Next Article in Journal
Crop Management in Controlled Environment Agriculture (CEA) Systems Using Predictive Mathematical Models
Next Article in Special Issue
Prediction of Body Weight of a Person Lying on a Smart Mat in Nonrestraint and Unconsciousness Conditions
Previous Article in Journal
Tracking by Risky Particle Filtering over Sensor Networks
Previous Article in Special Issue
A Multiobjective, Lion Mating Optimization Inspired Routing Protocol for Wireless Body Area Sensor Network Based Healthcare Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Robust Quasi-Quantum Walks-based Steganography Protocol for Secure Transmission of Images on Cloud-based E-healthcare Platforms

by
Bassem Abd-El-Atty
1,†,
Abdullah M. Iliyasu
2,3,4,*,†,
Haya Alaskar
5 and
Ahmed A. Abd El-Latif
1,6,7,*,†
1
Centre of Excellence in Cybersecurity, Quantum Information Processing, and Artificial Intelligence, Menoufia University, Shebin El-Koom 32511, Egypt
2
Electrical Engineering Department, College of Engineering, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia
3
School of Computing, Tokyo Institute of Technology, Yokohama 226-8502, Japan
4
School of Computer Science and Technology, Changchun University of Science and Technology, Changchun 130022, China
5
Computer Science Department, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia
6
Mathematics and Computer Science Department, Faculty of Science, Menoufia University, P.O. Box 32511, Shebin El-Koom 32511, Egypt
7
School of Information Technology and Computer Science, Nile University, 26th July Corridor, Sheikh Zayed City, Giza 12588, Egypt
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2020, 20(11), 3108; https://doi.org/10.3390/s20113108
Submission received: 27 April 2020 / Revised: 28 May 2020 / Accepted: 29 May 2020 / Published: 31 May 2020
(This article belongs to the Special Issue Smart IoT Systems for Pervasive Healthcare)

Abstract

:
Traditionally, tamper-proof steganography involves using efficient protocols to encrypt the stego cover image and/or hidden message prior to embedding it into the carrier object. However, as the inevitable transition to the quantum computing paradigm beckons, its immense computing power will be exploited to violate even the best non-quantum, i.e., classical, stego protocol. On its part, quantum walks can be tailored to utilise their astounding ‘quantumness’ to propagate nonlinear chaotic behaviours as well as its sufficient sensitivity to alterations in primary key parameters both important properties for efficient information security. Our study explores using a classical (i.e., quantum-inspired) rendition of the controlled alternate quantum walks (i.e., CAQWs) model to fabricate a robust image steganography protocol for cloud-based E-healthcare platforms by locating content that overlays the secret (or hidden) bits. The design employed in our technique precludes the need for pre and/or post encryption of the carrier and secret images. Furthermore, our design simplifies the process to extract the confidential (hidden) information since only the stego image and primary states to run the CAQWs are required. We validate our proposed protocol on a dataset of medical images, which exhibited remarkable outcomes in terms of their security, good visual quality, high resistance to data loss attacks, high embedding capacity, etc., making the proposed scheme a veritable strategy for efficient medical image steganography.

Graphical Abstract

1. Introduction

In tandem with the advancements and accelerated growth of biomedical systems, medical data have assumed more sophisticated and ubiquitous roles in the modern age. Given secure communication channels, medical data can be securely stored in cloud-based E-healthcare platforms for wide ranging applications and uses related to education, research, medical consultations, etc. [1]. Due to concerns pertaining to patient confidentiality, today, data privacy and security are paramount when transferring medical information across the internet and storing it on cloud data storage facilities [2]. Medical data can be secured via appropriate cryptographic or data hiding techniques prior to uploading to the cloud. In cryptography, confidential data is obfuscated from an intelligible form to an incomprehensible pattern [3,4]. Meanwhile, in traditional data hiding, confidential information is imperceptibly suffused into some host media. Depending on its objective, data hiding can be further divided into watermarking for copyright protection, and steganography for securing confidentiality [5,6]. To elaborate, in steganography, a secret image is hidden in a host (or carrier) image making it useful in applications to restrict access to such confidential information [7]. In image steganography, the goal is to suffuse the confidential data into the spatial or transformation domain of the host (or carrier) image via carefully crafted alterations that retain the visual and statistical features of the host image [8].
Recently, many image steganography schemes that exploit the spatial domain have been studied extensively [8,9,10,11,12,13,14,15]. These spatial domain image steganography strategies involve direct substitution of some bits in pixel values of the cover image with secret bits [16]. The easiest type of this mechanism is the Least Significant Bit (LSB) technique where the confidential data is hidden in the LSBs of pixel values in the carrier image. The advantage of this approach is its high embedding capacity, while its main downside is its vulnerability to various forms of attacks. The common method to avoid this shortcoming is to encrypt the confidential data prior to hiding it into the cover image.
Usually, this shortcoming is mitigated by encrypting a well-designed image steganography mechanism that can withstand extraction of the hidden object from the cover image. Therefore, the security of such image steganography mechanisms can be enhanced by combining the steganography mechanism with a well-designed cryptographic mechanism, for instance, encrypting the secret object prior embedding it into the cover image or encrypting the stego image.
Meanwhile, notwithstanding these improvements, the inevitable realisation of scalable quantum computing resources portends huge implications to the security and utility of many information security paradigms. This is attributed to their stupendous computing power [17,18,19] of this new computing model, which means ordinarily intractable computations can be completed within minutes. This potentially implies loss of confidentiality and security in many of today’s data privacy applications, such as credit card transactions, etc. [19]. Considering this and in order to guarantee security against unauthorised breaches, it is important to consider infusing some level of quantumness into prevailing protocols. Despite the renewed impetus, funding, and progress in the road towards realisation of physical quantum computing hardware, such scalable technology is still unavailable [19]. Notwithstanding, this study explores the integration of quantum-inspired controlled alternate quantum walks (CAQWs) into medical image steganography. In doing so, we build on the available literature with both quantum image processing (QIP) [19,20] focus and other quantum-inspired approaches like our own [21]. For example, in [12], El-Latif et al. proposed an image steganography mechanism based on quantum substitution boxes whose construction is based on one-dimensional two-particle quantum walks (1D 2P QWs). Similarly, in [13], Peng et al. suggested a new image steganography mechanism based on 1D 2P QWs to embed a greyscale image into a colour image, where 1D 2P QWs were used to decide which colour channel will host the secret bits. Meanwhile, motivated by the conclusion, in [22], which inferred that the realisation of CAQWs is easier than that of 1D 2P QWs, in this study, we tailor our embedding and extraction processes in tandem with that inference. Specifically, quantum-inspired variants of CAQWs are used to determine pixels for overlaying secret (or hidden) bits in the carrier image. Our design precludes the need for pre or post encryption and extraction procedures which means that only stego image and primary states of the CAQWs are required to extract the hidden image. For further illustration, Table 1 provides a comparative analysis between our proposed mechanism relative to other data hiding mechanisms that are built on quantum mechanics. Whereas these data hiding mechanisms require the availability of quantum computing hardware (i.e., to implement them in real time), execution of our proposed schemes is confined to digital computers. Simulation-based experiments validate the efficacy of our proposed quantum-inspired protocol as exhibited via outcomes that offer good visual quality, resistance to data loss attacks, high embedding capacity, and robust security.
The remainder of our study flows as follows: background on the framework for secure transmission in cloud-based E-healthcare together with a brief overview of quantum walks are presented in Section 2. That background provides foundation for our proposed image steganography scheme and its composition as presented in Section 3. Finally, the experimental implementation of the proposed framework and discussions of results therefrom are presented in Section 4.

