scispace - formally typeset
Open AccessJournal ArticleDOI

A Robust Quasi-Quantum Walks-Based Steganography Protocol for Secure Transmission of Images on Cloud-Based E-healthcare Platforms.

Reads0
Chats0
TLDR
The proposed protocol is validated on a dataset of medical images, which exhibited remarkable outcomes in terms of their security, good visual quality, high resistance to data loss attacks, high embedding capacity, etc., making the proposed scheme a veritable strategy for efficient medical image steganography.
Abstract
Traditionally, tamper-proof steganography involves using efficient protocols to encrypt the stego cover image and/or hidden message prior to embedding it into the carrier object. However, as the inevitable transition to the quantum computing paradigm beckons, its immense computing power will be exploited to violate even the best non-quantum, i.e., classical, stego protocol. On its part, quantum walks can be tailored to utilise their astounding ‘quantumness’ to propagate nonlinear chaotic behaviours as well as its sufficient sensitivity to alterations in primary key parameters both important properties for efficient information security. Our study explores using a classical (i.e., quantum-inspired) rendition of the controlled alternate quantum walks (i.e., CAQWs) model to fabricate a robust image steganography protocol for cloud-based E-healthcare platforms by locating content that overlays the secret (or hidden) bits. The design employed in our technique precludes the need for pre and/or post encryption of the carrier and secret images. Furthermore, our design simplifies the process to extract the confidential (hidden) information since only the stego image and primary states to run the CAQWs are required. We validate our proposed protocol on a dataset of medical images, which exhibited remarkable outcomes in terms of their security, good visual quality, high resistance to data loss attacks, high embedding capacity, etc., making the proposed scheme a veritable strategy for efficient medical image steganography.

read more

Citations
More filters
Journal ArticleDOI

A New Chaotic Map With Dynamic Analysis and Encryption Application in Internet of Health Things

TL;DR: An effective cryptosystem aimed at securing the transmission of medical images in an Internet of Healthcare Things (IoHT) environment is reported, indicating high security and can be effectively incorporated in an IoHT framework for secure medical image transmission.
Journal ArticleDOI

A Systematic Survey on Energy-Efficient Techniques in Sustainable Cloud Computing

TL;DR: A complete systematic mapping analysis on the impact of high energy consumption in cloud data centers and its effect on the environment is conducted and suggestions for future enhancements in green computing are provided.
Journal ArticleDOI

Optical image encryption based on quantum walks

TL;DR: Simulation-based validation of the proposed optical encryption approach based on quantum walks and double random phase encoding technique, including correlation, histogram, sensitivity, key space, noise and data loss analysis provide impetus to consider its use in applications in modern optical cryptosystems.
Journal ArticleDOI

Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment

TL;DR: In this article, the authors proposed an image cryptosystem for data transfer in cloud-based smart cities using the cascading of Logistic-Chebyshev and Logistic Sine maps.
References
More filters
Proceedings ArticleDOI

Data Security and Privacy Protection Issues in Cloud Computing

TL;DR: This paper provides a concise but all-round analysis on data security and privacy protection issues associated with cloud computing across all stages of data life cycle and describes future research work about dataSecurity and privacy Protection issues in cloud.
Journal ArticleDOI

Next generation cloud computing

TL;DR: The changing cloud infrastructure is discussed and the use of infrastructure from multiple providers and the benefit of decentralising computing away from data centers is considered, leading to a roadmap of challenges that will need to be addressed for realising the potential of next generation cloud systems.
Posted Content

Next Generation Cloud Computing: New Trends and Research Directions

TL;DR: In this article, the authors discuss the changing cloud infrastructure and consider the use of infrastructure from multiple providers and the benefit of decentralising computing away from data centers, and lay out a roadmap of challenges that will need to be addressed for realising the potential of next generation cloud systems.
Journal ArticleDOI

Image steganography in spatial domain: A survey

TL;DR: The general structure of the steganographic system and classifications of image steganography techniques with its properties in spatial domain are exploited and different performance matrices and steganalysis detection attacks are discussed.
Journal ArticleDOI

Privacy-friendly platform for healthcare data in cloud based on blockchain environment

TL;DR: This paper presents a patient centric healthcare data management system using blockchain technology as storage which helps to attain privacy and analyzes the data processing procedures and the cost effectiveness of the smart contracts used in the system.
Related Papers (5)