Browse Items (11855 total)
Sort by:
-
Segmentation and Recognition of E. coli Bacteria Cell in Digital Microscopic Images Based on Enhanced Particle Filtering Framework
Image processing and pattern recognitions play an important role in biomedical image analysis. Using these techniques, one can aid biomedical experts to identify the microbial particles in electron microscopy images. So far, many algorithms and methods are proposed in the state-of-the-art literature. But still, the exact identification of region of interest in biomedical image is a research topic. In this paper, E. coli bacteria particle segmentation and classification is proposed. For the current research work, the hybrid algorithm is developed based on sequential importance sampling (SIS) framework, particle filtering, and Chan–Vese level set method. The proposed research work produces 95.50% of average classification accuracy. 2019, Springer Nature Singapore Pte Ltd. -
Segmentation and identification of MRI Brain segment in digital image
Brain image segmentation is important in the area of clinical diagnosis. MRI Brain image segmentation is time consuming and there is always a chance of occurrence of error when the segmentation is done manually. It is always possible to detect the infected tissues easily in the current medical field. However, the accuracy and the characteristics of abnormalities of the tissues are not precise. In the past, many researchers have identified the drawbacks of manual segmentation and hence proposed the semiautomatic and fully automatic segmentation methods in the field of medical imaging. The amount of precision about the detection of defective tissues leads to acceptance of a particular image segmentation method. In this article three segmentation methods are hybridized to get the optimum extraction of the region of interest (ROI) in brain MRI image. Further, the region properties of segment is extracted and stored as knowledgebase. The proposed algorithm integrates multiple segmentation methods and identifies the Brain Outer layer in MRI image. This identification AIDS medical experts for optimum diagnosis of defective tissues in the brain. IAEME Publication. -
Segment Anything Model (SAM) to Segment lymphocyte from Blood Smear Images
Automated lymphocyte segmentation from smear images plays an important role in disease diagnosis and monitoring, aiding in the assessment of immune system function and pathology detection. This study proposes an approach for lymphocyte segmentation utilizing Segment Anything Model (SAM) which is a deep learning model. Our method leverages a pre trained SAM architecture and fine-tunes it on a custom dataset comprising smear images containing lymphocytes. The pretrained model's ability of versatile segmentation combined with fine-tuning on the specific dataset enhances its performance in accurately identifying lymphocyte boundaries. We evaluate the proposed approach on a diverse set of smear images, demonstrating its effectiveness in segmenting lymphocytes with impressive IOU score and Dice Score. SAM deep learning model, fine-tuned on custom datasets, holds promise for robust and efficient lymphocyte segmentation from blood smear images. 2024 IEEE. -
Security Threats and Privacy Issues in Cloud Data
The quick advancement of Web-based applications has led to a huge amount of information being scanned and gathered for business examination or scholarly research purposes, which may disregard individual protection. Organizations, industries and individuals data are at stake. In this paper, utilizing on the Web Personal Health Record (PHR) as contextual analysis, first demonstrate the need of inquiry ability approval that lessens the security introduction coming about because of the list items, and build up a versatile structure for authorized private keyword Search (APKS) over encoded cloud information. This particular model proposes two novel answers for APKS given on-going cryptographic crude, hierarchical predicate encryption (HPE). Our answers empower efficient multi-dimensional watchword looks with a run question, permit assignment and renouncement of hunt abilities. Additionally, the proposed system improves the question protection which conceals clients inquiry watchwords against the server. Actualize our plan on an advanced workstation, and exploratory outcomes exhibit its appropriateness for reasonable use. Privacy has seen advancement lately as information mining of the datasets in a dispersed huge information condition has turned into a successful worldwide business which is none other than data management or data analytics which ensures the security of data. 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Security Standards in Serviced Apartments - With Special Reference to Bangalore and Chennai (South India) - An Analysis
International Journal of Research in Computer Application & Management, Vol-2 (11), pp. 130-135. ISSN-2231-1009 -
Security mechanisms in cloud computing-based big data
In the existent system, data is encrypted and stored when passed to the cloud. During any operations on the data, it is decrypted and then the computation is done. This decrypted data is vulnerable and prone to be misused. After the computations are done, the data and the result are encrypted and stored back in the cloud. This creates an overhead to the system as well as increases time complexity. With this chapter, the authors aim to reduce the overhead of the systems to perform repeated encryptions and decryptions. This can be done by allowing the computations to happen directly on the encrypted text. The result obtained by performing computations on encrypted data will be the same as the ones done on the original plain text. This new security solution is fully fit for processing and retrieval of encrypted data, effectively leading to the broad applicable project, the security of data transmission, and the storage of data. The work is secured further with additional concepts like probabilistic and time stamp-based encryption processes. 2021, IGI Global. -
