2019
DOI: 10.1007/s11128-019-2410-7
|View full text |Cite
|
Sign up to set email alerts
|

Permutation-based special linear transforms with application in quantum image encryption algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(6 citation statements)
references
References 30 publications
0
6
0
Order By: Relevance
“…By comparing the data in Table 10, the information entropy of the encryption algorithm designed in this paper is closer to 8. Furthermore, the average result of information entropy result for the Lena image is superior to that of other algorithms [2,8,13,26]. Additionally, it can be observed that the color images encrypted using the algorithm proposed in this paper exhibit a high level of randomness.…”
Section: Information Entropy Analysismentioning
confidence: 78%
See 1 more Smart Citation
“…By comparing the data in Table 10, the information entropy of the encryption algorithm designed in this paper is closer to 8. Furthermore, the average result of information entropy result for the Lena image is superior to that of other algorithms [2,8,13,26]. Additionally, it can be observed that the color images encrypted using the algorithm proposed in this paper exhibit a high level of randomness.…”
Section: Information Entropy Analysismentioning
confidence: 78%
“…The inherent characteristics of images, such as tight correlation, high redundancy, and block data capacity between adjacent pixels, distinguish image encryption from text encryption. Encryption is the process of hiding secret information by converting it into an unrecognizable form [1][2][3][4][5]. Therefore, network information security has become an important area of scientific research.…”
Section: Introductionmentioning
confidence: 99%
“…Generally, image encryption uses two basic tools which are scrambling and diffusion. Although the quantum image encryption is still in its first steps, researchers begin to study new encryption techniques as in [15][16][17][18][19][20][21][22][23][24][25][26]. In [15], the authors introduced a quantum medical image encryption scheme which uses gray code and a chaotic map.…”
Section: B Related Workmentioning
confidence: 99%
“…3. Most of the existing quantum image encryption schemes as in [15][16][17][18], [22], [24][25][26], [31,32], and [34][35][36][37] use two independent rounds, scrambling and diffusion. In the scrambling round, the qubits are reordered with different types scrambling as gray code, bit-plane, Arnold map, Baker map, Hilbert transform, while in the diffusion round the qubit values are changed using XOR with a secret key.…”
Section: Contribution and Paper Organizationmentioning
confidence: 99%
“…Almost all of these methods are designed for traditional digital images, while the encryption of quantum images remains in its infancy. However, as the traditional computer approaches its physical limits, researchers are beginning to study a new computing model, and quantum computers have produced a series of satisfactory encryption results [11][12][13][14][15][16][17][18][19][20][21][22][23][24]. For example, EI-Latif [11] presented an encryption algorithm of quantum medical images.…”
Section: Introductionmentioning
confidence: 99%