Mathematical Problems in Engineering

Mathematical Problems in Engineering / 2020 / Article

Research Article | Open Access

Volume 2020 |Article ID 7982192 | https://doi.org/10.1155/2020/7982192

Dezhi An, Jun Lu, Shengcai Zhang, Yan Li, "A Novel Selective Encryption Method Based on Skin Lesion Detection", Mathematical Problems in Engineering, vol. 2020, Article ID 7982192, 13 pages, 2020. https://doi.org/10.1155/2020/7982192

A Novel Selective Encryption Method Based on Skin Lesion Detection

Academic Editor: António M. Lopes
Received01 May 2020
Revised24 Jul 2020
Accepted24 Jul 2020
Published28 Sep 2020

Abstract

Due to the semitrusted cloud, privacy protection of medical images in medical imaging clouds has become a precondition. For the privacy of patients and the security of medical images in the cloud, this paper proposes a selective encryption based on DNA sequence and chaotic maps for skin lesion image. Initially, we design a transition region-based level set evolution functional which is merged into a variational level set expression with two extra energy functionals, to segment skin lesion image. Once skin lesion detection has been performed, the detected skin lesion pixels are encrypted by employing chaotic systems and DNA sequences. We apply 2D-LASM and 1D-LSS to produce the pseudorandom sequences and use the hash function of the plaintext image to calculate the secret keys of the encryption system. Results demonstrate that the proposed segmentation method is particularly suitable for the detection of skin lesion images with strong noise and complex background. Meanwhile, security analysis also reveals that this selective encryption has a large security key space and high sensitivity to the plaintext image and the secret key.

1. Introduction

Medical image processing has developed for many years, and there are more and more powerful tools to help dermatologists identify and classify skin lesions [16]. Among all kinds of skin lesions, melanoma is the most aggressive skin cancer and the one leading to the most deaths. However, in the transmission and storage, there are potential threats to the important content of these images, which makes the protection of important content a challenging problem [711].

To achieve confidentiality, encryption as an effective technology includes full encryption [1215] and selective encryption [3, 1620]. Full encryption involves encrypting complete image information, while selective encryption mainly focuses on the encryption of part of the image data. In recent years, selective encryption has been widely studied because of its tradeoff between computational complexity and security. Based on pixels of interest and singular value decomposition, Bhatnagar et al. proposed a selective image encryption scheme [16]. In [17], an edge-based lightweight image encryption scheme is proposed by Zhang et al. which employs chaos-based reversible hidden transform and multiple-order discrete fractional cosine transform. Wen et al. [18] proposed a selective method to encrypt the object of infrared images by using chaotic maps. Furthermore, they protected the salient regions of image by embedding them into a visually meaningful image in the work [19]. Actually, selective encryption is suitable for protecting the important areas of the image, but not the entire image. Most of the existing detection schemes do not have the ability to handle the skin lesions image [20].

In recent years, there are many techniques used for skin lesion detection, such as active contour model [21, 22], thresholding [23], fuzzy c-means [24], and neural network [25], and local binary patterns clustering [2]. Rajab et al. [25] introduce the thresholding algorithm and neural network to realize the skin lesion detection. This technique can obtain the efficient result. However, the technique based on neural networks cannot deal with noisy images as the details of the edge were broken. Motivated by these problems, Barcelos et al. [26] posed a detection model for skin lesion image starting from nonlinear diffusion equations. However, in the case of strong noise and complex background, this model has some limitations.

So far, various techniques have been proposed for object detection. The level set method is an important segmentation method which has the advantages of allowing variable topological transformation and flexible numerical implementation. However, this method has the problem of contour initialization and reinitialization. To overcome these problems, Li et al. put forward a segmentation model without reinitialization [27] and distance regularized level set evolution (DRLSE) [28]. The two models employ the corresponding deviation penalty energy to force the level set function approach sign distance function and finally eliminate reinitialization. However, these two models need to initialize the contour. Recently, He et al. [29] proposed a weighted region-scalable fitting (WRSF) model which can handle well on medical images with intensity inhomogeneity, but fails to segment these with strong noises. In a partial differential equation (PDE) formulation, two geometric active contour models are, respectively, proposed by Wen et al. [22, 30]. The two models have the ability to segment skin lesion images with blurred boundaries.

