A Robust Quasi-Quantum Walks-based Steganography Protocol for Secure Transmission of Images on Cloud-based E-healthcare Platforms

Traditionally, tamper-proof steganography involves using efficient protocols to encrypt the stego cover image and/or hidden message prior to embedding it into the carrier object. However, as the inevitable transition to the quantum computing paradigm beckons, its immense computing power will be exploited to violate even the best non-quantum, i.e., classical, stego protocol. On its part, quantum walks can be tailored to utilise their astounding ‘quantumness’ to propagate nonlinear chaotic behaviours as well as its sufficient sensitivity to alterations in primary key parameters both important properties for efficient information security. Our study explores using a classical (i.e., quantum-inspired) rendition of the controlled alternate quantum walks (i.e., CAQWs) model to fabricate a robust image steganography protocol for cloud-based E-healthcare platforms by locating content that overlays the secret (or hidden) bits. The design employed in our technique precludes the need for pre and/or post encryption of the carrier and secret images. Furthermore, our design simplifies the process to extract the confidential (hidden) information since only the stego image and primary states to run the CAQWs are required. We validate our proposed protocol on a dataset of medical images, which exhibited remarkable outcomes in terms of their security, good visual quality, high resistance to data loss attacks, high embedding capacity, etc., making the proposed scheme a veritable strategy for efficient medical image steganography.

[1]  Atif Alamri,et al.  Efficient Quantum Information Hiding for Remote Medical Image Sharing , 2018, IEEE Access.

[2]  Rajkumar Buyya,et al.  Next generation cloud computing: New trends and research directions , 2017, Future Gener. Comput. Syst..

[3]  Rui Yang,et al.  Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption , 2016, Scientific Reports.

[4]  Lu Zhou,et al.  Quantum technique for access control in cloud computing II: Encryption and key distribution , 2018, J. Netw. Comput. Appl..

[5]  Ahmed A. Abd El-Latif,et al.  Efficient quantum-based security protocols for information sharing and data protection in 5G networks , 2019, Future Gener. Comput. Syst..

[6]  Xiande Liu,et al.  A novel quantum steganography scheme for color images , 2018 .

[7]  Juan Xu,et al.  Controlled Alternate Quantum Walks based Quantum Hash Function , 2017, Scientific Reports.

[8]  Sung Wook Baik,et al.  Image steganography using uncorrelated color space and its application for security of visual contents in online social networks , 2016, Future Gener. Comput. Syst..

[9]  Hui Chen,et al.  Discrete-time interacting quantum walks and quantum Hash schemes , 2013, Quantum Inf. Process..

[10]  Majid Mollaeefar,et al.  A novel method for digital image steganography based on a new three-dimensional chaotic map , 2017, Multimedia Tools and Applications.

[11]  Xinpeng Zhang,et al.  Towards Robust Image Steganography , 2019, IEEE Transactions on Circuits and Systems for Video Technology.

[12]  Changming Zhu,et al.  A Novel Quantum Image Steganography Scheme Based on LSB , 2018 .

[13]  Fei Yan,et al.  A Special Section on Hybrid Intelligent Systems and Applications in Medical Imaging and Health Informatics , 2019 .

[14]  Md. Zakirul Alam Bhuiyan,et al.  Privacy-friendly platform for healthcare data in cloud based on blockchain environment , 2019, Future Gener. Comput. Syst..

[15]  Abdullah M. Iliyasu Roadmap to Talking Quantum Movies: a Contingent Inquiry , 2019, IEEE Access.

[16]  Pratistha Mathur,et al.  Efficient image steganography using graph signal processing , 2018, IET Image Process..

[17]  BuyyaRajkumar,et al.  Next generation cloud computing , 2018 .

[18]  Jialiang Peng,et al.  Image steganography algorithm based on key matrix generated by quantum walks , 2019, International Conference on Digital Image Processing.

[19]  Koji Nakamae,et al.  A quantum watermarking scheme using simple and small-scale quantum circuits , 2016, Quantum Information Processing.

[20]  Xuehu Yan,et al.  New approaches for efficient information hiding-based secret image sharing schemes , 2015, Signal Image Video Process..

[21]  Ahmed A. Abd El-Latif,et al.  A novel image steganography technique based on quantum substitution boxes , 2019, Optics & Laser Technology.

[22]  Ahmed A. Abd El-Latif,et al.  Controlled alternate quantum walks based privacy preserving healthcare images in Internet of Things , 2020, Optics & Laser Technology.

[23]  Jialiang Peng,et al.  Image watermarking algorithm based on quaternion and chaotic Lorenz system , 2019, International Conference on Digital Image Processing.

[24]  Rongxing Lu,et al.  PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system , 2018, Future Gener. Comput. Syst..

[25]  Mazhar B. Tayel,et al.  A Triple-Layer Encryption-Based Watermarking Technique for Improving Security of Medical Images , 2019, J. Medical Imaging Health Informatics.

[26]  Ainuddin Wahid Abdul Wahab,et al.  Image steganography in spatial domain: A survey , 2018, Signal Process. Image Commun..

[27]  Ahmed A. Abd El-Latif,et al.  An encryption protocol for NEQR images based on one-particle quantum walks on a circle , 2019, Quantum Information Processing.

[28]  Fei Peng,et al.  Robust Coverless Image Steganography Based on DCT and LDA Topic Classification , 2018, IEEE Transactions on Multimedia.

[29]  Ahmed A. Abd El-Latif,et al.  Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications , 2020, Scientific Reports.

[30]  Hong Zhao,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.