基于量子的安全图像加密方法

A. Alanezi, Bassem Abd-El-Atty, H. Kolivand, A. A. Abd El-Latif
{"title":"基于量子的安全图像加密方法","authors":"A. Alanezi, Bassem Abd-El-Atty, H. Kolivand, A. A. Abd El-Latif","doi":"10.1109/CAIDA51941.2021.9425127","DOIUrl":null,"url":null,"abstract":"Data security and privacy act vital tasks in our daily lives. Traditional cryptosystems may be hacked amidst the growth of quantum resources. Consequently, we need new cryptosystems its construction is based on quantum concepts. In this work, we proposed a novel image cryptosystem using quantum walks. We employ a diversity of tools for experimental assessment of the presented cryptosystem including correlation analysis, histogram analysis, Shannon entropy analysis, UACI and NPCR analyses, Key sensitivity analysis, and occlusion analysis. These metrics show the advantages of our cryptosystem over some robust state-of-art cryptosystems.","PeriodicalId":272573,"journal":{"name":"2021 1st International Conference on Artificial Intelligence and Data Analytics (CAIDA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Quantum based encryption approach for secure images\",\"authors\":\"A. Alanezi, Bassem Abd-El-Atty, H. Kolivand, A. A. Abd El-Latif\",\"doi\":\"10.1109/CAIDA51941.2021.9425127\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data security and privacy act vital tasks in our daily lives. Traditional cryptosystems may be hacked amidst the growth of quantum resources. Consequently, we need new cryptosystems its construction is based on quantum concepts. In this work, we proposed a novel image cryptosystem using quantum walks. We employ a diversity of tools for experimental assessment of the presented cryptosystem including correlation analysis, histogram analysis, Shannon entropy analysis, UACI and NPCR analyses, Key sensitivity analysis, and occlusion analysis. These metrics show the advantages of our cryptosystem over some robust state-of-art cryptosystems.\",\"PeriodicalId\":272573,\"journal\":{\"name\":\"2021 1st International Conference on Artificial Intelligence and Data Analytics (CAIDA)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-04-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 1st International Conference on Artificial Intelligence and Data Analytics (CAIDA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CAIDA51941.2021.9425127\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 1st International Conference on Artificial Intelligence and Data Analytics (CAIDA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CAIDA51941.2021.9425127","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

数据安全和隐私在我们的日常生活中起着至关重要的作用。随着量子资源的增长,传统的密码系统可能会被黑客攻击。因此,我们需要新的基于量子概念的密码系统。在这项工作中,我们提出了一种新的使用量子行走的图像密码系统。我们使用多种工具对所提出的密码系统进行实验评估,包括相关分析、直方图分析、香农熵分析、UACI和NPCR分析、密钥敏感性分析和遮挡分析。这些指标显示了我们的密码系统比一些健壮的最先进的密码系统的优势。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Quantum based encryption approach for secure images
Data security and privacy act vital tasks in our daily lives. Traditional cryptosystems may be hacked amidst the growth of quantum resources. Consequently, we need new cryptosystems its construction is based on quantum concepts. In this work, we proposed a novel image cryptosystem using quantum walks. We employ a diversity of tools for experimental assessment of the presented cryptosystem including correlation analysis, histogram analysis, Shannon entropy analysis, UACI and NPCR analyses, Key sensitivity analysis, and occlusion analysis. These metrics show the advantages of our cryptosystem over some robust state-of-art cryptosystems.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Melanoma Skin Lesions Classification using Deep Convolutional Neural Network with Transfer Learning A Comparison of Two-Stage Classifier Algorithm with Ensemble Techniques On Detection of Diabetic Retinopathy Predicting Congestive Heart Failure Risk Factors in King Abdulaziz Medical City A Machine Learning Approach Robotics: Biological Hypercomputation and Bio-Inspired Swarms Intelligence AI Support Marketing: Understanding the Customer Journey towards the Business Development
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1