Security mechanisms in cloud computing-based big data
In the existent system, data is encrypted and stored when passed to the cloud. During any operations on the data, it is decrypted and then the computation is done. This decrypted data is vulnerable and prone to be misused. After the computations are done, the data and the result are encrypted and stored back in the cloud. This creates an overhead to the system as well as increases time complexity. With this chapter, the authors aim to reduce the overhead of the systems to perform repeated encryptions and decryptions. This can be done by allowing the computations to happen directly on the encrypted text. The result obtained by performing computations on encrypted data will be the same as the ones done on the original plain text. This new security solution is fully fit for processing and retrieval of encrypted data, effectively leading to the broad applicable project, the security of data transmission, and the storage of data. The work is secured further with additional concepts like probabilistic and time stamp-based encryption processes. 2021, IGI Global. -
Security Intensification using Blockchain coupled with Internet of Things: Proposal, Challenges and Anatomization
Internet of things is an important part of our day-to-day life where all things are connected in the network with the internet. The number of devices linked to the network grows steadily each day in recent years. The innovation in the manufacturing industry also the reason for the production of different devices that uses various technologies to make a possible connection between the devices. Even though the Internet of Things has been developing and demonstrating its potential in recent years, its security when connected to the internet is in doubt. Blockchain is a disruptive technology that provides security to their network without tampering with the data in the network. Researchers and experts have recommended using the blockchain to address security vulnerabilities in the Internet of Things. In this paper, we have analyzed some of the issues which are occurring while integrating blockchain into the Internet of things. The major issues were discussed and which will be helpful to move towards the research direction to solve those problems. 2022 IEEE. -
Security Aspects for Mutation Testing in Mobile Applications
Due to the increase in the number of Android Platform Devices, there are more and more applications being developed across various domains. It is interesting to see the involvement of bugs/crashes even in the deployed applications even though it has been through various test phases. Unit tests are essential in a well-trusted testing environment; however, it does not guarantee that the range of test caries every component of the application. This writes up discusses the overview of mutation testing method concerning Android Applications. Even though mutation testing is found out to be very effective in other applications, it is not that easy to implement the same for an Android Developed Application because of additional resources it would hold. Further, various measures for mutation testing are discussed with types of mutant operators, tools etc. The current studies of mutation analysis mainly focus on testing all the functionalities irrespective of the resource usage. However, the target of the future mutation tests must be also to evaluate the efficiency of the applications under the same test cases. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Security and privacy issues in existing biometric systems and solutions
[No abstract available] -
Security and Privacy in Internet of Things (IoT) Environments
Although the proliferation of IoT devices has led to unparalleled ease of use and accessibility, it has also raised serious privacy and safety issues. Using a systematic approach that incorporates security and privacy modelling, data analysis, and empirical trials, this study provides a deep dive into the topic of IoT security and privacy. Our results show how crucial it is to take precautions against 'Information Disclosure' by using strong encryption and authorization protocols. The need to protect against 'Unencrypted Data' vulnerabilities is further emphasized by vulnerability analysis. Encryption (AES-256) and other access control rules fare very well in the assessment of security systems. Furthermore, 'Homomorphic Encryption' is identified as a potential strategy to protecting user privacy while retaining data usefulness based on our review of privacy preservation strategies. A more secure and privacyaware IoT environment may be fostered thanks to the findings of this study, which have ramifications for the industry, government, consumers, and academics. Addressing the ever-evolving security and privacy issues in the IoT will need a future focus on cutting-edge security mechanisms, privacy-preserving technology, regulatory compliance, user-centric design, multidisciplinary cooperation, and threat intelligence sharing. 2024 IEEE. -
Security and privacy aspects in intelligence systems through blockchain and explainable AI
