1
|
Zhu E, Feng H, Chen L, Lai Y, Chai S. MP-Net: A Multi-Center Privacy-Preserving Network for Medical Image Segmentation. IEEE TRANSACTIONS ON MEDICAL IMAGING 2024; 43:2718-2729. [PMID: 38478456 DOI: 10.1109/tmi.2024.3377248] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 07/02/2024]
Abstract
In this paper, we present the Multi-Center Privacy-Preserving Network (MP-Net), a novel framework designed for secure medical image segmentation in multi-center collaborations. Our methodology offers a new approach to multi-center collaborative learning, capable of reducing the volume of data transmission and enhancing data privacy protection. Unlike federated learning, which requires the transmission of model data between the central server and local servers in each round, our method only necessitates a single transfer of encrypted data. The proposed MP-Net comprises a three-layer model, consisting of encryption, segmentation, and decryption networks. We encrypt the image data into ciphertext using an encryption network and introduce an improved U-Net for image ciphertext segmentation. Finally, the segmentation mask is obtained through a decryption network. This architecture enables ciphertext-based image segmentation through computable image encryption. We evaluate the effectiveness of our approach on three datasets, including two cardiac MRI datasets and a CTPA dataset. Our results demonstrate that the MP-Net can securely utilize data from multiple centers to establish a more robust and information-rich segmentation model.
Collapse
|
2
|
Zhang B, Rahmatullah B, Wang SL, Almutairi HM, Xiao Y, Liu X, Liu Z. A variable dimensional chaotic map-based medical image encryption algorithm with multi-mode. Med Biol Eng Comput 2023; 61:2971-3002. [PMID: 37542682 DOI: 10.1007/s11517-023-02874-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/25/2022] [Accepted: 06/20/2023] [Indexed: 08/07/2023]
Abstract
Since the COVID-19 pandemic, telemedicine or non-face-to-face medicine has increased significantly. In practice, various types of medical images are essential to achieve effective telemedicine. Medical image encryption algorithms play an irreplaceable role in the fast and secure transmission and storage of these medical images. However, most of the existing medical image encryption algorithms are full encryption algorithms, which are inefficient and time-consuming, so they are not suitable for emergency medical scenarios. To improve the efficiency of encryption, a small number of works have focused on partial or selective encryption algorithms for medical images, in which different levels of encryption strategies were adopted for different information content regions of medical images. However, these encryption algorithms have inadequate security more or less. In this paper, based on the Logistic map, we designed an improved variable dimension map. Then, an encryption algorithm for medical images was proposed based on it. This algorithm has two modes: (1) full encryption mode and (2) semi-full encryption mode, which can better adapt to different medical scenarios, respectively. In full encryption mode, all pixels of medical images are encrypted by using the confusion-diffusion structure. In semi-full encryption mode, the region of interest of medical images is extracted. The confusion was first adopted to encrypt the region of interest, and then, the diffusion was adopted to encrypt the entire image. In addition, no matter which encryption mode is used, the algorithm provides the function of medical image integrity verification. The proposed algorithm was simulated and analyzed to evaluate its effectiveness. The results show that in semi-full encryption mode, the algorithm has good security performance and lower time consumption; while in full encryption mode, the algorithm has better security performance and is acceptable in time.
Collapse
Affiliation(s)
- Bin Zhang
- School of Computer Science, Baoji University of Arts and Sciences, Baoji, China
- Data Intelligence and Knowledge Management (DILIGENT), Faculty of Computing and Meta-Technology, Sultan Idris Education University (UPSI), Tanjong Malim, Perak, Malaysia
| | - Bahbibi Rahmatullah
- Data Intelligence and Knowledge Management (DILIGENT), Faculty of Computing and Meta-Technology, Sultan Idris Education University (UPSI), Tanjong Malim, Perak, Malaysia.