2. IoT-Based Healthcare and Quantum Walks

2.1. Framework for Secure Transmission of Images on Cloud-Based E-Healthcare Platforms

The Internet of Things (IoT) offers highly scalable computing resources as online services. With the rapid development of cloud computing technologies, an expanding number of people, institutions and companies are choosing cloud platforms to store and manipulate their data. Cloud computing has enormous advantages that include remote storage, mobility, data sharing, cost savings in hardware and software, etc. However, many security challenges that are attributed to the cloud computing environment have not yet been addressed, especially in traditional computing environments [24,25]. Further, it has been observed that security and privacy issues have severely restricted the practical applications of cloud technologies [26]. To address these significant problems, it is essential to propose and design new algorithms and methods to secure cloud computing infrastructure.
Meanwhile, advances in quantum technologies are expected to usher in the quantum era whence there will be adequate computing power to tamper with the best of today’s traditional cryptographic algorithms [27,28]. Already, numerous quantum algorithms have been validated at small scale and lab level as well as via simulations. Presently, there is immense interest in the area, which is supported by extensive investments by governments, industry, and academia. [19]. Indeed, this race for quantum supremacy supports the consensus that the inevitable quantum era is upon us. In the meantime, to forestall future violations of today’s data security, their protection using secure pseudo-quantum or quantum-inspired algorithms seems a worthwhile undertaking. Our proposed framework for the safe transfer of medical images on cloud-based E-healthcare platforms is outlined in Figure 1. From this figure, we see that secret information is infused onto the medical images captured from patients prior to uploading them as part of a public dataset. Elsewhere in the system (Figure 1), authorised users, such as doctors, healthcare providers, etc., download the stego image (which carries the secret medical information) and then extract the secret information using our pseudo-quantum walks mechanism. While this secret information could be any type of media such as patient records, identification, etc., in this study, different types of medical images are used. The implementation of our quantum-inspired quantum walks scheme provides cogency supporting seamless refinements to safeguard the images from probable attacks when quantum computing hardware inevitably become available [19].

2.2. Quantum Walks

Controlled alternate quantum walks (CAQWs) have two essential elements: the first one is the walker space H p and the other one is the coin space H c = cos θ | 0 + sin θ | 1 both of which reside within a Hilbert space H = H p H c [4]. The coin particle is a quantum system existing in a two-dimensional Hilbert space with amplitudes cos θ and sin θ . In every step of executing a B-bit string CAQWs on a V node circle, an evolution operator T ^ 0 (or T ^ 1 ) is applied when the i th bit of bit string B is 0 (or 1). The unitary transformations T ^ 0 and T ^ 1 are defined in Equation (1).
T ^ 0 = F ^ y ( I ^ R ^ 0 ) F ^ x ( I ^ R ^ 0 ) T ^ 1 = F ^ y ( I ^ R ^ 1 ) F ^ x ( I ^ R ^ 1 )
where F ^ x denotes to the shift operator of CAQWs on a ring with V nodes acting on x dimensions in the form defined in Equation (2).
F ^ x = x , y v ( | ( x + 1 ) mod V , y , 0 x , y , 0 | ) + x , y v ( | ( x 1 ) mod V , y , 1 x , y , 1 | )
Like F ^ x , F ^ y expresses CAQWs on a ring with V nodes acting on y dimensions, while the two operators R ^ 0 and R ^ 1 are coin operators defined as in Equation (3).
R ^ 0 = ( cos   α 0 sin   α 0 sin   α 0 cos   α 0 ) R ^ 1 = ( cos   α 1 cos   α 1 sin   α 1 sin   α 1 )
After i steps, the final state of | Q initial can be expressed in the form presented in Equation (4).
| Q i = ( T ^ ) i | Q i n i t i a l
Eventually, the possibility of detecting the walker of CAQWs at location (x, y) after i steps can be computed using Equation (5).
P ( x , y , i ) = s { 0 , 1 } | x , y , s | ( T ^ ) i | Q 0 | 2
These mathematical formulations are modelled as building blocks of our quantum-inspired scheme and deployed to safeguard medical images in an e-healthcare scenario. Details of our rendition of the quantum walks protocol on digital computers is presented in the next section.

