TechTrends: Navigating the Frontier of Emerging Technologies -  - E-Book

TechTrends: Navigating the Frontier of Emerging Technologies E-Book

0,0
33,57 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

TechTrends: Navigating the Frontier of Emerging Technologies highlights how emerging technologies are reshaping industries, enabling sustainable engineering, and transforming education and healthcare. Covering topics from blockchain security and IoT edge computing to machine learning, genomic computing, and virtual reality, this book brings together cutting-edge research and practical insights into the most dynamic fields of technological advancement. Each chapter showcases interdisciplinary innovations such as AI-driven fashion recommendation systems, predictive modeling for tool wear, laser cladding for lightweight alloys, CNN-based plant disease diagnostics, photovoltaic energy optimization, and immersive VR applications in education. By blending computational techniques with engineering and applied sciences, this volume emphasizes the practical potential of technology to solve real-world industrial, societal, and environmental challenges. Key Features · Explores advances in blockchain security, IoT resource optimization, and edge architectures. · Applies machine learning to domains ranging from healthcare to manufacturing. · Investigates renewable energy optimization, genomic computing, and plant disease detection. · Assesses social network modeling, immersive VR in education, and sustainable engineering solutions. · Bridges theory and practice with case-driven, interdisciplinary research.

Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:

EPUB
MOBI

Seitenzahl: 222

Veröffentlichungsjahr: 2025

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents
BENTHAM SCIENCE PUBLISHERS LTD.
End User License Agreement (for non-institutional, personal use)
Usage Rules:
Disclaimer:
Limitation of Liability:
General:
FOREWORD
PREFACE
List of Contributors
Blockchain-enabled Security for Medical Image Transmission: Prescription Data Hiding and Multi-secret Sharing-based Encryption
Abstract
INTRODUCTION
Objectives of this Chapter
RELATED WORKS
SYSTEM ARCHITECTURE
IMPLEMENTATION
Least Significant Bit Algorithm
LSB Embedding Equation
LSB Extraction Equation
RESULT AND DISCUSSION
Encryption using ECC
Decryption using ECC
Accessing Medical Image Data
Accessing Medical Image Data
ENCRYPTION PERFORMANCE
DECRYPTION PERFORMANCE
IMAGE QUALITY ANALYSIS
CONCLUSION AND FUTURE ENHANCEMENT
REFERENCES
Dynamic Resource Allocation for Internet of Thing Devices in Edge Computing: An Intelligent Fuzzy Approach
Abstract
INTRODUCTION
Literature Survey
SYSTEM ARCHITECTURE
The IoT Device Manager
The Edge Computing Environment
The Fuzzy Logic Based Resource Allocation Engine
RESULT AND DISCUSSION
Performance Analysis
Conclusion and Future Enhancement
AUTHORS’ CONTRIBUTIONS
REFERENCES
Improved GarbGenius: An AR Approach to Outfit Recommendation Systems
Abstract
INTRODUCTION
Overview of Fashion Retail Challenges
Motivations for GarbGenius Development
LITERATURE SURVEY
EXISTING TECHNOLOGY
Virtual Fitting Room Technologies
Augmented Reality (AR) Shopping Systems
Recommendation Systems
PROPOSED SYSTEM
Overview of GarbGenius Solution
Key Features and Functionality
Technical Implementation
Performance Evaluation
Evaluating Models
MPV3D Dataset
