skip to main content
research-article

-Score-Based Secure Biomedical Model for Effective Skin Lesion Segmentation Over eHealth Cloud

Authors Info & Claims
Published:14 June 2021Publication History
Skip Abstract Section

Abstract

This study aims to process the private medical data over eHealth cloud platform. The current pandemic situation, caused by Covid19 has made us to realize the importance of automatic remotely operated independent services, such as cloud. However, the cloud servers are developed and maintained by third parties, and may access user’s data for certain benefits. Considering these problems, we propose a specialized method such that the patient’s rights and changes in medical treatment can be preserved. The problem arising due to Melanoma skin cancer is carefully considered and a privacy-preserving cloud-based approach is proposed to achieve effective skin lesion segmentation. The work is accomplished by the development of a Z-score-based local color correction method to differentiate image pixels from ambiguity, resulting the segmentation quality to be highly improved. On the other hand, the privacy is assured by partially order homomorphic Permutation Ordered Binary (POB) number system and image permutation. Experiments are performed over publicly available images from the ISIC 2016 and 2017 challenges, as well as PH\(\) dataset, where the proposed approach is found to achieve significant results over the encrypted images (known as encrypted domain), as compared to the existing schemes in the plain domain (unencrypted images). We also compare the results with the winners of the ISBI 2016 and 2017 challenges, and show that the proposed approach achieves a very close result with them, even after processing test images in the encrypted domain. Security of the proposed approach is analyzed using a challenge-response game model.

