Next Article in Journal
A Microfluidic Dielectric Spectroscopy System for Characterization of Biological Cells in Physiological Media
Next Article in Special Issue
Secure Smart Wearable Computing through Artificial Intelligence-Enabled Internet of Things and Cyber-Physical Systems for Health Monitoring
Previous Article in Journal
Design and Motion Performance Analysis of Turbulent AUV Measuring Platform
Previous Article in Special Issue
Deep Learning-Based Transfer Learning for Classification of Skin Cancer
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model

1
Department of Electrical Engineering, Riphah International University, Islamabad 46000, Pakistan
2
Department of Computer Sciences, RMIT University, Melbourne 3000, Australia
3
Department of Science and Technology, College of Ranyah, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
4
Department of Computer Science, Faculty of Science, Northern Border University, Arar 91431, Saudi Arabia
5
Remote Sensing Unit, Northern Border University, Arar 91431, Saudi Arabia
6
School of Computing, Engineering and Physical Sciences, University of the West of Scotland, Paisely PA1 2BE, UK
7
School of Computing, Edinburgh Napier University, Edinburgh EH10 5DT, UK
8
Research Centre for Intelligent Healthcare, Coventry University, Coventry CV1 5FB, UK
9
James Watt School of Engineering, University of Glasgow, Glasgow G12 8QQ, UK
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(2), 461; https://doi.org/10.3390/s22020461
Submission received: 10 December 2021 / Revised: 5 January 2022 / Accepted: 6 January 2022 / Published: 8 January 2022

Abstract

:
This article presents non-invasive sensing-based diagnoses of pneumonia disease, exploiting a deep learning model to make the technique non-invasive coupled with security preservation. Sensing and securing healthcare and medical images such as X-rays that can be used to diagnose viral diseases such as pneumonia is a challenging task for researchers. In the past few years, patients’ medical records have been shared using various wireless technologies. The wireless transmitted data are prone to attacks, resulting in the misuse of patients’ medical records. Therefore, it is important to secure medical data, which are in the form of images. The proposed work is divided into two sections: in the first section, primary data in the form of images are encrypted using the proposed technique based on chaos and convolution neural network. Furthermore, multiple chaotic maps are incorporated to create a random number generator, and the generated random sequence is used for pixel permutation and substitution. In the second part of the proposed work, a new technique for pneumonia diagnosis using deep learning, in which X-ray images are used as a dataset, is proposed. Several physiological features such as cough, fever, chest pain, flu, low energy, sweating, shaking, chills, shortness of breath, fatigue, loss of appetite, and headache and statistical features such as entropy, correlation, contrast dissimilarity, etc., are extracted from the X-ray images for the pneumonia diagnosis. Moreover, machine learning algorithms such as support vector machines, decision trees, random forests, and naive Bayes are also implemented for the proposed model and compared with the proposed CNN-based model. Furthermore, to improve the CNN-based proposed model, transfer learning and fine tuning are also incorporated. It is found that CNN performs better than other machine learning algorithms as the accuracy of the proposed work when using naive Bayes and CNN is 89% and 97%, respectively, which is also greater than the average accuracy of the existing schemes, which is 90%. Further, K-fold analysis and voting techniques are also incorporated to improve the accuracy of the proposed model. Different metrics such as entropy, correlation, contrast, and energy are used to gauge the performance of the proposed encryption technology, while precision, recall, F1 score, and support are used to evaluate the effectiveness of the proposed machine learning-based model for pneumonia diagnosis. The entropy and correlation of the proposed work are 7.999 and 0.0001, respectively, which reflects that the proposed encryption algorithm offers a higher security of the digital data. Moreover, a detailed comparison with the existing work is also made and reveals that both the proposed models work better than the existing work.

1. Introduction

Digital medical images such as X-ray images are becoming more crucial for identifying and treating disorders in contemporary hospitals and hence are attracting attention from the research community [1]. In general, such medical images may include confidential and sensitive information [2]. Disastrous accidents may arise if unauthorized access results in the theft of confidential information or the exploitation of these private images. For instance, a hacker may use unauthorized images or replace the original data with fabricated information or data to ruin a patient’s life. Furthermore, it is crucial to protect such medical images by means of some lightweight chaos-based encryption schemes. As a result, an unauthorized person cannot access the relevant database without the permission of the authorized party.

1.1. Data Security

Preserving images from unauthorized entities has become an increasingly important problem as multimedia technology continues to advance at an exponential rate. Compared to text data, images have distinct properties such as a large data capacity, high redundancy, and significant correlation between neighboring pixels, which make traditional text encryption algorithms inefficient when used on images. The development of acceptable image cryptosystems has been the focus of numerous studies, which have implemented a variety of techniques, including the Fourier transform [3,4], the wavelet transform [5], SCAN [6], chaos [7,8], and other techniques. Among the aforementioned methodologies, chaos-based image encryption is considered as one of the most efficient and effective encryption techniques due to a number of properties such as its high sensitivity to control parameters and initial values, pseudo random evolution, state ergodicity, and structure complexity [9].
Chaotic systems are often employed to produce key streams for scrambling or changing pixel values. Such key-streams can be generated using the initial values that are given to the chaotic systems. Images are created by concatenating these key streams with plaintext images. Additionally, a minor change in the seed values may result in a significantly different key stream. This property corresponds to the sensitivity to the initial condition. Chaotic systems also provide long-term random encryption by exploiting features such as state ergodicity and structural complexity.
With the use of a logistic map [10], a British mathematician named Matthews made the first formal application of chaos theory to cryptography in 1989. It has been shown in this study that chaos-based encryption is feasible. Because of the security requirements for image data, chaos is attracting the attention of researchers in image encryption [9]. The confusion–diffusion structure is used as a generic framework in the development of image encryption schemes in the majority of existing image encryption techniques. According to Shannon [11], an encryption scheme that consists of both a confusion and diffusion property can be considered a secured cryptosystem. Fridrich proposed a confusion–diffusion structure in [12] that encrypted images using the permuting pixel location and diffusing pixel value with chaos for the first time. However, as compared to permuting pixels, the permutation of bits of pixels gives more security, while the calculation cost may be larger.

1.2. Data Classification Using Deep Learning

Apart from securing medical images such as X-rays, it is also important to use a technique to diagnose diseases such as pneumonia with high accuracy. Several machine learning techniques have been proposed in recent years that offer an accuracy of 85–90%, which is not acceptable as it can be a source of a great loss for patients in terms of health due to misclassification between normal and pneumonia patients.
Pneumonia is an acute lung infection that causes fever, coughing, muscular pains, chills, and trouble breathing in infected individuals. The pneumonic disease has been documented throughout human history, with early Greek civilization mentioning the condition [13]. Despite our long history with the illness, pneumonia remains a significant medical problem for the global population, with millions of incidents of pneumonia-related hospitalizations and deaths globally. The World Health Organization (WHO) has stated that, in 2016, more than 700,000 children aged less than 2 years died due to pneumonia [14,15]. The death toll from pneumonia exceeded the combined tolls from malaria, AIDS, and measles in the same year. It is worth mentioning here that more than 95% of children living in backward areas with limited medical resources died of pneumonia. Therefore, a precise, low cost, and quick pneumonia diagnosis is required in such areas.
Chest X-rays are one of the most frequently utilized images for the diagnosis of diseases such as pneumonia in the liver and lungs non-invasively [16]. However, pneumonia diagnosis in chest X-rays also depends on the radiologist’s diagnostic expertise [17]. Furthermore, the trustworthiness of diagnostic results continues to face enormous obstacles. This problem arises frequently in underdeveloped countries, where the prevalence and mortality of pediatric pneumonia are much greater than the global norm, such as in the South Asian subcontinent [18]. On the other hand, it is mainly the responsibility of highly qualified and experienced doctors to identify chest X-ray images. Currently, only a few systems for medical image analysis are capable of autonomously identifying human organs or tissues [19]. The automatic classification and detection of organs based on X-ray images has enormous application potential in academic medicine. It may significantly increase the number of cases analyzed by students. Additionally, it can support the advancement of telemedicine education and help to save valuable human resources [20].
As a fundamental part of artificial intelligence, deep learning takes raw data as input and extracts the necessary features [21]. Finally, the learned features are associated with the task, automating the whole process. As a consequence, advancements in deep learning are inextricably linked to the study of the brain’s cognitive processes. Today, the most commonly used network model for deep learning is the neural network architecture. Since the idea of artificial neural networks (ANNs) was proposed in 1943, researchers have started to employ mathematical models to theoretically imitate neurons in ANNs, therefore broadening the scope of the study of artificial intelligence [22,23,24]. Deep learning algorithms, such as neural networks, have shown astounding performance in non-invasively classifying patient data problems for disease diagnoses [25,26,27,28].

