التشفير الفوضوي المعتمد على السمات العميقة لنقل الصور الطبية بشكل آمن: إطار مقارن قائم على الشبكات العصبية الالتفافية (CNN)
DOI:
https://doi.org/10.65419/albahit.v5i2.123الكلمات المفتاحية:
تشفير الصور الطبية، استخراج السمات العميقة، الخريطة اللوجستية، الهجمات التفاضلية، التشفير الفوضوي، أمن الطب عن بُعدالملخص
يُعدّ النقل الآمن للصور الطبية متطلبًا أساسيًا في أنظمة الطب عن بُعد الحديثة. تقترح هذه الورقة إطارًا هجينًا قويًا لتشفير الصور يجمع بين استخراج السمات العميقة والتشفير الفوضوي. وعلى خلاف الأساليب التقليدية، تُشتق معاملات التشفير مباشرةً من السمات عالية المستوى المستخرجة باستخدام شبكات عصبية التفافية مدرَّبة مسبقًا (ResNet50 وAlexNet وMobileNetV2) لتهيئة خريطة لوجستية (Logistic Map). يعزّز هذا التوليد المعتمد على محتوى الصورة مقاومة النظام لهجمات القوة الغاشمة والهجمات التفاضلية. أظهرت النتائج التجريبية عبر عدة أنماط تصوير (الأشعة السينية، والرنين المغناطيسي، والصور الملونة) تحقيق مقاييس أمان شبه مثالية، حيث تجاوزت قيمة NPCR نسبة 99.7%، وبلغت UACI نحو 33.3%، في حين اقتربت الإنتروبيا من 7.63. كما أكد تحليل المتانة إمكانية الاستعادة التشخيصية الناجحة، إذ بلغت قيمة PSNR نحو 22.92 ديسيبل تحت هجمات ضوضاء الملح والفلفل، بينما حققت استعادة المناطق المحجوبة قيمة 14.35 ديسيبل. وأظهر التحليل المقارن أنه في حين يوفر ResNet50 أعلى حساسية، فإن MobileNetV2 يحقق انخفاضًا في زمن التنفيذ بنسبة 36.5%، مما يجعله مناسبًا للتطبيقات السريرية الآنية. وقد تم تنفيذ الإطار باستخدام MATLAB App Designer، حيث يوفر تشفيرًا آمنًا وكفؤًا حسابيًا مع فك تشفير غير فاقد للمعلومات في الظروف المثالية، بما يدعم متطلبات البنى التحتية الصحية من الجيل القادم.
المراجع
1 K. M. Hosny, N. I. Ghali, and S. Ghoniemy, “Security of medical images for telemedicine: A systematic review,” Multimedia Tools and Applications, vol. 81, pp. 36959–37008, 2022.
2 G. Kaissis, M. R. Makowski, D. Rueckert, and R. Braren, “Secure, privacy-preserving and federated machine learning in medical imaging,” Nature Machine Intelligence, vol. 2, pp. 305–311, 2020.
3 W. N. Price and I. G. Cohen, “Privacy in the age of medical big data,” Nature Medicine, vol. 25, pp. 37–43, 2019.
4 H. Kolivand et al., “Image encryption framework based on multi-chaotic maps and equal pixel values quantization,” Multimedia Tools and Applications, 2024.
5 U. Zia et al., “Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains,” International Journal of Information Security, vol. 21, no. 2, pp. 247–286, 2022.
6 S. Ibrahim et al., “Framework for efficient medical image encryption using dynamic S-boxes and chaotic maps,” IEEE Access, vol. 8, pp. 192325–192339, 2020.
7 P. Kiran and P. Divakarachari, “Resource optimized selective image encryption of medical images using multiple chaotic systems,” Microprocessors and Microsystems, vol. 89, p. 103442, 2022.
8 B. Zhang and L. Liu, “Chaos-based image encryption: Review, application, and challenges,” Mathematics, vol. 11, no. 11, p. 2459, 2023.
9 A. Abba, N. Ahmed, and H. A. Sulaimon, “Experimental evaluation of various chaos-based image encryption schemes,” Journal of Computational and Theoretical Applications, 2025.
