1
|
Ajlouni N, Özyavaş A, Takaoğlu M, Takaoğlu F, Ajlouni F. Medical image diagnosis based on adaptive Hybrid Quantum CNN. BMC Med Imaging 2023; 23:126. [PMID: 37710188 PMCID: PMC10500912 DOI: 10.1186/s12880-023-01084-5] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/08/2023] [Accepted: 08/21/2023] [Indexed: 09/16/2023] Open
Abstract
Hybrid quantum systems have shown promise in image classification by combining the strengths of both classical and quantum algorithms. These systems leverage the parallel processing power of quantum computers to perform complex computations while utilizing classical algorithms to handle the vast amounts of data involved in imaging. The hybrid approach is intended to improve accuracy and speed compared to traditional classical methods. Further research and development in this area can revolutionize the way medical images are classified and help improve patient diagnosis and treatment. The use of Conventional Neural Networks (CNN) for the classification and diagnosis of medical images using big datasets requires, in most cases, the use of special high-performance computing machines, which are very expensive and hard to access by most researchers. A new form of Machine Learning (ML), Quantum machine learning (QML), is being introduced as an emerging strategy to overcome this problem. A hybrid quantum-classical CNN uses both quantum and classical convolution layers designed to use a parameterized quantum circuit. This means that the computing model utilizes a quantum circuits approach to construct QML algorithms, which are then used to transform the quantum state to extract image hidden features. This computational acceleration is expected to achieve better algorithm performance than classical CNNs. This study intends to evaluate the performance of a Hybrid Quantum CNN (HQCNN) against a conventional CNN. This is followed by some optimizer modifications for both proposed and classical CNN methods to investigate the possible further improvement of their performance. The optimizer modification is based on forcing the optimizer to be directly adaptive to model accuracy. The optimizer adaptiveness is based on the development of an optimizer with a loss base adaptive momentum. Several algorithms are developed to achieve the above-mentioned goals, including CNN, QCNN, CNN with the adaptive optimizer, and QCNN with the Adaptive optimizer. The four algorithms are tested against a Kaggle brain dataset containing over 7000 samples. The test results show the hybrid quantum circuit algorithm outperformed the conventional CNN algorithm. The performance of both algorithms was further improved by using a fully adaptive SGD optimizer.
Collapse
Affiliation(s)
- Naim Ajlouni
- Faculty of Engineering, Istanbul Atlas University, 34295, Istanbul, Türkiye.
- Faculty of Engineering, Istanbul Atlas University, Hamidiye, Anadolu Cd. No:40, 34408, 34403, Kağıthane, Istanbul, Turkey.
- Tübitak Bilgem, Barış, 1802. Sk. No:1, 41400, Gebze, Kocaeli, Turkey.
- Lancashire College of Further Education, Appleby Street, Lancashire, BB1 3BL, Blackburn, UK.
| | - Adem Özyavaş
- Faculty of Engineering, Istanbul Atlas University, 34295, Istanbul, Türkiye
| | - Mustafa Takaoğlu
- The Scientific and Technological Research Council of Türkiye (TÜBİTAK), BİLGEM, Kocaeli, Türkiye
| | - Faruk Takaoğlu
- The Scientific and Technological Research Council of Türkiye (TÜBİTAK), BİLGEM, Kocaeli, Türkiye
| | - Firas Ajlouni
- Department of Computer Science, Lancashire College of Further Education, Accrington, BB5 OHJ, UK
| |
Collapse
|
2
|
Su Y, Xu K, Rong W, Wang Z, Xue R, Xue L, Cai Z, Wan W. Optical image conversion and encryption based on structured light illumination and a diffractive neural network. APPLIED OPTICS 2023; 62:6131-6139. [PMID: 37707080 DOI: 10.1364/ao.495542] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/15/2023] [Accepted: 07/11/2023] [Indexed: 09/15/2023]
Abstract
In this paper, an optical image encryption method is proposed based on structured light illumination and a diffractive neural network (DNN), which can realize conversion between different images. With the use of the structured phase mask (SPM) in the iterative phase retrieval algorithm, a plaintext image is encoded into a DNN composed of multiple phase-only masks (POMs) and ciphertext. It is worth noting that ciphertext is a visible image such that the conversion of one image to another is achieved, leading to high concealment of the proposed optical image encryption method. In addition, the wavelength of the illuminating light, all Fresnel diffraction distances, the optical parameters of the adopted SPM such as focal length and topological charge number, as well as all POMs in the DNN are all considered as security keys in the decryption process, contributing to a large key space and high level of security. Numerical simulations are performed to demonstrate the feasibility of the proposed method, and simulation results show that it exhibits high feasibility and safety as well as strong robustness.