2. Related Work

Encrypting medical images is an effective method of protecting them from attacks [29,30,31]. Several traditional encryption techniques, such as the Data Encryption Standard (DES) [32], the Advanced Encryption Standard (AES) [33], and the International Data Encryption Algorithm (IDEA) [34], were designed to protect textual data. The approaches, however, have been discovered to be incompatible with digital images due to their inherent characteristics such as high correlation and pixel redundancy and correlation [35,36]. Scholars have suggested selective encryption techniques to reduce correlation and redundancy [37,38]. For instance, some approaches encrypt critical compression coefficients [39] and others encrypt the interleaved patient information included in images [40], while others encrypt only the important bits of particular coefficients using a stream cipher [41,42,43,44]. However, such security techniques have several vulnerabilities, such as high computational time and weak security, which may also result in data loss and some false negative diagnoses [45,46,47]. Recently, Bouslimi et al. [48] proposed a combined watermarking/encryption system in Cipher-block chaining mode (CBC) to secure the integrity of medical images and create a medical image encryption technique by combining a stream cipher algorithm and two substitutive watermarking approaches [48]. They are capable of preserving an image’s integrity and authenticity. Zhang et al. [49] created a one-of-a-kind image encryption technique that combines bit-level rotation matrix permutation and block diffusion. Zhou et al. [50] developed a novel security approach that uses a hyper-chaotic system and 2D compressive sensing to concurrently encrypt and compress medical images. Zhang et al. [51] suggested a compressive sensing and pixel permutation technique for medical image encryption and compression. Additionally, it is capable of encrypting and compressing medical images concurrently. However, such approaches are not ideal for large datasets, such as X-ray image datasets, and are vulnerable to security attacks.
Numerous methodologies have been proposed to detect pneumonia using machine learning, deep learning, and transfer learning. Liang et al. [52] presented a model for the future forecasting of pneumonia non-invasively using a deep residual network (DRN) in which X-ray images are incorporated. To enhance the model training, a large dataset is used in the same field. The accuracy, recall, F1-score, and RoC values for the DRN model are 90.5%, 96.7%, 92.7%, and 95.3%, respectively. However, the DRN model is not suitable because the model accuracy is not sufficient, increasing the False Positive Rate (FPR). Morillo et al. [53] also proposed a pneumonia detection technique using machine learning in which Fourier transform analysis is used, which also helps to extract features.
Moreover, band-pass (BP) filtering is incorporated for the removal of noise from tracheal sounds. The model accuracy is 85%, which is less than the technique proposed in [54,55,56]. An automated system has been developed for the rapid diagnosis of pneumonia based on a deep sequential convolutional neural network [57]. A publicly available dataset is used in which X-ray images of healthy and pneumonia patients are included. The overall accuracy of the model is 94%, which is not acceptable to avoid FPR. In [58], Masot et al. proposed a deep learning-based technique for the prediction of COVID-1 and pneumonia. In the dataset, three different labels are used: healthy subject, subject COVID-1, and pneumonia. Based on the feature values and classification model, the desired output can be predicted. The accuracies obtained with histogram equalization and without histogram equalization are 86.1% and 88%, respectively. Ni et al. [59] also presented a deep learning approach to classify healthy, COVID-1, and pneumonia patients in which CT images are used. One of the evaluation parameters, known as accuracy, is used to gauge the performance of the model, which predicts correct results with an accuracy of 84%, which is less than the accuracy of the model proposed in [58]. Zhang et al. [60] proposed a machine learning model to detect pneumonia using chest radiography, in which a 90% rate of accuracy of true prediction is achieved, which is better than the model in [58,59]. Antin et al. [61] proposed a supervised learning approach for the diagnosis of pneumonia using machine learning algorithms in which X-ray images are incorporated into the dataset. For the classification of healthy pneumonia patients, logistic regression is used, and a 60% rate of accuracy of true predictions is achieved, which is significantly lower than other approaches and may not be suitable for the diagnosis of pneumonia. In [61], there is a lack of dimensionality reduction in the dataset, which results in less accuracy, which is 72. Jain et al. [62] presented a classification technique for the diagnosis of pneumonia in which convolutional neural networks and transfer learning are integrated.
Moreover, a dataset containing X-ray images is used and six different models are proposed for model training and testing. Such models have varying layers and achieve 92.31% accuracy, as demonstrated by model 1, which has two convolutional layers. A great deal of work has been presented in the literature in which an accuracy between 90% to 95% is achieved. A new methodology is proposed to improve the model’s accuracy, in which CNN is incorporated to classify pneumonia and healthy patients.
Apart from proposing pneumonia diagnosis using a neural network, it is also important to secure medical data so that they can be prevented form misuse. Therefore, in this research, we present a block encryption technique that combines neural networks, chaotic systems, and complementary DNA principles for securing medical data in the form of images. A novel heterogeneous chaotic system is implemented using neural networks in which random sequences are generated. Such random sequences are then utilized as inputs for the proposed encryption procedures, which include pixel position scrambling and substitution.

Contributions of the Work

Given the current circumstances in the early WHO report, pneumonia detection and treatment are a highly demanded area of research. Our findings and contributions in this work, in particular for the identification of pneumonia, are as follows:
  • To secure the medical images (X-ray images), a neural network-based image encryption is proposed, and a comparison is made to show the effectiveness of the proposed encryption;
  • Collection of primary data from thee different hospitals in Rawalpindi/Islamabad, Pakistan;
  • Statistical and physiological features are integrated for the non-invasive diagnosis of pneumonia;
  • We developed a scheme that can reliably predict the presence of pneumonia, and it can be implemented using a smartphone application. CNN is used as a classification algorithm for the proposed approach;
  • A K-fold analysis is also used in this research to select a particular subset of the dataset, and as a consequence, the suggested model has maximum accuracy;
  • We built multiple learning models called “K-learning models” after performing the K-fold analysis. The purpose of these models is to deploy ensemble-based learning approaches.
  • For the validation of the proposed model, various metrics such as precision, recall, F1 score, and support are used. Misclassifications in the context of pneumonia detection might be exceedingly expensive in terms of human lives if a model incorrectly identifies false positives; hence, we used accuracy as mentioned in addition to the earlier measures to evaluate the proposed model. Moreover, for more validation, tuning is also performed.
The rest of the proposed work is organized as follows: Section 3 provides a description of the chaotic maps which are used in the proposed encryption scheme for data security. In Section 4, the methodology to generate the pseudo-random number is given, while Section 5 and Section 6 are devoted to the proposed encryption scheme and its evaluation, respectively. Section 7 provides the mathematics behind the proposed model with reference to the CNN. In Section 8, materials and methods regarding the dataset used in the proposed work and processing are explained. In Section 9, the proposed model is explained in detail, while in Section 10, experimental results and an analysis of the proposed work and its comparison with existing methods are given. Finally, Section 11 concludes the proposed research work.

3. Chaotic Maps Used in the Proposed Work

Among the several chaotic maps available in the literature, three chaotic maps—piece-wise linear chaotic map (PWLCM), logistic map, and logistic tent system (LTS)—are used in the proposed encryption scheme. In particular, such maps are incorporated to create a pseudo-random number generator.

3.1. Logistic Map

A one-dimensional logistic map is defined in Equation (1) [63]:
T n + 1 = G T n ( 1 T n )
where G is a control parameter with a value varying from 3.58 and 4. T n and T n + 1 are the chaotic map’s outputs/states when they iterate at n and n + 1 , respectively, and their values will lie between 0 and 1.

3.2. Piece-Wise Linear Chaotic Map (PWLCM)

Several linear segments that exhibit superior properties to the logistic map are used to construct the PWLCM, which is defined as follows [64]:
T n + 1 = F [ T n ] = ( T n G ) i f 0 T n < G ( T n G 0.5 G ) i f G T n < 0.5 F [ 1 T n ] i f 0.5 T n < 1
where G is the range-control parameter (0, 0.5). n and T n + 1 are the chaotic map’s outputs/states at n and n + 1 iterations, respectively, and their values lie between 0 and 1.

3.3. Logistic Tent Map (LTS)

LTS is a combination of logistic and piece-wise liner maps as discribed in Equation (3).
T n + 1 = G T n ( 1 T n ) + ( 4 G ) T n 2 m o d 1 i f T n < 0.5 G T n ( 1 T n ) + ( 4 G ) ( 1 T n ) 2 m o d 1 i f T n < 0.5
where G is the chaotic behavior control parameter in the range [0, 4], T n and T n + 1 are the chaotic map’s outputs/states when it iterates at n and n + 1 , respectively, and their values will lie between 0 and 1.

4. Proposed Pseudo-Random Number Generator

This section describes the proposed chaotic pseudo-random generator based on neural networks. The proposed generator design is heterogeneous, implying the utilization of many chaotic maps. Figure 1 shows the neural network-based proposed generator.
Four layers comprise the proposed neural network generator: two hidden layers and two input/output layers (one input and one output). In the neural network, each neuron in the neural network generator has a transfer function defined by a chaotic map equation. The proposed architecture employs a single neuron as the input layer, which receives an encryption key with a size of 64 bits, divided into two equal sections with a size of 32 bits. The first section is devoted to the input for the neural network’s initialization cycle, while the second section serves as the output for the neural network’s initialization cycle. The two hidden layers are composed of n h l number of neurons, whereas the output layer is composed of m o l neurons.
To implement a heterogeneous chaotic system in neural network layers, multiple chaotic maps are incorporated as transfer functions. For instance, if the logistic map is empty in the first layer, the PWLCM will be used in the second layer, and so on. The weight matrices of the four layers are denoted as W 0 , W 1 , W 2 , and W 3 , numbered from 0 to 3, respectively, as shown in Figure 1, and with the dimensions of 1 × 1, n h l × 1 , n h l × n h l , and m o l × n h l . The layers’ bias matrices are B 0 , B 1 , B 2 , and B 3 . P 0 , P 1 , P 2 , and P 3 are the control parameter matrices for the chaotic map transfer function. Both B 0 B 3 and P 0 P 3 are 1 × 1, n h l × 1, n h l × 1, and m o l × 1, respectively. The neural network generator’s m o l outputs can be utilized to perform the encryption algorithm’s various operations.
A 1D Cubic map is employed to build the neural network generator. The seed values for the cubic maps are defined by the second 32 bit section of the 64 bit key.The cubic map is given in Equation (4):
T n + 1 = λ T n ( 1 T n 2 )
where T n is the seed value for the first cycle of the chaotic function or the prior state for subsequent cycles, and T n + 1 is the chaotic function’s current state. Both T n and T n + 1 lie in (0, 1). λ is the chaotic control parameter, with a value of 2.59. To reveal its chaotic properties, 50 iterations are made for this map. Following that, the map’s outputs are used to initialize the initial parameters of the neural network.
In the proposed work, four outputs are utilized—i.e., m o l = 4 —to generate chaotic sequences corresponding to each output:
  • Pixel scrambling ( O P 4 w );
  • Pixel substitution (PS) ( O P 4 x );
  • Pixel bit scrambling (PNS) ( O P 4 y );
  • ( O P 4 z ) The total number of iterations of the chaotic neuron transfer function is updated using ( O P 4 z ).
The output of the aforementioned parameters and the working of the proposed generator are shown in Figure 2.