Fashion Product Images – Recommendation System
Model Comparison
Algorithmic Foundations
Virtual Try-on
Recommendation System
ARCHITECTURE
DEMO SCREENSHOTS
CONCLUSION
REFERENCES
Machine Learning in Multidisciplinary Predictions – A Contemporary Study on Tool Wear Prediction for Milling Process
Abstract
INTRODUCTION
Robotics and Autonomous Systems
Predictive Maintenance
Smart Manufacturing
Adaptive Control Systems
Human-machine Interaction
LITERATURE REVIEW
STATE-OF-THE-ART MACHINE LEARNING TECHNIQUES TOOL WEAR PREDICTION
Supervised Learning Models
Hybrid Models
TOOL WEAR DATA SOURCES
Sensor Data
Machine Tool Data and Maintenance Records
Investigational Data
Industry Collaboration and Benchmarks
MILLING OPERATIONS
Tool Wear Prediction
RESEARCH GAPS IN TOOL WEAR PREDICTION USING MACHINE LEARNING
SEGMENTS TO IDENTIFY TOOL WEAR USING SVM
RESULTS AND DISCUSSION
Decision Boundaries and Data Points
Interpretation of the Boundaries
Observations
Performance of an SVM model
CHALLENGES AND FUTURE STRATEGIES
CONCLUSION
REFERENCES
Laser Cladding on Magnesium Alloys: A Review of Surface Modification Technique
Abstract
INTRODUCTION
IMPORTANCE OF MAGNESIUM ALLOYS IN SEVERAL INDUSTRIES
LIMITATIONS OF MAGNESIUM ALLOYS
Low Hardness
Poor Wear Resistance
Corrosion Susceptibility
High Chemical Reactivity
Limited Temperature Resistance
Limited Formability
OVERVIEW OF LASER CLADDING - SURFACE MODIFICATION METHOD
Material Selection
Preparation of Surface
Laser Beam Generation
Cladding Material Deposition
Clad Layer Formation
Cooling and Solidification
ADVANTAGES OF LASER CLADDING PROCESS
Precise Control
Minimal Heat-affected Zone
Improved Properties
High Efficiency
LASER CLADDING PROCESS
Material Selection
Surface Preparation
Material Deposition
Fusion and Solidification
TYPES OF LASER SYSTEMS
CO2 Lasers
Nd:YAG Lasers
Fiber Lasers
Diode Lasers
PROCESS PARAMETERS
Laser Power
Scan Speed
Powder Feed Rate
Substrate Preheating
BENEFITS OF LASER CLADDING ON MAGNESIUM ALLOYS
Enhanced Wear Resistance
Corrosion Protection
Heat Resistance
Repair and Restoration
CHALLENGES AND CONSIDERATIONS
Material Compatibility
Thermal Stress and Distortion
Surface Preparation
Process Optimization
Quality Control and Testing
Cost and Production Considerations
RECENT ADVANCES AND FUTURE DIRECTIONS
Advanced Cladding Materials
Process Optimization and Control
Additive Manufacturing (AM) Integration
Surface Engineering for Multifunctionality
In-situ Alloying and Microstructure Control
Sustainability and Eco-friendly Approaches
NOVEL CLADDING MATERIALS FOR IMPROVED PERFORMANCE
Ceramic Reinforcements
Metal Matrix Composites (MMCs)
Intermetallic Compounds
Corrosion-resistant Alloys
Hybrid Materials
Nanostructured Materials
ADVANCED PROCESS MONITORING AND CONTROL TECHNIQUES
Thermal Imaging
Spectroscopic Analysis
In-situ Process Monitoring
Closed-loop Control Systems
Adaptive Control Algorithms
Non-destructive Testing (NDT) Techniques
INTEGRATION OF LASER CLADDING WITH OTHER SURFACE MODIFICATION TECHNIQUES
Laser Cladding with Surface Pre-treatment
Laser Cladding with Physical Vapor Deposition (PVD)
Laser Cladding with Thermal Spraying
Laser Cladding with Nitriding or Carbonitriding
Laser Cladding with Surface Texturing
Laser Cladding with Surface Alloying
CONCLUSION
REFERENCES
CNN-based Classification for Leaf Disease Identification
Abstract
INTRODUCTION
Objectives
