Security of End-to-End medical images encryption system using trained deep learning encryption and decryption network

被引:0
|
作者
Inam, Saba [1 ]
Kanwal, Shamsa [1 ]
Anwar, Anousha [1 ]
Mirza, Noor Fatima [1 ]
Alfraihi, Hessa [2 ]
机构
[1] Fatima Jinnah Women Univ, Dept Math Sci, Rawalpindi, Pakistan
[2] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
关键词
Internet of Medical Things (IoMT); Deep learning; Image; Medical images; Cycle_GAN; Peak Signal to Noise Ratio (PSNR); Number of Pixel Change Rate (NPCR); Unified Average Changing Intensity (UACI); Structural Similarity Index Measure (SSIM);
D O I
10.1016/j.eij.2024.100541
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Medical Things (IoMT) links medical devices and wearable, enhancing healthcare. To secure sensitive patient data over the IoMT, encryption is vital to retain confidentiality, prevent tampering, ensure authenticity, and secure data transfer. The intricate neural network architecture of deep learning models adds a layer of complexity and non-linearity to the encryption process, rendering it highly resistant to plaintext attacks. Specifically, the Cycle_GAN network is used as the leading learning network. This work suggests deep learning- based encryption for medical images using Cycle_GAN, a Generative Adversarial Network. Cycle_GAN changes images without paired training data that improves quality and feature preservation. Unlike conventional image- to-image translation techniques, Cycle_GAN doesn't require a dataset with corresponding input-output pairs. Traditional methods typically needs paired data to learn the mapping between input and output images. Paired data can be challenging to obtain, specifically in medical imaging where gathering and annotating data can be time-consuming, laborious and expensive. The use of Cycle_GAN overwhelms this constraint by using unpaired data, where the input and output images are not explicitly paired. This method ensures confidentiality, authenticity, and secure transfer. Cycle_GAN consists of two major components: a generator used to modify the images, and a discriminator used to distinguish between real and fake images. Further, the Binary-Cross Entropy loss function is employed to train the network for precise predictions. The experiments are carried out on skin cancer datasets. The results demonstrate high-level efficient, systematic and coherent encryption as compared with other modernized medical image encryption methods. The proposed technique offers several benefits, including efficient encryption and decryption and robustness against unauthorized access.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Secret Key Recovery in a Global-Scale End-to-End Encryption System
    Connell, Graeme
    Fang, Vivian
    Schmidt, Rolfe
    Dauterman, Emma
    Popa, Raluca Ada
    PROCEEDINGS OF THE 18TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, OSDI 2024, 2024, : 703 - 719
  • [22] End-to-end deep learning for pollutant prediction using street view images
    Wu, Lijie
    Liu, Xiansheng
    Zhang, Xun
    Wang, Rui
    Guo, Zhihao
    URBAN CLIMATE, 2025, 60
  • [23] Satellite selection with an end-to-end deep learning network
    Huang, Panpan
    Rizos, Chris
    Roberts, Craig
    GPS SOLUTIONS, 2018, 22 (04)
  • [24] Satellite selection with an end-to-end deep learning network
    Panpan Huang
    Chris Rizos
    Craig Roberts
    GPS Solutions, 2018, 22
  • [25] End-to-End Encryption for GSM Cellular Standard Using CL-PKC
    Ramadan, Mohammed
    Li, Fa-Gen
    Xu, Chun-Xiang
    Wahaballa, Abubaker
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 270 - 278
  • [26] Virtual Network Function Deployment and Service Automation to Provide End-to-End Quantum Encryption
    Aguado, Alejandro
    Lopez, Victor
    Martinez-Mateo, Jesus
    Peev, Momtchil
    Lopez, Diego
    Martin, Vicente
    JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2018, 10 (04) : 421 - 430
  • [27] A novel end-to-end deep learning approach for cancer detection based on microscopic medical images
    Hammad, Mohamed
    Bakrey, Mohamed
    Bakhiet, Ali
    Tadeusiewicz, Ryszard
    Abd El-Latif, Ahmed A.
    Plawiak, Pawel
    BIOCYBERNETICS AND BIOMEDICAL ENGINEERING, 2022, 42 (03) : 737 - 748
  • [28] An End-to-End Deep Learning System for Recommending Healthy Recipes Based on Food Images
    Lico, Ledion
    Enesi, Indrit
    Meka, Sai Jawahar Reddy
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (04) : 1 - 7
  • [29] End-to-End Learning Driver Policy using Moments Deep Neural Network
    Qian, Deheng
    Ren, Dongchun
    Meng, Yingying
    Zhu, Yanliang
    Ding, Shuguang
    Fu, Sheng
    Wang, Zhichao
    Xia, Huaxia
    2018 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND BIOMIMETICS (ROBIO), 2018, : 1533 - 1538
  • [30] Low Latency for File Encryption and Decryption Using BRA Algorithm in Network Security
    Maitri, Punam V.
    Waghole, Dattatray S.
    Deshpande, Vivek S.
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,