Secure Medical Data Transmission Using a Deep Learning–Based Quantum-Resistant Hybrid Stegno-Crypto Model

Document Type : Research Paper

Authors

1 Research Scholar (Part Time), Research Centre -Department of Electronics and Instrumentation Engineering, Dayananda Sagar College of Engineering, Bengaluru, Karnataka, India; Assistant Professor, Department of Electronics and Instrumentation Engineering, Dr. Ambedkar Institute of Technology, Bengaluru, Karnataka, India.

2 Associate Professor, Department of Electronics and Instrumentation Engineering, Dayananda Sagar College of Engineering, Bengaluru, Karnataka – 560078 Affiliated to Visvesvaraya Technological University, Belagavi, Karnataka, India.

10.22059/jitm.2026.106255

Abstract

This study focuses on the secure transmission of medical data, an important element of contemporary healthcare systems in which sensitive patient data is shared over digital networks to facilitate diagnosis, monitoring, and decision-making. Due to the growing volume of medical records and electronic medical imaging data, it has become critical to ensure the integrity, confidentiality, and accuracy of the data throughout transmission. The two significant problems the study will cover include high-frequency noise in medical records that reduces diagnostic accuracy and the high sensitivity of traditional encryption techniques to quantum-computing-based attacks that jeopardize data privacy. To address these problems, a smart, noise-hardy, and quantum-resistant dual-layer design is proposed to provide an efficient and secure transfer of medical information without compromising quality or computational efficiency. The methodology includes two major steps. In the first step, a Noise-Resilient Pre-Encryption Data Pre-processing Algorithm is created using a Random Forest-Wavelet Filter hybrid model, in which the Random Forest employs adaptive parameter selection and the wavelet filter employs multilevel decomposition to remove noise. Genetic algorithms (GA) are used to optimize these parameters more dynamically in response to shifting noise levels. PSNR and SSIM are used to validate the pre-processing performance, and it is proven that the data fidelity is enhanced. The second phase proposes a Hybrid Quantum-resistant Steganography-Cryptography Algorithm that combines CNN-based Steganography with AES encryption. The CNN safely encodes medical information in non-sensitive carriers using encrypted messages to transmit it invisibly without tampering. In contrast, the AES uses dynamic key generation to resist classical and quantum attacks. The results of the experiment show that accuracy (96.89%), precision (89%), recall (94.50%), F1-score (91.60%), and system efficiency were increased significantly, with computational time (8.47 ms), latency (8.50 ms), and throughput (117.60 OPS) also increasing.

