Abstract
The low-cost, accessing flexibility, agility, and mobility of cloud infrastructures have attracted medical organizations to store their high-resolution data in encrypted form. Besides storage, these infrastructures provide various image processing services for plain (non-encrypted) images. Meanwhile, the privacy and security of uploaded data depend upon the reliability of the service provider(s). The enforcement of laws towards privacy policies in health-care organizations, for not disclosing their patient’s sensitive and private medical information, restrict them to utilize these services. To address these privacy concerns for melanoma detection, we propose CryptoLesion, a privacy-preserving model for segmenting lesion region using whale optimization algorithm (WOA) over the cloud in the encrypted domain (ED). The user’s image is encrypted using a permutation ordered binary number system and a random stumble matrix. The task of segmentation is accomplished by dividing an encrypted image into a pre-defined number of clusters whose optimal centroids are obtained by WOA in ED, followed by the assignment of each pixel of an encrypted image to the unique centroid. The qualitative and quantitative analysis of CryptoLesion is evaluated over publicly available datasets provided in The International Skin Imaging Collaboration Challenges in 2016, 2017, 2018, and PH2 dataset. The segmented results obtained by CryptoLesion are found to be comparable with the winners of respective challenges. CryptoLesion is proved to be secure from a probabilistic viewpoint and various cryptographic attacks. To the best of our knowledge, CryptoLesion is first moving towards the direction of lesion segmentation in ED.
Supplemental Material
Available for Download
Supplemental movie, appendix, image and software files for, CryptoLesion: A Privacy-preserving Model for Lesion Segmentation Using Whale Optimization over Cloud
- Euijoon Ahn, Jinman Kim, Lei Bi, Ashnil Kumar, Changyang Li, Michael Fulham, and David Dagan Feng. 2017. Saliency-based lesion segmentation via background detection in dermoscopic images. IEEE J. Biomed. Health Inf. 21, 6 (2017), 1685--1693.Google Scholar
- David Arthur and Sergei Vassilvitskii. 2007. k-means++: The advantages of careful seeding. In Proceedings of the 18th ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, 1027--1035.Google Scholar
- Catarina Barata, Margarida Ruela, Mariana Francisco, Teresa Mendonça, and Jorge S. Marques. 2013. Two systems for the detection of melanomas in dermoscopy images using texture and color features. IEEE Syst. J. 8, 3 (2013), 965--979.Google Scholar
- Matt Berseth. 2017. Isic 2017-skin lesion analysis towards melanoma detection. arXiv preprint arXiv:1703.00523 (2017).Google Scholar
- Marcelo Bertalmio, Andrea L. Bertozzi, and Guillermo Sapiro. 2001. Navier-stokes, fluid dynamics, and image and video inpainting. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Vol. 1. IEEE, I--I. DOI:https://doi.org/10.1109/CVPR.2001.990497Google Scholar
Cross Ref
- Ch Hima Bindu and K. Satya Prasad. 2012. An efficient medical image segmentation using conventional OTSU method. Int. J. Adv. Sci. Technol. 38, 1 (2012), 67--74.Google Scholar
- Z. Brakerski, C. Gentry, and V. Vaikuntanathan. 2014. (Leveled) fully homomorphic encryption without bootstrapping. ACM Trans. Comput. Theor. 6, 3 (2014), 13. DOI:https://doi.org/10.1145/2633600Google Scholar
Digital Library
- Ratna Kumari Challa, G. Vijaya Kumari, and B. Sunny. 2015. Secure image processing using LWE based homomorphic encryption. In Proceedings of the IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT’15). IEEE, 1--6.Google Scholar
- Victor Chang. 2018. Data analytics and visualization for inspecting cancers and genes. Multimedia Tools Applic. 77, 14 (2018), 17693--17707.Google Scholar
Digital Library
- K. Y. Chu, Y. H. Kuo, and W. H. Hsu. 2013. Real-time privacy-preserving moving object detection in the cloud. In Proceedings of the ACM Conference on Multimedia. ACM, 597--600. DOI:https://doi.org/10.1145/2502081.2502157Google Scholar