3. Proposed Image Steganography Scheme

In this section, we illuminate the role of CAQWs in designing an image steganography mechanism to embed a confidential image onto a carrier image. The main role of CAQWs is to determine two LSB pixel locations in the carrier image to utilise for embedding the secret bits. However, only two bits of the secret image are embedded into the two LSBs of the selected pixel. Therefore, the confidential and carrier images are h 2 × w 2 and h × w in dimension, whilst the outcome capacity is 2 bits per pixel. Figure 2 presents the general framework of our proposed quantum-inspired image steganography mechanism, while execution of the embedding process is outlined in Algorithm 1.
First, a vectorisation procedure uses CAQWs to transform the detection matrix in (5) as well as key information about the carrier and confidential images into a vector that is subsequently used as part of the embedding process. The initial key parameters ( V ,   B ,   θ ,   α 0 ,   α 2 ) are utilised to execute CAQWs on a cycle of V odd-valued nodes determined by a bit string B to retrieve a V × V probability distribution matrix, P. Here, the primary state of the coin walker is H c = cos θ | 0 + sin θ | 1 wherein 0 θ ,   α 0 ,   α 2 π / 2 are the key parameters used to construct the coin operators R ^ 0 and R ^ 1 , respectively.
Algorithm 1: Embedding process
Input: Carrier image (CIm), Confidential image (SIm), and Initial key parameters ( V ,   B ,   θ ,   α 0 ,   α 2 )
Output: Stego image (Stgo)
P← CAQWs ( V ,   B ,   θ ,   α 0 ,   α 2 ) // Operate CAQWs using initial key parameters
[h, w, c] ← size (CIm) // Obtain the size of the carrier image
D← resize (P, [h, w × c ]) // Resize the matrix P to the dimension of the cover image
E← order (D) // Order the elements of D in decreasing order
K= index (D, E) // Obtain the index of each element of D in E
ESIm ← expand (SIm) // Expand the 8-bit and h 2 × w 2 dimensional confidential image SIm to a 2-bit image of h × w dimension.
// Transform the expanded secret image ESIm and the carrier image CIm into vectors
SVec← reshape (ESIm, 1, h × w × c)
CVec← reshape (CIm, 1, h × w × c)
// Embedding process
for i←1 to h × w × c
   StgoVec(k(i))←Replace 2LSBs of CVec(k(i)) with 2bits of SVec(i);
end
// Transform the vector StgoVec into an image
Stgo←reshape (StgoVec, h, w, c)

4. Simulation-Based Experiments

To appraise the performance of our proposed image steganography mechanism, various analyses are presented to assess stego image quality, data loss analysis, security analysis, and payload capacity. We used a workstation equipped with a laptop with Intel core TM i5, a 6-GB RAM and a preinstalled MATLAB R2016b software. Our dataset comprises of two sets of medical images sourced from the MedPix dataset in [29]. The first, labelled as MDG01 through MDG05, consists of two sets of five 256 × 256 and 128 × 128 colour images, while the second set contains two sets of five greyscale medical images (labelled MDG06 through MDG10) of the same dimensions, i.e., 256 × 256 and 128 × 128. We reiterate that, as noted earlier, while the cover information can be public or private different media (text, images, patient records, etc.), in keeping with the scope of our study, we choose to implement our scheme using medical images that can be deployed in E-healthcare platforms. Therefore, the 256 × 256 images of both sub-datasets will be used as cover images whereas the 128 × 128 images constitute the secret (or confidential) images to be used in validating our proposed scheme. Although each sub-dataset consists of ten cover and carrier images, altogether 10 image types (presented in Figure 3) are used in the reported experiments. Furthermore the initial key parameters for operating CAQWs on a circle are set as V = 21, B= “1011 0110 0010 0111 0101 0101 0101 1010 0”, θ = π / 2 , α 0 = π / 4 and α 1 = π / 6 .

4.1. Image Quality Analysis

Numerous tests are employed in assessing the quality of stego images emanating from our proposed scheme. These metrics include the Peak Signal to Noise Ratio (PSNR), Structural Similarity Index Metric (SSIM), Universal Image Quality (UIQ), Normalised cross correlation (NCC), Normalised Absolute Error (NAE), Image Fidelity (IF), Average difference (AD), Maximum difference (MD), and Structural Content (SC) to appraise it performance in terms of image quality. As a prelude to our validation, definitions of the metrics used as well as overview of their established benchmarks are presented in the remainder of this subsection.

4.1.1. Peak Signal to Noise Ratio (PSNR)

PSNR is a test to measure stego image quality. It can be expressed mathematically as:
P S N R ( C , S ) 20 log 10 ( M A X C × h × w i = 0 h 1 j = 0 w 1 [ C ( i , j ) S ( i , j ) ] 2 )
where MAXc indicates the maximum pixel values of the carrier image C, and S indicates its corresponding stego image. Both the carrier and stego images are h × w pixels in dimension. The visual quality of stego images reported in Figure 4 and Figure 5 attests to the high performance, i.e., the imperceptibility, of our technique. The figures show each original image and its stego version as well as the secret image prior to and after extraction from the stego image. Further, a plot of the variation of a sample of histogram similarity [30] for the secret image prior to and after extraction from the stego image presented in Figure 6. Similarly, the PSNR values reported in Table 2 and Table 3 show the quantitative assessment of fidelity between the original and stego versions of the carrier and secret images. High PSNR values indicate good quality, where the naked eye cannot detect the dissimilarity between the stego image and its cover version.

4.1.2. Structural Similarity Index Metric (SSIM)

SSIM is a metric used to distinguish pristine (C) and stego (S) versions of an image. It is defined in the form presented in Equation (7).
S S I M ( C , S ) = ( 2 μ C μ S + C 1 ) ( 2 σ C , S + C 2 ) ( μ C 2 + μ S 2 + C 1 ) ( σ C 2 + σ S 2 + C 2 )
where, C1 and C2 are constants, S and μ are the variance and mean, respectively. A typical SSIM value varies in the range [0, 1], where values closer to 1 indicate better match between the pristine and altered pairings of the carrier and stego images. The values of SSIM for our scheme are recorded in Table 2 for pairings from our first sub-dataset comprising of colour images and in Table 3 for the sub-dataset of greyscale medical images.

4.1.3. Universal Image Quality (UIQ)

UIQ is another metric used to distinguish pristine (C) and stego (S) that is defined mathematically as:
U I Q ( C , S ) = 4 σ C , S μ C μ S ( μ C 2 + μ S 2 ) ( σ C 2 + σ S 2 )
where, s and m are the variance and mean, respectively. The UIQ value takes the range [−1, 1] and values in Table 2 and Table 3 report UIQ values obtained from our experiments with the colour and greyscale medical image sub-datasets, respectively. In both tables, we note the reported UIQ values are close to 1 for both sub-datasets.

