Symmetric Cryptography With Shift 2<sup>n-1</sup>, Hash Transformation, Optimization-Based Controller for Medical Image Infosecurity: Case Study in Mammographic Image

Among imaging examinations, mammography noninvasively aids in the early detection and diagnosis of diseases inside the body, such as lung cancer or breast tumor, for first-line examination and helps physicians to treat medical conditions. As digital medical images can be transmitted by computer or t...

Full description

Saved in:
Bibliographic Details
Main Authors: Pi-Yun Chen, Jian-Xing Wu, Chien-Ming Li, Chao-Lin Kuo, Neng-Sheng Pai, Chia-Hung Lin
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Photonics Journal
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9068441/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Among imaging examinations, mammography noninvasively aids in the early detection and diagnosis of diseases inside the body, such as lung cancer or breast tumor, for first-line examination and helps physicians to treat medical conditions. As digital medical images can be transmitted by computer or telecommunication network, ensuring image infosecurity in public spaces is difficult. In infosecurity considerations, digital signature and encryption of individual anamnesis plain images should prevent data from being stolen, tampered, or peeked by unauthorized people. Hence, infosecurity has become an important issue in the digital era. This study proposes right &#x002F; left shift 2<sup>n&#x2212;1</sup> pixel values, hash transformation with multi-secret gold keys, and an optimization-based controller to integrate two symmetric cryptography processes for medical image encryption and decryption with the same secret gold keys. Then, swarm optimization-based controllers, which are based on particle swarm optimization (PSO) and firefly algorithm (FA), are implemented to search the decryption key parameters. For a case study on mammographic images consisting of medical X-ray images of 50 benign tumors and 50 malignant tumors, the peak signal-to-noise ratio is used to evaluate the relation between the original plain images and decrypted images. Conclusively, the <italic>FA</italic>-based controller performed better than the <italic>PSO</italic>-based controller in terms of recovery reliability and speeds up the computation of the desired optimal solution.
ISSN:1943-0655