Journal of Machine and Computing


Integrating Deep Learning and Homomorphic Encryption for Secure Image Transmission



Journal of Machine and Computing

Received On : 26 February 2024

Revised On : 18 May 2024

Accepted On : 02 September 2024

Published On : 05 October 2024

Volume 04, Issue 04

Pages : 1206-1219


Abstract


This paper introduces a novel approach to securing medical image transmission through the integration of deep learning techniques into cryptographic processes. Leveraging the capabilities of Backpropagation (BP), Convolutional Neural Networks (CNN), Residual Networks (ResNet), and Generative Adversarial Network (GAN), our method aims to enhance the privacy and security of medical images in real-time applications like telemedicine. The proposed system focuses on optimizing performance metrics including Peak Signal-to-Noise Ratio (PSNR), Root Mean Square Error (RMSE), Structural Similarity Index Measure (SSIM), Mean Average Precision (MAP), and encryption speed. Through experimental evaluation, our approach demonstrates promising results in terms of encryption efficiency and preservation of image quality. By addressing the critical need for secure transmission methods in healthcare, this research contributes to advancing the field of medical image cryptography and lays the groundwork for further exploration in deep learning-based security solutions for healthcare data.


Keywords


Medical Image Security, Deep Learning, Homomorphic Encryption, Cryptography, Feature Extraction.


  1. Y. Ding et al., “DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical Things,” IEEE Internet of Things Journal, vol. 8, no. 3, pp. 1504–1518, Feb. 2021, doi: 10.1109/jiot.2020.3012452.
  2. J. Jin and K. Kim, “3D CUBE Algorithm for the Key Generation Method: Applying Deep Neural Network Learning-Based,” IEEE Access, vol. 8, pp. 33689–33702, 2020, doi: 10.1109/access.2020.2973695.
  3. X. Yu, Y. Zhang, & H. Li, “Application of deep learning in medical image encryption and analysis,” IEEE Transactions on Medical Imaging, vol. 42, no.3, pp.652-663, (2023).
  4. S. Wang, Y. Liu, & T. Zhang, “A lightweight CNN approach for secure medical image transmission,” Journal of Digital Imaging, vol.35, no.5, pp.1054-1065, (2022).
  5. J. Li, Q. Huang, & W. Zhang, “Medical image encryption using CNNs and autoencoders,” Computerized Medical Imaging and Graphics, vol. 84, pp.101750, (2020).
  6. H. Nayef, M. Al-Rahim, & A. Samir, “A survey on various encryption techniques for medical images,” Journal of Healthcare Engineering, pp.8873614, (2021).
  7. Chen, D., Liu, Y., & Shen, H. Enhanced medical image encryption using deep neural networks. IEEE Access, vol. 6, pp.73309-73317, (2018).
  8. S. R. Maniyath and T. V, “An efficient image encryption using deep neural network and chaotic map,” Microprocessors and Microsystems, vol. 77, p. 103134, Sep. 2020, doi: 10.1016/j.micpro.2020.103134.
  9. U. Erkan, A. Toktas, S. Enginoğlu, E. Akbacak, and D. N. H. Thanh, “An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN,” Multimedia Tools and Applications, vol. 81, no. 5, pp. 7365–7391, Jan. 2022, doi: 10.1007/s11042-021-11803-1.
  10. Fratalocchi, A. Fleming, C. Conti, and A. Di Falco, “NIST-certified secure key generation via deep learning of physical unclonable functions in silica aerogels,” Nanophotonics, vol. 10, no. 1, pp. 457–464, Oct. 2020, doi: 10.1515/nanoph-2020-0368.
  11. Jin-qing LI,Jian ZHOU,Xiao-qiang DI. “Learning optical image encryption scheme based on CycleGAN[J].” Journal of Jilin University (Engineering and Technology Edition), vol. 51, no.3, pp. 1060-1066, 2021, doi: 10.13229/j.cnki.jdxbgxb20200521.
  12. Y. Ding, F. Tan, Z. Qin, M. Cao, K.-K. R. Choo, and Z. Qin, “DeepKeyGen: A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption,” IEEE Transactions on Neural Networks and Learning Systems, vol. 33, no. 9, pp. 4915–4929, Sep. 2022, doi: 10.1109/tnnls.2021.3062754.
  13. Z. Bao and R. Xue, “Research on the avalanche effect of image encryption based on the Cycle-GAN,” Applied Optics, vol. 60, no. 18, p. 5320, Jun. 2021, doi: 10.1364/ao.428203.
  14. Z. Bao, R. Xue, and Y. Jin, “Image scrambling adversarial autoencoder based on the asymmetric encryption,” Multimedia Tools and Applications, vol. 80, no. 18, pp. 28265–28301, Jun. 2021, doi: 10.1007/s11042-021-11043-3.
  15. R. Kiesel, M. Lakatsch, A. Mann, K. Lossie, F. Sohnius, and R. H. Schmitt, “Potential of Homomorphic Encryption for Cloud Computing Use Cases in Manufacturing,” Journal of Cybersecurity and Privacy, vol. 3, no. 1, pp. 44–60, Feb. 2023, doi: 10.3390/jcp3010004.
  16. B. L. R, S. Murugan, and M. Balakrishnan, “Bi-Model Emotional AI for Audio-Visual Human Emotion Detection Using Hybrid Deep Learning Model,” EAI/Springer Innovations in Communication and Computing, pp. 293–315, 2024, doi: 10.1007/978-3-031-53972-5_15.
  17. X. Lu, C. Li, and K. Tan, “Network Analysis of Chebyshev Polynomial in a Fixed-precision Digital Domain,” 2021 40th Chinese Control Conference (CCC), Jul. 2021, doi: 10.23919/ccc52363.2021.9550220.

Acknowledgements


Author(s) thanks to Dr. Murugan D for this research completion and support.


Funding


No funding was received to assist with the preparation of this manuscript.


Ethics declarations


Conflict of interest

The authors would like to thank to the reviewers for nice comments on the manuscript.


Availability of data and materials


Data sharing is not applicable to this article as no new data were created or analysed in this study.


Author information


Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.


Corresponding author


Rights and permissions


Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/


Cite this article


Suvitha B and Murugan D, “Integrating Deep Learning and Homomorphic Encryption for Secure Image Transmission”, Journal of Machine and Computing, pp. 1206-1219, October 2024. doi:10.53759/7669/jmc202404111.


Copyright


© 2024 Suvitha B and Murugan D. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.