| | - Shir Li Wang
- Data Intelligence and Knowledge Management (DILIGENT), Faculty of Computing and Meta-Technology, Sultan Idris Education University (UPSI), Tanjong Malim, Perak, Malaysia
| | | | - Yan Xiao
- School of Computer Science, Baoji University of Arts and Sciences, Baoji, China
- Data Intelligence and Knowledge Management (DILIGENT), Faculty of Computing and Meta-Technology, Sultan Idris Education University (UPSI), Tanjong Malim, Perak, Malaysia
| | - Xinjuan Liu
- School of Computer Science, Baoji University of Arts and Sciences, Baoji, China
| | - Zhaoyan Liu
- School of Cyber Engineering, Xidian University, Xi'an, China
| |
Collapse
|
3
|
Abdellatef E, Naeem EA, El-Samie FEA. DeepEnc: deep learning-based CT image encryption approach. MULTIMEDIA TOOLS AND APPLICATIONS 2023. [DOI: 10.1007/s11042-023-15818-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/19/2022] [Revised: 04/28/2023] [Accepted: 05/10/2023] [Indexed: 09/01/2023]
|
4
|
Shi G, Yu S, Wang Q. Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map. ENTROPY 2022; 24:e24081023. [PMID: 35893003 PMCID: PMC9394294 DOI: 10.3390/e24081023] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/13/2022] [Revised: 07/14/2022] [Accepted: 07/22/2022] [Indexed: 02/04/2023]
Abstract
This paper analyzes the security of the image encryption algorithm based on a two-dimensional (2D) infinite collapse map. The encryption algorithm adopts a permutation–diffusion structure and can perform two or more rounds to achieve a higher level of security. By cryptanalysis, it is found that the original diffusion process can be split into a permutation–diffusion structure, which comes after the original permutation, so these two permutations can be merged into one. Then, some theorems about round-down operation are summarized, and the encryption and decryption equations in the diffusion process are deduced and simplified accordingly. Since the chaotic sequences used in encryption algorithm are independent of the plaintext and ciphertext, there are equivalent keys. The original encryption algorithm with single-round, two-round, and multi-round of permutation–diffusion processes is cracked, and the data complexity of the cryptanalysis attacks is analyzed. Numerical simulation is carried out by MATLAB, and the experimental results and theoretical analysis show the effectiveness of the cryptanalysis attacks. Finally, some suggestions for improvement are given to overcome the shortcomings of the original encryption algorithm.
Collapse
|
5
|
Khokhar B, Dahiya S, Parmar KS. Load frequency control of a microgrid employing a 2D Sine Logistic map based chaotic sine cosine algorithm. Appl Soft Comput 2021. [DOI: 10.1016/j.asoc.2021.107564] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
|
6
|
Chaotic Path Planning for 3D Area Coverage Using a Pseudo-Random Bit Generator from a 1D Chaotic Map. MATHEMATICS 2021. [DOI: 10.3390/math9151821] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
This work proposes a one-dimensional chaotic map with a simple structure and three parameters. The phase portraits, bifurcation diagrams, and Lyapunov exponent diagrams are first plotted to study the dynamical behavior of the map. It is seen that the map exhibits areas of constant chaos with respect to all parameters. This map is then applied to the problem of pseudo-random bit generation using a simple technique to generate four bits per iteration. It is shown that the algorithm passes all statistical NIST and ENT tests, as well as shows low correlation and an acceptable key space. The generated bitstream is applied to the problem of chaotic path planning, for an autonomous robot or generally an unmanned aerial vehicle (UAV) exploring a given 3D area. The aim is to ensure efficient area coverage, while also maintaining an unpredictable motion. Numerical simulations were performed to evaluate the performance of the path planning strategy, and it is shown that the coverage percentage converges exponentially to 100% as the number of iterations increases. The discrete motion is also adapted to a smooth one through the use of B-Spline curves.
