Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Deep learning-based biometric image feature extraction for securing medical images through data hiding and joint encryption–compression

Published: 04 March 2024 Publication History

Abstract

Images are promising information carriers when compared to other media documents in the healthcare domain. However, digital data transmission over unprotected wired or wireless networks poses a threat to the security of healthcare systems. As a result, the issue of copyright violation and identity theft can occur due to the unauthorised use of these data. This paper proposes a new secure method under a framework that embeds biometric fingerprint image features in a medical image without any perceptual distortion. This paper uses ResNet152 for biometric image feature extraction in the first stage and features to generate a secret key for embedding in the second stage. The method combines encryption and compression scheme based on a generated key, novel chaotic map and Huffman coding to enhance the security of medical images while reducing the storage consumption or bandwidth requirements if images are transmitted to remote servers. Experimental results show that the proposed method presents superior security with high imperceptibility and compression performance, ensuring its effectiveness as an image protection mechanism for medical applications. Extensive experimental results show that the proposed method achieves an average peak signal-to-noise ratio (PSNR) that is above 54 dB, a structural similarity index measure (SSIM) close to 1, a bit error rate (BER) of 0 and a normalised correlation (NC) of 1. Moreover, this method compresses the images up to 70% when tested on three standard datasets.

Highlights

A biometric image feature based secure data hiding technique is proposed.
Joint encryption-compression methods are used to enhance security of medical images.
This method is highly imperceptible, secure and successfully resists various attacks.