Inspired by the works of Wen et al. [22, 30], but different from these works, this paper proposes a transition region- (TR-) based energy functional which can compel the level set function to have opposite different inside and outside image target. And then this energy functional is introduced into a variational level set expression with two extra energy functionals. According to the characteristics of significant regions, chaotic systems and DNA are combined to design suitable sensitive encryption algorithms.

The main contributions of this paper include the following points:(1)A novel skin lesion detection-based selective encryption method is proposed. This method consists of the detection process of skin lesion image and selective encryption for privacy protection of skin lesion data.(2)In the skin lesion detection scheme, we propose a transition region- (TR-) based energy functional which compels this function to have a different sign inside and outside the image target. And the TR-based functional is introduced into a variational level set expression.(3)In the selective encryption for skin lesion data, we employ chaotic systems and DNA sequence operations. 2D-LASM and 1D-LSS are chosen to generate pseudorandom sequences and determine DNA encoding/decoding rules of the skin lesion region and the key matrix.

The structure of this article is described as follows. The DRLSE model and DNA encoding/decoding rules are introduced in Section 2. Section 3 describes the proposed skin lesion detection-based selective encryption algorithm which contains skin lesion detection based on TR-based energy functional model and selective encryption algorithm. The experimental results and security analysis are depicted in Section 4. The conclusions are given in Section 5.

2.1. The DRLSE Model

Li et al. [27] extended distance regularized level set evolution (DRLSE) and proposed a variational level set model for image segmentation. In a variational framework, this model is formulated about the level set function as follows:where , , are constants, is the level set smooth term, and is a certain external energy term. is a potential (or energy density) function , is an edge indicator function, and is the convolution of the image and the Gaussian kernel with standard deviation . The function is the one-dimensional Heaviside function.

The term computes the length of the zero level set of in the conformal metric where is a parameterized representation of the zero level set of . The term can be viewed as the weighted area of the region , which forces the zero level set of to expand or shrink faster during the evolutionary process. Whether the parameter of can be positive or negative depends on the relative position of the object’s initial contour.

The level set evolution equation corresponding to equation (1) is obtained by the following equation:with initial condition , where and are, respectively, defined by

2.2. DNA Encoding/Decoding Rules

A DNA sequence consists of A (adenine), T (thymine), C (cytosine), and G (guanine), where A and T, G, and C are complementary pairs. Further, 0 and 1 are complementary, so the DNA sequence is similar to the binary data. According to the principle of complementary pairing, Table 1 shows eight types of encoding rules by the Watson–Crick complement regulation [3133].


12345678

A0000111101100110
T1111000010011001
C1001100100001111
G0110011011110000

There introduce algebraic computation operators for DNA sequences to spread DNA computing, such as XOR. On the basis of traditional rule, the XOR operation is manipulated on DNA sequences. There exist 8 types of DNA XOR rules corresponding to 8 types of DNA encoding rules, and Table 2 shows DNA XOR under Rule 1.


XORATCG

AATCG
TTAGC
CCGAT
GGCTA

3. Skin Lesion Detection-Based Selective Encryption Algorithm

This paper proposes a secure and privacy-preserving technique to protect patients’ privacy and improve the security of skin lesion images. There have four stages of the proposed technique, as shown in Figure 1: TR-based energy functional based on adaptive function, skin lesion detection model, selective encryption based on skin lesion detection, and decryption.

3.1. Skin Lesion Detection Based on TR-Based Energy Functional Model

Because of the variation of the shape and appearance of the skin lesions, the detection of the edge of the skin lesions is a very important problem. This paper proposes a TR-based energy functional model to segment the skin lesion image.

3.1.1. TR-Based Energy Functional

Introduce an adaptive function via the gray mean of the transition region, which will serve as the weight of the proposed TR-based energy functional.

For an image and function , we designwhere is mean value of the transition region drawn by LE-TREM algorithms [22, 30]. As shown in the works [22, 30], we observe that the function has opposite sign inside and outside the transition region. A binary image is displayed in Figure 2(a), and the corresponding 3D plot of is described in Figure 2(b). From Figure 2(b), we can really reveal that the function has opposite sign inside and outside the transition region.

Now we pose a novel energy (TR-based energy) based on the function defined by (5). Given a level set function , we design this external energy as follows:where is the one-dimensional smoothed Heaviside function and is the edge indicator given by .

3.1.2. The Proposed Detection Model

Following the DRLSE model, the energy functional is introduced into a variational level set expression. The energy functional for the proposed model is defined as follows:where the function is given by (4) and is the edge indicator function, which is different from that used in the DRLSE model.

