Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 11 de 11
Filter
Add more filters










Publication year range
1.
Sci Rep ; 14(1): 10871, 2024 05 13.
Article in English | MEDLINE | ID: mdl-38740777

ABSTRACT

Reinforcement of the Internet of Medical Things (IoMT) network security has become extremely significant as these networks enable both patients and healthcare providers to communicate with each other by exchanging medical signals, data, and vital reports in a safe way. To ensure the safe transmission of sensitive information, robust and secure access mechanisms are paramount. Vulnerabilities in these networks, particularly at the access points, could expose patients to significant risks. Among the possible security measures, biometric authentication is becoming a more feasible choice, with a focus on leveraging regularly-monitored biomedical signals like Electrocardiogram (ECG) signals due to their unique characteristics. A notable challenge within all biometric authentication systems is the risk of losing original biometric traits, if hackers successfully compromise the biometric template storage space. Current research endorses replacement of the original biometrics used in access control with cancellable templates. These are produced using encryption or non-invertible transformation, which improves security by enabling the biometric templates to be changed in case an unwanted access is detected. This study presents a comprehensive framework for ECG-based recognition with cancellable templates. This framework may be used for accessing IoMT networks. An innovative methodology is introduced through non-invertible modification of ECG signals using blind signal separation and lightweight encryption. The basic idea here depends on the assumption that if the ECG signal and an auxiliary audio signal for the same person are subjected to a separation algorithm, the algorithm will yield two uncorrelated components through the minimization of a correlation cost function. Hence, the obtained outputs from the separation algorithm will be distorted versions of the ECG as well as the audio signals. The distorted versions of the ECG signals can be treated with a lightweight encryption stage and used as cancellable templates. Security enhancement is achieved through the utilization of the lightweight encryption stage based on a user-specific pattern and XOR operation, thereby reducing the processing burden associated with conventional encryption methods. The proposed framework efficacy is demonstrated through its application on the ECG-ID and MIT-BIH datasets, yielding promising results. The experimental evaluation reveals an Equal Error Rate (EER) of 0.134 on the ECG-ID dataset and 0.4 on the MIT-BIH dataset, alongside an exceptionally large Area under the Receiver Operating Characteristic curve (AROC) of 99.96% for both datasets. These results underscore the framework potential in securing IoMT networks through cancellable biometrics, offering a hybrid security model that combines the strengths of non-invertible transformations and lightweight encryption.


Subject(s)
Computer Security , Electrocardiography , Internet of Things , Electrocardiography/methods , Humans , Algorithms , Signal Processing, Computer-Assisted , Biometric Identification/methods
2.
Opt Express ; 31(3): 3927-3944, 2023 Jan 30.
Article in English | MEDLINE | ID: mdl-36785373

ABSTRACT

Recently, biometrics has become widely used in applications to verify an individual's identity. To address security issues, biometrics presents an intriguing window of opportunity to enhance the usability and security of the Internet of Things (IoT) and other systems. It can be used to secure a variety of newly emerging IoT devices. However, biometric scenarios need more protection against different hacking attempts. Various solutions are introduced to secure biometrics. Cryptosystems, cancelable biometrics, and hybrid systems are efficient solutions for template protection. The new trend in biometric authentication systems is to use bio-signals. In this paper, two proposed authentication systems are introduced based on bio-signals. One of them is unimodal, while the other is multimodal. Protected templates are obtained depending on encryption. The deoxyribonucleic acid (DNA) encryption is implemented on the obtained optical spectrograms of bio-signals. The authentication process relies on the DNA sensitivity to variations in the initial values. In the multimodal system, the singular value decomposition (SVD) algorithm is implemented to merge bio-signals. Different evaluation metrics are used to assess the performance of the proposed systems. Simulation results prove the high accuracy and efficiency of the proposed systems as the equal error rate (EER) value is close to 0 and the area under the receiver operator characteristic curve (AROC) is close to 1. The false accept rate (FAR), false reject rate (FRR), and decidability (D) are also estimated with acceptable results of 1.6 × 10-8, 9.05 × 10-6, and 29.34, respectively. Simulation results indicate the performance stability of the proposed systems in the presence of different levels of noise.


