MAN-C: A masked autoencoder neural cryptography based encryption scheme for CT scan images.

MethodsX

School of Information Science and Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, Uttar Pradesh, India.

Published: June 2024

Sharing medical images securely is very important towards keeping patients' data confidential. In this paper we propose MAN-C: a Masked Autoencoder Neural Cryptography based encryption scheme for sharing medical images. The proposed technique builds upon recently proposed masked autoencoders. In the original paper, the masked autoencoders are used as scalable self-supervised learners for computer vision which reconstruct portions of originally patched images. Here, the facility to obfuscate portions of input image and the ability to reconstruct original images is used an encryption-decryption scheme. In the final form, masked autoencoders are combined with neural cryptography consisting of a tree parity machine and Shamir Scheme for secret image sharing. The proposed technique MAN-C helps to recover the loss in image due to noise during secret sharing of image.•Uses recently proposed masked autoencoders, originally designed as scalable self-supervised learners for computer vision, in an encryption-decryption setup.•Combines autoencoders with neural cryptography - the advantage our proposed approach offers over existing technique is that (i) Neural cryptography is a new type of public key cryptography that is not based on number theory, requires less computing time and memory and is non-deterministic in nature, (ii) masked auto-encoders provide additional level of obfuscation through their deep learning architecture.•The proposed scheme was evaluated on dataset consisting of CT scans made public by The Cancer Imaging Archive (TCIA). The proposed method produces better RMSE values between the input the encrypted image and comparable correlation values between the input and the output image with respect to the existing techniques.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11074963PMC
http://dx.doi.org/10.1016/j.mex.2024.102738DOI Listing

Publication Analysis

Top Keywords

neural cryptography
20
masked autoencoders
16
cryptography based
12
man-c masked
8
masked autoencoder
8
autoencoder neural
8
based encryption
8
encryption scheme
8
sharing medical
8
medical images
8

Similar Publications

A Dual-Path Computational Ghost Imaging Method Based on Convolutional Neural Networks.

Sensors (Basel)

December 2024

College of Computer Science and Technology, Changchun University, Changchun 130022, China.

Article Synopsis
  • Ghost imaging uses light properties to reconstruct images indirectly and resists interference, making it a practical imaging method.
  • A new technique combining dual-path detection and convolutional neural networks is introduced to enhance the range of target image information.
  • The study incorporates a self-attention mechanism in the network, which optimizes focus and boosts reconstruction efficiency, showing promising results in simulations.
View Article and Find Full Text PDF

Enhanced related-key differential neural distinguishers for SIMON and SIMECK block ciphers.

PeerJ Comput Sci

November 2024

Shanghai Key Laboratory of Trustworthy Computing, Software Engineering Institute, East China Normal University, Shanghai, North Zhongshan Road, China.

At CRYPTO 2019, Gohr pioneered the application of deep learning to differential cryptanalysis and successfully attacked the 11-round NSA block cipher Speck32/64 with a 7-round and an 8-round single-key differential neural distinguisher. Subsequently, Lu et al. (DOI 10.

View Article and Find Full Text PDF

True random numbers are crucial for various research and engineering problems. Their generation depends upon a robust physical entropy noise. Here, we present true random number generation from the conductance noise probed in structurally metastable 1T' molybdenum ditelluride (MoTe).

View Article and Find Full Text PDF

Hybrid computing framework security in dynamic offloading for IoT-enabled smart home system.

PeerJ Comput Sci

August 2024

Department of Quantitative Analysis, College of Business Administration, King Saud University, Riyadh, Saudi Arabia.

In the distributed computing era, cloud computing has completely changed organizational operations by facilitating simple access to resources. However, the rapid development of the IoT has led to collaborative computing, which raises scalability and security challenges. To fully realize the potential of the Internet of Things (IoT) in smart home technologies, there is still a need for strong data security solutions, which are essential in dynamic offloading in conjunction with edge, fog, and cloud computing.

View Article and Find Full Text PDF

Background: In the modern medical industry, sensors and other medical electronic equipment such as ECG, thermometers, etc. that measure vitals like blood pressure, body temperature, heartbeat, and blood cells are used to record patient data. The information gathered helps to create a patient profile, which in turn helps doctors treat patients appropriately and helps users gain insights into their health.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!