Resource Type

Journal Article 168

Year

2023 22

2022 15

2021 14

2020 14

2019 24

2018 14

2017 17

2016 9

2015 4

2014 2

2013 1

2012 1

2011 1

2009 2

2008 1

2007 6

2006 5

2005 2

2004 4

2003 2

open ︾

Keywords

Deep learning 5

medical education 4

Artificial intelligence 3

Attribute-based encryption 3

Cloud storage 3

Encryption 3

3D printing 2

Access control 2

Block cipher 2

Compressive sensing 2

Data hiding 2

Dictionary learning 2

High-speed railway 2

Image segmentation 2

Scaffold 2

Traditional Chinese medicine 2

heavy oil 2

3D bioprinting 1

> existence theorem 1

open ︾

Search scope:

排序: Display mode:

Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data Research Articles

S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 7,   Pages 940-956 doi: 10.1631/FITEE.2000071

Abstract: Healthcare and telemedicine industries are relying on technology that is connected to the Internet. Digital health data are more prone to cyber attacks because of the treasure trove of personal data they possess. This necessitates protection of digital medical images and their secure transmission. In this paper, an encryption technique based on mutated with Lorenz and Lü is employed to generate high pseudo-random key streams. The proposed chaos- cryptic system operates on the integer wavelet transform (IWT) domain and a bio-inspired , unit for enhancing the confusion and diffusion phase in an approximation coefficient. Finally, an XOR operation is performed with a quantised chaotic set from the developed combined attractors. The algorithm attains an average entropy of 7.9973, near-zero correlation with an NPCR of 99.642%, a UACI of 33.438%, and a keyspace of 10. Further, the experimental analyses and NIST statistical test suite have been designed such that the proposed technique has the potency to withstand any statistical, differential, and brute force attacks.

Keywords: 医学图像加密;DNA;混沌吸引子;交叉;突变;电子医疗    

Learning-based parameter prediction for quality control in three-dimensional medical image compression Research Articles

Yuxuan Hou, Zhong Ren, Yubo Tao, Wei Chen,3140104190@zju.edu.cn,renzhong@cad.zju.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 9,   Pages 1169-1178 doi: 10.1631/FITEE.2000234

Abstract: is of vital importance in compressing three-dimensional (3D) medical imaging data. Optimal compression parameters need to be determined based on the specific quality requirement. In , regarded as the state-of-the-art compression tool, the quantization parameter (QP) plays a dominant role in controlling quality. The direct application of a video-based scheme in predicting the ideal parameters for 3D cannot guarantee satisfactory results. In this paper we propose a parameter prediction scheme to achieve efficient . Its kernel is a support vector regression (SVR) based learning model that is capable of predicting the optimal QP from both video-based and structural image features extracted directly from raw data, avoiding time-consuming processes such as pre-encoding and iteration, which are often needed in existing techniques. Experimental results on several datasets verify that our approach outperforms current video-based methods.

Keywords: 医学图像压缩;高效视频编码(HEVC);质量控制;基于学习方法    

A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations Research Articles

Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu,lip_chenhut@126.com

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 6,   Pages 809-962 doi: 10.1631/FITEE.1900709

Abstract: A novel algorithm based on dynamic deoxyribonucleic acid (DNA) encoding and chaos is presented. A three-neuron fractional-order discrete Hopfield neural network (FODHNN) is employed as a pseudo-random chaotic sequence generator. Its initial value is obtained with the secret key generated by a five-parameter external key and a hash code of the plain image. The external key includes both the FODHNN discrete step size and order. The hash is computed with the SHA-2 function. This ensures a large secret key space and improves the algorithm sensitivity to the plain image. Furthermore, a new three-dimensional projection confusion method is proposed to scramble the pixels among red, green, and blue color components. DNA encoding and diffusion are used to diffuse the image information. Pseudo-random sequences generated by FODHNN are employed to determine the encoding rules for each pixel and to ensure the diversity of the encoding methods. Finally, confusion II and XOR are used to ensure the security of the encryption. Experimental results and the security analysis show that the proposed algorithm has better performance than those reported in the literature and can resist typical attacks.

