Secret images transfer in cloud system based on investigating quantum walks in steganography approaches

被引:38
作者
Abd El-Latif, Ahmed A. [1 ,2 ,7 ]
Abd-El-Atty, Bassem [1 ]
Elseuofi, Sherif [4 ]
Khalifa, Hany S. [5 ]
Alghamdi, Ahmed S. [3 ]
Polat, Kemal [6 ]
Amin, Mohamed [1 ]
机构
[1] Menoufia Univ, Fac Sci, Dept Math & Comp Sci, Menoufia 32511, Egypt
[2] Nile Univ, Sch Informat Technol & Comp Sci, Giza, Egypt
[3] Univ Jeddah, Coll Comp Sci & Engn, Dept Cybersecur, Jeddah, Saudi Arabia
[4] Culture & Sci City, Comp Sci Dept, Higher Inst Comp Sci & Informat Syst, 6 October, Egypt
[5] Misr Higher Inst Commerce & Comp, Comp Sci Dept, Mansoura, Egypt
[6] Bolu Abant Zzet Baysal Univ, Fac Engn, Dept Elect & Elect Engn, Bolu, Turkey
[7] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 150080, Peoples R China
关键词
Quantum walks; Cloud computing; Image steganography; Data hiding; WATERMARKING; ENCRYPTION; SECURITY; STORAGE; SCHEME; DCT;
D O I
10.1016/j.physa.2019.123687
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The central role of the cloud data warehouse is to ensure the security of confidential data that can be achieved via techniques of steganography and cryptography. Amidst the growth of quantum computation, modern data security tools may be cracked because of its structure based on mathematical computations. Quantum walk (QW) acts as a vital role in designing quantum algorithms, which is a universal computational model. Therefore, we allocate the advantages of QWs to design a QWs-based novel image steganography mechanism for cloud systems, which the embedding/extraction process for the secret object is based on quantum concepts. The presented technique has three algorithms of image steganography. The core idea for presenting these algorithms is to embed the sensitive object into the host media without a pre-encryption process for the secret data, which its security and embedding procedures are entirely based on quantum walks. As well opens the door for quantum technologies to be combined with information hiding techniques to achieve better security. The presented technique uses gray-scale or color images as a confidential object to be hidden into the carrier image, as well the embedded object can be any data, e.g. text or audio files and not restricted to image files. Security analysis and experimental results confirm that the suggested algorithms have good visual quality and high-security based on QWs as well high embedding capacity. (C) 2019 Elsevier B.V All rights reserved.
引用
收藏
页数:20
相关论文
共 47 条
[1]   Efficient quantum-based security protocols for information sharing and data protection in 5G networks [J].
Abd EL-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Venegas-Andraca, Salvador E. ;
Mazurczyk, Wojciech .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 :893-906
[2]   A novel image steganography technique based on quantum substitution boxes [J].
Abd EL-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Venegas-Andraca, Salvador E. .
OPTICS AND LASER TECHNOLOGY, 2019, 116 :92-102
[3]   Efficient Quantum Information Hiding for Remote Medical Image Sharing [J].
Abd El-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Hossain, M. Shamim ;
Rahman, Md. Abdur ;
Alamri, Atif ;
Gupta, B. B. .
IEEE ACCESS, 2018, 6 :21075-21083
[4]   Secure Quantum Steganography Protocol for Fog Cloud Internet of Things [J].
Abd El-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Hossain, M. Shamim ;
Elmougy, Samir ;
Ghoneim, Ahmed .
IEEE ACCESS, 2018, 6 :10332-10340
[5]   Robust Encryption of Quantum Medical Images [J].
Abd El-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Talha, Muhammad .
IEEE ACCESS, 2018, 6 :1073-1081
[6]  
Abd-El-Atty B, 2016, INT C ADV INT SYST I, P342
[7]   An encryption protocol for NEQR images based on one-particle quantum walks on a circle [J].
Abd-El-Atty, Bassem ;
Abd El-Latif, Ahmed A. ;
Venegas-Andraca, Salvador E. .
QUANTUM INFORMATION PROCESSING, 2019, 18 (09)
[8]  
Abd-El-Atty B, 2018, STUD BIG DATA, V33, P3, DOI 10.1007/978-3-319-63639-9_1
[9]   SeDaSC: Secure Data Sharing in Clouds [J].
Ali, Mazhar ;
Dhamotharan, Revathi ;
Khan, Eraj ;
Khan, Samee U. ;
Vasilakos, Athanasios V. ;
Li, Keqin ;
Zomaya, Albert Y. .
IEEE SYSTEMS JOURNAL, 2017, 11 (02) :395-404
[10]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383