{"id":"https://openalex.org/W4285257151","doi":"https://doi.org/10.1109/tnse.2022.3187861","title":"A Secure Information Transmission Protocol for Healthcare Cyber Based on Quantum Image Expansion and Grover Search Algorithm","display_name":"A Secure Information Transmission Protocol for Healthcare Cyber Based on Quantum Image Expansion and Grover Search Algorithm","publication_year":2022,"publication_date":"2022-07-07","ids":{"openalex":"https://openalex.org/W4285257151","doi":"https://doi.org/10.1109/tnse.2022.3187861"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2022.3187861","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066065662","display_name":"Zhiguo Qu","orcid":"https://orcid.org/0000-0002-5783-313X"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"funder","lineage":["https://openalex.org/I200845125"]},{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"funder","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiguo Qu","raw_affiliation_strings":["Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing, China","Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology, Nanjing University of Information Science and Technology, Nanjing, China","School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]},{"raw_affiliation_string":"Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Engineering Research Center of Digital Forensics, Ministry of Education, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]},{"raw_affiliation_string":"Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025696268","display_name":"Hanrong Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"funder","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hanrong Sun","raw_affiliation_strings":["School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.53,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.803304,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":95},"biblio":{"volume":"10","issue":"5","first_page":"2551","last_page":"2563"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9983,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10622","display_name":"Quantum Mechanics and Applications","score":0.9879,"subfield":{"id":"https://openalex.org/subfields/3107","display_name":"Atomic and Molecular Physics, and Optics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.5478959},{"id":"https://openalex.org/keywords/steganography-tools","display_name":"Steganography tools","score":0.5216387}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7159264},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.65670085},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5942547},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.5478959},{"id":"https://openalex.org/C13179402","wikidata":"https://www.wikidata.org/wiki/Q7606662","display_name":"Steganography tools","level":4,"score":0.5216387},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.51588094},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.46782297},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46563804},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4356417},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4297292},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32523084},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.29172122},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.20665538},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.119924635},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07290757},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2022.3187861","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61232016"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61601358"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61303039"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61373131"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61501247"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61672290"},{"funder":"https://openalex.org/F4320321470","funder_display_name":"Beijing University of Posts and Telecommunications","award_id":"SKLNST-2020-1-17"},{"funder":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province","award_id":"BK20171458"},{"funder":"https://openalex.org/F4320327518","funder_display_name":"Priority Academic Program Development of Jiangsu Higher Education Institutions","award_id":null}],"datasets":[],"versions":[],"referenced_works_count":31,"referenced_works":["https://openalex.org/W1490898761","https://openalex.org/W1760530029","https://openalex.org/W2001883788","https://openalex.org/W2013432833","https://openalex.org/W2036467527","https://openalex.org/W2038054480","https://openalex.org/W2047310366","https://openalex.org/W2057968778","https://openalex.org/W2073683296","https://openalex.org/W2076085043","https://openalex.org/W2118296934","https://openalex.org/W2148643948","https://openalex.org/W2168676717","https://openalex.org/W2739520641","https://openalex.org/W2748013180","https://openalex.org/W2764347725","https://openalex.org/W2765314918","https://openalex.org/W2887354935","https://openalex.org/W2891275701","https://openalex.org/W2914224265","https://openalex.org/W2941089993","https://openalex.org/W2945608248","https://openalex.org/W2997406940","https://openalex.org/W3011327157","https://openalex.org/W3016481661","https://openalex.org/W3091517985","https://openalex.org/W3093752067","https://openalex.org/W3118540613","https://openalex.org/W3128758609","https://openalex.org/W3135191333","https://openalex.org/W990856609"],"related_works":["https://openalex.org/W3146660591","https://openalex.org/W3020816551","https://openalex.org/W2804412098","https://openalex.org/W2560172240","https://openalex.org/W2548321233","https://openalex.org/W2338095724","https://openalex.org/W2188948172","https://openalex.org/W2186632617","https://openalex.org/W2154118756","https://openalex.org/W1995538220"],"abstract_inverted_index":{"In":[0],"the":[1,4,9,24,73,83,87,96,107,110,124,143,146],"healthcare":[2,67],"cyber,":[3],"transmission":[5,64,148],"of":[6,27,98,123,132,145],"information":[7,63,75,89,147],"between":[8],"head":[10],"office":[11],"and":[12,41,50,60,79,140],"each":[13],"sub-branch":[14],"has":[15,35,102],"always":[16],"been":[17,37],"a":[18,57,115,129],"very":[19,103],"important":[20],"process.":[21,149],"However,":[22],"with":[23],"continuous":[25],"development":[26],"network":[28],"technology":[29,49],"in":[30,95],"recent":[31],"years,":[32],"its":[33],"security":[34,144],"also":[36],"subjected":[38],"to":[39],"greater":[40,42],"tests.":[43],"Based":[44],"on":[45],"quantum":[46,93,99,117],"image":[47,118],"expansion":[48],"Grover":[51],"search":[52],"algorithm,":[53],"this":[54],"paper":[55],"proposes":[56],"more":[58],"secure":[59,62],"large-capacity":[61],"protocol":[65,71,112,126],"for":[66],"cyber.":[68],"The":[69,121],"new":[70,111],"embeds":[72],"secret":[74,88],"through":[76,92],"three":[77],"layers":[78],"encrypts":[80],"it":[81],"at":[82],"same":[84,108],"time.":[85],"Finally,":[86],"is":[90,113,127],"transmitted":[91],"channel":[94],"form":[97],"state,":[100],"which":[101,134],"high":[104],"security.":[105],"At":[106],"time,":[109],"essentially":[114,128],"novel":[116],"steganography":[119,125],"protocol.":[120],"imperceptibility":[122],"higher":[130],"level":[131],"security,":[133],"can":[135],"effectively":[136],"avoid":[137],"various":[138],"attacks":[139],"further":[141],"guarantee":[142]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4285257151","counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":10}],"updated_date":"2025-04-25T10:38:04.684619","created_date":"2022-07-14"}