Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1038/nbt.3972 | DOI Listing |
ACS Omega
December 2024
School of Physical Sciences, Jawaharlal Nehru University, New Delhi 110067, India.
Sci Rep
December 2024
School of Electronic and Nanoscale Engineering, University of Glasgow, Glasgow, G12 8QQ, UK.
In the era of the Internet of Things (IoT), the transmission of medical reports in the form of scan images for collaborative diagnosis is vital for any telemedicine network. In this context, ensuring secure transmission and communication is necessary to protect medical data to maintain privacy. To address such privacy concerns and secure medical images against cyberattacks, this research presents a robust hybrid encryption framework that integrates quantum, and classical cryptographic methods.
View Article and Find Full Text PDFImplement Sci Commun
November 2024
Department of Health Systems and Policy, The Kamuzu University of Health Sciences, Blantyre, Malawi.
Entropy (Basel)
October 2024
Department of Mechanical Engineering, University of Canterbury, Christchurch 8041, New Zealand.
The standard way to measure the performance of existing continuous variable quantum key distribution (CVQKD) protocols is by using the achievable secret key rate (SKR) with respect to one parameter while keeping all other parameters constant. However, this atomistic method requires many individual parameter analyses while overlooking the co-dependence of other parameters. In this work, a numerical tool is developed for comparing different CVQKD protocols while taking into account the simultaneous effects of multiple CVQKD parameters on the capability of protocols to produce positive SKRs.
View Article and Find Full Text PDFPLoS One
September 2024
Guizhou Education University, Guiyang, China.
Steganography, the use of algorithms to embed secret information in a carrier image, is widely used in the field of information transmission, but steganalysis tools built using traditional steganographic algorithms can easily identify them. Steganography without embedding (SWE) can effectively resist detection by steganography analysis tools by mapping noise onto secret information and generating secret images from secret noise. However, most SWE still have problems with the small capacity of steganographic data and the difficulty of extracting the data.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!