Keywords


Adee, R., & Mouratidis, H. (2022). A dynamic four-step data security model for data in cloud computing based on cryptography and steganography. Sensors22(3), 1109.
Alan, J., & Liam, M. (2020). Protecting Healthcare Data: AI-Powered Strategies for Securing Distributed Systems. International journal of Computational Intelligence in Digital Systems9(01), 20-33.
Alanzy, M., Alomrani, R., Alqarni, B., & Almutairi, S. (2023). Image steganography using LSB and hybrid encryption algorithms. Applied Sciences13(21), 11771.
Alatawi, M. N. (2023). A hybrid cryptographic cipher solution for secure communication in smart cities. Int. J. Comput. Netw. Appl10, 776-791..
Auko, J. (2023). Current security and privacy posture in wireless body area networks. World Journal of Advanced Research and Reviews18(3), 1185-1206.
Awadh, W. A., Alasady, A. S., & Hamoud, A. K. (2022). Hybrid information security system via combination of compression, cryptography, and image steganography. International Journal of Electrical and Computer Engineering12(6), 6574-6584.
Daemen, J., & Rijmen, V. (1999). AES proposal: Rijndael.
Dhawan, S., Chakraborty, C., Frnda, J., Gupta, R., Rana, A. K., & Pani, S. K. (2021). SSII: secured and high-quality steganography using intelligent hybrid optimization algorithms for IoT. IEEE Access9, 87563-87578.
El-Douh, A. A. R., Lu, S. F., Elkouny, A. A., & Amein, A. S. (2022). Hybrid cryptography with a one-time stamp to secure contact tracing for COVID-19 infection. International Journal of Applied Mathematics and Computer Science32(1), 139-146.
Hamza, A., Shehzad, D., Sarfraz, M. S., Habib, U., & Shafi, N. (2021). Novel secure hybrid image steganography technique based on pattern matching. KSII transactions on internet and information systems (TIIS)15(3), 1051-1077.
Malik, K. R., Sajid, M., Almogren, A., Malik, T. S., Khan, A. H., Altameem, A., ... & Hussen, S. (2025). A hybrid steganography framework using DCT and GAN for secure data communication in the big data era. Scientific Reports15(1), 19630.
Miraz, M. H., & Ali, M. (2018). Applications of blockchain technology beyond cryptocurrency. arXiv preprint arXiv:1801.03528..
Mohua, M. M. A. (2024). Securing the h. 323 protocol: A steganographic and hybrid encryption approach. Int. J. Sci. Res. in Computer Science and Engineering12(6).
Osman, O. M., Kanona, M. E. A., Hassan, M. K., Elkhair, A. A. E., & Mohamed, K. S. (2022). Hybrid multistage framework for data manipulation by combining cryptography and steganography. Bulletin of Electrical Engineering and Informatics11(1), 327-335.
Prashant, P., Jha, S., & Singh, B. (2025). A Hybrid Approach to Data Security Using Steganography and Blockchain for Tamper-Proof Communication. Journal of Recent Innovation in Science and Technology1(1), 21-37.
Raza, A., Soomro, M. H., Shahzad, I., & Batool, S. (2024). Abstractive text summarization for Urdu language. Journal of Computing & Biomedical Informatics7(02)..
Saleh, M. E., Aly, A. A., & Omara, F. A. (2015). Enhancing Pixel Value Difference (PVD) Image Steganography by Using Mobile Phone Keypad (MPK) Coding. International Journal of Computer Science and Security (IJCSS)9(2), 96-107.
Sharma, S., Chen, K., & Sheth, A. (2018). Toward practical privacy-preserving analytics for IoT and cloud-based healthcare systems. IEEE Internet Computing22(2), 42-51.
Sikdar, S., & Guha, S. (2020). Advancements of healthcare technologies: Paradigm towards smart healthcare systems. In Recent trends in image and signal processing in computer vision (pp. 113-132). Singapore: Springer Singapore.
Taherdoost, H., Le, T. V., & Slimani, K. (2025). Cryptographic techniques in artificial intelligence security: A bibliometric review. Cryptography9(1), 17.
Takaoğlu, M., Özyavaş, A., Ajlouni, N., & Takaoğlu, F. (2023). Highly secured hybrid image steganography with an improved key generation and exchange for one-time-pad encryption method. Afyon Kocatepe Üniversitesi Fen Ve Mühendislik Bilimleri Dergisi23(1), 101-114.
Takaoğlu, M., Özyavaş, A., Ajlouni, N., Alshahrani, A., & Alkasasbeh, B. (2021). A novel and robust hybrid blockchain and steganography scheme. Applied Sciences11(22), 10698.
Thakur, K. V., Ambhore, P. G., & Sapkal, A. M. Medical Image Denoising using Rotated Wavelet Filter and Bilateral Filter.
Wahab, O. F. A., Khalaf, A. A., Hussein, A. I., & Hamed, H. F. (2021). Hiding data using efficient combination of RSA cryptography, and compression steganography techniques. IEEE access9, 31805-31815.
Zainab, A., Arslan, M., Aslam, N., Fuzail, M., & Shaikh, A. (2025). A Hybrid Approach to Data Security: Integrating Cryptography and Steganography for Enhanced Protection of Eye Disease DATA. Kashf Journal of Multidisciplinary Research2(07), 55-74.