Collapse
|
7
|
Assessment and Feasibility Study of Lemon Ripening Using X-ray Image of Information Visualization. APPLIED SCIENCES-BASEL 2021. [DOI: 10.3390/app11073261] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
Digital radiography (DR) is a mature technology and has been broadly used in medical diagnosis. Currently, it’s also used for fruit quality inspection in the market. This purpose of the study is to conduct non-destructive experiments for visual comparisons of digital radiography images, further construct visualized grayscale image analysis technology, and analyze the changes in lemon quality and ripening using quantitative statistical methods. The materials used for the experiments were three lemons of different ripening. A general medical X-ray DR system for was used in this study for 2D digital radiography. The medical X-ray DR images were created based on the Digital Imaging and Communications in Medicine (DICOM) standard. Photometric interpretation of monochrome was applied to create multi-layered grayscale images. Then quantitative analyses and comparisons were performed with image matrix structures and grayscale pixel values in the tissues using visualization techniques and statistical methods. After layer segmentation on the radiological images, the correlations between the lemon structures and tissue changes were assessed by using the Kruskal–Wallis test. The results showed that the p values for lemon, fiber, and pulp were all under 0.05, while the peel layer did not exhibit significant change. The pulp layer is the best region for statistical analyses to determine the lemon ripening. In conclusion, this study can provide a solid reference for future quality classification in the agricultural market. The research findings can be referenced for developing computing techniques applied to agricultural inspection, expanding the scope of application of the medical DR technology.
Collapse
|
8
|
Differential cryptanalysis of image cipher using block-based scrambling and image filtering. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.12.037] [Citation(s) in RCA: 15] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
|
9
|
Raj V, Janakiraman S, Amirtharajan R. Optimal concurrency on FPGA for lightweight medical image encryption. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2021. [DOI: 10.3233/jifs-200203] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
Abstract
Digitized forms of images do widely used for medical diagnostics. To maintain the privacy of an individual in e-health care applications, securing the medical image becomes essential. Hence exclusive encryption algorithms have been developed to protect the confidentiality of medical images. As an alternative to software implementations, the realization of image encryption architectures on hardware platforms such as FPGA offers significant benefit with its reconfigurable feature. This paper presents a lightweight image encryption scheme for medical image security feasible to realize as concurrent architectural blocks on reconfigurable hardware like FPGA to achieve higher throughput. In the proposed encryption scheme, Lorentz attractor’s chaotic keys perform the diffusion process. Simultaneously, the pseudo-random memory addresses obtained from a Linear Feedback Shift Register (LFSR) circuit accomplishes the confusion process. The proposed algorithm implemented on Intel Cyclone IV FPGA (EP4CE115F29C7) analyzed the optimal number of concurrent blocks to achieve a tradeoff among throughput and resource utilization. Security analyses such as information entropy, histogram, correlation, and PSNR confirms the algorithm’s encryption quality. The strength of diffusion keys was ensured by randomness verification through the standard test suite from the National Institute of Standards and Technology (NIST). The proposed scheme has a larger keyspace of 2384 that guarantees good confusion through near-zero correlation, and successful diffusion with a PSNR of <5 dB towards the statistical attacks. Based on the hardware analysis, the optimal number of concurrent architectural blocks (2 N) on the chosen FPGA to achieve higher throughput (639.37 Mbps), low power dissipation (138.85 mW), minimal resource utilization (1268 Logic Elements) and better encryption quality for the proposed algorithm is recommended as 4 (with N = 2).
