Abstract
In the present era of Internet of Things (IoT), communicating medical reports for the concerted diagnosis plays a vital role in any telemedicine network. Here, security of communication, being one of the most important requirements, needs to be appropriately addressed in protecting the transmitted data to ensure authentication, privacy, trust and integrity. In this context, this chapter suggests an image encryption and authentication algorithm to handle bulky medical images integrated with Quantum encryption mechanism. The proposed Quantum Cyber-physical system is established with the help of the security algorithms along with cloud computing framework. In the proposed encryption scheme, initially, the original classical medical image is converted into Quantum image format using Novel Enhanced Quantum Representation (NEQR). Then using Cellular Automata (CA) (Rule:30), the quantum image is confused and diffused and its authentication is provided by cellular automata. Further, encryption takes place in four stages, namely, key generation, permutation, Deoxyribo Nucleic Acid (DNA) operation and diffusion. Additionally, the cloud framework provides a comprehensive platform for individual access to the encrypted files depending on the access privileges granted to the relevant individuals. The approach is well suited for a versatile hospital management system. The strength of the proposed encryption algorithm is validated by evaluating different metrics like Number of Pixel Change Rate (NPCR), Unified Average Change in Intensity (UACI), correlation, histogram and certain chosen-plaintext attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
HIPAA (2018) Healthcare data breach statistics. https://www.hipaajournal.com/healthcare-data-breach-statistics/
HIPAA (2018) MIFA shares industry wisdom on medical identity theft and fraud. https://www.hipaajournal.com/mifa-shares-industry-wisdom-on-medical-identity-theft-and-fraud-3657/
Chen J, Zhu Z, Fu C et al (2015) An scheme using nonlinear inter-pixel computing and swapping based permutation approach. Commun Nonlinear Sci Numer Simul 23:294–310
Liu L, Zhang Q, Wei X (2012) A algorithm based on encoding and chaos map. Comput Electr Eng 38:1240–1248
Zhang Q, Guo L (2010) Image encryption using addition combining with chaotic maps. Math Comput Model 52:2028–2035
Zhang Q, Guo L, Wei X (2013) A novel image fusion encryption algorithm based on sequence operation and hyper-chaotic system. Opt—Int J Light Electron Opt 124:3596–3600
Ozkaynak F, Ozer AB, Yavuz S (2013) Security analysis of an algorithm based on chaos and encoding. In: 2013 21st Signal processing and communications applications conference (SIU). IEEE, pp 1–4
Hermassi H, Belazi A, Rhouma R, Belghith SM (2014) Security analysis of an algorithm based on a addition combining with chaotic maps. Multimed Tools Appl 72:2211–2224
Zhang Y, Wen W, Su M, Li M (2014) Cryptanalyzing a novel image fusion encryption algorithm based on sequence operation and hyper-chaotic system. Opt—Int J Light Electron Opt 125:1562–1564
Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) Chaos blend to secure medical privacy. IEEE Trans Nanobiosci 16:850–858
Praveenkumar P, Amirtharajan R, Thenmozhi K, Balaguru Rayappan JB (2015) Medical Data Sheet in Safe Havens - A Tri-layer Cryptic Solution. Comput Biol Med 62:264–276
Ravichandran D, Praveenkumar P, Balaguru Rayappan JB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170–184
Fu C, Zhang G, Bian O et al (2014) A novel medical image protection scheme using a 3-dimensional chaotic system. PLoS One 9:e115773
Wang X, Liu C (2017) A novel and effective algorithm based on chaos and encoding. Multimed Tools Appl 76:6229–6245
Wolfram S (1983) Statistical mechanics of cellular automata. Rev Mod Phys 55:601–644
Guan Sheng-Uei, Zhang Shu (2003) An evolutionary approach to the design of controllable cellular automata structure for random number generation. IEEE Trans Evol Comput 7:23–36
Abdo AA, Lian S, Ismail IA et al (2013) A cryptosystem based on elementary cellular automata. Commun Nonlinear Sci Numer Simul 18:136–147
Ravichandran D, Rajagopalan S, Upadhyay HN et al (2018) Encrypted biography of biomedical image—a pentalayer cryptosystem on FPGA. J Signal Process Syst 1–27
Jun D, Na L, Yixiong G, Jun Y (2009) A high-performance pseudo-random number generator based on FPGA. In: 2009 international conference on wireless networks and information systems. IEEE, pp 290–293
Venegas-Andraca SE, Ball JL (2010) Processing images in entangled quantum systems. Quantum Inf Process 9:1–11
Latorre JI (2005) Image compression and entanglement. 4
Sun B, Le PQ, Iliyasu AM et al (2011) A multi-channel representation for images on quantum computers using the D color space. In: 2011 IEEE international symposium on intelligent signal processing (WISP). IEEE, pp 1–6
Zhang Y, Lu K, Gao Y, Xu K (2013) A novel quantum representation for log-polar images. Quantum Inf Process 12:3103–3126
Le PQ, Dong F, Hirota K (2011) A flexible representation of quantum images for polynomial preparation, image compression, and processing operations. Quantum Inf Process 10:63–84
Zhang Y, Lu K, Gao Y, Wang M (2013) NEQR: A novel enhanced quantum representation of digital images. Quantum Inf Process 12:2833–2860
El-latif AAA, Abd-el-atty B, Talha M (2017) Robust encryption of quantum medical images. IEEE Access 6:1073–1081
Abd El-Latif AA, Abd-El-Atty B, Hossain MS et al (2018) Efficient quantum information hiding for remote medical image sharing. IEEE Access 6:21075–21083
Beheri MH, Amin M, Song X, El-latif AAA (2016) Quantum based on Scrambling—Diffusion (SD) approach. In: 2016 2nd international conference on frontiers of signal processing (ICFSP). IEEE, pp 43–47
Zhou RG, Zhou Y, Zhu C et al (2018) Quantum watermarking scheme based on INEQR. Int J Theor Phys 57:1120–1131
Zhou S, Wang B, Zheng X, Zhou C (2016) An image encryption scheme based on computing and cellular automata. Discret Dyn Nat Soc 2016:1–9
Chai X, Gan Z, Yuan K, et al (2017) A novel scheme based on sequence operations and chaotic systems. Neural Comput Appl 1–19
Enayatifar R, Sadaei HJ, Abdullah AH et al (2015) A novel chaotic based using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Lasers Eng 71:33–41
Watson JD, Crick FHC (1953) Molecular structure of nucleic acids: a structure for deoxyribose nucleic acid. Nature 171:737–738
Zhou Y, Bao L, Chen CLP (2014) A new 1D chaotic system for. Sig Process 97:172–182
Wu Y, Member S, Noonan JP, Member L (2011) NPCR and UACI Randomness tests for image encryption. Cyber Journals Multidiscip Journals Sci Technol J Sel Areas Telecommun 31–38
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Santhiya Devi, R., John Bosco Balaguru, R., Amirtharajan, R., Praveenkumar, P. (2019). A Novel Quantum Encryption and Authentication Framework Integrated with IoT. In: Mahmood, Z. (eds) Security, Privacy and Trust in the IoT Environment. Springer, Cham. https://doi.org/10.1007/978-3-030-18075-1_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-18075-1_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-18074-4
Online ISBN: 978-3-030-18075-1
eBook Packages: Computer ScienceComputer Science (R0)