Subject(s)
Biometric Identification , Biometry , Biometry/methods , Biometric Identification/methods , Algorithms , Computer Simulation , DNA
3.
Opt Express ; 30(21): 37816-37832, 2022 Oct 10.
Article in English | MEDLINE | ID: mdl-36258363

ABSTRACT

The security issue is essential in the Internet-of-Things (IoT) environment. Biometrics play an important role in securing the emerging IoT devices, especially IoT robots. Biometric identification is an interesting candidate to improve IoT usability and security. To access and control sensitive environments like IoT, passwords are not recommended for high security levels. Biometrics can be used instead, but more protection is needed to store original biometrics away from invaders. This paper presents a cancelable multimodal biometric recognition system based on encryption algorithms and watermarking. Both voice-print and facial images are used as individual biometrics. Double Random Phase Encoding (DRPE) and chaotic Baker map are utilized as encryption algorithms. Verification is performed by estimating the correlation between registered and tested models in their cancelable format. Simulation results give Equal Error Rate (EER) values close to zero and Area under the Receiver Operator Characteristic Curve (AROC) equal to one, which indicates the high performance of the proposed system in addition to the difficulty to invert cancelable templates. Moreover, reusability and diversity of biometric templates is guaranteed.

4.
Int J Numer Method Biomed Eng ; 38(1): e3530, 2022 01.
Article in English | MEDLINE | ID: mdl-34506081

ABSTRACT

Deep learning is one of the most promising machine learning techniques that revolutionalized the artificial intelligence field. The known traditional and convolutional neural networks (CNNs) have been utilized in medical pattern recognition applications that depend on deep learning concepts. This is attributed to the importance of anomaly detection (AD) in automatic diagnosis systems. In this paper, the AD is performed on medical electroencephalography (EEG) signal spectrograms and medical corneal images for Internet of medical things (IoMT) systems. Deep learning based on the CNN models is employed for this task with training and testing phases. Each input image passes through a series of convolution layers with different kernel filters. For the classification task, pooling and fully-connected layers are utilized. Computer simulation experiments reveal the success and superiority of the proposed models for automated medical diagnosis in IoMT systems.


Subject(s)
Artificial Intelligence , Neural Networks, Computer , Computer Simulation , Internet , Machine Learning
5.
Comput Intell Neurosci ; 2021: 8016525, 2021.
Article in English | MEDLINE | ID: mdl-34938329

ABSTRACT

Smart health surveillance technology has attracted wide attention between patients and professionals or specialists to provide early detection of critical abnormal situations without the need to be in direct contact with the patient. This paper presents a secure smart monitoring portable multivital signal system based on Internet-of-Things (IoT) technology. The implemented system is designed to measure the key health parameters: heart rate (HR), blood oxygen saturation (SpO2), and body temperature, simultaneously. The captured physiological signals are processed and encrypted using the Advanced Encryption Standard (AES) algorithm before sending them to the cloud. An ESP8266 integrated unit is used for processing, encryption, and providing connectivity to the cloud over Wi-Fi. On the other side, trusted medical organization servers receive and decrypt the measurements and display the values on the monitoring dashboard for the authorized specialists. The proposed system measurements are compared with a number of commercial medical devices. Results demonstrate that the measurements of the proposed system are within the 95% confidence interval. Moreover, Root Mean Squared Error (RMSE), Mean Absolute Error (MAE), and Mean Relative Error (MRE) for the proposed system are calculated as 1.44, 1.12, and 0.012, respectively, for HR, 1.13, 0.92, and 0.009, respectively, for SpO2, and 0.13, 0.11, and 0.003, respectively, for body temperature. These results demonstrate the high accuracy and reliability of the proposed system.


Subject(s)
Cloud Computing , Internet of Things , Communication , Humans , Oxygen Saturation , Reproducibility of Results
6.
PLoS One ; 16(5): e0251899, 2021.
Article in English | MEDLINE | ID: mdl-34014987

