1
|
Tahiri MA, Karmouni H, Sayyouri M, Qjidaa H, Ahmad M, Hammad M, Pławiak P, Alfarraj O, El-Latif AAA. An improved reversible watermarking scheme using embedding optimization and quaternion moments. Sci Rep 2024; 14:18485. [PMID: 39122777 PMCID: PMC11315939 DOI: 10.1038/s41598-024-69511-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/09/2024] [Accepted: 08/06/2024] [Indexed: 08/12/2024] Open
Abstract
Digital watermarking of images is an essential method for copyright protection and image security. This paper presents an innovative, robust watermarking system for color images based on moment and wavelet transformations, algebraic decompositions, and chaotic systems. First, we extended classical Charlier moments to quaternary Charlier moments (QCM) using quaternion algebra. This approach eliminates the need to decompose color images before applying the discrete wavelet transform (DWT), reducing the computational load. Next, we decompose the resulting DWT matrix using QR and singular value decomposition (SVD). To enhance the system's security and robustness, we introduce a modified version of Henon's 2D chaotic map. Finally, we integrate the arithmetic optimization algorithm to ensure dynamic and adaptive watermark insertion. Our experimental results demonstrate that our approach outperforms current color image watermarking methods in security, storage capacity, and resistance to various attacks, while maintaining a high level of invisibility.
Collapse
Affiliation(s)
- Mohamed Amine Tahiri
- Engineering, Systems and Applications Laboratory, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University, Fez, Morocco
| | - Hicham Karmouni
- National School of Applied Sciences, Cadi Ayyad University, 40000, Marrakech, Morocco
| | - Mhamed Sayyouri
- Engineering, Systems and Applications Laboratory, National School of Applied Sciences, Sidi Mohamed Ben Abdellah University, Fez, Morocco
| | - Hassan Qjidaa
- Laboratory of Electronic Signals and Systems of Information, Sidi Mohamed Ben Abdellah-Fez University, Fez, Morocco
| | - Musheer Ahmad
- Department of Computer Engineering, Jamia Millia Islamia, New Delhi, 110025, India
| | - Mohamed Hammad
- Department of Information Technology, Faculty of Computers and Information, Menoufia University, Shibin El Kom, 32511, Egypt
| | - Paweł Pławiak
- Department of Computer Science, Faculty of Computer Science and Telecommunications, Cracow University of Technology, Warszawska 24, 31-155, Krakow, Poland
- Institute of Theoretical and Applied Informatics, Polish Academy of Sciences, Bałtycka 5, 44-100, Gliwice, Poland
| | - Osama Alfarraj
- Computer Science Department, Community College, King Saud University, 11437, Riyadh, Saudi Arabia
| | - Ahmed A Abd El-Latif
- Jadara University Research Center, Jadara University, Irbid, Jordan.
- Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shibin el Kom, 32511, Egypt.
| |
Collapse
|
2
|
Ramos AM, Artiles JAP, Chaves DPB, Pimentel C. A Fragile Image Watermarking Scheme in DWT Domain Using Chaotic Sequences and Error-Correcting Codes. ENTROPY (BASEL, SWITZERLAND) 2023; 25:508. [PMID: 36981397 PMCID: PMC10048114 DOI: 10.3390/e25030508] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/27/2023] [Revised: 03/13/2023] [Accepted: 03/14/2023] [Indexed: 06/18/2023]
Abstract
With the rapid development of digital signal processing tools, image contents can be easily manipulated or maliciously tampered with. Fragile watermarking has been largely used for content authentication purposes. This article presents a new proposal for image fragile watermarking algorithms for tamper detection and image recovery. The watermarked bits are obtained from the parity bits of an error-correcting code whose message is formed from a binary chaotic sequence (generated from a secret key known to all legitimate users) and from bits of the original image. Part of the codeword (the chaotic bits) is perfectly known to these users during the extraction phase, adding security and robustness to the watermarking method. The watermarked bits are inserted at specific sub-bands of the discrete wavelet transform of the original image and are used as authentication bits for the tamper detection process. The imperceptibility, detection, and recovery of this algorithm are tested for various common attacks over digital images. The proposed algorithm is analyzed for both grayscale and colored images. Comparison results reveal that the proposed technique performs better than some existing methods.
