A Novel GAN with DNA Sequences and Hash-based Approach for Improving Medical Image Security

PDF (1143KB), PP.72-86

Views: 0 Downloads: 0

Author(s)

Anita Murmu 1,* Piyush Kumar 1

1. National Institute of Technology Patna, Department of Computer Science and Engineering, Patna, Bihar, India – 800005

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2024.06.06

Received: 29 Mar. 2023 / Revised: 30 Jun. 2023 / Accepted: 10 Aug. 2023 / Published: 8 Dec. 2024

Index Terms

GAN, Chaotic map, Security, Hash-map, Cryptography, Key generation

Abstract

Medical imaging is a field of medicine where doctors use images of different body organs to treat or diagnose patients. Nowadays, medical image segmentation, compression, and security are currently relatively difficult issues for illness diagnosis. These medical pictures are being sent via the internet; thus data must be protected against cyberattacks. Medical images are extremely sensitive to even slight changes, and data volumes are dramatically increasing the amount of the data. To protect the confidentiality of digital images saved online, privacy and security must be ensured.  In this paper, a novel DL-based Generative Adversarial Network (GAN) with tent map and hash-map utilized to generate a robust private key. The fake image is generated by using GAN. T It is suggested to use the 2D-Henon Sine Map (2D-HSM), DNA computing, chaotic maps, and a SHA-512-based strategy are proposed. The SHA-512 algorithm and the 2D-HSM are used to construct the key. The Henon map and the Mersenne Twister are used in a two-level encryption method that is shown (MT). After that, a DNA computing-based XOR operation is performed using the key. A decoding procedure based on DNA rules captures the encoded images. The comprehensive outcome is based on several security measures, such as key space, SSIM, information entropy, PSNR, and histogram analysis. The proposed technique performs better than the existing approaches.

Cite This Paper

Anita Murmu, Piyush Kumar, "A Novel GAN with DNA Sequences and Hash-based Approach for Improving Medical Image Security", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.16, No.6, pp. 72-86, 2024. DOI:10.5815/ijigsp.2024.06.06