References

  1. Rahena Akhter, Rownak Jahan Chowdhury, Keita Emura, Tamzida Islam, Mohammad Shahriar Rahman, and Nusrat Rubaiyat. 2013. Privacy-preserving two-party k-means clustering in malicious model. In Proceedings of the IEEE 37th Annual Computer Software and Applications Conference Workshops. 121–126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Siguang Chen, Xi Zhu, Haijun Zhang, Chuanxin Zhao, Geng Yang, and Kun Wang. 2020. Efficient privacy preserving data collection and computation offloading for fog-assisted IoT. IEEE Transactions on Sustainable Computing (2020).Google ScholarGoogle ScholarCross RefCross Ref
  3. Yi Chen, Shuai Ding, Zheng Xu, Handong Zheng, and Shanlin Yang. 2019. Blockchain-based medical records secure storage and medical service framework. Journal of Medical Systems 43, 1 (2019), 5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Can Eyupoglu, Muhammed Aydin, Abdul Zaim, and Ahmet Sertbas. 2018. An efficient big data anonymization algorithm based on chaos and perturbation techniques. Entropy 20, 5 (2018), 373.Google ScholarGoogle ScholarCross RefCross Ref
  5. Haidi Fan, Fengying Xie, Yang Li, Zhiguo Jiang, and Jie Liu. 2017. Automatic segmentation of dermoscopy images using saliency combined with Otsu threshold. Computers in Biology and Medicine 85 (2017), 75–85.Google ScholarGoogle ScholarCross RefCross Ref
  6. Zakaria Gheid and Yacine Challal. 2016. Efficient and privacy-preserving k-means clustering for big data mining. In Proceedings of the IEEE Trustcom/BigDataSE/ISPA. 791–798.Google ScholarGoogle ScholarCross RefCross Ref
  7. David Gutman, Celebi Emre Codella, Noel C. F. Marchetti, Michael Helba Brian, and Allan Halpern Mishra Nabin. 2016. Skin lesion analysis toward melanoma detection: A challenge at the International Symposium on Biomedical Imaging (ISBI) 2016, hosted by the International Skin Imaging Collaboration (ISIC). In [Online]. Available: https://arxiv.org/abs/1605.01397.Google ScholarGoogle Scholar
  8. Haiping Huang, Tianhe Gong, Ning Ye, Ruchuan Wang, and Yi Dou. 2017. Private and secured medical data transmission and analysis for wireless sensing healthcare system. IEEE Transactions on Industrial Informatics 13, 3 (2017), 1227–1237.Google ScholarGoogle ScholarCross RefCross Ref
  9. Mostafa Jahanifar, Neda Zamani Tajeddin, Babak Mohammadzadeh Asl, and Ali Gooya. 2019. Supervised saliency map driven segmentation of lesions in dermoscopic images. IEEE Journal of Biomedical and Health Informatics 23, 2 (2019), 509–518.Google ScholarGoogle ScholarCross RefCross Ref
  10. Hao Jin, Yan Luo, Peilong Li, and Jomol Mathew. 2019. A review of secure and privacy-preserving medical data sharing. IEEE Access 7 (2019), 61656–61669.Google ScholarGoogle ScholarCross RefCross Ref
  11. Xin Jin, Hongyu Zhang, Xiaodong Li, Haoyang Yu, Beisheng Liu, Shujiang Xie, Amit Kumar Singh, and Yujie Li. 2020. Confused modulo projection based somewhat homomorphic encryption-cryptosystem, library and applications on secure smart cities. IEEE Internet of Things Journal (2020).Google ScholarGoogle Scholar
  12. Pratik Kalshetti, Manas Bundele, Parag Rahangdale, Dinesh Jangra, Chiranjoy Chattopadhyay, Gaurav Harit, and Abhay Elhence. 2017. An interactive medical image segmentation framework using iterative refinement. Computers in Biology and Medicine 83 (2017), 22–33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R. Karakış, İ. Güler, İ. Çapraz, and E. Bilir. 2015. A novel fuzzy logic-based image steganography method to ensure medical data security. Computers in Biology and Medicine 67 (2015), 172–183. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Santosh Kumar, Sanjay Kumar Singh, Amit Kumar Singh, Shrikant Tiwari, and Ravi Shankar Singh. 2018. Privacy preserving security using biometrics in cloud computing. Multimedia Tools and Applications 77, 9 (2018), 11017–11039. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Ankita Lathey and Pradeep K. Atrey. 2015. Image enhancement in encrypted domain over cloud. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 11, 3 (2015), 38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. David Megías and Amna Qureshi. 2017. Collusion-resistant and privacy-preserving P2P multimedia distribution based on recombined fingerprinting. Expert Systems with Applications 71 (2017), 147–172. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Teresa Mendonça, Pedro M. Ferreira, Jorge S. Marques, André R. S. Marcal, and Jorge Rozeira. 2013. PH 2-A dermoscopic image database for research and benchmarking. In Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). 5437–5440.Google ScholarGoogle Scholar
  18. Manoranjan Mohanty, Muhammad Rizwan Asghar, and Giovanni Russello. 2016. \(\): Image scaling and cropping in encrypted domains. IEEE Transactions on Information Forensics and Security 11, 11 (2016), 2542–2555. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Nathan Moroney. 2000. Local color correction using non-linear masking. In Proceedings of the Color and Imaging Conference. Society for Imaging Science and Technology, 108–111.Google ScholarGoogle Scholar
  20. Amitava Nag, Jyoti Prakash Singh, and Amit Kumar Singh. 2019. An efficient Boolean based multi-secret image sharing scheme. Multimedia Tools and Applications (2019), 1–25.Google ScholarGoogle Scholar
  21. J. Jesu Vedha Nayahi and V. Kavitha. 2017. Privacy and utility preserving data clustering for data anonymization and distribution on Hadoop. Future Generation Computer Systems 74 (2017), 393–408.Google ScholarGoogle ScholarCross RefCross Ref
  22. Lina Ni, Chao Li, Xiao Wang, Honglu Jiang, and Jiguo Yu. 2018. DP-MCDBSCAN: Differential privacy preserving multi-core DBSCAN clustering for network user data. IEEE Access 6 (2018), 21053–21063.Google ScholarGoogle ScholarCross RefCross Ref
  23. Şaban Öztürk and Umut Özkaya. 2020. Skin lesion segmentation with improved convolutional neural network. Journal of Digital Imaging (2020).Google ScholarGoogle Scholar
