Volume 15, 2018 Accepting Editor: Eli Cohen │ Received: November 29, 2017 │ Revised: March 12, 2018 │ Accepted: March 26, 2018. Cite as: Alowolodu, O. D., Adelaja, G. K., Alese, B. K., & Olayemi, O. C. (2018). Medical image security using quantum cryptography. Issues in Informing Science and Information Technology, 15, 57-67. https://doi.org/10.28945/4008 (CC BY-NC 4.0) This article is licensed to you under a Creative Commons Attribution-NonCommercial 4.0 International License. When you copy and redistribute this paper in full or in part, you need to provide proper attribution to it to ensure that others can later locate this work (and to ensure that others do not accuse you of plagiarism). You may (and we encour- age you to) adapt, remix, transform, and build upon the material for any non-commercial purposes. This license does not permit you to use this material for commercial purposes. MEDICAL IMAGE SECURITY USING QUANTUM CRYPTOGRAPHY Olufunso Dayo Alowolodu Federal University of Technology, Akure, Nigeria odalowolodu@futa.edu.ng Gabriel Kayode Adelaja First Bank of Nigeria PLC, Lagos State, Nigeria Gabrielkayode33@gmail.com Boniface Kayode Alese* Federal University of Technology , Akure, Nigeria bkalese@futa.edu.ng Olufunke Catherine Olayemi Joseph Ayo Babalola University , Ikeji Arakeji, Osun State, Nigeria ocolayemi@jabu.edu.ng * Corresponding author ABSTRACT Aim/Purpose Medical images are very sensitive data that can be transferred to medical labora- tories, professionals, and specialist for referral cases or consultation. Strict secu- rity measures must be utilized to keep these data secured in computer networks when transferred to another party. On a daily basis, unauthorized users derive ways to gain access to sensitive patient medical information. Background One of the best ways to which medical image could be kept secured is through the use of quantum cryptography Methodology Applying the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secured network communication infrastructure. This enables two legitimate users to produce a shared secret random bit string, which can be used as a key in cryptographic applications, such as message en- cryption and authentication. Contribution This paper can make it possible for the healthcare and medical professions to construct cryptographic communication systems to keep patients’ transferred data safe and secured. Findings This work has been able to provide a way for two authorized users who are in different locations to securely establish a secret network key and to detect if eavesdropping (a fraudulent or disruption in the network) has occurred