{"title":"Deep-KEDI: Deep learning-based zigzag generative adversarial network for encryption and decryption of medical images.","authors":"K Selvakumar, S Lokesh","doi":"10.3233/THC-231927","DOIUrl":null,"url":null,"abstract":"<p><strong>Background: </strong>Medical imaging techniques have improved to the point where security has become a basic requirement for all applications to ensure data security and data transmission over the internet. However, clinical images hold personal and sensitive data related to the patients and their disclosure has a negative impact on their right to privacy as well as legal ramifications for hospitals.</p><p><strong>Objective: </strong>In this research, a novel deep learning-based key generation network (Deep-KEDI) is designed to produce the secure key used for decrypting and encrypting medical images.</p><p><strong>Methods: </strong>Initially, medical images are pre-processed by adding the speckle noise using discrete ripplet transform before encryption and are removed after decryption for more security. In the Deep-KEDI model, the zigzag generative adversarial network (ZZ-GAN) is used as the learning network to generate the secret key.</p><p><strong>Results: </strong>The proposed ZZ-GAN is used for secure encryption by generating three different zigzag patterns (vertical, horizontal, diagonal) of encrypted images with its key. The zigzag cipher uses an XOR operation in both encryption and decryption using the proposed ZZ-GAN. Encrypting the original image requires a secret key generated during encryption. After identification, the encrypted image is decrypted using the generated key to reverse the encryption process. Finally, speckle noise is removed from the encrypted image in order to reconstruct the original image.</p><p><strong>Conclusion: </strong>According to the experiments, the Deep-KEDI model generates secret keys with an information entropy of 7.45 that is particularly suitable for securing medical images.</p>","PeriodicalId":48978,"journal":{"name":"Technology and Health Care","volume":" ","pages":"3231-3251"},"PeriodicalIF":1.4000,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Technology and Health Care","FirstCategoryId":"5","ListUrlMain":"https://doi.org/10.3233/THC-231927","RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, BIOMEDICAL","Score":null,"Total":0}
引用次数: 0
Abstract
Background: Medical imaging techniques have improved to the point where security has become a basic requirement for all applications to ensure data security and data transmission over the internet. However, clinical images hold personal and sensitive data related to the patients and their disclosure has a negative impact on their right to privacy as well as legal ramifications for hospitals.
Objective: In this research, a novel deep learning-based key generation network (Deep-KEDI) is designed to produce the secure key used for decrypting and encrypting medical images.
Methods: Initially, medical images are pre-processed by adding the speckle noise using discrete ripplet transform before encryption and are removed after decryption for more security. In the Deep-KEDI model, the zigzag generative adversarial network (ZZ-GAN) is used as the learning network to generate the secret key.
Results: The proposed ZZ-GAN is used for secure encryption by generating three different zigzag patterns (vertical, horizontal, diagonal) of encrypted images with its key. The zigzag cipher uses an XOR operation in both encryption and decryption using the proposed ZZ-GAN. Encrypting the original image requires a secret key generated during encryption. After identification, the encrypted image is decrypted using the generated key to reverse the encryption process. Finally, speckle noise is removed from the encrypted image in order to reconstruct the original image.
Conclusion: According to the experiments, the Deep-KEDI model generates secret keys with an information entropy of 7.45 that is particularly suitable for securing medical images.
期刊介绍:
Technology and Health Care is intended to serve as a forum for the presentation of original articles and technical notes, observing rigorous scientific standards. Furthermore, upon invitation, reviews, tutorials, discussion papers and minisymposia are featured. The main focus of THC is related to the overlapping areas of engineering and medicine. The following types of contributions are considered:
1.Original articles: New concepts, procedures and devices associated with the use of technology in medical research and clinical practice are presented to a readership with a widespread background in engineering and/or medicine. In particular, the clinical benefit deriving from the application of engineering methods and devices in clinical medicine should be demonstrated. Typically, full length original contributions have a length of 4000 words, thereby taking duly into account figures and tables.
2.Technical Notes and Short Communications: Technical Notes relate to novel technical developments with relevance for clinical medicine. In Short Communications, clinical applications are shortly described. 3.Both Technical Notes and Short Communications typically have a length of 1500 words.
Reviews and Tutorials (upon invitation only): Tutorial and educational articles for persons with a primarily medical background on principles of engineering with particular significance for biomedical applications and vice versa are presented. The Editorial Board is responsible for the selection of topics.
4.Minisymposia (upon invitation only): Under the leadership of a Special Editor, controversial or important issues relating to health care are highlighted and discussed by various authors.
5.Letters to the Editors: Discussions or short statements (not indexed).