Collapse
|
3
|
Liang J, Song Z, Sun Z, Lv M, Ma H. Coupling Quantum Random Walks with Long- and Short-Term Memory for High Pixel Image Encryption Schemes. ENTROPY (BASEL, SWITZERLAND) 2023; 25:353. [PMID: 36832719 PMCID: PMC9954812 DOI: 10.3390/e25020353] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/13/2022] [Revised: 02/07/2023] [Accepted: 02/09/2023] [Indexed: 06/18/2023]
Abstract
This paper proposes an encryption scheme for high pixel density images. Based on the application of the quantum random walk algorithm, the long short-term memory (LSTM) can effectively solve the problem of low efficiency of the quantum random walk algorithm in generating large-scale pseudorandom matrices, and further improve the statistical properties of the pseudorandom matrices required for encryption. The LSTM is then divided into columns and fed into the LSTM in order for training. Due to the randomness of the input matrix, the LSTM cannot be trained effectively, so the output matrix is predicted to be highly random. The LSTM prediction matrix of the same size as the key matrix is generated based on the pixel density of the image to be encrypted, which can effectively complete the encryption of the image. In the statistical performance test, the proposed encryption scheme achieves an average information entropy of 7.9992, an average number of pixels changed rate (NPCR) of 99.6231%, an average uniform average change intensity (UACI) of 33.6029%, and an average correlation of 0.0032. Finally, various noise simulation tests are also conducted to verify its robustness in real-world applications where common noise and attack interference are encountered.
Collapse
Affiliation(s)
- Junqing Liang
- School of Information and Control Engineering, Qingdao University of Technology, Qingdao 266033, China
| | - Zhaoyang Song
- School of Information and Control Engineering, Qingdao University of Technology, Qingdao 266033, China
| | - Zhongwei Sun
- School of Information and Control Engineering, Qingdao University of Technology, Qingdao 266033, China
| | - Mou Lv
- School of Environmental and Municipal Engineerin, Qingdao University of Technology, Qingdao 266033, China
| | - Hongyang Ma
- School of Science, Qingdao University of Technology, Qingdao 266033, China
| |
Collapse
|
4
|
Ryselis K, Blažauskas T, Damaševičius R, Maskeliūnas R. Agrast-6: Abridged VGG-Based Reflected Lightweight Architecture for Binary Segmentation of Depth Images Captured by Kinect. SENSORS (BASEL, SWITZERLAND) 2022; 22:6354. [PMID: 36080813 PMCID: PMC9460068 DOI: 10.3390/s22176354] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/03/2022] [Revised: 08/15/2022] [Accepted: 08/19/2022] [Indexed: 06/15/2023]
Abstract
Binary object segmentation is a sub-area of semantic segmentation that could be used for a variety of applications. Semantic segmentation models could be applied to solve binary segmentation problems by introducing only two classes, but the models to solve this problem are more complex than actually required. This leads to very long training times, since there are usually tens of millions of parameters to learn in this category of convolutional neural networks (CNNs). This article introduces a novel abridged VGG-16 and SegNet-inspired reflected architecture adapted for binary segmentation tasks. The architecture has 27 times fewer parameters than SegNet but yields 86% segmentation cross-intersection accuracy and 93% binary accuracy. The proposed architecture is evaluated on a large dataset of depth images collected using the Kinect device, achieving an accuracy of 99.25% in human body shape segmentation and 87% in gender recognition tasks.