SYSTEM DESIGN BLOCK DIAGRAM
CNN Based System
CNN Model Layers
CNN Algorithm
Convolution Layer Output
Pooling Layer
Calculating the Maximum Value in Each Window
Output after Passing through the Pooling Layer
Vector Formation
Classification
Comparison Example
Result
Convolution Layer
ReLU Layer
Pooling Layer
CNN Recognition Process
APPLICATIONS
CONCLUSION
References
Fast Terminal Sliding Mode Controllers (FTSMC) Based on MPPT for Photovoltaic Modules
Abstract
INTRODUCTION
PROPOSED SYSTEM MODELING
MODIFIED INTERLEAVED BOOST CONVERTER (IBC)
PROBLEM FORMULATION
PV EQUIVALENT CIRCUIT
MPPT-based PV System
Proposed System
RESULTS AND DISCUSSION
CONCLUSION
REFERENCES
Identification of Complex Problems in Social Networks using Neural Network Models with Representation Learning
Abstract
INTRODUCTION
NOTATIONS AND PROBLEM DEFINITIONS
NEURAL NETWORK-BASED MODELS
Framework Overview From the Encoder-decoder Perspective
Models with Embedding Look-up Tables
Skip-gram-based Models
Attributed Network Embedding Models
Heterogeneous Network Embedding Models
Dynamic Embedding Models
Autoencoder Techniques
Deep Neural Graph Representation (DNGR)
Structural Deep Network Embedding (SDNE)
Autoencoder-based Attributed Network Embedding
Graph Convolutional Approaches
Graph Convolutional Networks (GCN)
Inductive Training with GCN
Graph Attention Mechanisms
SUBGRAPH EMBEDDING
Flat Aggregation
Hierarchical Aggregation
APPLICATIONS
Node Classification
Link Prediction
Anomaly Detection
Node Clustering
DIFFERENT TYPES OF NETWORKS
Dynamic Networks
Hierarchical Network Structure
Heterogeneous Networks
Scalability
Interpretability
CONCLUSION AND FUTURE DIRECTIONS
REFERENCES
Virtual Reality in Education: Enhancing Student Engagement and Learning
Abstract
INTRODUCTION
OVERVIEW OF CHALLENGES IN EDUCATION USING VR
MOTIVATIONS FOR VIRTUAL REALITY IN EDUCATION
LITERATURE SURVEY
EXISTING TECHNOLOGY
Head-mounted Display (HMDS)
Tracking Systems
Content Creation Tools
PROPOSED SYSTEM
OVERVIEW OF VIRTUAL REALITY EDUCATION PLATFORM (VREP)
KEY FEATURES AND FUNCTIONALITY
TECHNICAL IMPLEMENTATION
Frontend
Web Interface
VR Client
Backend
Server
Database
API
VR Content Creation
3D Modelling
VR Content Authoring
Infrastructure
Security
Analytics and Reporting
PERFORMANCE EVALUATION
System Performance
VR Content Performance
User Experience
Scalability
Security
ALGORITHMIC FOUNDATIONS
3D Modeling and Rendering
Computer Vision
Machine Learning
Natural Language Processing
Data Analytics
RECOMMENDATION SYSTEM
User Profiling
Content Analysis
Collaborative Filtering
Content-based Filtering
Hybrid Approach
Recommendation Generation
Evaluation and Feedback
ARCHITECTURE
Understanding the Core Components
CONCLUSION
REFERENCES
TechTrends: Navigating the Frontier of Emerging Technologies
Edited by
V. Padmavathi
Department of Information Technology
A.V.C. College of Engineering
Mannampandal 609305, Mayiladuthurai
Tamil Nadu, India
R. Kanimozhi
Department of Information Technology
A.V.C. College of Engineering, Mannampandal 609305
Mayiladuthurai, Tamil Nadu, India
Lakshmana Kumar Ramasamy
Department of Computer Information Science
Higher Colleges of Technology, (Government Institution)
Abu Dhabi, UAE
R. Saminathan
Department of Computer Science and Engineering
Annamalai University, Annamalainagar 608002
Tamil Nadu, India
&
Mirra Subramanian
Quorum Software
Houston, Texas, USA