4.1.4. Normalised Cross Correlation (NCC)

NCC is an effective metric that is used to distinguish pristine (C) and stego (S) images. It is computed using the formulation in Equation (9).
N C C ( C , S ) = i = 1 h j = 1 w ( C ( i , j ) μ C ) ( S ( i , j ) μ S ) i = 1 h j = 1 w ( C ( i , j ) μ C ) 2 i = 1 h j = 1 w ( S ( i , j ) μ S ) 2
where mc and ms are the means of the carrier and stego images, respectively. Like UIQ, the NCC values take the range [−1, 1], where values closer to 1 indicate better match between the pristine and altered pairings of the carriers and stego images [30]. As reported in Table 2 and Table 3, NCC values obtained from our scheme exhibit fidelity between the cover and altered images used in both sub-datasets of our experiments since all the reported values are close to 1.

4.1.5. Normalised Absolute Error (NAE)

Another effective metric used to distinguish pristine (C) and stego (S) images is NAE which is formulated as presented in Equation (10).
N A E ( C , S ) = i = 1 h j = 1 w ( C ( i , j ) S ( i , j ) ) i = 1 h j = 1 w ( C ( i , j ) )
NAE values closer to 0 indicate concordance between the pristine and altered pairings of the carrier and stego images. For our proposed mechanism, these values are presented in Table 2 and Table 3 respectively for the colour and greyscale medical images reported in our experiments (i.e., Figure 3).

4.1.6. Image Fidelity (IF)

Image fidelity (IF) is a metric used to distinguish pristine (C) and stego (S) images. Mathematically, IF is computed using the formulation in Equation (11).
I F ( C , S ) = 1 i = 1 h j = 1 w ( C ( i , j ) S ( i , j ) ) 2 i = 1 h j = 1 w ( C ( i , j ) ) 2
Generally, IF values closer to 1 are desirable as an indicator of fidelity between pairings of pristine and altered images. For our two sub-datasets, IF results are reported in Table 2 and Table 3 for the colour and greyscale images, respectively.

4.1.7. Average Difference (AD)

AD is another metric used to measure the average difference between pristine (C) and stego (S) versions of an image. It is expressed in the format presented in Equation (12).
A D ( C , S ) = i = 1 h j = 1 w ( C ( i , j ) S ( i , j ) ) h × w
AD values closer to 0 indicate better fidelity between the pristine and altered pairings of the carrier and stego images. For the colour and greyscale images used in our experiment, AD values are presented in Table 2 and Table 3, respectively. Both tables report outcomes close to 0 for the pairings indicated.

4.1.8. Maximum Difference (MD)

MD is the maximum error signal between pristine (C) and stego (S) versions of an image. Mathematically, MD is expressed as:
M D ( C , S ) = M A X | C ( i . j ) S ( i , j ) |
Table 2 and Table 3 present MD values for the colour and greyscale medical images reported in our experiment. It is noteworthy that all values reported are equal to 3, which is the established benchmark for the MD metric [30].

4.1.9. Structural Content (SC)

SC is also used to distinguish pristine (C) and stego (S) images using the formula presented in Equation (14).
S C ( C , S ) = i = 1 h j = 1 w ( S ( i , j ) ) 2 i = 1 h j = 1 w ( C ( i , j ) ) 2
The values of SC closer to 1 indicate better match between the pristine and altered pairings of the carrier and stego images. SC values for our mechanism are presented in Table 2 for various pairings of colour images and in Table 3 for various greyscale medical images in our second sub-dataset. Throughout, our results are very close to 1 which is the required of benchmark for efficient stego schemes [30].

4.2. Data Loss Analyses

During data transfer, media are easily corrupted or damaged by noise or data loss. Therefore, an important test of a well-designed data hiding protocol is its ability to withstand data loss attacks [31].
To assess our proposed scheme in terms of different attacks, we considered clipping and noise addition tests. In the former, cut-out blocks were used to clip content of the stego image. In noise addition, we considered effects of adding "Salt and Pepper" noise to the stego images. Figure 7 and Figure 8 show the outcomes of the data loss (clipping) and noise addition attacks, respectively. From these outcomes, we note the ability to recover "useable", i.e., imperceptible, images despite the attacks mentioned. Moreover, since images from both attacks can be easily understood, it is apparent that the proposed scheme produces stego images capable of withstanding data loss and noise addition attacks.

4.3. Payload Capacity

The ability of a stego image to remain imperceptible is a function of its embedding capability. In this sense, payload capacity quantifies the proportion of data between the hidden and carrier bits. At 6 bits/24 bits (or 2 bits/8 bits), our proposed scheme offers adequate payload to accommodate large images whilst maintaining visual quality and withstanding different attacks.

4.4. Security Analysis

The quantumness inherent to our pseudo-CAQWs provides its propriety against infringements expected when the inevitable transition to the quantum computing paradigm is made. Furthermore, the key space arising from the CAQW on a circle employed in our scheme, i.e., ( V , B , θ , α 0 , α 1 ) provide adequate security against attempts to violate the security of stego images emanating from the proposed technique. Theoretically, the parameter B could extend to infinity, which implies an infinite length of a bit of string [30,31]. However, in mathematics and digital computing, precision can be measured by the number of decimal digits that are used to express it as a digital value [32]. Therefore, assuming a precision calculation of 10−16, then the key space for each key parameter is 1016, and therefore the key space for all parameters in our proposed technique is 1080. Like any cryptographic mechanism, if the full key parameters to execute CAQWs are revealed, then anyone can accurately retrieve the probability distribution required to violate the scheme [31]. On the other hand, if part or most of the parameters are concealed, it becomes impracticable to estimate the probability distribution. In designing our proposed scheme, any misstep in recovering the vector K (i.e., Step 4 of Algorithm 1) renders any attempt to retrieve the encryption key futile, which guarantees the security of images secured via the proposed technique. To validate this cogitation, we executed the extraction procedure to retrieve the secret image MDG04 from the stego MDG01 image within minuscule changes to its key. The outcomes reported in Figure 9 are evidence that, despite attempts to violate the stego image using diminutive adjustments to its key space, the extracted image remains indecipherable, which is a testimony of the strength of our protocol to withstand alterations to its key space.