- Noel C. F. Codella, David Gutman, M. Emre Celebi, Brian Helba, Michael A. Marchetti, Stephen W. Dusza, Aadi Kalloo, Konstantinos Liopyris, Nabin Mishra, Harald Kittler, et al. 2018. Skin lesion analysis toward melanoma detection: A challenge at the 2017 International Symposium on Biomedical Imaging (ISBI), hosted by the International Skin Imaging Collaboration (ISIC). In Proceedings of the International Symposium on Biomedical Imaging. IEEE, 168--172.Google Scholar
Cross Ref
- D. S. Dummit and R. M. Foote. 2004. Abstract Algebra. Vol. 3. Wiley Hoboken.Google Scholar
- Mohamed Abd El Aziz, Ahmed A. Ewees, and Aboul Ella Hassanien. 2017. Whale optimization algorithm and moth-flame optimization for multilevel thresholding image segmentation. Exp. Syst. Applic. 83 (2017), 242--256.Google Scholar
Digital Library
- Haidi Fan, Fengying Xie, Yang Li, Zhiguo Jiang, and Jie Liu. 2017. Automatic segmentation of dermoscopy images using saliency combined with Otsu threshold. Comput. Biol. Med. 85 (2017), 75--85.Google Scholar
Cross Ref
- C. Fu, J. J. Chen, H. Zou, W. H. Meng, Y. F. Zhan, and Y. W. Yu. 2012. A chaos-based digital image encryption scheme with an improved diffusion strategy. Optics Exp. 20, 3 (2012), 2363--2378. DOI:https://doi.org/10.1364/OE.20.002363Google Scholar
Cross Ref
- Pedram Ghamisi, Micael S. Couceiro, Jón Atli Benediktsson, and Nuno M. F. Ferreira. 2012. An efficient method for segmentation of images based on fractional calculus and natural selection. Exp. Syst. Applic. 39, 16 (2012), 12407--12417.Google Scholar
Digital Library
- Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei. 2012. Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Trans. Image Proc. 21, 11 (2012), 4593--4607. DOI:https://doi.org/10.1109/TIP.2012.2204272Google Scholar
Digital Library
- Xianjun Hu, Weiming Zhang, Honggang Hu, and Nenghai Yu. 2014. Non-local denoising in encrypted images. In Proceedings of the International Conference on Internet of Vehicles. Springer, 386--395. DOI:https://doi.org/10.1007/978-3-319-11167-4_38Google Scholar
Cross Ref
- P. T. Jackway. 2000. Improved morphological top-hat. Electron. Lett. 36, 14 (2000), 1194--1195.Google Scholar
Cross Ref
- Mostafa Jahanifar, Neda Zamani Tajeddin, Babak Mohammadzadeh Asl, and Ali Gooya. 2018. Supervised saliency map driven segmentation of lesions in dermoscopic images. IEEE J. Biomed. Health Inf. 23, 2 (2018), 509--518.Google Scholar
- Anil K. Jain. 1989. Fundamentals of Digital Image Processing. Prentice Hall, Englewood Cliffs, NJ. DOI:https://doi.org/handle/DHTL_123456789/4044Google Scholar
Digital Library
- Adán José-García and Wilfrido Gómez-Flores. 2016. Automatic clustering using nature-inspired metaheuristics: A survey. Appl. Soft Comput. 41 (2016), 192--213.Google Scholar
Digital Library
- Navid Alemi Koohbanani, Mostafa Jahanifar, Neda Zamani Tajeddin, Ali Gooya, and Nasir M. Rajpoot. 2018. Leveraging transfer learning for segmenting lesions and their attributes in dermoscopy images. ArXiv abs/1809.10243 (2018).Google Scholar
- V. S. Lakshmi and P. P. Deepthi. 2019. An efficient scheme for secure domain medical image fusion over cloud. Multimedia Tools Applic. 78, 15 (2019), 20609--20636.Google Scholar
Cross Ref
- A. Lathey and P. K. Atrey. 2015. Image enhancement in encrypted domain over cloud. ACM Trans. Multimedia Comput. Commun. Applic. 11, 3 (2015), 38. DOI:https://doi.org/10.1145/2656205Google Scholar
Digital Library
- Ankita Lathey, Pradeep K. Atrey, and Nishant Joshi. 2013. Homomorphic low pass filtering on encrypted multimedia over cloud. In Proceedings of the International Conference on Semantic Computing. IEEE, 310--313. DOI:https://doi.org/10.1109/ICSC.2013.60Google Scholar
Digital Library
- Tao Lei, Xiaohong Jia, Yanning Zhang, Lifeng He, Hongying Meng, and Asoke K. Nandi. 2018. Significantly fast and robust fuzzy c-means clustering algorithm based on morphological reconstruction and membership filtering. IEEE Trans. Fuzzy Syst. 26, 5 (2018), 3027--3041.Google Scholar
Digital Library