BENTHAM SCIENCE PUBLISHERS LTD.

End User License Agreement (for non-institutional, personal use)

This is an agreement between you and Bentham Science Publishers Ltd. Please read this License Agreement carefully before using the ebook/echapter/ejournal (“Work”). Your use of the Work constitutes your agreement to the terms and conditions set forth in this License Agreement. If you do not agree to these terms and conditions then you should not use the Work.

Bentham Science Publishers agrees to grant you a non-exclusive, non-transferable limited license to use the Work subject to and in accordance with the following terms and conditions. This License Agreement is for non-library, personal use only. For a library / institutional / multi user license in respect of the Work, please contact: [email protected].

Usage Rules:

All rights reserved: The Work is the subject of copyright and Bentham Science Publishers either owns the Work (and the copyright in it) or is licensed to distribute the Work. You shall not copy, reproduce, modify, remove, delete, augment, add to, publish, transmit, sell, resell, create derivative works from, or in any way exploit the Work or make the Work available for others to do any of the same, in any form or by any means, in whole or in part, in each case without the prior written permission of Bentham Science Publishers, unless stated otherwise in this License Agreement.You may download a copy of the Work on one occasion to one personal computer (including tablet, laptop, desktop, or other such devices). You may make one back-up copy of the Work to avoid losing it.The unauthorised use or distribution of copyrighted or other proprietary content is illegal and could subject you to liability for substantial money damages. You will be liable for any damage resulting from your misuse of the Work or any violation of this License Agreement, including any infringement by you of copyrights or proprietary rights.

Disclaimer:

Bentham Science Publishers does not guarantee that the information in the Work is error-free, or warrant that it will meet your requirements or that access to the Work will be uninterrupted or error-free. The Work is provided "as is" without warranty of any kind, either express or implied or statutory, including, without limitation, implied warranties of merchantability and fitness for a particular purpose. The entire risk as to the results and performance of the Work is assumed by you. No responsibility is assumed by Bentham Science Publishers, its staff, editors and/or authors for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products instruction, advertisements or ideas contained in the Work.

Limitation of Liability:

In no event will Bentham Science Publishers, its staff, editors and/or authors, be liable for any damages, including, without limitation, special, incidental and/or consequential damages and/or damages for lost data and/or profits arising out of (whether directly or indirectly) the use or inability to use the Work. The entire liability of Bentham Science Publishers shall be limited to the amount actually paid by you for the Work.

General:

Any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims) will be governed by and construed in accordance with the laws of Singapore. Each party agrees that the courts of the state of Singapore shall have exclusive jurisdiction to settle any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims).Your rights under this License Agreement will automatically terminate without notice and without the need for a court order if at any point you breach any terms of this License Agreement. In no event will any delay or failure by Bentham Science Publishers in enforcing your compliance with this License Agreement constitute a waiver of any of its rights.You acknowledge that you have read this License Agreement, and agree to be bound by its terms and conditions. To the extent that any other terms and conditions presented on any website of Bentham Science Publishers conflict with, or are inconsistent with, the terms and conditions set out in this License Agreement, you acknowledge that the terms and conditions set out in this License Agreement shall prevail.

Bentham Science Publishers Pte. Ltd. No. 9 Raffles Place Office No. 26-01 Singapore 048619 Singapore Email: [email protected]

FOREWORD

Today’s society is unrecognizable when compared with the one of ten years ago. It is a world where innovation brings changes that affect not only industries but the very foundations of people’s lives. This book, "TechTrends: Navigating the Frontier of Emerging Technologies", is a collection of ideas about these transformational technologies that should be useful to anyone interested in learning more about these technologies in order to embrace the future.

Such an environment brings the problem of growing difficulty in gaining relevant information as technology advances exponentially. However, it is critical for practitioners, legislators, scientists, and learners to understand the ways these innovations distort, enhance, or evolve their professions and global society. This book directly addresses that task by offering a brief overview of major technologies, including Artificial Intelligence, Blockchain, Internet of Things, and others.