We employ the gradient descent method to minimize energy functional (7) with respect to and obtain the associated level set evolution equation:where is defined by equation (3).

3.2. Selective Encryption Based on Skin Lesion Detection

In our encryption method, the proposed TR-based energy functional model can be chosen to detect skin lesion images. Further, the extracted significant region is encrypted by employed chaotic maps and DNA sequences.

3.2.1. Encryption and Decryption Process

Chaotic encryption technology has strong sensitivity. DNA computing has many advantages, such as massive parallelism, huge storage, and ultra-low power consumption. Image encryption method based on DNA encoding integrates biological characteristics, but its encryption principle is closely related to chaotic encryption technology.

Step 1. Construct 1D logistic-sine system (LSS) and 2D logistic-adjusted-sine map (LASM) and by chaotic maps.
Logistic map has high sensitivity and chaotic behavior. The sine map has a similar chaotic behavior with the logistic map. We employ 1D logistic-sine system (LSS) [34] and 2D logistic-adjusted-sine map (2D-LASM) [35] by the logistic and sine maps as seed maps:In the LSS system, the parameter , and mod function is the remainder used to return the division of two numbers. In 2D-LASM system, , and y and z are state variables,.

Step 2. Generate the initial values and parameter for 1D-LSS and 2D-LASM.
We employ the SHA 256 hash of the plaintext image to generate a 256-bit external secret key. Then the 256-bit secret key is divided into 8-bit blocks , so can also be described as follows:Then, the initial values can be produced as follows:where mod is the modular operation, and are the system parameters, , are initial values, and , , and are the given values used as secret keys.

Step 3. Perform DNA dynamic encoding process of the significant region.
Let I be an original skin lesion image, and detect the skin lesion region of image I using the proposed method as described in Section 3.1. Design an appropriate rectangle with the size of to cover the skin lesion region.(1)Convert each pixel in the rectangle block to its binary form, and obtain a binary matrix of .(2)Use produced in Step 1 for 1D-LSS system to iterate (2000+4mn) times, then abandon the former 2000 values, and get chaotic sequences X to perform a matrix U of .(3)Generate dynamic encoding mode for every element of the significant region as follows:(4)Group every element of the matrix , then employ the corresponding encoding scheme in equation (13) to encode these elements, and finally form the encoded DNA a matrix of .

Step 4. Generate the key matrix K.(1)Use produced in Step 1 for 2D-LASM map to iterate (2000 + q) times, where , and abandon the former 2000 values to avoid the transient effect. Pick up the former m values from Y to construct matrix Y1 of size , and use the former 4n values from Z to produce a matrix Z1 of size . Manipulate matrix multiplying operation for Y1 and Z1 to get a matrix with .(2)Employ the matrix to produce the key matrix by the following formula:

Step 5. Implement DNA XOR between the and the key matrix by equation (13):where denote the ciphertext DNA matrix.

Step 6. Decode the matrix by equation (13) to get the cipher block .

Step 7. Employ the Arnold transform to make cipher block have more secure encryption effect.
Arnold scrambling is an image encryption technology which disturbs the original image by changing the position of image pixels. In our method, Arnold transform is applied to further disturb the pixel of ciphertext image , and its definition is represented as follows:where and are positive integers, randomly selected scrambling parameters from the positive integers that affect the output value, and usually 1 is selected. denotes the order of the image matrix.
The decryption process is the reverse operation of the encryption process.

4. Experimental Result and Discussion

In this section, a series of skin lesion images are applied to analyze the performance of the proposed detection. From Table 3, the strengths and limitations of different DNA sequence encryption algorithms are summarized and compared. Therefore, the proposed method is superior to other compared encryption schemes in some aspects.


AlgorithmsEncryption typesImage typesAdvantagesLimitations

[36]Full encryptionGeneral imageIncreases the strength of encryptionsHigh computational complexity
[37]Full encryptionGeneral imageStrong key sensitivity and securityFew experiments to resist security attacks
[33]Full encryptionColour light field imageSuitable for colour light field imageComplexity and need high computation
ProposedSelective encryptionSkin lesion imageSufficient experimental analysis and applied to skin lesion imageIncrease the execution speed

4.1. Experimental Results of Skin Lesion Detection

Without loss of generality, we set default parameters: , and (for ). The values of are provided in the following figure. In all the experiments, we simply initialize level set functions to zero function, i.e., .

