Secure medical image transmission for healthcare applications using cooperative relaying based on physical layer security

Document Type : Original Article

Authors

1 Assistant Professor of Telecommunication Engineering at Qom University of Technology, Email: kuhestani@qut.ac.ir

2 2. Ph.D. Student of Telecommunication Engineering at Shahed University. Email: sma.sebtonabi1373@yahoo.com

3 Assistant Professor of Telecommunication Engineering at Qom University of Technology, Email: rajabi@qut.ac.ir

4 ICT Research Institute, Iran Telecommunication Research Center (ITRC), Tehran, Iran, Email: mrkeshavarzi@itrc.ac.ir

Abstract

In this article, a new idea and method to protect image against illegal users has been proposed. Considering that in medical images, most of the experts' emphasis is on the part of the image that shows the disease, in this article, the image is first divided into two parts namely, main and background parts, and then the transmitter estimats regarding the capacity of legal and non-legal channels. Here, the transmitter decides whether to send the main part or the background part, i.e., when the capacity of the legal channel is greater than the capacity of the eavesdropping channel, the main part of the image is sent, and when the capacity of the eavesdropping channel is greater than the legal channel, the background part is sent. In addition, in this article, due to the large distance between the transmitter and the receiver and the effect of the path loss, a relay is adopted to boost the signal. Simulation results are provided to highlight the effectiveness of our proposed cooperative relaying idea.

Keywords

Main Subjects


  1. A. Alarood, M. Faheem, M. A. Al-Khasawneh, A. I. A. Alzahrani and A. A. Alshdadi, "Secure medical image transmission using deep neural network in e-health applications," Healthcare Technology Letters, pp. 87-98, 2023, doi: 10.1109/ICCWorkshops50388.2021.9473492.
  2. Chorti et al., "Context-Aware Security for 6G Wireless: The Role of Physical Layer Security," IEEE Communications Standards Magazine, vol. 6, no. 1, pp. 102-108, 2022, doi: 10.1109/MCOMSTD.0001.2000082.
  3. Han, L. Sun, and Q. Du, "Securing Image Transmissions via Fountain Coding and Adaptive Resource Allocation," in 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring), 15-18 May 2016 2016, pp. 1-5, doi: 10.1109/VTCSpring.2016.7504468.
  4. Jiang, H. Zhang, Y. Ren, Z. Han, K. C. Chen, and L. Hanzo, "Machine Learning Paradigms for Next-Generation Wireless Networks," IEEE Wireless Communications, vol. 24, no. 2, pp. 98-105, 2017, doi: 10.1109/MWC.2016.1500356WC.
  5. Impedovo, . G. Pirlo and . G. Pirlo, "A Medical Image Encryption Scheme for Secure Fingerprint-Based Authenticated Transmission," applied sciences, pp. 1-19, 2023, doi: 10.1109/ICCWorkshops50388.2021.9473492.
  6. Niu, M. Iwai, K. Sezaki, L. Sun, and Q. Du, "Exploiting Fountain Codes for Secure Wireless Delivery," IEEE Communications Letters, vol. 18, no. 5, pp. 777-780, 2014, doi: 10.1109/LCOMM.2014.030914.140030.
  7. Mucchi et al., "How 6G Technology Can Change the Future Wireless Healthcare," in 2020 2nd 6G Wireless Summit (6G SUMMIT), 17-20 March 2020 2020, pp. 1-6, doi: 10.1109/6GSUMMIT49458.2020.9083916.
  8. Sun and H. Xu, "Fountain-Coding-Based Secure Communications Exploiting Outage Prediction and Limited Feedback," IEEE Transactions on Vehicular Technology, vol. 68, no. 1, pp. 740-753, 2019, doi: 10.1109/TVT.2018.28858
  9. Sun, D. Huang, and A. L. Swindlehurst, "Fountain-Coding Aided Secure Transmission With Delay and Content Awareness," IEEE Transactions on Vehicular Technology, vol. 69, no. 7, pp. 7992-7997, 2020, doi: 10.1109/TVT.2020.2992619.
  10. Sun, P. Ren, Q. Du, and Y. Wang, "Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks," IEEE Transactions on Industrial Informatics, vol. 12, no. 1, pp. 291-300, 2016, doi: 10.1109/TII.2015.250944
  11. ES-SABRY, N. EL AKKAD, M. MERRAS, K. SATORI, W. EL-SHAFAI, T. ALTAMEEM and M. M. FOUDA, "Securing Images Using High Dimensional Chaotic Maps and DNA Encoding Techniques," IEEE Access, vol. 11, pp. 100856-10878, 2023, doi: 10.1109/ICCWorkshops50388.2021.9473492.
  12. Letafati, A. Kuhestani, and H. Behroozi, "Three-Hop Untrusted Relay Networks With Hardware Imperfections and Channel Estimation Errors for Internet of Things," IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2856-2868, 2020, doi: 10.1109/TIFS.2020.2978627.
  13. Letafati, A. Kuhestani, D. W. K. Ng, and H. Behroozi, "A New Frequency Hopping-Aided Secure Communication in the Presence of an Adversary Jammer and an Untrusted Relay," in 2020 IEEE International Conference on Communications Workshops (ICC Workshops), 7-11 June 2020 2020, pp. 1-7, doi: 10.1109/ICCWorkshops49005.2020.9145441.
  14. Letafati, A. Kuhestani, H. Behroozi, and D. W. K. Ng, "Jamming-Resilient Frequency Hopping-Aided Secure Communication for Internet-of-Things in the Presence of an Untrusted Relay," IEEE Transactions on Wireless Communications, vol. 19, no. 10, pp. 6771-6785, 2020, doi: 10.1109/TWC.2020.3006012.
  15. Letafati, A. Kuhestani, K. K. Wong, and M. J. Piran, "A Lightweight Secure and Resilient Transmission Scheme for the Internet of Things in the Presence of a Hostile Jammer," IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4373-4388, 2021, doi: 10.1109/JIOT.2020.3026475.
  16. Letafati, H. Behroozi, B. H. Khalaj, and E. A. Jorswieck, "Content-Based Medical Image Transmission Against Randomly-Distributed Passive Eavesdroppers," in 2021 IEEE International Conference on Communications Workshops (ICC Workshops), 14-23 June 2021 2021, pp. 1-7, doi: 10.1109/ICCWorkshops50388.2021.9473492.
  17. B. Baker, W. Xiang, and I. Atkinson, "Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities," IEEE Access, vol. 5, pp. 26521-26544, 2017, doi: 10.1109/ACCESS.2017.2775180
  18. Khan and I. Chatzigeorgiou, "Opportunistic Relaying and Random Linear Network Coding for Secure and Reliable Communication," IEEE Transactions on Wireless Communications, vol. 17, no. 1, pp. 223-234, 2018, doi: 10.1109/TWC.2017.2764891.
  19. Y. Lu and L. D. Xu, "Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics," IEEE Internet of Things Journal, 6, no. 2, pp. 2103-2115, 2019, doi: 10.1109/JIOT.2018.2869847.
  20. Wang and W. Qiu, "Secure Image Transmission over DFT-precoded OFDM-VLC systems based on Chebyshev Chaos scrambling," Optics Communications, vol. 397, pp. 84-90, 2017/08/15/ 2017, doi: https://doi.org/10.1016/j.optcom.2017.03.076.
CAPTCHA Image