ABSTRACT

Computer aided diagnosis (CAD) of biomedical images assists physicians for a fast facilitated tissue characterization. A scheme based on combining fuzzy logic (FL) and deep learning (DL) for automatic semantic segmentation (SS) of tumors in breast ultrasound (BUS) images is proposed. The proposed scheme consists of two steps: the first is a FL based preprocessing, and the second is a Convolutional neural network (CNN) based SS. Eight well-known CNN based SS models have been utilized in the study. Studying the scheme was by a dataset of 400 cancerous BUS images and their corresponding 400 ground truth images. SS process has been applied in two modes: batch and one by one image processing. Three quantitative performance evaluation metrics have been utilized: global accuracy (GA), mean Jaccard Index (mean intersection over union (IoU)), and mean BF (Boundary F1) Score. In the batch processing mode: quantitative metrics' average results over the eight utilized CNNs based SS models over the 400 cancerous BUS images were: 95.45% GA instead of 86.08% without applying fuzzy preprocessing step, 78.70% mean IoU instead of 49.61%, and 68.08% mean BF score instead of 42.63%. Moreover, the resulted segmented images could show tumors' regions more accurate than with only CNN based SS. While, in one by one image processing mode: there has been no enhancement neither qualitatively nor quantitatively. So, only when a batch processing is needed, utilizing the proposed scheme may be helpful in enhancing automatic ss of tumors in BUS images. Otherwise applying the proposed approach on a one-by-one image mode will disrupt segmentation's efficiency. The proposed batch processing scheme may be generalized for an enhanced CNN based SS of a targeted region of interest (ROI) in any batch of digital images. A modified small dataset is available: https://www.kaggle.com/mohammedtgadallah/mt-small-dataset (S1 Data).


Subject(s)
Breast Neoplasms/diagnostic imaging , Image Processing, Computer-Assisted/statistics & numerical data , Mammography/methods , Ultrasonography/statistics & numerical data , Breast Neoplasms/pathology , Deep Learning , Female , Fuzzy Logic , Humans , Models, Theoretical , Semantic Web
7.
Appl Opt ; 60(13): 3659-3667, 2021 May 01.
Article in English | MEDLINE | ID: mdl-33983298

ABSTRACT

This paper presents a new trend in biometric security systems, which is cancelable multi-biometrics. In general, traditional biometric systems depend on a single biometric for identification. These traditional systems are subject to different types of attacks. In addition, a biometric signature may be lost in hacking scenarios; for example, in the case of intrusion, biometric signatures can be stolen forever. To reduce the risk of losing biometric signatures, the trend of cancelable biometrics has evolved by using either deformed or encrypted versions of biometrics for verification. In this paper, several biometric traits for the same person are treated to obtain a single cancelable template. First, optical scanning holography (OSH) is applied during the acquisition of each biometric. The resulting outputs are then compressed simultaneously to generate a unified template based on the energy compaction property of the discrete cosine transform (DCT). Hence, the OSH is used in the proposed approach as a tool to generate deformed versions of human biometrics in order to get the unified biometric template through DCT compression. With this approach, we guarantee the possibility of using multiple biometrics of the same user to increase security, as well as privacy of the new biometric template through utilization of the OSH. Simulation results prove the robustness of the proposed cancelable multi-biometric approach in noisy environments.


Subject(s)
Biometry/methods , Computer Security , Data Compression/methods , Holography/methods , Computer Simulation , Dermatoglyphics , Hand , Humans , Iris , ROC Curve
8.
Int J Numer Method Biomed Eng ; 37(8): e3449, 2021 08.
Article in English | MEDLINE | ID: mdl-33599091

ABSTRACT

Brain tumor is a mass of anomalous cells in the brain. Medical imagining techniques have a vital role in the diagnosis of brain tumors. Magnetic Resonance Imaging (MRI) and Computed Tomography (CT) techniques are the most popular techniques to localize the tumor area. Brain tumor segmentation is very important for the diagnosis of tumors. In this paper, we introduce a framework to perform brain tumor segmentation, and then localize the region of the tumor, accurately. The proposed framework begins with the fusion of MR and CT images by the Non-Sub-Sampled Shearlet Transform (NSST) with the aid of the Modified Central Force Optimization (MCFO) to get the optimum fusion result from the quality metrics perspective. After that, image interpolation is applied to obtain a High-Resolution (HR) image from the Low-Resolution (LR) ones. The objective of the interpolation process is to enrich the details of the fusion result prior to segmentation. Finally, the threshold and the watershed segmentation are applied sequentially to localize the tumor region, clearly. The proposed framework enhances the efficiency of segmentation to help the specialists diagnose brain tumors.


