skip to main content
research-article

CryptoLesion: A Privacy-preserving Model for Lesion Segmentation Using Whale Optimization over Cloud

Authors Info & Claims
Published:11 June 2020Publication History
Skip Abstract Section

Abstract

The low-cost, accessing flexibility, agility, and mobility of cloud infrastructures have attracted medical organizations to store their high-resolution data in encrypted form. Besides storage, these infrastructures provide various image processing services for plain (non-encrypted) images. Meanwhile, the privacy and security of uploaded data depend upon the reliability of the service provider(s). The enforcement of laws towards privacy policies in health-care organizations, for not disclosing their patient’s sensitive and private medical information, restrict them to utilize these services. To address these privacy concerns for melanoma detection, we propose CryptoLesion, a privacy-preserving model for segmenting lesion region using whale optimization algorithm (WOA) over the cloud in the encrypted domain (ED). The user’s image is encrypted using a permutation ordered binary number system and a random stumble matrix. The task of segmentation is accomplished by dividing an encrypted image into a pre-defined number of clusters whose optimal centroids are obtained by WOA in ED, followed by the assignment of each pixel of an encrypted image to the unique centroid. The qualitative and quantitative analysis of CryptoLesion is evaluated over publicly available datasets provided in The International Skin Imaging Collaboration Challenges in 2016, 2017, 2018, and PH2 dataset. The segmented results obtained by CryptoLesion are found to be comparable with the winners of respective challenges. CryptoLesion is proved to be secure from a probabilistic viewpoint and various cryptographic attacks. To the best of our knowledge, CryptoLesion is first moving towards the direction of lesion segmentation in ED.