However, this is not what is evident in TechTrends, which is therefore free from these problems due to its clarity. All in all, the authors have well addressed the requirements for details and, at the same time, avoided excess depth which would have made numbers complex. By the end of this book, the reader is going to get theoretical as well as pragmatic perceptions and examples of how these advancements can be put to use in sectors of healthcare, education, and energy.

That being said, the exposure of expertise in this book is almost unbelievable. Several authors of the articles are from the business fields and academic circles and most of them have provided their valuable insights and ideas to the readers. These are the reasons it is safe to say that TechTrends is an invaluable resource when it comes to understanding today’s world, which is filled with emerging technologies and numerous opportunities.

M. Senthilmurugan A.V.C. College of Engineering Mannampandal 609305, Mayiladuthurai Tamil Nadu, India &S. Selvamuthukumaran A.V.C. College of Engineering Mannampandal 609305, Mayiladuthurai

PREFACE

In the rapidly evolving landscape of today’s digital world, staying ahead of technological advancements is no longer an option but a necessity. The emergence of groundbreaking innovations is reshaping industries, redefining possibilities, and fundamentally altering the way we live and work. This book, TechTrends: Navigating the Frontier of Emerging Technologies, is designed to be your compass through this transformative journey.

From Artificial Intelligence to Blockchain and from Quantum Computing to renewable energy, this comprehensive guide examines the key technologies that are driving the future. Each chapter delves deep into the trends that matter most, with a focus on providing clear explanations and practical insights. By blending theoretical understanding with real-world applications, we aim to demystify complex concepts and make them accessible to a broad spectrum of readers.

This book is the result of the combined efforts of industry experts, researchers, and thought leaders who have generously contributed their knowledge and perspectives. Their diverse expertise ensures that the content remains relevant, timely, and rich with practical advice so that readers can immediately apply it to their own contexts.

Whether you are a technologist looking to stay ahead of the curve, a business leader seeking competitive advantages, a student aiming to expand your knowledge, or a policymaker grappling with the implications of emerging technologies, TechTrends offers something valuable. It is not just a reference book but a toolkit for navigating the complexities of tomorrow’s innovations.

As you embark on this exploration of the frontier of emerging technologies, I hope you find the insights within inspiring and empowering. It is my sincere belief that with the right knowledge and understanding, we can harness these technologies to create a better, more connected, and more equitable future for all.

Welcome to the Frontier. Let’s explore it together.

V. Padmavathi Department of Information Technology A.V.C. College of Engineering Mannampandal 609305 Mayiladuthurai, Tamil Nadu, IndiaR. Kanimozhi Department of Information Technology A.V.C. College of Engineering, Mannampandal 609305 Mayiladuthurai, Tamil Nadu, IndiaLakshmana Kumar Ramasamy Department of Computer Information Science Higher Colleges of Technology, (Government Institution) Abu Dhabi, UAER. Saminathan Department of Computer Science and Engineering Annamalai University, Annamalainagar 608002 Tamil Nadu, India &Mirra Subramanian Quorum Software

