Your browser doesn't support javascript.
loading
A Robust Quasi-Quantum Walks-Based Steganography Protocol for Secure Transmission of Images on Cloud-Based E-healthcare Platforms.
Abd-El-Atty, Bassem; Iliyasu, Abdullah M; Alaskar, Haya; Abd El-Latif, Ahmed A.
Afiliación
  • Abd-El-Atty B; Centre of Excellence in Cybersecurity, Quantum Information Processing, and Artificial Intelligence, Menoufia University, Shebin El-Koom 32511, Egypt.
  • Iliyasu AM; Electrical Engineering Department, College of Engineering, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia.
  • Alaskar H; School of Computing, Tokyo Institute of Technology, Yokohama 226-8502, Japan.
  • Abd El-Latif AA; School of Computer Science and Technology, Changchun University of Science and Technology, Changchun 130022, China.
Sensors (Basel) ; 20(11)2020 May 31.
Article en En | MEDLINE | ID: mdl-32486383
Traditionally, tamper-proof steganography involves using efficient protocols to encrypt the stego cover image and/or hidden message prior to embedding it into the carrier object. However, as the inevitable transition to the quantum computing paradigm beckons, its immense computing power will be exploited to violate even the best non-quantum, i.e., classical, stego protocol. On its part, quantum walks can be tailored to utilise their astounding 'quantumness' to propagate nonlinear chaotic behaviours as well as its sufficient sensitivity to alterations in primary key parameters both important properties for efficient information security. Our study explores using a classical (i.e., quantum-inspired) rendition of the controlled alternate quantum walks (i.e., CAQWs) model to fabricate a robust image steganography protocol for cloud-based E-healthcare platforms by locating content that overlays the secret (or hidden) bits. The design employed in our technique precludes the need for pre and/or post encryption of the carrier and secret images. Furthermore, our design simplifies the process to extract the confidential (hidden) information since only the stego image and primary states to run the CAQWs are required. We validate our proposed protocol on a dataset of medical images, which exhibited remarkable outcomes in terms of their security, good visual quality, high resistance to data loss attacks, high embedding capacity, etc., making the proposed scheme a veritable strategy for efficient medical image steganography.
Asunto(s)
Palabras clave

Texto completo: 1 Colección: 01-internacional Base de datos: MEDLINE Asunto principal: Algoritmos / Procesamiento de Imagen Asistido por Computador / Seguridad Computacional / Telemedicina / Nube Computacional Idioma: En Revista: Sensors (Basel) Año: 2020 Tipo del documento: Article País de afiliación: Egipto Pais de publicación: Suiza

Texto completo: 1 Colección: 01-internacional Base de datos: MEDLINE Asunto principal: Algoritmos / Procesamiento de Imagen Asistido por Computador / Seguridad Computacional / Telemedicina / Nube Computacional Idioma: En Revista: Sensors (Basel) Año: 2020 Tipo del documento: Article País de afiliación: Egipto Pais de publicación: Suiza