25 results on '"Arnab Bag"'
Search Results
2. Divided We Stand, United We Fall: Security Analysis of Some SCA+SIFA Countermeasures Against SCA-Enhanced Fault Template Attacks.
- Author
-
Sayandeep Saha, Arnab Bag, Dirmanto Jap, Debdeep Mukhopadhyay, and Shivam Bhasin
- Published
- 2021
- Full Text
- View/download PDF
3. Compact and Secure Generic Discrete Gaussian Sampler based on HW/SW Co-design.
- Author
-
Sudarshan Sharma, Arnab Bag, and Debdeep Mukhopadhyay
- Published
- 2020
- Full Text
- View/download PDF
4. Cryptographically Secure Multi-tenant Provisioning of FPGAs.
- Author
-
Arnab Bag, Sikhar Patranabis, Debapriya Basu Roy, and Debdeep Mukhopadhyay
- Published
- 2020
- Full Text
- View/download PDF
5. Fault Template Attacks on Block Ciphers Exploiting Fault Propagation.
- Author
-
Sayandeep Saha, Arnab Bag, Debapriya Basu Roy, Sikhar Patranabis, and Debdeep Mukhopadhyay
- Published
- 2020
- Full Text
- View/download PDF
6. Work-in-Progress: CAMiSE: Content Addressable Memory-integrated Searchable Encryption.
- Author
-
Arnab Bag, Sikhar Patranabis, and Debdeep Mukhopadhyay
- Published
- 2022
- Full Text
- View/download PDF
7. Hardware Acceleration of Searchable Encryption.
- Author
-
Arnab Bag, Sikhar Patranabis, L. Tribhuvan, and Debdeep Mukhopadhyay
- Published
- 2018
- Full Text
- View/download PDF
8. Learn from Your Faults: Leakage Assessment in Fault Attacks Using Deep Learning
- Author
-
Sayandeep Saha, Manaar Alam, Arnab Bag, Debdeep Mukhopadhyay, and Pallab Dasgupta
- Subjects
Applied Mathematics ,Software ,Computer Science Applications - Published
- 2023
9. FlexiPair: An Automated Programmable Framework for Pairing Cryptosystems
- Author
-
Debapriya Basu Roy, Sikhar Patranabis, Debdeep Mukhopadhyay, and Arnab Bag
- Subjects
Flexibility (engineering) ,Finite-state machine ,business.industry ,Computer science ,Cloud computing ,02 engineering and technology ,Cryptographic protocol ,020202 computer hardware & architecture ,Theoretical Computer Science ,Computational Theory and Mathematics ,Hardware and Architecture ,Embedded system ,Path (graph theory) ,0202 electrical engineering, electronic engineering, information engineering ,Cryptosystem ,business ,Field-programmable gate array ,Implementation ,Software - Abstract
Pairing cryptosystems are powerful mathematical tools for the development of cryptographic protocols that provide end-to-end security for applications like Internet-of-Things (IoT), cloud services and cyber-physical systems (CPS). However, these applications require light-weight implementations but still real-time and flexible. The flexibility can come from different choices of underlying algorithms along with suitable parameters. A software implementation offers better flexibility but lacks in timing performance, whereas custom hardware delivers better timing performance but has poor flexibility. Furthermore, the designs over small characteristic curves are now insecure against recent attacks. Existing designs do not address the drawback of less flexibility and massive resource consumption collectively. We present a micro-program controlled hardware design which has the least resource consumption among the comparable existing designs on FPGA. This redundant number arithmetic-based architecture consumes only 2,506 slices on Xilinx Virtex-7 FPGA. It can be migrated to other device families or updated for different algorithms without data-path or control path modification. To enhance the flexibility, we developed a custom assembly-like finite state machine (FSM) description, called Prism, and necessary tool to generate the micro-program states. To illustrate the functionality of Prism, we present designs for Tate and Optimal-Ate pairing with micro-program states generated using this tool.
