Log in

Research on defect detection of media information security based on genetic algorithm

  • Original Article
  • Published:
Applied Nanoscience Aims and scope Submit manuscript

Abstract

Security defect detection is a dynamic security protection technology, which can defend against internal and external attacks of network media information. Based on this, a detection method for media information security defect based on genetic algorithm is studied. The distribution model of media information security defect in complex network environment is constructed by signal processing method. The threat index and host threat index which affect media information security in network attack environment are simulated by ARMA model. The defect index of media information security is obtained, which is defined as media information invaded by virus when the index is higher than the set threshold. The weights of the neural network are transformed into genetic neural network to detect the relevance of the extracted virus-invaded media information stream, and the membership characteristics of the media information infected by the virus are obtained. Based on this, the security defects of the media information can be judged and the accurate detection of the media information security defects can be realized. The simulation results show that the method can effectively detect the defects of media information security, and the detection accuracy rate reaches more than 90%, which is significantly better than the contrast method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  • Arutyunov VV (2017) On the international research-to-practice conference on modern problems and tasks of information-security assurance (SIB’2017). Sci Tech Inf Process 44(3):170–174

    Article  Google Scholar 

  • Bom LI, Wang YX, Gao XG (2017) Research on fuzzy proportional guidance law of air-to-ground attack based on genetic algorithm. Acta Armamentarii 38(10):1950–1956

    Google Scholar 

  • Chen Z, Han D, Qiu L (2017) Research on the performance of cooperation communication system based on indoor double media with wireless channel and power line. Proc Csee 37(9):2589–2598

    Google Scholar 

  • Gao W, Yel G, Baskonus HM, Cattani C (2020) Complex solitons in the conformable (2+1)-dimensional Ablowitz-Kaup-Newell-Segur equation. AIMS Math 5(1):507–521

    Article  Google Scholar 

  • Hou D, Han Y, Ma J (2018) Research and application of information security technology in new energy vehicle based on mobile internet. IOP Conf Ser Mater Sci Eng 394(4):042007

    Article  Google Scholar 

  • Huang YC, Dai X, Zou Y (2017) Parameters design for IPT system based on NSGA-II multi-objective optimization algorithm. J Power Supply 15(4):65–71

    Google Scholar 

  • Huang H, Xu L, Chen C (2018) Individual tree crown detection and delineation from very-high-resolution UAV images based on bias field and marker-controlled watershed segmentation algorithms. IEEE J Sel Top Appl Earth Observ Remote Sens 11:2253

    Article  Google Scholar 

  • Kim YW, Cho N, Jang HJ (2018) Trends in research on the security of medical information in Korea: focused on information privacy security in hospitals. Healthc Inform Res 24(1):61–68

    Article  Google Scholar 

  • Li Z, Chen K (2018) Research on timing optimization of reginal traffic signals based on improved genetic algorithm. IOP Conf Ser Mater Sci Eng 423(1):012191

    Article  Google Scholar 

  • Lin DS, Ding F (2017) Research on transmission of technology of downward information security for wellbore trajectory control. EURASIP J Inf Secur 2017(1):17

    Article  Google Scholar 

  • Sengupta A, Kundu S (2017) Guest editorial securing IoT hardware: threat models and reliable, low-power design solutions. IEEE Trans Very Large Scale Integr Syst 25(12):3265–3267

    Article  Google Scholar 

  • Shangdong L, Ye WU, Yimu JI (2019) Research on security of key algorithms in intelligent driving system. Chin J Electron 28(01):33–42

    Google Scholar 

  • Shen XD, Hou M, Li QH (2018) Improving available energy of battery packs by genetic algorithm. Chin J Power Sour 42(7):974–976

    Google Scholar 

  • Shi K (2017) Research on the network information security evaluation model and algorithm based on grey relational clustering analysis. J Comput Theor Nanosci 14(1):69–73

    Article  CAS  Google Scholar 

  • Tello G, Al-Jarrah OY, Yoo PD (2018) Deep-structured machine learning model for the recognition of mixed-defect patterns in semiconductor fabrication processes. IEEE Trans Semicond Manuf 31:315

    Article  Google Scholar 

  • Xu Y, Wu Z, Liu W (2017) Simulation research on service information security detection on cloud platform. Comput Simul 34(12):370–373

    Google Scholar 

  • Yang Q (2018) Bearing fault detection algorithm based on Morlet wavelet and multi-mode kernel optimized by genetic algorithm. J Jilin Univ (science edition) 56(1):101–108

    CAS  Google Scholar 

  • Yaqian LI, Jia L, Haibin LI (2018) Research on target tracking algorithm from fisheye camera based on compressive sensing. J Electron Inf Technol 40(5):1242–1249

    Google Scholar 

  • Yufeng L, Wei H (2017) Research on SAR image change detection algorithm based on hybrid genetic FCM and image registration. Multimed Tools Appl 76(13):15137–15153

    Article  Google Scholar 

  • Yunjuan SUN (2017) Research on fabric image defect detection based on double chaotic mechanism particle swarm optimization. Wool Textile J 45:80–85

    Google Scholar 

  • Zhao Z (2018) Research on energy saving design of intelligent building based on genetic algorithm. Wireless Pers Commun 102(3):1–9

    CAS  Google Scholar 

  • Zhao LJ, **a RY, Yang Y (2018) Research on numerical simulation of karst conduit media based on CFP: a case study of Zhaidi karst underground river subsystem of guilin. Acta Geosci Sinica 39(2):225–232

    Google Scholar 

  • Zhu XL (2018) Application of dynamic ant algorithm-genetic algorithm in coal transportation. Autom Instrum 38(9):180–181

    Google Scholar 

  • Zhu YH, Liu DN (2018) Simulation research on automatic recommend algorithm for internet of things users query target. J China Acad Electron Inform Technol 13(5):551–554

    Google Scholar 

Download references

Acknowledgements

Research project of Hospital (T.C.M) Affiliated to Southwest Medical University: hospital micro-video transmission mode and effect analysis; Luzhou soft science research project—current situation of hospital image micro-video communication and optimization strategy analysis (No. 19RKX0006).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fan Wang.

Ethics declarations

Conflict of interest

The authors declare they have no conflicts of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, F. Research on defect detection of media information security based on genetic algorithm. Appl Nanosci 13, 2439–2447 (2023). https://doi.org/10.1007/s13204-021-02137-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13204-021-02137-3

Keywords

Navigation