| Literature DB >> 33323108 |
Jian Li1, Zelin Zhang1, Shengyu Li2, Ryan Benton2, Yulong Huang3, Mohan Vamsi Kasukurthi2, Dongqi Li2, Jingwei Lin4, Glen M Borchert5, Shaobo Tan2, Gang Li1, Bin Ma6, Meihong Yang7, Jingshan Huang8,9.
Abstract
BACKGROUND: Medical image data, like most patient information, have a strong requirement for privacy and confidentiality. This makes transmitting medical image data, within an open network, problematic, due to the aforementioned issues, along with the dangers of data/information leakage. Possible solutions in the past have included the utilization of information-hiding and image-encryption technologies; however, these methods can cause difficulties when attempting to recover the original images.Entities:
Keywords: Image segmentation; Key region; QR code; Reversible data hiding; Selective encryption; Texture complexity
Year: 2020 PMID: 33323108 PMCID: PMC7739464 DOI: 10.1186/s12911-020-01328-2
Source DB: PubMed Journal: BMC Med Inform Decis Mak ISSN: 1472-6947 Impact factor: 2.796
Fig. 1General structure diagram
Fig. 2QR code. This is an example of the QR code generated by the basic image information of a computerized tomography
Fig. 3Prediction error expansion (prediction error = [− 2, 2])
Fig. 6The encryption, decryption, and reduction of lung image
Fig. 7Key regions in brain image
Fig. 9The PSNR and SSIM values of the encrypted brain image
Fig. 10The PSNR and SSIM values of the encrypted lung image
Fig. 11The PSNR and SSIM values of the encrypted neck image
PSNR and SSIM of the encrypted image using different MSE range
| PSNR | SSIM | |
|---|---|---|
| [− 3,3] | 15.8565 | 0.6758 |
| [− 4,4] | 15.8363 | 0.6611 |
| [− 5,5] | 15.8150 | 0.6456 |
| [− 10,10] | 15.8436 | 0.7571 |
| [− 15,15] | 15.8184 | 0.7514 |
| [− 20,20] | 15.7992 | 0.7514 |
| [− 3,3] | 14.3019 | 0.7951 |
| [− 4,4] | 14.2845 | 0.7807 |
| [− 5,5] | 14.2662 | 0.7702 |
| [− 10,10] | 14.2635 | 0.8148 |
| [− 15,15] | 14.2327 | 0.8043 |
| [− 20,20] | 14.2118 | 0.7076 |
| [− 3,3] | 14.7991 | 0.7569 |
| [− 4,4] | 14.8151 | 0.8267 |
| [− 5,5] | 14.8070 | 0.8222 |
| [− 10,10] | 14.7692 | 0.8022 |
| [− 15,15] | 14.7416 | 0.7960 |
| [− 20,20] | 14.7219 | 0.7936 |
Comparison of data protection methods
| Size | Type | PSNR | |
|---|---|---|---|
| Proposed | 512 × 512 | Gray | 15.8565 |
| Goel and Chaudhari [ | 160 × 160 | Gray | 9.2895 |
| Abdel-Nabi and Al-Haj [ | 512 × 512 | Gray | 58.8066 |
Fig. 4Examples of original and encrypted images
Fig. 5The encryption, decryption, and reduction of key brain image regions
PSNR and SSIM of fully encrypted as well as restored medical images
| PSNR | SSIM | |
|---|---|---|
| Encryption | 13.8033 | 0.4250 |
| Decryption | 15.8551 | 0.6632 |
| Reduction | ∞ | 1 |
| Encryption | 12.9810 | 0.5404 |
| Decryption | 14.3018 | 0.7921 |
| Reduction | ∞ | 1 |
| Encryption | 13.2778 | 0.4613 |
| Decryption | 14.7978 | 0.7487 |
| Reduction | ∞ | 1 |
Fig. 8Key regions in lung images
PSNR and SSIM of authorized and unauthorized extraction of medical image key areas
| PSNR | SSIM | |
|---|---|---|
| Unauthorized | 7.8222 | 0.0093 |
| Authorized | ∞ | 1 |
| Unauthorized | 7.2152 | 0.0182 |
| Authorized | ∞ | 1 |
| Unauthorized | 7.0283 | 0.0060 |
| Authorized | ∞ | 1 |