- Published
- 2022
10. Compact and Secure Generic Discrete Gaussian Sampler based on HW/SW Co-design
- Author
-
Debdeep Mukhopadhyay, Arnab Bag, and Sudarshan Sharma
- Subjects
Shuffling ,Computer science ,Gaussian ,02 engineering and technology ,Parallel computing ,020202 computer hardware & architecture ,symbols.namesake ,Tree (data structure) ,Lookup table ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Probability distribution ,020201 artificial intelligence & image processing ,Side channel attack ,Field-programmable gate array ,Logic optimization - Abstract
In this paper, we present the first Hardware (HW) / Software (SW) co-design based generic discrete Gaussian sampler architecture on the Xilinx Zynq platform. The area optimized and secure sampler can produce a distribution based on an arbitrary standard deviation and center given as input. We use multi-level logic optimization on Knuth-Yao algorithm's Discrete Distribution Generating (DDG) tree travel-based Boolean mapping of random bits and samples instead of the previous two-level logic optimization to reduce the resource utilization. This method results in nearly 60% lesser LUT utilization compared to the previous designs on Xilinx FPGAs. Further, we introduce improvements in the shuffling algorithm leveraging the HW/SW co-design methodology compared to the existing shuffling architectures for randomizing Gaussian samples to protect against timing-based side-channel attacks.
- Published
- 2020
11. Neural network-based inherently fault-tolerant hardware cryptographic primitives without explicit redundancy checks
- Author
-
Arnab Bag, Manaar Alam, Debdeep Mukhopadhyay, Dirmanto Jap, Jakub Breier, Debapriya Basu Roy, Shivam Bhasin, and Temasek Laboratories @ NTU
- Subjects
021110 strategic, defence & security studies ,S-box ,Cryptographic primitive ,Artificial neural network ,business.industry ,Computer science ,0211 other engineering and technologies ,Fault tolerance ,02 engineering and technology ,Fault injection ,020202 computer hardware & architecture ,law.invention ,Machine Learning ,Software ,Computer engineering ,Hardware and Architecture ,law ,0202 electrical engineering, electronic engineering, information engineering ,Redundancy (engineering) ,Computer science and engineering [Engineering] ,Hardware Security ,Electrical and Electronic Engineering ,business ,Cryptanalysis - Abstract
Fault injection-based cryptanalysis is one of the most powerful practical threats to modern cryptographic primitives. Popular countermeasures to such fault-based attacks generally use some form of redundant computation to detect and react/correct the injected faults. However, such countermeasures are shown to be vulnerable to selective fault injections. In this article, we aim to develop a cryptographic primitive that is fault tolerant by its construction and does not require to compute the same value multiple times. We utilize the effectiveness of Neural Networks (NNs), which show “some degree” of robustness by functioning correctly even after the occurrence of faults in any of its parameters. We also propose a novel strategy that enhances the fault tolerance of the implementation to “high degree” (close to 100%) by incorporating selective constraints in the NN parameters during the training phase. We evaluated the performance of revised NN considering both software and FPGA implementations for standard cryptographic primitives like 8×8 AES SBox and 4×4 PRESENT SBox. The results show that the fault tolerance of such implementations can be significantly increased with the proposed methodology. Such NN-based cryptographic primitives will provide inherent resistance against fault injections without requiring any redundancy countermeasures.
- Published
- 2020
12. Fault-Tolerant Implementations of Physically Unclonable Functions on FPGA
- Author
-
Rajat Subhra Chakraborty, Sikhar Patranabis, Debdeep Mukhopadhyay, Arnab Bag, and Durga Prasad Sahoo
- Subjects
Hardware security module ,Computer science ,business.industry ,Fault tolerance ,Context (language use) ,Hardware_PERFORMANCEANDRELIABILITY ,02 engineering and technology ,Fault injection ,Adversary ,Fault (power engineering) ,Fault detection and isolation ,020202 computer hardware & architecture ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Field-programmable gate array ,business - Abstract
Most of the faults in circuits or systems occur due to the unintentional but natural phenomenon (e.g. imperfection in manufacturing process or significant change in the working environment), and thus, these faults are often follow a pattern and comparatively easier detect than the intentional faults. In the context of secure design/system, the adversary (intentionally) injects some faults in the system to bypass the security protection or reveal secret information. Since the adversaries’ fault injection objectives are often very subjective, it is difficult to find a pattern among the faults in a system, and this makes the fault detection and fault recovery difficult in a secure system. In this chapter, we discuss possible intentional faults in an emerging hardware security primitive, known as Physically Unclonable Functions (PUFs). We show how the faults vary over the PUF designs and its applications. In addition, we explain different fault detection circuits and fault recovery techniques which are specific to PUF designs and their implementations on FPGA platforms.