Collapse
|
3
|
Alshathri S, Hemdan EED. An efficient audio watermarking scheme with scrambled medical images for secure medical internet of things systems. MULTIMEDIA TOOLS AND APPLICATIONS 2023; 82:20177-20195. [PMID: 36685016 PMCID: PMC9838508 DOI: 10.1007/s11042-023-14357-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/24/2022] [Revised: 07/06/2022] [Accepted: 01/02/2023] [Indexed: 06/17/2023]
Abstract
In recent times, the security of communication channels between healthcare entities in Medical Internet of Things (MIoT) systems becomes a significant issue to facilitate and guarantee the exchange of medical image and expertise securely. This paper presents an efficient audio watermarking scheme employing professionally Wavelet-based Image Fusion, Arnold transforms, and Singular Value Decomposition (SVD) for the secure transmission of medical images and reports in the MIoT applications. The essential consequence of the proposed scheme is to first syndicate two medical watermarks into a fused watermark to upsurge the payload of the inserted medical images. The fused watermark is then scrambled utilizing Arnold transform. Lastly, the Arnold fused watermark is inserted in the audio signal using the SVD algorithm following converting it into a 2D format. The choice of the Arnold transform for watermark is ascribed to settling robustness that skirmishes respective types of severe attacks. Several assessment metrics such as SNR, LLR, SNRseg, SD, and Cr are used to evaluate the audio watermarked signal and extracted watermarks The results reveal that the proposed audio watermarking scheme increases the capacity with more embedded medical images and security of implanted medical images transmission deprived of affecting the quality of audio signals, especially for IoT-based Telemedicine systems.
Collapse
Affiliation(s)
- Samah Alshathri
- Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O.Box 84428, Riyadh, 11671 Saudi Arabia
| | - Ezz El-Din Hemdan
- Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt
| |
Collapse
|
4
|
El-Shafai W, Khallaf F, M. El-Rabaie ES, E. Abd El-Samie F, Almomani I. A Multi-Stage Security Solution for Medical Color Images in Healthcare Applications. COMPUTER SYSTEMS SCIENCE AND ENGINEERING 2023; 46:3599-3618. [DOI: 10.32604/csse.2023.037655] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/12/2022] [Accepted: 02/02/2023] [Indexed: 09/02/2023]
|
5
|
Bhattacharjee S, Gupta M, Chatterjee B. Time Efficient Image Encryption-Decryption for Visible and COVID-19 X-ray Images Using Modified Chaos-Based Logistic Map. Appl Biochem Biotechnol 2022; 195:2395-2413. [PMID: 36152105 PMCID: PMC9510176 DOI: 10.1007/s12010-022-04161-7] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Accepted: 08/28/2022] [Indexed: 11/26/2022]
Abstract
In this pandemic situation, radiological images are the biggest source of information in healthcare and, at the same time, one of the foremost troublesome sources to analyze. Clinicians now-a-days must depend to a great extent on therapeutic image investigation performed by exhausted radiologists and some of the time analyzed and filtered themselves. Due to an overflow of patients, transmission of these medical data becomes frequent and maintaining confidentiality turns out to be one of the most important aspects of security along with integrity and availability. Chaos-based cryptography has proven a useful technique in the process of medical image encryption. The specialty of using chaotic maps in image security is its capability to increase the unpredictability and this causes the encryption robust. There are large number of literature available with chaotic map; however, most of these are not useful in low-precision devices due to their time-consuming nature. Taking into consideration of all these facts, a modified encryption technique is proposed for 2D COVID-19 images without compromising security. The novelty of the encryption procedure lies in the proposed design which is split into mainly three parts. In the first part, a variable length gray level code is used to generate the secret key to confuse the intruder and subsequently it is used as the initial parameter of both the chaotic maps. In the second part, one-stage image pixels are shuffled using the address code obtained from the sorting transformation of the first logistic map. In the final stage, a complete diffusion is applied for the whole image using the second chaotic map to counter differential and statistical attack. Algorithm validation is done by experimentation with visual image and COVID-19 X-ray images. In addition, a quantitative analysis is carried out to ensure a negligible data loss between the original and the decrypted image. The strength of the proposed method is tested by calculating the various security parameters like correlation coefficient, NPCR, UACI, and key sensitivity. Comparison analysis shows the effectiveness for the proposed method. Implementation statistics shows time efficiency and proves more security with better unpredictability.