List of Contributors

A. KanthimathinathanDepartment of CSE, Annamalai University, Annamalainagar 608002, Tamil Nadu, IndiaA. RagavendiranDepartment of Electrical & Electronics Engineering, A.V.C. College of Engineering, Mannampandal 609305, Mayiladuthurai, Tamil Nadu, IndiaB. N. KarthikDepartment of Artificial Intelligence and Data Science, Rajalakshmi Institute of Technology, Chennai, Tamil Nadu, IndiaB. AsaithambiDepartment of Manufacturing Engineering, Annamalai University, Annamalainagar 608002, Tamil Nadu, IndiaB.S. SathishkumarA.V.C. College of Engineering, Mannampandal 609305, Mayiladuthurai, Tamil Nadu, IndiaD. SanthoshDepartment of Artificial Intelligence and Data Science, Rajalakshmi Institute of Technology, Chennai, Tamil Nadu, IndiaG. RamachandranDepartment of CSE, Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology, Chennai 600062, Tamil Nadu, IndiaG. Vishal Ponn RanganDepartment of Artificial Intelligence and Data Science, Rajalakshmi Institute of Technology, Chennai, Tamil Nadu, IndiaG.B. SathishkumarDepartment of Manufacturing Engineering, Annamalai University, Annamalainagar 608002, Tamil Nadu, India Department of Mechanical Engineering, Arasu Engineering College, Kumbakonam, Tamil Nadu, IndiaI. MahendravarmanDepartment of Electrical & Electronics Engineering, A.V.C. College of Engineering, Mannampandal 609305, Mayiladuthurai, Tamil Nadu, IndiaJ. Sharmila DeviDepartment of Instrumentation and Control Engineering, A.V.C. College of Engineering, Mannampandal 609305, Mayiladuthurai, Tamil Nadu, IndiaK. Suryaa NarayananDepartment of Artificial Intelligence and Data Science, Rajalakshmi Institute of Technology, Chennai, Tamil Nadu, IndiaP. AnbalaganDepartment of Computer Science and Engineering, Annamalai University, Annamalainagar 608002, Tamil Nadu, IndiaP. BalasubramanianDepartment of Instrumentation and Control Engineering, A.V.C. College of Engineering, Mannampandal 609305, Mayiladuthurai, Tamil Nadu, IndiaR. ManivannanDepartment of CSE, Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology, Chennai 600062, Tamil Nadu, IndiaR. KanimozhiDepartment of Instrumentation and Control Engineering, A.V.C. College of Engineering, Mannampandal 609305, Mayiladuthurai, Tamil Nadu, IndiaR. RamyaDepartment of CSE, A.V.C. College of Engineering, Mannampandal 609305, Mayiladuthurai, Tamil Nadu, IndiaS. SaravananDepartment of Computer Science and Engineering, Annamalai University, Annamalainagar 608002, Tamil Nadu, IndiaS. ThiyaneshwaranDepartment of Artificial Intelligence and Data Science, Rajalakshmi Institute of Technology, Chennai, Tamil Nadu, IndiaS. SundaraselvanDepartment of Mechanical Engineering, Arasu Engineering College, Kumbakonam, Tamil Nadu, IndiaS.K. RajalakshmiA.V.C. College of Engineering, Mannampandal 609305, Mayiladuthurai, Tamil Nadu, IndiaS.A. ChithradeviDepartment of Electrical & Electronics Engineering, A.V.C. College of Engineering, Mannampandal 609305, Mayiladuthurai, Tamil Nadu, IndiaS. KannanDepartment of ECE, Kings College of Engineering, Punnalkulam, Thanjavur, IndiaS. RamapriyaDepartment of CSE, A.V.C. College of Engineering, Mannampandal 609305, Mayiladuthurai, Tamil Nadu, IndiaSelva Adaikala L. GermeniDepartment of Computer Science and Engineering, Arasu Engineering College, Kumbakonam, Tamil Nadu, IndiaShahul S. HameedDepartment of Computer Science and Engineering, Arasu Engineering College, Kumbakonam, Tamil Nadu, IndiaT. BalamuruganDepartment of Mechanical Engineering, Arasu Engineering College, Kumbakonam, Tamil Nadu, IndiaV. MahavaishnaviDepartment of Artificial Intelligence and Data Science, Panimalar Engineering College, Poonamalle, Chennai, IndiaV. PadmavathiDepartment of Instrumentation and Control Engineering, A.V.C. College of Engineering, Mannampandal 609305, Mayiladuthurai, Tamil Nadu, IndiaV. SrinivasanDepartment of Manufacturing Engineering, Annamalai University, Annamalainagar 608002, Tamil Nadu, India