- Published
- 2018
13. Hardware Acceleration of Searchable Encryption
- Author
-
Debdeep Mukhopadhyay, Sikhar Patranabis, L. Tribhuvan, and Arnab Bag
- Subjects
020203 distributed computing ,business.industry ,Computer science ,Reconfigurability ,02 engineering and technology ,Encryption ,Memory controller ,Symmetric-key algorithm ,Embedded system ,Scalability ,Information leakage ,0202 electrical engineering, electronic engineering, information engineering ,Hardware acceleration ,020201 artificial intelligence & image processing ,business ,Massively parallel - Abstract
Searchable symmetric encryption (SSE) allows a client to outsource the storage of her data to an (untrusted) server in a private manner, while maintaining the ability to selectively search over it. A key feature of all existing SSE schemes is the tradeoff between security (in terms of the information leakage to the server) and efficiency (in terms of the operational and storage overhead on the server and client sides). The premise of this work is that SSE schemes typically offer scope for massively parallel implementations with improved efficiency without compromising security. Based on this idea, we propose a highly scalable framework for parallelized SSE implementations using hardware-based crypto-accelerators, interfaced with a software-based control unit and a memory controller unit. We choose field programmable gate arrays (FPGAs) as the platform for the crypto-accelerators due to their flexibility, reconfigurability, low time-to-market and low maintenance overheads. As a case study, we illustrate how the recently proposed SSE scheme of Lai et al. (CCS'18) may be implemented as per our framework, and the benefits thereof, including shorter preprocessing time and reduced query-response latency as compared to a software implementation.
- Published
- 2018
14. A review on emotion recognition using speech
- Author
-
Jaybrata Chakraborty, Md. Aftabuddin, Saikat Basu, and Arnab Bag
- Subjects
Computer science ,business.industry ,Speech recognition ,Feature extraction ,020206 networking & telecommunications ,02 engineering and technology ,Speaker recognition ,computer.software_genre ,Affect (psychology) ,Field (computer science) ,Identification (information) ,ComputingMethodologies_PATTERNRECOGNITION ,0202 electrical engineering, electronic engineering, information engineering ,Feature (machine learning) ,020201 artificial intelligence & image processing ,Artificial intelligence ,Mel-frequency cepstrum ,Literature survey ,business ,computer ,Natural language processing - Abstract
Emotion recognition or affect detection from speech is an old and challenging problem in the field of artificial intelligence. Many significant research works have been done on emotion recognition. In this paper, the recent works on affect detection using speech and different issues related to affect detection has been presented. The primary challenges of emotion recognition are choosing the emotion recognition corpora (speech database), identification of different features related to speech and an appropriate choice of a classification model. Different types of methods to collect emotional speech data and issues related to them are covered by this presentation along with the previous works review. Literature survey on different features used for recognizing emotion from human speech has been discussed. The significance of various classification models has been presented along with some recent research works review. A detailed description of a prime feature extraction technique named Mel Frequency Cepstral Coefficient (MFCC) and brief description of the working principle of some classification models are also discussed here. In this paper terms like affect detection and emotion recognition are used interchangeably.
- Published
- 2017
15. Effects of emotion on physiological signals
- Author
-
Md. Aftabuddin, Rajlakshmi Guha, Arnab Bag, Manjunatha Mahadevappa, Saikat Basu, and Jayanta Mukherjee
- Subjects
medicine.medical_specialty ,Emotional stimuli ,Skin temperature ,02 engineering and technology ,Audiology ,Technological research ,03 medical and health sciences ,0302 clinical medicine ,Low arousal theory ,0202 electrical engineering, electronic engineering, information engineering ,medicine ,020201 artificial intelligence & image processing ,Valence (psychology) ,Psychology ,Skin conductance ,High arousal ,030217 neurology & neurosurgery ,International Affective Picture System - Abstract
Emotions and affect are universal means of expressing the physiological state of an individual. Most of our daily interactions with other individuals involve emotions as an integral part. It has become highly prominent in technological research, as new technologies related to human-machine interaction or medical applications are developed. Detecting and analyzing emotions have become quite an important area of research. In this paper, we took the effort to find the effect of different emotions on physiological signals. We used International Affective Picture System (IAPS) database images as stimuli. We have considered five different types of emotions — High Valence High Arousal (HVHA), High Valence Low Arousal (HVLA), Low Valence High Arousal (LVHA), Low Valence Low Arousal (LVLA), and Neutral (Blank), and we have used six different physiological signals — Skin Conductance (SC), Electro CardioGram (ECG), Electro MyoGram (EMG), Skin Temperature (ST), Respiration Rate (RR), and Arterial Pulse Rate (PR). Our experiment shows that there are enough variations in different parameters of physiological signals for different emotional stimuli.
