Search scope:
排序: Display mode:
Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data Research Articles
S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 7, Pages 940-956 doi: 10.1631/FITEE.2000071
Keywords: 医学图像加密;DNA;混沌吸引子;交叉;突变;电子医疗
Learning-based parameter prediction for quality control in three-dimensional medical image compression Research Articles
Yuxuan Hou, Zhong Ren, Yubo Tao, Wei Chen,3140104190@zju.edu.cn,renzhong@cad.zju.edu.cn
Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 9, Pages 1169-1178 doi: 10.1631/FITEE.2000234
Keywords: 医学图像压缩;高效视频编码(HEVC);质量控制;基于学习方法
A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations Research Articles
Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu,lip_chenhut@126.com
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 6, Pages 809-962 doi: 10.1631/FITEE.1900709
Keywords: 分数阶离散系统;神经网络;DNA加密;彩色图像加密
Deep Learning in Medical Ultrasound Analysis: A Review Review
Shengfeng Liu, Yi Wang, Xin Yang, Baiying Lei, Li Liu, Shawn Xiang Li, Dong Ni, Tianfu Wang
Engineering 2019, Volume 5, Issue 2, Pages 261-275 doi: 10.1016/j.eng.2018.11.020
Ultrasound (US) has become one of the most commonly performed imaging modalities in clinical practice. It is a rapidly evolving technology with certain advantages and with unique challenges that include low imaging quality and high variability. From the perspective of image analysis, it is essential to develop advanced automatic US image analysis methods to assist in US diagnosis and/or to make such assessment more objective and accurate. Deep learning has recently emerged as the leading machine learning tool in various research fields, and especially in general imaging analysis and computer vision. Deep learning also shows huge potential for various automatic US image analysis tasks. This review first briefly introduces several popular deep learning architectures, and then summarizes and thoroughly discusses their applications in various specific tasks in US image analysis, such as classification, detection, and segmentation. Finally, the open challenges and potential trends of the future application of deep learning in medical US image analysis are discussed.
Keywords: Deep learning Medical ultrasound analysis Classification Segmentation Detection
Discrete fractional watermark technique Correspondence
Zai-rong Wang, Babak Shiri, Dumitru Baleanu,wangzr@njtc.edu.cn,shire_babak@yahoo.com,dumitru@cankaya.edu.tr
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 6, Pages 809-962 doi: 10.1631/FITEE.2000133
Keywords: 离散分数阶微积分;图像加密;水印
A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services Research Article
Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE,fatma.mohammed333@gmail.com,eng.waled.elshafai@gmail.com,elsayedelrabaie@gmail.com,nfsoliman@pnu.edu.sa,fathi_sayed@yahoo.com
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 7, Pages 1045-1061 doi: 10.1631/FITEE.2200372
Keywords: Color medical image Quaternion Adaptive watermarking Encryption Fractional transform Three-dimensional chaotic logistic map (3D-CLM)
Research on Origin of Traditional Chinese Medicine
Fu Youfeng
Strategic Study of CAE 2006, Volume 8, Issue 9, Pages 1-12
Based on prototype analysis of epidemic disease and ancient therapy (such as iron method, fire moxibustion and acupuncture therapy) , the author has explored the relationship between epidemic disease (especially bubonic plague) and medicine origin. From the point of view that medicine comes of epidemic disease, the author has conducted research on rich resources of Chinese cultural relics, ancient writing and medical literature on medicine history, including the difference between ancient name and modem name of disease, difference between TCM and Western medicine in terms of methodology. It would provide precious reference for the analysis and promotion of TCM achievement on epidemic disease and for the research on combination of TCM and Western medicine, sustainable development of TCM and international promotion of TCM.
Keywords: world medicine history history of TCM medicine origin plague cholera smallpox comparative medicine
Image Engineering and Its Research Status in China
Zhang Yujin
Strategic Study of CAE 2000, Volume 2, Issue 8, Pages 91-94
This paper provides a well-regulated explanation of the definition as well as contents of image engineering, a classification of the theories of image engineering and the applications of image technology. In addition, a comprehensive survey on important Chinese publications about image engineering in the past five years is carried out. An analysis and a discussion of the statistics made on the classification results are also presented. This work shows a general and up-to-date picture of the current status, progress trends and application areas of image engineering in China. It also supplies useful information for readers doing research and/or application works in this field, and provides a helpful reference for editors of journals and potential authors of papers.