Blockchain-enabled Security for Medical Image Transmission: Prescription Data Hiding and Multi-secret Sharing-based Encryption

V. Mahavaishnavi1,*,S. Saravanan2,P. Anbalagan2
1 Department of Artificial Intelligence and Data Science , Panimalar Engineering College, Poonamalle, Chennai, India
2 Department of Computer Science and Engineering, Annamalai University, Annamalainagar 608002, Tamil Nadu, India

Abstract

Medical images bear sensitive patient information, making their transmission a security concern. The privacy and security of such graphical representations and incidental patient information in transit via public networks must be preserved. Medical images contain sensitive information, which sets them apart from ordinary images. Medical images are more sensitive and contain crucial information. This leads to a reliance on more secure techniques than conventional methods like cryptography and data hiding, which normally take more time and security. In this chapter, we propose implementing two innovative techniques to enhance the security of medical data sharing: Prescription information concealed in medical images and secure and share-prescription using a multi-secret sharing blockchain. Prescription data hiding, on the other hand, refers to the encryption of prescription details within normal-looking images like X-ray or MRI scans, among others. Incorporating sensitive data into the images makes it difficult for unauthorized persons to access them. Additionally, we build on the potential of using a blockchain, an immovable and distributed database, to share crucial clinical information safely. Medical data is kept through a blockchain database, which spreads the data around a network. It becomes harder for attackers to tamper or alter the data using traditional methods. Smart contracts also add security to data sharing by enabling data to be available only to the relevant parties, which gives security an extra layer. As a novel solution to solve the serious security issues of medical data sharing, the proposed scheme involves prescription data hiding in medical images, multi-secret sharing-based encryption, and the security properties of the blockchain. Our proposed techniques ensure the privacy and integrity of patients' data when transmitting medical images.

Keywords: Blockchain technology, Data security techniques, Data transmission, Electronic health records, Privacy.
*Corresponding author V. Mahavaishnavi: Department of Artificial Intelligence and Data Science , Panimalar Engineering College, Poonamalle, Chennai, India; E-mail: [email protected]

INTRODUCTION

Medical data transmission is an important procedure that involves transferring medical images through public networks and ascribes a massive priority to security measures. Such images bear very sensitive patient details; therefore, there is a need to ensure that their transfer is very secure. Several internal traditional data security approaches, like cryptography and data hiding, possess some drawbacks regarding time consumption and the degree of protection they offer to medical image applications. Thus, this project will provide a solution to increase the security of medical images through the security solution enabled by blockchain, prescription data embedding, and multi-secret sharing encryption. The project aims to solve the problems of non-trivial protection of medical image transmission, patient data confidentiality, and data integrity. Medical images are entirely unlike standard images because they contain a large volume of tremendously important data. Therefore, effective measures to enhance security, apart from other traditional methods and techniques, need to be drawn up.

Prescription data in medical images is a combination of concealing prescription data within the medical image using a steganographic approach. This approach provides an extra layer of protection to the greater mass of data incorporated into the images. Through steganography, there are ways that unauthorized people will not be easily able to see what is hidden; hence, the data's privacy and confidentiality will be intact. In addition, for the remainder of the project, the technology being applied is Blockchain, a distributed, unalterable ledger. Due to the distributed nature of Blockchain, clinical data is thus highly robust in terms of issues of hacking or alteration by unauthorized persons. This makes it difficult for the attackers to modify or foolproof the images transmitted by this technology.

For higher security, build multi-secret sharing-based encryption into the project. This encryption divides the security data into portions distributed among the approved parties. The raw data can be disaggregated only when authorized parties merge their shares. It also has a security feature that prevents anyone unauthorized from making any changes or accessing the data in question. This project aims to provide a multi-faceted solution to the problem of insecure medical image transmission. Solutions such as hiding prescription details in the medical images, the use of Blockchain function, and multi-secret sharing-based encryption ensure the enhanced security of patients' information within the framework of the project. Applying these techniques ensures the medical images' security during transmission across public networks while remaining intact and private. Fig. (1) shows the concept of managing healthcare data through blockchain security for medical image transfer. It comprises several parts and their relationships to secure an efficient healthcare data management.