Collapse
Affiliation(s)
- Vinoth Raj
- School of Electrical & Electronics Engineering (SEEE), SASTRA Deemed University, Thirumalaisamudram, Thanjavur, India
| | - Siva Janakiraman
- School of Electrical & Electronics Engineering (SEEE), SASTRA Deemed University, Thirumalaisamudram, Thanjavur, India
| | - Rengarajan Amirtharajan
- School of Electrical & Electronics Engineering (SEEE), SASTRA Deemed University, Thirumalaisamudram, Thanjavur, India
| |
Collapse
|
10
|
Lakshmi C, Thenmozhi K, Venkatesan C, Seshadhri A, Rayappan JBB, Amirtharajan R. Mutated Cleavages of Images for Stealth Disclosure: A Hopfield Neural Network Attractor (HNNA) Approach. Neural Process Lett 2021. [DOI: 10.1007/s11063-020-10412-7] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
|
11
|
|
12
|
You L, Yang E, Wang G. A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation. Soft comput 2020. [DOI: 10.1007/s00500-020-04683-4] [Citation(s) in RCA: 18] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
|
13
|
A novel chaotic encryption scheme based on efficient secret keys and confusion technique for confidential of DICOM images. INFORMATICS IN MEDICINE UNLOCKED 2020. [DOI: 10.1016/j.imu.2020.100396] [Citation(s) in RCA: 12] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022] Open
|
14
|
|
15
|
Medical image encryption using fractional discrete cosine transform with chaotic function. Med Biol Eng Comput 2019; 57:2517-2533. [PMID: 31512034 DOI: 10.1007/s11517-019-02037-3] [Citation(s) in RCA: 33] [Impact Index Per Article: 6.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/05/2018] [Accepted: 08/20/2019] [Indexed: 10/26/2022]
Abstract
In this advanced era, where we have high-speed connectivity, it is very imperative to insulate medical data from forgery and fraud. With the regular increment in the number of internet users, it is challenging to transmit the beefy medical data. This (medical data) is always reused for different diagnosis purposes, so the information of the medical images need to be protected. This paper introduces a new scheme to ensure the safety of the medical data, which includes the use of a chaotic map on the fractional discrete cosine transform (FrDCT) coefficients of the medical data/images. The imperative FrDCT provides a high degree of freedom for the encryption of the medical images. The algorithm consists of two significant steps, i.e., application of FrDCT on an image and after that chaotic map on FrDCT coefficients. The proposed algorithm discusses the benefits of FrDCT over fractional Fourier transform (FRFT) concerning fractional order α. The key sensitivity and space of the proposed algorithm for different medical images inspire us to make a platform for other researchers to work in this area. Experiments are conducted to study different parameters and challenges. The proposed method has been compared with state-of-the-art techniques. The results suggest that our technique outperforms many other state-of-the-art techniques. Graphical Abstract Overview of the proposed algorithm.
Collapse
|
16
|
An efficient spatiotemporal chaotic image cipher with an improved scrambling algorithm driven by dynamic diffusion phase. Inf Sci (N Y) 2019. [DOI: 10.1016/j.ins.2019.01.082] [Citation(s) in RCA: 19] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
|
17
|
Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos. Symmetry (Basel) 2018. [DOI: 10.3390/sym10070266] [Citation(s) in RCA: 34] [Impact Index Per Article: 5.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022] Open
|
18
|
Lakshmi C, Thenmozhi K, Rayappan JBB, Amirtharajan R. Encryption and watermark-treated medical image against hacking disease-An immune convention in spatial and frequency domains. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE 2018; 159:11-21. [PMID: 29650305 DOI: 10.1016/j.cmpb.2018.02.021] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/21/2016] [Revised: 02/08/2018] [Accepted: 02/26/2018] [Indexed: 06/08/2023]
Abstract
Digital Imaging and Communications in Medicine (DICOM) is one among the significant formats used worldwide for the representation of medical images. Undoubtedly, medical-image security plays a crucial role in telemedicine applications. Merging encryption and watermarking in medical-image protection paves the way for enhancing the authentication and safer transmission over open channels. In this context, the present work on DICOM image encryption has employed a fuzzy chaotic map for encryption and the Discrete Wavelet Transform (DWT) for watermarking. The proposed approach overcomes the limitation of the Arnold transform-one of the most utilised confusion mechanisms in image ciphering. Various metrics have substantiated the effectiveness of the proposed medical-image encryption algorithm.
