登录    注册    忘记密码    使用帮助

详细信息

Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion  ( SCI-EXPANDED收录 EI收录)   被引量:22

文献类型:期刊文献

英文题名:Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion

作者:Ye, Guodong[1];Wu, Huishan[1];Jiao, Kaixin[1];Mei, Duan[1]

机构:[1]Guangdong Ocean Univ, Fac Math & Comp Sci, Zhanjiang 524088, Peoples R China

年份:2021

卷号:18

期号:5

起止页码:5427

外文期刊名:MATHEMATICAL BIOSCIENCES AND ENGINEERING

收录:SCI-EXPANDED(收录号:WOS:000688410400002)、、EI(收录号:20212510541154)、Scopus(收录号:2-s2.0-85108248930)、WOS

基金:The authors would like to thank the reviewers for their valuable comments and the editor's helpful suggestions. This work was supported in part by the National Natural Science Foundation of China (No.61972103) , the Natural Science Foundation of Guangdong Province of China (No.2019A1515011361) , and the Key Scientific Research Project of Education Department of Guangdong Province of China Y(No.2020ZDZX3064) .

语种:英文

外文关键词:Quantum logistic map; Arnold map; image encryption; end-to-start cyclic modulo diffusion

外文摘要:In this study, a novel asymmetric image encryption scheme based on the Rivest-Shamir-Adleman (RSA) algorithm and Arnold transformation is proposed. First, the asymmetric public key RSA algorithm is used to generate the initial values for a quantum logistic map. Second, the parameters of the Arnold map are calculated. Then, Arnold scrambling operation is performed on the plain image to achieve the rough hiding of image information. Third, each row and each column of the image are taken as different units respectively and then exclusive -OR (XOR) diffusion is applied. Finally, the generated keystream is used to perform an end -to -start cyclic modulo diffusion operation for all rows and columns to produce the final cipher image. In addition, the keystream is related to the plain image, which can enhance the ability to resist chosen plaintext attack and known plaintext attack. The test results also show that the proposed encryption algorithm has strong plain sensitivity and key sensitivity.

参考文献:

正在载入数据...

版权所有©广东海洋大学 重庆维普资讯有限公司 渝B2-20050021-8 
渝公网安备 50019002500408号 违法和不良信息举报中心