Efficient Neuroimaging Data Security and Encryption Using Pixel-Based Homomorphic Residue Number System

被引:0
|
作者
Usman L.O. [1 ,2 ]
Muniyandi R.C. [1 ]
Usman M.A. [2 ]
机构
[1] Research Centre for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Selangor, UKM Bangi
[2] Department of Computer Science, Tai Solarin University of Education, P.M.B. 2118, Ogun State, Ijagun, Ijebu-Ode
关键词
Cipher images; Homomorphic encryption; Neural biomarkers; Neuroimages; Residue number system;
D O I
10.1007/s42979-023-02297-9
中图分类号
学科分类号
摘要
In recent times, there has been an increasing attention in designing a homomorphic privacy-preserving classification method for neuro-images based on the residue number system (RNS) and deep CNN models. This article presents the RNS homomorphic encryption system for neuro-images and evaluates its security efficiency with respect to moduli set { 2 n- 1 , 2 n, 2 n+1- 1 } . The efficiency of the proposed system is evaluated through the application of three metrics, namely visual inspection, encoding analysis, and security analysis. The analysis demonstrates that the proposed RNS scheme is a fully homomorphic encryption (FHE) scheme that can encrypt and decrypt neuroimages without compromising any essential neural biomarker features. Additionally, the scheme is robust against statistical attacks like histogram, brute force, correlation coefficient, and key sensitivity. Thus, the proposed RNS-FHE scheme can be utilized for any neuroimaging dataset and is appropriate for the design of homomorphic privacy-preserving methods when compared to the current state-of-the-art. In summary, the contribution and novelty of this study is the development of a systematic RNS-FHE privacy-preserving approach for efficient neuroimaging dataset homomorphic encryption. © 2023, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 50 条
  • [41] Preserving Health Care Data Security and Privacy Using Carmichael's Theorem-Based Homomorphic Encryption and Modified Enhanced Homomorphic Encryption Schemes in Edge Computing Systems
    Kumari, K. Anitha
    Sharma, Avinash
    Chakraborty, Chinmay
    Ananyaa, M.
    BIG DATA, 2022, 10 (01) : 1 - 17
  • [42] Efficient Privacy-Preserving Fingerprint-Based Authentication System Using Fully Homomorphic Encryption
    Kim, Taeyun
    Oh, Yongwoo
    Kim, Hyoungshick
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [43] Improvement of the Classifier Performance of a Pedestrian Detection System by Pixel-Based Data Fusion
    Lietz, Holger
    Thomanek, Jan
    Fardi, Basel
    Wanielik, Gerd
    AI (ASTERISK) IA 2009: EMERGENT PERSPECTIVES IN ARTIFICIAL INTELLIGENCE, 2009, 5883 : 122 - 130
  • [44] Efficient and Secure kNN Classification over Encrypted Data using Vector Homomorphic Encryption
    Yang, Haomiao
    He, Weichao
    Li, Jie
    Li, Hongwei
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [45] An efficient arithmetic unit based on residue number system
    Arad, BS
    Sutrave, AK
    COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2002, : 1 - 4
  • [46] Design of an Efficient Adder based on Residue Number System
    Raajitha, Kaki
    Meenakshi, Kollati
    Rao, Y. Mareswara
    PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 1710 - 1717
  • [47] Cloud Storage Third-party Data Security Scheme Based on Fully Homomorphic Encryption
    Chen, Junjian
    2016 INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC), 2016, : 155 - 159
  • [48] RETRACTED: Face Security Authentication System Based on Deep Learning and Homomorphic Encryption (Retracted Article)
    Sun, Dechao
    Huang, Hong
    Zheng, Dongsong
    Hu, Haoliang
    Bi, Chunyue
    Wang, Renfang
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [49] Investigating Malware Propagation and Behaviour Using System and Network Pixel-Based Visualisation
    Jacob Williams
    Phil Legg
    SN Computer Science, 2022, 3 (1)
  • [50] Reference pixel-based reversible data hiding scheme using multi-level pixel value ordering
    Meikap, Sudipta
    Jana, Biswapati
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (06) : 16895 - 16928