IJCNIS Vol. 16, No. 6, 8 Dec. 2024
Cover page and Table of Contents: PDF (size: 1315KB)
PDF (1315KB), PP.106-119
Views: 0 Downloads: 0
Security, Deoxyribonucleic Acid, Generative Adversarial Network, Chaotic Tent Map, Medical Image
Medical images are utilized to diagnose patients' health conditions. Nowadays, medical images are sent over the internet for diagnosis purposes. So, they should be protected from cyber attackers. These medical images are sensitive to any minor changes, and the data volume is rapidly increasing. Thus, security and storage costs must be considered in medical images. Traditional encryption and compression methods are ineffective for encrypting medical images due to their high execution time and algorithm complexity. In this paper, a novel 2D-chaos and Generative Adversarial Network (GAN) with DeoxyriboNucleic Acid (DNA) computing is proposed for generating encryption keys and improving the security of medical images. The proposed scheme uses GAN and 2D-chaos to generate the private key and diffusion process. The pixel values of the original images in the proposed schemes are shuffled using Mersenne Twister (MT) to improve the security of medical images. Moreover, the novel 2D-Chaotic Tent Map (2D-CTM) method is used to construct the key while performing XOR-based encryption. The proposed model has been tested on different medical images, namely the COVIDx-19 X-ray images, the malaria microscopic images, and the brain MRI images. The experiment results have been evaluated using performance metrics, namely key space, histogram analysis, entropy, key sensitivity, robustness analysis, correlation, SSIM, and MS-SSIM. The outcomes demonstrate that the proposed scheme is more effective than the state-of-the-art schemes.
Anita Murmu, Piyush Kumar, "A Novel GAN-based Chaotic Method with DNA Computing for Enhancing Security of Medical Images", International Journal of Computer Network and Information Security(IJCNIS), Vol.16, No.6, pp.106-119, 2024. DOI:10.5815/ijcnis.2024.06.09
[1]Begum M, Uddin M S, “Digital image watermarking techniques: a review,” Information, vol. 11, no. 2, pp. 110, 2020.
[2]Liao X, Yin J, Guo S, Li X, Sangaiah A K, “Medical JPEG image steganography based on preserving inter-block dependencies,” Computers & Electrical Engineering, vol. 67, pp. 320-329, 2018.
[3]Vengadapurvaja A M, Nisha G, Aarthy R, Sasikaladevi N, “An efficient homomorphic medical image encryption algorithm for cloud storage security,” Procedia computer science, vol. 115, pp. 643-650, 2017.
[4]Holla M R, Pais A R, “High-performance medical image secret sharing using super-resolution for CAD systems,” Applied Intelligence, vol. 52, no. 14, pp. 16852-16868, 2020.
[5]Ding Y, Tan F, Qin Z, Cao M, Choo K K R, Qin Z, “DeepKeyGen: A deep learning-based stream cipher generator for medical image encryption and decryption,” IEEE Transactions on Neural Networks and Learning Systems, pp. 1–15, 2021.
[6]Murmu A, Kumar P, “A novel gateaux derivatives with efficient DCNN-ResUNet method for segmenting multi-class brain tumor,” Medical & Biological Engineering & Computing, 2023.
[7]Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y, “Generative Adversarial Networks,” Communications of the ACM, vol. 63, no. 11, pp. 139–144, 2020.
[8]Mohammed H A, Dridi M, Mtibaa A, “A medical image crypto-compression algorithm based on neural network and pwlcm,” Multimedia Tools and Applications, vol. 78, no. 11, pp. 14379–14396, 2018.
[9]Belazi A, Talha M, Kharbech S, Xiang W, “Novel medical image encryption scheme based on chaos and DNA encoding,” IEEE Access, vol. 7, pp. 36667–36681, 2019.
[10]Ayoobkhan M U, Chikkannan E, Ramakrishnan K, “Feed-forward neural network-based predictive image coding for medical image compression,” Arabian Journal for Science and Engineering, vol. 43, no. 8, pp. 4239–4247, 2017.
[11]Selvi C T, Amudha J, Sudhakar R, “Medical image encryption and compression by adaptive sigma filterized SYNORR certificateless signcryptive levenshtein entropy-coding-based deep neural learning,” Multimedia Systems, vol. 27, no. 6, pp. 1059–1074, 2021.
[12]Yang F, Mou J, Sun K, Chu R, “Lossless image compression-encryption algorithm based on BP neural network and chaotic system,” Multimedia Tools and Applications, vol. 79, no. 27-28, pp. 19963–19992, 2020.