5. Proposed Cryptosystem for Medical Images

This section describes the details of the proposed cryptosystem and a novel pixel bit permutation mechanism based on DNA principles.
The proposed encryption algorithm consists of two different blocks. In the first block, pixel permutation (P-box) is performed, while the second block comprises substitution and permutation, or SP-box, as shown in Figure 3.

5.1. P-Box

The P-box refers to the permutation-box, which is used to shuffle the locations of the image pixels by determining the pixel position.
For an N × N image, the original positions of the image pixels are permuted using the first N-bits of the P-sequence. The last N bits are utilized to compute the chosen pixel’s target location. The number of permutation iterations is equal to the total number of pixels present in the original image ( N × M ), where N and M represent the number of rows and columns of the image pixels, respectively. The proposed permutation operation is shown in Figure 4, in which each pixel value is permuted according to the values preset in the P-sequence.

5.2. SP-Box

In this step, the input is the scrambled pixels, which are permuted in the P-box. The SP-box contains two operation: one is substitution and the other is permutation. Such operations are performed on each pixel one by one; i.e., the pixel value is substituted with the new value followed by the permutation of the substituted pixel value. The permutation operation is then applied on bits of the bi-plane, which are extracted from the plane text image. The operations in the SP-box are repeated until the substitution and permutations of the last pixel value to obtain the final encrypted image. Such encrypted images are shown in Figure 5 and their corresponding plaintext images are shown in Figure 6.

6. Proposed Encryption Scheme Evaluation

To gauge the performance of the proposed encryption algorithm, the following parameters are under consideration:
  • Mean square error (MSE);
  • Peak signal to noise ratio (PSNR);
  • Entropy;
  • Correlation;
  • Energy;
  • Contrast;
  • Execution time.
The detail of such security parameters can be seen in [65,66,67]. Table 1 shows the statistical value of the security parameters calculated for the evaluation of the proposed cryptosystem for medical images.
As with the MSE, the contrast of the encrypted image should be high as much as possible, while the correlation, energy, and execution time should be low for strong encryption. However, the entropy value must be close to 8.00 for an 8 bit encrypted image. It can be seen from Table 1 that the values for the security parameters for the proposed work are much better than existing schemes.

Noise Attack Analysis

To check the robustness of the proposed encryption algorithm against noise attack, salt and pepper noise is added to the encrypted image and decrypted with the decryption algorithm. It is found that the information in the decrypted image, which is reconstructed from the noise-encrypted image, is clearly seen, as can be seen in Figure 7. There is some noise in the decrypted image, but the content of the plaintext image is visible.

7. Convolutional Neural Networks (CNN)

In recent years, CNN has dominated the machine vision domain. A CNN consists of several hidden, input, and output layers. Convolutional, pooling, fully connected, and normalizing layers are common hidden layers in CNNs. For increasingly sophisticated models, more layers might be employed. Examples of a standard CNN are illustrated in Figure 8.
The vector calculus and chain rule may be used in the CNN learning process [74]. Let T be any scalar (i.e., TR) and x ∈ R W be a vector. The partial derivative of T with regard to x will be
T x = T x j
The size of T x is same as x, and the ith element is T x . Also, T x Q = ( T x ) Q . Moreover, it is presumed that N R M . In this case, the partial derivative of T with regard to x will be
( x N Q ) j k = x j N j
The derivative is represented by Equation (6), which is a P × S matrix with the entry at the intersection of the jth row and kth column. From this, the chain rule can be incorporated to calculate the following:
T N Q = ( T N Q ) ( x N Q )
A cost or loss function may be used to calculate the difference between a CNN’s N L forecast and the outcome t, N 1 M 1 , N 2 →…, N L S L = T, using a simplistic loss function T = | t N L | 2 . However, more complicated functions are often used. A prediction’s output can be thought of as argmax i . x L i . Convolution may be stated as follows:
x j l + 1 . k l + 1 , d = j = 0 P k = 0 M d = 0 D g j . k . d × N j l + 1 + j , k l + 1 + k , d L
The size of the filter g is ( P × M × D l ); thus, the spatial size of the convolution will be ( P l P + 1 ) × ( M l M + 1 ) with D slides, which means y( x l + 1 ) in R P l + 1 × M l + 1 × D l + 1 , P l + 1 = P l P + 1, M l + 1 = M l M + 1 , D l + 1 = D.
The probability of each symbol—for example, S ∈ {1, 2, 3, … S} for each training sample—is calculated using Equation (9).
P ( S | N ) = e x p ( T S ) j S e x p ( T j )
where T is a non-normalized log probability. The cross entropy for this model can be computed as
E n t = s = 1 S l o g ( p ( S ) q ( S ) )
Because cross-entropy loss is differentiable in terms of logistics, T S , it may be used to gradient-train deep models. The range is between −1 and +1, where the simple form of the gradients is l T S . Typically, when cross-entropy is minimized, the log-likelihood of the correct label is maximized. A CNN architecture analyzes a distribution over labels independent of training instances u ( S ) with a smooth parameter ζ , since this may create some overfitting problems, where for a training example, q ( S | N ) = σ S , N is replaced as follows [75]:
q S | N = ( 1 ζ ) σ S , N + ζ μ ( S )
where q S | N is a mixture of q S | N with weight 1 − ζ and the fixed distribution μ ( S ) with weight ζ . When label-smoothing regularization is applied with μ ( S ) = 1 S , q S | N becomes
q S | N = ( 1 ζ ) σ S , N + ζ S
Alternatively, this can be expressed in the form of entropy as follows:
P ( q , v ) = s = 1 K l o g ( p ( s ) ) q ( s ) = ( 1 ζ ) P ( q , v ) + ζ P ( u , p )
Thus, the label-smoothing regularization is equivalent to replacing a single cross-entropy loss H ( q , v ) with two losses, H ( q , v ) and H ( u , v ) , with the second loss penalizing the deviation of the predicted label distribution v from the prior u with a relative weight of ζ ( 1 ζ ) , which is equivalent to computing the Kullback–Leibler divergence. A further mathematical formulation of CNN architecture can be seen in [76,77].

7.1. Transfer Learning

Transfer learning is a type of machine learning that involves training to construct a model for prediction tasks such as COVID-19 and liver disease forecasting [78,79]. It is a circumstance in which information obtained in one context is utilized to maximize performance in another [52,80,81]. Transfer learning is often utilized when the new dataset on which the pre-trained model is trained is smaller than the original dataset. This research work presents a strategy for repurposing an Inception-v3 model trained on a base dataset (ImageNet) to learn (or transfer) features for training on a new dataset (CIFAR-10 and Caltech Faces) [54]. Transfer learning enables us to start with the features learned on the ImageNet dataset and adapt them, as well as the model’s structure, to the new dataset/task, rather than beginning the learning process from scratch with random weight initialization.

7.2. Fine Tuning

The proposed model is tuned to recognize 1000 generic object classes listed as part of the ImageNet hierarchy [82].
The concept of fine-tuning a network is based on the idea of transfer learning [83]. We train a CNN to learn features for a large domain by optimizing the classification function for that domain’s error minimization. After replacing the classification function, the network is adjusted again to minimize the error in a more specific domain. This configuration moves the network’s features and properties from the wide domain to the specialized domain.
The CNN classification function, known as softmax, is used to calculate the probability of each of the 1000 classes in the ImageNet dataset. To commence the fine-tuning procedure, existing softmax classifier values are deleted and replaced with new random values, and an updated softmax classifier is then trained from scratch by incorporating the back-propagation algorithm in which a large amount of pneumonia patient data is used.
It is crucial to precisely calibrate the learning rates of each layer before initiating the back-propagation process for fine-tuning. In this research, we boosted the learning rate of the top classification layer to 10 and dropped it to 0.1 for the next seven layers. Five thousand rounds of the back-propagation approach were employed, using stochastic gradient descent to optimize the network parameters (SGD). The accuracy of image classification in a validation set develops throughout the fine-tuning process, as seen in Figure 9. Accuracy significantly increased throughout the first rounds and stabilized at roughly 40,000 iterations.