Skip Supplemental Material Section

Supplemental Material

References

  1. Euijoon Ahn, Jinman Kim, Lei Bi, Ashnil Kumar, Changyang Li, Michael Fulham, and David Dagan Feng. 2017. Saliency-based lesion segmentation via background detection in dermoscopic images. IEEE J. Biomed. Health Inf. 21, 6 (2017), 1685--1693.Google ScholarGoogle Scholar
  2. David Arthur and Sergei Vassilvitskii. 2007. k-means++: The advantages of careful seeding. In Proceedings of the 18th ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, 1027--1035.Google ScholarGoogle Scholar
  3. Catarina Barata, Margarida Ruela, Mariana Francisco, Teresa Mendonça, and Jorge S. Marques. 2013. Two systems for the detection of melanomas in dermoscopy images using texture and color features. IEEE Syst. J. 8, 3 (2013), 965--979.Google ScholarGoogle Scholar
  4. Matt Berseth. 2017. Isic 2017-skin lesion analysis towards melanoma detection. arXiv preprint arXiv:1703.00523 (2017).Google ScholarGoogle Scholar
  5. Marcelo Bertalmio, Andrea L. Bertozzi, and Guillermo Sapiro. 2001. Navier-stokes, fluid dynamics, and image and video inpainting. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Vol. 1. IEEE, I--I. DOI:https://doi.org/10.1109/CVPR.2001.990497Google ScholarGoogle ScholarCross RefCross Ref
  6. Ch Hima Bindu and K. Satya Prasad. 2012. An efficient medical image segmentation using conventional OTSU method. Int. J. Adv. Sci. Technol. 38, 1 (2012), 67--74.Google ScholarGoogle Scholar
  7. Z. Brakerski, C. Gentry, and V. Vaikuntanathan. 2014. (Leveled) fully homomorphic encryption without bootstrapping. ACM Trans. Comput. Theor. 6, 3 (2014), 13. DOI:https://doi.org/10.1145/2633600Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ratna Kumari Challa, G. Vijaya Kumari, and B. Sunny. 2015. Secure image processing using LWE based homomorphic encryption. In Proceedings of the IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT’15). IEEE, 1--6.Google ScholarGoogle Scholar
  9. Victor Chang. 2018. Data analytics and visualization for inspecting cancers and genes. Multimedia Tools Applic. 77, 14 (2018), 17693--17707.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. K. Y. Chu, Y. H. Kuo, and W. H. Hsu. 2013. Real-time privacy-preserving moving object detection in the cloud. In Proceedings of the ACM Conference on Multimedia. ACM, 597--600. DOI:https://doi.org/10.1145/2502081.2502157Google ScholarGoogle Scholar
  11. Noel C. F. Codella, David Gutman, M. Emre Celebi, Brian Helba, Michael A. Marchetti, Stephen W. Dusza, Aadi Kalloo, Konstantinos Liopyris, Nabin Mishra, Harald Kittler, et al. 2018. Skin lesion analysis toward melanoma detection: A challenge at the 2017 International Symposium on Biomedical Imaging (ISBI), hosted by the International Skin Imaging Collaboration (ISIC). In Proceedings of the International Symposium on Biomedical Imaging. IEEE, 168--172.Google ScholarGoogle ScholarCross RefCross Ref
  12. D. S. Dummit and R. M. Foote. 2004. Abstract Algebra. Vol. 3. Wiley Hoboken.Google ScholarGoogle Scholar
  13. Mohamed Abd El Aziz, Ahmed A. Ewees, and Aboul Ella Hassanien. 2017. Whale optimization algorithm and moth-flame optimization for multilevel thresholding image segmentation. Exp. Syst. Applic. 83 (2017), 242--256.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Haidi Fan, Fengying Xie, Yang Li, Zhiguo Jiang, and Jie Liu. 2017. Automatic segmentation of dermoscopy images using saliency combined with Otsu threshold. Comput. Biol. Med. 85 (2017), 75--85.Google ScholarGoogle ScholarCross RefCross Ref
  15. C. Fu, J. J. Chen, H. Zou, W. H. Meng, Y. F. Zhan, and Y. W. Yu. 2012. A chaos-based digital image encryption scheme with an improved diffusion strategy. Optics Exp. 20, 3 (2012), 2363--2378. DOI:https://doi.org/10.1364/OE.20.002363Google ScholarGoogle ScholarCross RefCross Ref
  16. Pedram Ghamisi, Micael S. Couceiro, Jón Atli Benediktsson, and Nuno M. F. Ferreira. 2012. An efficient method for segmentation of images based on fractional calculus and natural selection. Exp. Syst. Applic. 39, 16 (2012), 12407--12417.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Chao-Yung Hsu, Chun-Shien Lu, and Soo-Chang Pei. 2012. Image feature extraction in encrypted domain with privacy-preserving SIFT. IEEE Trans. Image Proc. 21, 11 (2012), 4593--4607. DOI:https://doi.org/10.1109/TIP.2012.2204272Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Xianjun Hu, Weiming Zhang, Honggang Hu, and Nenghai Yu. 2014. Non-local denoising in encrypted images. In Proceedings of the International Conference on Internet of Vehicles. Springer, 386--395. DOI:https://doi.org/10.1007/978-3-319-11167-4_38Google ScholarGoogle ScholarCross RefCross Ref
  19. P. T. Jackway. 2000. Improved morphological top-hat. Electron. Lett. 36, 14 (2000), 1194--1195.Google ScholarGoogle ScholarCross RefCross Ref
