Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion

In this study, a novel asymmetric image encryption scheme based on the Rivest-Shamir-Adleman (RSA) algorithm and Arnold transformation is proposed. First, the asymmetric public key RSA algorithm is used to generate the initial values for a quantum logistic map. Second, the parameters of the Arnold m...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Guodong Ye, Huishan Wu, Kaixin Jiao, Duan Mei
Formato: article
Lenguaje:EN
Publicado: AIMS Press 2021
Materias:
Acceso en línea:https://doaj.org/article/d711184952204985b563fe0a7cdb890a
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:d711184952204985b563fe0a7cdb890a
record_format dspace
spelling oai:doaj.org-article:d711184952204985b563fe0a7cdb890a2021-11-09T02:14:12ZAsymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion10.3934/mbe.20212751551-0018https://doaj.org/article/d711184952204985b563fe0a7cdb890a2021-06-01T00:00:00Zhttps://www.aimspress.com/article/doi/10.3934/mbe.2021275?viewType=HTMLhttps://doaj.org/toc/1551-0018In this study, a novel asymmetric image encryption scheme based on the Rivest-Shamir-Adleman (RSA) algorithm and Arnold transformation is proposed. First, the asymmetric public key RSA algorithm is used to generate the initial values for a quantum logistic map. Second, the parameters of the Arnold map are calculated. Then, Arnold scrambling operation is performed on the plain image to achieve the rough hiding of image information. Third, each row and each column of the image are taken as different units respectively and then exclusive-OR (XOR) diffusion is applied. Finally, the generated keystream is used to perform an end-to-start cyclic modulo diffusion operation for all rows and columns to produce the final cipher image. In addition, the keystream is related to the plain image, which can enhance the ability to resist chosen plaintext attack and known plaintext attack. The test results also show that the proposed encryption algorithm has strong plain sensitivity and key sensitivity.Guodong Ye Huishan Wu Kaixin JiaoDuan MeiAIMS Pressarticlequantum logistic maparnold mapimage encryptionend-to-start cyclic modulo diffusionBiotechnologyTP248.13-248.65MathematicsQA1-939ENMathematical Biosciences and Engineering, Vol 18, Iss 5, Pp 5427-5448 (2021)
institution DOAJ
collection DOAJ
language EN
topic quantum logistic map
arnold map
image encryption
end-to-start cyclic modulo diffusion
Biotechnology
TP248.13-248.65
Mathematics
QA1-939
spellingShingle quantum logistic map
arnold map
image encryption
end-to-start cyclic modulo diffusion
Biotechnology
TP248.13-248.65
Mathematics
QA1-939
Guodong Ye
Huishan Wu
Kaixin Jiao
Duan Mei
Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion
description In this study, a novel asymmetric image encryption scheme based on the Rivest-Shamir-Adleman (RSA) algorithm and Arnold transformation is proposed. First, the asymmetric public key RSA algorithm is used to generate the initial values for a quantum logistic map. Second, the parameters of the Arnold map are calculated. Then, Arnold scrambling operation is performed on the plain image to achieve the rough hiding of image information. Third, each row and each column of the image are taken as different units respectively and then exclusive-OR (XOR) diffusion is applied. Finally, the generated keystream is used to perform an end-to-start cyclic modulo diffusion operation for all rows and columns to produce the final cipher image. In addition, the keystream is related to the plain image, which can enhance the ability to resist chosen plaintext attack and known plaintext attack. The test results also show that the proposed encryption algorithm has strong plain sensitivity and key sensitivity.
format article
author Guodong Ye
Huishan Wu
Kaixin Jiao
Duan Mei
author_facet Guodong Ye
Huishan Wu
Kaixin Jiao
Duan Mei
author_sort Guodong Ye
title Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion
title_short Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion
title_full Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion
title_fullStr Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion
title_full_unstemmed Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion
title_sort asymmetric image encryption scheme based on the quantum logistic map and cyclic modulo diffusion
publisher AIMS Press
publishDate 2021
url https://doaj.org/article/d711184952204985b563fe0a7cdb890a
work_keys_str_mv AT guodongye asymmetricimageencryptionschemebasedonthequantumlogisticmapandcyclicmodulodiffusion
AT huishanwu asymmetricimageencryptionschemebasedonthequantumlogisticmapandcyclicmodulodiffusion
AT kaixinjiao asymmetricimageencryptionschemebasedonthequantumlogisticmapandcyclicmodulodiffusion
AT duanmei asymmetricimageencryptionschemebasedonthequantumlogisticmapandcyclicmodulodiffusion
_version_ 1718441428273594368