8. Materials and Methods

The proposed non-invasive model for pneumonia diagnosis complements the conventional diagnostics tools/mechanisms and enables medical practitioners to diagnose pneumonia with better reliability and accuracy. There are 5300 verified chest X-ray images in the dataset used in the proposed research. The X-ray images for the healthy and pneumonia patients and the distribution of the data are shown in Figure 6.
The images are divided into two groups: a training set and a testing set of patients. All chest X-ray imaging was performed as part of the patients’ regular medical treatment. To analyze chest X-ray images, all chest radiographs were first reviewed for quality control, with any scans that were poor quality or illegible being removed. After that, the diagnoses for the images were rated by two experts before being approved for use in the AI system. Finally, a third expert evaluated the assessment set to make sure there were no grading problems.
Because the images are of varying sizes and quality, attributes such as sharpness, contrast, and brightness levels are varied for practically all of them. Pneumonia can be diagnosed with the help of X-rays. According to findings on X-ray images, organic causes of pneumonia include uneven mucosal surfaces and increased luminal fluid. Different patterns may be seen in X-ray images while looking for pneumonia. As seen in Figure 6, healthy and normal patients and pneumonia-infected individuals exhibit various patterns in their X-ray images, as seen in Figure 6. From X-ray images, many patterns may be used to identify pneumonia symptoms. Further information on these symptoms based on X-ray pictures is given in [84].
There are various parameters and symptoms to examine when attempting to diagnose a person with pneumonia, including cough, fever, chest pain, flu, low energy, sweating and shaking, chills, shortness of breath, fatigue, loss of appetite, and headache. However, not all symptoms appear in every pneumonia patient, and the severity of each symptom may vary from patient to patient.

Data Representation

The data used in the proposed work are in the form of X-ray images, which may be used to identify infections in the liver and lungs, as well as pneumonia [85]. The data percentages of pneumonia and healthy patients are shown in Figure 10.
Several physiological symptoms are considered for pneumonia diagnosis. Such symptoms are assigned a specific numerical value, as shown in Table 2. The numerical data are defined as follows: if a person is suffering from fever, the statistical value for the scenario will be 1, and vice versa. The values 1 (yes) and 0 (mo) are the indication of the presence and absence of symptoms, respectively. All the numeric values for each symptom are displayed in Table 2. Table 3 shows the data for only 60 patients. Moreover, for the better visualization of the dataset, violin plots are given in Figure 11. Apart from the physiological features, several statistical features are also used to build the proposed model. The details of the statistical features can be seen in [86].

9. Model Selection, Training and Evaluation

The goal of the proposed work is to classify healthy subjects and pneumonia disease subjects, differentiating them from each other. To achieve this classification, the classification performance is analyzed. The block diagram of the proposed work is given in Figure 12. The step by step explanation of the proposed model is presented below.
  • The collection of data was in the form of (X-ray) images and consent forms. Different X-ray images varied with size; for example, A × B , where A and B denote the rows and columns of pixels, respectively.
  • Statistical features were extracted from the X-ray images using CNN, which extracted features through the filters available in different layers. Initial layer filters were responsible for extracting low-level features, while higher layers filters were responsible for extracting high-level features. Such extracted features were then forwarded to the classifier for the decision.
  • Split features were extracted from X-ray images by observing patterns. For example, the patterns shown on the X-ray images of healthy individuals varied from the patterns that appeared on the X-ray images of pneumonia-infected patients. Here, CNN extracted different features/patterns and took a decision based on the extracted features/patterns. Pneumonia images are different from those of normal patients. From Figure 6i–p, one can see different colors, showing a sign of abnormality in the patient. However, the X-ray of the normal patients does not show color variation (see Figure 6a–h).
  • Distinct feature vectors (X.Vs) for each X-ray image were made: X . V = X 1 , X 2 , X 3 X 1 4 .
  • The given matrix ( X . V s ) represents only those feature vectors created from statistical features extracted from the X-ray images. Such features can be expressed in a single data set, as shown in Equation (14).
    Feature vectors ( X . Vs ) = X . V 1 = X 1 , X 2 , X 3 X 14 X . V 2 = X 1 , X 2 , X 3 X 14 X . V 3 = X 1 , X 2 , X 3 X 14 X . V n = X 1 , X 2 , X 3 X 14
The dataset was split into two sections: one for training and the other for testing. The training data were drawn from a collection of healthy and pneumonia-infected subjects, and the model was trained using CNN. In total, 80% of the dataset was chosen at random for training purposes, with both healthy and contaminated data types taken into account, as given in Equation (15). The precise proportion of data allotted for training and testing might vary. Previously, CBC (complete blood count) determined the type and amount of white blood cells in the body; findings may indicate the presence of an illness. Blood tests for potassium, sodium, and other chemistries (BMP) have been used to evaluate the severity of a disease. This is a non-invasive method to examine the human body, and safety measures must also be adhered to while performing the whole procedure; otherwise, it will be harmful to human beings. Machine learning approaches are used in the proposed study to overcome the weaknesses in CBC and BMP for the real-time identification or diagnosis of pneumonia.
if Testing data samples T = 100 Training data sample ( Total F . Vs ) ( 100 )
CNN was applied to the proposed mode to classify pneumonia and healthy subjects. Moreover, several ML algorithms such as decision tree, naive Bayes and random forest were also tested on the proposed work. The purpose of using other classifiers/Ml algorithms was to compare the results of the ML algorithm with the deep learning algorithm. In this work, the performance of CNN is better than other ML algorithms, as can be seen in Table 4. Therefore, CNN is selected in this research work due to its higher performance.
Moreover, to improve the accuracy of the proposed model, we applied transfer learning and fine tuning. After fine tuning, the model accuracy was found to be 96%. Further, to enhance the proposed model, K-fold analysis and voting techniques were also incorporated, and an accuracy of 97.7% was successfully achieved. The detailed results and analysis are given in Table 4 and Table 5.

9.1. K-Fold Analysis

The statistical approach of cross-validation is used to estimate the skill of machine learning models. We initially shuffled our dataset in k-fold cross-validation such that the order of the inputs and outputs was perfectly random. These steps were performed to ensure that our information was not skewed in any manner. The dataset was then divided into k equal-sized sections. We employed 10-fold cross-validation in this analysis.
As a result, the very first step was to shuffle and divide our data into 10 folds. Then, in each k interaction, we utilized one fold for testing and calculating the empirical square loss and the remaining nine to train our model. As a result, we chose a different fold for testing each time that we started a new interaction. This ensured that each of the k parts was only utilized for testing once. The values for the parameters such as accuracy, precision, recall, and F-1 score are listed in Table 5.
In the proposed work, five different values of K were selected (K = 25, K = 30, K = 35 and K = 40) to generate four different K-models in order to apply the voting techniques, which are explained in the next sections.

9.2. Voting Techniques

The Ensemble Voting Classifier is a meta classifier that combines comparable or excellent machine learning classifiers for classification and detection. “Hard” and “soft” voting are carried out via the Ensemble Voting Classifier.

9.2.1. Hard Voting

The simplest case of majority voting is hard ensemble voting. This technique works on the majority votes. For instance, in the proposed research, to increase the model’s accuracy, dif k using k-fold analysis classifies the event into classes A and B based on the majority votes. In Figure 13, the accuracies of all the k-models are displayed, and it can be seen that the majority votes in favor of class A. Therefore, after applying hard voting, an upcoming sample will fall in class A.

9.2.2. Soft Voting

In soft voting, the classes are predicted based on the classifier’s predicted probability p. In Figure 14, different probabilities of a particular type occurring through an individual k-model are displayed. Mathematically, the probability of either class and the assignment of the class to the upcoming sample can be calculated using Equations (16) and (17).
For class A = P o ( E A ) 1 + P o ( E A ) 2 + P o ( E A ) 3 + + P o ( E A ) N N
For class B = P o ( E A ) 1 + P o ( E A ) 2 + P o ( E A ) 3 + + P o ( E A ) N N
where P o ( E A ) and P o ( E B ) is the probability of events A and B occurring, respectively.
According to the calculated probabilities, Equations (16) and (17) become
For class A = 0.84 + 0.90 + 0.65 + 0.89 + 0.54 5 = 76.4
For class B = 0.16 + 0.10 + 0.65 + 0.89 + 0.46 5 = 23.6

10. Experimental Setup

The presented model was developed in Python, and the computer system on which it was run had the following specifications: 8 GB RAM, Windows 8, and a graphics card. Furthermore, Python 3.7 uses several libraries such as pandas, Matplotib, Numpy, Seaborn, Tensorflow, Sklearn, CV2, Image Data, and transfer learning.

10.1. Results and Discussion

To analyze the model’s performance in diagnosing pneumonia, it was necessary to examine the performance of classifiers using quantitative measures to evaluate their effectiveness. Therefore, metrics such as precision, recall, F1 score, and support were used to assess the proposed model. Following that, the results of the TP (True Positive), TN (True Negative), FP (False Positive), and FN (False Negative) tests were used to create the five performance measures indicated in the confusion matrix.

10.2. Confusion Matrix

The classifier’s accuracy and error can be represented via the confusion matrix. This describes the model’s performance on test images when the real values are known and summarizes the output results. Figure 15 shows the confusion matrix for the proposed models in which CNN, transfer learning and fine tuning are applied:
The suggested CNN-based model (model-1) has a training and validation accuracy of 95.1% and of 95.3%, respectively, while model-1 has training and validation losses of 0.18% and 0.15%, respectively. Transfer learning improved the training and validation accuracy of model-1 to 93.6% and 95.5%, respectively. While the training and validation losses are 1.8% and 1.3% at this level, Finally, the transfer learning-based model is fine-tuned, and it achieves a training and validation accuracy of 96.5% and 97.1%, respectively. Similarly, when fine tuning is used, the training and validation losses are reduced to 0.8% and 1.2%, respectively. This impact can be seen in Figure 16.