10 J. Chen, L. Chen, and Y. Zhou, “Cryptanalysis of image ciphers with permutation-substitution network and chaos,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 30, no. 5, pp. 1261–1275, 2020.
11 M. Khan and N. Munir, “Cryptanalysis of image confidentiality scheme based on hybrid chaotic maps,” Journal of King Saud University – Computer and Information Sciences, 2025.
12 Z.-W. Liu, J. Li, and S. Nawaz, “A watermarking framework for encrypted medical images via HC chaotic system and deep learning,” Scientific Reports, 2025.
13 A. S. Nadhan and I. J. Jacob, “Enhancing healthcare security in the digital era: Safeguarding medical images with lightweight cryptographic techniques in IoT healthcare applications,” Biomedical Signal Processing and Control, 2024.
14 J. Oravec, Ľ. Ovseník, and J. Papaj, “An image encryption algorithm using logistic map with plaintext-related parameter values,” Entropy, 2021.
15 Y. Alghamdi and A. Munir, “A lightweight image encryption algorithm based on chaotic map and random substitution,” Entropy, 2022.
16 Y. Wu et al., “Content-adaptive image encryption with partial unwinding decomposition,” Signal Processing, vol. 180, p. 107861, 2021.
17 P. Sarosh, S. A. Parah, and G. M. Bhat, “An efficient image encryption scheme for healthcare applications,” Multimedia Tools and Applications, vol. 81, pp. 11971–12005, 2022.
18 B. Rezaei, M. Mobasseri, and R. Enayatifar, “A secure, efficient and super-fast chaos-based image encryption algorithm for real-time applications,” Journal of Real-Time Image Processing, vol. 20, pp. 315–332, 2023.
19 A. H. Mansour et al., “A new medical image encryption using modular integrated logistic exponential map and multi-level Q-sequence matrix,” Scientific Reports, 2025.
20 S. Prasad and A. K. Singh, “Survey on medical image encryption: From classical to deep learning-based approaches,” Computers & Electrical Engineering, vol. 118, p. 109420, 2024.
21 M. A. Islam et al., “Security and privacy considerations for AI-enabled healthcare systems: A survey,” IEEE Access, vol. 8, pp. 145205–145230, 2020.
22 X. Wang, L. Liu, and Y. Zhang, “A novel hybrid medical image encryption scheme based on chaos and DNA encoding,” Optics and Lasers in Engineering, vol. 137, p. 106383, 2021.
23 H. Liu and X. Wang, “Color image encryption using spatial bit-level permutation and high-dimensional chaotic system,” Optics Communications, vol. 284, no. 16–17, pp. 3895–3903, 2011.
24 R. Enayatifar et al., “Chaotic based image encryption using a hybrid genetic algorithm and a DNA sequence,” Optics and Lasers in Engineering, vol. 51, no. 6, pp. 774–782, 2013.
25 C. Sabet et al., “Cybersecurity in the age of digital pandemics: Protecting patient data in low-income and middle-income countries,” Lancet Global Health, vol. 12, 2024.
26 J. Utzerath and R. Dennis, “Numbers and statistics: Data and cyber breaches under the General Data Protection Regulation,” International Cybersecurity Law Review, vol. 2, pp. 197–209, 2021.
27 W. Moore and S. A. Frye, “Review of HIPAA, Part 2: Limitations, rights, violations, and role for the imaging technologist,” Journal of Nuclear Medicine Technology, vol. 48, no. 1, pp. 4–10, 2020.
28 M. Hasan et al., “Lightweight encryption technique to enhance medical image security on Internet of Medical Things applications,” IEEE Access, vol. 8, pp. 1–15, 2020.
29 X. Zhang et al., “Entropy-based block scrambling image encryption using DES structure and chaotic systems,” International Journal of Optics, vol. 2019, Art. no. 1315426, 2019.
30 A. T. Hashim, A. K. Jabbar, and Q. F. Hassan, “Medical image encryption based on hybrid AES with chaotic map,” Journal of Physics: Conference Series, vol. 1973, Art. no. 012130, 2021.
