ASB-CS: Adaptive sparse basis compressive sensing model and its application to medical image encryption

被引:31
作者
Jiang, Donghua [1 ]
Tsafack, Nestor [2 ]
Boulila, Wadii [3 ,6 ]
Ahmad, Jawad [4 ]
Barba-Franco, J. J. [5 ]
机构
[1] Changan Univ, Sch Informat Engn, Xian 710064, Peoples R China
[2] Univ Douala, Elect Engn Dept & Ind Comp ISTAMA, Res Unit Lab Energy & Artificial Intelligence, POB 3223, Douala, Cameroon
[3] Prince Sultan Univ, Robot & Internet of Things Lab, Riyadh 12435, Saudi Arabia
[4] Sch Comp Engn & Built Environm, Ediburgh EH10 5DT, Scotland
[5] Univ Guadalajara, Ctr Univ Lagos, Dept Ciencias Exactas & Tecnol, Lagos De Moreno 47460, Jalisco, Mexico
[6] Univ Manouba, Natl Sch Comp Sci, RIADI Lab, Manouba, Tunisia
关键词
Compressive sensing; Adaptive sparse representation; Singular value decomposition; Chaotic neural network; Image encryption; SINGULAR-VALUE DECOMPOSITION; PERMUTATION; EFFICIENT;
D O I
10.1016/j.eswa.2023.121378
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recent advances in intelligent wearable devices have brought tremendous chances for the development of healthcare monitoring system. However, the data collected by various sensors in it are user-privacy-related information. Once the individuals' privacy is subjected to attacks, it can potentially cause serious hazards. For this reason, a feasible solution built upon the compression-encryption architecture is proposed. In this scheme, we design an Adaptive Sparse Basis Compressive Sensing (ASB-CS) model by leveraging Singular Value Decomposition (SVD) manipulation, while performing a rigorous proof of its effectiveness. Additionally, incorporating the Parametric Deformed Exponential Rectified Linear Unit (PDE-ReLU) memristor, a new fractional-order Hopfield neural network model is introduced as a pseudo-random number generator for the proposed cryptosystem, which has demonstrated superior properties in many aspects, such as hyperchaotic dynamics and multistability. To be specific, a plain medical image is subjected to the ASB-CS model and bidirectional diffusion manipulation under the guidance of the key-controlled cipher flows to yield the corresponding cipher image without visual semantic features. Ultimately, the simulation results and analysis demonstrate that the proposed scheme is capable of withstanding multiple security attacks and possesses balanced performance in terms of compressibility and robustness.
引用
收藏
页数:14
相关论文
共 41 条
[1]   Investigating the complex behaviour of multi-scroll chaotic system with Caputo fractal-fractional operator [J].
Ahmad, Shabir ;
Ullah, Aman ;
Akgul, Ali .
CHAOS SOLITONS & FRACTALS, 2021, 146
[2]   A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach [J].
Banu, Aashiq S. ;
Amirtharajan, Rengarajan .
MEDICAL & BIOLOGICAL ENGINEERING & COMPUTING, 2020, 58 (07) :1445-1458
[3]   A history of Runge-Kutta methods [J].
Butcher, JC .
APPLIED NUMERICAL MATHEMATICS, 1996, 20 (03) :247-260
[4]   Robust uncertainty principles:: Exact signal reconstruction from highly incomplete frequency information [J].
Candès, EJ ;
Romberg, J ;
Tao, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (02) :489-509
[5]   Decoding by linear programming [J].
Candes, EJ ;
Tao, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (12) :4203-4215
[6]   Exploiting Semi-Tensor Product Compressed Sensing and Hybrid Cloud for Secure Medical Image Transmission [J].
Chai, Xiuli ;
Fu, Jiangyu ;
Gan, Zhihua ;
Lu, Yang ;
Zhang, Yushu ;
Han, Daojun .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (08) :7380-7392
[7]   An improved image encryption algorithm with finite computing precision [J].
Chen, Chen ;
Sun, Kehui ;
He, Shaobo .
SIGNAL PROCESSING, 2020, 168
[8]   Parametric Deformable Exponential Linear Units for deep neural networks [J].
Cheng, Qishang ;
Li, HongLiang ;
Wu, Qingbo ;
Ma, Lei ;
Ngan, King Ngi .
NEURAL NETWORKS, 2020, 125 :281-289
[9]   MEMRISTOR - MISSING CIRCUIT ELEMENT [J].
CHUA, LO .
IEEE TRANSACTIONS ON CIRCUIT THEORY, 1971, CT18 (05) :507-+
[10]   Compressed sensing [J].
Donoho, DL .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (04) :1289-1306