Security of End-to-End medical images encryption system using trained deep learning encryption and decryption network

被引:0
|
作者
Inam, Saba [1 ]
Kanwal, Shamsa [1 ]
Anwar, Anousha [1 ]
Mirza, Noor Fatima [1 ]
Alfraihi, Hessa [2 ]
机构
[1] Fatima Jinnah Women Univ, Dept Math Sci, Rawalpindi, Pakistan
[2] Princess Nourah bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
关键词
Internet of Medical Things (IoMT); Deep learning; Image; Medical images; Cycle_GAN; Peak Signal to Noise Ratio (PSNR); Number of Pixel Change Rate (NPCR); Unified Average Changing Intensity (UACI); Structural Similarity Index Measure (SSIM);
D O I
10.1016/j.eij.2024.100541
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Medical Things (IoMT) links medical devices and wearable, enhancing healthcare. To secure sensitive patient data over the IoMT, encryption is vital to retain confidentiality, prevent tampering, ensure authenticity, and secure data transfer. The intricate neural network architecture of deep learning models adds a layer of complexity and non-linearity to the encryption process, rendering it highly resistant to plaintext attacks. Specifically, the Cycle_GAN network is used as the leading learning network. This work suggests deep learning- based encryption for medical images using Cycle_GAN, a Generative Adversarial Network. Cycle_GAN changes images without paired training data that improves quality and feature preservation. Unlike conventional image- to-image translation techniques, Cycle_GAN doesn't require a dataset with corresponding input-output pairs. Traditional methods typically needs paired data to learn the mapping between input and output images. Paired data can be challenging to obtain, specifically in medical imaging where gathering and annotating data can be time-consuming, laborious and expensive. The use of Cycle_GAN overwhelms this constraint by using unpaired data, where the input and output images are not explicitly paired. This method ensures confidentiality, authenticity, and secure transfer. Cycle_GAN consists of two major components: a generator used to modify the images, and a discriminator used to distinguish between real and fake images. Further, the Binary-Cross Entropy loss function is employed to train the network for precise predictions. The experiments are carried out on skin cancer datasets. The results demonstrate high-level efficient, systematic and coherent encryption as compared with other modernized medical image encryption methods. The proposed technique offers several benefits, including efficient encryption and decryption and robustness against unauthorized access.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] End-to-End Deep Learning Applied in Autonomous Navigation using Multi-Cameras System with RGB and Depth Images
    Diaz Amado, Jose A.
    Gomes, Iago Pacheco
    Amaro, Jean
    Wolf, Denis Fernando
    Osorio, Fernando S.
    2019 30TH IEEE INTELLIGENT VEHICLES SYMPOSIUM (IV19), 2019, : 1626 - 1631
  • [42] A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing
    Armknecht, Frederik
    Westhoff, Dirk
    Girao, Joao
    Hessler, Alban
    COMPUTER COMMUNICATIONS, 2008, 31 (04) : 734 - 749
  • [43] End-to-end Encryption based Biometric SaaS Using Raspberry Pi as a Remote Authentication Node
    Shah, Dhvani K.
    Bharadi, Vinayak A.
    Kaul, V. J.
    Amrutia, Sameer
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 52 - 59
  • [44] DeepChess :End-to-End Deep Neural Network for Automatic Learning in Chess
    David, Omid E.
    Netanyahu, Nathan S.
    Wolf, Lior
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING - ICANN 2016, PT II, 2016, 9887 : 88 - 96
  • [45] Deep Reinforcement Learning for End-to-End Network Slicing: Challenges and Solutions
    Liu, Qiang
    Choi, Nakjung
    Han, Tao
    IEEE NETWORK, 2023, 37 (02): : 222 - 228
  • [46] Traffic Signal Recognition Using End-to-End Deep Learning
    Sarker, Tonmoy
    Meng, Xiangyu
    TRAN-SET 2022, 2022, : 182 - 191
  • [47] DeepDive: An End-to-End Dehazing Method Using Deep Learning
    Goncalves, Lucas T.
    Gaya, Joel O.
    Drews, Paulo, Jr.
    Botelho, Silvia S. C.
    2017 30TH SIBGRAPI CONFERENCE ON GRAPHICS, PATTERNS AND IMAGES (SIBGRAPI), 2017, : 436 - 441
  • [48] Arabic speech recognition using end-to-end deep learning
    Alsayadi, Hamzah A.
    Abdelhamid, Abdelaziz A.
    Hegazy, Islam
    Fayed, Zaki T.
    IET SIGNAL PROCESSING, 2021, 15 (08) : 521 - 534
  • [49] Autonomous Driving Control Using End-to-End Deep Learning
    Lee, Myoung-jae
    Ha, Young-guk
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA AND SMART COMPUTING (BIGCOMP 2020), 2020, : 470 - 473
  • [50] Fast ultrasonic imaging using end-to-end deep learning
    Pilikos, Georgios
    Horchens, Lars
    Batenburg, Kees Joost
    van Leeuwen, Tristan
    Lucka, Felix
    PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL ULTRASONICS SYMPOSIUM (IUS), 2020,