An encryption protocol for NEQR images based on one-particle quantum walks on a circle

被引:85
作者
Abd-El-Atty, Bassem [1 ]
Abd El-Latif, Ahmed A. [2 ]
Venegas-Andraca, Salvador E. [3 ]
机构
[1] Menoufia Univ, Fac Sci, Dept Math & Comp Sci, Shibin Al Kawm 32511, Egypt
[2] Nile Univ, Sch Informat Technol & Comp Sci, Sheikh Zayed City, Egypt
[3] Tecnol Monterrey, Escuela Ingn & Ciencias, Ave Eugenio Garza Sada 2501, Monterrey 64849, NL, Mexico
关键词
Discrete-time quantum walks; Quantum walks on a circle; chaotic systems; Quantum image processing; Quantum image encryption; WATERMARKING SCHEME; REPRESENTATION; TRANSFORM;
D O I
10.1007/s11128-019-2386-3
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum walks are generalizations of random walks that have extensive applications in various fields including cryptography, quantum algorithms, and quantum networking. Discrete quantum walks can be seen as nonlinear mappings between quantum states and position probability distributions, and this mathematical property may be thought of as an imprint of chaotic behavior and consequently used to generate encryption keys. In this paper, we introduce encryption and decryption algorithms for NEQR images based on discrete quantum walks on a circle. We present full quantum circuits of proposed encryption and decryption algorithms together with digital computer simulations of most common attacks on encrypted images. Our numerical results show that our quantum image encryption and decryption scheme has high efficiency and high security with high large key space.
引用
收藏
页数:26
相关论文
共 64 条
  • [1] Efficient Quantum Information Hiding for Remote Medical Image Sharing
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Hossain, M. Shamim
    Rahman, Md. Abdur
    Alamri, Atif
    Gupta, B. B.
    [J]. IEEE ACCESS, 2018, 6 : 21075 - 21083
  • [2] Robust Encryption of Quantum Medical Images
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Talha, Muhammad
    [J]. IEEE ACCESS, 2018, 6 : 1073 - 1081
  • [3] A new image encryption scheme based on cyclic elliptic curve and chaotic system
    Abd El-Latif, Ahmed A.
    Li, Li
    Niu, Xiamu
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 70 (03) : 1559 - 1584
  • [4] Abd-El-Atty B, 2016, INT C ADV INT SYST I, P342
  • [5] Abd-El-Atty B, 2018, STUD BIG DATA, V33, P3, DOI 10.1007/978-3-319-63639-9_1
  • [6] Advances in the Quantum Theoretical Approach to Image Processing Applications
    Abura'ed, Nour
    Khan, Faisal Shah
    Bhaskar, Harish
    [J]. ACM COMPUTING SURVEYS, 2017, 49 (04)
  • [7] Aharonov D., 2001, P 33 ANN ACM S THEOR, P50, DOI [DOI 10.1145/380752.380758(CIT.ONP.312, DOI 10.1145/380752.380758]
  • [8] QUANTUM RANDOM-WALKS
    AHARONOV, Y
    DAVIDOVICH, L
    ZAGURY, N
    [J]. PHYSICAL REVIEW A, 1993, 48 (02): : 1687 - 1690
  • [9] Some basic cryptographic requirements for chaos-based cryptosystems
    Alvarez, Gonzalo
    Li, Shujun
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08): : 2129 - 2151
  • [10] [Anonymous], 1997, QUANTUM COMPUTATIONS