Security of End-to-End medical images encryption system using trained deep learning encryption and decryption network

被引:0
|
作者
Inam, Saba [1 ]
Kanwal, Shamsa [1 ]
Anwar, Anousha [1 ]
Mirza, Noor Fatima [1 ]
Alfraihi, Hessa [2 ]
机构
[1] Fatima Jinnah Women Univ, Dept Math Sci, Rawalpindi, Pakistan
[2] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
关键词
Internet of Medical Things (IoMT); Deep learning; Image; Medical images; Cycle_GAN; Peak Signal to Noise Ratio (PSNR); Number of Pixel Change Rate (NPCR); Unified Average Changing Intensity (UACI); Structural Similarity Index Measure (SSIM);
D O I
10.1016/j.eij.2024.100541
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Medical Things (IoMT) links medical devices and wearable, enhancing healthcare. To secure sensitive patient data over the IoMT, encryption is vital to retain confidentiality, prevent tampering, ensure authenticity, and secure data transfer. The intricate neural network architecture of deep learning models adds a layer of complexity and non-linearity to the encryption process, rendering it highly resistant to plaintext attacks. Specifically, the Cycle_GAN network is used as the leading learning network. This work suggests deep learning- based encryption for medical images using Cycle_GAN, a Generative Adversarial Network. Cycle_GAN changes images without paired training data that improves quality and feature preservation. Unlike conventional image- to-image translation techniques, Cycle_GAN doesn't require a dataset with corresponding input-output pairs. Traditional methods typically needs paired data to learn the mapping between input and output images. Paired data can be challenging to obtain, specifically in medical imaging where gathering and annotating data can be time-consuming, laborious and expensive. The use of Cycle_GAN overwhelms this constraint by using unpaired data, where the input and output images are not explicitly paired. This method ensures confidentiality, authenticity, and secure transfer. Cycle_GAN consists of two major components: a generator used to modify the images, and a discriminator used to distinguish between real and fake images. Further, the Binary-Cross Entropy loss function is employed to train the network for precise predictions. The experiments are carried out on skin cancer datasets. The results demonstrate high-level efficient, systematic and coherent encryption as compared with other modernized medical image encryption methods. The proposed technique offers several benefits, including efficient encryption and decryption and robustness against unauthorized access.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] An End-to-End Deep Learning System for Hop Classification
    Castro, Pedro
    Moreira, Gladston
    Luz, Eduardo
    IEEE LATIN AMERICA TRANSACTIONS, 2022, 20 (03) : 430 - 442
  • [32] End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme for Resource Constrained IoT Network
    Ullah, Shafi
    Nasir, Haidawati Muhammad
    Kadir, Kushsairy
    Khan, Akbar
    Memon, Ahsanullah
    Azhar, Shanila
    Khan, Ilyas
    Ashraf, Muhammad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 82 (02): : 3223 - 3249
  • [33] End-to-End Confidentiality for a Message Warehousing Service Using Identity-Based Encryption
    Karabulut, Yuecel
    Weppner, Harald
    Nassi, Ike
    Nagarajan, Anusha
    Shroff, Yash
    Dubey, Nishant
    Shields, Tyelisa
    2010 IEEE 26TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDE 2010), 2010, : 33 - 40
  • [34] A deep learning network based end-to-end image composition
    Zhu, Xiaoyu
    Wang, Haodi
    Zhang, Zhiyi
    Wu, Xiuping
    Guo, Junqi
    Wu, Hao
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2022, 101
  • [35] Deep Learning for Detecting Network Attacks: An End-to-End Approach
    Zou, Qingtian
    Singhal, Anoop
    Sun, Xiaoyan
    Liu, Peng
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXV, 2021, 12840 : 221 - 234
  • [36] Automated Classification Using End-to-End Deep Learning
    Jaipurkar, Shobhit Sandeep
    Jie, Wang
    Zeng, Zeng
    Gee, Teo Sin
    Veeravalli, Bharadwaj
    Chua, Matthew
    2018 40TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC), 2018, : 706 - 709
  • [37] Deep End-to-end Imitation Learning for Missile Guidance With Infrared Images
    Lee, Seungjae
    Shin, Jongho
    Kim, Hyeong-Geun
    Cho, Daesol
    Kim, H. Jin
    INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS, 2023, 21 (10) : 3419 - 3429
  • [38] Deep End-to-end Imitation Learning for Missile Guidance With Infrared Images
    Seungjae Lee
    Jongho Shin
    Hyeong-Geun Kim
    Daesol Cho
    H. Jin Kim
    International Journal of Control, Automation and Systems, 2023, 21 : 3419 - 3429
  • [39] End-to-End Mandarin Speech Reconstruction Based on Ultrasound Tongue Images Using Deep Learning
    Li, Fengji
    Shen, Fei
    Ma, Ding
    Zhou, Jie
    Zhang, Shaochuan
    Wang, Li
    Fan, Fan
    Liu, Tao
    Chen, Xiaohong
    Toda, Tomoki
    Niu, Haijun
    IEEE TRANSACTIONS ON NEURAL SYSTEMS AND REHABILITATION ENGINEERING, 2025, 33 : 140 - 149
  • [40] An end-to-end deep learning system for medieval writer identification
    Cilia, N. D.
    De Stefano, C.
    Fontanella, F.
    Marrocco, C.
    Molinara, M.
    Di Freca, A. Scotto
    PATTERN RECOGNITION LETTERS, 2020, 129 : 137 - 143