Keywords: 分数阶离散系统;神经网络;DNA加密;彩色图像加密    

Deep Learning in Medical Ultrasound Analysis: A Review Review

Shengfeng Liu, Yi Wang, Xin Yang, Baiying Lei, Li Liu, Shawn Xiang Li, Dong Ni, Tianfu Wang

Engineering 2019, Volume 5, Issue 2,   Pages 261-275 doi: 10.1016/j.eng.2018.11.020

Abstract:

Ultrasound (US) has become one of the most commonly performed imaging modalities in clinical practice. It is a rapidly evolving technology with certain advantages and with unique challenges that include low imaging quality and high variability. From the perspective of image analysis, it is essential to develop advanced automatic US image analysis methods to assist in US diagnosis and/or to make such assessment more objective and accurate. Deep learning has recently emerged as the leading machine learning tool in various research fields, and especially in general imaging analysis and computer vision. Deep learning also shows huge potential for various automatic US image analysis tasks. This review first briefly introduces several popular deep learning architectures, and then summarizes and thoroughly discusses their applications in various specific tasks in US image analysis, such as classification, detection, and segmentation. Finally, the open challenges and potential trends of the future application of deep learning in medical US image analysis are discussed.

Keywords: Deep learning     Medical ultrasound analysis     Classification     Segmentation     Detection    

Discrete fractional watermark technique Correspondence

Zai-rong Wang, Babak Shiri, Dumitru Baleanu,wangzr@njtc.edu.cn,shire_babak@yahoo.com,dumitru@cankaya.edu.tr

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 6,   Pages 809-962 doi: 10.1631/FITEE.2000133

Abstract: The fractional logistic map holds rich dynamics and is adopted to generate chaotic series. A image is then encrypted and inserted into the original images. Since the encryption image takes the fractional order within (0, 1], it increases the key space and becomes difficult to attack. This study provides a robust method in the protection of the copyright of hardware, images, and other electronic files.

Keywords: 离散分数阶微积分;图像加密;水印    

A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services Research Article

Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE,fatma.mohammed333@gmail.com,eng.waled.elshafai@gmail.com,elsayedelrabaie@gmail.com,nfsoliman@pnu.edu.sa,fathi_sayed@yahoo.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 7,   Pages 1045-1061 doi: 10.1631/FITEE.2200372

Abstract: algebra has been used to apply the fractional Fourier transform (FrFT) to color images in a comprehensive approach. However, the discrete fractional random transform (DFRNT) with adequate basic randomness remains to be examined. This paper presents a novel multistage privacy system for s based on discrete fractional Fourier transform (DQFrFT) watermarking and . First, we describe DFRNT (QDFRNT), which generalizes DFRNT to handle signals effectively, and then use QDFRNT to perform . To efficiently evaluate QDFRNT, this study derives the relationship between the QDFRNT of a signal and the four components of the DFRNT signal. Moreover, it uses the human vision system’s (HVS) masking qualities of edge, texture, and color tone immediately from the color host image to adaptively modify the watermark strength for each block in the using the QDFRNT-based and support vector machine (SVM) techniques. The limitations of watermark embedding are also explained to conserve watermarking energy. Second, 3D-CLM is employed to improve the system’s security and efficiency, allowing it to be used as a multistage privacy system. The proposed security system is effective against many types of channel noise attacks, according to simulation results.