[13]Brindha M, Ammasai Gounden N, “A Chaos based image encryption and lossless compression algorithm using hash table and Chinese remainder theorem,” Applied Soft Computing, vol. 40, pp. 379–390, 2016.
[14]Xiaolin wu, Zhu B, Hu Y, Ran Y, “A novel colour image encryption scheme using rectangular transform-enhanced chaotic tent maps,” IEEE Access, pp. 1–1, 2017.
[15]Wang X, Yin S, Shafiq M, Laghari A A, Karim S, Cheikhrouhou O, Alhakami W, Hamam H, “A new V-net convolutional neural network based on four-dimensional Hyperchaotic system for medical image encryption,” Security and Communication Networks, vol. 2022, pp. 1–14, 2022.
[16]Wu J, Liao X, Yang B, “Image encryption using 2D Hénon-sine map and DNA approach,” Signal Processing, vol. 153, pp. 11–23, 2018.
[17]Akkasaligar P T, Biradar S, “Selective medical image encryption using DNA cryptography,” Information Security Journal: A Global Perspective, vol. 29, no. 2, pp. 91–101, 2020.
[18]Hosny K M, Kamal S T, Darwish M M, “A color image encryption technique using block scrambling and Chaos,” Multimedia Tools and Applications, vol. 81, no. 1, pp. 505–525, 2021.
[19]Kumar C M, Vidhya R, Brindha M, “An efficient chaos based image encryption algorithm using enhanced Thorp Shuffle and chaotic convolution function,” Applied Intelligence, vol. 52, no. 3, pp. 2556–2585, 2021.
[20]Jeevitha S, Amutha Prabha N, “Novel medical image encryption using DWT block-based scrambling and edge maps”, Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 3, pp. 3373–3388, 2020.
[21]Ismail R, Fattah A, Saqr HM, Nasr ME, “An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map,” Multimedia Tools and Applications, pp. 1-15, 2022.
[22]El-Shafai W, Khallaf F, El-Rabaie ESM, El-Samie FEA, “Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, pp. 9007-9035, 2021.
[23]Banu S A, Amirtharajan R, “A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach,” Medical and biological engineering and computing, vol. 58, pp. 1445-1458, 2020.
[24]Guesmi R, Farah M B, “A new efficient medical image cipher based on hybrid chaotic map and DNA code,” Multimedia tools and applications, vol. 80, pp. 1925-1944, 2021.
[25]COVID-19 Radiography Database [Available online: https://bimcv.cipf.es/bimcvprojects/bimcv-covid19/1590858128006-9e640421-6711] [Accessed 5 April 2023].
[26]Tomar N (2022) Brain Tumor Segmentation dataset. Available: https://www.kaggle.com/datasets/nikhilroxtomar/brain-tumor-segmentation. [Accessed 1 April 2023].
[27]Malaria Dataset [Available online: https://lhncbc.nlm.nih.gov/LHCpublications/pubs/MalariaDatasets.html] [Accessed 5 April 2023].
[28]Mansouri A, Wang X, “A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme,” Information Sciences, vol. 520, pp. 46–62, 2020.
[29]Hua Z, Zhou Y, “Design of image cipher using block-based scrambling and image filtering,” Information sciences, vol. 396, pp. 97-113 2017.
[30]Mishra P, Bhaya C, Pal A K, Singh A K, “A medical image cryptosystem using bit-level diffusion with DNA coding,” Journal of Ambient Intelligence and Humanized Computing, pp. 1-22, 2021.
[31]Dagadu J C, Li J P, Aboagye E O, “Medical image encryption based on hybrid chaotic DNA diffusion,” Wireless Personal Communications, vol. 108, no. 1, pp. 591–612, 2019.
[32]Dridi M, Hajjaji M A, Bouallegue B, Mtibaa A, “Cryptography of medical images based on a combination between chaotic and neural network,” IET Image Processing, vol. 10, no. 11, pp. 830–839, 2016.
[33]Guan M, Yang X, Hu W, “Chaotic image encryption algorithm using frequency‐domain DNA encoding,” IET Image Processing, vol. 13, no. 9, pp. 1535–1539, 2019.
[34]Kayalvizhi S, Malarvizhi S, “A novel encrypted compressive sensing of images based on fractional order hyper chaotic Chen system and DNA operations,” Multimedia Tools and Applications, vol. 79, no. 5-6, pp. 3957–3974, 2019.