Graphical abstract

Display Omitted

References

[1]
Fan C., Hu K., Yuan Y., Li Y., A data-driven analysis of global research trends in medical image: A survey, Neurocomputing (2022).
[2]
Mahyudin M.F., Novamizanti L., Sa’idah S., Robust watermarking using arnold and hybrid transform in medical images, in: 2021 IEEE international conference on industry 4.0, artificial intelligence, and communications technology (IAICT), IEEE, 2021, pp. 180–185.
[3]
Anand A., Singh A.K., Watermarking techniques for medical data authentication: a survey, Multimedia Tools Appl 80 (2021) 30165–30197.
[4]
Magdy M., Hosny K.M., Ghali N.I., Ghoniemy S., Security of medical images for telemedicine: a systematic review, Multimedia Tools Appl 81 (18) (2022) 25101–25145.
[5]
Singh A.K., Anand A., Lv Z., Ko H., Mohan A., A survey on healthcare data: a security perspective, ACM Trans Multimedia Comput Commun Appl 17 (2s) (2021) 1–26.
[6]
14 gripping medical ID theft statistics to ponder on in 2023 [Online]. https://safeatlast.co/blog/medical-id-theft-statistics/#gref.
[7]
Xin J., Hu H., Zheng J., 3D variable-structure chaotic system and its application in color image encryption with new Rubik’s cube-like permutation, Nonlinear Dynam (2023) 1–24.
[8]
Chen R., Li X., Teng L., Wang X., An image encryption algorithm based on the LSCMM chaotic map and bidirectional dynamic diffusion, Multimedia Tools Appl (2023) 1–26.
[9]
Alexan W., Gabr M., Mamdouh E., Elias R., Aboshousha A., Color image cryptosystem based on Sine chaotic map, 4D chen hyperchaotic map of fractional-order and hybrid DNA coding, IEEE Access (2023).
[10]
Joshi A.B., Kumar D., Kumar S., Singh S., A novel method of digital image encryption using graph theory, Multimedia Tools Appl (2023) 1–26.
[11]
Wang X., Xu X., Sun K., Jiang Z., Li M., Wen J., A color image encryption and hiding algorithm based on hyperchaotic system and discrete cosine transform, Nonlinear Dynam (2023) 1–24.
[12]
Wang X., Liu C., Jiang D., An efficient double-image encryption and hiding algorithm using a newly designed chaotic system and parallel compressive sensing, Inform Sci 610 (2022) 300–325.
[13]
Wang C., Zhang T., Chen H., Huang Q., Ni J., Zhang X., A novel encryption-then-lossy-compression scheme of color images using customized residual dense spatial network, IEEE Trans Multimed (2022).
[14]
Singh M., Baranwal N., Singh K.N., Singh A.K., Using GAN-based encryption to secure digital images with reconstruction through customized super resolution network, IEEE Trans Consum Electron (2023).
[15]
Singh K.N., Singh O.P., Singh A.K., Ecis: encryption prior to compression for digital image security with reduced memory, Comput Commun 193 (2022) 410–417.
[16]
Luo Y., Liang Y., Zhang S., Liu J., Wang F., An image encryption scheme based on block compressed sensing and Chen’s system, Nonlinear Dynam 111 (7) (2023) 6791–6811.
[17]
Wang M., Wang X., Wang C., Xia Z., Zhou S., Novel image compression-then-encryption scheme based on 2D cross coupled map lattice and compressive sensing, Multimedia Tools Appl (2023) 1–27.
[18]
Chai X., Tian Y., Gan Z., Lu Y., Wu X.-J., Long G., A robust compressed sensing image encryption algorithm based on GAN and CNN, J Modern Opt 69 (2) (2022) 103–120.
[19]
Rida I., Al-Maadeed N., Al-Maadeed S., Bakshi S., A comprehensive overview of feature representation for biometric recognition, Multimedia Tools Appl 79 (2020) 4867–4890.
[20]
Iqbal F., Abbasi A., Javed A.R., Almadhor A., Jalil Z., Anwar S., Rida I., Data augmentation-based novel deep learning method for deepfaked images detection, ACM Trans Multimedia Comput Commun Appl (2023).
[21]
Parashar A., Shekhawat R.S., Ding W., Rida I., Intra-class variations with deep learning-based gait analysis: A comprehensive survey of covariates and methods, Neurocomputing (2022).
[22]
Singh K.N., Singh A.K., Towards integrating image encryption with compression: a survey, ACM Trans Multimedia Comput Commun Appl (TOMM) 18 (3) (2022) 1–21.
[23]
He K, Zhang X, Ren S, Sun J. Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition. 2016, p. 770–8.
[24]
Yang Y., He H., Chen F., Yuan Y., Mao N., Reversible data hiding in encrypted images based on time-varying huffman coding table, IEEE Trans Multimed (2023).
[25]
Shehu Y.I., Ruiz-Garcia A., Palade V., James A., Sokoto coventry fingerprint dataset, 2018, arXiv preprint arXiv:1807.10609.
[26]
Antonelli M., Reinke A., Bakas S., Farahani K., Kopp-Schneider A., Landman B.A., Litjens G., Menze B., Ronneberger O., Summers R.M., et al., The medical segmentation decathlon, Nat Commun 13 (1) (2022) 4128.
[27]
[28]
Sea-animals dataset [online], 2023, https://www.kaggle.com/datasets/vencerlanz09/sea-animals-image-dataste. Accessed: 2023-04-30.
[29]
Toughi S., Fathi M.H., Sekhavat Y.A., An image encryption scheme based on elliptic curve pseudo random and advanced encryption system, Signal Process 141 (2017) 217–227.
[30]
Briggs K., An improved method for estimating liapunov exponents of chaotic time series, Phys Lett A 151 (1–2) (1990) 27–32.
[31]
Bhowmik S., Acharyya S., Image encryption approach using improved chaotic system incorporated with differential evolution and genetic algorithm, J Inf Secur Appl 72 (2023).
[32]
Anushiadevi R., Amirtharajan R., Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram, J Inf Secur Appl 72 (2023).
[33]
Ahmad I., Shin S., A novel hybrid image encryption–compression scheme by combining chaos theory and number theory, Signal Process, Image Commun 98 (2021).
[34]
Gan Z., Bi J., Ding W., Chai X., Exploiting 2D compressed sensing and information entropy for secure color image compression and encryption, Neural Comput Appl 33 (2021) 12845–12867.
[35]
Setyaningsih E., Wardoyo R., Sari A.K., Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution, Digit Commun Netw 6 (4) (2020) 486–503.

Index Terms

  1. Deep learning-based biometric image feature extraction for securing medical images through data hiding and joint encryption–compression
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image Journal of Information Security and Applications
          Journal of Information Security and Applications  Volume 79, Issue C
          Dec 2023
          263 pages

          Publisher

          Elsevier Science Inc.

          United States

          Publication History

          Published: 04 March 2024

          Author Tags

          1. Biometric images
          2. Encryption
          3. Data hiding
          4. Feature extraction
          5. Compression
          6. Security
          7. Attacks

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • 0
            Total Citations
          • 0
            Total Downloads
          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 12 Nov 2024

          Other Metrics

          Citations

          View Options

          View options

          Get Access

          Login options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media