31 Z. Guitouni, M. A. Ghaieb, and M. Machhout, “Security analysis of medical image encryption using AES modes for IoMT systems,” International Journal of Computer Applications, 2023.
32 M. W. Malik et al., “Development of medical image encryption system using byte-level Base-64 encoding and AES encryption method,” in Proc. 6th Int. Conf. on Communication and Information Processing, 2020.
33 K. Lata, C. Gupta, and L. R. Cenkeramaddi, “A cryptographic framework for secure medical imaging in smart healthcare environments,” Results in Engineering, 2025.
34 W. Feng et al., “Integrating fractional-order Hopfield neural network with differentiated encryption: Achieving high-performance privacy protection for medical images,” Fractal and Fractional, 2025.
35 X.-Y. Wang and X.-L. Du, “Pixel-level and bit-level image encryption method based on logistic-Chebyshev dynamic coupled map lattices,” Chaos, Solitons & Fractals, 2021.
36 H. R. Shakir et al., “A new four-dimensional hyper-chaotic system for image encryption,” International Journal of Electrical and Computer Engineering, 2023.
37 M. Thomas, V. Krishna, and M. Varghese, “Image encryption algorithm with block scrambling based on logistic map,” Indian Journal of Science and Technology, vol. 16, no. 14, 2023.
38 U. Erkan et al., “An image encryption scheme based on chaotic logarithmic map and key generation using deep CNN,” Multimedia Tools and Applications, 2020.
39 K. Raghuvanshi et al., “Image encryption algorithm based on DNA encoding and CNN,” Expert Systems with Applications, 2024.
40 S. Subathra and V. Thanikaiselvan, “Enhanced security for medical images using a new 5D hyper chaotic map and deep learning based segmentation,” Scientific Reports, 2025.
41 W. Alexan et al., “A secure and efficient image encryption scheme based on chaotic systems and nonlinear transformations,” Scientific Reports, 2025.
42 Y. Abdul et al., “A dynamic image encryption scheme through 2-D cellular automata and chaotic logistic map,” 2025.
43 A. N. Latifa et al., “Multi-level secure image cryptosystem using logistic map chaos: Entropy, correlation, and 3D histogram validation,” Jurnal Masyarakat Informatika, 2025.
44 E. Güvenoğlu, “An image encryption algorithm based on multi-layered chaotic maps and its security analysis,” Connection Science, 2024.
45 N. Iqbal et al., “An efficient hybrid encryption model based on deep convolutional neural networks, DNA computing and chaotic system,” Multimedia Tools and Applications, 2022.
46 S. Minocha et al., “Adaptive image encryption approach using an enhanced swarm intelligence algorithm,” Scientific Reports, 2025.
47 K. Revathi et al., “An efficient image encryption algorithm using a discrete memory-based logistic map with deep neural network,” Journal of Engineering and Applied Science, 2024.
48 K. He, X. Zhang, S. Ren, and J. Sun, “Identity mappings in deep residual networks,” in Proc. ECCV, 2016.
49 Z. Liu et al., “A two-branch ResNet-BiLSTM deep learning framework for extracting multimodal features,” Sensors, 2025.
50 National Institutes of Health, “ChestX-ray14: Hospital-scale chest X-ray database and benchmarks,” Kaggle.
51 A. Jolfaei and A. Mirghadri, “Image encryption using chaotic maps and hash functions,” Multimedia Tools and Applications, 2019.
52 L. Teng et al., “A novel chaotic image encryption algorithm based on bit-level permutation,” IEEE Access, 2021.
53 S. Behnia et al., “A novel algorithm for image encryption based on mixture of chaotic maps,” Chaos, Solitons & Fractals, 2008.
54 X. Chai et al., “A novel color image encryption algorithm based on DNA sequence and chaotic system,” Optik, 2017.
55 Abuali, T. M., & Algamaty, R. K. (2025). Analyzing AI Applications in Improving Patient Experience: From Diagnosis to Recovery. The Open European Journal for Research in Medical and Basic Sciences (OEJRMBS), 36-47.


