56 Hits in 10.1 sec

Self-Adaptive Image Encryption Algorithm Based on Quantum Logistic Map

Youxia Dong, Xiaoling Huang, Qixiang Mei, Yuanju Gan, Nanrun Zhou
2021 Security and Communication Networks  
First, the initial values are substituted into the quantum logistic map based on an iteration process to generate three random sequences.  ...  This study proposes a self-adaptive image encryption algorithm based on the quantum logistic map.  ...  [20] proposed a quantum image encryption and decryption scheme, which was based on iterative generalized Arnold transforms and quantum image cycle shift operations.  ... 
doi:10.1155/2021/6674948 fatcat:gk2xmr3wsfbu3a4gst437564q4

A Digital Image Confidentiality Scheme Based on Pseudo-Quantum Chaos and Lucas Sequence

Khushbu Khalid Butt, Guohui Li, Fawad Masood, Sajid Khan
2020 Entropy  
This work recommends an innovative quantum color image encryption method focused on the Lucas series-based substitution box to enhance the competence of encryption.  ...  Several secure image encryption systems have been researched and formed by chaotic mechanisms in current decades.  ...  Conflicts of Interest: All the authors of this research work declare that the work presented in its original form and contain no conflict of interest.  ... 
doi:10.3390/e22111276 pmid:33287044 fatcat:broqnupomrcwfldtlogb5tvaue

Intelligent Symmetric Cryptography with Chaotic Map and Quantum based Key Generator for Medical Images Infosecurity

Chia-Hung Lin, Jian-Xing Wu, Pi-Yun Chen, Hsiang-Yueh Lai, Chien-Ming Li, Neng-Sheng Pai, Chao-Lin Kuo
2021 IEEE Access  
This study presents an intelligent symmetric cryptography with a chaotic map and quantum-based key generator (KG) for medical image encryption and decryption.  ...  The encrypted images show a visual uncorrelation with the plain images, and experimental results indicate higher confidences against the passive eavesdropper.  ...  Its adaptive scheme has straightforward mathematical operations and statistical parameter estimation to perform the retrained operation with feeding new pairs of cipher codes at each regular encrypted  ... 
doi:10.1109/access.2021.3107608 fatcat:dfy6w24sqbhsdasbpixxlrbr5a

PiouCrypt: Decentralized Lattice-based Method for Visual Symmetric Cryptography [article]

Navid Abapour, Mohsen Ebadpour
2022 arXiv   pre-print
However, only limited novel solutions are provided for image encryption, and limiting the visual cryptography to only limited schemes can bring up negative consequences, especially with emerging quantum  ...  The proposed method has a layered architecture with several cohesive components, and corresponded with an NP-hard problem, despite its symmetric structure.  ...  [29] , the cipher image is going to produced based on the encryption rounds and key's cyclic shifts.  ... 
arXiv:2204.08017v1 fatcat:hq27npnfazeujhjtz22lodyztm

Roadmap on optical security

Bahram Javidi, Artur Carnicer, Masahiro Yamaguchi, Takanori Nomura, Elisabet Pérez-Cabré, María S Millán, Naveen K Nishchal, Roberto Torroba, John Fredy Barrera, Wenqi He, Xiang Peng, Adrian Stern (+16 others)
2016 Journal of Optics  
transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack.  ...  Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems.  ...  Acknowledgments I thankfully acknowledge fruitful discussions with Sudheesh, Isha, Dhirendra and Areeba.  ... 
doi:10.1088/2040-8978/18/8/083001 fatcat:xuffgvk4b5fu3hzikbq67wd5dm

A Review on Applications of Chaotic Maps in Pseudo-Random Number Generators and Encryption

Rasika B. Naik, Udayprakash Singh
2022 Annals of Data Science  
This manuscript gives a summary of how the chaotic maps are used to generate pseudo-random numbers and perform multimedia encryption.  ...  Chaotic map-based pseudo-random number generation can be utilized in multi-media encryption, video-game animations, digital marketing, chaotic system simulation, chaotic missile systems, and other applications  ...  [31] have designed a cosine-transform-based chaotic system for image encryption. They have used an encryption scheme based on high-efficiency scrambling.  ... 
doi:10.1007/s40745-021-00364-7 fatcat:l27bhf7x7jcdngrtu6ivb3wj44

AI Makes Crypto Evolve

Behrouz Zolfaghari, Takeshi Koshiba
2022 Applied System Innovation  
Moreover, we attempted to anticipate what the future may hold for AIIC given the impact of quantum computing on the present and the future of AI.  ...  We identified and analyzed the stages on the evolutionary path of AIIC.  ...  As another example, in [93] , Cohen-Grossberg NNs were coupled with the Arnold chaotic map in order to achieve improved noise resistance in colored image encryption.  ... 
doi:10.3390/asi5040075 fatcat:dmn2j73gc5cehnjdkimf3xpx6m