Keywords: image engineering publication survey
MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers
Mukti PADHYA, Devesh C. JINWALA
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12, Pages 1717-1748 doi: 10.1631/FITEE.1800192
Keywords: Searchable encryption Cloud storage Key-aggregate encryption Data sharing
TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion Research Article
Xiuli CHAI, Xiuhui CHEN, Yakun MA, Fang ZUO, Zhihua GAN, Yushu ZHANG,chaixiuli@henu.edu.cn,2923105987@qq.com,1060734169@qq.com,zuofang@henu.edu.cn,gzh@henu.edu.cn,yushu@nuaa.edu.cn
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 8, Pages 1169-1180 doi: 10.1631/FITEE.2200498
Keywords: Hidden Markov model Weighted diffusion Balance between usability and privacy Image encryption
A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations Research Article
Yuanyuan LI, Xiaoqing YOU, Jianquan LU, Jungang LOU,jqluma@seu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 6, Pages 813-827 doi: 10.1631/FITEE.2200645
Keywords: Compressive sensing Coupled map lattice (CML) DNA operations Semi-tensor product
The Generating Lock P<G,X,X'>and Its Central Encrypting System
Shi Kaiquan,Chen Zexiong
Strategic Study of CAE 2000, Volume 2, Issue 2, Pages 41-46
The conception of the generating lock P <G ,X, X´> and the central encrypting system composed of P<G ,X, X´>with data generating technology are proposed in this paper[3〜6]. These systems include the generating lock P<G ,X, X´> and single-tooth central encrypting system, and the generating lock P <G ,X, X´> and multi-tooth central encrypting system. The single-tooth encrypting-decrypting algorithm multi-tooth encrypting-decrypting algorithm, multi-tooth static encrypting-decrypting algorithm, multi-tooth dynamic encrypting-decrypting algorithm as well as the structure character of central encrypting system are provided. The paper points out that arbitrary two persons A and B can choose irregular distributed positive integer sets, XA={x1, x2, …,xn}, XB ={x1,x2,…xm}, m≥4, n≥4, XA≠XB , respectively and complete their secret communication with P < G, X, X´>. The experiment result shows that the method proposed has good application character and security character.
Keywords:
the generating lock
the central encrypting system
multi-tooth encrypting-decrypting algorithm
P
Will Cryptocurrencies Break the Energy Bank?
Mitch Leslie
Engineering 2020, Volume 6, Issue 5, Pages 489-490 doi: 10.1016/j.eng.2020.03.011
International Comparative Study on the Setting of Medical Specialty Catalogue and Countermeasures
Yu Zhongguang, Zhang Pengjun, Zhang Zhixin, Wang Chen
Strategic Study of CAE 2020, Volume 22, Issue 1, Pages 139-145 doi: 10.15302/J-SSCAE-2020.01.018
The medical specialty catalogue is of great significance for promoting the development of the medical discipline and cultivating qualified medical talents; therefore, a comprehensive and scientific medical specialty catalogue becomes even more important in the context of constructing first-class disciplines in colleges and universities. To promote the progressive development of medical disciplines in China, this research sorted out the medical specialty category by literature analysis, and systematically compared the features and category of medical specialty among the U.S. and the U.K. and China. Several major problems are raised as follow: non-uniform medical specialty and sub-specialty category, outdated arrangement of specialties in quantities and content, premature entry into sub-specialty training, inconsistent categories with standardized residential training, etc. To tackle the problems above, this research suggests that the medical specialty category should be in track with global standard, unified with interdisciplinary approach,and standardized admission and exit criteria be set up, which will prepare future qualified health professionals and promote the advancement of medical disciplines.
Keywords: medicine specialty catalogue clinical medicine comparative analysis
High-payload completely reversible data hiding in encrypted images by an interpolation technique Article
Di XIAO, Ying WANG, Tao XIANG, Sen BAI
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 11, Pages 1732-1743 doi: 10.1631/FITEE.1601067
Keywords: Encrypted image Data hiding Image recovery Real reversibility Interpolation
Title Author Date Type Operation
Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data
S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu
Journal Article
Learning-based parameter prediction for quality control in three-dimensional medical image compression
Yuxuan Hou, Zhong Ren, Yubo Tao, Wei Chen,3140104190@zju.edu.cn,renzhong@cad.zju.edu.cn
Journal Article
A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations
Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu,lip_chenhut@126.com
Journal Article
Deep Learning in Medical Ultrasound Analysis: A Review
Shengfeng Liu, Yi Wang, Xin Yang, Baiying Lei, Li Liu, Shawn Xiang Li, Dong Ni, Tianfu Wang
Journal Article
Discrete fractional watermark technique
Zai-rong Wang, Babak Shiri, Dumitru Baleanu,wangzr@njtc.edu.cn,shire_babak@yahoo.com,dumitru@cankaya.edu.tr
Journal Article
A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services
Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE,fatma.mohammed333@gmail.com,eng.waled.elshafai@gmail.com,elsayedelrabaie@gmail.com,nfsoliman@pnu.edu.sa,fathi_sayed@yahoo.com
Journal Article
MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data
Mukti PADHYA, Devesh C. JINWALA
Journal Article
TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion
Xiuli CHAI, Xiuhui CHEN, Yakun MA, Fang ZUO, Zhihua GAN, Yushu ZHANG,chaixiuli@henu.edu.cn,2923105987@qq.com,1060734169@qq.com,zuofang@henu.edu.cn,gzh@henu.edu.cn,yushu@nuaa.edu.cn
Journal Article
A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations
Yuanyuan LI, Xiaoqing YOU, Jianquan LU, Jungang LOU,jqluma@seu.edu.cn
Journal Article
The Generating Lock P<G,X,X'>and Its Central Encrypting System
Shi Kaiquan,Chen Zexiong
Journal Article
International Comparative Study on the Setting of Medical Specialty Catalogue and Countermeasures
Yu Zhongguang, Zhang Pengjun, Zhang Zhixin, Wang Chen
Journal Article