- Published
- 2016
16. Emotion recognition based on physiological signals using valence-arousal model
- Author
-
Somesh Kumar, Jayanta Mukherjee, Manjunatha Mahadevappa, Arnab Bag, Rajlakshmi Guha, Nabakumar Jana, and Saikat Basu
- Subjects
Entire population ,Pictorial stimuli ,Computer science ,Low arousal theory ,Speech recognition ,Emotional stimuli ,Emotion recognition ,Valence arousal ,Quadratic classifier ,Valence (psychology) - Abstract
This paper considers two dimensional valence-arousal model. Pictorial stimuli of International Affective Picture Systems were chosen for emotion elicitation. Physiological signals like, Galvanic Skin Response, Heart Rate, Respiration Rate and Skin Temperature were measured for accessing emotional responses. The experimental procedure uses non-invasive sensors for signal collection. A group of healthy volunteers was shown four types of emotional stimuli categorized as High Valence High Arousal, High Valence Low Arousal, Low Valence High Arousal and Low Valence Low Arousal for around thirty minutes for emotion elicitation. Linear and Quadratic Discriminant Analysis are used and compared to the emotional class classification. Classification of stimuli into one of the four classes has been attempted on the basis of measurements on responses of experimental subjects. If classification is restricted within the responses of a specific individual, the classification results show high accuracy. However, if the problem is extended to entire population, the accuracy drops significantly.
- Published
- 2015
17. Affect detection in normal groups with the help of biological markers
- Author
-
Jayanta Mukherjee, Rajlakshmi Guha, Manjunatha Mahadevappa, Saikat Basu, and Arnab Bag
- Subjects
Support vector machine ,Naive Bayes classifier ,Statistical classification ,Speech recognition ,Low arousal theory ,Valence (psychology) ,Affective computing ,Linear discriminant analysis ,International Affective Picture System ,Mathematics - Abstract
Emotion Recognition always has been one of the key areas in human machine interaction, machine learning or affective computing. Two dimensional valence arousal model has been used here. In this paper, we present how simple emotion recognition can be done by measuring nine basic non-invasive Biological markers or physiological signals including BR [BReathing], ECG [ElectroCardioGram], EMG [ElectroMyoGram], GSR [Galvanic Skin Response], HR [Heart Rate], PR [Pulse Rate], RR [Respiration Rate], and ST [Skin Temperature] on thirty healthy subjects. Pictorial emotional stimuli categorized as High Valence High Arousal [HVHA], High Valence Low Arousal [HVLA], Low Valence High Arousal [LVHA] and Low Valence Low Arousal [LVLA] were shown using International Affective Picture System (IAPS) for approximately thirty minutes. Six features from each signal were extracted for analysis. Different types of classification algorithms like QDC [Quadratic Discriminant Classifier], kNN [k Nearest Neighbour], Naive Bayes and LDA [Linear Discriminant Analysis] were used in classification of data. Maximum accuracy around 75% for each classifier was obtained. Further improvements are required to make this more robust and to deploy commercially.
- Published
- 2015
18. Review on medicated chocolate takes a patient-centered approach to drug delivery
- Author
-
Moumita Paul Paul, Priyanka Ranabhat Ranabhat, Deepika Khatiwara Khatiwara, and Arnab Bagchi
- Subjects
medicated chocolate ,age-appropriate ,paediatric drug delivery ,Pharmacy and materia medica ,RS1-441 ,Therapeutics. Pharmacology ,RM1-950 - Abstract
The goal is to create medicinally beneficial chocolate that has no negative side effects. Carob (Ceratonia siliqua), a basic ingredient in many chocolate formulations, was substituted for cocoa since it requires a large amount of sugar in the formulation and includes caffeine, which stimulates the CNS. Carob is high in natural sweeteners, has no fat, caffeine, or oxalates, and is high in antioxidants, which assist to prevent a variety of ailments. Many traditional drug delivery systems are ineffective for paediatric patients because their developmental state and dosing requirements differ from those of other groups of people. Age-appropriate medicines require technological platforms to ensure patient acceptability while maintaining safety, efficacy, accessibility, and affordability. Recent methods and accomplishments in the field of age-appropriate drug delivery for paediatric patients are discussed, including patient-centric formulations, administration devices, and packaging solutions.
