Efficient Neuroimaging Data Security and Encryption Using Pixel-Based Homomorphic Residue Number System

被引:0
|
作者
Usman L.O. [1 ,2 ]
Muniyandi R.C. [1 ]
Usman M.A. [2 ]
机构
[1] Research Centre for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Selangor, UKM Bangi
[2] Department of Computer Science, Tai Solarin University of Education, P.M.B. 2118, Ogun State, Ijagun, Ijebu-Ode
关键词
Cipher images; Homomorphic encryption; Neural biomarkers; Neuroimages; Residue number system;
D O I
10.1007/s42979-023-02297-9
中图分类号
学科分类号
摘要
In recent times, there has been an increasing attention in designing a homomorphic privacy-preserving classification method for neuro-images based on the residue number system (RNS) and deep CNN models. This article presents the RNS homomorphic encryption system for neuro-images and evaluates its security efficiency with respect to moduli set { 2 n- 1 , 2 n, 2 n+1- 1 } . The efficiency of the proposed system is evaluated through the application of three metrics, namely visual inspection, encoding analysis, and security analysis. The analysis demonstrates that the proposed RNS scheme is a fully homomorphic encryption (FHE) scheme that can encrypt and decrypt neuroimages without compromising any essential neural biomarker features. Additionally, the scheme is robust against statistical attacks like histogram, brute force, correlation coefficient, and key sensitivity. Thus, the proposed RNS-FHE scheme can be utilized for any neuroimaging dataset and is appropriate for the design of homomorphic privacy-preserving methods when compared to the current state-of-the-art. In summary, the contribution and novelty of this study is the development of a systematic RNS-FHE privacy-preserving approach for efficient neuroimaging dataset homomorphic encryption. © 2023, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [21] Efficient integrity verification of replicated data in cloud using homomorphic encryption
    Mukundan, Raghul
    Madria, Sanjay
    Linderman, Mark
    DISTRIBUTED AND PARALLEL DATABASES, 2014, 32 (04) : 507 - 534
  • [22] Efficient integrity verification of replicated data in cloud using homomorphic encryption
    Raghul Mukundan
    Sanjay Madria
    Mark Linderman
    Distributed and Parallel Databases, 2014, 32 : 507 - 534
  • [23] A Design of System using homomorphic encryption for multimedia data management
    Cha, Hyun-Jong
    Yang, Ho-Kyung
    Kim, Jin-Mook
    Song, You-Jin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (19) : 19897 - 19912
  • [24] A Design of System using homomorphic encryption for multimedia data management
    Hyun-Jong Cha
    Ho-Kyung Yang
    Jin-Mook Kim
    You-Jin Song
    Multimedia Tools and Applications, 2017, 76 : 19897 - 19912
  • [25] Hyper Elliptic Curve Based Homomorphic Encryption Scheme for Cloud Data Security
    Selvi, S.
    Gobi, M.
    INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 71 - 78
  • [26] Context pixel-based reversible data hiding scheme using pixel value ordering
    Sudipta Meikap
    Biswapati Jana
    Tzu-Chuen Lu
    The Visual Computer, 2024, 40 : 3529 - 3552
  • [27] Context pixel-based reversible data hiding scheme using pixel value ordering
    Meikap, Sudipta
    Jana, Biswapati
    Lu, Tzu-Chuen
    VISUAL COMPUTER, 2023, 40 (5): : 3529 - 3552
  • [28] SEOTP: a new secure and efficient ownership transfer protocol based on quadric residue and homomorphic encryption
    Moazami, Farokhlagha
    Safkhani, Masoumeh
    WIRELESS NETWORKS, 2020, 26 (07) : 5285 - 5306
  • [29] SEOTP: a new secure and efficient ownership transfer protocol based on quadric residue and homomorphic encryption
    Farokhlagha Moazami
    Masoumeh Safkhani
    Wireless Networks, 2020, 26 : 5285 - 5306
  • [30] Reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel value ordering
    Ren, Fang
    Hao, Yanli
    Pang, Kexin
    Wu, Ziyi
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (14) : 40607 - 40627