journal article Open Access Aug 28, 2023

Privacy-Preserving Convolutional Bi-LSTM Network for Robust Analysis of Encrypted Time-Series Medical Images

AI Vol. 4 No. 3 pp. 706-720 · MDPI AG
View at Publisher Save 10.3390/ai4030037
Abstract
Deep learning (DL) algorithms can improve healthcare applications. DL has improved medical imaging diagnosis, therapy, and illness management. The use of deep learning algorithms on sensitive medical images presents privacy and data security problems. Improving medical imaging while protecting patient anonymity is difficult. Thus, privacy-preserving approaches for deep learning model training and inference are gaining popularity. These picture sequences are analyzed using state-of-the-art computer aided detection/diagnosis techniques (CAD). Algorithms that upload medical photos to servers pose privacy issues. This article presents a convolutional Bi-LSTM network to assess completely homomorphic-encrypted (HE) time-series medical images. From secret image sequences, convolutional blocks learn to extract selective spatial features and Bi-LSTM-based analytical sequence layers learn to encode time data. A weighted unit and sequence voting layer uses geographical with varying weights to boost efficiency and reduce incorrect diagnoses. Two rigid benchmarks—the CheXpert, and the BreaKHis public datasets—illustrate the framework’s efficacy. The technique outperforms numerous rival methods with an accuracy above 0.99 for both datasets. These results demonstrate that the proposed outline can extract visual representations and sequential dynamics from encrypted medical picture sequences, protecting privacy while attaining good medical image analysis performance.
Topics

No keywords indexed for this article. Browse by subject →

References
46
[1]
Anand "An improved DWT-SVD domain watermarking for medical information security" Comput. Commun. (2020) 10.1016/j.comcom.2020.01.038
[2]
Loyola "Analysis of the impact of digital watermarking on computer-aided diagnosis in medical imaging" Comput. Biol. Med. (2016) 10.1016/j.compbiomed.2015.10.014
[3]
Fan "Lossless medical image watermarking method based on significant difference of cellular automata transform coefficient" Signal Process. Image Commun. (2019) 10.1016/j.image.2018.09.015
[4]
Ali "Chaos-based robust method of zero-watermarking for medical signals" Future Gener. Comput. Syst. (2018) 10.1016/j.future.2018.05.058
[5]
Wang "Low-complexity channel estimation for circular and noncircular signals in virtual MIMO vehicle communication systems" IEEE Trans. Veh. Technol. (2020) 10.1109/tvt.2020.2970967
[6]
Natarajan "Hybrid local prediction error-based difference expansion reversible watermarking for medical images" Comput. Electr. Eng. (2016) 10.1016/j.compeleceng.2015.11.033
[7]
Gangadhar "An evolutionary programming approach for securing medical images using watermarking scheme in invariant discrete wavelet transformation" Biomed. Signal Process. Control (2018) 10.1016/j.bspc.2018.02.007
[8]
Sharma "Secure hybrid robust watermarking technique for medical images" Procedia Comput. Sci. (2015) 10.1016/j.procs.2015.10.117
[9]
Bouslimi "A crypto-watermarking system for ensuring reliability control and traceability of medical images" Signal Process. Image Commun. (2016) 10.1016/j.image.2016.05.021
[10]
Liu "Data protection in palmprint recognition via dynamic random invisible watermark embedding" IEEE Trans. Circuits Syst. Video Technol. (2022) 10.1109/tcsvt.2022.3174582
[11]
Malayil "A novel image scaling based reversible watermarking scheme for secure medical image transmission" ISA Trans. (2021) 10.1016/j.isatra.2020.08.019
[12]
Li "Anonymizing and sharing medical text records" Inf. Syst. Res. (2017) 10.1287/isre.2016.0676
[13]
Privacy in the age of medical big data

W. Nicholson Price, I. Glenn Cohen

Nature Medicine 2019 10.1038/s41591-018-0272-7
[14]
Hua "Medical image encryption using high-speed scrambling and pixel adaptive diffusion" Signal Process. (2018) 10.1016/j.sigpro.2017.10.004
[15]
"Substitution box generation using Chaos: An image encryption application" Appl. Math. Comput. (2018)
[16]
Liu "Secure and robust digital image watermarking scheme using logistic and RSA encryption" Expert Syst. Appl. (2018) 10.1016/j.eswa.2017.12.003
[17]
Wang "Breast cancer detection using extreme learning machine based on feature fusion with CNN deep features" IEEE Access (2019) 10.1109/access.2019.2892795
[18]
Shen "Deep learning to improve breast cancer detection on screening mammography" Sci. Rep. (2019) 10.1038/s41598-019-48995-4
[19]
Lee, R.S., Gimenez, F., and Rubin, A.D.H. (2016). Curated breast imaging subset of DDSM. Cancer Imag. Arch. Tech. Rep.
[20]
Zhang, H., Wu, C., Zhang, Z., Zhu, Y., Lin, H., Zhang, Z., Sun, Y., He, T., Mueller, J., and Manmatha, R. (2020). ResNeSt: Split-attention networks. arXiv.
[21]
Zhang, Y., Wang, S., Wu, H., Hu, K., and Ji, S. (2021, January 1–5). Brain Tumors Classification for MR images based on Attention Guided Deep Learning Model. Proceedings of the 2021 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC), Jalisco, Mexico. 10.1109/embc46164.2021.9630571
[22]
Jin, Y., Dou, Q., Chen, H., Yu, L., and Heng, P.A. (2016). EndoRCN: Recurrent convolutional networks for recognition of surgical workflow in cholecystectomy procedure video. IEEE Trans. Med. Imaging, 53347671.
[23]
Ghosh, P., Azam, S., Hasib, K.M., Karim, A., Jonkman, M., and Anwar, A. (2021, January 18–22). A Performance Based Study on Deep Learning Algorithms in the Effective Prediction of Breast Cancer. Proceedings of the 2021 International Joint Conference on Neural Networks (IJCNN), Shenzhen, China. 10.1109/ijcnn52387.2021.9534293
[24]
Deep Learning Assisted Efficient AdaBoost Algorithm for Breast Cancer Detection and Early Diagnosis

Jing Zheng, Denan Lin, Zhongjun Gao et al.

