2021
DOI: 10.7498/aps.70.20211255
|View full text |Cite
|
Sign up to set email alerts
|

Color image encryption algorithm based on DNA code and alternating quantum random walk

Abstract: In recent years, image encryption technology has attracted much attention. As people pay more attention to communication privacy and network security, the requirements for information encryption technology are more stringent. As one of the information carriers, images are valuable for carrying the effectiveness and vividness of the information. This paper proposes a color image encryption algorithm based on DNA encoding and alternating quantum random walk. Quantum random walk is an excellent cryptographic tool… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 43 publications
0
11
0
Order By: Relevance
“…According to the results, the VGG19 model achieved unquestionably improved accuracy of 90.48% while the NB method demonstrated the least accuracy of 88.94%. Subsequently, the BoVWbased SVM, CNN, AlexNet, and ResNet34 models have reached closer accu y of 95.59%, 96.93%, 94.82%, and 96.78%, respectively [28]. However, the BTDC-MOML model has exhibited maximum accu racy of 95.71%.…”
Section: Experimental Validationsmentioning
confidence: 95%
“…According to the results, the VGG19 model achieved unquestionably improved accuracy of 90.48% while the NB method demonstrated the least accuracy of 88.94%. Subsequently, the BoVWbased SVM, CNN, AlexNet, and ResNet34 models have reached closer accu y of 95.59%, 96.93%, 94.82%, and 96.78%, respectively [28]. However, the BTDC-MOML model has exhibited maximum accu racy of 95.71%.…”
Section: Experimental Validationsmentioning
confidence: 95%
“…Obviously, logical operators span two boundaries of the same type. The codeword length 30 is determined as the product of the side lengths, expressed in the number of qubits, and for the surface code in Figure , we have N = L X ⋅ L Z = 5 ⋅ 5 = 25.…”
Section: Surface Codementioning
confidence: 99%
“…At present, protecting the security of image information is one of the research hotspots at home and abroad. Te methods of protecting the secret image of an image are roughly divided into two categories: image watermarking [1][2][3][4][5] and image encryption [6][7][8][9]. Image watermarking is to embed the pixel data of the watermark image into the carrier image in a certain way, and there is no visual diference between the carrier image and the watermarked image, thus achieving the efect of hiding the watermark image.…”
Section: Introductionmentioning
confidence: 99%