- Published
- 2021
- Full Text
- View/download PDF
19. A review on using an alcohol-based sanitizer as a prophylactic measure against microorganisms
- Author
-
Priyanka Ranabhat, Deepika Khatiwara, Moumita Paul, and Arnab Bagchi
- Subjects
hand hygiene ,covid19 ,ph measurement ,alcohol ,viruses ,Pharmacy and materia medica ,RS1-441 ,Therapeutics. Pharmacology ,RM1-950 - Abstract
Because of the COVID 19 pandemic, we now utilise hand sanitizer in our daily lives. Hand hygiene has become a legal requirement. Infection control is becoming a requirement. Hand hygiene is widely regarded as the most practical and effective way of infection prevention. Hand sanitizer is thought to have played a significant role in reducing illness transmission to patients. Because it is more cost-effective and efficient. The efficiency of hand sanitizer is totally determined by how it is used. There are two sorts of hand sanitizers on the market. 1) Hand sanitizer with alcohol 2) Hand sanitizer that isn't alcohol-based. Most effective hand sanitizers contain 70 percent to 95 percent alcohol, which has the potential to denature microbial protein and inactivate viruses. The impact of hand sanitizer on human health care is significant, and this review article will provide you with information on several elements of hand sanitizer
- Published
- 2021
- Full Text
- View/download PDF
20. An emerging technique of medicated chewing gum in drug delivery system: a review
- Author
-
Deepika Khatiwara, Priyanka Ranabhat, Moumita Paul, and Arnab Bagchi
- Subjects
Pharmacy and materia medica ,RS1-441 ,Therapeutics. Pharmacology ,RM1-950 - Abstract
Many advances in research and technology have been made in the oral route of drug delivery system in recent years. Because of increased patient compliance not only in geriatric and paediatric patients, but also in the general population, the oral channel of drug delivery system- medicated chewing gum has received worldwide recognition throughout the year. Chewing gum can be used as a mobile medication delivery device for both local and systemic drug administration via the oral route. Because of its ease and ability to be administered without water, it is an exceptional drug delivery device for self-medication. The production technique, advantages, disadvantages, factors impacting the release of medicament, assessment parameter, difficulty related with chewing gum manufacture, and future trends have all been examined in this review paper
- Published
- 2021
- Full Text
- View/download PDF
21. An overview on FDA-approved natural super disintegrants efficacy in a fast dissolving drug delivery system
- Author
-
Darshan Pradhan, Prodipta Chakraborty, Sudip Halder, and Arnab Bagchi
- Subjects
fast dissolving tablets ,natural disintegrants ,synthetic disintegrants ,non-toxic ,quick disintegration ,Pharmacy and materia medica ,RS1-441 ,Therapeutics. Pharmacology ,RM1-950 - Abstract
FDTs are defined by the United States Food and Drug Administration (FDA) as a solid dosage form containing the therapeutic substance or when applied on the tongue, the active ingredient disintegrates quickly, usually within seconds. The goal of this study is to create a fast-dissolving tablet that uses natural disintegrants. Fast dissolving tablets have grown in popularity in the pharmaceutical industry in recent years. They have a quick disintegration activity that dissolves with saliva without the use of water when placed within the mouth. Furthermore, FDT aims to provide quick medication absorption, reduced toxicity, and higher drug bioavailability, and it is especially popular among geriatric and paediatric patients. Natural disintegrants, which are obtained from natural sources, have a number of advantages, including low cost, nontoxicity, biodegradability, environmental friendliness, and less adverse effects. As a result, it has been established that natural disintegrants are often safer than synthetic disintegrants. Natural disintegrants includes Chitin and chitosan, Guar gum, Gum karaya, Agar and treated agar, Fenugreek seed mucilage, Soy polysaccharide, Gellan gum, Mango peel pectin, Lepidium sativum mucilage, Plantago seed mucilage, Agele marmelos gum, Locust bean gum, Mangifera indica gum, Hibiscus rosa sinensis mucilage, Dehydrated banana powder.