4.5. Discussion

Inspired by the utility and tamper-proof security offered by quantum computing, we have presented a robust medical image steganography protocol based on a quantum-inspired quantum walks protocol with the aim of securing transmission of images on cloud-based E-healthcare platforms. Unlike standard QIP-based approaches, the proposed technique is built on classical renditions of quantum mechanics, which, subject to appropriate refinements, makes it tenable for securing the images against the misuses feared when physical quantum hardware is realised. Specifically, the scheme utilises the potency of our quasi or bare bones classical transcription of CAQWs for both the embedding and extraction processes while the application is tailored on medical images. The quasi CAQW protocol is used to determine areas of the carrier image that the secret bits are overlaid. Our proposed design precludes the need for pre or post encryption and extraction procedures which implies that only the stego image and primary states of the CAQWs are required to extract the hidden image. Our proposed approach is extensively tested on a dataset comprising of colour and greyscale medical images (see Figure 3).
The twelve tests and measurements reported earlier in this section demonstrate the efficiency of our proposed protocol in terms of wide-ranging image and statistical metrics, including PSNR, SSIM, UIQ, NCC, NAE, IF, AD, and SC. Furthermore, Figure 10 presents outcomes and metrics obtained from embedding the secret medical MDG05 image (presented earlier in Figure 3) onto the cover colour images (labelled MDG01 through MDG04 in Figure 3). Additionally, Figure 11 presents the graphical representation of the SSIM, UIQ, NCC, IF and SC metrics for these pairings. Similarly, Figure 12 presents the outcomes from embedding the secret greyscale MDG10 image (presented earlier in Figure 3) onto the cover greyscale images shown (labelled MDG06 through MDG09 in Figure 3). Likewise, the graphical representation of these outcomes for the SSIM, UIQ, NCC, IF and SC metrics is presented in Figure 13. Despite the differences in their implementation (i.e., quantum-inspired and QIP-based [20]), in order to demonstrate the effectiveness of the proposed mechanism, Table 4 provides a comparative analysis of its performance relative to other simulation-based QIP data hiding methods in terms of embedding capacity as well as the mean values for PSNR, SSIM, and UIQ.
As reported in the table, our proposed technique fares relatively well alongside the schemes presented in [5,12,20].

5. Concluding Remarks

Our study has presented a simple yet robust quasi-quantum walks-based image steganography mechanism to support secure transmission in cloud-based E-healthcare platforms. The embedding and extraction processes are tailored in terms of classical renditions of the controlled alternate quantum walks (i.e., CAQWs), which are subsequently used to determine pixels for overlaying secret (or hidden) bits in the stego image. The new steganography design precludes the need for pre or post encryption and extraction procedures, which means that only stego image and primary states of the CAQWs are required to extract hidden images. In addition, the new design simplifies the process of extracting confidential (i.e., hidden) information since only the stego image and primary states to execute the protocol are required. The proposed approach is tested on a dataset of colour and greyscale medical images using several simulation-based experiments. Outcomes validate the efficacy of the new scheme in terms good visual quality, resistance to data loss attacks, high embedding capacity, and robust security. Furthermore, the performance analysis shows that the proposed quantum-inspired scheme performs well relative to other state-of-art techniques, which suggests potential applications for the proposed scheme as a veritable strategy for efficient medical image steganography on future computing paradigms.

Author Contributions

Conceptualisation, B.A.-E.-A. and A.M.I.; methodology, B.A.-E.-A.; software, B.A.-E.-A., H.A.; validation, B.A.-E.-A., A.M.I. and A.A.A.E.-L.; formal analysis, B.A.-E.-A. and H.A.; investigation, B.A.-E.-A.; resources, A.M.I.; data curation, B.A.-E.-A. and H.A.; writing—original draft preparation, B.A.-E.-A. and A.A.A.E.-L.; writing—review and editing, A.M.I.; visualisation, B.A.-E.-A. and H.A.; supervision, A.M.I. and A.A.A.E.-L.; project administration, A.M.I.; funding acquisition, A.M.I. All authors have read and agreed to the published version of the manuscript.

Funding

This study is sponsored, in full, by the Prince Sattam Bin Abdulaziz University, Saudi Arabia via the Deanship for Scientific Research funding for the Advanced Computational Intelligence & Intelligent Systems Engineering (ACIISE) Research Group Project Number 2019/01/9862.

