TDADL-IE: A Deep Learning-Driven Cryptographic Architecture for Medical Image Security
- URL: http://arxiv.org/abs/2510.11301v1
- Date: Mon, 13 Oct 2025 11:47:55 GMT
- Title: TDADL-IE: A Deep Learning-Driven Cryptographic Architecture for Medical Image Security
- Authors: Junhua Zhou, Quanjun Li, Weixuan Li, Guang Yu, Yihua Shao, Yihang Dong, Mengqian Wang, Zimeng Li, Changwei Gong, Xuhang Chen,
- Abstract summary: Digital medical imaging, like MRI and CT, demands strong encryption to protect patient data in telemedicine and cloud storage.<n>Chaotic systems are popular for image encryption due to their sensitivity and unique characteristics, but existing methods often lack sufficient security.<n>This paper presents the Three-dimensional Diffusion Algorithm and Deep Learning Image Encryption system (TDADL-IE), built on three key elements.
- Score: 7.607394734101082
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The rise of digital medical imaging, like MRI and CT, demands strong encryption to protect patient data in telemedicine and cloud storage. Chaotic systems are popular for image encryption due to their sensitivity and unique characteristics, but existing methods often lack sufficient security. This paper presents the Three-dimensional Diffusion Algorithm and Deep Learning Image Encryption system (TDADL-IE), built on three key elements. First, we propose an enhanced chaotic generator using an LSTM network with a 1D-Sine Quadratic Chaotic Map (1D-SQCM) for better pseudorandom sequence generation. Next, a new three-dimensional diffusion algorithm (TDA) is applied to encrypt permuted images. TDADL-IE is versatile for images of any size. Experiments confirm its effectiveness against various security threats. The code is available at \href{https://github.com/QuincyQAQ/TDADL-IE}{https://github.com/QuincyQAQ/TDADL-IE}.
Related papers
- Elevating Medical Image Security: A Cryptographic Framework Integrating Hyperchaotic Map and GRU [14.484738921223352]
Chaotic systems play a key role in modern image encryption due to their sensitivity to initial conditions, ergodicity, and complex dynamics.<n>This paper presents Kun-IE, a novel encryption framework designed to address these issues.<n>The framework features two key contributions: the development of the 2D Sin-Cos Pi Hyperchaotic Map, and the introduction of Kun-SCAN, a novel permutation strategy.
arXiv Detail & Related papers (2025-10-14T02:48:07Z) - Image Encryption Scheme Based on Hyper-Chaotic Map and Self-Adaptive Diffusion [0.5279475826661642]
This paper proposes an innovative image encryption scheme that integrates a novel 2D hyper-chaotic map with a newly developed self-adaptive diffusion method.<n>Results show that the proposed image encryption scheme significantly outperforms current state-of-the-art image encryption techniques.
arXiv Detail & Related papers (2025-09-08T14:42:41Z) - Modality-Aware Feature Matching: A Comprehensive Review of Single- and Cross-Modality Techniques [91.26187560114381]
Feature matching is a cornerstone task in computer vision, essential for applications such as image retrieval, stereo matching, 3D reconstruction, and SLAM.<n>This survey comprehensively reviews modality-based feature matching, exploring traditional handcrafted methods and contemporary deep learning approaches.
arXiv Detail & Related papers (2025-07-30T15:56:36Z) - DICOM Compatible, 3D Multimodality Image Encryption using Hyperchaotic Signal [0.0]
Medical image encryption plays an important role in protecting sensitive health information from cyberattacks and unauthorized access.<n>In this paper, we introduce a secure and robust encryption scheme that is multi-modality compatible.<n>The encryption starts by taking DICOM image as input, then padding to increase the image area.
arXiv Detail & Related papers (2025-04-29T12:11:23Z) - Deep Learning and Chaos: A combined Approach To Image Encryption and Decryption [1.8749305679160366]
We introduce a novel image encryption and decryption algorithm using hyperchaotic signals from the novel 3D hyperchaotic map, 2D memristor map, Convolutional Neural Network (CNN)
The robustness of the encryption algorithm is shown by key sensitivity analysis, i.e., the average sensitivity of the algorithm to key elements.
arXiv Detail & Related papers (2024-06-24T16:56:22Z) - QMedShield: A Novel Quantum Chaos-based Image Encryption Scheme for Secure Medical Image Storage in the Cloud [0.0]
Storage of medical images in third-party cloud services raises privacy and security concerns.
