2014
DOI: 10.1117/12.2064628
|View full text |Cite
|
Sign up to set email alerts
|

Color encryption scheme based on adapted quantum logistic map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…The operation data at the supply chain end are a confidential document for a company, and the leakage of data may cause bad industry competition and huge economic loss. Therefore, information security management at the supply chain end is an essential part [ 13 , 14 ]. The integration between product receipt and delivery and logistics information at the supply chain end needs to be coordinated by an integrated intelligent management system, and all data sources should be centralized with the incoming and outgoing products [ 15 ] .…”
Section: Introductionmentioning
confidence: 99%
“…The operation data at the supply chain end are a confidential document for a company, and the leakage of data may cause bad industry competition and huge economic loss. Therefore, information security management at the supply chain end is an essential part [ 13 , 14 ]. The integration between product receipt and delivery and logistics information at the supply chain end needs to be coordinated by an integrated intelligent management system, and all data sources should be centralized with the incoming and outgoing products [ 15 ] .…”
Section: Introductionmentioning
confidence: 99%
“…Hence, quantum logistic system is suitable as seed system in encryption algorithm. There are numerous research papers based on the quantum logistic system [33], [46], [47].…”
Section: Introductionmentioning
confidence: 99%
“…The media encryption technique is a challenging task because of the significant level of sophistication developed by forgers and other cyber criminals. The advanced encryption techniques are used for data storage, secure transmission and retrieval of digital images required for different applications like medical, military, homeland security and so on [1]. Generally, the information security depends upon the quality of the Pseudo Random Number (PRN) employed for the protocols.…”
Section: Introductionmentioning
confidence: 99%