Acknowledgments

This study is sponsored, in full, by the Prince Sattam Bin Abdulaziz University, Saudi Arabia via the Deanship for Scientific Research funding for the Advanced Computational Intelligence & Intelligent Systems Engineering (ACIISE) Research Group Project Number 2019/01/9862. A.A.A acknowledges support from the Faculty of Science, Menoufia University, Egypt.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhang, C.; Zhu, L.; Xu, C.; Lu, R. PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system. Futur. Gener. Comput. Syst. 2018, 79, 16–25. [Google Scholar] [CrossRef]
  2. Al Omar, A.; Alam Bhuiyan, Z.; Basu, A.; Kiyomoto, S.; Rahman, M.S. Privacy-friendly platform for healthcare data in cloud based on blockchain environment. Futur. Gener. Comput. Syst. 2019, 95, 511–521. [Google Scholar] [CrossRef]
  3. Abd-El-Atty, B.; El-Latif, A.A.A.; E Venegas-Andraca, S. An encryption protocol for NEQR images based on one-particle quantum walks on a circle. Quantum Inf. Process. 2019, 18, 272. [Google Scholar] [CrossRef]
  4. El-Latif, A.A.A.; Abd-El-Atty, B.; Abou-Nassar, E.M.; E Venegas-Andraca, S. Controlled alternate quantum walks-based privacy preserving healthcare images in Internet of Things. Opt. Laser Technol. 2020, 124, 105942. [Google Scholar] [CrossRef]
  5. Miyake, S.; Nakamae, K. A quantum watermarking scheme using simple and small-scale quantum circuits. Quantum Inf. Process. 2016, 15, 1849–1864. [Google Scholar] [CrossRef]
  6. Peng, J.; Abd-El-Atty, B.; Khalifa, H.S.; El-Latif, A.A.A. Image watermarking algorithm based on quaternion and chaotic Lorenz system. In Proceedings of the Eleventh International Conference on Digital Image Processing (ICDIP 2019), Guangzhou, China, 10–13 May 2019; International Society for Optics and Photonics: Bellingham, WA, USA, 2019; Volume 11179, p. 111790W. [Google Scholar]
  7. Muhammad, K.; Sajjad, M.; Mehmood, I.; Rho, S.; Baik, S. Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Futur. Gener. Comput. Syst. 2018, 86, 951–960. [Google Scholar] [CrossRef]
  8. Tao, J.; Li, S.; Zhang, X.; Wang, Z. Towards Robust Image Steganography. IEEE Trans. Circuits Syst. Video Technol. 2018, 29, 594–600. [Google Scholar] [CrossRef]
  9. Zhang, X.; Peng, F.; Long, M. Robust Coverless Image Steganography Based on DCT and LDA Topic Classification. IEEE Trans. Multimed. 2018, 20, 3223–3238. [Google Scholar] [CrossRef]
  10. Sharma, V.K.; Srivastava, D.K.; Mathur, P.; Shrivastava, D. Efficient image steganography using graph signal processing. IET Image Process. 2018, 12, 1065–1071. [Google Scholar] [CrossRef]
  11. Sharif, A.; Mollaeefar, M.; Nazari, M. A novel method for digital image steganography based on a new three-dimensional chaotic map. Multimed. Tools Appl. 2016, 76, 7849–7867. [Google Scholar] [CrossRef]
  12. El-Latif, A.A.A.; Abd-El-Atty, B.; Venegas-Andraca, S.E. A novel image steganography technique based on quantum substitution boxes. Opt. Laser Technol. 2019, 116, 92–102. [Google Scholar] [CrossRef]
  13. Peng, J.; Abd-El-Atty, B.; Khalifa, H.S.; El-Latif, A.A.A. Image steganography algorithm based on key matrix generated by quantum walks. In Proceedings of the Eleventh International Conference on Digital Image Processing (ICDIP 2019), Guangzhou, China, 10–13 May 2019; International Society for Optics and Photonics: Bellingham, WA, USA, 2019; Volume 11179, p. 1117905. [Google Scholar]
  14. Li, P.; Liu, X. A novel quantum steganography scheme for color images. Int. J. Quantum Inf. 2018, 16, 1850020. [Google Scholar] [CrossRef]
  15. Zhou, R.-G.; Luo, J.; Liu, X.; Zhu, C.; Wei, L.; Zhang, X. A Novel Quantum Image Steganography Scheme Based on LSB. Int. J. Theor. Phys. 2018, 57, 1848–1863. [Google Scholar] [CrossRef]
  16. Hussain, M.; Wahab, A.W.A.; Bin Idris, Y.I.; Ho, A.T.; Jung, K.-H. Image steganography in spatial domain: A survey. Signal Process. Image Commun. 2018, 65, 46–66. [Google Scholar] [CrossRef]
  17. Li, D.; Zhang, J.; Guo, F.-Z.; Huang, W.; Wen, Q.-Y.; Chen, H. Discrete-time interacting quantum walks and quantum Hash schemes. Quantum Inf. Process. 2012, 12, 1501–1513. [Google Scholar] [CrossRef]
  18. Yang, Y.-G.; Xu, P.; Yang, R.; Zhou, Y.-H.; Shi, W.-M. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption. Sci. Rep. 2016, 6, 19788. [Google Scholar] [CrossRef] [Green Version]
  19. Iliyasu, A.M. Roadmap to Talking Quantum Movies: A Contingent Inquiry. IEEE Access 2018, 7, 23864–23913. [Google Scholar] [CrossRef]
  20. Iliyasu, A.M.; Le, P.Q.; Dong, F.; Hirota, K. Restricted geometric transformations and their applications for quantum image watermarking and authentication. In Proceedings of the 10th Asian Conference on Quantum Information Science (AQIS 2010), Tokyo, Japan, 18–19 August 2010; pp. 212–214. [Google Scholar]
  21. El-Latif, A.A.A.; Abd-El-Atty, B.; Amin, M.; Iliyasu, A.M. Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications. Sci. Rep. 2020, 10, 1–16. [Google Scholar] [CrossRef]
  22. Li, D.; Yang, Y.-G.; Bi, J.-L.; Yuan, J.-B.; Xu, J. Controlled Alternate Quantum Walks based Quantum Hash Function. Sci. Rep. 2018, 8, 225. [Google Scholar] [CrossRef] [Green Version]
  23. El-Latif, A.A.A.; Abd-El-Atty, B.; Hossain, M.S.; Rahman, A.; Alamri, A.; Gupta, B.B. Efficient Quantum Information Hiding for Remote Medical Image Sharing. IEEE Access 2018, 6, 21075–21083. [Google Scholar] [CrossRef]
  24. Zhou, L.; Wang, Q.; Sun, X.; Kulicki, P.; Castiglione, A. Quantum technique for access control in cloud computing II: Encryption and key distribution. J. Netw. Comput. Appl. 2018, 103, 178–184. [Google Scholar] [CrossRef]
  25. Varghese, B.; Buyya, R. Next generation cloud computing: New trends and research directions. Futur. Gener. Comput. Syst. 2018, 79, 849–861. [Google Scholar] [CrossRef] [Green Version]
  26. Chen, D.; Zhao, H. Data Security and Privacy Protection Issues in Cloud Computing. In Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering, Zhejiang, China, 23–25 March 2012; Volume 1, pp. 647–651. [Google Scholar]