  20. Mostafa Jahanifar, Neda Zamani Tajeddin, Babak Mohammadzadeh Asl, and Ali Gooya. 2018. Supervised saliency map driven segmentation of lesions in dermoscopic images. IEEE J. Biomed. Health Inf. 23, 2 (2018), 509--518.Google ScholarGoogle Scholar
  21. Anil K. Jain. 1989. Fundamentals of Digital Image Processing. Prentice Hall, Englewood Cliffs, NJ. DOI:https://doi.org/handle/DHTL_123456789/4044Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Adán José-García and Wilfrido Gómez-Flores. 2016. Automatic clustering using nature-inspired metaheuristics: A survey. Appl. Soft Comput. 41 (2016), 192--213.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Navid Alemi Koohbanani, Mostafa Jahanifar, Neda Zamani Tajeddin, Ali Gooya, and Nasir M. Rajpoot. 2018. Leveraging transfer learning for segmenting lesions and their attributes in dermoscopy images. ArXiv abs/1809.10243 (2018).Google ScholarGoogle Scholar
  24. V. S. Lakshmi and P. P. Deepthi. 2019. An efficient scheme for secure domain medical image fusion over cloud. Multimedia Tools Applic. 78, 15 (2019), 20609--20636.Google ScholarGoogle ScholarCross RefCross Ref
  25. A. Lathey and P. K. Atrey. 2015. Image enhancement in encrypted domain over cloud. ACM Trans. Multimedia Comput. Commun. Applic. 11, 3 (2015), 38. DOI:https://doi.org/10.1145/2656205Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Ankita Lathey, Pradeep K. Atrey, and Nishant Joshi. 2013. Homomorphic low pass filtering on encrypted multimedia over cloud. In Proceedings of the International Conference on Semantic Computing. IEEE, 310--313. DOI:https://doi.org/10.1109/ICSC.2013.60Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Tao Lei, Xiaohong Jia, Yanning Zhang, Lifeng He, Hongying Meng, and Asoke K. Nandi. 2018. Significantly fast and robust fuzzy c-means clustering algorithm based on morphological reconstruction and membership filtering. IEEE Trans. Fuzzy Syst. 26, 5 (2018), 3027--3041.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Dongmei Li, Xiaolei Dong, Zhenfu Cao, and Haijiang Wang. 2019. Privacy-preserving outsourced image feature extraction. J. Inf. Secur. Applic. 47 (2019), 59--64.Google ScholarGoogle Scholar
  29. Ming Li, Yuzhu Guo, Jie Huang, and Yang Li. 2018. Cryptanalysis of a chaotic image encryption scheme based on permutation-diffusion structure. Sig. Proc.: Image Commun. 62 (2018), 164--172.Google ScholarGoogle ScholarCross RefCross Ref
  30. Yuexiang Li and Linlin Shen. 2018. Skin lesion analysis towards melanoma detection using deep learning network. Sensors 18, 2 (2018), 556.Google ScholarGoogle Scholar
  31. Jonathan Long, Evan Shelhamer, and Trevor Darrell. 2015. Fully convolutional networks for semantic segmentation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 3431--3440.Google ScholarGoogle ScholarCross RefCross Ref
  32. Haiping Ma, Shigen Shen, Mei Yu, Zhile Yang, Minrui Fei, and Huiyu Zhou. 2019. Multi-population techniques in nature inspired optimization algorithms: A comprehensive survey. Swarm Evol. Comput. 44 (2019), 365--387.Google ScholarGoogle ScholarCross RefCross Ref
  33. Ahmed B. Mahmood and Robert D. Dony. 2011. Segmentation based encryption method for medical images. In Proceedings of the International Conference for Internet Technology and Secured Transactions. IEEE, 596--601.Google ScholarGoogle Scholar
  34. Paulo Martins, Leonel Sousa, and Artur Mariano. 2018. A survey on fully homomorphic encryption: An engineering perspective. ACM Comput. Surv. 50, 6 (2018), 83.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Mbarek Marwan, Ali Kartit, and Hassan Ouahmane. 2017. A new medical image processing approach for the security of cloud services. In Proceedings of the 1st International Conference on Real Time Intelligent Systems. Springer, 378--392.Google ScholarGoogle Scholar
  36. T. Mendoncÿa, P. M. Ferreira, J. Marques, A. R. S. Marcÿal, and J. Rozeira. 2013. A dermoscopic image database for research and benchmarking. In Proceedings of the International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC’13).Google ScholarGoogle Scholar
  37. S. Mirjalili and A. Lewis. 2016. The whale optimization algorithm. Adv. Eng. Softw. 95 (2016), 51--67. DOI:https://doi.org/10.1016/j.advengsoft.2016.01.008Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Nabin K. Mishra and M. Emre Celebi. 2016. An overview of melanoma detection in dermoscopy images using image processing and machine learning. arXiv preprint arXiv:1601.07843 (2016).Google ScholarGoogle Scholar
  39. Abdalla Mostafa, Aboul Ella Hassanien, Mohamed Houseni, and Hesham Hefny. 2017. Liver segmentation in MRI images based on whale optimization algorithm. Multimedia Tools Applic. 76, 23 (2017), 24931--24954.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, and Fernando Pérez-González. 2016. Image denoising in the encrypted domain. In Proceedings of the International Workshop on Information Forensics and Security. IEEE, 1--6. DOI:https://doi.org/10.1109/WIFS.2016.7823916Google ScholarGoogle ScholarCross RefCross Ref