Keywords: Color medical image     Quaternion     Adaptive watermarking     Encryption     Fractional transform     Three-dimensional chaotic logistic map (3D-CLM)    

Research on Origin of Traditional Chinese Medicine

Fu Youfeng

Strategic Study of CAE 2006, Volume 8, Issue 9,   Pages 1-12

Abstract:

Based on prototype analysis of epidemic disease and ancient therapy (such as iron method, fire moxibustion and acupuncture therapy) , the author has explored the relationship between epidemic disease (especially bubonic plague) and medicine origin. From the point of view that medicine comes of epidemic disease, the author has conducted research on rich resources of Chinese cultural relics, ancient writing and medical literature on medicine history, including the difference between ancient name and modem name of disease, difference between TCM and Western medicine in terms of methodology. It would provide precious reference for the analysis and promotion of TCM achievement on epidemic disease and for the research on combination of TCM and Western medicine, sustainable development of TCM and international promotion of TCM.

Keywords: world medicine history     history of TCM     medicine origin     plague     cholera     smallpox     comparative medicine    

Image Engineering and Its Research Status in China

Zhang Yujin

Strategic Study of CAE 2000, Volume 2, Issue 8,   Pages 91-94

Abstract:

This paper provides a well-regulated explanation of the definition as well as contents of image engineering, a classification of the theories of image engineering and the applications of image technology. In addition, a comprehensive survey on important Chinese publications about image engineering in the past five years is carried out. An analysis and a discussion of the statistics made on the classification results are also presented. This work shows a general and up-to-date picture of the current status, progress trends and application areas of image engineering in China. It also supplies useful information for readers doing research and/or application works in this field, and provides a helpful reference for editors of journals and potential authors of papers.

Keywords: image engineering     publication     survey    

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers

Mukti PADHYA, Devesh C. JINWALA

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12,   Pages 1717-1748 doi: 10.1631/FITEE.1800192

Abstract: Recent attempts at key-aggregate searchable encryption (KASE) combine the advantages of searching encrypted data with support for data owners to share an aggregate searchable key with a user delegating search rights to a set of data. A user, in turn, is required to submit only one single aggregate trapdoor to the cloud to perform a keyword search across the shared set of data. However, the existing KASE methods do not support searching through data that are shared by multiple owners using a single aggregate trapdoor. Therefore, we propose a MULKASE method that allows a user to search across different data records owned by multiple users using a single trapdoor. In MULKASE, the size of the aggregate key is independent of the number of documents held by a data owner. The size of an aggregate key remains constant even though the number of outsourced ciphertexts goes beyond the predefined limit. Security analysis proves that MULKASE is secure against chosen message attacks and chosen keyword attacks. In addition, the security analysis confirms that MULKASE is secure against cross-pairing attacks and provides query privacy. Theoretical and empirical analyses show that MULKASE performs better than the existing KASE methods. We also illustrate how MULKASE can carry out federated searches.

Keywords: Searchable encryption     Cloud storage     Key-aggregate encryption     Data sharing    

TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion Research Article

Xiuli CHAI, Xiuhui CHEN, Yakun MA, Fang ZUO, Zhihua GAN, Yushu ZHANG,chaixiuli@henu.edu.cn,2923105987@qq.com,1060734169@qq.com,zuofang@henu.edu.cn,gzh@henu.edu.cn,yushu@nuaa.edu.cn

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 8,   Pages 1169-1180 doi: 10.1631/FITEE.2200498

Abstract: With the substantial increase in image transmission, the demand for image security is increasing. Noise-like images can be obtained by conventional encryption schemes, and although the security of the images can be guaranteed, the noise-like images cannot be directly previewed and retrieved. Based on the rank-then-encipher method, some researchers have designed a three-pixel exact thumbnail preserving encryption (TPE2) scheme, which can be applied to balance the security and availability of images, but this scheme has low encryption efficiency. In this paper, we introduce an efficient exact thumbnail preserving encryption scheme. First, blocking and bit-plane decomposition operations are performed on the plaintext image. The zigzag scrambling model is used to change the bit positions in the lower four bit planes. Subsequently, an operation is devised to permute the higher four bit planes, which is an extended application of the . Finally, according to the difference in bit weights in each bit plane, a bit-level rule is established to generate an encrypted image and still maintain the same sum of pixels within the block. Simulation results show that the proposed scheme improves the encryption efficiency and can guarantee the availability of images while protecting their privacy.

