Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image
Among imaging examinations, mammography noninvasively aids in the early detection and diagnosis of diseases inside the body, such as lung cancer or breast tumor, for first-line examination and helps physicians to treat medical conditions. As digital medical images can be transmitted by computer or t...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Photonics Journal |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9068441/ |
_version_ | 1818928280255856640 |
---|---|
author | Pi-Yun Chen Jian-Xing Wu Chien-Ming Li Chao-Lin Kuo Neng-Sheng Pai Chia-Hung Lin |
author_facet | Pi-Yun Chen Jian-Xing Wu Chien-Ming Li Chao-Lin Kuo Neng-Sheng Pai Chia-Hung Lin |
author_sort | Pi-Yun Chen |
collection | DOAJ |
description | Among imaging examinations, mammography noninvasively aids in the early detection and diagnosis of diseases inside the body, such as lung cancer or breast tumor, for first-line examination and helps physicians to treat medical conditions. As digital medical images can be transmitted by computer or telecommunication network, ensuring image infosecurity in public spaces is difficult. In infosecurity considerations, digital signature and encryption of individual anamnesis plain images should prevent data from being stolen, tampered, or peeked by unauthorized people. Hence, infosecurity has become an important issue in the digital era. This study proposes right / left shift 2<sup>n-1</sup> pixel values, hash transformation with multi-secret gold keys, and an optimization-based controller to integrate two symmetric cryptography processes for medical image encryption and decryption with the same secret gold keys. Then, swarm optimization-based controllers, which are based on particle swarm optimization (PSO) and firefly algorithm (FA), are implemented to search the decryption key parameters. For a case study on mammographic images consisting of medical X-ray images of 50 benign tumors and 50 malignant tumors, the peak signal-to-noise ratio is used to evaluate the relation between the original plain images and decrypted images. Conclusively, the FA-based controller performed better than the PSO-based controller in terms of recovery reliability and speeds up the computation of the desired optimal solution. |
first_indexed | 2024-12-20T03:26:24Z |
format | Article |
id | doaj.art-32e60df7a9f14dce8a96af11dad31c12 |
institution | Directory Open Access Journal |
issn | 1943-0655 |
language | English |
last_indexed | 2024-12-20T03:26:24Z |
publishDate | 2020-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Photonics Journal |
spelling | doaj.art-32e60df7a9f14dce8a96af11dad31c122022-12-21T19:55:04ZengIEEEIEEE Photonics Journal1943-06552020-01-0112311510.1109/JPHOT.2020.29877699068441Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic ImagePi-Yun Chen0https://orcid.org/0000-0002-1460-7116Jian-Xing Wu1https://orcid.org/0000-0002-9327-7396Chien-Ming Li2Chao-Lin Kuo3Neng-Sheng Pai4https://orcid.org/0000-0002-9439-7648Chia-Hung Lin5https://orcid.org/0000-0003-0150-8001Department of Electrical Engineering, National Chin-Yi University of Technology, Taichung City, TaiwanDepartment of Electrical Engineering, National Chin-Yi University of Technology, Taichung City, TaiwanDivision of Infectious Diseases, Department of Medicine of Chi Mei Medical Center, Tainan City, TaiwanDepartment of Maritime Information and Technology, National Kaohsiung University of Science and Technology, Kaohsiung City, TaiwanDepartment of Electrical Engineering, National Chin-Yi University of Technology, Taichung City, TaiwanDepartment of Electrical Engineering, National Chin-Yi University of Technology, Taichung City, TaiwanAmong imaging examinations, mammography noninvasively aids in the early detection and diagnosis of diseases inside the body, such as lung cancer or breast tumor, for first-line examination and helps physicians to treat medical conditions. As digital medical images can be transmitted by computer or telecommunication network, ensuring image infosecurity in public spaces is difficult. In infosecurity considerations, digital signature and encryption of individual anamnesis plain images should prevent data from being stolen, tampered, or peeked by unauthorized people. Hence, infosecurity has become an important issue in the digital era. This study proposes right / left shift 2<sup>n-1</sup> pixel values, hash transformation with multi-secret gold keys, and an optimization-based controller to integrate two symmetric cryptography processes for medical image encryption and decryption with the same secret gold keys. Then, swarm optimization-based controllers, which are based on particle swarm optimization (PSO) and firefly algorithm (FA), are implemented to search the decryption key parameters. For a case study on mammographic images consisting of medical X-ray images of 50 benign tumors and 50 malignant tumors, the peak signal-to-noise ratio is used to evaluate the relation between the original plain images and decrypted images. Conclusively, the FA-based controller performed better than the PSO-based controller in terms of recovery reliability and speeds up the computation of the desired optimal solution.https://ieeexplore.ieee.org/document/9068441/Mammographyinfosecurityhash transformationfirefly algorithmpeak signal-to-noise ratio |
spellingShingle | Pi-Yun Chen Jian-Xing Wu Chien-Ming Li Chao-Lin Kuo Neng-Sheng Pai Chia-Hung Lin Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image IEEE Photonics Journal Mammography infosecurity hash transformation firefly algorithm peak signal-to-noise ratio |
title | Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image |
title_full | Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image |
title_fullStr | Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image |
title_full_unstemmed | Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image |
title_short | Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image |
title_sort | symmetric cryptography with shift 2 sup n 1 sup hash transformation optimization based controller for medical image infosecurity case study in mammographic image |
topic | Mammography infosecurity hash transformation firefly algorithm peak signal-to-noise ratio |
url | https://ieeexplore.ieee.org/document/9068441/ |
work_keys_str_mv | AT piyunchen symmetriccryptographywithshift2supn1suphashtransformationoptimizationbasedcontrollerformedicalimageinfosecuritycasestudyinmammographicimage AT jianxingwu symmetriccryptographywithshift2supn1suphashtransformationoptimizationbasedcontrollerformedicalimageinfosecuritycasestudyinmammographicimage AT chienmingli symmetriccryptographywithshift2supn1suphashtransformationoptimizationbasedcontrollerformedicalimageinfosecuritycasestudyinmammographicimage AT chaolinkuo symmetriccryptographywithshift2supn1suphashtransformationoptimizationbasedcontrollerformedicalimageinfosecuritycasestudyinmammographicimage AT nengshengpai symmetriccryptographywithshift2supn1suphashtransformationoptimizationbasedcontrollerformedicalimageinfosecuritycasestudyinmammographicimage AT chiahunglin symmetriccryptographywithshift2supn1suphashtransformationoptimizationbasedcontrollerformedicalimageinfosecuritycasestudyinmammographicimage |