  27. El-Latif, A.A.A.; Abd-El-Atty, B.; E Venegas-Andraca, S.; Mazurczyk, W. Efficient quantum-based security protocols for information sharing and data protection in 5G networks. Futur. Gener. Comput. Syst. 2019, 100, 893–906. [Google Scholar] [CrossRef]
  28. Yan, X.; Wang, S.; El-Latif, A.A.A.; Niu, X. New approaches for efficient information hiding-based secret image sharing schemes. Signal Image Video Process. 2013, 9, 499–510. [Google Scholar] [CrossRef]
  29. MedPix. Available online: https://medpix.nlm.nih.gov/home (accessed on 30 May 2020).
  30. Salama, A.S.; Mokhtar, M.A.; Tayel, M.B. A Triple-Layer Encryption-Based Watermarking Technique for Improving Security of Medical Images. J. Med. Imaging Health Inform. 2019, 9, 610–619. [Google Scholar] [CrossRef]
  31. Iliyasu, A.M.; Yan, F.; Fatichah, C. A Special Section on Hybrid Intelligent Systems and Applications in Medical Imaging and Health Informatics. J. Med. Imaging Health Inform. 2019, 9, 599–601. [Google Scholar] [CrossRef]
  32. Higham, N. Accuracy and Stability of Numerical Algorithms (PDF), 2nd ed.; SIAM: Philadelphia, PA, USA, 2002. [Google Scholar]
Figure 1. General framework envisioned for secure image transmission on cloud-based E-healthcare platforms.
Figure 1. General framework envisioned for secure image transmission on cloud-based E-healthcare platforms.
Sensors 20 03108 g001
Figure 2. Outline of the proposed image stego scheme.
Figure 2. Outline of the proposed image stego scheme.
Sensors 20 03108 g002
Figure 3. Dataset showing carrier and secret images used in the experiments.
Figure 3. Dataset showing carrier and secret images used in the experiments.
Sensors 20 03108 g003
Figure 4. Visual quality for marked (i.e. stego) versions of colour images in Figure 3.
Figure 4. Visual quality for marked (i.e. stego) versions of colour images in Figure 3.
Sensors 20 03108 g004
Figure 5. Visual quality for marked (i.e. stego) versions of greyscale images in Figure 3.
Figure 5. Visual quality for marked (i.e. stego) versions of greyscale images in Figure 3.
Sensors 20 03108 g005
Figure 6. Histogram showing similarity of the secret image MDG09 prior to and after its extraction from the stego image MDG06.
Figure 6. Histogram showing similarity of the secret image MDG09 prior to and after its extraction from the stego image MDG06.
Sensors 20 03108 g006
Figure 7. Stego and extracted images under noise of various densities. The first row shows the stego images with added Salt and Pepper noise and their corresponding extracted versions in the second row.
Figure 7. Stego and extracted images under noise of various densities. The first row shows the stego images with added Salt and Pepper noise and their corresponding extracted versions in the second row.
Sensors 20 03108 g007
Figure 8. Stego and extracted images under various data loss by cutting different blocks. The first row shows the stego images with a block of data loss and their corresponding extracted versions in the second row.
Figure 8. Stego and extracted images under various data loss by cutting different blocks. The first row shows the stego images with a block of data loss and their corresponding extracted versions in the second row.
Sensors 20 03108 g008
Figure 9. Extracted secret image MDG04 recovered from the stego image MDG01 for varying changes in key parameters.
Figure 9. Extracted secret image MDG04 recovered from the stego image MDG01 for varying changes in key parameters.
Sensors 20 03108 g009
Figure 10. Performance analysis of the proposed protocol for colour medical images. Here, the secret medical image MDG05 is embedded onto all the remaining cover colour images (labelled MDG01 through MDG04 in Figure 3).
Figure 10. Performance analysis of the proposed protocol for colour medical images. Here, the secret medical image MDG05 is embedded onto all the remaining cover colour images (labelled MDG01 through MDG04 in Figure 3).
Sensors 20 03108 g010
Figure 11. Graphical representation of performance analysis of the proposed steganography scheme where the secret medical image (MDG05) is embedded onto the remaining cover colour medical images presented earlier in Figure 3 (i.e., those labelled MDG01 through MDG04).
Figure 11. Graphical representation of performance analysis of the proposed steganography scheme where the secret medical image (MDG05) is embedded onto the remaining cover colour medical images presented earlier in Figure 3 (i.e., those labelled MDG01 through MDG04).
Sensors 20 03108 g011
Figure 12. Performance analysis results of the proposed protocol. Here, the secret medical image MDG10 is embedded onto the remaining cover greyscale images shown (labelled MDG06 through MDG09 in Figure 3).
Figure 12. Performance analysis results of the proposed protocol. Here, the secret medical image MDG10 is embedded onto the remaining cover greyscale images shown (labelled MDG06 through MDG09 in Figure 3).
Sensors 20 03108 g012
Figure 13. Graphical representation of performance analysis of the proposed steganography scheme where the secret medical image (MDG10) is embedded onto the remaining cover greyscale images presented earlier in Figure 3 (i.e., those labelled MDG06 through MDG09).
Figure 13. Graphical representation of performance analysis of the proposed steganography scheme where the secret medical image (MDG10) is embedded onto the remaining cover greyscale images presented earlier in Figure 3 (i.e., those labelled MDG06 through MDG09).
Sensors 20 03108 g013
Table 1. Comparative analysis between proposed protocol and similar quantum-based data hiding techniques.
Table 1. Comparative analysis between proposed protocol and similar quantum-based data hiding techniques.
MechanismDescriptionCapacityRequirements for Extraction of Secret Image from Stego Image
ProposedDesigned as a quasi-quantum-inspired scheme where a secret colour (or greyscale) image is embedded onto a cover colour (or greyscale) image based on CAQWs. The role of CAQWs is used to determine the location of pixels in the carrier image to suffuse secret bits.2-bit/8-bitControl parameters for running CAQWs
Miyake et al. [5]Simulation-based circuit model quantum image processing (QIP) [20] implementation of quantum greyscale image watermarking based on SWAP and CNOT gates.2-bit/8-bitOriginal carrier image and the key used in the scrambling process.