10.3. Receiver Operator Characteristic (ROC) Curve

An ROC curve represents a binary classifier’s diagnostic ability. It originated in signal detection theory but has since been used in various fields, including medicine, radiography, natural disasters, and machine learning. The receiver operating characteristic (ROC) curve illustrates the trade-off between sensitivity (or TPR) and specificity (1–FPR). Classifiers that produce curves closer to the top-left corner perform better. From Figure 17, it can be seen that the ROC curve for the proposed work is closer to the desired value.

11. Conclusions

The proposed work is intended to secure X-ray images and identify pneumonia based on neural networks. To ensure that the patients’ X-ray images are not used by any unauthorized person, they are secured using chaos and neural networks. Moreover, a neural network-based model is proposed for the pneumonia diagnosis with high accuracy. In the diagnosis of this disease, false positive events are more harmful than false negative events. Hence, a deep learning system algorithm such as CNN is incorporated in the proposed work to increase the true positive rate. Moreover, to further increase the accuracy of the proposed model, transfer learning and fine tuning are also incorporated. Numerous evaluations of our suggested model, including testing through the analysis of k-fold experimentation and performance comparisons of other algorithms, helped us to select the best-suited deep learning method for completing the desired task. From the experimentation and analysis, it can be seen that the accuracy of the proposed work is 97%. Moreover, the proposed methodology works better when compared with the machine learning and deep learning-based existing models.
The proposed work is based on a deep learning algorithm. The accuracy of the proposed work is acceptable. However, it can be improved by the use of hybrid AI algorithms in the future.

Author Contributions

Conceptualization, M.U.R., A.S., K.H.K., S.K. and Q.H.A.; Data curation, M.U.R., A.A.A., T.A., N.R., J.A. and Q.H.A.; Formal analysis, K.H.K. and Q.H.A.; Funding acquisition, A.A.A., T.A., N.R., S.A.S. and Q.H.A.; Investigation, M.U.R., A.S., K.H.K., S.A.S. and Q.H.A.; Methodology, S.K., A.A.A., J.A. and S.A.S.; Resources, A.A.A. and S.A.S.; Software, M.U.R.; Supervision, S.K.; Visualization, N.R. All authors have read and agreed to the published version of the manuscript.

Funding

The work is supported in parts by EPSRC EP/T021063/1. The authors extend their appreciation to the Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia for funding this research work through the project number (IF_2020_NBU_202) and in part by the Taif University, Taif, Saudi Arabia, through the Taif University Research Grant under Project TURSP-2020/277.

Institutional Review Board Statement

This study was approved by the Institutional Review Board (IRB) of Riphah International University (RIU) via reference number ref./REC/21-10.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