Collapse
|
5
|
Zhao J, Zhang T, Jiang J, Fang T, Ma H. Color image encryption scheme based on alternate quantum walk and controlled Rubik's Cube. Sci Rep 2022; 12:14253. [PMID: 35995941 PMCID: PMC9395402 DOI: 10.1038/s41598-022-18079-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/26/2021] [Accepted: 08/04/2022] [Indexed: 11/15/2022] Open
Abstract
Aiming at solving the trouble that digital image information is easily intercepted and tampered during transmission, we proposed a color image encryption scheme based on alternate quantum random walk and controlled Rubik’s Cube transformation. At the first, the color image is separated into three channels: channel R, channel G and channel B. Besides, a random sequence is generated by alternate quantum walk. Then the six faces of the Rubik’s Cube are decomposed and arranged in a specific order on a two-dimensional plane, and each pixel of the image is randomly mapped to the Rubik’s Cube. The whirling of the Rubik’s Cube is controlled by a random sequence to realize image scrambling and encryption. The scrambled image acquired by Rubik’s Cube whirling and the random sequence received by alternate quantum walk are bitwise-XORed to obtain a single-channel encrypted image. Finally the three-channel image is merged to acquire the final encrypted image. The decryption procedure is the reverse procedure of the encryption procedure. The key space of this scheme is theoretically infinite. After simulation experiments, the information entropy after encryption reaches 7.999, the NPCR is 99.5978%, and the UACI is 33.4317%. The encryption scheme with high robustness and security has a excellent encryption effect which is effective to resist statistical attacks, force attacks, and other differential attacks.
Collapse
Affiliation(s)
- Jingbo Zhao
- School of Information and Control Engineering, Qingdao University of Technology, Qingdao, 266000, China
| | - Tian Zhang
- School of Information and Control Engineering, Qingdao University of Technology, Qingdao, 266000, China
| | - Jianwei Jiang
- School of Information and Control Engineering, Qingdao University of Technology, Qingdao, 266000, China
| | - Tong Fang
- School of Information and Control Engineering, Qingdao University of Technology, Qingdao, 266000, China
| | - Hongyang Ma
- School of Science, Qingdao University of Technology, Qingdao, 266000, China.
| |
Collapse
|
6
|
Attribute-Based Encryption in Securing Big Data from Post-Quantum Perspective: A Survey. CRYPTOGRAPHY 2022. [DOI: 10.3390/cryptography6030040] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/06/2023]
Abstract
Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the scalability issue of recent public key infrastructure (PKI). It provides a fine-grained access control system with high flexibility and efficiency by labeling the secret key and ciphertext with distinctive attributes. Due to its fine-grained features, the ABE scheme is a protection layer in securing users’ data and privacy in big data processing and analytics. However, quantum computing, new technology on the horizon that will transform the security and privacy environment, has begun to appear. Like the conventional ABE schemes, present cryptography is not excluded from the impacts of quantum technology as they are not made to be quantum-resistant. While most recent surveys generally touched on the generic features of attribute-based encryption schemes such as user revocation, scalability, flexibility, data confidentiality, and scope in pairing-based ABE schemes, this survey investigated quantum-resistant ABE schemes in securing big data. This survey reviews the challenges faced by the recent ABE cryptography in the post-quantum era and highlights its differences from the conventional pairing-based ABE schemes. Subsequently, we defined the criteria of an ideal quantum-resistant ABE scheme. Additionally, existing works on quantum-resistant ABE schemes are reviewed based on their algorithms design, security and functionalities. Lastly, we summarized quantum-resistant ABE schemes’ ongoing challenges and future works.
Collapse
|