Severity: Warning
Message: file_get_contents(https://...@pubfacts.com&api_key=b8daa3ad693db53b1410957c26c9a51b4908&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests
Filename: helpers/my_audit_helper.php
Line Number: 176
Backtrace:
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 176
Function: file_get_contents
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 250
Function: simplexml_load_file_from_url
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3122
Function: getPubMedXML
File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global
File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword
File: /var/www/html/index.php
Line: 316
Function: require_once
The motivation for this article stems from the fact that medical image security is crucial for maintaining patient confidentiality and protecting against unauthorized access or manipulation. This paper presents a novel encryption technique that integrates the Deep Convolutional Generative Adversarial Networks (DCGAN) and Virtual Planet Domain (VPD) approach to enhance the protection of medical images. The method uses a Deep Learning (DL) framework to generate a decoy image, which forms the basis for generating encryption keys using a timestamp, nonce, and 1-D Exponential Chebyshev map (1-DEC). Experimental results validate the efficacy of the approach in safeguarding medical images from various security threats, including unauthorized access, tampering, and adversarial attacks. The randomness of the keys and encrypted images are demonstrated through the National Institute of Standards and Technology (NIST) SP 800-22 Statistical test suite provided in Tables 4 and 14, respectively. The robustness against key sensitivity, noise, cropping attacks, and adversarial attacks are shown in Figs. 15-18, 22-23, and 24. The data presented in Tables 5, 6, and 7 shows the proposed algorithm is robust and efficient in terms of time and key space complexity. Security analysis results are shown (such as histogram plots in Figs. 11-14 and correlation plots in Figs. 19-21). Information Entropy ([Formula: see text]), correlation coefficient ([Formula: see text]), Mean Square Error (MSE) ([Formula: see text]), Peak Signal to Noise Ratio (PSNR) ([Formula: see text]), Number of Pixel Change Rate (NPCR) ([Formula: see text]), and Unified Average Changing Intensity (UACI) ([Formula: see text]) underscore the high security and reliability of the encrypted images, are shown in Tables 8-11. Further, statistical NPCR and UACI are calculated in Tables 12 and 13, respectively. The proposed algorithm is also compared with existing algorithms, and compared values are provided in Table 15. The data presented in Tables 3-15 suggest that the proposed algorithm can opt for practical use.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1038/s41598-024-84186-6 | DOI Listing |
Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!