  41. Andrea Pennisi, Domenico D. Bloisi, Daniele Nardi, Anna Rita Giampetruzzi, Chiara Mondino, and Antonio Facchiano. 2016. Skin lesion image segmentation using Delaunay Triangulation for melanoma detection. Comput. Med. Imag. Graph. 52 (2016), 89--103.Google ScholarGoogle ScholarCross RefCross Ref
  42. Mario Preishuber, Thomas Hütter, Stefan Katzenbeisser, and Andreas Uhl. 2018. Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans. Inf. Forens. Secur. 13, 9 (2018), 2137--2150.Google ScholarGoogle ScholarCross RefCross Ref
  43. Amitesh Singh Rajput and Balasubramanian Raman. 2018. CryptoCT: Towards privacy preserving color transfer and storage over cloud. Multimedia Tools Applic. 77, 18 (2018), 24223–24245.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Sayed M. SaghaianNejadEsfahani, Ying Luo, and S-c. S. Cheung. 2012. Privacy protected image denoising with secret shares. In Proceedings of the 19th IEEE International Conference on Image Processing (ICIP’12). IEEE, 253--256. DOI:https://doi.org/10.1109/ICIP.2012.6466843Google ScholarGoogle ScholarCross RefCross Ref
  45. Selva. 2019. Color image segmentation using genetic algorithm(clustering). MATLAB Central File Exchange (2019). Retrieved from https://www.mathworks.com/matlabcentral/fileexchange/64223-color-image-segmentationusing-genetic-algorithm-clustering.Google ScholarGoogle Scholar
  46. Priyanka Singh, Balasubramanian Raman, and Nishant Agarwal. 2018. Toward encrypted video tampering detection and localization based on POB number system over cloud. IEEE Trans. Circ. Syst. Vid. Technol. 28, 9 (2018), 2116--2130.Google ScholarGoogle ScholarCross RefCross Ref
  47. Priyanka Singh, Balasubramanian Raman, Nishant Agarwal, and Pradeep K. Atrey. 2017. Secure cloud-based image tampering detection and localization using POB number system. ACM Trans. Multimedia Comput. Commun. Applic. 13, 3 (2017), 23.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. A. Sreekumar and S. B. Sundar. 2009. An efficient secret sharing scheme for n out of n scheme using POB-number system. Hack. in 2009 (2009), 33.Google ScholarGoogle Scholar
  49. Neda Zamani Tajeddin and Babak Mohammadzadeh Asl. 2016. A general algorithm for automatic lesion segmentation in dermoscopy images. In Proceedings of the International Iranian Conference on Biomedical Engineering. IEEE, 134--139.Google ScholarGoogle ScholarCross RefCross Ref
  50. Vishesh Kumar Tanwar, Amitesh Singh Rajput, Balasubramanian Raman, and Rama Bhargava. 2018. Privacy preserving image scaling using 2D bicubic interpolation over the cloud. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics (SMC’18). IEEE, 2073--2078.Google ScholarGoogle ScholarCross RefCross Ref
  51. L. Teng and X. Wang. 2012. A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive. Optics Commun. 285, 20 (2012), 4048--4054. DOI:https://doi.org/10.1016/j.optcom.2012.06.004Google ScholarGoogle ScholarCross RefCross Ref
  52. R. C. W. Phan, Y. Rahulamathavan, J. A. Chambers, and D. J. Parish. 2013. Facial expression recognition in the encrypted domain based on local fisher discriminant analysis. IEEE Trans. Affect. Comput. 4, 1 (2013), 83--92. DOI:https://doi.org/10.1109/T-AFFC.2012.33Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. W. Q. Yan and M. S. Kankanhalli. 2015. Face search in encrypted domain. In Proceedings of the Pacific Rim Symposium on Image and Video Technology. Springer, 775--790. DOI:https://doi.org/10.1007/978-3-319-29451-3_61Google ScholarGoogle Scholar
  54. X. Yi and Y. Zhang. 2013. Equally contributory privacy-preserving k-means clustering over vertically partitioned data. Inf. Syst. 38, 1 (2013), 97--107. DOI:https://doi.org/10.1016/j.is.2012.06.001Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Lequan Yu, Hao Chen, Qi Dou, Jing Qin, and Pheng-Ann Heng. 2016. Automated melanoma recognition in dermoscopy images via very deep residual networks. IEEE Trans. Med. Imag. 36, 4 (2016), 994--1004.Google ScholarGoogle ScholarCross RefCross Ref
  56. Zhiding Yu, Weiyu Yu, Ruobing Zou, and Simin Yu. 2009. On ACO-based fuzzy clustering for image segmentation. In Proceedings of the International Symposium on Neural Networks. Springer, 717--726.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Yading Yuan, Ming Chao, and Yeh-Chi Lo. 2017. Automatic skin lesion segmentation using deep fully convolutional networks with Jaccard distance. IEEE Trans. Med. Imag. 36, 9 (2017), 1876--1886.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. CryptoLesion: A Privacy-preserving Model for Lesion Segmentation Using Whale Optimization over Cloud

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!