Collapse
Affiliation(s)
| | - Mousumi Gupta
- Sikkim Manipal Institute of Technology, Rangpo, India
| | | |
Collapse
|
6
|
Khafaga DS, Karim FK, Darwish MM, Hosny KM. Robust Zero-Watermarking of Color Medical Images Using Multi-Channel Gaussian-Hermite Moments and 1D Chebyshev Chaotic Map. SENSORS (BASEL, SWITZERLAND) 2022; 22:5612. [PMID: 35957177 PMCID: PMC9371225 DOI: 10.3390/s22155612] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 06/20/2022] [Revised: 07/22/2022] [Accepted: 07/23/2022] [Indexed: 06/15/2023]
Abstract
Copyright protection of medical images is a vital goal in the era of smart healthcare systems. In recent telemedicine applications, medical images are sensed using medical imaging devices and transmitted to remote places for screening by physicians and specialists. During their transmission, the medical images could be tampered with by intruders. Traditional watermarking methods embed the information in the host images to protect the copyright of medical images. The embedding destroys the original image and cannot be applied efficiently to images used in medicine that require high integrity. Robust zero-watermarking methods are preferable over other watermarking algorithms in medical image security due to their outstanding performance. Most existing methods are presented based on moments and moment invariants, which have become a prominent method for zero-watermarking due to their favorable image description capabilities and geometric invariance. Although moment-based zero-watermarking can be an effective approach to image copyright protection, several present approaches cannot effectively resist geometric attacks, and others have a low resistance to large-scale attacks. Besides these issues, most of these algorithms rely on traditional moment computation, which suffers from numerical error accumulation, leading to numerical instabilities, and time consumption and affecting the performance of these moment-based zero-watermarking techniques. In this paper, we derived multi-channel Gaussian-Hermite moments of fractional-order (MFrGHMs) to solve the problems. Then we used a kernel-based method for the highly accurate computation of MFrGHMs to solve the computation issue. Then, we constructed image features that are accurate and robust. Finally, we presented a new zero-watermarking scheme for color medical images using accurate MFrGHMs and 1D Chebyshev chaotic features to achieve lossless copyright protection of the color medical images. We performed experiments where their outcomes ensure the robustness of the proposed zero-watermarking algorithms against various attacks. The proposed zero-watermarking algorithm achieves a good balance between robustness and imperceptibility. Compared with similar existing algorithms, the proposed algorithm has superior robustness, security, and time computation.
Collapse
Affiliation(s)
- Doaa Sami Khafaga
- Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia;
| | - Faten Khalid Karim
- Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia;
| | | | - Khalid M. Hosny
- Department of Information Technology, Zagazig University, Zagazig 44519, Egypt;
| |
Collapse
|
7
|
A new statistical image watermark detector in RHFMs domain using beta-exponential distribution. Soft comput 2022. [DOI: 10.1007/s00500-022-06836-z] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
|
8
|
Alahmadi DH, Baothman FA, Alrajhi MM, Alshahrani FS, Albalawi HZ. Comparative analysis of blockchain technology to support digital transformation in ports and shipping. JOURNAL OF INTELLIGENT SYSTEMS 2021. [DOI: 10.1515/jisys-2021-0131] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/23/2022] Open
Abstract
Abstract
Blockchain is one of the technologies that can support digital transformation in industries in many aspects. This sophisticated technology can provide a decentralized, transparent, and secure environment for organizations and businesses. This review article discusses the adoption of blockchain in the ports and shipping industry to support digital transformation. It also explores the integration of this technology into the current ports and shipping ecosystem. Besides, the study highlighted the situation of the supply chains management in ports and shipping domain as a case study in this field. The investigated studies show that blockchain can be integrated into processes such as financial and document workflow. This review contributes to research by focusing on the adoption of blockchain in the ports and shipping industry to support digital transformation. It also aims to understand the existing port practice and map it with current tendencies based on blockchain. This study gives insight analysis to incorporate blockchain technology into ports and shipping processes globally.
