2021
DOI: 10.1109/access.2021.3054952
|View full text |Cite
|
Sign up to set email alerts
|

A Quantum Chaotic Image Cryptosystem and Its Application in IoT Secure Communication

Abstract: In the Internet of Things environment, the secure transmission of digital images has attracted much attention. To improve the confidentiality, we propose an image cryptosystem adopting a quantum chaotic map and the certain security-enhanced mechanisms. Firstly, we use the good random characteristics of quantum chaotic sequences to enhance security performance. Then, we introduce a plaintext correlation mechanism and a diffusion-permutation-diffusion structure in the cryptosystem. Finally, we verify the cryptos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 36 publications
(32 citation statements)
references
References 44 publications
0
30
0
Order By: Relevance
“…The effectiveness of the proposed ECSH multilevel authentication protocol is compared with the existing methods, RLT, 43 UAKMP, 44 and SDN-based data transfer security model, middlebox-Guard (M-GILP), 37 TBRL, 50 quantum chaotic image cryptosystem, 51 and identity based OOSC. 12 RLT 43 : In this method, the global trust calculation is done using the multisource feedback mechanism, and a reliable trust mechanism protects against bad-mouthing attacks.…”
Section: Competing Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…The effectiveness of the proposed ECSH multilevel authentication protocol is compared with the existing methods, RLT, 43 UAKMP, 44 and SDN-based data transfer security model, middlebox-Guard (M-GILP), 37 TBRL, 50 quantum chaotic image cryptosystem, 51 and identity based OOSC. 12 RLT 43 : In this method, the global trust calculation is done using the multisource feedback mechanism, and a reliable trust mechanism protects against bad-mouthing attacks.…”
Section: Competing Methodsmentioning
confidence: 99%
“…The drawback is, it achieved less energy consumption by using a single receiver. Wen et al 51 devised a secure transmission of a digital image over an IoT network. In this, the image cryptosystem named quantum chaotic image cryptosystem is used for secure transmission by employing the chaotic map.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…Different plain images and cipher images, as well as their relevant histograms, are shown in Figure 5. The experimental results show that the pixel values of the R, G and B channels of color cipher image are almost uniformly distributed, so the influence of statistical analysis is greatly eliminated [47,48].…”
Section: Histogram Analysismentioning
confidence: 99%
“…To deal with the problem, various methodologies are introduced to design different image ciphers. Among them, chaos-based image encryption is the most popular one, because chaos has characteristics of sensitivity to initial values, dense periodic points, and long-term unpredictability of orbits [3][4][5]. In the past two decades, chaotic image encryption technology has been widely discussed and has become a research hotspot [6].…”
Section: Introductionmentioning
confidence: 99%