Sharing medical images securely is very important towards keeping patients' data confidential. In this paper we propose MAN-C: a Masked Autoencoder Neural Cryptography based encryption scheme for sharing medical images. The proposed technique builds upon recently proposed masked autoencoders. In the original paper, the masked autoencoders are used as scalable self-supervised learners for computer vision which reconstruct portions of originally patched images. Here, the facility to obfuscate portions of input image and the ability to reconstruct original images is used an encryption-decryption scheme. In the final form, masked autoencoders are combined with neural cryptography consisting of a tree parity machine and Shamir Scheme for secret image sharing. The proposed technique MAN-C helps to recover the loss in image due to noise during secret sharing of image.•Uses recently proposed masked autoencoders, originally designed as scalable self-supervised learners for computer vision, in an encryption-decryption setup.•Combines autoencoders with neural cryptography - the advantage our proposed approach offers over existing technique is that (i) Neural cryptography is a new type of public key cryptography that is not based on number theory, requires less computing time and memory and is non-deterministic in nature, (ii) masked auto-encoders provide additional level of obfuscation through their deep learning architecture.•The proposed scheme was evaluated on dataset consisting of CT scans made public by The Cancer Imaging Archive (TCIA). The proposed method produces better RMSE values between the input the encrypted image and comparable correlation values between the input and the output image with respect to the existing techniques.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11074963 | PMC |
http://dx.doi.org/10.1016/j.mex.2024.102738 | DOI Listing |
Sensors (Basel)
December 2024
College of Computer Science and Technology, Changchun University, Changchun 130022, China.
PeerJ Comput Sci
November 2024
Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University, Shanghai, North Zhongshan Road, China.
At CRYPTO 2019, Gohr pioneered the application of deep learning to differential cryptanalysis and successfully attacked the 11-round NSA block cipher Speck32/64 with a 7-round and an 8-round single-key differential neural distinguisher. Subsequently, Lu et al. (DOI 10.
View Article and Find Full Text PDFNano Lett
November 2024
Department of Electronic Engineering, The Chinese University of Hong Kong, Shatin, New Territories, Hong Kong SAR 999077, China.
True random numbers are crucial for various research and engineering problems. Their generation depends upon a robust physical entropy noise. Here, we present true random number generation from the conductance noise probed in structurally metastable 1T' molybdenum ditelluride (MoTe).
View Article and Find Full Text PDFPeerJ Comput Sci
August 2024
Department of Quantitative Analysis, College of Business Administration, King Saud University, Riyadh, Saudi Arabia.
In the distributed computing era, cloud computing has completely changed organizational operations by facilitating simple access to resources. However, the rapid development of the IoT has led to collaborative computing, which raises scalability and security challenges. To fully realize the potential of the Internet of Things (IoT) in smart home technologies, there is still a need for strong data security solutions, which are essential in dynamic offloading in conjunction with edge, fog, and cloud computing.
View Article and Find Full Text PDFTechnol Health Care
November 2024
Background: In the modern medical industry, sensors and other medical electronic equipment such as ECG, thermometers, etc. that measure vitals like blood pressure, body temperature, heartbeat, and blood cells are used to record patient data. The information gathered helps to create a patient profile, which in turn helps doctors treat patients appropriately and helps users gain insights into their health.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!