- Published
- 2021
- Full Text
- View/download PDF
22. Current developments in prevention and treatment of candidiasis: A review
- Author
-
Prodipta Chakraborty, Darshan Pradhan, Sudip Halder, and Arnab Bagchi
- Subjects
candida ,fungus ,infection ,oral ,species ,yeasts ,patient ,diagnosis ,treatment ,prevention ,Pharmacy and materia medica ,RS1-441 ,Therapeutics. Pharmacology ,RM1-950 - Abstract
Invasive fungus infection affects about six people out of every 100,000 people each year. Only half of these infections are detected throughout the patient's lifetime, making it one of the most common causes of death among intensive-care patients. The low detection rate is due to the diagnostic work's complexity, which comprises clinical, radiographic, and microbiological results. Antimycotic drug-resistant fungi are on the rise all over the world. Guidelines for identifying and treating invasive fungous infections caused by Candida spp., Aspergillus spp., Mucorales, and Fusarium spp. are the topic of this review. In typical hospital care, intrusive fungous infections are frequently ignored. They must include it as a necessary component of antimicrobial stewardship programmes. There is also a great need for novel antimycotic medication classes to be developed
- Published
- 2021
- Full Text
- View/download PDF
23. Recent advancement in the method of transdermal drug delivery system: A review
- Author
-
Sudip Halder, Prodipta Chakraborty, Darshan Pradhan, and Arnab Bagchi
- Subjects
transdermal patch ,bioavailability ,dermatologica method ,Pharmacy and materia medica ,RS1-441 ,Therapeutics. Pharmacology ,RM1-950 - Abstract
A transdermal patch is a medicated adhesive patch that is applied to the skin and used to deliver a particular amount of medication into the bloodstream through the skin. It aids in the recovery of an injured bodily part. The transdermal drug delivery system (TDDS) provides an alternative safe means of drug delivery to previous intrusive techniques. In the past, topically applied lotions and ointments were the most commonly utilised systems for dermatological issues. The fact that some of these formulations cause systemic side effects indicates that they are absorbed through the skin. All topically applied medication formulations intended to transport the active ingredient into the general circulation are included in the transdermal delivery system. To overcome the skin's formidable barrier to topical medication administration, several substances have been utilised. Because of their unique qualities, such as improved bioavailability, regulated pharmaceutical release, and improved patient compliance, TDDS have recently gained increased attention. The current review focuses on the various advancements in transdermal drug delivery, as well as the various available methods for preparing transdermal patches, characterization and assessment tools for transdermal patch preparation, patents, transdermal compound clinical trials, and drug approved and future applications of transdermal drug delivery systems. As a result, in recent years, the Transdermal Drug Delivery System has received a lot of attention.
- Published
- 2021
- Full Text
- View/download PDF
24. In India, diabetes mellitus is on the rise at an alarming rate: A review
- Author
-
Arnab Bagchi and Prosanta Pal
- Subjects
diabetes ,hypertention ,cholesterol ,who ,nhanes ,Pharmacy and materia medica ,RS1-441 ,Therapeutics. Pharmacology ,RM1-950 - Abstract
The aim of the current review is to acquaint all the covering aspect of dibetes mellitus which can provide awareness to the diabetes patients in india as well as all over the world. The number of diabetic patients in india is increasing at an alarming rate and is therefore a major area for concern. As per the WHO, the diabetes is expected to reach 79.4 million by 2030. The studies have shown that the type II diabetes is 4-6 times higher in urban than in rural areas in india. Development of diabetes among indians is due to several factors such as age ( Based on NHANES data),waist circumference, hypertention, BMI, smoking habit and total cholestero these variables are important for comparing diabetic and non-diabetic patients
- Published
- 2021
- Full Text
- View/download PDF
25. A Multi-Stage Approach to Breast Cancer Classification Using Histopathology Images
- Author
-
Arnab Bagchi, Payel Pramanik, and Ram Sarkar
- Subjects
breast cancer ,histopathology images ,deep learning ,BACH dataset ,ensemble learning ,Medicine (General) ,R5-920 - Abstract
Breast cancer is one of the deadliest diseases worldwide among women. Early diagnosis and proper treatment can save many lives. Breast image analysis is a popular method for detecting breast cancer. Computer-aided diagnosis of breast images helps radiologists do the task more efficiently and appropriately. Histopathological image analysis is an important diagnostic method for breast cancer, which is basically microscopic imaging of breast tissue. In this work, we developed a deep learning-based method to classify breast cancer using histopathological images. We propose a patch-classification model to classify the image patches, where we divide the images into patches and pre-process these patches with stain normalization, regularization, and augmentation methods. We use machine-learning-based classifiers and ensembling methods to classify the image patches into four categories: normal, benign, in situ, and invasive. Next, we use the patch information from this model to classify the images into two classes (cancerous and non-cancerous) and four other classes (normal, benign, in situ, and invasive). We introduce a model to utilize the 2-class classification probabilities and classify the images into a 4-class classification. The proposed method yields promising results and achieves a classification accuracy of 97.50% for 4-class image classification and 98.6% for 2-class image classification on the ICIAR BACH dataset.
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.