Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image

Among imaging examinations, mammography noninvasively aids in the early detection and diagnosis of diseases inside the body, such as lung cancer or breast tumor, for first-line examination and helps physicians to treat medical conditions. As digital medical images can be transmitted by computer or t...

Full description

Bibliographic Details
Main Authors: Pi-Yun Chen, Jian-Xing Wu, Chien-Ming Li, Chao-Lin Kuo, Neng-Sheng Pai, Chia-Hung Lin
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Photonics Journal
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9068441/
_version_ 1818928280255856640
author Pi-Yun Chen
Jian-Xing Wu
Chien-Ming Li
Chao-Lin Kuo
Neng-Sheng Pai
Chia-Hung Lin
author_facet Pi-Yun Chen
Jian-Xing Wu
Chien-Ming Li
Chao-Lin Kuo
Neng-Sheng Pai
Chia-Hung Lin
author_sort Pi-Yun Chen
collection DOAJ
description Among imaging examinations, mammography noninvasively aids in the early detection and diagnosis of diseases inside the body, such as lung cancer or breast tumor, for first-line examination and helps physicians to treat medical conditions. As digital medical images can be transmitted by computer or telecommunication network, ensuring image infosecurity in public spaces is difficult. In infosecurity considerations, digital signature and encryption of individual anamnesis plain images should prevent data from being stolen, tampered, or peeked by unauthorized people. Hence, infosecurity has become an important issue in the digital era. This study proposes right / left shift 2<sup>n-1</sup> pixel values, hash transformation with multi-secret gold keys, and an optimization-based controller to integrate two symmetric cryptography processes for medical image encryption and decryption with the same secret gold keys. Then, swarm optimization-based controllers, which are based on particle swarm optimization (PSO) and firefly algorithm (FA), are implemented to search the decryption key parameters. For a case study on mammographic images consisting of medical X-ray images of 50 benign tumors and 50 malignant tumors, the peak signal-to-noise ratio is used to evaluate the relation between the original plain images and decrypted images. Conclusively, the FA-based controller performed better than the PSO-based controller in terms of recovery reliability and speeds up the computation of the desired optimal solution.
first_indexed 2024-12-20T03:26:24Z
format Article
id doaj.art-32e60df7a9f14dce8a96af11dad31c12
institution Directory Open Access Journal
issn 1943-0655
language English
last_indexed 2024-12-20T03:26:24Z
publishDate 2020-01-01
publisher IEEE
record_format Article
series IEEE Photonics Journal
spelling doaj.art-32e60df7a9f14dce8a96af11dad31c122022-12-21T19:55:04ZengIEEEIEEE Photonics Journal1943-06552020-01-0112311510.1109/JPHOT.2020.29877699068441Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic ImagePi-Yun Chen0https://orcid.org/0000-0002-1460-7116Jian-Xing Wu1https://orcid.org/0000-0002-9327-7396Chien-Ming Li2Chao-Lin Kuo3Neng-Sheng Pai4https://orcid.org/0000-0002-9439-7648Chia-Hung Lin5https://orcid.org/0000-0003-0150-8001Department of Electrical Engineering, National Chin-Yi University of Technology, Taichung City, TaiwanDepartment of Electrical Engineering, National Chin-Yi University of Technology, Taichung City, TaiwanDivision of Infectious Diseases, Department of Medicine of Chi Mei Medical Center, Tainan City, TaiwanDepartment of Maritime Information and Technology, National Kaohsiung University of Science and Technology, Kaohsiung City, TaiwanDepartment of Electrical Engineering, National Chin-Yi University of Technology, Taichung City, TaiwanDepartment of Electrical Engineering, National Chin-Yi University of Technology, Taichung City, TaiwanAmong imaging examinations, mammography noninvasively aids in the early detection and diagnosis of diseases inside the body, such as lung cancer or breast tumor, for first-line examination and helps physicians to treat medical conditions. As digital medical images can be transmitted by computer or telecommunication network, ensuring image infosecurity in public spaces is difficult. In infosecurity considerations, digital signature and encryption of individual anamnesis plain images should prevent data from being stolen, tampered, or peeked by unauthorized people. Hence, infosecurity has become an important issue in the digital era. This study proposes right / left shift 2<sup>n-1</sup> pixel values, hash transformation with multi-secret gold keys, and an optimization-based controller to integrate two symmetric cryptography processes for medical image encryption and decryption with the same secret gold keys. Then, swarm optimization-based controllers, which are based on particle swarm optimization (PSO) and firefly algorithm (FA), are implemented to search the decryption key parameters. For a case study on mammographic images consisting of medical X-ray images of 50 benign tumors and 50 malignant tumors, the peak signal-to-noise ratio is used to evaluate the relation between the original plain images and decrypted images. Conclusively, the FA-based controller performed better than the PSO-based controller in terms of recovery reliability and speeds up the computation of the desired optimal solution.https://ieeexplore.ieee.org/document/9068441/Mammographyinfosecurityhash transformationfirefly algorithmpeak signal-to-noise ratio
spellingShingle Pi-Yun Chen
Jian-Xing Wu
Chien-Ming Li
Chao-Lin Kuo
Neng-Sheng Pai
Chia-Hung Lin
Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image
IEEE Photonics Journal
Mammography
infosecurity
hash transformation
firefly algorithm
peak signal-to-noise ratio
title Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image
title_full Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image
title_fullStr Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image
title_full_unstemmed Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image
title_short Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image
title_sort symmetric cryptography with shift 2 sup n 1 sup hash transformation optimization based controller for medical image infosecurity case study in mammographic image
topic Mammography
infosecurity
hash transformation
firefly algorithm
peak signal-to-noise ratio
url https://ieeexplore.ieee.org/document/9068441/
work_keys_str_mv AT piyunchen symmetriccryptographywithshift2supn1suphashtransformationoptimizationbasedcontrollerformedicalimageinfosecuritycasestudyinmammographicimage
AT jianxingwu symmetriccryptographywithshift2supn1suphashtransformationoptimizationbasedcontrollerformedicalimageinfosecuritycasestudyinmammographicimage
AT chienmingli symmetriccryptographywithshift2supn1suphashtransformationoptimizationbasedcontrollerformedicalimageinfosecuritycasestudyinmammographicimage
AT chaolinkuo symmetriccryptographywithshift2supn1suphashtransformationoptimizationbasedcontrollerformedicalimageinfosecuritycasestudyinmammographicimage
AT nengshengpai symmetriccryptographywithshift2supn1suphashtransformationoptimizationbasedcontrollerformedicalimageinfosecuritycasestudyinmammographicimage
AT chiahunglin symmetriccryptographywithshift2supn1suphashtransformationoptimizationbasedcontrollerformedicalimageinfosecuritycasestudyinmammographicimage