Keywords: Hidden Markov model     Weighted diffusion     Balance between usability and privacy     Image encryption    

A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations Research Article

Yuanyuan LI, Xiaoqing YOU, Jianquan LU, Jungang LOU,jqluma@seu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 6,   Pages 813-827 doi: 10.1631/FITEE.2200645

Abstract: In this paper, an efficient image encryption scheme based on a novel mixed linear–nonlinear coupled map lattice (NMLNCML) system and is presented. The proposed NMLNCML system strengthens the chaotic characteristics of the system, and is applicable for image encryption. The main advantages of the proposed method are embodied in its extensive key space; high sensitivity to secret keys; great resistance to chosen-plaintext attack, statistical attack, and differential attack; and good robustness to noise and data loss. Our image cryptosystem adopts the architecture of scrambling, compression, and diffusion. First, a plain image is transformed to a sparsity coefficient matrix by discrete wavelet transform, and plaintext-related Arnold scrambling is performed on the coefficient matrix. Then, (STP) is employed to compress and encrypt the coefficient matrix. Finally, the compressed coefficient matrix is diffused by DNA random encoding, DNA addition, and bit XOR operation. The NMLNCML system is applied to generate chaotic elements in the STP measurement matrix of and the pseudo-random sequence in . An SHA-384 function is used to produce plaintext secret keys and thus makes the proposed encryption algorithm highly sensitive to the original image. Simulation results and performance analyses verify the security and effectiveness of our scheme.

Keywords: Compressive sensing     Coupled map lattice (CML)     DNA operations     Semi-tensor product    

The Generating Lock P<G,X,X'>and Its Central Encrypting System

Shi Kaiquan,Chen Zexiong

Strategic Study of CAE 2000, Volume 2, Issue 2,   Pages 41-46

Abstract:

The conception of the generating lock  P <G ,X, X´> and the central encrypting system composed of P<G ,X, X´>with data generating technology are proposed in this paper[3〜6]. These systems include the generating lock P<G ,X, X´> and single-tooth central encrypting system, and the generating lock P <G ,X, X´> and multi-tooth central encrypting system. The single-tooth encrypting-decrypting algorithm multi-tooth encrypting-decrypting algorithm, multi-tooth static encrypting-decrypting algorithm, multi-tooth dynamic encrypting-decrypting algorithm as well as the structure character of central encrypting system are provided. The paper points out that arbitrary two persons A and B can choose irregular distributed positive integer sets, XA={x1, x2, …,xn}, XB ={x1,x2,…xm}, m≥4, n≥4, XAXB , respectively and complete their secret communication with P < G, X, X´>. The experiment result shows that the method proposed has good application character and security character.

Keywords: the generating lock     the central encrypting system     multi-tooth encrypting-decrypting algorithm     P    X     X'     > existence theorem     digital signature uniqueness theorem    

Will Cryptocurrencies Break the Energy Bank?

Mitch Leslie

Engineering 2020, Volume 6, Issue 5,   Pages 489-490 doi: 10.1016/j.eng.2020.03.011

International Comparative Study on the Setting of Medical Specialty Catalogue and Countermeasures

Yu Zhongguang, Zhang Pengjun, Zhang Zhixin, Wang Chen

Strategic Study of CAE 2020, Volume 22, Issue 1,   Pages 139-145 doi: 10.15302/J-SSCAE-2020.01.018

Abstract:

The medical specialty catalogue is of great significance for promoting the development of the medical discipline and cultivating qualified medical talents; therefore, a comprehensive and scientific medical specialty catalogue becomes even more important in the context of constructing first-class disciplines in colleges and universities. To promote the progressive development of medical disciplines in China, this research sorted out the medical specialty category by literature analysis, and systematically compared the features and category of medical specialty among the U.S. and the U.K. and China. Several major problems are raised as follow: non-uniform medical specialty and sub-specialty category, outdated arrangement of specialties in quantities and content, premature entry into sub-specialty training, inconsistent categories with standardized residential training, etc. To tackle the problems above, this research suggests that the medical specialty category should be in track with global standard, unified with interdisciplinary approach,and standardized admission and exit criteria be set up, which will prepare future qualified health professionals and promote the advancement of medical disciplines.