Explainable AI (XAI) is a method of creating artificial intelligence (AI) systems that are transparent and understandable to humans. By allowing people to understand how the system arrived at its conclusions or suggestions, XAI systems strive to make AI more accountable, trustworthy, and ethical. Responsibility, trust, ethics, regulation, and innovation are some of the societal ramifications of XAI. By making AI systems more transparent, XAI fosters accountability. This means that consumers will be able to understand how the system made its decisions and hold it accountable if something goes wrong. By making the decision-making process more transparent, XAI fosters trust between people and AI systems. This boosts user trust in the system and encourages wider adoption of AI technologies. It also contributes to the ethical design of AI systems by making the decision-making process public in order to uncover and mitigate biases and other ethical issues that may occur in AI systems. It aids regulators and policymakers in understanding and regulating AI systems. XAI gives insight into how AI systems operate, which can assist regulators in developing laws that promote ethical and responsible AI use. Because XAI can help developers better and innovate new systems by making it easier for them to design new AI systems and by providing insights into how AI systems work. The proposed chapter will focus on important aspects of algorithmic bias and changing notions of privacy in XAI, which will necessitate the need for AI systems that can adapt accountability, trust, ethics, and compliance with regulations, as well as produce better innovation that can benefit humanity. More openness, greater control over personal data, new types of data privacy, and newer privacy networks are all required. To address algorithmic bias in XAI, it is critical to build the system so that it is aware of the possibility of bias and actively mitigates it. This can involve employing diverse and representative data, inspecting the system for unwanted features, offering detailed explanations, and incorporating a wide range of stakeholders in the system's development and deployment. The envisaged report provides a framework that combines XAI and blockchain to provide a secure and transparent way to store and track the provenance of data used by XAI systems, validate the performance of AI models stored on the blockchain on decentralized systems so that the models are stored and executed on a distributed network of nodes rather than a centralized server, and create a token-based economy that encourages data sharing and AI development. Tokens can be used to compensate individuals and organizations who contribute data or algorithms to the blockchain or who employ AI models stored on the blockchain. Overall, the combination of XAI and blockchain can lead to more trustworthy, transparent, and decentralized AI systems. This approach can have a significant impact on various industries such as finance, healthcare, and supply chain management by increasing efficiency, reducing costs, and improving data privacy and security. 2024 Elsevier Inc. All rights reserved. -
Security analysis in multi-tenant cloud computing healthcare system
Cloud Computing is an innovation in the field of Information Technology and in healthcare system because of the deployment models which services as profitability for the tenants. Cloud Computing is cost-effective, flexible and a delivery platform which provides business and services over internet. Multi-tenancy with its hardware sharing and high degree of configurability is utilized in cloud computing health care system even though many health care organizations are unwilling to adapt due to infrastructure and security shortcoming. In order to store the sensitive health care data cloud service providers should include promising security features where both the trusted and untrusted parties should be addressed in it. This paper addresses the security requirements and security issues in multi-tenant healthcare system, a frame is proposed for analyzing the security issues based on the available requirements and possible counter measures been suggested. The security concerns are analyzed by trust, confidentiality, integrity, audit and compliances and furthermore insight for the security is provided in multi cloud with possible security recommended for healthcare system. IAEME Publication. -
Security Analysis for a Revocable Multi-Authority ABE-Attribute-Based Mechanism
Due to the tremendous increase in data, groups or even organizations are storing data with third-party providers to solve storage problems. Ciphertext policy attribute based encryption helps to outsource data, which means encrypt the data at the data owners end and uploading it to third-party storage with some access policy. In normal Identity-based encryption, if a data owner wants to send information to a data user, it will be sent with some identity of the data user, such as mail id, so that only that particular user can read the message. The main problem is that the data owner should know each users identity. For instance, in some organizations where a data owner wants to send a message to a group of people with an identical designation, it can be sent with the help of the users attribute using attribute-based encryption. Here, the data owner does not need to know the specific details of each user; instead, with the help of attributes and the provided access policy, they can access this message. This research mainly focuses on three aspects of CP-ABE: access policy, number of attribute authorities, and revocation. When it comes to access policy, the currently existing access policies are not secure due to their linearity in nature because shares are always calculated using the same linear equation. So, for this problem, this work has developed a non-linear SS-secret-sharing model that increases the confidentiality of the model. 2024 Seventh Sense Research Group. -
Securing Trust in the Connected World: Exploring IoT Security for Privacy in Connected Environments
This abstract delves into IoT security measures to ensure privacy in connected environments. It examines encryption, authentication, access control, and data privacy techniques. Key considerations include end-to-end security, vulnerability mitigation, regulatory compliance, and user trust. By addressing these challenges, trust can be established in the connected world, enabling the widespread adoption of IoT technologies while safeguarding user privacy. 2024 IEEE. -