Reference

[1]Begum M, Uddin MS, “Digital image watermarking techniques: a review,” Information, vol. 11, no.2, pp. 110, 2020.
[2]Liao X, Yin J, Guo S, Li X, Sangaiah AK, “Medical JPEG image steganography based on preserving inter-block dependencies,” Computers and Electrical Engineering, vol. 67, pp. 320-329, 2018.
[3]Vengadapurvaja AM, Nisha G, Aarthy R, Sasikaladevi N, “An efficient homomorphic medical image encryption algorithm for cloud storage security,” Procedia computer science, vol. 115, pp. 643-650, 2017.
[4]Kumar P, Agrawal A, “GPU-accelerated interactive visualization of 3D volumetric data using CUDA,” World Scientific Journal of Image and Graphics, Vol. 13, pp. 1340003-1340018, 2015.
[5]Kumar P, Parmar A., “Versatile Approaches for Medical Image Compression: A Review,” Procedia Computer Science, vol. 167, pp. 1380–1389, 2020.
[6]Ravichandran D, Banu SA, Murthy BK, Balasubramanian V, Fathima S, Amirtharajan R, “An efficient medical image encryption using hybrid DNA computing and chaos in transform domain,” Medical and Biological Engineering and Computing, vol. 59, no. 3, pp. 589-605, 2021.
[7]Wu Y, Zhang L, Berretti S, Wan S, “Medical image encryption by content-aware DNA computing for secure healthcare,” IEEE Transactions on Industrial Informatics, pp. 1-9, 2022.
[8]Ding Y, Tan F, Qin Z, Cao M, Choo KKR, Qin Z, “DeepKeyGen: a deep learning-based stream cipher generator for medical image encryption and decryption,” IEEE Transactions on Neural Networks and Learning Systems, vol. 33, no. 9, pp. 4915-4929, 2021.
[9]Tripathi SK, Gupta B, Pandian KK, “Hybrid image sharing scheme using non-recursive hash key based stream cipher,” Multimedia Tools and Applications, vol. 78, no. 8, pp. 10837-10863, 2019.
[10]Wu J, Liao X, Yang B, “Image encryption using 2d Hénon-sine map and DNA approach,” Signal Processing, vol. 153, pp. 11–23, 2018.
[11]Akkasaligar PT, Biradar S, “Selective medical image encryption using DNA cryptography,” Information Security Journal: A Global Perspective, vol. 29, no. 2, pp. 91–101, 2020.
[12]Hosny KM, Kamal ST, Darwish MM, “A color image encryption technique using block scrambling and Chaos,” Multimedia Tools and Applications, vol. 81, no. 1, pp. 505–525, 2021.
[13]Kumar CM, Vidhya R, Brindha M, “An efficient chaos based image encryption algorithm using enhanced Thorp Shuffle and chaotic convolution function,” Applied Intelligence, vol. 52, no. 3, pp. 2556–2585, 2021.
[14]Jeevitha S, Amutha Prabha N, “Novel medical image encryption using DWT block-based scrambling and edge maps”, Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 3, pp. 3373–3388, 2020.
[15]Ismail R, Fattah A, Saqr HM, Nasr ME, “An efficient medical image encryption scheme for (WBAN) based on adaptive DNA and modern multi chaotic map,” Multimedia Tools and Applications, pp. 1-15, 2022.
[16]El-Shafai W, Khallaf F, El-Rabaie ESM, El-Samie FEA, “Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, pp. 9007-9035, 2021.
[17]Banu SA, Amirtharajan R, “A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach,” Medical and biological engineering and computing, vol. 58, pp. 1445-1458, 2020.
[18]Guesmi R, Farah MB, “A new efficient medical image cipher based on hybrid chaotic map and DNA code,” Multimedia tools and applications, vol. 80, pp. 1925-1944, 2021
[19]Zheng Y, Sui X, Jiang Y, Che T, Zhang S, Yang J, Li H, “SymReg-GAN: symmetric image registration with generative adversarial networks,” IEEE transactions on pattern analysis and machine intelligence, vol. 44, no. 9, pp. 5631-5646, 2021.
[20]Chowdhuri P, Pal P, Si T, “A novel steganographic technique for medical image using SVM and IWT,” Multimedia Tools and Applications, pp. 1-20, 2023.
[21]Yan X, Cui B, Xu Y, Shi P, Wang Z, “A method of information protection for collaborative deep learning under GAN model attack,” IEEE/ACM Transactions on Computational Biology and Bioinformatics, vol. 18, no. 3, pp. 871-881, 2019.
[22]Xiaolin wu, Zhu B, Hu Y, Ran Y, “A novel colour image encryption scheme using rectangular transform-enhanced chaotic tent maps,” IEEE Access, pp. 1–1, 2017.
[23]Ding Y, Wu G, Chen D, Zhang N, Gong L, Cao M, Qin Z, “DeepEDN: A deep-learning-based image encryption and decryption network for internet of medical things,” IEEE Internet of Things Journal, vol. 8, no. 3, pp. 1504–1518, 2021.
[24]Selvi CT, Amudha J, Sudhakar R, “Medical image encryption and compression by adaptive sigma filterized SYNORR certificateless signcryptive Levenshtein entropy-coding-based deep neural learning,” Multimedia Systems, vol. 27, no. 6, pp. 1059–1074, 2021.
[25]Arab A, Rostami MJ, Ghavami B, “An image encryption method based on Chaos System and AES algorithm,” Springer, The Journal of Supercomputing, vol. 75, no. 10, pp. 6663–6682, 2019.
[26]Matsumoto M, Nishimura T, “Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator,” ACM Transactions on Modeling and Computer Simulation (TOMACS), vol. 8, no. 1, pp. 3-30, 1998.
[27]Rahman M, Kumar P, “2D-CTM and DNA-Based Computing for Medical Image Encryption,” In Intelligent Data Engineering and Analytics: Proceedings of the 10th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA), pp. 225-235, 2022.
[28]Image databases. [Online]. Available: https://www.imageprocessingplace.com/root_files_V3/image_databases.htm. [Accessed: 26-March-2023].
[29]National Library of Medicine, Lister Hill National Center for Biomedical Communications [Available online:  https://ceb.nlm.nih.gov/repositories/malaria-datasets/] [Accessed: 26-March-2023].
[30]Murmu A, Kumar P, “A novel Gateaux Derivatives with Efficient DCNN-ResUNet Method for Segmenting Multi-class Brain Tumor,” Medical & Biological Engineering & Computing, 2023.
[31]Murmu A, Kumar P, “Deep learning model-based segmentation of medical diseases from MRI and CT images,” In IEEE Region 10 Conferenc (TENCON), pp. 608-613, New Zealand 2021.
[32]Hua Z, Zhou Y, "Design of image cipher using block-based scrambling and image filtering," Information sciences, vol. 396, pp. 97-113 2017.
[33]Belazi A, Talha M, Kharbech S, Xiang W, “Novel medical image encryption scheme based on chaos and DNA encoding,” IEEE access vol. 7, pp. 36667-36681, 2019.
[34]Mishra P, Bhaya C, Pal AK, Singh AK, "A medical image cryptosystem using bit-level diffusion with DNA coding," Journal of Ambient Intelligence and Humanized Computing, pp. 1-22, 2021.
[35]Kayalvizhi S, Malarvizhi S, “A novel encrypted compressive sensing of images based on fractional order hyper chaotic Chen system and DNA operations,” Multimedia Tools and Applications, vol. 79, no. 5-6, pp. 3957–3974, 2019.