Collapse
Affiliation(s)
- Dimah H. Alahmadi
- Department of Information Systems, Faculty of Computing & Information Technology, King Abdulaziz University , Jeddah , 21431 , Kingdom of Saudi Arabia
| | - Fatmah Abdulrahman Baothman
- Department of Information Systems, Faculty of Computing & Information Technology, King Abdulaziz University , Jeddah , 21431 , Kingdom of Saudi Arabia
| | - Mona M. Alrajhi
- Department of Information Systems, Faculty of Computing & Information Technology, King Abdulaziz University , Jeddah , 21431 , Kingdom of Saudi Arabia
| | - Fatimah S. Alshahrani
- Department of Information Systems, Faculty of Computing & Information Technology, King Abdulaziz University , Jeddah , 21431 , Kingdom of Saudi Arabia
| | - Hawazin Z. Albalawi
- Department of Information Systems, Faculty of Computing & Information Technology, King Abdulaziz University , Jeddah , 21431 , Kingdom of Saudi Arabia
| |
Collapse
|
9
|
Wei X, Zhang W, Yang B, Wang J, Xia Z. Fragile Watermark in Medical Image Based on Prime Number Distribution Theory. J Digit Imaging 2021; 34:1447-1462. [PMID: 34725766 DOI: 10.1007/s10278-021-00524-4] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/23/2021] [Revised: 09/29/2021] [Accepted: 10/07/2021] [Indexed: 11/30/2022] Open
Abstract
The research of medical image in the field of anti-counterfeiting and authentication plays a crucial role in the development of hospital digitization. In this paper, a new fragile medical watermarking scheme is proposed using the prime number distribution theorem, chaotic mapping, and Hash. Firstly, an approximate pixel set is constructed according to the distribution of prime numbers, and then the parity of the pixel value is re-granted with chaotic mapping, and Hash. The embedding and extraction of the watermark are done by using logical operations to adjust the pixel value according to the parity of the pixel value and the number of prime numbers contained in the pixel value. The experimental results demonstrate that the proposed scheme is imperceptible, efficient, and safe. Compared with the existing methods, the proposed scheme achieves the binding of medical image and patient information, as well as exhibits excellent detection and positioning capability, and will have good application prospects in medical image content authentication and tampering detection.
Collapse
Affiliation(s)
- Xiuyuan Wei
- School of Information Science and Engineering, Linyi University, Linyi, 276000, Shandong, China
| | - Wenyin Zhang
- School of Information Science and Engineering, Linyi University, Linyi, 276000, Shandong, China.
| | - Bo Yang
- Shandong Province Key Laboratory of Intelligent Computing Technology for Network Environment, Jinan, 250022, Shandong, China.
| | - Jiuru Wang
- School of Information Science and Engineering, Linyi University, Linyi, 276000, Shandong, China
| | - Ziyun Xia
- School of Information Science and Engineering, Linyi University, Linyi, 276000, Shandong, China.,School of Information Science and Engineering, Shandong Normal University, Jinan, 250358, Shandong, China
| |
Collapse
|
10
|
Coppola F, Faggioni L, Gabelloni M, De Vietro F, Mendola V, Cattabriga A, Cocozza MA, Vara G, Piccinino A, Lo Monaco S, Pastore LV, Mottola M, Malavasi S, Bevilacqua A, Neri E, Golfieri R. Human, All Too Human? An All-Around Appraisal of the "Artificial Intelligence Revolution" in Medical Imaging. Front Psychol 2021; 12:710982. [PMID: 34650476 PMCID: PMC8505993 DOI: 10.3389/fpsyg.2021.710982] [Citation(s) in RCA: 61] [Impact Index Per Article: 15.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/18/2021] [Accepted: 09/02/2021] [Indexed: 12/22/2022] Open
Abstract
Artificial intelligence (AI) has seen dramatic growth over the past decade, evolving from a niche super specialty computer application into a powerful tool which has revolutionized many areas of our professional and daily lives, and the potential of which seems to be still largely untapped. The field of medicine and medical imaging, as one of its various specialties, has gained considerable benefit from AI, including improved diagnostic accuracy and the possibility of predicting individual patient outcomes and options of more personalized treatment. It should be noted that this process can actively support the ongoing development of advanced, highly specific treatment strategies (e.g., target therapies for cancer patients) while enabling faster workflow and more efficient use of healthcare resources. The potential advantages of AI over conventional methods have made it attractive for physicians and other healthcare stakeholders, raising much interest in both the research and the industry communities. However, the fast development of AI has unveiled its potential for disrupting the work of healthcare professionals, spawning concerns among radiologists that, in the future, AI may outperform them, thus damaging their reputations or putting their jobs at risk. Furthermore, this development has raised relevant psychological, ethical, and medico-legal issues which need to be addressed for AI to be considered fully capable of patient management. The aim of this review is to provide a brief, hopefully exhaustive, overview of the state of the art of AI systems regarding medical imaging, with a special focus on how AI and the entire healthcare environment should be prepared to accomplish the goal of a more advanced human-centered world.
