2020
DOI: 10.1038/s41598-020-78127-2
|View full text |Cite|
|
Sign up to set email alerts
|

An image encryption scheme based on public key cryptosystem and quantum logistic map

Abstract: Most of existing image encryption schemes are proposed in the spatial domain which easily destroys the correlation between pixels. This paper proposes an image encryption scheme by employing discrete cosine transform (DCT), quantum logistic map and substitution-permutation network (SPN). The DCT is used to transform the images in the frequency domain. Meanwhile, the SPN is used to provide the security properties of confusion and diffusion. The SPN provides fast encryption as compared to the asymmetric based im… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
20
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(20 citation statements)
references
References 59 publications
0
20
0
Order By: Relevance
“…e correlation coefficient is calculated as follows [54]: where n is the number of pairs of adjacent pixels, p i and q i are a pair of adjacent pixel values, E(p) is the mean of p, E(q) is the mean of q, D(p) is the variance of p, D(q) is the variance of q, and cov(p, q) represents the covariance of p and q. Randomly select 5000 pairs of adjacent pixels from the original remote sensing image "Land1" and ciphertext remote sensing image, and calculate their correlation coefficients in horizontal, vertical, and diagonal directions, as shown in Table 3. In addition, compare the correlation coefficient analysis of remote sensing image encryption algorithm with other papers, which is also listed in Table 3.…”
Section: Correlation Coefficient Analysismentioning
confidence: 99%
“…e correlation coefficient is calculated as follows [54]: where n is the number of pairs of adjacent pixels, p i and q i are a pair of adjacent pixel values, E(p) is the mean of p, E(q) is the mean of q, D(p) is the variance of p, D(q) is the variance of q, and cov(p, q) represents the covariance of p and q. Randomly select 5000 pairs of adjacent pixels from the original remote sensing image "Land1" and ciphertext remote sensing image, and calculate their correlation coefficients in horizontal, vertical, and diagonal directions, as shown in Table 3. In addition, compare the correlation coefficient analysis of remote sensing image encryption algorithm with other papers, which is also listed in Table 3.…”
Section: Correlation Coefficient Analysismentioning
confidence: 99%
“…The analysis shows that the algorithm has high robustness in resisting attacks. Ye et al [28] proposed an image encryption method based on a public key cryptosystem, quantum logistic map, discrete cosine transform (DCT), and substitution-permutation network (SPN). The public key cryptosystem is used to generate the initial value of the quantum logistic map sequence, and the chaotic sequence is used to complete the substitution and permutation of the image.…”
Section: Chaotic Encryption Technologymentioning
confidence: 99%
“…Genetic operations based image encryption algorithms are discussed in [10][11][12]. Other chaotic maps, such as digital chaotic map [13], Bülban chaotic map [14], and hybrid chaotic map [15] based image encryption algorithms are also discussed here for getting more ideas about chaotic behaviour. Image encryption algorithms are classified based on pixel-level and bit-level.…”
Section: Related Workmentioning
confidence: 99%