Chaotic medical image encryption method using attention mechanism fusion ResNet model

被引:3
|
作者
Li, Xiaowu [1 ]
Peng, Huiling [2 ]
机构
[1] Shantou Univ Med Coll, Affiliated Hosp 2, Informat Dept, Shantou, Guangdong, Peoples R China
[2] Luoyang Inst Sci & Technol, Sch Comp & Informat Engn, Luoyang, Henan, Peoples R China
关键词
artificial intelligence; medical image encryption; deep learning; ResNet; chaotic system; attention mechanism; medical image security frontiers; NETWORK;
D O I
10.3389/fnins.2023.1226154
中图分类号
Q189 [神经科学];
学科分类号
071006 ;
摘要
IntroductionWith the rapid advancement of artificial intelligence (AI) technology, the protection of patient medical image privacy and security has become a critical concern in current research on image privacy protection. However, traditional methods for encrypting medical images have faced criticism due to their limited flexibility and inadequate security. To overcome these limitations, this study proposes a novel chaotic medical image encryption method, called AT-ResNet-CM, which incorporates the attention mechanism fused with the ResNet model. MethodsThe proposed method utilizes the ResNet model as the underlying network for constructing the encryption and decryption framework. The ResNet's residual structure and jump connections are employed to effectively extract profound information from medical images and expedite the model's convergence. To enhance security, the output of the ResNet model is encrypted using a logistic chaotic system, introducing randomness and complexity to the encryption process. Additionally, an attention mechanism is introduced to enhance the model's response to the region of interest within the medical image, thereby strengthening the security of the encrypted network. ResultsExperimental simulations and analyses were conducted to evaluate the performance of the proposed approach. The results demonstrate that the proposed method outperforms alternative models in terms of encryption effectiveness, as indicated by a horizontal correlation coefficient of 0.0021 and information entropy of 0.9887. Furthermore, the incorporation of the attention mechanism significantly improves the encryption performance, reducing the horizontal correlation coefficient to 0.0010 and increasing the information entropy to 0.9965. These findings validate the efficacy of the proposed method for medical image encryption tasks, as it offers enhanced security and flexibility compared to existing approaches. DiscussionIn conclusion, the AT-ResNet-CM method presents a promising solution to address the limitations of traditional encryption techniques in protecting patient medical images. By leveraging the attention mechanism fused with the ResNet model, the method achieves improved security and flexibility. The experimental results substantiate the superiority of the proposed method in terms of encryption effectiveness, horizontal correlation coefficient, and information entropy. The proposed method not only addresses the shortcomings of traditional methods but also provides a more robust and reliable approach for safeguarding patient medical image privacy and security.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Image encryption method based on chaotic map
    Wang, Yuanzhi
    Ren, Guangyong
    Jiang, Julang
    Zhang, Jian
    Sun, Lijuan
    ICIEA 2007: 2ND IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-4, PROCEEDINGS, 2007, : 2558 - +
  • [32] Medical image enhancement method based on visual attention mechanism
    Li, Ning
    Zhao, Jianyu
    Jiang, Ping
    Li, Chunmei
    2018 CHINESE AUTOMATION CONGRESS (CAC), 2018, : 452 - 456
  • [33] Attention Mechanism Guided SE + ResNet-H Model for Gastrointestinal Endoscopy Image Classification
    Ye, Bo
    Shu, Zhi
    Wang, Bo
    Wang, Shufang
    Fu, Yingbing
    Zhang, Leting
    Qi, Bowen
    Dwivedi, Amit Krishna
    Liu, Sheng
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2024, 73 : 1 - 13
  • [34] AN IMAGE ENCRYPTION USING CHAOTIC PERMUTATION AND DIFFUSION
    Gopalakrishnan, T.
    Ramakrishnan, S.
    Balakumar, M.
    2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
  • [35] Image encryption using chaotic logistic map
    Pareek, N. K.
    Patidar, Vinod
    Sud, K. K.
    IMAGE AND VISION COMPUTING, 2006, 24 (09) : 926 - 934
  • [36] Image encryption using spatial chaotic map
    Sun, Fuyan
    Lue, Zongwang
    INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND PATTERN RECOGNITION IN INDUSTRIAL ENGINEERING, 2010, 7820
  • [37] Image Encryption Using Chaotic Maps: A Survey
    Sankpal, Priya R.
    Vijaya, P. A.
    2014 FIFTH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING (ICSIP 2014), 2014, : 102 - 107
  • [38] Image Encryption Using the Chaotic Josephus Matrix
    Yang, Gelan
    Jin, Huixia
    Bai, Na
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [39] Image Encryption Using Camellia and Chaotic Maps
    Elpeltagy, Marwa S.
    Abdelwahab, Moataz M.
    Sayed, Mohammed S.
    2015 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT), 2015, : 209 - 214
  • [40] AN ATTENTION MECHANISM AND MULTI-FEATURE FUSION NETWORK FOR MEDICAL IMAGE SEGMENTATION
    Ren, Xianxiang
    Liang, Hu
    Zhao, Shengrong
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2023, 24 (02): : 191 - 200