Secure medical data transmission using a fusion of bit mask oriented genetic algorithm, encryption and steganography

被引:35
作者
Pandey, Hari Mohan [1 ]
机构
[1] Edge Hill Univ, Dept Comp Sci, Ormskirk, Lancs, England
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2020年 / 111卷
关键词
Bit mask oriented genetic algorithm; Mask-fill operators; Cryptography; Medical images; Genetic algorithm; Steganography; PERFORMANCE;
D O I
10.1016/j.future.2020.04.034
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a bit mask oriented genetic algorithm based secure medical data transmission mechanism. A bit mask oriented genetic algorithm (BMOGA) is utilized to reduce the replication of medical tests data which are transferred across organizations. Medical data is considered very sensitive, therefore secure medical data transmission is must. BMOGA is a variant of the traditional genetic algorithm. Literature reveals that it can avoid premature convergence - a situation when optimization algorithms get stuck at local optimum. BOMGA utilizes Boolean based mask-fill operators and performs reproduction operations in two different phases that helps to avoid premature convergence. Cryptographic features are integrated with the BMOGA for secure data transmission. The encrypted data is embedded into the medical images through 1-level and 2-level Discrete Wavelet Transform (DWT). The reverse process of the BMOGA is implemented for the extraction of secret message from the encrypted one. Numerical experiments are conducted to determine the performance of the proposed algorithm. Results reveals that the proposed algorithm is capable of secure data transmission. Performance comparison is done with the state-of-the-art algorithm with respect to the datasets. Comparative results indicated the superiority of the proposed algorithm in terms of various statistical measures such as peak signal to noise ratio (PSNR), correlation, structural content (SC), structure similarity (SSIM) and mean square error (MSE) to report the results. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:213 / 225
页数:13
相关论文
共 28 条
[1]  
[Anonymous], 2012, INT J ADV RES COMPUT, DOI DOI 10.3389/FPHYS.2012.00190
[2]  
[Anonymous], 2013, INT J EMERG TECHNOL
[3]  
Anwar A.S., 2015, INT J, V3
[4]  
Bairagi A.K., 2002, INF SECUR J GLOB PER, V25, P197
[5]  
Bashir A., 2012, INT J COMPUT APPL, V975, P8887
[6]  
Blacher J., 2013, Caregiving across the lifespan: Research, practice, policy, P21, DOI DOI 10.1007/978-1-4614-5553-0_3
[7]  
Goldberg D.E., 1988, Genetic Alg. Mach. Learn
[8]   A bit-masking oriented data structure for evolutionary operators implementation in genetic algorithms [J].
L. Iuspa ;
F. Scaramuzzino .
Soft Computing, 2001, 5 (1) :58-68
[9]  
Jain M., 2016, 2016 2 INT C CONT CO
[10]  
Laskar SA, 2012, International Journal of Database Management Systems (IJDMS), V4