Quantum Image Encryption Based on Henon Mapping

被引:67
作者
Jiang, Nan [1 ,2 ,3 ,4 ]
Dong, Xuan [1 ]
Hu, Hao [1 ]
Ji, Zhuoxiao [1 ]
Zhang, Wenyin [2 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Linyi Univ, Sch Informat Sci & Technol, Linyi 276000, Peoples R China
[3] Beijing Key Lab Trusted Comp, Beijing 100124, Peoples R China
[4] Natl Engn Lab Crit Technol Informat Secur Classif, Beijing 100124, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum image processing; Quantum image encryption; Quantum computation; Chaos encryption; Henon mapping;
D O I
10.1007/s10773-018-3989-7
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum image processing has great significance as a branch of quantum computing. This paper gives a quantum image encryption based on Henon mapping, which breaks away from the restriction of classical computers and does the work in quantum computers end to end, including the generation of the chaos sequence, the encryption and the decryption. The algorithm is based on the GQIR quantum image representation model and the two-dimensional Henon chaotic mapping. However, the decimal sequence generated by Henon mapping can not be directly applied to quantum computers. Hence, we reform the Henon mapping by binary shift. The quantum image is encrypted by being XORed with the quantum Henon mapping. Simulation experiments indicate that the encrypted image has good radomness and the pixel values are evenly distributed. Since the chaotic sequence itself is suitable for image encryption, coupled with its own quantum confidentiality, the encryption method of this paper is safe, convenient and reliable.
引用
收藏
页码:979 / 991
页数:13
相关论文
共 25 条
[1]   A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces [J].
Abd El-Latif, Ahmed A. ;
Li, Li ;
Wang, Ning ;
Han, Qi ;
Niu, Xiamu .
SIGNAL PROCESSING, 2013, 93 (11) :2986-3000
[2]  
Al-Hazaimeh O. M., 2017, NEURAL COMPUT APPL, P1
[3]  
[Anonymous], INT J THEORETICAL PH
[4]   Quantum Chaotic Image Encryption with One Time Running Key [J].
Cao Guanghui ;
Zhou Jun ;
Zhang Yizhi ;
Jiang Yueling ;
Zhang Xing .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04) :77-88
[5]   Ways of constructing optimal magic cube of order n when (n, 2•3•5•7)=1 [J].
Chen, XS .
JOURNAL OF CENTRAL SOUTH UNIVERSITY OF TECHNOLOGY, 2002, 9 (01) :70-72
[6]  
Fridrich J, 1997, IEEE SYS MAN CYBERN, P1105, DOI 10.1109/ICSMC.1997.638097
[7]   2-DIMENSIONAL MAPPING WITH A STRANGE ATTRACTOR [J].
HENON, M .
COMMUNICATIONS IN MATHEMATICAL PHYSICS, 1976, 50 (01) :69-77
[8]   Quantum Image Encryption Algorithm Based on Image Correlation Decomposition [J].
Hua, Tianxiang ;
Chen, Jiamin ;
Pei, Dongju ;
Zhang, Wenquan ;
Zhou, Nanrun .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2015, 54 (02) :526-537
[9]   Quantum image scaling up based on nearest-neighbor interpolation with integer scaling ratio [J].
Jiang, Nan ;
Wang, Jian ;
Mu, Yue .
QUANTUM INFORMATION PROCESSING, 2015, 14 (11) :4001-4026
[10]   Circuit for Reversible Quantum Multiplier Based on Binary Tree Optimizing Ancilla and Garbage Bits [J].
Kotiyal, Saurabh ;
Thapliyal, Himanshu ;
Ranganathan, Nagarajan .
2014 27TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2014 13TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID 2014), 2014, :545-550