Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion
In this study, a novel asymmetric image encryption scheme based on the Rivest-Shamir-Adleman (RSA) algorithm and Arnold transformation is proposed. First, the asymmetric public key RSA algorithm is used to generate the initial values for a quantum logistic map. Second, the parameters of the Arnold m...
Guardado en:
Autores principales: | , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
AIMS Press
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/d711184952204985b563fe0a7cdb890a |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:d711184952204985b563fe0a7cdb890a |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:d711184952204985b563fe0a7cdb890a2021-11-09T02:14:12ZAsymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion10.3934/mbe.20212751551-0018https://doaj.org/article/d711184952204985b563fe0a7cdb890a2021-06-01T00:00:00Zhttps://www.aimspress.com/article/doi/10.3934/mbe.2021275?viewType=HTMLhttps://doaj.org/toc/1551-0018In this study, a novel asymmetric image encryption scheme based on the Rivest-Shamir-Adleman (RSA) algorithm and Arnold transformation is proposed. First, the asymmetric public key RSA algorithm is used to generate the initial values for a quantum logistic map. Second, the parameters of the Arnold map are calculated. Then, Arnold scrambling operation is performed on the plain image to achieve the rough hiding of image information. Third, each row and each column of the image are taken as different units respectively and then exclusive-OR (XOR) diffusion is applied. Finally, the generated keystream is used to perform an end-to-start cyclic modulo diffusion operation for all rows and columns to produce the final cipher image. In addition, the keystream is related to the plain image, which can enhance the ability to resist chosen plaintext attack and known plaintext attack. The test results also show that the proposed encryption algorithm has strong plain sensitivity and key sensitivity.Guodong Ye Huishan Wu Kaixin JiaoDuan MeiAIMS Pressarticlequantum logistic maparnold mapimage encryptionend-to-start cyclic modulo diffusionBiotechnologyTP248.13-248.65MathematicsQA1-939ENMathematical Biosciences and Engineering, Vol 18, Iss 5, Pp 5427-5448 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
quantum logistic map arnold map image encryption end-to-start cyclic modulo diffusion Biotechnology TP248.13-248.65 Mathematics QA1-939 |
spellingShingle |
quantum logistic map arnold map image encryption end-to-start cyclic modulo diffusion Biotechnology TP248.13-248.65 Mathematics QA1-939 Guodong Ye Huishan Wu Kaixin Jiao Duan Mei Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion |
description |
In this study, a novel asymmetric image encryption scheme based on the Rivest-Shamir-Adleman (RSA) algorithm and Arnold transformation is proposed. First, the asymmetric public key RSA algorithm is used to generate the initial values for a quantum logistic map. Second, the parameters of the Arnold map are calculated. Then, Arnold scrambling operation is performed on the plain image to achieve the rough hiding of image information. Third, each row and each column of the image are taken as different units respectively and then exclusive-OR (XOR) diffusion is applied. Finally, the generated keystream is used to perform an end-to-start cyclic modulo diffusion operation for all rows and columns to produce the final cipher image. In addition, the keystream is related to the plain image, which can enhance the ability to resist chosen plaintext attack and known plaintext attack. The test results also show that the proposed encryption algorithm has strong plain sensitivity and key sensitivity. |
format |
article |
author |
Guodong Ye Huishan Wu Kaixin Jiao Duan Mei |
author_facet |
Guodong Ye Huishan Wu Kaixin Jiao Duan Mei |
author_sort |
Guodong Ye |
title |
Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion |
title_short |
Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion |
title_full |
Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion |
title_fullStr |
Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion |
title_full_unstemmed |
Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion |
title_sort |
asymmetric image encryption scheme based on the quantum logistic map and cyclic modulo diffusion |
publisher |
AIMS Press |
publishDate |
2021 |
url |
https://doaj.org/article/d711184952204985b563fe0a7cdb890a |
work_keys_str_mv |
AT guodongye asymmetricimageencryptionschemebasedonthequantumlogisticmapandcyclicmodulodiffusion AT huishanwu asymmetricimageencryptionschemebasedonthequantumlogisticmapandcyclicmodulodiffusion AT kaixinjiao asymmetricimageencryptionschemebasedonthequantumlogisticmapandcyclicmodulodiffusion AT duanmei asymmetricimageencryptionschemebasedonthequantumlogisticmapandcyclicmodulodiffusion |
_version_ |
1718441428273594368 |