Collapse
Affiliation(s)
- C Lakshmi
- School of Electrical & Electronics Engineering, SASTRA Deemed University, Thanjavur 613 401, India.
| | - K Thenmozhi
- School of Electrical & Electronics Engineering, SASTRA Deemed University, Thanjavur 613 401, India.
| | | | - Rengarajan Amirtharajan
- School of Electrical & Electronics Engineering, SASTRA Deemed University, Thanjavur 613 401, India.
| |
Collapse
|
19
|
Mehta G, Dutta MK, Kim PS. An Efficient and Lossless Cryptosystem for Security in Tele-Ophthalmology Applications Using Chaotic Theory. Ophthalmology 2018. [DOI: 10.4018/978-1-5225-5195-9.ch012] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022] Open
Abstract
Tele-ophthalmology has gained a lot of popularity as it involves retinal fundus images which can be analyzed for identification of severe diseases like diabetic retinopathy and glaucoma. With this increasing popularity, requirement for medical data confidentiality and privacy has also increased during transmission or storage. To meet this challenge, this paper propose an efficient and lossless cryptosystem based upon chaotic theory for encryption of medical fundus images. In the proposed encryption scheme a strategic combination of scrambling and substitution architecture is proposed which complements each other. The proposed scheme of encryption for fundus images is challenging as these images are 3-D color image and cannot be compressed as compression may not be able to retain all relevant medical information. For performance analysis, the proposed algorithm has been evaluated for perceptual and cryptographic security. The experimental results indicate that the proposed method is lossless and resistant against attacks making the proposed scheme suitable for real time applications.
Collapse
|
20
|
Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R. DNA Chaos Blend to Secure Medical Privacy. IEEE Trans Nanobioscience 2017; 16:850-858. [DOI: 10.1109/tnb.2017.2780881] [Citation(s) in RCA: 111] [Impact Index Per Article: 15.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
|
21
|
Mohamed Parvees MY, Abdul Samath J, Parameswaran Bose B. Medical Images are Safe - an Enhanced Chaotic Scrambling Approach. J Med Syst 2017; 41:167. [PMID: 28900790 DOI: 10.1007/s10916-017-0809-1] [Citation(s) in RCA: 13] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/24/2017] [Accepted: 08/28/2017] [Indexed: 11/25/2022]
Abstract
The patient data confidentiality is one of the vital security aspects in e-Health and m-Health services. In particular, providing confidentiality to the patient's medical image is essential and the protection approaches have to be explored in-depth due to the rapid progress in the technologies of teleradiology and PACS. In this study, the pseudo random number generators (PRNGs), namely, the linear congruential generator (LCG) and XOR shift generator (XSG) are improved and combined with improved logistic 2D coupled chaotic map to provide enhanced chaos based encryption. The proposed scheme encrypts the Digital Imaging and Communication in Medicine (DICOM) images to protect the patient confidentiality during the storage and transfer in radiological information system (RIS). The cipher image was measured with various security analyses and tested with different test suites to prove its randomness.
Collapse
Affiliation(s)
- M Y Mohamed Parvees
- Research and Development Centre, Bharathiar University, Coimbatore, 641046, India.
| | - J Abdul Samath
- Department of Computer Science, Government Arts College, Udumalpet, 642126, India
| | - B Parameswaran Bose
- Fat Pipe Networks Pvt. Ltd., Chennai, Mettukuppam, 600 009, India.,, #35, 1st Main, 3rd Cross, Indiragandhi St, Udayanagar, Bangalore, India
| |
Collapse
|
22
|
Yao W, Wu F, Zhang X, Zheng Z, Wang Z, Wang W, Qiu W. A Fast Color Image Encryption Algorithm Using 4-Pixel Feistel Structure. PLoS One 2016; 11:e0165937. [PMID: 27824894 PMCID: PMC5100896 DOI: 10.1371/journal.pone.0165937] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Abstract] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/13/2016] [Accepted: 10/20/2016] [Indexed: 11/24/2022] Open
Abstract
Algorithms using 4-pixel Feistel structure and chaotic systems have been shown to resolve security problems caused by large data capacity and high correlation among pixels for color image encryption. In this paper, a fast color image encryption algorithm based on the modified 4-pixel Feistel structure and multiple chaotic maps is proposed to improve the efficiency of this type of algorithm. Two methods are used. First, a simple round function based on a piecewise linear function and tent map are used to reduce computational cost during each iteration. Second, the 4-pixel Feistel structure reduces round number by changing twist direction securely to help the algorithm proceed efficiently. While a large number of simulation experiments prove its security performance, additional special analysis and a corresponding speed simulation show that these two methods increase the speed of the proposed algorithm (0.15s for a 256*256 color image) to twice that of an algorithm with a similar structure (0.37s for the same size image). Additionally, the method is also faster than other recently proposed algorithms.