Collapse
Affiliation(s)
- Francesca Coppola
- Department of Radiology, IRCCS Azienda Ospedaliero Universitaria di Bologna, Bologna, Italy
- SIRM Foundation, Italian Society of Medical and Interventional Radiology, Milan, Italy
| | - Lorenzo Faggioni
- Academic Radiology, Department of Translational Research, University of Pisa, Pisa, Italy
| | - Michela Gabelloni
- Academic Radiology, Department of Translational Research, University of Pisa, Pisa, Italy
| | - Fabrizio De Vietro
- Academic Radiology, Department of Translational Research, University of Pisa, Pisa, Italy
| | - Vincenzo Mendola
- Academic Radiology, Department of Translational Research, University of Pisa, Pisa, Italy
| | - Arrigo Cattabriga
- Department of Radiology, IRCCS Azienda Ospedaliero Universitaria di Bologna, Bologna, Italy
| | - Maria Adriana Cocozza
- Department of Radiology, IRCCS Azienda Ospedaliero Universitaria di Bologna, Bologna, Italy
| | - Giulio Vara
- Department of Radiology, IRCCS Azienda Ospedaliero Universitaria di Bologna, Bologna, Italy
| | - Alberto Piccinino
- Department of Radiology, IRCCS Azienda Ospedaliero Universitaria di Bologna, Bologna, Italy
| | - Silvia Lo Monaco
- Department of Radiology, IRCCS Azienda Ospedaliero Universitaria di Bologna, Bologna, Italy
| | - Luigi Vincenzo Pastore
- Department of Radiology, IRCCS Azienda Ospedaliero Universitaria di Bologna, Bologna, Italy
| | - Margherita Mottola
- Department of Computer Science and Engineering, University of Bologna, Bologna, Italy
| | - Silvia Malavasi
- Department of Computer Science and Engineering, University of Bologna, Bologna, Italy
| | - Alessandro Bevilacqua
- Department of Computer Science and Engineering, University of Bologna, Bologna, Italy
| | - Emanuele Neri
- SIRM Foundation, Italian Society of Medical and Interventional Radiology, Milan, Italy
- Academic Radiology, Department of Translational Research, University of Pisa, Pisa, Italy
| | - Rita Golfieri
- Department of Radiology, IRCCS Azienda Ospedaliero Universitaria di Bologna, Bologna, Italy
| |
Collapse
|
11
|
Baothman FA, Edhah BS. Toward agent-based LSB image steganography system. JOURNAL OF INTELLIGENT SYSTEMS 2021. [DOI: 10.1515/jisys-2021-0044] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/12/2022] Open
Abstract
Abstract
In a digital communication environment, information security is mandatory. Three essential parameters used in the design process of a steganography algorithm are Payload, security, and fidelity. However, several methods are implemented in information hiding, such as Least Significant Bit (LBS), Discrete Wavelet Transform, Masking, and Discrete Cosine Transform. The paper aims to investigate novel steganography techniques based on agent technology. It proposes a Framework of Steganography based on agent for secret communication using LSB. The most common image steganography databases are explored for training and testing. The methodology in this work is based on the statistical properties of the developed agent software using Matlab. The experiment design is based on six statistical feature measures, including Histogram, Mean, Standard deviation, Entropy, Variance and Energy. For steganography, an Ensemble classifier is used to test two scenarios: embedding a single language message and inserting bilingual messages. ROC Curve represents the evaluation metrics. The result shows that the designed agent-based system with 50% training/testing sample set and 0.2 Payload can pick out the best cover image for the provided hidden message size to avoid visual artifact.
Collapse
Affiliation(s)
- Fatmah Abdulrahman Baothman
- Department of Information Systems, Faculty of Computing & Information Technology, King Abdulaziz University , Jeddah, 21431 , Kingdom of Saudi Arabia
| | - Budoor Salem Edhah
- Department of Information Systems, Faculty of Computing & Information Technology, King Abdulaziz University , Jeddah, 21431 , Kingdom of Saudi Arabia
| |
Collapse
|
12
|
Odusami M, Maskeliūnas R, Damaševičius R, Krilavičius T. Analysis of Features of Alzheimer's Disease: Detection of Early Stage from Functional Brain Changes in Magnetic Resonance Images Using a Finetuned ResNet18 Network. Diagnostics (Basel) 2021; 11:1071. [PMID: 34200832 PMCID: PMC8230447 DOI: 10.3390/diagnostics11061071] [Citation(s) in RCA: 74] [Impact Index Per Article: 18.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/18/2021] [Revised: 06/04/2021] [Accepted: 06/08/2021] [Indexed: 12/12/2022] Open
Abstract
One of the first signs of Alzheimer's disease (AD) is mild cognitive impairment (MCI), in which there are small variants of brain changes among the intermediate stages. Although there has been an increase in research into the diagnosis of AD in its early levels of developments lately, brain changes, and their complexity for functional magnetic resonance imaging (fMRI), makes early detection of AD difficult. This paper proposes a deep learning-based method that can predict MCI, early MCI (EMCI), late MCI (LMCI), and AD. The Alzheimer's Disease Neuroimaging Initiative (ADNI) fMRI dataset consisting of 138 subjects was used for evaluation. The finetuned ResNet18 network achieved a classification accuracy of 99.99%, 99.95%, and 99.95% on EMCI vs. AD, LMCI vs. AD, and MCI vs. EMCI classification scenarios, respectively. The proposed model performed better than other known models in terms of accuracy, sensitivity, and specificity.
