Security of End-to-End medical images encryption system using trained deep learning encryption and decryption network

被引:0
|
作者
Inam, Saba [1 ]
Kanwal, Shamsa [1 ]
Anwar, Anousha [1 ]
Mirza, Noor Fatima [1 ]
Alfraihi, Hessa [2 ]
机构
[1] Fatima Jinnah Women Univ, Dept Math Sci, Rawalpindi, Pakistan
[2] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
关键词
Internet of Medical Things (IoMT); Deep learning; Image; Medical images; Cycle_GAN; Peak Signal to Noise Ratio (PSNR); Number of Pixel Change Rate (NPCR); Unified Average Changing Intensity (UACI); Structural Similarity Index Measure (SSIM);
D O I
10.1016/j.eij.2024.100541
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Medical Things (IoMT) links medical devices and wearable, enhancing healthcare. To secure sensitive patient data over the IoMT, encryption is vital to retain confidentiality, prevent tampering, ensure authenticity, and secure data transfer. The intricate neural network architecture of deep learning models adds a layer of complexity and non-linearity to the encryption process, rendering it highly resistant to plaintext attacks. Specifically, the Cycle_GAN network is used as the leading learning network. This work suggests deep learning- based encryption for medical images using Cycle_GAN, a Generative Adversarial Network. Cycle_GAN changes images without paired training data that improves quality and feature preservation. Unlike conventional image- to-image translation techniques, Cycle_GAN doesn't require a dataset with corresponding input-output pairs. Traditional methods typically needs paired data to learn the mapping between input and output images. Paired data can be challenging to obtain, specifically in medical imaging where gathering and annotating data can be time-consuming, laborious and expensive. The use of Cycle_GAN overwhelms this constraint by using unpaired data, where the input and output images are not explicitly paired. This method ensures confidentiality, authenticity, and secure transfer. Cycle_GAN consists of two major components: a generator used to modify the images, and a discriminator used to distinguish between real and fake images. Further, the Binary-Cross Entropy loss function is employed to train the network for precise predictions. The experiments are carried out on skin cancer datasets. The results demonstrate high-level efficient, systematic and coherent encryption as compared with other modernized medical image encryption methods. The proposed technique offers several benefits, including efficient encryption and decryption and robustness against unauthorized access.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    IEEE ACCESS, 2021, 9 : 90677 - 90689
  • [2] Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori
    Ito, Ryoma
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 234 - 253
  • [3] The Many Faces of End-to-End Encryption and Their Security Analysis
    Nabeel, Mohamed
    2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE), 2017, : 252 - 259
  • [4] System of end-to-end symmetric database encryption
    Galushka, V. V.
    Aydinyan, A. R.
    Tsvetkova, O. L.
    Fathi, V. A.
    Fathi, D. V.
    INTERNATIONAL CONFERENCE INFORMATION TECHNOLOGIES IN BUSINESS AND INDUSTRY 2018, PTS 1-4, 2018, 1015
  • [5] Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE
    Isobe, Takanori
    Minematsu, Kazuhiko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 313 - 324
  • [6] Implementing end-to-end encryption strategist for strengthening data security across network communication
    Balpande, Vijaya Parag
    Aher, Ujjwala Bal
    Borkar, Pradnya
    Bhanarkar, Parul
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 465 - 476
  • [7] Encipher GAN: An End-to-End Color Image Encryption System Using a Deep Generative Model
    Panwar, Kirtee
    Singh, Akansha
    Kukreja, Sonal
    Singh, Krishna Kant
    Shakhovska, Nataliya
    Boichuk, Andrii
    SYSTEMS, 2023, 11 (01):
  • [8] Deep-KEDI: Deep learning-based zigzag generative adversarial network for encryption and decryption of medical images
    Selvakumar, K.
    Lokesh, S.
    TECHNOLOGY AND HEALTH CARE, 2024, 32 (05) : 3231 - 3251
  • [9] Novel end-to-end voice encryption method in GSM system
    Qi, H. F.
    Yang, X. H.
    Jiang, R.
    Liang, B.
    Zhou, S. J.
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 217 - 220
  • [10] The Application of Public Communication Network Security Management Based on End-to-End Image Encryption Algorithm of LU Chaotic System
    Wang, Yao
    International Journal of Network Security, 2024, 26 (06) : 1071 - 1081