Collapse
Affiliation(s)
- Wang Yao
- Key Laboratory of Mathematics, Informatics and Behavioral Semantics, Ministry of Education, Beijing 100191, China
- School of Mathematics and Systems Science, Beihang University, Beijing 100191, China
| | - Faguo Wu
- Key Laboratory of Mathematics, Informatics and Behavioral Semantics, Ministry of Education, Beijing 100191, China
- School of Mathematics and Systems Science, Beihang University, Beijing 100191, China
| | - Xiao Zhang
- Key Laboratory of Mathematics, Informatics and Behavioral Semantics, Ministry of Education, Beijing 100191, China
- School of Mathematics and Systems Science, Beihang University, Beijing 100191, China
- * E-mail: (XZ); (ZZ)
| | - Zhiming Zheng
- Key Laboratory of Mathematics, Informatics and Behavioral Semantics, Ministry of Education, Beijing 100191, China
- School of Mathematics and Systems Science, Beihang University, Beijing 100191, China
- * E-mail: (XZ); (ZZ)
| | - Zhao Wang
- Key Laboratory of Mathematics, Informatics and Behavioral Semantics, Ministry of Education, Beijing 100191, China
- Sino-French Engineer School (École Centrale de Pékin), Beihang University, Beijing 100191, China
| | - Wenhua Wang
- AVIC Economics & Technology Research Establishment, Beijing 100029, China
| | - Wangjie Qiu
- Educational Equipment Research & Development Center, Ministry of Education, Beijing 100080, China
| |
Collapse
|
23
|
Secured Medical Images - a Chaotic Pixel Scrambling Approach. J Med Syst 2016; 40:232. [PMID: 27653039 DOI: 10.1007/s10916-016-0611-5] [Citation(s) in RCA: 21] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/30/2016] [Accepted: 09/13/2016] [Indexed: 10/21/2022]
Abstract
In this paper, a cryptosystem is proposed to encrypt 16-bit monochrome DICOM image using enhanced chaotic economic map. A new enhanced chaotic economic map (ECEM) is designed from the chaotic economic map which has better bifurcation nature and positive Lyapunov exponent values. In order to improve the sternness of the encryption algorithm, the enhanced chaotic map is employed to generate the pixel permutation, masking, and swapping sequences. The substitution operation is introduced in-between the standard permutation and diffusion operations. The robustness of the proposed image encryption algorithm is measured by various analyses such as histogram, key sensitivity, key space, number of pixel change rate (NPCR), unified average change intensity (UACI), information entropy and correlation coefficient. The results of the security analyses are compared with existing algorithms to validate that the proposed algorithm is better in terms of larger key space to resist brute force attacks and other common attacks on encryption.
Collapse
|
24
|
Devi BP, Singh KM, Roy S. A copyright protection scheme for digital images based on shuffled singular value decomposition and visual cryptography. SPRINGERPLUS 2016; 5:1091. [PMID: 27468392 PMCID: PMC4947083 DOI: 10.1186/s40064-016-2733-0] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/07/2016] [Accepted: 06/30/2016] [Indexed: 11/10/2022]
Abstract
This paper proposes a new watermarking algorithm based on the shuffled singular value decomposition and the visual cryptography for copyright protection of digital images. It generates the ownership and identification shares of the image based on visual cryptography. It decomposes the image into low and high frequency sub-bands. The low frequency sub-band is further divided into blocks of same size after shuffling it and then the singular value decomposition is applied to each randomly selected block. Shares are generated by comparing one of the elements in the first column of the left orthogonal matrix with its corresponding element in the right orthogonal matrix of the singular value decomposition of the block of the low frequency sub-band. The experimental results show that the proposed scheme clearly verifies the copyright of the digital images, and is robust to withstand several image processing attacks. Comparison with the other related visual cryptography-based algorithms reveals that the proposed method gives better performance. The proposed method is especially resilient against the rotation attack.
