2023
DOI: 10.3390/fractalfract7100734
|View full text |Cite
|
Sign up to set email alerts
|

Mixed Multi-Chaos Quantum Image Encryption Scheme Based on Quantum Cellular Automata (QCA)

Nehal Abd El-Salam Mohamed,
Hala El-Sayed,
Aliaa Youssif

Abstract: The advent of quantum computers could enable the resolution of complex computational problems that conventional cryptographic protocols find challenging. As a result, the formidable computing capabilities of quantum computers may render all present-day cryptographic schemes that rely on computational complexity ineffectual. Inspired by these possibilities, the primary purpose of this paper is to suggest a quantum image encryption scheme based on quantum cellular automata with mixed multi-chaos hybrid maps and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 84 publications
0
2
0
Order By: Relevance
“…In 2022, Zhao et al proposed a color image encryption scheme based on Rubik's Cube control and quantum random walk [18]. To sum up, current research in the field of image encryption mainly focuses on evaluation indicators such as the security of the optimization algorithm, computational complexity, and clarity of decrypted images [19][20][21].…”
Section: Introductionmentioning
confidence: 99%
“…In 2022, Zhao et al proposed a color image encryption scheme based on Rubik's Cube control and quantum random walk [18]. To sum up, current research in the field of image encryption mainly focuses on evaluation indicators such as the security of the optimization algorithm, computational complexity, and clarity of decrypted images [19][20][21].…”
Section: Introductionmentioning
confidence: 99%
“…Test result shows when the encrypted image is added salt and pepper noise as displayed in Fig.20, as well as occlusion attack shown in Fig.21, we can still decrypt the encrypted image. PSNR can be measured as the following formula[50]:𝑃𝑃𝐴𝐴𝑁𝑁𝐴𝐴 = 10 log οΏ½ 𝑀𝑀 Γ— 𝑁𝑁 Γ— 255 2 βˆ‘ βˆ‘ [𝑃𝑃(𝑖𝑖, 𝑗𝑗) βˆ’ 𝐷𝐷(𝑖𝑖, 𝑗𝑗)]where M and N represent the length and width of the image, respectively. 𝑃𝑃(𝑖𝑖, 𝑗𝑗) represents the pixel value of an original image, and 𝐷𝐷(𝑖𝑖, 𝑗𝑗) represents the pixel value of the decrypted image.…”
mentioning
confidence: 99%