We introduce a novel quantum chaos-based encryption scheme for medical images in this article.
The proposed scheme has been evaluated using multiple statistical measures and validated against more attacks.
arXiv Detail & Related papers (2024-05-15T08:56:16Z) - Generative Enhancement for 3D Medical Images [74.17066529847546]
We propose GEM-3D, a novel generative approach to the synthesis of 3D medical images.
Our method begins with a 2D slice, noted as the informed slice to serve the patient prior, and propagates the generation process using a 3D segmentation mask.
By decomposing the 3D medical images into masks and patient prior information, GEM-3D offers a flexible yet effective solution for generating versatile 3D images.
arXiv Detail & Related papers (2024-03-19T15:57:04Z) - MITS-GAN: Safeguarding Medical Imaging from Tampering with Generative Adversarial Networks [48.686454485328895]
This study introduces MITS-GAN, a novel approach to prevent tampering in medical images.
The approach disrupts the output of the attacker's CT-GAN architecture by introducing finely tuned perturbations that are imperceptible to the human eye.
Experimental results on a CT scan demonstrate MITS-GAN's superior performance.
arXiv Detail & Related papers (2024-01-17T22:30:41Z) - Human-imperceptible, Machine-recognizable Images [76.01951148048603]
A major conflict is exposed relating to software engineers between better developing AI systems and distancing from the sensitive training data.
This paper proposes an efficient privacy-preserving learning paradigm, where images are encrypted to become human-imperceptible, machine-recognizable''
We show that the proposed paradigm can ensure the encrypted images have become human-imperceptible while preserving machine-recognizable information.
arXiv Detail & Related papers (2023-06-06T13:41:37Z) - Hiding Images in Deep Probabilistic Models [58.23127414572098]
We describe a different computational framework to hide images in deep probabilistic models.
Specifically, we use a DNN to model the probability density of cover images, and hide a secret image in one particular location of the learned distribution.
We demonstrate the feasibility of our SinGAN approach in terms of extraction accuracy and model security.
arXiv Detail & Related papers (2022-10-05T13:33:25Z) - Attentive Symmetric Autoencoder for Brain MRI Segmentation [56.02577247523737]
We propose a novel Attentive Symmetric Auto-encoder based on Vision Transformer (ViT) for 3D brain MRI segmentation tasks.
In the pre-training stage, the proposed auto-encoder pays more attention to reconstruct the informative patches according to the gradient metrics.
Experimental results show that our proposed attentive symmetric auto-encoder outperforms the state-of-the-art self-supervised learning methods and medical image segmentation models.
arXiv Detail & Related papers (2022-09-19T09:43:19Z) - Two-Stream Graph Convolutional Network for Intra-oral Scanner Image
Segmentation [133.02190910009384]
We propose a two-stream graph convolutional network (i.e., TSGCN) to handle inter-view confusion between different raw attributes.
Our TSGCN significantly outperforms state-of-the-art methods in 3D tooth (surface) segmentation.
arXiv Detail & Related papers (2022-04-19T10:41:09Z) - DeepEDN: A Deep Learning-based Image Encryption and Decryption Network
for Internet of Medical Things [11.684981995633304]
Internet of Medical Things (IoMT) can connect many medical imaging equipments to the medical information network.
DeepEDN is proposed to fulfill the process of encrypting and decrypting the medical image.
The proposed method can achieve a high level of security with a good performance in efficiency.
arXiv Detail & Related papers (2020-04-12T01:42:47Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.