Collapse
Affiliation(s)
- B Pushpa Devi
- National Institute of Technology Meghalaya, Shillong, India
| | | | | |
Collapse
|
25
|
Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 2016; 72:170-84. [DOI: 10.1016/j.compbiomed.2016.03.020] [Citation(s) in RCA: 143] [Impact Index Per Article: 17.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/21/2015] [Revised: 03/10/2016] [Accepted: 03/24/2016] [Indexed: 11/23/2022]
|
26
|
Differential cryptanalysis of a medical image cryptosystem with multiple rounds. Comput Biol Med 2015; 65:69-75. [DOI: 10.1016/j.compbiomed.2015.07.024] [Citation(s) in RCA: 33] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/10/2015] [Revised: 07/02/2015] [Accepted: 07/27/2015] [Indexed: 11/20/2022]
|
27
|
Praveenkumar P, Amirtharajan R, Thenmozhi K, Balaguru Rayappan JB. Medical data sheet in safe havens - A tri-layer cryptic solution. Comput Biol Med 2015; 62:264-76. [PMID: 25966921 DOI: 10.1016/j.compbiomed.2015.04.031] [Citation(s) in RCA: 50] [Impact Index Per Article: 5.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/02/2014] [Revised: 04/14/2015] [Accepted: 04/16/2015] [Indexed: 11/16/2022]
Abstract
Secured sharing of the diagnostic reports and scan images of patients among doctors with complementary expertise for collaborative treatment will help to provide maximum care through faster and decisive decisions. In this context, a tri-layer cryptic solution has been proposed and implemented on Digital Imaging and Communications in Medicine (DICOM) images to establish a secured communication for effective referrals among peers without compromising the privacy of patients. In this approach, a blend of three cryptic schemes, namely Latin square image cipher (LSIC), discrete Gould transform (DGT) and Rubik׳s encryption, has been adopted. Among them, LSIC provides better substitution, confusion and shuffling of the image blocks; DGT incorporates tamper proofing with authentication; and Rubik renders a permutation of DICOM image pixels. The developed algorithm has been successfully implemented and tested in both the software (MATLAB 7) and hardware Universal Software Radio Peripheral (USRP) environments. Specifically, the encrypted data were tested by transmitting them through an additive white Gaussian noise (AWGN) channel model. Furthermore, the sternness of the implemented algorithm was validated by employing standard metrics such as the unified average changing intensity (UACI), number of pixels change rate (NPCR), correlation values and histograms. The estimated metrics have also been compared with the existing methods and dominate in terms of large key space to defy brute force attack, cropping attack, strong key sensitivity and uniform pixel value distribution on encryption.
Collapse
Affiliation(s)
| | | | - K Thenmozhi
- School of Electrical & Electronics Engineering, SASTRA University, Thanjavur 613401, India.
| | | |
Collapse
|
28
|
Fu C, Zhang GY, Bian O, Lei WM, Ma HF. A novel medical image protection scheme using a 3-dimensional chaotic system. PLoS One 2014; 9:e115773. [PMID: 25541941 PMCID: PMC4277340 DOI: 10.1371/journal.pone.0115773] [Citation(s) in RCA: 32] [Impact Index Per Article: 3.2] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/19/2014] [Accepted: 11/27/2014] [Indexed: 11/18/2022] Open
Abstract
Recently, great concerns have been raised regarding the issue of medical image protection due to the increasing demand for telemedicine services, especially the teleradiology service. To meet this challenge, a novel chaos-based approach is suggested in this paper. To address the security and efficiency problems encountered by many existing permutation-diffusion type image ciphers, the new scheme utilizes a single 3D chaotic system, Chen's chaotic system, for both permutation and diffusion. In the permutation stage, we introduce a novel shuffling mechanism, which shuffles each pixel in the plain image by swapping it with another pixel chosen by two of the three state variables of Chen's chaotic system. The remaining variable is used for quantification of pseudorandom keystream for diffusion. Moreover, the selection of state variables is controlled by plain pixel, which enhances the security against known/chosen-plaintext attack. Thorough experimental tests are carried out and the results indicate that the proposed scheme provides an effective and efficient way for real-time secure medical image transmission over public networks.