The following two experiments demonstrate that the diffusion model [26] and our model are applied to extract the lesion areas in several skin lesion images. It is a very important task to extract lesion regions from the background in the field of computer vision. Because of the variation in the shape and appearance of the skin lesions, the detection of the edge of the skin lesions is a very important problem. Other factors such as strong noise and hair, dim edges, or strong asymmetry, or complex texture background also make the segmentation process more difficult.

Figure 3 describes that the proposed model can handle well for four skin lesion images and is compared with the diffusion model [26] through the detective results and computing times. For a fair comparison, we select the best scale parameter and the most suitable high threshold (given in the caption of Figure 3) for the diffusion method. Our level set evolution starts with , so there are no initial contours in the top row of Figure 3. It is clearly seen from the bottom that our model (with parameters , for the first three images) obtains the satisfactory segmentation results for four images, which are almost the same as the diffusion model visually, but the important improvement of the proposed method is that computation complexity is lower than that in the diffusion method. Iteration umbers and CPU times of the two methods are exhibited in Table 4. It can be surveyed that iteration numbers and CPU times of the proposed method are all less than those of the diffusion model.


Model(a)(b)(c)(d)

Diffusion [26]100200100300
69.5195.220.2366.7

Ours25203013
12.611.16.17.3

Figure 4 shows detective results of our model for ten skin lesions image with blurry boundaries and/or asymmetric lesions areas, as shown in the first and third rows. It is difficult to extract the lesion areas in such images. Here, we do not show the detective results of the diffusion model [26], as the model cannot achieve satisfactory detective results. It can be observed from the second and fourth rows of Figure 4 that our method (, for images in the first row; and , for images in the third row), and for the last two images), stating with a constant function , accurately extracts the lesion area boundaries.

We conclude this section by simply describing about parameters and ; for our model, the parameters are very important for the function . By experiments, our observations are as follows: for skin lesions images, is typically about 2, and is in the range between 0.75 and 0.99.

4.2. Experimental Results of Skin Lesion Region Protection

In this section, we, respectively, exhibit the subjective visual effect and objective data to prove the performance of plaintext encryption. We take four skin lesion images from Figures 3 and 4, as examples using the initial values and for the 1D-LSS system and 2D-LASM system. It can be seen from Figure 5 that the proposed method can protect significant regions.

4.2.1. Key Space Analysis

In the proposed encryption method, the key includes (i) the given initial values and the parameters of 1D LSS and 2D-LASM, , , and , and (ii) the 256-bit external secret key. If the accuracy of the float is , then , , and can be any one among possible values. The whole key space is , which is larger than . Therefore, the proposed encryption method has a large key space to defend against brute force attacks.

4.2.2. Key Sensitivity Analysis

The encryption scheme expects a slight change in the key to result in completely different results. Key sensitivity guarantees the uniqueness of the key. The encryption algorithm contains multiple secret keys, and the value contributed by each key is different in the encryption process. The original clear image can be decrypted only when all the keys are correct.

To verify the sensitivity of the encryption algorithm for each key, the key sensitivity is performed by changing just one key in 10−15 position and keeping the rest same. The NPCR of the original target and changed cipher image-blocks for the keys of the proposed algorithm are listed in Table 5. It can be obviously seen from this table that when the key has a trivial change, the encrypted image-blocks have a complete change, and more than 99% pixels are modified compared with Figure 5(i), which implies the proposed scheme is highly key sensitive to all the keys.


Decryption key+ 10−15+ 10−15+ 10−15+ 10−15+ 10−15

Comparison with Figure 5(i)99.605%99.623%99.615%99.634%99.616%

4.2.3. Histogram of Analysis

Histogram describes the distribution of pixel values in an image. A secure cipher image encryption method should have a uniform histogram [3841]. Generally speaking, a natural image should follow a regular distribution, while the secure encryption method should force the cipher image to follow a consistent distribution. Figure 6 reveals that our method can effectively prevent significant regions from being attacked by statistical attack opponents.

Furthermore, the variances of histograms and chi-square test are used to evaluate the uniformity of the pixel value distribution. The variances of histograms and chi-square values can be calculated as follows [42]:where is the occurrence frequency of gray level i, is the expected occurrence frequency of each of gray level, and n is the number of all the pixels. is the vector of the histogram values, and and are the numbers of pixels in which gray values are equal to i and j, respectively.