Subject(s)
Algorithms , Brain Neoplasms , Brain/diagnostic imaging , Brain Neoplasms/diagnostic imaging , Humans , Image Processing, Computer-Assisted , Magnetic Resonance Imaging , Tomography, X-Ray Computed
9.
Microsc Res Tech ; 84(3): 394-414, 2021 Mar.
Article in English | MEDLINE | ID: mdl-33350559

ABSTRACT

Automatic detection of maculopathy disease is a very important step to achieve high-accuracy results for the early discovery of the disease to help ophthalmologists to treat patients. Manual detection of diabetic maculopathy needs much effort and time from ophthalmologists. Detection of exudates from retinal images is applied for the maculopathy disease diagnosis. The first proposed framework in this paper for retinal image classification begins with fuzzy preprocessing in order to improve the original image to enhance the contrast between the objects and the background. After that, image segmentation is performed through binarization of the image to extract both blood vessels and the optic disc and then remove them from the original image. A gradient process is performed on the retinal image after this removal process for discrimination between normal and abnormal cases. Histogram of the gradients is estimated, and consequently the cumulative histogram of gradients is obtained and compared with a threshold cumulative histogram at certain bins. To determine the threshold cumulative histogram, cumulative histograms of images with exudates and images without exudates are obtained and averaged for each type, and the threshold cumulative histogram is set as the average of both cumulative histograms. Certain histogram bins are selected and thresholded according to the estimated threshold cumulative histogram, and the results are used for retinal image classification. In the second framework in this paper, a Convolutional Neural Network (CNN) is utilized to classify normal and abnormal cases.


Subject(s)
Diabetic Retinopathy , Optic Disk , Retinal Diseases , Algorithms , Diabetic Retinopathy/diagnostic imaging , Humans , Neural Networks, Computer , Retinal Diseases/diagnostic imaging
10.
J Opt Soc Am A Opt Image Sci Vis ; 37(11): C118-C124, 2020 Nov 01.
Article in English | MEDLINE | ID: mdl-33175740

ABSTRACT

A contact-free inexpensive measurement system with an algorithm based on the integral form of video frames is proposed to estimate the respiration rate from an extracted respiration pattern. The proposed algorithm is applied and tested on 28 videos of sleeping-simulated positions, and the results are compared with the manual visual inspection values. With linear regression, the determination coefficient (R2) is 0.961, which demonstrates high agreement with reference measurements. In addition, the Bland-Altman plot shows that almost all data points are within the 95% limits of agreement. Moreover, the time complexity of the proposed algorithm, which involves taking just a single point value of the integral image, is lower than that of traditional methods that circulate over a large number of points. In other words, the proposed algorithm achieves O(1) fixed-time complexity compared to O(N2) for traditional methods. The average speed of processing is enhanced by about 17.4%.


Subject(s)
Monitoring, Physiologic/methods , Respiratory Rate , Video Recording , Algorithms , Humans , Telemedicine , Time Factors
11.
Appl Opt ; 57(35): 10305-10316, 2018 Dec 10.
Article in English | MEDLINE | ID: mdl-30645240

ABSTRACT

Most modern security systems depend on biometrics. Unfortunately, these systems have suffered from hacking trials. If the biometric databases have been hacked and stolen, the biometrics saved in these databases will be lost forever. Thus, there is a desperate need to develop new cancelable biometric systems. The basic concept of cancelable biometrics is to use another version of the original biometric template created through a one-way transform or an encryption scheme to keep the original biometrics safe and away from utilization in the system. In this paper, the optical double random phase encoding (DRPE) algorithm is utilized for cancelable face and iris recognition systems. In the proposed cancelable face recognition scheme, the scale invariant feature transform is used for feature extraction from the face images. The extracted feature map is encrypted with the DRPE algorithm. The proposed cancelable iris recognition system depends on the utilization of two iris images for the same person and features are extracted from both images. The features extracted from one of the iris images are encrypted with the DRPE algorithm, provided that the second phase mask used in the DRPE is generated from the other iris image features. This trend guarantees some sort of feature fusion between the two iris images into a single cancelable iris code and increases user privacy. Simulation results show good performance of the two proposed cancelable biometric schemes even in the presence of noise, especially with the proposed cancelable face recognition scheme.


Subject(s)
Biometric Identification/methods , Facial Recognition , Iris/anatomy & histology , Algorithms , Artificial Intelligence , Humans , Pattern Recognition, Automated/methods
SELECTION OF CITATIONS
SEARCH DETAIL
...