期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Double quantum images encryption scheme based on chaotic system
1
作者 蒋社想 李杨 +1 位作者 石锦 张茹 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期305-320,共16页
This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaoti... This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaotic system based on sine and logistic maps is investigated,offering a wider parameter space and better chaotic behavior compared to the sine and logistic maps.Based on the DNEQR model and the hyperchaotic system,a double quantum images encryption algorithm is proposed.Firstly,two classical plaintext images are transformed into quantum states using the DNEQR model.Then,the proposed hyperchaotic system is employed to iteratively generate pseudo-random sequences.These chaotic sequences are utilized to perform pixel value and position operations on the quantum image,resulting in changes to both pixel values and positions.Finally,the ciphertext image can be obtained by qubit-level diffusion using two XOR operations between the position-permutated image and the pseudo-random sequences.The corresponding quantum circuits are also given.Experimental results demonstrate that the proposed scheme ensures the security of the images during transmission,improves the encryption efficiency,and enhances anti-interference and anti-attack capabilities. 展开更多
关键词 double quantum images encryption chaotic system pixel scrambling XOR operation
下载PDF
Double Encryption Using Trigonometric Chaotic Map and XOR of an Image 被引量:2
2
作者 Orawit Thinnukool Thammarat Panityakul Mahwish Bano 《Computers, Materials & Continua》 SCIE EI 2021年第12期3033-3046,共14页
In the most recent decades,a major number of image encryption plans have been proposed.The vast majority of these plans reached a highsecurity level;however,their moderate speeds because of their complicated processes... In the most recent decades,a major number of image encryption plans have been proposed.The vast majority of these plans reached a highsecurity level;however,their moderate speeds because of their complicated processes made them of no use in real-time applications.Inspired by this,we propose another efficient and rapid image encryption plan dependent on the Trigonometric chaotic guide.In contrast to the most of current plans,we utilize this basic map to create just a couple of arbitrary rows and columns.Moreover,to additionally speed up,we raise the processing unit from the pixel level to the row/column level.The security of the new plot is accomplished through a substitution permutation network,where we apply a circular shift of rows and columns to break the solid connection of neighboring pixels.At that point,we join the XOR operation with modulo function to cover the pixels values and forestall any leaking of data.High-security tests and simulation analyses are carried out to exhibit that the scheme is very secure and exceptionally quick for real-time image processing at 80 fps(frames per second). 展开更多
关键词 double image encryption target image random image trigonometric chaotic map
下载PDF
Attack on Optical Double Random Phase Encryption Based on the Principle of Ptychographical Imaging 被引量:2
3
作者 李拓 史祎诗 《Chinese Physics Letters》 SCIE CAS CSCD 2016年第1期63-66,共4页
The principle of ptychography is applied in known plain text attack on the double random phase encoding (DRPE) system. We find that with several pairs of plain texts and cipher texts, the model of attack on DRPE can... The principle of ptychography is applied in known plain text attack on the double random phase encoding (DRPE) system. We find that with several pairs of plain texts and cipher texts, the model of attack on DRPE can be converted to the model of ptyehographical imaging. Owing to the inherent merits of the ptyehographical imaging, the DRPE system can be breached totally in a fast and nearly perfect way, which is unavailable for currently existing attack methods. Further, since the decryption keys can be seen as an object to be imaged from the perspective of imaging, the ptychographical technique may be a kind of new direction to further analysis of the security of other encryption systems based on double random keys. 展开更多
关键词 of as for it Attack on Optical double Random Phase encryption Based on the Principle of Ptychographical Imaging in IS on
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部