- Dongmei Li, Xiaolei Dong, Zhenfu Cao, and Haijiang Wang. 2019. Privacy-preserving outsourced image feature extraction. J. Inf. Secur. Applic. 47 (2019), 59--64.Google Scholar
- Ming Li, Yuzhu Guo, Jie Huang, and Yang Li. 2018. Cryptanalysis of a chaotic image encryption scheme based on permutation-diffusion structure. Sig. Proc.: Image Commun. 62 (2018), 164--172.Google Scholar
Cross Ref
- Yuexiang Li and Linlin Shen. 2018. Skin lesion analysis towards melanoma detection using deep learning network. Sensors 18, 2 (2018), 556.Google Scholar
- Jonathan Long, Evan Shelhamer, and Trevor Darrell. 2015. Fully convolutional networks for semantic segmentation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 3431--3440.Google Scholar
Cross Ref
- Haiping Ma, Shigen Shen, Mei Yu, Zhile Yang, Minrui Fei, and Huiyu Zhou. 2019. Multi-population techniques in nature inspired optimization algorithms: A comprehensive survey. Swarm Evol. Comput. 44 (2019), 365--387.Google Scholar
Cross Ref
- Ahmed B. Mahmood and Robert D. Dony. 2011. Segmentation based encryption method for medical images. In Proceedings of the International Conference for Internet Technology and Secured Transactions. IEEE, 596--601.Google Scholar
- Paulo Martins, Leonel Sousa, and Artur Mariano. 2018. A survey on fully homomorphic encryption: An engineering perspective. ACM Comput. Surv. 50, 6 (2018), 83.Google Scholar
Digital Library
- Mbarek Marwan, Ali Kartit, and Hassan Ouahmane. 2017. A new medical image processing approach for the security of cloud services. In Proceedings of the 1st International Conference on Real Time Intelligent Systems. Springer, 378--392.Google Scholar
- T. Mendoncÿa, P. M. Ferreira, J. Marques, A. R. S. Marcÿal, and J. Rozeira. 2013. A dermoscopic image database for research and benchmarking. In Proceedings of the International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC’13).Google Scholar
- S. Mirjalili and A. Lewis. 2016. The whale optimization algorithm. Adv. Eng. Softw. 95 (2016), 51--67. DOI:https://doi.org/10.1016/j.advengsoft.2016.01.008Google Scholar
Digital Library
- Nabin K. Mishra and M. Emre Celebi. 2016. An overview of melanoma detection in dermoscopy images using image processing and machine learning. arXiv preprint arXiv:1601.07843 (2016).Google Scholar
- Abdalla Mostafa, Aboul Ella Hassanien, Mohamed Houseni, and Hesham Hefny. 2017. Liver segmentation in MRI images based on whale optimization algorithm. Multimedia Tools Applic. 76, 23 (2017), 24931--24954.Google Scholar
Digital Library
- Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, and Fernando Pérez-González. 2016. Image denoising in the encrypted domain. In Proceedings of the International Workshop on Information Forensics and Security. IEEE, 1--6. DOI:https://doi.org/10.1109/WIFS.2016.7823916Google Scholar
Cross Ref
- Andrea Pennisi, Domenico D. Bloisi, Daniele Nardi, Anna Rita Giampetruzzi, Chiara Mondino, and Antonio Facchiano. 2016. Skin lesion image segmentation using Delaunay Triangulation for melanoma detection. Comput. Med. Imag. Graph. 52 (2016), 89--103.Google Scholar
Cross Ref
- Mario Preishuber, Thomas Hütter, Stefan Katzenbeisser, and Andreas Uhl. 2018. Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans. Inf. Forens. Secur. 13, 9 (2018), 2137--2150.Google Scholar
Cross Ref
- Amitesh Singh Rajput and Balasubramanian Raman. 2018. CryptoCT: Towards privacy preserving color transfer and storage over cloud. Multimedia Tools Applic. 77, 18 (2018), 24223–24245.Google Scholar
Digital Library
- Sayed M. SaghaianNejadEsfahani, Ying Luo, and S-c. S. Cheung. 2012. Privacy protected image denoising with secret shares. In Proceedings of the 19th IEEE International Conference on Image Processing (ICIP’12). IEEE, 253--256. DOI:https://doi.org/10.1109/ICIP.2012.6466843Google Scholar
Cross Ref
- Selva. 2019. Color image segmentation using genetic algorithm(clustering). MATLAB Central File Exchange (2019). Retrieved from https://www.mathworks.com/matlabcentral/fileexchange/64223-color-image-segmentationusing-genetic-algorithm-clustering.Google Scholar
