Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

-Score-Based Secure Biomedical Model for Effective Skin Lesion Segmentation Over eHealth Cloud

Published: 14 June 2021 Publication History

Abstract

This study aims to process the private medical data over eHealth cloud platform. The current pandemic situation, caused by Covid19 has made us to realize the importance of automatic remotely operated independent services, such as cloud. However, the cloud servers are developed and maintained by third parties, and may access user’s data for certain benefits. Considering these problems, we propose a specialized method such that the patient’s rights and changes in medical treatment can be preserved. The problem arising due to Melanoma skin cancer is carefully considered and a privacy-preserving cloud-based approach is proposed to achieve effective skin lesion segmentation. The work is accomplished by the development of a Z-score-based local color correction method to differentiate image pixels from ambiguity, resulting the segmentation quality to be highly improved. On the other hand, the privacy is assured by partially order homomorphic Permutation Ordered Binary (POB) number system and image permutation. Experiments are performed over publicly available images from the ISIC 2016 and 2017 challenges, as well as PH dataset, where the proposed approach is found to achieve significant results over the encrypted images (known as encrypted domain), as compared to the existing schemes in the plain domain (unencrypted images). We also compare the results with the winners of the ISBI 2016 and 2017 challenges, and show that the proposed approach achieves a very close result with them, even after processing test images in the encrypted domain. Security of the proposed approach is analyzed using a challenge-response game model.