Keywords: medicine     specialty catalogue     clinical medicine     comparative analysis    

High-payload completely reversible data hiding in encrypted images by an interpolation technique Article

Di XIAO, Ying WANG, Tao XIANG, Sen BAI

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 11,   Pages 1732-1743 doi: 10.1631/FITEE.1601067

Abstract: We present a new high-payload joint reversible data-hiding scheme for encrypted images. Instead of embedding data in the encrypted image directly, the content owner first uses an interpolation technique to estimate whether the location can be used for embedding and generates a location map before encryption. Next, the data hider embeds the additional data through flipping the most significant bits (MSBs) of the encrypted image according to the location map. At the receiver side, before extracting the additional data and reconstructing the image, the receiver decrypts the image first. Experimental results demonstrate that the proposed method can achieve real reversibility, which means data extraction and image recovery are free of error. Moreover, our scheme can embed more payloads than most existing reversible data hiding schemes in encrypted images.

Keywords: Encrypted image     Data hiding     Image recovery     Real reversibility     Interpolation    

Title Author Date Type Operation

Bio-inspired cryptosystem on the reciprocal domain: DNA strands mutate to secure health data

S. Aashiq Banu, Rengarajan Amirtharajan,aashiqbanu@sastra.ac.in,amir@ece.sastra.edu

Journal Article

Learning-based parameter prediction for quality control in three-dimensional medical image compression

Yuxuan Hou, Zhong Ren, Yubo Tao, Wei Chen,3140104190@zju.edu.cn,renzhong@cad.zju.edu.cn

Journal Article

A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network and DNA sequence operations

Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu,lip_chenhut@126.com

Journal Article

Deep Learning in Medical Ultrasound Analysis: A Review

Shengfeng Liu, Yi Wang, Xin Yang, Baiying Lei, Li Liu, Shawn Xiang Li, Dong Ni, Tianfu Wang

Journal Article

Discrete fractional watermark technique

Zai-rong Wang, Babak Shiri, Dumitru Baleanu,wangzr@njtc.edu.cn,shire_babak@yahoo.com,dumitru@cankaya.edu.tr

Journal Article

A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services

Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE,fatma.mohammed333@gmail.com,eng.waled.elshafai@gmail.com,elsayedelrabaie@gmail.com,nfsoliman@pnu.edu.sa,fathi_sayed@yahoo.com

Journal Article

Research on Origin of Traditional Chinese Medicine

Fu Youfeng

Journal Article

Image Engineering and Its Research Status in China

Zhang Yujin

Journal Article

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data

Mukti PADHYA, Devesh C. JINWALA

Journal Article

TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion

Xiuli CHAI, Xiuhui CHEN, Yakun MA, Fang ZUO, Zhihua GAN, Yushu ZHANG,chaixiuli@henu.edu.cn,2923105987@qq.com,1060734169@qq.com,zuofang@henu.edu.cn,gzh@henu.edu.cn,yushu@nuaa.edu.cn

Journal Article

A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations

Yuanyuan LI, Xiaoqing YOU, Jianquan LU, Jungang LOU,jqluma@seu.edu.cn

Journal Article

The Generating Lock P<G,X,X'>and Its Central Encrypting System

Shi Kaiquan,Chen Zexiong

Journal Article

Will Cryptocurrencies Break the Energy Bank?

Mitch Leslie

Journal Article

International Comparative Study on the Setting of Medical Specialty Catalogue and Countermeasures

Yu Zhongguang, Zhang Pengjun, Zhang Zhixin, Wang Chen

Journal Article

High-payload completely reversible data hiding in encrypted images by an interpolation technique

Di XIAO, Ying WANG, Tao XIANG, Sen BAI

Journal Article