Enhanced Model for Medical Image Data Security Using Machine Learning

被引:0
作者
S. Karthiyayini [1 ]
Jeniffer John Simon Christopher [2 ]
I. Sheik Arafat [3 ]
Faizal Mukthar Hussain Syed Moomin [4 ]
机构
[1] D Institute of Science and Technology, Tamil Nadu, Chennai
[2] Department of CSE, Syed Ammal Engineering College, Tamil Nadu, Ramanathapuram
[3] D Institute of Science and Technology, Tamil Nadu, Chennai
[4] Department of CSE, Mohamed Sathak Engineering College, Tamil Nadu, Ramanathapuram
关键词
Data Security; Decryption; Encryption; KMC; Machine Learning; Medical Image; Telemedicine;
D O I
10.1007/s42979-024-03448-2
中图分类号
学科分类号
摘要
In the contemporary landscape of healthcare, the burgeoning development of Internet-based health services harnesses advancements in data communication technologies, facilitating the widespread sharing of vast medical data among professionals worldwide. Recent strides in Information Technology (IT) have significantly contributed to effective medical data management. This study addresses challenges associated with the secure transmission of medical images, highlighting potential risks such as inappropriate diagnosis reports, authentication issues, and compromised data privacy due to variations in transmitted medical data. The Enhanced Model for Medical Image Data Security (EM-MIDS) is introduced, utilizing machine learning techniques to fortify the security of medical image data. K-Means Clustering (KMC) is employed to cluster similar pixels within input medical images, forming the basis for subsequent image encryption and decryption processes. Chaotic Map and channel-based data security methodologies are integrated into the encryption and decryption procedures. For accurate classification, the model employs Random Forest (RF), while Support Vector Machine (SVM) assesses overall data security. Experimental evaluation, using benchmark medical images, comprehensively assesses EM-MIDS. Performance evaluation criteria are applied to scrutinize the model’s efficiency. Comparative analyses with existing models gauge the superiority of the proposed approach. This research contributes to establishing a robust and secure framework for medical image data transmission, addressing concerns of accuracy, privacy, and data integrity. The integration of machine learning techniques enhances the effectiveness of EM-MIDS, positioning it as a promising solution for securing medical data in the digital healthcare landscape. © The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd. 2024.
引用
收藏
相关论文
共 38 条
  • [1] Suran M., Increased use of medicare telehealth during the pandemic, JAMA, 327, 4, (2022)
  • [2] Watzlaf V.J.M., Zhou L., Dealmeida D.R., Hartman L.M., A systematic review of research studies examining telehealth privacy and security practices used by healthcare providers, Int J Telerehabil, 9, 2, pp. 39-59, (2017)
  • [3] Machine Learning Algorithms In User Authentication Schemes, 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET), Cape Town, South Africa, (2021)
  • [4] Siddiqui N., Pryor L., Dave R., User Authentication Schemes Using Machine Learning Methods—A Review, International Conference on Communication and Computational Technologies. Algorithms for Intelligent Systems, (2021)
  • [5] Shreyas K.K.M., Rajeev S., Panetta K., Agaian S.S., Fingerprint authentication using geometric features, 2017 IEEE International Symposium on Technologies for Homeland Security (HST), pp. 1-7, (2017)
  • [6] Shelton J., Et al., Palm Print Authentication on a Cloud Platform, International Conference on Advances in Big Data, Computing and Data Communication Systems (Icabcd), pp. 1-6, (2018)
  • [7] Smita K., Swati A., Shraddha P., Ketan K., Shilpa G., Thepade S.D., Iris liveness detection for biometric authentication: a systematic literature review and future directions, Inventions, 6, 4, (2021)
  • [8] Janelle M., Rushit D., Prosenjit C., Ieschecia G., Albert E., Kaushik R., An investigation of biometric authentication in the healthcare environment, Array, 8, (2020)
  • [9] Istiaque A.K., Tahir M., HadiHabaebi M., Lun Lau S., Ahad A., Machine learning for authentication and authorization in IoT: taxonomy challenges and future research direction, Sensors (Basel), 21, 15, (2021)
  • [10] Lutkepohl H., Impulse response function, Macroeconometrics and time series analysis, pp. 145-150, (2010)