As shown in ref. [42], according to the chi-square distribution table, at 255 degrees of freedom and 0.05 significance level, . With a significance level of 0.05, the chi-square test results are listed in Table 6. The results indicate that the null hypothesis that the distribution is uniform cannot be rejected at 0.05 significance level. In this circumstance, redundancy of the plain images has successfully been concealed and consequently does not provide any clue to apply statistical attacks. Besides, Table 7 lists the comparison of histogram variance among image encryption schemes. From this table, we can observe that the average histogram variance of the proposed method is less than the schemes in ref. [37, 42].


Test imagesFigure 5(a)Figure 5(b)Figure 5(c)Figure 5(d)

293293293293
258272219237
ResultsPassPassPassPass


Test imagesProposed[42][37]

Figure 5(a)105111341230
Figure 5(b)98010221010
Figure 5(c)115412051180
Figure 5(d)94710201035
Average103310951114

4.2.4. Correlation Analysis

We arbitrarily pick up 2,500 pairs of adjacent pixels in three directions which include horizontal, vertical, and diagonal from the skin lesion region of the plain image and the corresponding cipher image. The correlation coefficients of two adjacent pixels are computed through the following formulas:where x and y are values of the two adjacent pixels in the image. and are given by

Figure 7 illustrates the correlations of two horizontally, vertically, and diagonally adjacent pixels in the skin lesion region of plaintext image and its cipher image. Besides, Table 8 describes the correlation coefficients of adjacent pixels of the skin lesion region in the plaintext image and cipher image. We can clearly observe from these results that the correlations between adjacent pixels in each direction of cipher image-block are much lower than the corresponding plaintext blocks.


DirectionTargetCipher image-block

Horizontal0.8846−0.0105
Vertical0.90410.0338
Diagonal0.91740.0023

4.2.5. Information Entropy Analysis

Information entropy is employed to measure the uniform distribution of pixel grayscale, and its definition is given as follows:where denotes the pixel value and the is the probability of .

If the pixel values are distributed more uniformly, the information entropy is larger. For a gray image in the range of [0, 255], ideally, if all pixel values have an equal probability of occurrence, the upper limit value of image entropy H is 8. From Table 9, we can observe that the entropies of the cipher image-blocks are closed to 8, which have been added to the corresponding plaintexts. Therefore, this reveals that our method can defend the entropy cryptanalysis.


Skin lesion imageTargetCipher image-block

Figure 5(a)6.97557.8860
Figure 5(b)7.46717.9939
Figure 5(c)7.59907.9937
Figure 5(d)7.53547.9799

4.2.6. Computational and Complexity Analyses

Algorithmic complexity is an important reference standard for algorithm performance. We analyze the computational complexity of the proposed scheme and compare it with ref. [36].

For the proposed scheme, the computational complexity has two parts: target extraction and target encryption. In the target extraction process, the main source of time complexity is the numerical solution of level set evolution equation (2). In this paper, we employ a simple explicit finite difference scheme to solve this equation. Its time complexity is . The encryption process contains the DNA level diffusion part and the Arnold scrambling further disturbs the pixel of cipher image-block. For the DNA level diffusion part, the complexity of the time-consuming includes generating chaotic sequences and DNA encoding and decoding operations. We, respectively, adopt 1D LSS and 2D-LASM to produce the chaotic sequences for the encoded DNA matrix and the key matrix in the diffusion steps. The time complexity of generating LSS system-based sequence is , and the time complexity of generating the 2D-LASM system-based sequence is . So the total time complexity of generating chaotic sequences is . The time complexity of DNA encoding and decoding operation is . The time complexity of Arnold scrambling is no more than . So the total time complexity of the proposed algorithm is .

For ref. [36], there are three stages of encryption steps, that is shuffling, diffusion, and shuffling. The authors employ the complex hyperchaotic system to generate the chaotic sequences for increasing the strength of encryptions and decryptions, whereas low-dimensional chaotic systems are adopted in our algorithm, and the low-dimensional system is easy to implement and can run faster. As mentioned in ref. [36], the time complexity of the algorithm is . Therefore, the time complexity of our algorithm is lower than that of ref. [36].