Securing the Digital Realm: Unmasking Fraud in Online Transactions Using Supervised Machine Learning Techniques
A key component of contemporary banking systems and e-commerce platforms is identifying fraud in online transactions. Traditional rule-based techniques are insufficient for preventing sophisticated fraud schemes because of the increasing complexity and number of expanding online transactions. This research study examines the development of fraud detection methods, emphasizing data analytics and machine learning (ML) models. The study also focuses on the fact that developing efficient fraud detection systems requires continuous observation, data preprocessing, feature selection, and testing of models. Seven ML models, Logistic Regression (LR), Decision Trees (DT), k-Nearest Neighbors (kNN), Nae Bayes (NB), Support Vector Machine (SVM), Random Forests (RF), and Extreme Gradient Boosting (XGBoost) are considered for classifying the dataset into fraudulent or not. During the experimentation study, it was observed that XGBoost yielded the highest accuracy of 99% when compared to other models. Users can determine which features significantly influence the model's predictions by using XGBoost's feature significance insights. Additionally, XGBoost provides integrated support for managing missing values in data, negating the requirement for imputation and other preprocessing procedures. Due to these, it performed better. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Securing Provenance Data with Secret Sharing Mechanism: Model Perspective
Elicitation about the genesis of an entity is referred to as provenance. With regards to data objects and their relationships the same is termed as data provenance. In majority of the instances, provenance data is sensitive and a small variation or adjustment leads to change in the entire chain of the data connected. This genesis needed to be secured and access is granted for authorized party. Individual control in preserving the privacy of data is common scenario and there are a good number of approaches with respect to cryptography. We propose a unique model, wherein the control of the data is available with multiple bodies however not with one; and when an access has to be granted for a genuine purpose, all the bodies holding their share will have to agree on a common platform. Combining these shares in a peculiar pattern allows the grant for accessing data. The method of allocating control to multiple bodies and allowing grant based on combining stakes is called as secret sharing mechanism. Division of the shares can be drawn from visual encryption approach. It provides transparencies for a given input message. This paper throws light on a framework associated to securing provenance via secret sharing security notion. 2019 IEEE. -
Securing patient information: A multilayered cryptographic approach in IoT healthcare
The increasing integration of devices utilising the of Internet of Things (IoT) in healthcare has resulted in the collection of an unparalleled volume of patient data. Personal identifiers, insurance information, medical history, and health monitoring measures are all included in a complete dataset. Ensuring security and privacy of IoT devices is crucial in the healthcare sector. The goal of this project is to combine steganography with three different cryptographic algorithms to develop a hybrid cryptographic technique. Among the algorithms under investigation are steganography, Caesar cipher, columnar transposition cipher, and one-time pad. Every encryption scheme uses three keys to encrypt patient data. The encrypted data is subsequently encoded into an image file through image-based steganography. To ensure confidentiality and authentication, an authorised user can decrypt the file through a designated decryption process, maintaining the integrity of patient data. 2025 selection and editorial matter, Keshav Kumar and Bishwajeet Kumar Pandey; individual chapters, the contributors. -
Securing medical images using encryption and LSB steganography
Medical imaging plays a vital role in the healthcare industry. Due to the advancements in the healthcare industry medical images are being transferred between geographically spread regions. As the medical images are transmitted through public networks several security challenges may arise such as authentication, integrity, and confidentiality. In this paper, the research focus is on preserving the confidentiality and integrity of the medical images. In general, integrity and confidentiality can be achieved by encryption (a piece of cryptography). To incorporate one more layer of security, steganography is applied to the medical image. In this paper, a one-time pad encryption algorithm is used to encrypt the medical image, then the encrypted image is implanted into a cover image to give a stego image making the system more resilient to the attacker. Further in this paper, the above said method is being implemented using MATLAB and the experimental results are compared with hiding the medical image using LSB steganography without encryption (one layer of security). Various formats of medical images have been taken into consideration such as DICOM, TIFF, BMP, and JPEG. Results show that the combination of encryption and steganography performs better than applying only steganography, concerning MSE and PSNR values. 2021 IEEE -
Securing iot networks using an onion routing based approach
Internet of Things (IoT) comprises of small, connected, power-efficient devices with minimal to average computing power. The devices are autonomous, cyber-physical objects capable of sensing, processing, storing and networking. Due to their connected nature, they are exposed to a huge number of threats and vulnerabilities. A new gateway to ensure anonymity in IoT networks using The Onion Router (TOR) hidden services in a Single-Board Computer (SBC) is proposed in this paper. IAEME Publication.