Skip to main content
Log in

Neural-assisted image-dependent encryption scheme for medical image cloud storage

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Current medical technology evolves massive reports such as electronic patient records and scanned medical images; such reports are needed to be stored securely for future references. Existing storage systems are not feasible for massive data storage. Fortunately, cloud storage services meet the demand through their properties such as scalability and availability. Cloud computing is encouraged by amazing web innovation and modern electronic contraptions. Medical images can be stored in the cloud area, but most of the cloud service providers keep the client data in the plain text format. Cloud users need to take the responsibility to preserve the medical data with their strategy. Most of the existing image encryption solutions are vulnerable to the chosen-plaintext attack because the increasing power of computers and ingenuity of hackers are opening up more and more cracks in this mathematical armour. This paper proposes Hopfield neural network (HNN)-influenced image encryption technique to withstand against various attacks which optimize and improvise system through continuous learning and updating. These methods provide a critical security feature that adapts itself for day-to-day miracles of the real world. In this scheme, the back propagation neural network has been employed to generate image-specific keys that increase the resiliency against hackers. The generated keys are used as an initial seed for confusion and diffusion sequence generation through HNN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Rathore S, Sharma PK, Loia V et al (2017) Social network security: issues, challenges, threats, and solutions. Inf Sci (Ny) 421:43–69. https://doi.org/10.1016/j.ins.2017.08.063

    Article  Google Scholar 

  2. Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79:88–115. https://doi.org/10.1016/j.jnca.2016.11.027

    Article  Google Scholar 

  3. Shahzadi S, Iqbal M, Dagiuklas T, Qayyum ZU (2017) Multi-access edge computing: open issues, challenges and future perspectives. J Cloud Comput. https://doi.org/10.1186/s13677-017-0097-9

    Article  Google Scholar 

  4. Asadi S, Nilashi M, Husin ARC, Yadegaridehkordi E (2017) Customers perspectives on adoption of cloud computing in banking sector. Inf Technol Manag 18:305–330

    Article  Google Scholar 

  5. Tao M, Ota K, Dong M (2017) Ontology-based data semantic management and application in IoT- and cloud-enabled smart homes. Future Gener Comput Syst 76:528–539. https://doi.org/10.1016/j.future.2016.11.012

    Article  Google Scholar 

  6. Nithya C, Pethururaj C, Thenmozhi K, Amirtharajan R (2020) An advanced framework for highly secure and cloud-based storage of colour images. IET Image Process. https://doi.org/10.1049/iet-ipr.2018.5654

    Article  Google Scholar 

  7. Qin Z, Weng J, Cui Y, Ren K (2018) Privacy-preserving image processing in the cloud. IEEE Cloud Comput 5:48–57. https://doi.org/10.1109/MCC.2018.111121403

    Article  Google Scholar 

  8. Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods Eng 27:15–43. https://doi.org/10.1007/s11831-018-9298-8

    Article  MathSciNet  Google Scholar 

  9. Chandrasekaran J, Thiruvengadam SJ (2017) A hybrid chaotic and number theoretic approach for securing DICOM images. Secur Commun Netw. https://doi.org/10.1155/2017/6729896

    Article  Google Scholar 

  10. Diaconu AV (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf Sci (Ny) 355–356:314–327. https://doi.org/10.1016/j.ins.2015.10.027

    Article  Google Scholar 

  11. Dagadu JC, Li JP, Aboagye EO (2019) Medical image encryption based on hybrid chaotic DNA diffusion. Wirel Pers Commun 108:591–612. https://doi.org/10.1007/s11277-019-06420-z

    Article  Google Scholar 

  12. Nematzadeh H, Enayatifar R, Motameni H et al (2018) Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices. Opt Lasers Eng 110:24–32. https://doi.org/10.1016/j.optlaseng.2018.05.009

    Article  Google Scholar 

  13. El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144–157. https://doi.org/10.1016/j.image.2015.10.004

    Article  Google Scholar 

  14. Wang B, Wei X, Zhang Q (2013) Cryptanalysis of an image cryptosystem based on logistic map. Optik (Stuttg) 124:1773–1776. https://doi.org/10.1016/j.ijleo.2012.06.020

    Article  Google Scholar 

  15. Özkaynak F, Özer AB (2016) Cryptanalysis of a new image encryption algorithm based on chaos. Optik (Stuttg) 127:5190–5192. https://doi.org/10.1016/j.ijleo.2016.03.018

    Article  Google Scholar 

  16. Akhavan A, Samsudin A, Akhshani A (2017) Cryptanalysis of an image encryption algorithm based on DNA encoding. Opt Laser Technol 95:94–99. https://doi.org/10.1016/j.optlastec.2017.04.022

    Article  Google Scholar 

  17. Dhall S, Pal SK, Sharma K (2018) Cryptanalysis of image encryption scheme based on a new 1D chaotic system. Signal Process 146:22–32. https://doi.org/10.1016/j.sigpro.2017.12.021

    Article  Google Scholar 

  18. Li M, Guo Y, Huang J, Li Y (2018) Cryptanalysis of a chaotic image encryption scheme based on permutation–diffusion structure. Signal Process Image Commun 62:164–172. https://doi.org/10.1016/j.image.2018.01.002

    Article  Google Scholar 

  19. Zhang Y (2019) Security analysis of a chaos triggered image encryption scheme. Multimed Tools Appl 78:31303–31318. https://doi.org/10.1007/s11042-019-07894-6