Collapse
Affiliation(s)
- Chong Fu
- School of Information Science and Engineering, Northeastern University, Shenyang, China
- * E-mail:
| | - Gao-yuan Zhang
- School of Information Science and Engineering, Northeastern University, Shenyang, China
| | - Ou Bian
- The General Hospital of Shenyang Military Command, Shenyang, China
| | - Wei-min Lei
- School of Information Science and Engineering, Northeastern University, Shenyang, China
| | - Hong-feng Ma
- TeraRecon, Foster City, California, United States of America
| |
Collapse
|
29
|
|
30
|
Stoyanov B, Kordov K. Novel image encryption scheme based on Chebyshev polynomial and Duffing map. ScientificWorldJournal 2014; 2014:283639. [PMID: 25143970 PMCID: PMC3985400 DOI: 10.1155/2014/283639] [Citation(s) in RCA: 28] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/10/2013] [Accepted: 03/04/2014] [Indexed: 11/17/2022] Open
Abstract
We present a novel image encryption algorithm using Chebyshev polynomial based on permutation and substitution and Duffing map based on substitution. Comprehensive security analysis has been performed on the designed scheme using key space analysis, visual testing, histogram analysis, information entropy calculation, correlation coefficient analysis, differential analysis, key sensitivity test, and speed test. The study demonstrates that the proposed image encryption algorithm shows advantages of more than 10(113) key space and desirable level of security based on the good statistical results and theoretical arguments.
Collapse
Affiliation(s)
- Borislav Stoyanov
- Faculty of Mathematics and Informatics, Konstantin Preslavski University of Shumen, 9712 Shumen, Bulgaria
| | - Krasimir Kordov
- Faculty of Mathematics and Informatics, Konstantin Preslavski University of Shumen, 9712 Shumen, Bulgaria
| |
Collapse
|
31
|
Iacomi M, Cascio D, Fauci F, Raso G. Mammographic images segmentation based on chaotic map clustering algorithm. BMC Med Imaging 2014; 14:12. [PMID: 24666766 PMCID: PMC3987162 DOI: 10.1186/1471-2342-14-12] [Citation(s) in RCA: 13] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/08/2013] [Accepted: 03/14/2014] [Indexed: 11/10/2022] Open
Abstract
BACKGROUND This work investigates the applicability of a novel clustering approach to the segmentation of mammographic digital images. The chaotic map clustering algorithm is used to group together similar subsets of image pixels resulting in a medically meaningful partition of the mammography. METHODS The image is divided into pixels subsets characterized by a set of conveniently chosen features and each of the corresponding points in the feature space is associated to a map. A mutual coupling strength between the maps depending on the associated distance between feature space points is subsequently introduced. On the system of maps, the simulated evolution through chaotic dynamics leads to its natural partitioning, which corresponds to a particular segmentation scheme of the initial mammographic image. RESULTS The system provides a high recognition rate for small mass lesions (about 94% correctly segmented inside the breast) and the reproduction of the shape of regions with denser micro-calcifications in about 2/3 of the cases, while being less effective on identification of larger mass lesions. CONCLUSIONS We can summarize our analysis by asserting that due to the particularities of the mammographic images, the chaotic map clustering algorithm should not be used as the sole method of segmentation. It is rather the joint use of this method along with other segmentation techniques that could be successfully used for increasing the segmentation performance and for providing extra information for the subsequent analysis stages such as the classification of the segmented ROI.
Collapse
Affiliation(s)
| | - Donato Cascio
- Dipartimento di Fisica e Chimica, Università Degli Studi di Palermo, Palermo, Italy.
| | | | | |
Collapse
|
32
|
A Symmetric Chaos-Based Image Cipher with an Improved Bit-Level Permutation Strategy. ENTROPY 2014. [DOI: 10.3390/e16020770] [Citation(s) in RCA: 32] [Impact Index Per Article: 3.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
|