2020
DOI: 10.3390/s20113108
|View full text |Cite
|
Sign up to set email alerts
|

A Robust Quasi-Quantum Walks-based Steganography Protocol for Secure Transmission of Images on Cloud-based E-healthcare Platforms

Abstract: Traditionally, tamper-proof steganography involves using efficient protocols to encrypt the stego cover image and/or hidden message prior to embedding it into the carrier object. However, as the inevitable transition to the quantum computing paradigm beckons, its immense computing power will be exploited to violate even the best non-quantum, i.e., classical, stego protocol. On its part, quantum walks can be tailored to utilise their astounding ‘quantumness’ to propagate nonlinear chaotic behaviours as well as … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
33
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
5

Relationship

3
7

Authors

Journals

citations
Cited by 77 publications
(40 citation statements)
references
References 29 publications
0
33
0
Order By: Relevance
“…To measure the noise ratio between the plain and cipher images, we employed peak signal-to-noise ratio (PSNR) tool, which can be defined as [27] Plain…”
Section: Peak Signal-to-noise Ratio Analysismentioning
confidence: 99%
“…To measure the noise ratio between the plain and cipher images, we employed peak signal-to-noise ratio (PSNR) tool, which can be defined as [27] Plain…”
Section: Peak Signal-to-noise Ratio Analysismentioning
confidence: 99%
“…If data is transmitted via communication channels, noise can affect the transmitted information and lose some of its parts ( [49], [50]). Therefore, a highly designed cryptographic system should be able to withstand data loss attacks.…”
Section: E Occlusion Attacksmentioning
confidence: 99%
“…During transmission of the cipher image from sender to receiver, some data or pixel information may be occluded or lost. A transmission channel can cause a mislay of a part of the transmitted message [24], [26]. Our cryptosystem must be efficient in terms of resisting occlusion attacks too.…”
Section: Occlusion Attackmentioning
confidence: 99%