Fig. (1)) The framework of healthcare data management.

Objectives of this Chapter

Implement Prescription Data Hiding: In general psychopathology, using steganography, it is possible to create approaches to hide prescription data in medical images, such as X-rays or MRI scans. This makes the process secure since it is difficult for unauthorized personnel to penetrate the hidden images.Utilize Blockchain Technology: Some of the best use cases can be using blockchain technology's decentralized and tamper-proof features to store and share medical data. With the project's blockchain implementation, it becomes challenging for attackers to manipulate the data transmitted or stored as images.Enhance Security with Multi-secret Sharing-based Encryption: This includes the encryption concept that divides information into several parts and distributes the segments to relevant users. This method ensures that only proper people can restore the information, thus adding another layer of security.

The research is expected to achieve the following objectives, hence developing a broader security framework for medical image transmission. It aims to ensure patient information's privacy, confidentiality, and integrity and alleviate the risks of transferring medical images over public networks.

RELATED WORKS

The authors of the presented work [1] provide a detailed review of various fields in the healthcare system that utilize security and privacy-oriented methods. It also looks at the related concerns. Further, the research outlines ways of achieving secure and privacy-preserving machine learning for healthcare applications. The research involves a literature review of the present and past contributions, a discussion of the security and reliability of ML and DL models used for healthcare systems' development, and a focus on the dimensions above. The first research question concerns different security issues that may emerge when using ML and DL in healthcare. Besides highlighting the security and robustness issues accompanying the usage of ML and DL, the research briefly reviews general threats and sources of risks that hinder the safe and reliable integration of ML and DL into healthcare applications. Different privacy and security issues must be solved to achieve reliable and secure usage of these models within the clinical context.

Also, the features of applying cryptography as an algorithm in healthcare are investigated in the research. The advantage of cryptography is that it can secure data and information exchanged over the phone or any other communication medium against any attempt to get hold of them. However, it is necessary to point out that the employment of cryptography is closely connected with high costs, and this may become an adverse factor in some cases.

The proposed system [2], uses the Henon chaotic map, Brownian motion, and Chen's chaotic system to make a multiple-stage encryption algorithm. This is true because of the integration of chaos theory with Brownian motion and Chen's chaotic system, which makes the scheme secure for storage systems in hospitals and medical centers. Randomness in the encryption process is created using a two-dimensional Henon chaotic map, while diffusion is created using Brownian motion and Chen's chaos system.

The reliability of the proposed system has been tested using the NIST test, entropy test, histogram, and pixel-based similarity measurement, where the features are as follows: performance analysis parameters like energy, contrast, homogeneity, mean square error, PSNR, NPCR, UACI, and computational complexity. Besides the encryption scheme, cryptography is also realized as an algorithm to secure data and communication from being uncovered and accessible by unauthorized individuals. However, at the same time, it admits that using cryptography can sometimes be expensive.

The encryption algorithm [3], proposed in the context, incorporates two permutations to secure the medical images. Also, the algorithm considers the difficulty level regarding the encryption and decryption of picture-based information. It uses a transformation process that comprises image phases and a newly developed encryption algorithm known as the Hyper Image Encryption Algorithm (HIEA). After that, the generated image is encrypted with the “Hyper Image Encryption Algorithm (HIEA)”. Unlike the existing techniques, it does not use unsystematic sequence numbers for generating the keys, which consume a considerably large amount of time in computation, but the current formula reduces the computation time as much as possible. In order to maximize security, the algorithm is constructed in a specific way in which the medical images are saved, and it would not allow any unauthorized personnel to access them. In an encryption technique, three levels are used, and the key values for logical operations are 256 bits.