DeepEnc: deep learning-based CT image encryption approach

被引:8
作者
Abdellatef, Essam [1 ]
Naeem, Ensherah A. [2 ]
Abd El-Samie, Fathi E. [3 ]
机构
[1] Delta Higher Inst Engn & Technol DHIET, Dept Elect & Commun, Mansoura 35511, Egypt
[2] Suez Univ, Fac Technol & Educ, Elect Dept, Suez 43527, Egypt
[3] Menoufia Univ, Elect & Elect Comm Dept, Fac Elect Engn, Shibin Al Kawm, Egypt
关键词
Image encryption; Deep learning; Feature extraction; SCHEME; EFFICIENT; SECURITY; SYSTEM;
D O I
10.1007/s11042-023-15818-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of artificial intelligence gave motivations to researchers to apply it in information security, biometrics, and medical image encryption. This paper presents an encryption approach for CT images that are used in diagnosing COVID-19 disease. To add more privacy, the proposed encryption mechanism links the CT image and the facial image of a person. Firstly, a simple Convolutional Neural Network (CNN) is utilized to extract features from facial images. The architecture of the CNN model includes three convolutional groups, and each group consists of a convolutional layer, a batch normalization layer, a Rectified Linear Unit (ReLU), and a maximum pooling layer. Moreover, the extracted feature vector is utilized to adjust the initial states of a two-dimensional Sine Logistic Modulation Map (2D-SLMM), so as to generate chaotic matrices SLM1 and SLM2, and to adjust the initial states of a Tent Logistic Map (TLM) in order to get two other chaotic matrices, TLM1 and TLM2. Finally, the Chaotic Magic Transform (CMT) confusion operation and the bitwise XOR diffusion operation are used to randomly scramble the pixel locations and change the pixel values, respectively. Only after two rounds of CMT and two bitwise XOR operations with chaotic matrices SLM1, SLM2, TLM1 and TLM2, we get an unrecognizable encrypted CT image with a high security level. In adittion, we study and analyze the performance of the proposed approach in the presence of differential, entropy and key sensitivity attacks. In the experiments, when performing decryption, two cases are discussed; utilization of the correct key and utilization of the correct key with small variation. The robustness of the proposed encryption approach is measured using different metrics like Correlation Coefficient (CC), entropy, histogram analysis, and elapsed time. The maximum elapsed time is about 0.4361 seconds.
引用
收藏
页码:11147 / 11167
页数:21
相关论文
共 39 条
[1]   Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach [J].
Aminanto, Muhamad Erza ;
Kim, Kwangjo .
INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 :136-147
[2]  
[Anonymous], 2011, INT J PHYS SCI
[3]   An image encryption method based on chaos system and AES algorithm [J].
Arab, Alireza ;
Rostami, Mohammad Javad ;
Ghavami, Behnam .
JOURNAL OF SUPERCOMPUTING, 2019, 75 (10) :6663-6682
[4]   A novel image encryption scheme based on substitution-permutation network and chaos [J].
Belazi, Akram ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
SIGNAL PROCESSING, 2016, 128 :155-170
[5]  
Bhilare S, 2018, MACH VISION APPL, P1
[6]   A Framework for Information Security Governance and Management [J].
Carcary, Marian ;
Renaud, Karen ;
McLaughlin, Stephen ;
O'Brien, Conor .
IT PROFESSIONAL, 2016, 18 (02) :22-30
[7]   Information security technology based on DNA computing [J].
Cui, Guangzhao ;
Qin, Limin ;
Wang, Yanfeng ;
Zhang, Xuncai .
2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, :288-+
[8]  
De Cannière C, 2006, LECT NOTES COMPUT SC, V4176, P171
[9]  
Ding Y., 2021, IEEE T NEURAL NETW L
[10]  
Ding Yucheng, 2020, ARXIV