Article
Physics, Multidisciplinary
Yu Wang, Liquan Chen, Kunliang Yu, Yuan Gao, Yang Ma
Summary: This paper presents an image encryption scheme based on logistic quantum chaos. The scheme utilizes compressive sensing algorithms to compress plaintext images and generates a measurement matrix using quantum logistic and Hadamard matrix. The compressed image is encoded using the improved Flexible Representation of Quantum Images (FRQI) encoding method, and the pixel values of the encoded image are scrambled by rotating the qubit around the axis. The proposed scheme has a large keyspace and strong key sensitivity, and it can resist standard attack methods such as differential attacks and statistical analysis.
Article
Engineering, Electrical & Electronic
Suo Gao, Rui Wu, Xingyuan Wang, Jiafeng Liu, Qi Li, Chunpeng Wang, Xianglong Tang
Summary: An asynchronous updating Boolean network is used to simulate and analyze gene expression, revealing the life activity process and disease mechanism. To ensure secure transmission, an encryption algorithm based on chaos is designed, using a novel chaotic system and encoding rule. The method of synchronous scrambling-diffusion is adapted for encryption. Simulation experiments show good security characteristics with low correlation and high information entropy.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY
(2023)
Article
Quantum Science & Technology
Guang-Long Chen, Xian-Hua Song, Salvador E. Venegas-Andraca, Ahmed A. Abd El-Latif
Summary: QIRHSI is a novel quantum image representation method based on the HSI color space model, which integrates the advantages of the FRQI and NEQR models. It is suitable for image processing and requires less storage space.
QUANTUM INFORMATION PROCESSING
(2022)
Article
Multidisciplinary Sciences
Morteza Saberikamarposhti, Mahdi Sahlabadi, Chia-Chen Lin, Ravie Chandren Muniyand
Summary: This article introduces a new method for image encryption using DNA sequences and chaotic maps. The method protects secure images by scrambling the position of pixels and modifying their values. Experimental results demonstrate the effectiveness of the method in reducing the correlation between pixels and increasing the system uncertainty.
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING
(2023)
Article
Computer Science, Artificial Intelligence
Suo Gao, Songbo Liu, Xingyuan Wang, Rui Wu, Jin Wang, Qi Li, Xianglong Tang
Summary: By designing a new 3D chaotic system called 3D-IHAL, this study demonstrates that the system exhibits good dynamic characteristics suitable for cryptography, generating a key stream for encryption.
APPLIED INTELLIGENCE
(2023)
Article
Computer Science, Information Systems
T. Janani, M. Brindha
Summary: The study explores the efficiency of quantum image encryption in Telehealth, introducing quantum block-based spatial transformations and two levels of security, as well as initial seed values based on plain images. The results show that quantum encryption and dedicated quantum encryption based on ROI regional data can effectively enhance the privacy protection and integrity of medical images.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2021)
Article
Quantum Science & Technology
Jing-Yi Dai, Yan Ma, Nan-Run Zhou
Summary: The proposed algorithm combines quantum discrete cosine transform with 4D hyper-chaotic Henon map to compress and encrypt multiple images, ensuring reliability and security through numerical simulations.
QUANTUM INFORMATION PROCESSING
(2021)
Article
Optics
Mehmet Demirtas
Summary: A secure multiple-image encryption method based on 3D bit-scrambling and diffusion operations is proposed for grayscale images in this paper. The method effectively encrypts multiple images and shows strong resistance against various cryptanalytic attacks, as demonstrated by performance analyses including key space and sensitivity, histogram, correlation, entropy, differential, data loss, noise, and running time.
Article
Optics
Alireza A. Arab, Mohammad Javad B. Rostami, Behnam Ghavami
Summary: With the advancement of science and technology, users are increasingly inclined to use visual data in medical and military applications. However, unauthorized access to personal and confidential information has become a serious problem in the digital world. This paper proposes an image encryption algorithm that combines two chaos systems, which has been experimentally proven to be more secure than traditional encryption algorithms.
Article
Optics
Mehmet Demirtas
Summary: A secure multiple-image encryption method based on 3D bit-scrambling and diffusion operations is proposed in this paper, which encrypts multiple images by scrambling and reconstructing them, and the resistance of the method is tested through performance analysis.
Article
Quantum Science & Technology
M. Nandhini, P. Dhanalakshmi, K. G. Lavanya
Summary: Quantum image processing is an emerging branch that utilizes quantum mechanics and linear algebra to process images in a quantum computer. Fuzzy theory has played a vital role in image processing due to the uncertainties in digital images caused by various factors. Combining fuzzy and quantum in image processing techniques can lead to effective results and find significant applications in different fields. This paper proposes a new approach to represent fuzzy images as quantum images, enabling storage and processing of fuzzy images using the basis states of qubits in a quantum circuit. An experiment was conducted using the IBM quantum experience platform to prepare a quantum image from a sample image, successfully establishing a visual interface for quantum information using the proposed method.
QUANTUM INFORMATION PROCESSING
(2023)
Article
Computer Science, Information Systems
Nadeem Iqbal
Summary: This paper presents a high performance scrambler (HPS) that encrypts color square images using the advanced move of the Queen on a hypothetical chessboard. The plaintext image is divided into red, green, and blue channels, and the pixels in each channel are scrambled individually by the Queen. Diffusion effects are then applied to the scrambled images to obtain the encrypted images. The final color cipher image is obtained by merging the cipher images from the three channels. The proposed image cipher demonstrates efficiency, security, and potential for real-world applications, as confirmed by computer experiments and security analysis. The information entropy is measured at 7.9974, and the floating frequency security parameter shows promising results for uniformly random pixel data in the encrypted image. Additionally, the proposed cipher has a highly competitive time complexity.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Yining Su, Xingyuan Wang
Summary: This paper proposes a color quantum image algorithm based on controlled two-particle quantum walks, which ensures the privacy of images for users on the internet.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Artificial Intelligence
Bassem Abd-El-Atty
Summary: Amidst the growth of internet and communication technologies, the need for secure data transmission is increasing. Since visual data provides more detailed information, it is commonly used to represent most data. Although current quantum computers lack the capability to hack traditional image encryption systems, future advancements in quantum resources may pose a threat. To counter potential attacks from digital and quantum resources, new quantum-inspired image cryptosystems are required. This study proposes a new substitution box mechanism based on quantum-inspired quantum walks, Henon map, and a customized particle swarm optimization algorithm, which proves to be effective and reliable in designing various cryptosystems.
COMPLEX & INTELLIGENT SYSTEMS
(2023)
Review
Mathematics
Bowen Zhang, Lingfeng Liu
Summary: This paper closely examines the development process of chaos-based image-encryption algorithms from various angles, including symmetric and asymmetric algorithms, block ciphers and stream ciphers, and integration with other technologies. The unique attributes of chaos, such as sensitivity to initial conditions, topological transitivity, and pseudo-randomness, are conducive to cross-referencing with other disciplines and improving image-encryption methods. Additionally, this paper covers practical application scenarios and current challenges of chaotic image encryption, thereby encouraging researchers to continue developing and complementing existing situations, and may also serve as a basis of future development prospects for chaos-based image encryption.