IEEE Access 2020 10.1109/access.2020.2993536
[25]
Yan "Prediction research of cervical cancer clinical events based on recurrent neural network" Procedia Comput. Sci. (2021) 10.1016/j.procs.2021.02.052
[26]
Zhang "Localization of Myocardial Infarction With Multi-Lead Bidirectional Gated Recurrent Unit Neural Network" IEEE Access (2019) 10.1109/access.2019.2946932
[27]
Fan, J., and Vercauteren, F. (2012). Somewhat practical fully homomorphic encryption. Cryptology ePrint Arch., 144.
[28]
Samardzic, N., Feldmann, A., Krastev, A., Manohar, N., Genise, N., Devadas, S., Eldefrawy, K., Peikert, C., and Sanchez, D. (2022, January 18–22). CraterLake: A hardware accelerator for efficient unbounded computation on encrypted data. Proceedings of the 49th Annual International Symposium on Computer Architecture (ISCA ‘22). Association for Computing Machinery, New York, NY, USA.
[29]
Mert "Design and implementation of encryption/decryption architectures for BFV homomorphic encryption scheme" IEEE Trans. Very Large Scale Integr VLSI Syst. (2019) 10.1109/tvlsi.2019.2943127
[30]
Ibarrondo, a., Chabanne, H., Despiegel, V., and Önen, M. (2022, January 27–28). Colmade: Collaborative Masking in Auditable Decryption for BFV-based Homomorphic Encryption. Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec ‘22), New York, NY, USA. 10.1145/3531536.3532952
[31]
Cloud-based privacy- and integrity-protecting density peaks clustering

Haomiao Yang, Shaopeng Liang, Yu-Zhong Zhang et al.

Future Generation Computer Systems 2021 10.1016/j.future.2021.07.027
[32]
Zhang "A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network" Comput. Stand. Interfaces (2023) 10.1016/j.csi.2022.103672
[33]
Natsheh, Q., Sălăgean, A., Zhou, D., and Edirisinghe, E. (2023). Automatic Selective Encryption of DICOM Images. Appl. Sci., 13. 10.3390/app13084779
[34]
Kanso "An efficient and robust image encryption scheme for medical applications" Commun. Nonlinear Sci. Numer. Simul. (2015) 10.1016/j.cnsns.2014.12.005
[35]
Song "A parallel image encryption algorithm using intra bitplane scrambling" Math. Comput. Simul. (2023) 10.1016/j.matcom.2022.07.029
[36]
Ding "DeepEDN: A deep-learning-based image encryption and decryption network for internet of medical things" IEEE Internet Things J. (2021) 10.1109/jiot.2020.3012452
[37]
Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., and Bengio, Y. (2015, January 7–12). Generative adversarial nets. Proceedings of the NIPS2015, Montreal, QC, Canada.
[38]
Liu, W., Liu, X., Ma, H., and Cheng, P. (2017, January 23–27). Beyond Human-level License Plate Super-resolution with Progressive Vehicle Search and Domain Priori GAN. Proceedings of the 25th ACM International Conference on Multimedia, Mountain View, CA, USA. 10.1145/3123266.3123422
[39]
Yi, Z., Zhang, H., Tan, P., and Gong, M. (2017, January 22–29). DualGAN: Unsupervised Dual Learning for Image-to-Image Translation. Proceedings of the IEEE ICCV2017, Venice, Italy. 10.1109/iccv.2017.310
[40]
Radanliev, P., and De Roure, D. (2021). Epistemological and bibliometric analysis of ethics and shared responsibility—Health policy and IoT systems. Sustainability, 13. 10.3390/su13158355
[41]
Jain, D. (2023). Regulation of Digital Healthcare in India: Ethical and Legal Challenges. Healthcare, 11. 10.3390/healthcare11060911
[42]
Zhang "A High-Quality Rice Leaf Disease Image Data Augmentation Method Based on a Dual GAN" IEEE Access (2023) 10.1109/access.2023.3251098
[43]
Liu "Toward visual quality enhancement of dehazing effect with improved Cycle-GAN" Neural Comput. Appl. (2023) 10.1007/s00521-022-07964-1
[44]
Panzade, P., and Takabi, D. (2023, January 26). FENet: Privacy-preserving Neural Network Training with Functional Encryption. Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics (IWSPA ‘23), Charlotte, NC, USA. 10.1145/3579987.3586566
[45]
Zhao, D. (2023). Communication-Efficient Search under Fully Homomorphic Encryption for Federated Machine Learning. arXiv.
[46]
Li "Multi-Level Residual Feature Fusion Network for Thoracic Disease Classification in Chest X-ray Images" IEEE Access (2023) 10.1109/access.2023.3269068
Metrics
10
Citations
46
References
Details
Published
Aug 28, 2023
Vol/Issue
4(3)
Pages
706-720
License
View
Funding
Prince Sattam bin Abdulaziz University Award: PSAU/2023/R/1444
Cite This Article
Manjur Kolhar, Sultan Mesfer Aldossary (2023). Privacy-Preserving Convolutional Bi-LSTM Network for Robust Analysis of Encrypted Time-Series Medical Images. AI, 4(3), 706-720. https://doi.org/10.3390/ai4030037
Related

You May Also Like