Dataset used in this study is available on individual request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Priya, S.; Santhi, B. A novel visual medical image encryption for secure transmission of authenticated watermarked medical images. Mob. Netw. Appl. 2019, 1–8. [Google Scholar] [CrossRef]
  2. Shah, S.A.; Ahmad, J.; Masood, F.; Shah, S.Y.; Pervaiz, H.; Taylor, W.; Imran, M.A.; Abbasi, Q.H. Privacy-preserving wandering behavior sensing in dementia patients using modified logistic and dynamic newton leipnik maps. IEEE Sens. J. 2020, 21, 3669–3679. [Google Scholar] [CrossRef]
  3. Singh, N.; Sinha, A. Optical image encryption using fractional Fourier transform and chaos. Opt. Lasers Eng. 2008, 46, 117–123. [Google Scholar] [CrossRef]
  4. Hennelly, B.M.; Sheridan, J.T. Image encryption and the fractional Fourier transform. Optik 2003, 114, 251–265. [Google Scholar] [CrossRef] [Green Version]
  5. Yu, Z.; Zhe, Z.; Haibing, Y.; Wenjie, P.; Yunpeng, Z. A chaos-based image encryption algorithm using wavelet transform. In Proceedings of the 2010 2nd International Conference on Advanced Computer Control, Shenyang, China, 27–29 March 2010; Volume 2, pp. 217–222. [Google Scholar]
  6. Maniccam, S.S.; Bourbakis, N.G. Image and video encryption using SCAN patterns. Pattern Recognit. 2004, 37, 725–737. [Google Scholar] [CrossRef]
  7. Ravichandran, D.; Banu, S.A.; Murthy, B.; Balasubramanian, V.; Fathima, S.; Amirtharajan, R. An efficient medical image encryption using hybrid DNA computing and chaos in transform domain. Med. Biol. Eng. Comput. 2021, 59, 589–605. [Google Scholar] [CrossRef] [PubMed]
  8. Ibrahim, S.; Alhumyani, H.; Masud, M.; Alshamrani, S.S.; Cheikhrouhou, O.; Muhammad, G.; Hossain, M.S.; Abbas, A.M. Framework for efficient medical image encryption using dynamic S-boxes and chaotic maps. IEEE Access 2020, 8, 160433–160449. [Google Scholar] [CrossRef]
  9. Ali, T.S.; Ali, R. A novel medical image signcryption scheme using TLTS and Henon chaotic map. IEEE Access 2020, 8, 71974–71992. [Google Scholar] [CrossRef]
  10. Adedokun, E.; Akan, B.J.; Salau, H.; Umoh, I.; Nwosu, R.I.; Ibrahim, Y. A Secure Chaotic Framework for Medical Image Encryption using a 3D Logistic Map. Appl. Model. Simul. 2020, 4, 141–148. [Google Scholar]
  11. Gafsi, M.; Abbassi, N.; Hajjaji, M.A.; Malek, J.; Mtibaa, A. Improved chaos-based cryptosystem for medical image encryption and decryption. Sci. Program. 2020, 2020, 6612390. [Google Scholar] [CrossRef]
  12. Rajagopalan, S.; Poori, S.; Narasimhan, M.; Rethinam, S.; Kuppusamy, C.V.; Balasubramanian, R.; Annamalai, V.M.P.; Rengarajan, A. Chua’s diode and strange attractor: A three-layer hardware–software co-design for medical image confidentiality. IET Image Process. 2020, 14, 1354–1365. [Google Scholar] [CrossRef]
  13. Liu, C.; Wang, X.; Liu, C.; Sun, Q.; Peng, W. Differentiating novel coronavirus pneumonia from general pneumonia based on machine learning. Biomed. Eng. Online 2020, 19, 66. [Google Scholar] [CrossRef] [PubMed]
  14. Greenslade, L. World Pneumonia Day during a Global Pneumonia Pandemic: 12 November. Am. J. Physiol. Lung Cell. Mol. Physiol. 2020, 319, L859–L860. [Google Scholar] [CrossRef] [PubMed]
  15. Casado, F.; Morty, R.E. World Health Observances in November 2020: Adult and Pediatric Pneumonia, Preterm Birth, and Chronic Obstructive Pulmonary Disease in Focus. Am. J. Physiol. Lung Cell. Mol. Physiol. 2020, 319, L854–L858. [Google Scholar] [CrossRef] [PubMed]
  16. Wu, H.; Xie, P.; Zhang, H.; Li, D.; Cheng, M. Predict pneumonia with chest X-ray images based on convolutional deep neural learning networks. J. Intell. Fuzzy Syst. 2020, 39, 2893–2907. [Google Scholar] [CrossRef]
  17. Chen, C.Y.; Lin, W.C.; Yang, H.Y. Diagnosis of ventilator-associated pneumonia using electronic nose sensor array signals: Solutions to improve the application of machine learning in respiratory research. Respir. Res. 2020, 21, 45. [Google Scholar] [CrossRef]
  18. Cooper, G.F.; Aliferis, C.F.; Ambrosino, R.; Aronis, J.; Buchanan, B.G.; Caruana, R.; Fine, M.J.; Glymour, C.; Gordon, G.; Hanusa, B.H.; et al. An evaluation of machine-learning methods for predicting pneumonia mortality. Artif. Intell. Med. 1997, 9, 107–138. [Google Scholar] [CrossRef]
  19. Chumbita, M.; Cillóniz, C.; Puerta-Alcalde, P.; Moreno-García, E.; Sanjuan, G.; Garcia-Pouton, N.; Soriano, A.; Torres, A.; Garcia-Vidal, C. Can artificial intelligence improve the management of pneumonia. J. Clin. Med. 2020, 9, 248. [Google Scholar] [CrossRef] [Green Version]
  20. Mohanan, M.; Babiarz, K.S.; Goldhaber-Fiebert, J.D.; Miller, G.; Vera-Hernández, M. Effect of a large-scale social franchising and telemedicine program on childhood diarrhea and pneumonia outcomes in India. Health Aff. 2016, 35, 1800–1809. [Google Scholar] [CrossRef]
  21. Ayan, E.; Ünver, H.M. Diagnosis of pneumonia from chest X-ray images using deep learning. In Proceedings of the 2019 Scientific Meeting on Electrical-Electronics & Biomedical Engineering and Computer Science (EBBT), Istanbul, Turkey, 24–26 April 2019; pp. 1–5. [Google Scholar]
  22. Bhartiya, P.; Yadav, S.; Gupta, A.; Gupta, D. Pneumonia Detection Using CNN and ANN Based on Deep Learning Approach. In Emerging Technologies for Healthcare: Internet of Things and Deep Learning Models; Wiley: Hoboken, NJ, USA, 2021; pp. 181–201. [Google Scholar]
  23. Moujahid, H.; Cherradi, B.; El Gannour, O.; Bahatti, L.; Terrada, O.; Hamida, S. Convolutional Neural Network Based Classification of Patients with Pneumonia using X-ray Lung Images. Transfer 2020, 2, 16. [Google Scholar] [CrossRef]
  24. Ho, T.T.; Park, J.; Kim, T.; Park, B.; Lee, J.; Kim, J.Y.; Kim, K.B.; Choi, S.; Kim, Y.H.; Lim, J.K.; et al. Deep learning models for predicting severe progression in COVID-19-infected patients: Retrospective study. JMIR Med. Inf. 2021, 9, e24973. [Google Scholar] [CrossRef]
  25. Kavitha, M.; Jayasankar, T.; Venkatesh, P.M.; Mani, G.; Bharatiraja, C.; Twala, B. COVID-19 disease diagnosis using smart deep learning techniques. J. Appl. Sci. Eng. 2021, 24, 271–277. [Google Scholar]
  26. Patel, R. Predicting Invasive Ductal Carcinoma Using a Reinforcement Sample Learning Strategy Using Deep Learning. arXiv 2021, arXiv:2105.12564. [Google Scholar]
  27. Hu, Q.; Drukker, K.; Giger, M.L. Role of standard and soft tissue chest radiography images in COVID-19 diagnosis using deep learning. In Proceedings of the Medical Imaging 2021: Computer-Aided Diagnosis, San Diego, CA, USA, 15–20 February 2021; Volume 11597, p. 1159704. [Google Scholar]
  28. Rajpurkar, P.; Irvin, J.; Zhu, K.; Yang, B.; Mehta, H.; Duan, T.; Ding, D.; Bagul, A.; Langlotz, C.; Shpanskaya, K.; et al. Chexnet: Radiologist-level pneumonia detection on chest X-rays with deep learning. arXiv 2017, arXiv:1711.05225. [Google Scholar]
  29. Bai, B.; Nazir, S.; Bai, Y.; Anees, A. Security and provenance for Internet of Health Things: A systematic literature review. J. Softw. Evol. Process 2021, 33, e2335. [Google Scholar] [CrossRef]
  30. Al-Maadeed, T.A.; Hussain, I.; Anees, A.; Mustafa, M.T. A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes. In Multimedia Tools and Applications; Springer: Berlin/Heidelberg, Germany, 2021; pp. 1–22. [Google Scholar]
  31. Gondal, M.A.; Anees, A. Analysis of optimized signal processing algorithms for smart antenna system. Neural Comput. Appl. 2013, 23, 1083–1087. [Google Scholar] [CrossRef]
  32. Coppersmith, D. The Data Encryption Standard (DES) and its strength against attacks. IBM J. Res. Dev. 1994, 38, 243–250. [Google Scholar] [CrossRef]
  33. Osvik, D.A.; Bos, J.W.; Stefan, D.; Canright, D. Fast software AES encryption. In International Workshop on Fast Software Encryption; Springer: Berlin/Heidelberg, Germany, 2010; pp. 75–93. [Google Scholar]
  34. Basu, S. International data encryption algorithm (idea)—A typical illustration. J. Glob. Res. Comput. Sci. 2011, 2, 116–118. [Google Scholar]
  35. Hussain, I.; Anees, A.; Al-Maadeed, T.A.; Mustafa, M.T. Construction of s-box based on chaotic map and algebraic structures. Symmetry 2019, 11, 351. [Google Scholar] [CrossRef] [Green Version]
  36. Shafique, A. A new algorithm for the construction of substitution box by using chaotic map. Eur. Phys. J. Plus 2020, 135, 194. [Google Scholar] [CrossRef]
  37. Ahmed, F.; Anees, A.; Abbas, V.U.; Siyal, M.Y. A noisy channel tolerant image encryption scheme. Wirel. Pers. Commun. 2014, 77, 2771–2791. [Google Scholar] [CrossRef]
  38. Shafique, A.; Ahmed, J. Dynamic substitution based encryption algorithm for highly correlated data. Multidimens. Syst. Signal Process. 2021, 32, 91–114. [Google Scholar] [CrossRef]
  39. Raghavendra, C.; Sivasubramanian, S.; Kumaravel, A. Improved image compression using effective lossless compression technique. Clust. Comput. 2019, 22, 3911–3916. [Google Scholar] [CrossRef]
  40. Rehman, M.U.; Shafique, A.; Khalid, S.; Hussain, I. Dynamic Substitution and Confusion-Diffusion-Based Noise-Resistive Image Encryption Using Multiple Chaotic Maps. IEEE Access 2021, 9, 52277–52291. [Google Scholar] [CrossRef]
  41. Martin, K.; Lukac, R.; Plataniotis, K.N. Efficient encryption of wavelet-based coded color images. Pattern Recognit. 2005, 38, 1111–1115. [Google Scholar] [CrossRef]
  42. Jamal, S.S.; Anees, A.; Ahmad, M.; Khan, M.F.; Hussain, I. Construction of cryptographic S-boxes based on mobius transformation and chaotic tent-sine system. IEEE Access 2019, 7, 173273–173285. [Google Scholar] [CrossRef]
  43. Shafique, A.; Shahid, J. Novel image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps. Eur. Phys. J. Plus 2018, 133, 331. [Google Scholar] [CrossRef]
  44. Anees, A.; Hussain, I. A novel method to identify initial values of chaotic maps in cybersecurity. Symmetry 2019, 11, 140. [Google Scholar] [CrossRef] [Green Version]