References

[1]
Rahena Akhter, Rownak Jahan Chowdhury, Keita Emura, Tamzida Islam, Mohammad Shahriar Rahman, and Nusrat Rubaiyat. 2013. Privacy-preserving two-party k-means clustering in malicious model. In Proceedings of the IEEE 37th Annual Computer Software and Applications Conference Workshops. 121–126.
[2]
Siguang Chen, Xi Zhu, Haijun Zhang, Chuanxin Zhao, Geng Yang, and Kun Wang. 2020. Efficient privacy preserving data collection and computation offloading for fog-assisted IoT. IEEE Transactions on Sustainable Computing (2020).
[3]
Yi Chen, Shuai Ding, Zheng Xu, Handong Zheng, and Shanlin Yang. 2019. Blockchain-based medical records secure storage and medical service framework. Journal of Medical Systems 43, 1 (2019), 5.
[4]
Can Eyupoglu, Muhammed Aydin, Abdul Zaim, and Ahmet Sertbas. 2018. An efficient big data anonymization algorithm based on chaos and perturbation techniques. Entropy 20, 5 (2018), 373.
[5]
Haidi Fan, Fengying Xie, Yang Li, Zhiguo Jiang, and Jie Liu. 2017. Automatic segmentation of dermoscopy images using saliency combined with Otsu threshold. Computers in Biology and Medicine 85 (2017), 75–85.
[6]
Zakaria Gheid and Yacine Challal. 2016. Efficient and privacy-preserving k-means clustering for big data mining. In Proceedings of the IEEE Trustcom/BigDataSE/ISPA. 791–798.
[7]
David Gutman, Celebi Emre Codella, Noel C. F. Marchetti, Michael Helba Brian, and Allan Halpern Mishra Nabin. 2016. Skin lesion analysis toward melanoma detection: A challenge at the International Symposium on Biomedical Imaging (ISBI) 2016, hosted by the International Skin Imaging Collaboration (ISIC). In [Online]. Available: https://arxiv.org/abs/1605.01397.
[8]
Haiping Huang, Tianhe Gong, Ning Ye, Ruchuan Wang, and Yi Dou. 2017. Private and secured medical data transmission and analysis for wireless sensing healthcare system. IEEE Transactions on Industrial Informatics 13, 3 (2017), 1227–1237.
[9]
Mostafa Jahanifar, Neda Zamani Tajeddin, Babak Mohammadzadeh Asl, and Ali Gooya. 2019. Supervised saliency map driven segmentation of lesions in dermoscopic images. IEEE Journal of Biomedical and Health Informatics 23, 2 (2019), 509–518.
[10]
Hao Jin, Yan Luo, Peilong Li, and Jomol Mathew. 2019. A review of secure and privacy-preserving medical data sharing. IEEE Access 7 (2019), 61656–61669.
[11]
Xin Jin, Hongyu Zhang, Xiaodong Li, Haoyang Yu, Beisheng Liu, Shujiang Xie, Amit Kumar Singh, and Yujie Li. 2020. Confused modulo projection based somewhat homomorphic encryption-cryptosystem, library and applications on secure smart cities. IEEE Internet of Things Journal (2020).
[12]
Pratik Kalshetti, Manas Bundele, Parag Rahangdale, Dinesh Jangra, Chiranjoy Chattopadhyay, Gaurav Harit, and Abhay Elhence. 2017. An interactive medical image segmentation framework using iterative refinement. Computers in Biology and Medicine 83 (2017), 22–33.
[13]
R. Karakış, İ. Güler, İ. Çapraz, and E. Bilir. 2015. A novel fuzzy logic-based image steganography method to ensure medical data security. Computers in Biology and Medicine 67 (2015), 172–183.
[14]
Santosh Kumar, Sanjay Kumar Singh, Amit Kumar Singh, Shrikant Tiwari, and Ravi Shankar Singh. 2018. Privacy preserving security using biometrics in cloud computing. Multimedia Tools and Applications 77, 9 (2018), 11017–11039.
[15]
Ankita Lathey and Pradeep K. Atrey. 2015. Image enhancement in encrypted domain over cloud. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 11, 3 (2015), 38.
[16]
David Megías and Amna Qureshi. 2017. Collusion-resistant and privacy-preserving P2P multimedia distribution based on recombined fingerprinting. Expert Systems with Applications 71 (2017), 147–172.
[17]
Teresa Mendonça, Pedro M. Ferreira, Jorge S. Marques, André R. S. Marcal, and Jorge Rozeira. 2013. PH 2-A dermoscopic image database for research and benchmarking. In Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). 5437–5440.
[18]
Manoranjan Mohanty, Muhammad Rizwan Asghar, and Giovanni Russello. 2016. : Image scaling and cropping in encrypted domains. IEEE Transactions on Information Forensics and Security 11, 11 (2016), 2542–2555.
[19]
Nathan Moroney. 2000. Local color correction using non-linear masking. In Proceedings of the Color and Imaging Conference. Society for Imaging Science and Technology, 108–111.
[20]
Amitava Nag, Jyoti Prakash Singh, and Amit Kumar Singh. 2019. An efficient Boolean based multi-secret image sharing scheme. Multimedia Tools and Applications (2019), 1–25.
[21]
J. Jesu Vedha Nayahi and V. Kavitha. 2017. Privacy and utility preserving data clustering for data anonymization and distribution on Hadoop. Future Generation Computer Systems 74 (2017), 393–408.
[22]
Lina Ni, Chao Li, Xiao Wang, Honglu Jiang, and Jiguo Yu. 2018. DP-MCDBSCAN: Differential privacy preserving multi-core DBSCAN clustering for network user data. IEEE Access 6 (2018), 21053–21063.
[23]
Şaban Öztürk and Umut Özkaya. 2020. Skin lesion segmentation with improved convolutional neural network. Journal of Digital Imaging (2020).
[24]
Pascal Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 223–238.
[25]
Hongping Pang and Baocang Wang. 2020. Privacy-preserving association rule mining using homomorphic encryption in a multikey environment. IEEE Systems Journal (2020).
[26]
Sankita Patel, Sweta Garasia, and Devesh Jinwala. 2012. An efficient approach for privacy preserving distributed K-means clustering based on shamir’s secret sharing scheme. In Proceedings of the IFIP International Conference on Trust Management. Springer, 129–141.
[27]
A. J. Paverd, Andrew Martin, and Ian Brown. 2014. Modelling and automatically analysing privacy properties for honest-but-curious adversaries. University of Oxford, Tech. Rep (2014).
[28]
Nikolaos Polatidis, Christos K. Georgiadis, Elias Pimenidis, and Haralambos Mouratidis. 2017. Privacy-preserving collaborative recommendations based on random perturbations. Expert Systems with Applications 71 (2017), 18–25.
[29]
Amitesh Singh Rajput and Balasubramanian Raman. 2018. Cloud based image color transfer and storage in encrypted domain. Multimedia Tools and Applications 77, 16 (2018), 21509–21537.
[30]
Aqeel Sahi, David Lai, and Yan Li. 2016. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan. Computers in Biology and Medicine 78 (2016), 1–8.
[31]
Adi Shamir. 1979. How to share a secret. Commun. ACM 22, 11 (1979), 612–613.
[32]
Amit Kumar Singh. 2017. Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimedia Tools and Applications 76, 6 (2017), 8881–8900.
[33]
Priyanka Singh, Balasubramanian Raman, and Nishant Agarwal. 2018. Toward encrypted video tampering detection and localization based on POB number system over cloud. IEEE Transactions on Circuits and Systems for Video Technology 28(9), 9 (2018), 2116–2130.
[34]
A. Sreekumar and S. B. Sundar. 2009. An efficient secret sharing scheme for n out of n scheme using pob-number system. In Proc. Hack. 33.
[35]
N. Z. Tajeddin and B. M. Asl. 2016. A general algorithm for automatic lesion segmentation in dermoscopy images. In Proceedings of the 23rd Iranian Conference on Biomedical Engineering. 134–139.
[36]
Philipp Tschandl, Christoph Sinz, and Harald Kittler. 2019. Domain-specific classification-pretrained fully convolutional network encoders for skin lesion segmentation. Computers in Biology and Medicine 104 (2019), 111–116.
[37]
Kai Xing, Chunqiang Hu, Jiguo Yu, Xiuzhen Cheng, and Fengjuan Zhang. 2017. Mutual privacy preserving -means clustering in social participatory sensing. IEEE Transactions on Industrial Informatics 13, 4 (2017), 2066–2076.
[38]
Ji-Jiang Yang, Jian-Qiang Li, and Yu Niu. 2015. A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Generation Computer Systems 43 (2015), 74–86.
[39]
L. Yu, H. Chen, Q. Dou, J. Qin, and P. Heng. 2017. Automated melanoma recognition in dermoscopy images via very deep residual networks. IEEE Transactions on Medical Imaging 36, 4 (2017), 994–1004.
[40]
Y. Yuan, M. Chao, and Y. Lo. 2017. Automatic skin lesion segmentation using deep fully convolutional networks with Jaccard distance. IEEE Transactions on Medical Imaging 36, 9 (2017), 1876–1886.
[41]
Yading Yuan and Yeh-Chi Lo. 2017. Improving dermoscopic image segmentation with enhanced convolutional-deconvolutional networks. IEEE Journal of Biomedical and Health Informatics (2017).
[42]
Jiale Zhang, Yanchao Zhao, Jie Wu, and Bing Chen. 2020. LVPDA: A lightweight and verifiable privacy-preserving data aggregation scheme for edge-enabled IoT. IEEE Internet of Things Journal 7, 5 (2020), 4016–4027.
[43]
Qingchen Zhang, Laurence T. Yang, Zhikui Chen, and Peng Li. 2017. PPHOPCM: Privacy-preserving high-order possibilistic c-means algorithm for big data clustering with cloud computing. IEEE Transactions on Big Data, doi=10.1109/TBDATA.2017.2701816 (2017).
[44]
Xuyun Zhang, Laurence T. Yang, Chang Liu, and Jinjun Chen. 2014. A scalable two-phase top-down specialization approach for data anonymization using mapreduce on cloud. IEEE Transactions on Parallel and Distributed Systems 25, 2 (2014), 363–373.
[45]
Zhili Zhou, Yunlong Wang, Q. M. Jonathan Wu, Ching-Nung Yang, and Xingming Sun. 2016. Effective and efficient global context verification for image copy detection. IEEE Transactions on Information Forensics and Security 12, 1 (2016), 48–63.

