A Robust Quasi-Quantum Walks-Based Steganography Protocol for Secure Transmission of Images on Cloud-Based E-healthcare Platforms.
Reads0
Chats0
TLDR
The proposed protocol is validated on a dataset of medical images, which exhibited remarkable outcomes in terms of their security, good visual quality, high resistance to data loss attacks, high embedding capacity, etc., making the proposed scheme a veritable strategy for efficient medical image steganography.Abstract:
Traditionally, tamper-proof steganography involves using efficient protocols to encrypt the stego cover image and/or hidden message prior to embedding it into the carrier object. However, as the inevitable transition to the quantum computing paradigm beckons, its immense computing power will be exploited to violate even the best non-quantum, i.e., classical, stego protocol. On its part, quantum walks can be tailored to utilise their astounding ‘quantumness’ to propagate nonlinear chaotic behaviours as well as its sufficient sensitivity to alterations in primary key parameters both important properties for efficient information security. Our study explores using a classical (i.e., quantum-inspired) rendition of the controlled alternate quantum walks (i.e., CAQWs) model to fabricate a robust image steganography protocol for cloud-based E-healthcare platforms by locating content that overlays the secret (or hidden) bits. The design employed in our technique precludes the need for pre and/or post encryption of the carrier and secret images. Furthermore, our design simplifies the process to extract the confidential (hidden) information since only the stego image and primary states to run the CAQWs are required. We validate our proposed protocol on a dataset of medical images, which exhibited remarkable outcomes in terms of their security, good visual quality, high resistance to data loss attacks, high embedding capacity, etc., making the proposed scheme a veritable strategy for efficient medical image steganography.read more
Citations
More filters
Journal ArticleDOI
A New Chaotic Map With Dynamic Analysis and Encryption Application in Internet of Health Things
Nestor Tsafack,Syam Sankar,Bassem Abd-El-Atty,Jacques Kengne,K. C. Jithin,Akram Belazi,Irfan Mehmood,Ali Kashif Bashir,Oh-Young Song,Ahmed A. Abd El-Latif +9 more
TL;DR: An effective cryptosystem aimed at securing the transmission of medical images in an Internet of Healthcare Things (IoHT) environment is reported, indicating high security and can be effectively incorporated in an IoHT framework for secure medical image transmission.
Journal ArticleDOI
A Systematic Survey on Energy-Efficient Techniques in Sustainable Cloud Computing
Salil Bharany,Sandeep Sharma,Osamah Ibrahim Khalaf,Ghaida Muttashar Abdulsahib,Abeer S. Al Humaimeedy,Theyazn H. H. Aldhyani,Mashael S. Maashi,Hasan Alkahtani +7 more
TL;DR: A complete systematic mapping analysis on the impact of high energy consumption in cloud data centers and its effect on the environment is conducted and suggestions for future enhancements in green computing are provided.
Journal ArticleDOI
Optical image encryption based on quantum walks
Bassem Abd-El-Atty,Abdullah M. Iliyasu,Abdullah M. Iliyasu,Abdullah M. Iliyasu,Ahmad Alanezi,Ahmed A. Abd El-Latif +5 more
TL;DR: Simulation-based validation of the proposed optical encryption approach based on quantum walks and double random phase encoding technique, including correlation, histogram, sensitivity, key space, noise and data loss analysis provide impetus to consider its use in applications in modern optical cryptosystems.
Journal ArticleDOI
Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment
Ahmad Alanezi,Bassem Abd-El-Atty,Hoshang Kolivand,Ahmed A. Abd El-Latif,Basma Abd El-Rahiem,Syam Sankar,Hany S. Khalifa +6 more
TL;DR: In this article, the authors proposed an image cryptosystem for data transfer in cloud-based smart cities using the cascading of Logistic-Chebyshev and Logistic Sine maps.
Journal ArticleDOI
A 5-D Multi-Stable Hyperchaotic Two-Disk Dynamo System With No Equilibrium Point: Circuit Design, FPGA Realization and Applications to TRNGs and Image Encryption
Sundarapandian Vaidyanathan,Aceng Sambas,Bassem Abd-El-Atty,Ahmed A. Abd El-Latif,Esteban Tlelo-Cuautle,Omar Guillén-Fernández,Mustafa Mamat,Mohamad Afendee Mohamed,Murat Alcin,Murat Tuna,Ihsan Pehlivan,Ismail Koyuncu,Mohd Asrul Hery Ibrahim +12 more
TL;DR: Simulation outcomes of the presented encryption approach confirm that the proposed 5-D hyperchaotic dynamo system has good cryptographic properties and its usability in different cryptographic purposes.
References
More filters
Proceedings ArticleDOI
Data Security and Privacy Protection Issues in Cloud Computing
Deyan Chen,Hong Zhao +1 more
TL;DR: This paper provides a concise but all-round analysis on data security and privacy protection issues associated with cloud computing across all stages of data life cycle and describes future research work about dataSecurity and privacy Protection issues in cloud.
Journal ArticleDOI
Next generation cloud computing
Blesson Varghese,Rajkumar Buyya +1 more
TL;DR: The changing cloud infrastructure is discussed and the use of infrastructure from multiple providers and the benefit of decentralising computing away from data centers is considered, leading to a roadmap of challenges that will need to be addressed for realising the potential of next generation cloud systems.
Posted Content
Next Generation Cloud Computing: New Trends and Research Directions
Blesson Varghese,Rajkumar Buyya +1 more
TL;DR: In this article, the authors discuss the changing cloud infrastructure and consider the use of infrastructure from multiple providers and the benefit of decentralising computing away from data centers, and lay out a roadmap of challenges that will need to be addressed for realising the potential of next generation cloud systems.
Journal ArticleDOI
Image steganography in spatial domain: A survey
Mehdi Hussain,Mehdi Hussain,Ainuddin Wahid Abdul Wahab,Yamani Idna Bin Idris,Anthony T. S. Ho,Anthony T. S. Ho,Anthony T. S. Ho,Ki-Hyun Jung +7 more
TL;DR: The general structure of the steganographic system and classifications of image steganography techniques with its properties in spatial domain are exploited and different performance matrices and steganalysis detection attacks are discussed.
Journal ArticleDOI
Privacy-friendly platform for healthcare data in cloud based on blockchain environment
Abdullah Al Omar,Zakirul Alam Bhuiyan,Anirban Basu,Shinsaku Kiyomoto,Mohammad Shahriar Rahman +4 more
TL;DR: This paper presents a patient centric healthcare data management system using blockchain technology as storage which helps to attain privacy and analyzes the data processing procedures and the cost effectiveness of the smart contracts used in the system.