  45. Anees, A.; Siddiqui, A.M.; Ahmed, J.; Hussain, I. A technique for digital steganography using chaotic maps. Nonlinear Dyn. 2014, 75, 807–816. [Google Scholar] [CrossRef]
  46. Anees, A.; Siddiqui, A.M.; Ahmed, F. Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun. Nonlinear Sci. Numer. Simul. 2014, 19, 3106–3118. [Google Scholar] [CrossRef]
  47. Shafique, A.; Ahmed, J.; Boulila, W.; Ghandorh, H.; Ahmad, J.; Rehman, M.U. Detecting the security level of various cryptosystems using machine learning models. IEEE Access 2020, 9, 9383–9393. [Google Scholar] [CrossRef]
  48. Bouslimi, D.; Coatrieux, G.; Cozic, M.; Roux, C. A joint encryption/watermarking system for verifying the reliability of medical images. IEEE Trans. Inf. Technol. Biomed. 2012, 16, 891–899. [Google Scholar] [CrossRef] [PubMed]
  49. Li, C.; Liu, Y.; Xie, T.; Chen, M.Z. Breaking a novel image encryption scheme based on improved hyperchaotic sequences. Nonlinear Dyn. 2013, 73, 2083–2089. [Google Scholar] [CrossRef] [Green Version]
  50. Zhou, Y.; Cao, W.; Chen, C.P. Image encryption using binary bitplane. Signal Process. 2014, 100, 197–207. [Google Scholar] [CrossRef]
  51. Li, C. Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process. 2016, 118, 203–210. [Google Scholar] [CrossRef] [Green Version]
  52. Liang, G.; Zheng, L. A transfer learning method with deep residual network for pediatric pneumonia diagnosis. Comput. Methods Programs Biomed. 2020, 187, 104964. [Google Scholar] [CrossRef]
  53. Sánchez Morillo, D.; Leon Jimenez, A.; Moreno, S.A. Computer-aided diagnosis of pneumonia in patients with chronic obstructive pulmonary disease. J. Am. Med. Inf. Assoc. 2013, 20, e111–e117. [Google Scholar] [CrossRef] [Green Version]
  54. Luján-García, J.E.; Yáñez-Márquez, C.; Villuendas-Rey, Y.; Camacho-Nieto, O. A transfer learning method for pneumonia classification and visualization. Appl. Sci. 2020, 10, 2908. [Google Scholar] [CrossRef] [Green Version]
  55. Tsai, M.J.; Tao, Y.H. Machine Learning Based Common Radiologist-Level Pneumonia Detection on Chest X-rays. In Proceedings of the 2019 13th International Conference on Signal Processing and Communication Systems (ICSPCS), Gold Coast, QLD, Australia, 16–18 December 2019; pp. 1–7. [Google Scholar]
  56. El Asnaoui, K.; Chawki, Y.; Idri, A. Automated methods for detection and classification pneumonia based on X-ray images using deep learning. In Artificial Intelligence and Blockchain for Future Cybersecurity Applications; Springer: Berlin/Heidelberg, Germany, 2021; pp. 257–284. [Google Scholar]
  57. Siddiqi, R. Automated pneumonia diagnosis using a customized sequential convolutional neural network. In Proceedings of the 2019 3rd International Conference on Deep Learning Technologies, Xiamen, China, 5–7 July 2019; pp. 64–70. [Google Scholar]
  58. Civit-Masot, J.; Luna-Perejón, F.; Domínguez Morales, M.; Civit, A. Deep learning system for COVID-19 diagnosis aid using X-ray pulmonary images. Appl. Sci. 2020, 10, 4640. [Google Scholar] [CrossRef]
  59. Ni, Q.; Sun, Z.Y.; Qi, L.; Chen, W.; Yang, Y.; Wang, L.; Zhang, X.; Yang, L.; Fang, Y.; Xing, Z. A deep learning approach to characterize 2019 coronavirus disease (COVID-19) pneumonia in chest CT images. Eur. Radiol. 2020, 30, 6517–6527. [Google Scholar] [CrossRef]
  60. Zhang, R.; Tie, X.; Qi, Z.; Bevins, N.B.; Zhang, C.; Griner, D.; Song, T.K.; Nadig, J.D.; Schiebler, M.L.; Garrett, J.W. Diagnosis of coronavirus disease 2019 pneumonia by using chest radiography: Value of artificial intelligence. Radiology 2021, 298, E88–E97. [Google Scholar] [CrossRef]
  61. Antin, B.; Kravitz, J.; Martayan, E. Detecting pneumonia in chest X-Rays with supervised learning. Semanticscholar. org 2017. Available online: http://cs229.stanford.edu/proj2017/final-reports/5231221.pdf (accessed on 9 December 2021).
  62. Jain, R.; Nagrath, P.; Kataria, G.; Kaushik, V.S.; Hemanth, D.J. Pneumonia detection in chest X-ray images using convolutional neural networks and transfer learning. Measurement 2020, 165, 108046. [Google Scholar] [CrossRef]
  63. Ismail, S.M.; Said, L.A.; Radwan, A.G.; Madian, A.H.; Abu-Elyazeed, M.F. Generalized double-humped logistic map-based medical image encryption. J. Adv. Res. 2018, 10, 85–98. [Google Scholar] [CrossRef]
  64. Tian, J.; Lu, Y.; Zuo, X.; Liu, Y.; Qiao, B.; Fan, M.; Ge, Q.; Fan, S. A novel image encryption algorithm using PWLCM map-based CML chaotic system and dynamic DNA encryption. Multimed. Tools Appl. 2021, 80, 32841–32861. [Google Scholar] [CrossRef]
  65. Hussain, I.; Anees, A.; Algarni, A. A novel algorithm for thermal image encryption. J. Integr. Neurosci. 2018, 17, 447–461. [Google Scholar] [CrossRef] [PubMed]
  66. Shafique, A.; Ahmed, F. Image encryption using dynamic S-box substitution in the wavelet domain. Wirel. Pers. Commun. 2020, 115, 2243–2268. [Google Scholar] [CrossRef]
  67. Hussain, I.; Anees, A.; Aslam, M.; Ahmed, R.; Siddiqui, N. A noise resistant symmetric key cryptosystem based on S 8 S-boxes and chaotic maps. Eur. Phys. J. Plus 2018, 133, 167. [Google Scholar] [CrossRef]
  68. Hussain, I.; Anees, A.; Alkhaldi, A.H.; Aslam, M.; Siddiqui, N.; Ahmed, R. Image encryption based on Chebyshev chaotic map and S8 S-boxes. Opt. Appl. 2019, 49, 317–330. [Google Scholar]
  69. Shafique, A.; Hazzazi, M.M.; Alharbi, A.R.; Hussain, I. Integration of Spatial and Frequency Domain Encryption for Digital Images. IEEE Access 2021, 9, 149943–149954. [Google Scholar] [CrossRef]
  70. Wen, H.; Zhang, C.; Huang, L.; Ke, J.; Xiong, D. Security Analysis of a Color Image Encryption Algorithm Using a Fractional-Order Chaos. Entropy 2021, 23, 258. [Google Scholar] [CrossRef]
  71. Hussain, I.; Anees, A.; AlKhaldi, A.H.; Algarni, A.; Aslam, M. Construction of chaotic quantum magnets and matrix Lorenz systems S-boxes and their applications. Chin. J. Phys. 2018, 56, 1609–1621. [Google Scholar] [CrossRef]
  72. Li, Z.; Peng, C.; Tan, W.; Li, L. An effective chaos-based image encryption scheme using imitating jigsaw method. Complexity 2021, 2021, 8824915. [Google Scholar] [CrossRef]
  73. Zhang, Y. A new unified image encryption algorithm based on a lifting transformation and chaos. Inf. Sci. 2021, 547, 307–327. [Google Scholar] [CrossRef]
  74. Naumann, U. On the Computational Complexity of the Chain Rule of Differential Calculus. arXiv 2021, arXiv:2107.05355. [Google Scholar]
  75. Jo, J.; Kim, S.; Park, I.C. Energy-efficient convolution architecture based on rescheduled dataflow. IEEE Trans. Circuits Syst. I Regul. Pap. 2018, 65, 4196–4207. [Google Scholar] [CrossRef]
  76. Wu, J. CNN for Dummies; Nanjing University: Nanjing, China, 2015; Volume 202. [Google Scholar]
  77. Szegedy, C.; Vanhoucke, V.; Ioffe, S.; Shlens, J.; Wojna, Z. Rethinking the inception architecture for computer vision. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, NV, USA, 27–30 June 2016; pp. 2818–2826. [Google Scholar]
  78. Rehman, M.U.; Shafique, A.; Khalid, S.; Driss, M.; Rubaiee, S. Future Forecasting of COVID-19: A Supervised Learning Approach. Sensors 2021, 21, 3322. [Google Scholar] [CrossRef] [PubMed]
  79. Rehman, M.U.; Najam, S.; Khalid, S.; Shafique, A.; Alqahtani, F.; Baothman, F.; Shah, S.Y.; Abbasi, Q.H.; Imran, M.A.; Ahmad, J. Infrared Sensing Based Non-invasive Initial Diagnosis of Chronic Liver Disease Using Ensemble Learning. IEEE Sens. J. 2021, 21, 19395–19406. [Google Scholar] [CrossRef]
  80. Chouhan, V.; Singh, S.K.; Khamparia, A.; Gupta, D.; Tiwari, P.; Moreira, C.; Damaševičius, R.; De Albuquerque, V.H.C. A novel transfer learning based approach for pneumonia detection in chest X-ray images. Appl. Sci. 2020, 10, 559. [Google Scholar] [CrossRef] [Green Version]
  81. Rahman, T.; Chowdhury, M.E.; Khandakar, A.; Islam, K.R.; Islam, K.F.; Mahbub, Z.B.; Kadir, M.A.; Kashem, S. Transfer learning with deep convolutional neural network (CNN) for pneumonia detection using chest X-ray. Appl. Sci. 2020, 10, 3233. [Google Scholar] [CrossRef]
  82. Yang, K.; Qinami, K.; Li, F.F.; Deng, J.; Russakovsky, O. Towards fairer datasets: Filtering and balancing the distribution of the people subtree in the imagenet hierarchy. In Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency, Barcelona, Spain, 27–30 January 2020; pp. 547–558. [Google Scholar]
  83. Guo, Y.; Shi, H.; Kumar, A.; Grauman, K.; Rosing, T.; Feris, R. Spottune: Transfer learning through adaptive fine-tuning. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Long Beach, CA, USA, 15–20 June 2019; pp. 4805–4814. [Google Scholar]
  84. Hopstaken, R.; Muris, J.; Knottnerus, J.; Kester, A.; Rinkens, P.; Dinant, G. Contributions of symptoms, signs, erythrocyte sedimentation rate, and C-reactive protein to a diagnosis of pneumonia in acute lower respiratory tract infection. Br. J. Gen. Pract. 2003, 53, 358–364. [Google Scholar]
  85. Khatri, A.; Jain, R.; Vashista, H.; Mittal, N.; Ranjan, P.; Janardhanan, R. Pneumonia identification in chest X-ray images using EMD. In Trends in Communication, Cloud, and Big Data; Springer: Berlin/Heidelberg, Germany, 2020; pp. 87–98. [Google Scholar]
  86. Suganthi, L.; Nirmala, K.; Deepa, S.; Nagalakshmi, K.; Santhya, M. Detection of Pneumonia Clouds From Chest X-ray Images. In Data Intelligence and Cognitive Informatics; Springer: Berlin/Heidelberg, Germany, 2021; pp. 819–829. [Google Scholar]
Figure 1. Neural network-based generator architecture.
Figure 1. Neural network-based generator architecture.
Sensors 22 00461 g001
Figure 2. Neural network-based generator architecture.
Figure 2. Neural network-based generator architecture.
Sensors 22 00461 g002
Figure 3. Neural network-based generator architecture.
Figure 3. Neural network-based generator architecture.
Sensors 22 00461 g003
Figure 4. Permutation process for the proposed encryption scheme.