Cited By

View all
  • (2024)Qualitative Analysis of Homomorphic Encryption in Medical Field2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS)10.1109/ICITEICS61368.2024.10625392(1-6)Online publication date: 28-Jun-2024
  • (2023)Skin Lesion Analysis and Cancer Detection Based on Machine/Deep Learning Techniques: A Comprehensive SurveyLife10.3390/life1301014613:1(146)Online publication date: 4-Jan-2023
  • (2023)Context Prior Guided Semantic Modeling for Biomedical Image SegmentationACM Transactions on Multimedia Computing, Communications, and Applications10.1145/355852019:2s(1-19)Online publication date: 15-Mar-2023
  • Show More Cited By

Index Terms

  1. -Score-Based Secure Biomedical Model for Effective Skin Lesion Segmentation Over eHealth Cloud

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Multimedia Computing, Communications, and Applications
    ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 17, Issue 2s
    June 2021
    349 pages
    ISSN:1551-6857
    EISSN:1551-6865
    DOI:10.1145/3465440
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 June 2021
    Accepted: 01 October 2020
    Revised: 01 October 2020
    Received: 01 June 2020
    Published in TOMM Volume 17, Issue 2s

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Privacy-preservation
    2. image segmentation
    3. eHealth cloud application
    4. multimedia security

    Qualifiers

    • Research-article
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)21
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 10 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Qualitative Analysis of Homomorphic Encryption in Medical Field2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS)10.1109/ICITEICS61368.2024.10625392(1-6)Online publication date: 28-Jun-2024
    • (2023)Skin Lesion Analysis and Cancer Detection Based on Machine/Deep Learning Techniques: A Comprehensive SurveyLife10.3390/life1301014613:1(146)Online publication date: 4-Jan-2023
    • (2023)Context Prior Guided Semantic Modeling for Biomedical Image SegmentationACM Transactions on Multimedia Computing, Communications, and Applications10.1145/355852019:2s(1-19)Online publication date: 15-Mar-2023
    • (2023)Deep Learning and Optimization-Based Methods for Skin Lesions Segmentation: A ReviewIEEE Access10.1109/ACCESS.2023.330396111(85467-85488)Online publication date: 2023
    • (2023)Solving multi-objective optimization problem of convolutional neural network using fast forward quantum optimization algorithmAdvances in Engineering Software10.1016/j.advengsoft.2022.103370176:COnline publication date: 1-Feb-2023
    • (2022)Preprocessing Effects on Performance of Skin Lesion Saliency SegmentationDiagnostics10.3390/diagnostics1202034412:2(344)Online publication date: 29-Jan-2022

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media