The spurious retransmission happening over wireless network is obtained by presenting monitoring concept for reducing number of spurious retransmissions because it might need more than three DUPACKs for triggering fast retransmit. This monitoring node performs as centralized node as well variation amid buffer length and number of packets being sent can be predicted. This information helps in differentiating spurious retransmission from the packet loss. Originality/value Based on transmission detection, action is accomplished whether to retransmit or evade transmission. Monitoring node selection is achieved by presenting improved cuckoo search algorithm. The modified support vector machine algorithm is greatly used for variation-based spurious transmission.


Sign in / Sign up

Export Citation Format

Share Document