Quantum based encryption approach for secure images

作者: Ahmed A. Abd El-Latif , Hoshang Kolivand , Bassem Abd-El-Atty , Ahmad Alanezi

DOI: 10.1109/CAIDA51941.2021.9425127

关键词: Quantum computerKey (cryptography)Quantum walkTheoretical computer scienceData securityCryptosystemEncryptionInformation privacyComputer scienceHistogram

摘要: Data security and privacy act vital tasks in our daily lives. Traditional cryptosystems may be hacked amidst the growth of quantum resources. Consequently, we need new its construction is based on concepts. In this work, proposed a novel image cryptosystem using walks. We employ diversity tools for experimental assessment presented including correlation analysis, histogram Shannon entropy UACI NPCR analyses, Key sensitivity occlusion analysis. These metrics show advantages over some robust state-of-art cryptosystems.

参考文章(26)
Yu-Guang Yang, Qing-Xiang Pan, Si-Jia Sun, Peng Xu, Novel Image Encryption based on Quantum Walks Scientific Reports. ,vol. 5, pp. 7784- 7784 ,(2015) , 10.1038/SREP07784
Yu-Guang Yang, Peng Xu, Rui Yang, Yi-Hua Zhou, Wei-Min Shi, Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption. Scientific Reports. ,vol. 6, pp. 19788- 19788 ,(2016) , 10.1038/SREP19788
Chunhu Li, Guangchun Luo, Ke Qin, Chunbao Li, An image encryption scheme based on chaotic tent map Nonlinear Dynamics. ,vol. 87, pp. 127- 133 ,(2017) , 10.1007/S11071-016-3030-8
Mary Galterio, Simi Shavit, Thaier Hayajneh, A Review of Facial Biometrics Security for Smart Devices The first computers. ,vol. 7, pp. 37- ,(2018) , 10.3390/COMPUTERS7030037
Ahmed A. Abd EL-Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, A novel image steganography technique based on quantum substitution boxes Optics and Laser Technology. ,vol. 116, pp. 92- 102 ,(2019) , 10.1016/J.OPTLASTEC.2019.03.005
Manju Khari, Aditya Kumar Garg, Amir H. Gandomi, Rashmi Gupta, Rizwan Patan, Balamurugan Balusamy, Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques IEEE Transactions on Systems, Man, and Cybernetics. ,vol. 50, pp. 73- 80 ,(2020) , 10.1109/TSMC.2019.2903785
Ahmed A. Abd EL-Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, Wojciech Mazurczyk, Efficient quantum-based security protocols for information sharing and data protection in 5G networks Future Generation Computer Systems. ,vol. 100, pp. 893- 906 ,(2019) , 10.1016/J.FUTURE.2019.05.053
Bassem Abd-El-Atty, Ahmed A. Abd El-Latif, Salvador E. Venegas-Andraca, An encryption protocol for NEQR images based on one-particle quantum walks on a circle Quantum Information Processing. ,vol. 18, pp. 1- 26 ,(2019) , 10.1007/S11128-019-2386-3
Jialiang Peng, Bassem A. El-Atty, Hany S. Khalifa, Ahmed A. Abd El-Latif, Image steganography algorithm based on key matrix generated by quantum walks international conference on digital image processing. ,vol. 11179, pp. 1117905- ,(2019) , 10.1117/12.2539630
Jialiang Peng, Bassem Abd El-Atty, Hany S. Khalifa, Ahmed A. Abd El-Latif, Image watermarking algorithm based on quaternion and chaotic Lorenz system international conference on digital image processing. ,vol. 11179, ,(2019) , 10.1117/12.2539753