IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Medical Data Are Safe: An Encrypted Quantum Approach

Medical Data Are Safe: An Encrypted Quantum Approach
View Sample PDF
Author(s): Padmapriya Praveenkumar (Shanmugha Arts, Science, Technology, and Research Academy (Deemed), India), Santhiyadevi R. (Shanmugha Arts, Science, Technology, and Research Academy (Deemed), India)and Amirtharajan R. (Shanmugha Arts, Science, Technology, and Research Academy (Deemed), India)
Copyright: 2019
Pages: 24
Source title: Medical Data Security for Bioengineers
Source Author(s)/Editor(s): Butta Singh (Guru Nanak Dev University, India), Barjinder Singh Saini (Dr. B. R. Ambedkar National Institute of Technology, India), Dilbag Singh (Dr. B. R. Ambedkar National Institute of Technology, India)and Anukul Pandey (Dumka Engineering College, India)
DOI: 10.4018/978-1-5225-7952-6.ch008

Purchase

View Medical Data Are Safe: An Encrypted Quantum Approach on the publisher's website for pricing and purchasing information.

Abstract

In this internet era, transferring and preservation of medical diagnostic reports and images across the globe have become inevitable for the collaborative tele-diagnosis and tele-surgery. Consequently, it is of prime importance to protect it from unauthorized users and to confirm integrity and privacy of the user. Quantum image processing (QIP) paves a way by integrating security algorithms in protecting and safeguarding medical images. This chapter proposes a quantum-assisted encryption scheme by making use of quantum gates, chaotic maps, and hash function to provide reversibility, ergodicity, and integrity, respectively. The first step in any quantum-related image communication is the representation of the classical image into quantum. It has been carried out using novel enhanced quantum representation (NEQR) format, where it uses two entangled qubit sequences to hoard the location and its pixel values of an image. The second step is performing transformations like confusion, diffusion, and permutation to provide an uncorrelated encrypted image.

Related Content

Shweta Arun Avhad. © 2023. 21 pages.
Majorie Moraa Nyasani, Victor Odhiambo Shikuku. © 2023. 10 pages.
Prashant Kumar, Sunil Kumar Verma. © 2023. 12 pages.
Sunil Kumar Verma, Prashant Kumar. © 2023. 21 pages.
Kannadhasan S., Nagarajan R.. © 2023. 10 pages.
Kondapalli Vamsi Krishna, Sompalli Bhavana, Koushik Koujalagi, Alok Malaviya. © 2023. 44 pages.
Bela Khiratkar, Shankar Mukundrao Khade, Abhishek Dutt Tripathi. © 2023. 10 pages.
Body Bottom