- Priyanka Singh, Balasubramanian Raman, and Nishant Agarwal. 2018. Toward encrypted video tampering detection and localization based on POB number system over cloud. IEEE Trans. Circ. Syst. Vid. Technol. 28, 9 (2018), 2116--2130.Google Scholar
Cross Ref
- Priyanka Singh, Balasubramanian Raman, Nishant Agarwal, and Pradeep K. Atrey. 2017. Secure cloud-based image tampering detection and localization using POB number system. ACM Trans. Multimedia Comput. Commun. Applic. 13, 3 (2017), 23.Google Scholar
Digital Library
- A. Sreekumar and S. B. Sundar. 2009. An efficient secret sharing scheme for n out of n scheme using POB-number system. Hack. in 2009 (2009), 33.Google Scholar
- Neda Zamani Tajeddin and Babak Mohammadzadeh Asl. 2016. A general algorithm for automatic lesion segmentation in dermoscopy images. In Proceedings of the International Iranian Conference on Biomedical Engineering. IEEE, 134--139.Google Scholar
Cross Ref
- Vishesh Kumar Tanwar, Amitesh Singh Rajput, Balasubramanian Raman, and Rama Bhargava. 2018. Privacy preserving image scaling using 2D bicubic interpolation over the cloud. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics (SMC’18). IEEE, 2073--2078.Google Scholar
Cross Ref
- L. Teng and X. Wang. 2012. A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Optics Commun. 285, 20 (2012), 4048--4054. DOI:https://doi.org/10.1016/j.optcom.2012.06.004Google Scholar
Cross Ref
- R. C. W. Phan, Y. Rahulamathavan, J. A. Chambers, and D. J. Parish. 2013. Facial expression recognition in the encrypted domain based on local fisher discriminant analysis. IEEE Trans. Affect. Comput. 4, 1 (2013), 83--92. DOI:https://doi.org/10.1109/T-AFFC.2012.33Google Scholar
Digital Library
- W. Q. Yan and M. S. Kankanhalli. 2015. Face search in encrypted domain. In Proceedings of the Pacific Rim Symposium on Image and Video Technology. Springer, 775--790. DOI:https://doi.org/10.1007/978-3-319-29451-3_61Google Scholar
- X. Yi and Y. Zhang. 2013. Equally contributory privacy-preserving k-means clustering over vertically partitioned data. Inf. Syst. 38, 1 (2013), 97--107. DOI:https://doi.org/10.1016/j.is.2012.06.001Google Scholar
Digital Library
- Lequan Yu, Hao Chen, Qi Dou, Jing Qin, and Pheng-Ann Heng. 2016. Automated melanoma recognition in dermoscopy images via very deep residual networks. IEEE Trans. Med. Imag. 36, 4 (2016), 994--1004.Google Scholar
Cross Ref
- Zhiding Yu, Weiyu Yu, Ruobing Zou, and Simin Yu. 2009. On ACO-based fuzzy clustering for image segmentation. In Proceedings of the International Symposium on Neural Networks. Springer, 717--726.Google Scholar
Digital Library
- Yading Yuan, Ming Chao, and Yeh-Chi Lo. 2017. Automatic skin lesion segmentation using deep fully convolutional networks with Jaccard distance. IEEE Trans. Med. Imag. 36, 9 (2017), 1876--1886.Google Scholar
Cross Ref
Index Terms
CryptoLesion: A Privacy-preserving Model for Lesion Segmentation Using Whale Optimization over Cloud
Recommendations
A Generic Privacy Breach Preventing Methodology for Cloud Based Web Service
The present focuses on the Cloud storage services are having a critical issue in handling the user's private information and its confidentiality. The User data privacy preserving is a vital facet of online storage in cloud computing. The information in ...
Privacy preserving k-nearest neighbor classification over encrypted database in outsourced cloud environments
To utilize the cost-saving advantages of the cloud computing paradigm, individuals and enterprises increasingly resort to outsource their databases and data operations to cloud servers. However such solutions come with the risk of violating the privacy ...
A secure cloud storage system combining time-based one-time password and automatic blocker protocol
Cloud storages in cloud data centers can be used for enterprises and individuals to store and access their data remotely anywhere anytime without any additional burden. By data outsourcing, users can be relieved from the burden of local data storage and ...






Comments