  24. Pascal Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 223–238. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Hongping Pang and Baocang Wang. 2020. Privacy-preserving association rule mining using homomorphic encryption in a multikey environment. IEEE Systems Journal (2020).Google ScholarGoogle ScholarCross RefCross Ref
  26. Sankita Patel, Sweta Garasia, and Devesh Jinwala. 2012. An efficient approach for privacy preserving distributed K-means clustering based on shamir’s secret sharing scheme. In Proceedings of the IFIP International Conference on Trust Management. Springer, 129–141.Google ScholarGoogle ScholarCross RefCross Ref
  27. A. J. Paverd, Andrew Martin, and Ian Brown. 2014. Modelling and automatically analysing privacy properties for honest-but-curious adversaries. University of Oxford, Tech. Rep (2014).Google ScholarGoogle Scholar
  28. Nikolaos Polatidis, Christos K. Georgiadis, Elias Pimenidis, and Haralambos Mouratidis. 2017. Privacy-preserving collaborative recommendations based on random perturbations. Expert Systems with Applications 71 (2017), 18–25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Amitesh Singh Rajput and Balasubramanian Raman. 2018. Cloud based image color transfer and storage in encrypted domain. Multimedia Tools and Applications 77, 16 (2018), 21509–21537. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Aqeel Sahi, David Lai, and Yan Li. 2016. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan. Computers in Biology and Medicine 78 (2016), 1–8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Adi Shamir. 1979. How to share a secret. Commun. ACM 22, 11 (1979), 612–613. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Amit Kumar Singh. 2017. Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images. Multimedia Tools and Applications 76, 6 (2017), 8881–8900. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Priyanka Singh, Balasubramanian Raman, and Nishant Agarwal. 2018. Toward encrypted video tampering detection and localization based on POB number system over cloud. IEEE Transactions on Circuits and Systems for Video Technology 28(9), 9 (2018), 2116–2130.Google ScholarGoogle ScholarCross RefCross Ref
  34. A. Sreekumar and S. B. Sundar. 2009. An efficient secret sharing scheme for n out of n scheme using pob-number system. In Proc. Hack. 33.Google ScholarGoogle Scholar
  35. N. Z. Tajeddin and B. M. Asl. 2016. A general algorithm for automatic lesion segmentation in dermoscopy images. In Proceedings of the 23rd Iranian Conference on Biomedical Engineering. 134–139.Google ScholarGoogle Scholar
  36. Philipp Tschandl, Christoph Sinz, and Harald Kittler. 2019. Domain-specific classification-pretrained fully convolutional network encoders for skin lesion segmentation. Computers in Biology and Medicine 104 (2019), 111–116.Google ScholarGoogle ScholarCross RefCross Ref
  37. Kai Xing, Chunqiang Hu, Jiguo Yu, Xiuzhen Cheng, and Fengjuan Zhang. 2017. Mutual privacy preserving \(\)-means clustering in social participatory sensing. IEEE Transactions on Industrial Informatics 13, 4 (2017), 2066–2076.Google ScholarGoogle ScholarCross RefCross Ref
  38. Ji-Jiang Yang, Jian-Qiang Li, and Yu Niu. 2015. A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Generation Computer Systems 43 (2015), 74–86. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. L. Yu, H. Chen, Q. Dou, J. Qin, and P. Heng. 2017. Automated melanoma recognition in dermoscopy images via very deep residual networks. IEEE Transactions on Medical Imaging 36, 4 (2017), 994–1004.Google ScholarGoogle ScholarCross RefCross Ref
  40. Y. Yuan, M. Chao, and Y. Lo. 2017. Automatic skin lesion segmentation using deep fully convolutional networks with Jaccard distance. IEEE Transactions on Medical Imaging 36, 9 (2017), 1876–1886.Google ScholarGoogle ScholarCross RefCross Ref
  41. Yading Yuan and Yeh-Chi Lo. 2017. Improving dermoscopic image segmentation with enhanced convolutional-deconvolutional networks. IEEE Journal of Biomedical and Health Informatics (2017).Google ScholarGoogle Scholar
  42. Jiale Zhang, Yanchao Zhao, Jie Wu, and Bing Chen. 2020. LVPDA: A lightweight and verifiable privacy-preserving data aggregation scheme for edge-enabled IoT. IEEE Internet of Things Journal 7, 5 (2020), 4016–4027.Google ScholarGoogle ScholarCross RefCross Ref
  43. Qingchen Zhang, Laurence T. Yang, Zhikui Chen, and Peng Li. 2017. PPHOPCM: Privacy-preserving high-order possibilistic c-means algorithm for big data clustering with cloud computing. IEEE Transactions on Big Data, doi=10.1109/TBDATA.2017.2701816 (2017).Google ScholarGoogle Scholar
  44. Xuyun Zhang, Laurence T. Yang, Chang Liu, and Jinjun Chen. 2014. A scalable two-phase top-down specialization approach for data anonymization using mapreduce on cloud. IEEE Transactions on Parallel and Distributed Systems 25, 2 (2014), 363–373. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Zhili Zhou, Yunlong Wang, Q. M. Jonathan Wu, Ching-Nung Yang, and Xingming Sun. 2016. Effective and efficient global context verification for image copy detection. IEEE Transactions on Information Forensics and Security 12, 1 (2016), 48–63. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. -Score-Based Secure Biomedical Model for Effective Skin Lesion Segmentation Over eHealth Cloud

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Multimedia Computing, Communications, and Applications
      ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 17, Issue 2s
      June 2021
      349 pages
      ISSN:1551-6857
      EISSN:1551-6865
      DOI:10.1145/3465440
      Issue’s Table of Contents

      Copyright © 2021 Association for Computing Machinery.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 June 2021
      • Revised: 1 October 2020
      • Accepted: 1 October 2020
      • Received: 1 June 2020
      Published in tomm Volume 17, Issue 2s

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!