Figure 4. Permutation process for the proposed encryption scheme.
Sensors 22 00461 g004
Figure 5. (ap) Encrypted images corresponding to normal and pneumonia patients’ X-ray images.
Figure 5. (ap) Encrypted images corresponding to normal and pneumonia patients’ X-ray images.
Sensors 22 00461 g005
Figure 6. (ah) X-ray images of normal patients, (ip) X-ray images of pneumonia patients.
Figure 6. (ah) X-ray images of normal patients, (ip) X-ray images of pneumonia patients.
Sensors 22 00461 g006
Figure 7. Noise attack analysis: (a) plaintext image, (b) encrypted image, (c) noisy encrypted image, (d) decrypted image.
Figure 7. Noise attack analysis: (a) plaintext image, (b) encrypted image, (c) noisy encrypted image, (d) decrypted image.
Sensors 22 00461 g007
Figure 8. CNN architecture.
Figure 8. CNN architecture.
Sensors 22 00461 g008
Figure 9. Illustration of increase in accuracy by increasing the number of iterations.
Figure 9. Illustration of increase in accuracy by increasing the number of iterations.
Sensors 22 00461 g009
Figure 10. Distribution of dataset: (a) Population of normal and pneumonia patrinets in bar graph (b) Percentage of normal and pneumonia patients in pie chart.
Figure 10. Distribution of dataset: (a) Population of normal and pneumonia patrinets in bar graph (b) Percentage of normal and pneumonia patients in pie chart.
Sensors 22 00461 g010
Figure 11. (al) Violin plots corresponding to each feature used in the dataset.
Figure 11. (al) Violin plots corresponding to each feature used in the dataset.
Sensors 22 00461 g011
Figure 12. Flow diagram of the proposed work.
Figure 12. Flow diagram of the proposed work.
Sensors 22 00461 g012
Figure 13. Classification after applying hard voting.
Figure 13. Classification after applying hard voting.
Sensors 22 00461 g013
Figure 14. Classification after applying hard voting.
Figure 14. Classification after applying hard voting.
Sensors 22 00461 g014
Figure 15. Confusion matrices for CNN, transfer learning, and the fine tuning-based proposed model. (a) Confusion matrix for CNN model. (b) Confusion matrix for transfer model. (c) Confusion matrix for fine tuning model.
Figure 15. Confusion matrices for CNN, transfer learning, and the fine tuning-based proposed model. (a) Confusion matrix for CNN model. (b) Confusion matrix for transfer model. (c) Confusion matrix for fine tuning model.
Sensors 22 00461 g015
Figure 16. Confusion matrices for CNN, transfer learning and the fine tuning-based proposed model. (a) Accuracy curve for CNN model. (b) Loss curve for CNN model. (c) Accuracy curve for transfer learning model. (d) Loss curve for transfer learning model. (e) Accuracy curve for fine tuning model. (f) Loss curve for fine tuning model.
Figure 16. Confusion matrices for CNN, transfer learning and the fine tuning-based proposed model. (a) Accuracy curve for CNN model. (b) Loss curve for CNN model. (c) Accuracy curve for transfer learning model. (d) Loss curve for transfer learning model. (e) Accuracy curve for fine tuning model. (f) Loss curve for fine tuning model.
Sensors 22 00461 g016
Figure 17. Flow diagram of the proposed work.
Figure 17. Flow diagram of the proposed work.
Sensors 22 00461 g017
Table 1. Statistical security analysis of the proposed and existing encryption schemes.
Table 1. Statistical security analysis of the proposed and existing encryption schemes.
Proposed Work
Encrypted X-ray ImagesMSEPSNREntropyCorrelationEnergyContrastExecution Time (s)
Normal patient X-ray-1258187.99920.00010.1549.24130.021
Normal patient X-ray-2259157.9991−0.00540.015610.78910.020
Normal patient X-ray-3260167.99880.00100.015510.15840.025
Normal patient X-ray-4251167.99910.00010.015510.79140.027
Pneumonia patient X-ray-1251197.9991−0.00350.015210.73410.029
Pneumonia patient X-ray-2256177.99970.00060.015110.79820.030
Pneumonia patient X-ray-3251167.9992−0.00150.015510.13510.022
Pneumonia patient X-ray-4260157.99900.00040.015410.75460.025
Average260157.99900.00040.015410.75460.025
Comparison
ExistingSchemesMSEPSNREntropyCorrelationEnergyContrastExecution Time (s)
Ref. [68]249207.9953−0.00150.01569.98821.361
Ref. [69]248257.99590.00060.01559.97831.399
Ref. [70]242207.99810.00020.01519.99852.798
Ref. [71]250207.99810.00060.01559.65702.331
Ref. [7]249237.9925−0.00750.01609.99442.978
Ref. [72]248267.9944−0.00500.01599.69862.036
Ref. [73]247217.99720.00090.01589.99732.971
Table 2. Representation of dataset.
Table 2. Representation of dataset.
Value AssignedCoughFeverBreathing IssuesChest PainLoss of AppetiteEnergyFatigueVomitingNauseaSweatingShaking ChillDiarrhea
Yes111111111111
No000000000000
High intense symptom2222N/AN/AN/A2222N/A
Table 3. Data for first 60 patients.
Table 3. Data for first 60 patients.
Value AssignedCoughFeverBreathing IssuesChest PainLoss of AppetiteEnergyFatigue VomitingNauseaSweatingShaking ChillDiarrhea
P-10011100000000Normal
P-21010010000000Normal
P-30000100101000Normal
P-41001001101010Normal
P-51010000000010Normal
P-61010011100000Normal
P-71010011000000Normal
P-81010101101000Normal
P-91010100001000Normal
P-101110111100110Normal
P-111010101100110Normal
P-121010101100100Normal
P-131110100000100Normal
P-141110101101100Normal
P-151100011101100Normal
P-160100000000110Normal
P-170100000010110Normal
P-180100000100110Normal
P-190101100100110Normal
P-200101010100110Normal
P-211010000001101Normal
P-221010000001000Normal
P-231010000000000Normal
P-241101101110011Normal
P-251101111100011Normal
P-261101101100010Normal
P-271110102100000Normal
P-280010002000000Normal
P-290110012000000Normal
P-300110102000000Normal
P-310110002000000Pneumonia
P-320110111000101Pneumonia
P-330010011000100Pneumonia
P-341010111000100Pneumonia
P-351010001000101Pneumonia
P-361010202000110Pneumonia
P-371110011100011Pneumonia
P-381010112101000Pneumonia
P-391110001101011Pneumonia
P-401210210001010Pneumonia
P-412211210001111Pneumonia
P-422001200000000Pneumonia
P-432100010011101Pneumonia
P-442001110011000Pneumonia
P-451200110010001Pneumonia
P-461111201011011Pneumonia
P-471210210000101Pneumonia
P-480211011001111Pneumonia
P-492010001101001Pneumonia
P-501001011000010Pneumonia
P-511201211121212Pneumonia
P-521101112211111Pneumonia
P-531100201211222Pneumonia
P-541101212211122Pneumonia
P-551100212111111Pneumonia
P-561101212222212Pneumonia
P-571100201222222Pneumonia
P-581100211122222Pneumonia
P-591100202212212Pneumonia
P-601100212122122Pneumonia
Table 4. Performance comparison of the proposed work with the existing methods.
Table 4. Performance comparison of the proposed work with the existing methods.
Parameters ParametersCNNTransfer LearningFine TuningRFNBSVMSVMSVMSVM
(Sigmoid(Linear(rbf(Polynomial
Kernel)Kernel)Kernel)Kernel)
Accuracy
analysis
Proposed95.796.397.00.998913519494
Ref. [52]908088898991908385
Ref. [53]859291919091919091
Ref. [57]947476787273818385
Ref. [59]848281889192909196
Ref. [60]908581919193909192
Precision
analysis
Proposed0.960.970.990.881.000.310.341.000.96
Ref. [52]0.830.910.890.840.850.860.880.910.88
Ref. [53]0.910.940.920.950.920.920.940.970.98
Ref. [57]0.960.940.950.970.950980.970.980.97
Ref. [59]0.880.870.860.830.91.960.970.960.97
Ref. [60]0.880.870.860.830.91.960.970.960.97
Recall
analysis
Proposed0.960.991.00.950.790.140.860.910.84
Ref. [52]0.880.910.920.940.900.930.940.930.91
Ref. [53]0.910.930.900.890.970.930.940.910.90
Ref. [57]0.900.910.890.880.950.910.920.900.91
Ref. [59]0.960.900.910.900.910.950.940.910.95
Ref. [60]0.900.910.930.950.950.910.910.900.90
F1-score
analysis
Proposed0.970.980.990.950.880.210.440.9390
Ref. [52]0.850.910.800.870.840.960.920.930.91
Ref. [53]0.910.910.820.910.920.900.970.950.93
Ref. [57]0.950.960.910.900.900.950.940.910.90
Ref. [59]0.900.890.910.920.910.900.940.950.98
Ref. [60]0.900.890.910.920.910.900.940.950.98
Table 5. K-fold analysis.
Table 5. K-fold analysis.
ParametersCNNTransfer LearningFine TuningRFNBSVMSVMSVMSVM
(Sigmoid(Linear(rbf(Polynomial
Kernel)Kernel)Kernel)Kernel)
Accuracy
analysis
K = 2595.796.397928812509091
K = 3094.094.495857921558491
K = 3593.994.696958912509495
K = 4093.593.994.5969012509595
Precision
analysis
K = 250.960.970.990.931.000.310.331.001.00
K = 300.930.950.970.811.000.320.331.001.00
K = 350.920.940.950.940.980.310.320.970.97
K = 400.910.0.930.921.000.320.321.001.00
Recall
analysis
K = 250.960.991.00.910.790.161.000.900.92
K = 300.950.960.970.810.620.331.000.800.91
K = 350.950.970.970.920.780.141.000.910.92
K = 400.940.950.960.960.820.131.000.920.91
F1-score
analysis
K = 250.970.980.990.910.860.210.460.930.92
K = 300.960.970.980.820.760.320.510.890.96
K = 350.950.960.970.920.900.210.510.940.91
K = 400.950.970.970.940.830.200.500.930.96
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Rehman, M.U.; Shafique, A.; Khan, K.H.; Khalid, S.; Alotaibi, A.A.; Althobaiti, T.; Ramzan, N.; Ahmad, J.; Shah, S.A.; Abbasi, Q.H. Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model. Sensors 2022, 22, 461. https://doi.org/10.3390/s22020461

AMA Style

Rehman MU, Shafique A, Khan KH, Khalid S, Alotaibi AA, Althobaiti T, Ramzan N, Ahmad J, Shah SA, Abbasi QH. Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model. Sensors. 2022; 22(2):461. https://doi.org/10.3390/s22020461

Chicago/Turabian Style

Rehman, Mujeeb Ur, Arslan Shafique, Kashif Hesham Khan, Sohail Khalid, Abdullah Alhumaidi Alotaibi, Turke Althobaiti, Naeem Ramzan, Jawad Ahmad, Syed Aziz Shah, and Qammer H. Abbasi. 2022. "Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model" Sensors 22, no. 2: 461. https://doi.org/10.3390/s22020461

APA Style

Rehman, M. U., Shafique, A., Khan, K. H., Khalid, S., Alotaibi, A. A., Althobaiti, T., Ramzan, N., Ahmad, J., Shah, S. A., & Abbasi, Q. H. (2022). Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model. Sensors, 22(2), 461. https://doi.org/10.3390/s22020461

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop