Abstract

Traditionally, tamper-proof steganography involves using efficient protocols to encrypt the stego cover image and/or hidden message prior to embedding it into the carrier object. However, as the inevitable transition to the quantum computing paradigm beckons, its immense computing power will be exploited to violate even the best non-quantum, i.e., classical, stego protocol. On its part, quantum walks can be tailored to utilise their astounding ‘quantumness’ to propagate nonlinear chaotic behaviours as well as its sufficient sensitivity to alterations in primary key parameters both important properties for efficient information security. Our study explores using a classical (i.e., quantum-inspired) rendition of the controlled alternate quantum walks (i.e., CAQWs) model to fabricate a robust image steganography protocol for cloud-based E-healthcare platforms by locating content that overlays the secret (or hidden) bits. The design employed in our technique precludes the need for pre and/or post encryption of the carrier and secret images. Furthermore, our design simplifies the process to extract the confidential (hidden) information since only the stego image and primary states to run the CAQWs are required. We validate our proposed protocol on a dataset of medical images, which exhibited remarkable outcomes in terms of their security, good visual quality, high resistance to data loss attacks, high embedding capacity, etc., making the proposed scheme a veritable strategy for efficient medical image steganography.

Highlights

  • In tandem with the advancements and accelerated growth of biomedical systems, medical data have assumed more sophisticated and ubiquitous roles in the modern age

  • Notwithstanding, this study explores the integration of quantum-inspired controlled alternate quantum walks (CAQWs) into medical image steganography

  • Our design precludes the need for pre or post encryption and extraction procedures which means that only stego image and primary states of the CAQWs are required to extract the hidden image

Read more

Summary

A Robust Quasi-Quantum Walks-based

Steganography Protocol for Secure Transmission of Images on Cloud-based E-healthcare Platforms. Electrical Engineering Department, College of Engineering, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia. Mathematics and Computer Science Department, Faculty of Science, Menoufia University, P.O. Box 32511, Shebin El-Koom 32511, Egypt.

Introduction
IoT-Based Healthcare and Quantum Walks
Quantum Walks
Proposed Image Steganography Scheme
1: Embedding process
Simulation-based
Data Loss Analyses
Payload
Security Analysis
Discussion
11. Graphical
5.5.Concluding

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.