    Article  Google Scholar 

  20. Zhang Y (2020) Cryptanalyzing an image cryptosystem based on circular inter–intra pixels bit-level permutation. IEEE Access 8:94810–94816. https://doi.org/10.1109/ACCESS.2020.2995839

    Article  Google Scholar 

  21. Bogos S, Gaspoz J, Vaudenay S (2018) Cryptanalysis of a homomorphic encryption scheme. Cryptogr Commun 10:27–39. https://doi.org/10.1007/s12095-017-0243-8

    Article  MathSciNet  MATH  Google Scholar 

  22. Kohonen T (1988) An introduction to neural computing. Neural Netw 1:3–16. https://doi.org/10.1016/0893-6080(88)90020-2

    Article  Google Scholar 

  23. Chen Y, Yan J, Sareh P, Feng J (2020) Feasible prestress modes for cable-strut structures with multiple self-stress states using particle swarm optimization. J Comput Civ Eng 34:1–10. https://doi.org/10.1061/(ASCE)CP.1943-5487.0000882

    Article  Google Scholar 

  24. Domer B, Fest E, Lalit V, Smith IFC (2003) Combining dynamic relaxation method with artificial neural networks to enhance simulation of tensegrity structures. J Struct Eng 129:672–681. https://doi.org/10.1061/(ASCE)0733-9445(2003)129:5(672)

    Article  Google Scholar 

  25. Yu W, Cao J (2006) Cryptography based on delayed chaotic neural networks. Phys Lett Sect A Gen At Solid State Phys 356:333–338. https://doi.org/10.1016/j.physleta.2006.03.069

    Article  MATH  Google Scholar 

  26. Tang H, Li H, Yan R (2010) Memory dynamics in attractor networks with saliency weights. Neural Comput 22:1899–1926. https://doi.org/10.1162/neco.2010.07-09-1050

    Article  MathSciNet  MATH  Google Scholar 

  27. Qin K (2017) On chaotic neural network design: a new framework. Neural Process Lett 45:243–261. https://doi.org/10.1007/s11063-016-9525-y

    Article  Google Scholar 

  28. Kassem A, Al Haj Hassan H, Harkouss Y, Assaf R (2014) Efficient neural chaotic generator for image encryption. Digit Signal Process Rev J 25:266–274. https://doi.org/10.1016/j.dsp.2013.11.004

    Article  Google Scholar 

  29. Ma X, Chen X, Zhang X (2019) Non-interactive privacy-preserving neural network prediction. Inf Sci (Ny) 481:507–519. https://doi.org/10.1016/j.ins.2018.12.015

    Article  Google Scholar 

  30. Bigdeli N, Farid Y, Afshar K (2012) A novel image encryption/decryption scheme based on chaotic neural networks. Eng Appl Artif Intell 25:753–765. https://doi.org/10.1016/j.engappai.2012.01.007

    Article  Google Scholar 

  31. Al Azawee H, Husien S, Yunus MAM (2016) Encryption function on artificial neural network. Neural Comput Appl 27:2601–2604. https://doi.org/10.1007/s00521-015-2028-3

    Article  Google Scholar 

  32. Hopfield JJ (1982) Neural networks and physical systems with emergent collective computational abilities. Feynman Comput. https://doi.org/10.1201/9780429500459

    Article  MathSciNet  MATH  Google Scholar 

  33. Hopfield J (1984) Neurons with graded response have collective computational properties like those of two-state neurons. Proc Natl Acad Sci U S A 81:3088–3092. https://doi.org/10.1073/pnas.81.10.3088

    Article  MATH  Google Scholar 

  34. Wang X-Y, Li Z-M (2019) A color image encryption algorithm based on Hopfield chaotic neural network. Opt Lasers Eng 115:107–118. https://doi.org/10.1016/j.optlaseng.2018.11.010

    Article  Google Scholar 

  35. Lakshmi C, Thenmozhi K, Rayappan JBB, Amirtharajan R (2020) Hopfield attractor-trusted neural network: an attack-resistant image encryption. Neural Comput Appl 32:11477–11489. https://doi.org/10.1007/s00521-019-04637-4

    Article  Google Scholar 

  36. Lakshmi C, Thenmozhi K, Rayappan JBB, Amirtharajan R (2018) Encryption and watermark-treated medical image against hacking disease—an immune convention in spatial and frequency domains. Comput Methods Programs Biomed 159:11–21. https://doi.org/10.1016/j.cmpb.2018.02.021

    Article  Google Scholar 

  37. Bigdeli N, Farid Y, Afshar K (2012) A robust hybrid method for image encryption based on Hopfield neural network. Comput Electr Eng 38:356–369. https://doi.org/10.1016/j.compeleceng.2011.11.019

    Article  Google Scholar 

Download references

Acknowledgements

Authors thank Department of Science and Technology, New Delhi for the FIST funding (SR/FST/ET-II/2018/221). Also, authors wish to thank the Intrusion Detection Laboratory at School of Electrical and Electronics Engineering, SASTRA Deemed University for providing infrastructural support to carry out this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nithya Chidambaram.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lakshmi, C., Thenmozhi, K., Rayappan, J.B.B. et al. Neural-assisted image-dependent encryption scheme for medical image cloud storage. Neural Comput & Applic 33, 6671–6684 (2021). https://doi.org/10.1007/s00521-020-05447-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-020-05447-9

Keywords

Navigation