Medical Data Are Safe: An Encrypted Quantum Approach

Medical Data Are Safe: An Encrypted Quantum Approach

Padmapriya Praveenkumar, Santhiyadevi R., Amirtharajan R.
Copyright: © 2019 |Pages: 24
ISBN13: 9781522579526|ISBN10: 1522579524|EISBN13: 9781522579533
DOI: 10.4018/978-1-5225-7952-6.ch008
Cite Chapter Cite Chapter

MLA

Praveenkumar, Padmapriya, et al. "Medical Data Are Safe: An Encrypted Quantum Approach." Medical Data Security for Bioengineers, edited by Butta Singh, et al., IGI Global, 2019, pp. 142-165. https://doi.org/10.4018/978-1-5225-7952-6.ch008

APA

Praveenkumar, P., Santhiyadevi R., & Amirtharajan R. (2019). Medical Data Are Safe: An Encrypted Quantum Approach. In B. Singh, B. Saini, D. Singh, & A. Pandey (Eds.), Medical Data Security for Bioengineers (pp. 142-165). IGI Global. https://doi.org/10.4018/978-1-5225-7952-6.ch008

Chicago

Praveenkumar, Padmapriya, Santhiyadevi R., and Amirtharajan R. "Medical Data Are Safe: An Encrypted Quantum Approach." In Medical Data Security for Bioengineers, edited by Butta Singh, et al., 142-165. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7952-6.ch008

Export Reference

Mendeley
Favorite

Abstract

In this internet era, transferring and preservation of medical diagnostic reports and images across the globe have become inevitable for the collaborative tele-diagnosis and tele-surgery. Consequently, it is of prime importance to protect it from unauthorized users and to confirm integrity and privacy of the user. Quantum image processing (QIP) paves a way by integrating security algorithms in protecting and safeguarding medical images. This chapter proposes a quantum-assisted encryption scheme by making use of quantum gates, chaotic maps, and hash function to provide reversibility, ergodicity, and integrity, respectively. The first step in any quantum-related image communication is the representation of the classical image into quantum. It has been carried out using novel enhanced quantum representation (NEQR) format, where it uses two entangled qubit sequences to hoard the location and its pixel values of an image. The second step is performing transformations like confusion, diffusion, and permutation to provide an uncorrelated encrypted image.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.