Terminologies and Techniques based Image Encryption A Survey

Rogash Y Masiha
2022 Artificial Intelligence & Robotics Development Journal  
and algorithms in the field of image encryption is carried out.  ...  Image encryption algorithms are an important part of the multimedia application landscape, playing an important part in both the security and authenticity of images.  ...  After that, bits are moved in accordance with the transformation array, and iterative pixel additions for diffusion follow after that.  ... 
doi:10.52098/airdj.202255 fatcat:whc65fxmubfunpzerj642iqx3i

A Symmetric Key Multiple Color Image Cipher Based on Cellular Automata, Chaos Theory and Image Mixing

K SundaraKrishnan, RAJA SP, JAISON B
2021 Information Technology and Control  
Finally, the big encrypted image is segmented into smaller encrypted images. Additionally, the keys are calculated from the input images to attain input sensitivity.  ...  In this paper, a symmetric multiple color image encryption technique is proposed by adopting a dual permutation and dual substitution framework.  ...  Row Step 4: Transform the big image matrix into a one-dimensional vector with zigzag scanning. Step 5: Perform the k-bit left circular shift operation on each pixel value.  ... 
doi:10.5755/j01.itc.50.1.28012 fatcat:pqpdnl4snjbgfli2tlp6pfwlui

Quantum Simulations in Ion Traps -- Towards Simulating the Early Expanding Universe [article]

Lutz Petersen
2007 arXiv   pre-print
Their quantum state is manipulated and read out using ultraviolet laser beams.  ...  This thesis provides an overview of an approach to quantum simulations using magnesium-25 ions stored in a linear Paul trap as the carriers of quantum information.  ...  Special thanks goes to my advisor Tobi for the great support and perpetual encouragement, for the discussions about the freewill and for  ... 
arXiv:0704.3535v2 fatcat:33azbwbhcnaalnullryqpusdke

Evolutionary Computing Assisted Visually- Imperceptible Hybrid Cryptography and Steganography Model for Secure Data Communication over Cloud Environment

R. Denis, P. Madhubala
2020 International Journal of Computer Networks And Applications  
To perform LSB embedding we applied 2D-Discrete Wavelet Transform (2D-DWT-2L) method with 8×8 dimensional blockwise embedding.  ...  We developed a novel Hybrid Cryptosystem by strategically applying Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA) algorithms to secure secret data to be embedded in a cover image.  ...  Crossover In the crossover process, shift the chromosome by one pixel and reinitiate step-2. Once performing crossover twice, stop the cycle.  ... 
doi:10.22247/ijcna/2020/205321 fatcat:xzvlyfah3raadgvln3gcz4oahe

Efficient Multiplication of Somewhat Small Integers using Number-Theoretic Transforms [article]

Hanno Becker, Vincent Hwang, Matthias J. Kannwischer, Lorenz Panny, Bo-Yin Yang
2022 IACR Cryptology ePrint Archive  
To provide a realistic case study, we benchmark implementations of the RSA encryption and decryption operations. Between Cortex-M3 and Cortex-M55, we observe a ≈ 10× performance improvement.  ...  In this work, we challenge this belief: Leveraging recent advances in the implementation of Number-Theoretic Transforms (NTT) stimulated by their use in Post-Quantum Cryptography, we report on implementations  ...  We use arm-none-eabi-gcc version 11.2.0 with -O3. NTT and FNT performance Table 2 contains the cycle counts for our core transformations.  ... 
dblp:journals/iacr/BeckerHKPY22 fatcat:t3qpzaelfrhexc7sbmwchef6my

National Conference on Recent Advances in Communication Engineering and Information Technology

2020 International journal for innovative engineering and management research  
We provide a broad-based engineering curriculum, with opportunities for specialization and self-directed learning and development.  ...  Our first mission is to educate Electronics and Communication engineers for Indian and Global industries.  ...  By using those sorted positions, shuffle the pixel values generated by Arnold cat map iteratively.  ... 
doi:10.48047/ijiemr/v08/spe/02 fatcat:woay334irjgebf5bixuc4ng6em

A 3D Simplification Method based on Dual Point Sampling

Juan Cao, Yitian Zhao, Ran Song, Yingchun Zhang
2013 Journal of Multimedia  
The watermark information is embedded in a halftone process for image screening with phase modulation method. The watermark is extracted by a template, which is optimized using the PSO algorithm.  ...  Both mean filtering and median filtering are used to remove noise from the recovered watermark image.  ...  We also thank the anonymous reviewers for their suggestions and feedback that helped us to improve the quality of this paper.  ... 
doi:10.4304/jmm.8.3.191-197 fatcat:z5gmzeiwqfadlakggntajifdru

Cell Segmentation in Cervical Smear Images using Polar Coordinates GVF Snake with Radiating Edge Map

Xu Chuanyun, Zhang Yang, Wang Sen
2013 Journal of Multimedia  
The watermark information is embedded in a halftone process for image screening with phase modulation method. The watermark is extracted by a template, which is optimized using the PSO algorithm.  ...  Both mean filtering and median filtering are used to remove noise from the recovered watermark image.  ...  We also thank the anonymous reviewers for their suggestions and feedback that helped us to improve the quality of this paper.  ... 
doi:10.4304/jmm.8.3.213-219 fatcat:fb5tm3tguvgmxblj3eygm7pqmu
« Previous Showing results 1 — 15 out of 56 results