Collapse
Affiliation(s)
- Modupe Odusami
- Department of Multimedia Engineering, Kaunas University of Technology, 44249 Kaunas, Lithuania; (M.O.); (R.M.)
| | - Rytis Maskeliūnas
- Department of Multimedia Engineering, Kaunas University of Technology, 44249 Kaunas, Lithuania; (M.O.); (R.M.)
| | - Robertas Damaševičius
- Department of Applied Informatics, Vytautas Magnus University, 44248 Kaunas, Lithuania;
| | - Tomas Krilavičius
- Department of Applied Informatics, Vytautas Magnus University, 44248 Kaunas, Lithuania;
| |
Collapse
|
13
|
Lal S, Rehman SU, Shah JH, Meraj T, Rauf HT, Damaševičius R, Mohammed MA, Abdulkareem KH. Adversarial Attack and Defence through Adversarial Training and Feature Fusion for Diabetic Retinopathy Recognition. SENSORS (BASEL, SWITZERLAND) 2021; 21:3922. [PMID: 34200216 PMCID: PMC8201392 DOI: 10.3390/s21113922] [Citation(s) in RCA: 23] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/02/2021] [Revised: 05/31/2021] [Accepted: 06/04/2021] [Indexed: 12/15/2022]
Abstract
Due to the rapid growth in artificial intelligence (AI) and deep learning (DL) approaches, the security and robustness of the deployed algorithms need to be guaranteed. The security susceptibility of the DL algorithms to adversarial examples has been widely acknowledged. The artificially created examples will lead to different instances negatively identified by the DL models that are humanly considered benign. Practical application in actual physical scenarios with adversarial threats shows their features. Thus, adversarial attacks and defense, including machine learning and its reliability, have drawn growing interest and, in recent years, has been a hot topic of research. We introduce a framework that provides a defensive model against the adversarial speckle-noise attack, the adversarial training, and a feature fusion strategy, which preserves the classification with correct labelling. We evaluate and analyze the adversarial attacks and defenses on the retinal fundus images for the Diabetic Retinopathy recognition problem, which is considered a state-of-the-art endeavor. Results obtained on the retinal fundus images, which are prone to adversarial attacks, are 99% accurate and prove that the proposed defensive model is robust.
Collapse
Affiliation(s)
- Sheeba Lal
- Department of Computer Science, COMSATS University Islamabad, Wah Campus, Wah Cantt 47040, Pakistan; (S.L.); (S.U.R.); (J.H.S.); (T.M.)
| | - Saeed Ur Rehman
- Department of Computer Science, COMSATS University Islamabad, Wah Campus, Wah Cantt 47040, Pakistan; (S.L.); (S.U.R.); (J.H.S.); (T.M.)
| | - Jamal Hussain Shah
- Department of Computer Science, COMSATS University Islamabad, Wah Campus, Wah Cantt 47040, Pakistan; (S.L.); (S.U.R.); (J.H.S.); (T.M.)
| | - Talha Meraj
- Department of Computer Science, COMSATS University Islamabad, Wah Campus, Wah Cantt 47040, Pakistan; (S.L.); (S.U.R.); (J.H.S.); (T.M.)
| | - Hafiz Tayyab Rauf
- Department of Computer Science, Faculty of Engineering & Informatics, University of Bradford, Bradford BD7 1DP, UK
| | - Robertas Damaševičius
- Faculty of Applied Mathematics, Silesian University of Technology, 44-100 Gliwice, Poland
| | - Mazin Abed Mohammed
- College of Computer Science and Information Technology, University of Anbar, Anbar 31001, Iraq;
| | | |
Collapse
|