5. Conclusion

A novel approach for skin lesion detection and privacy protection is presented in this paper. Firstly, a transition region-based level set evolution method is proposed to detect skin lesion image. This idea of the proposed method is to construct the energy functional that compels the level set function to have a different sign inside and outside the image target. Then this functional is introduced into a variational level set expression with the other two functionals. Then, once skin lesion detection has been performed, the detected skin lesion pixels are encrypted by utilizing DNA sequences and chaotic systems. We employ 2D-LASM and 1D-LSS to make the pseudorandom sequences and use the 256-bit hash value of the plaintext image to generate the initial values and system parameters. Different from these existing encryption algorithms based on DNA computing, the DNA encoding/decoding rules of the skin lesion region and the key matrix are generated by the skin lesion region, and this may increase resilience to statistical attacks. Experimental results of skin lesions detection show that the proposed method is particularly suitable for the detection of skin lesion images with strong noise and complex background. Meanwhile, security analyses reveal that our selective encryption method has a good encryption effect.

Data Availability

The data used to support the findings of this study have not been made available.

Conflicts of Interest

The authors declare that they have no conflicts of interest regarding the publication of this paper.

Authors’ Contributions

D.A. conceptualized the study, was responsible for methodology, and was involved in funding acquisition; J.L. was responsible for software and was involved in visualization; S.Z. validated and investigated the data; Y.L. performed formal analysis, reviewed and edited the manuscript, and supervised the study; J.L. and S.Z prepared the original draft.

Acknowledgments

This research was funded by the Team Project of Collaborative Innovation in Universities of Gansu Province (no. 2017C-16) and the Major Project of Gansu University of Political Science and Law (no. 2016XZD12).

