Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network

被引:7
|
作者
Ding, Yi [1 ,2 ]
Wang, Zi [1 ]
Qin, Zhen [1 ,2 ]
Zhou, Erqiang [1 ]
Zhu, Guobin [1 ]
Qin, Zhiguang [1 ]
Choo, Kim-Kwang Raymond [3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Network & Data Secur Key Lab Sichuan Prov, Chengdu 610054, Peoples R China
[2] Yibin Great Technol Co Ltd, Yibin 644000, Peoples R China
[3] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
基金
中国国家自然科学基金;
关键词
Encryption and decryption networks; backdoor attack; paradigm; CHAOS;
D O I
10.1109/TIFS.2023.3322315
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Medical images often contain sensitive information, and one typical security measure is to encrypt medical images prior to storage and analysis. A number of solutions, such as those utilizing deep learning, have been proposed for medical image encryption and decryption. However, our research shows that deep learning-based encryption models can potentially be vulnerable to backdoor attacks. In this paper, a backdoor attack paradigm for encryption and decryption network is proposed and corresponding attacks are respectively designed for encryption and decryption scenarios. For attacking the encryption model, a backdoor discriminator is adopted, which is randomly trained with the normal discriminator to confuse the encryption process. In the decryption scenario, a number of subnetwork parameters are replaced and the subnetwork can be activated when detecting the trigger embedded into the input (encrypted image) to degrade the decryption performance. Considering the model performance degradation due to parameter replacement, the model pruning is also adopted to further strengthen the attacking performance. Furthermore, the image steganography is adopted to generate invisible triggers for each image; subsequently, improving the stealthiness of backdoor attacks. Our research on designing backdoor attacks for encryption and decryption network can serve as an attacking mode for such networks, and provides another research direction for improving the security of such models. This research is also one of the earliest works to realize the backdoor attack on the deep learning based medical encryption and decryption network to evaluate the security performance of these networks. Extensive experimental results show that the proposed method can effectively threaten the security performance both for the encryption and decryption network.
引用
收藏
页码:280 / 292
页数:13
相关论文
共 50 条
  • [1] DeepKeyGen: A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption
    Ding, Yi
    Tan, Fuyuan
    Qin, Zhen
    Cao, Mingsheng
    Choo, Kim-Kwang Raymond
    Qin, Zhiguang
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2022, 33 (09) : 4915 - 4929
  • [2] DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical Things
    Ding, Yi
    Wu, Guozheng
    Chen, Dajiang
    Zhang, Ning
    Gong, Linpeng
    Cao, Mingsheng
    Qin, Zhiguang
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (03) : 1504 - 1518
  • [3] Deep-KEDI: Deep learning-based zigzag generative adversarial network for encryption and decryption of medical images
    Selvakumar, K.
    Lokesh, S.
    TECHNOLOGY AND HEALTH CARE, 2024, 32 (05) : 3231 - 3251
  • [4] TrojanFlow: A Neural Backdoor Attack to Deep Learning-based Network Traffic Classifiers
    Ning, Rui
    Xin, Chunsheng
    Wu, Hongyi
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022), 2022, : 1429 - 1438
  • [5] Backdoor Attack Against Deep Learning-Based Autonomous Driving with Fogging
    Liu, Jianming
    Luo, Li
    Wang, Xueyan
    ARTIFICIAL INTELLIGENCE AND ROBOTICS, ISAIR 2022, PT II, 2022, 1701 : 247 - 256
  • [6] Survey on medical image encryption: From classical to deep learning-based approaches
    Prasad, Shiv
    Singh, Amit Kumar
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 123
  • [7] A Comprehensive Review and Analysis of Deep Learning-Based Medical Image Adversarial Attack and Defense
    Muoka, Gladys W.
    Yi, Ding
    Ukwuoma, Chiagoziem C.
    Mutale, Albert
    Ejiyi, Chukwuebuka J.
    Mzee, Asha Khamis
    Gyarteng, Emmanuel S. A.
    Alqahtani, Ali
    Al-antari, Mugahed A.
    MATHEMATICS, 2023, 11 (20)
  • [8] Hidden Backdoor Attack Against Deep Learning-Based Wireless Signal Modulation Classifiers
    Huang, Yunsong
    Liu, Weicheng
    Wang, Hui-Ming
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (09) : 12396 - 12400
  • [9] DeepEnc: deep learning-based CT image encryption approach
    Abdellatef, Essam
    Naeem, Ensherah A.
    Abd El-Samie, Fathi E.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (04) : 11147 - 11167
  • [10] DeepEnc: deep learning-based CT image encryption approach
    Essam Abdellatef
    Ensherah A. Naeem
    Fathi E. Abd El-Samie
    Multimedia Tools and Applications, 2024, 83 : 11147 - 11167