El-Latif et al. [12]Simulation-based QIP protocol where a secret colour (or greyscale) image is embedded onto a cover colour (or greyscale) image based on quantum substitution boxes. The construction of quantum substitution boxes is based on 1D 2-Particle QWs, which requires more resources than CAQWs.2-bit/8-bitQuantum substitution boxes
Peng et al. [13]Simulation-based implementation of 1D 2-Particle quantum walks to embed a secret greyscale image onto a cover colour image. 1D 2-Particle QWs is used to select one channel from (RGB) of the cover image to implant the secret bits.2-bit/24-bitControl parameters for running 1D 2-Particle QWs.
Li et al. [14]A QIP protocol where a greyscale image is embedded onto a quantum colour image based on quantum Gray code.2-bit/24-bitQuantum Gray code
Zhou et al. [15]A QIP scheme where greyscale images are embedded onto greyscale images based on Bit-plane, Swap gates, and Arnold image scrambling.0.5-bit/8-bitOriginal cover image and three types of keys (K, K1, and K2) each the size of the secret message.
El-Latif et al. [23]A QIP data hiding mechanism suffusing greyscale images onto greyscale images based on the logistic chaotic map.2-bit/8-bitControl parameters for running the logistic map as well the key matrix generated from the embedding process whose size is the same size as the secret message.
Table 2. PSNR, SSIM, UIQ, NCC, NAE, IF, AD, MD, and SC values for colour images used in the experiments reported.
Table 2. PSNR, SSIM, UIQ, NCC, NAE, IF, AD, MD, and SC values for colour images used in the experiments reported.
MeasurementCover ImageSecret Image
MDG01MDG02MDG03MDG04MDG05
PSNRMDG01-44.300944.053644.398544.3903
MDG0244.1068-44.003944.431044.4251
MDG0344.123844.3526-44.426644.4110
MDG0444.134644.355544.0179-44.4008
MDG0544.105944.349744.007844.4238-
SSIMMDG01-0.93310.93180.93380.9338
MDG020.9470-0.94710.94910.9491
MDG030.95560.9574-0.95720.9573
MDG040.95940.96030.9593-0.9607
MDG050.96740.96840.96750.9689-
UIQMDG01-0.92990.92880.93060.9306
MDG020.9463-0.94640.94840.9484
MDG030.95480.9566-0.95640.9566
MDG040.95880.95960.9587-0.9601
MDG050.96730.96830.96730.9688-
NCCMDG01-0.99910.99990.99960.9997
MDG020.9999-0.99990.99990.9999
MDG030.99990.9992-0.99970.9997
MDG040.99990.99910.9999-0.9999
MDG050.99990.99930.99990.9998-
NAEMDG01-0.00740.00760.00730.0073
MDG020.0111-0.01130.01070.0107
MDG030.00610.0059-0.00590.0059
MDG040.01090.01060.0110-0.0106
MDG050.00990.00960.01000.0096-
IFMDG01-0.99990.99990.99990.9999
MDG020.9998-0.99980.99980.9998
MDG030.99990.9999-0.99990.9999
MDG040.99980.99980.9998-0.9998
MDG050.99980.99990.99980.9999-
ADMDG01-0.1220−0.30180.07050.0362
MDG02−0.2475-−0.36540.0069−0.0274
MDG03−0.21870.0872-0.03570.0014
MDG04−0.23150.0744−0.3494-−0.0114
MDG05−0.23870.0672−0.35660.0157-
MDMDG01-3333
MDG023-333
MDG0333-33
MDG04333-3
MDG053333-
SCMDG01-1.00150.99701.00091.0006
MDG020.9965-0.99481.00010.9996
MDG030.99791.0008-1.00031.0000
MDG040.99621.00090.9943-0.9996
MDG050.99651.00070.99471.0001-
Table 3. PSNR, SSIM, UIQ, NCC, NAE, IF, AD, MD, and SC values for greyscale images used in the experiments reported.
Table 3. PSNR, SSIM, UIQ, NCC, NAE, IF, AD, MD, and SC values for greyscale images used in the experiments reported.
MeasurementCover ImageSecret Image
MDG06MDG07MDG08MDG09MDG10
PSNRMDG06-44.057944.058944.072244.5901
MDG0744.3288-44.058944.074444.5852
MDG0844.335444.0870-44.048544.5606
MDG0944.227544.000044.0360-44.4522
MDG1044.323244.054144.040744.0439-
SSIMMDG06-0.93980.94120.94000.9449
MDG070.9762-0.97590.97540.9774
MDG080.95350.9520-0.95070.9544
MDG090.93510.93420.9356-0.9361
MDG100.92950.92690.92800.9259-
UIQMDG06-0.93860.94000.93870.9436
MDG070.9749-0.97460.97420.9759
MDG080.95160.9501-0.94900.9524
MDG090.93420.93330.9345-0.9352
MDG100.92830.92570.92670.9247-
NCCMDG06-0.99880.99780.99990.9999
MDG070.9994-0.99720.99990.9999
MDG080.99960.9984-0.99990.9999
MDG090.99980.99890.9982-0.9999
MDG100.99980.99870.99780.9999-
NAEMDG06-0.01090.01090.01080.0102
MDG070.0151-0.01550.01550.0147
MDG080.01600.0165-0.01660.0156
MDG090.00780.00800.0079-0.0077
MDG100.00940.00970.00970.0097-
IFMDG06-0.99980.99980.99980.9999
MDG070.9998-0.99980.99980.9998
MDG080.99980.9997-0.99970.9998
MDG090.99990.99990.9999-0.9999
MDG100.99990.99990.99990.9999-
ADMDG06-0.17380.3014−0.0558−0.0623
MDG070.0270-0.3116−0.0456−0.0521
MDG08-0.03500.1220-−0.1076−0.1141
MDG09-0.08370.07330.2009-−0.1629
MDG100.02720.18420.3118−0.0454-
MDMDG06-3333
MDG073-333
MDG0833-33
MDG09333-3
MDG103333-
SCMDG06-1.00231.00420.99900.9989
MDG071.0009-1.00530.99950.9996
MDG081.00061.0030-0.99930.9993
MDG091.00031.00201.0035-0.9994
MDG101.00031.00251.00430.9992-
Table 4. Comparison between proposed protocol and similar quantum-based data hiding techniques in terms of embedding capacity and mean values of PSNR, SSIM, and UIQ.
Table 4. Comparison between proposed protocol and similar quantum-based data hiding techniques in terms of embedding capacity and mean values of PSNR, SSIM, and UIQ.
MechanismPSNRSSIMUIQCapacity
Proposed44.23140.94990.94872-bit/8-bit
[12]43.52840.96980.96952-bit/8-bit
[5]44.0267----2-bit/8-bit
[20]46.3353----2-bit/8-bit

Share and Cite

MDPI and ACS Style

Abd-El-Atty, B.; Iliyasu, A.M.; Alaskar, H.; Abd El-Latif, A.A. A Robust Quasi-Quantum Walks-based Steganography Protocol for Secure Transmission of Images on Cloud-based E-healthcare Platforms. Sensors 2020, 20, 3108. https://doi.org/10.3390/s20113108

AMA Style

Abd-El-Atty B, Iliyasu AM, Alaskar H, Abd El-Latif AA. A Robust Quasi-Quantum Walks-based Steganography Protocol for Secure Transmission of Images on Cloud-based E-healthcare Platforms. Sensors. 2020; 20(11):3108. https://doi.org/10.3390/s20113108

Chicago/Turabian Style

Abd-El-Atty, Bassem, Abdullah M. Iliyasu, Haya Alaskar, and Ahmed A. Abd El-Latif. 2020. "A Robust Quasi-Quantum Walks-based Steganography Protocol for Secure Transmission of Images on Cloud-based E-healthcare Platforms" Sensors 20, no. 11: 3108. https://doi.org/10.3390/s20113108

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop