Medical Image Forgery Detection for Smart Healthcare

被引:91
作者
Ghoneim, Ahmed [1 ,2 ]
Muhammad, Ghulam [3 ]
Amin, Syed Umar [3 ]
Gupta, Brij [4 ]
机构
[1] King Saud Univ, Riyadh, Saudi Arabia
[2] Menoufia Univ, Dept Comp Sci, Shebin El Korn, Egypt
[3] King Saud Univ, Comp Engn Dept, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
[4] Natl Inst Technol, Kurukshetra, Haryana, India
关键词
SECURITY;
D O I
10.1109/MCOM.2018.1700817
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the invention of new communication technologies, new features and facilities are provided in a smart healthcare framework. The features and facilities aim to provide a seamless, easy-to-use, accurate, and real-time healthcare service to clients. As health is a sensitive issue, it should be taken care of with utmost security and caution. This article proposes a new medical image forgery detection system for the healthcare framework to verify that images related to healthcare are not changed or altered. The system works on a noise map of an image, applies a multi-resolution regression filter on the noise map, and feeds the output to support-vector-machine-based and extreme-learning-based classifiers. The noise map is created in an edge computing resource, while the filtering and classification are done in a core cloud computing resource. In this way, the system works seamlessly and in real time. The bandwidth requirement of the proposed system is also reasonable.
引用
收藏
页码:33 / 37
页数:5
相关论文
共 15 条
[1]   Face description with local binary patterns:: Application to face recognition [J].
Ahonen, Timo ;
Hadid, Abdenour ;
Pietikainen, Matti .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2006, 28 (12) :2037-2041
[2]   Security Issues and Challenges for the IoT-based Smart Grid [J].
Bekara, Chakib .
9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC'14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC'14) / AFFILIATED WORKSHOPS, 2014, 34 :532-537
[3]   WLD: A Robust Local Image Descriptor [J].
Chen, Jie ;
Shan, Shiguang ;
He, Chu ;
Zhao, Guoying ;
Pietikainen, Matti ;
Chen, Xilin ;
Gao, Wen .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2010, 32 (09) :1705-1720
[4]  
Dong Jing., 2011, CASIA TAMPERED IMAGE
[5]   Reversible data hiding with contrast enhancement and tamper localization for medical images [J].
Gao, Guangyong ;
Wan, Xiangdong ;
Yao, Shimao ;
Cui, Zongmin ;
Zhou, Caixue ;
Sung, Xingming .
INFORMATION SCIENCES, 2017, 385 :250-265
[6]  
Heath M., 2000, INT WORK DIG MAMM, V212-8
[7]   TOWARD END-TO-END BIOMETRICS-BASED SECURITY FOR IOT INFRASTRUCTURE [J].
Hossain, M. Shamim ;
Muhammad, Ghulam ;
Rahman, Sk Md Mizanur ;
Abdul, Wadood ;
Alelaiwi, Abdulhameed ;
Alamri, Atif .
IEEE WIRELESS COMMUNICATIONS, 2016, 23 (05) :44-51
[8]   Audio-Visual Emotion-Aware Cloud Gaming Framework [J].
Hossain, M. Shamim ;
Muhammad, Ghulam ;
Song, Biao ;
Hassan, Mohammad Mehedi ;
Alelaiwi, Abdulhameed ;
Alamri, Atif .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2015, 25 (12) :2105-2118
[9]   Extreme Learning Machine for Regression and Multiclass Classification [J].
Huang, Guang-Bin ;
Zhou, Hongming ;
Ding, Xiaojian ;
Zhang, Rui .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2012, 42 (02) :513-529
[10]   Image forgery detection using steerable pyramid transform and local binary pattern [J].
Muhammad, Ghulam ;
Al-Hammadi, Munner H. ;
Hussain, Muhammad ;
Bebis, George .
MACHINE VISION AND APPLICATIONS, 2014, 25 (04) :985-995