References

  1. H. Kaufman, The Melanoma Book: a Complete Guide to Prevention and Treatment, vol. 1, Gotham Books, New York, NY, USA, 2005.
  2. P. Pereira, R. Fonseca-Pinto, R. Paiva et al., “Dermoscopic skin lesion image segmentation based on local binary pattern clustering: comparative study,” Biomedical Signal Processing and Control, vol. 59, Article ID 101924, 2020. View at: Publisher Site | Google Scholar
  3. Y. Zhang, H. Huang, Y. Xiang, L. Y. Zhang, and X. He, “Harnessing the hybrid cloud for secure big image data service,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1380–1388, 2017. View at: Publisher Site | Google Scholar
  4. Y. Zhang, P. Wang, H. Huang, Y. Zu, D. Xiao, and Y. Xiang, “Privacy-assured FogCS: chaotic compressive sensing for secure industrial big image data processing in fog computing,” IEEE Transactions on Industrial Informatics, 2020, In press. View at: Publisher Site | Google Scholar
  5. Z. Hua, S. Yi, and Y. Zhou, “Medical image encryption using high-speed scrambling and pixel adaptive diffusion,” Signal Processing, vol. 144, pp. 134–144, 2018. View at: Publisher Site | Google Scholar
  6. J. Chen, L. Chen, L. Y. Zhang, and Z.-L. Zhu, “Medical image cipher using hierarchical diffusion and non-sequential encryption,” Nonlinear Dynamics, vol. 96, no. 1, pp. 301–322, 2019. View at: Publisher Site | Google Scholar
  7. Y. Zhang, Y. Xiang, L. Y. Zhang, Y. Rong, and S. Guo, “Secure wireless communications based on compressive sensing: a survey,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1093–1111, 2019. View at: Publisher Site | Google Scholar
  8. H. Peng, Y. Tian, J. Kurths, L. Li, Y. Yang, and D. Wang, “Secure and energy-efficient data transmission system based on chaotic compressive sensing in body-to-body networks,” IEEE Transactions on Biomedical Circuits and Systems, vol. 11, no. 3, pp. 558–573, 2017. View at: Publisher Site | Google Scholar
  9. Y. Zhang, P. Wang, L. Fang, X. He, H. Han, and B. Chen, “Secure transmission of compressed sampling data using edge clouds,” IEEE Transactions on Industrial Informatics, vol. 16, no. 10, pp. 6641–6651, 2020. View at: Publisher Site | Google Scholar
  10. W. Wen, Y. Hong, Y. Fang, M. Li, and M. Li, “A visually secure image encryption scheme based on semi-tensor product compressed sensing,” Signal Processing, vol. 173, Article ID 107580, 2020. View at: Publisher Site | Google Scholar
  11. Y. Zhang, Q. He, G. Chen, X. Zhang, and Y. Xiang, “A low-overhead, confidentiality-assured, and authenticated data acquisition framework for IoT,” IEEE Transactions on Industrial Informatics, vol. 16, no. 12, pp. 7566–7578, 2019. View at: Publisher Site | Google Scholar
  12. T. Zhao and Q. Ran, “The weighted fractional fourier transform and its application in image encryption,” Mathematical Problems in Engineering, vol. 2019, Article ID 4789194, 10 pages, 2019. View at: Google Scholar
  13. X. Chai, H. Wu, Z. Gan, Y. Zhang, Y. Chen, and K. W. Nixon, “An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding,” Optics and Lasers in Engineering, vol. 124, Article ID 105837, 2020. View at: Publisher Site | Google Scholar
  14. H. Fan and M. Li, “Cryptanalysis and improvement of chaos-based image encryption scheme with circular inter-intra-pixels bit-level permutation,” Mathematical Problems in Engineering, vol. 2017, Article ID 8124912, 11 pages, 2017. View at: Publisher Site | Google Scholar
  15. Y. Niu, X. Sun, C. Zhang, and H. Liu, “Anticontrol of a fractional-order chaotic system and its application in color image encryption,” Mathematical Problems in Engineering, vol. 2020, Article ID 6795964, 12 pages, 2020. View at: Publisher Site | Google Scholar
  16. G. Bhatnagar and Q. M. Jonathan Wu, “Selective image encryption based on pixels of interest and singular value decomposition,” Digital Signal Processing, vol. 22, no. 4, pp. 648–663, 2012. View at: Publisher Site | Google Scholar
  17. Y. Zhang, D. Xiao, W. Wen, and Y. Tian, “Edge-based lightweight image encryption using chaos-based reversible hidden transform and multiple-order discrete fractional cosine transform,” Optics & Laser Technology, vol. 54, pp. 1–6, 2013. View at: Publisher Site | Google Scholar
  18. W. Wen, Y. Zhang, Z. Fang, and J.-X. Chen, “Infrared target-based selective encryption by chaotic maps,” Optics Communications, vol. 341, pp. 131–139, 2015. View at: Publisher Site | Google Scholar
  19. W. Wen, Y. Zhang, Y. Fang, and Z. Fang, “Image salient regions encryption for generating visually meaningful ciphertext image,” Neural Computing and Applications, vol. 29, no. 3, pp. 653–663, 2018. View at: Publisher Site | Google Scholar
  20. D. Xiao, Q. Fu, T. Xiang, and Y. Zhang, “Chaotic image encryption of regions of interest,” International Journal of Bifurcation and Chaos, vol. 26, no. 11, Article ID 1650193, 2016. View at: Publisher Site | Google Scholar
  21. D. Chung and G. Sapiro, “Segmenting skin lesions with partial-differential-equations-based image processing algorithms,” IEEE Transaction on Medical Imaging, vol. 19, no. 7, pp. 763–767, 2000. View at: Publisher Site | Google Scholar
  22. W. Wen, C. He, and M. Li, “Transition region-based active contour model for image segmentation,” Journal of Electronic Imaging, vol. 22, no. 1, pp. 1–12, 2013. View at: Publisher Site | Google Scholar
  23. I. Maglogiannis, S. Pavlopoulos, and D. Koutsouris, “An integrated computer supported acquisition, handling, and characterization system for pigmented skin lesions in dermatological images,” IEEE Transactions on Information Technology in Biomedicine, vol. 9, no. 1, pp. 86–98, 2005. View at: Publisher Site | Google Scholar
  24. Y. Lim and S. Lee, “On the color image segmentation algorithm based on the thresholding and the fuzzy c-means techniques,” Pattern Recognition, vol. 23, no. 9, pp. 935–952, 1990. View at: Publisher Site | Google Scholar
  25. M. I. Rajab, M. S. Woolfson, and S. P. Morgan, “Application of region-based segmentation and neural network edge detection to skin lesions,” Computerized Medical Imaging and Graphics, vol. 28, no. 1-2, pp. 61–68, 2004. View at: Publisher Site | Google Scholar
  26. C. A. Z. Barcelos and V. B. Pires, “An automatic based nonlinear diffusion equations scheme for skin lesion segmentation,” Applied Mathematics and Computation, vol. 215, no. 1, pp. 251–261, 2009. View at: Publisher Site | Google Scholar
  27. C. Li, C. Xu, C. Gui, and M. Fox, “Level set evolution without re-initialization: a new variational formulation,” in Proceedings of the 2005 IEEE CVPR, pp. 430–436, San Diego, CA, USA, June 2005. View at: Publisher Site | Google Scholar
  28. C. Li, C. Xu, C. Gui, and M. Fox, “Distance regularized level set evolution and its application to image segmentation,” IEEE Transactions on Image Processing, vol. 19, no. 12, pp. 3243–3254, 2010. View at: Publisher Site | Google Scholar
  29. C. He, Y. Wang, and Q. Chen, “Active contours driven by weighted region-scalable fitting energy based on local entropy,” Signal Processing, vol. 92, no. 2, pp. 587–600, 2012. View at: Publisher Site | Google Scholar
  30. W. Wen, C. He, Y. Zhang, and Z. Fang, “A novel method for image segmentation using reaction-diffusion model,” Multidimensional Systems and Signal Processing, vol. 28, no. 2, pp. 657–677, 2017. View at: Publisher Site | Google Scholar
  31. J. D. Watson and F. H. C. Crick, “Molecular structure of nucleic acids: a structure for deoxyribose nucleic acid,” Nature, vol. 171, no. 4356, pp. 737-738, 1953. View at: Publisher Site | Google Scholar
  32. Z.-H. Gan, X.-L. Chai, D.-J. Han, and Y.-R. Chen, “A chaotic image encryption algorithm based on 3-D bit-plane permutation,” Neural Computing and Applications, vol. 31, no. 11, pp. 7111–7130, 2019. View at: Publisher Site | Google Scholar
  33. W. Wen, K. Wei, Y. Zhang, Y. Fang, and M. Li, “Colour light field image encryption based on DNA sequences and chaotic systems,” Nonlinear Dynamics, vol. 99, no. 2, pp. 1587–1600, 2020. View at: Publisher Site | Google Scholar
  34. Y. Zhou, L. Bao, and C. L. P. Chen, “A new 1D chaotic system for image encryption,” Signal Processing, vol. 97, pp. 172–182, 2014. View at: Publisher Site | Google Scholar
  35. Z. Hua and Y. Zhou, “Image encryption using 2D logistic-adjusted-sine map,” Information Sciences, vol. 339, pp. 237–253, 2016. View at: Publisher Site | Google Scholar
  36. K. Abhimanyu Kumar Patro, B. Acharya, and V. Nath, “Secure, lossless, and noise-resistive image encryption using chaos, hyper-chaos, and DNA sequence operation,” IETE Technical Review, vol. 37, no. 3, pp. 223–245, 2019. View at: Publisher Site | Google Scholar
  37. X. Chai, Z. Gan, K. Yuan, Y. Chen, and X. Liu, “A novel image encryption scheme based on DNA sequence operations and chaotic systems,” Neural Computing and Applications, vol. 31, no. 1, pp. 219–237, 2019. View at: Publisher Site | Google Scholar
  38. N. Zhou, S. Pan, S. Cheng, and Z. Zhou, “Image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing,” Optics & Laser Technology, vol. 82, pp. 121–133, 2016. View at: Publisher Site | Google Scholar
  39. Z. Hua, Y. Zhou, and H. Huang, “Cosine-transform-based chaotic system for image encryption,” Information Sciences, vol. 480, pp. 403–419, 2019. View at: Publisher Site | Google Scholar
  40. N. R. Zhou, T. X. Hua, L. H. Gong, D. J. Pei, and Q. H. Liao, “Quantum image encryption based on generalized Arnold transform and double random-phase encoding,” Quantum Information Processing, vol. 14, no. 4, pp. 1193–1213, 2015. View at: Publisher Site | Google Scholar
  41. Y. Luo, S. Tang, J. Liu, L. Cao, and S. Qiu, “Image encryption scheme by combining the hyper-chaotic system with quantum coding,” Optics and Lasers in Engineering, vol. 124, Article ID 105836, 2020. View at: Publisher Site | Google Scholar
  42. K. Abhimanyu Kumar Patro and B. Acharya, “A novel multi-dimensional multiple image encryption technique,” Multimedia Tools and Applications, vol. 79, pp. 12959–12994, 2020. View at: Publisher Site | Google Scholar

Copyright © 2020 Dezhi An et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


More related articles

 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder
Views126
Downloads184
Citations

Related articles

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.