Access the full text.
Sign up today, get DeepDyve free for 14 days.
Daniah Shakir, Ahmad Salim, Seddiq Al-Rahman, Ali Sagheer (2023)
Image Encryption Using Lorenz Chaotic SystemJournal of Techniques
Farhan Musanna, Sanjeev Kumar (2020)
Image encryption using quantum 3-D Baker map and generalized gray code coupled with fractional Chen’s chaotic systemQuantum Information Processing, 19
M. Kumari, Shailender Gupta (2021)
Performance comparison between Chaos and quantum-chaos based image encryption techniquesMultimedia Tools and Applications, 80
Jian Wang, Yacong Geng, Lei Han, Jiqiang Liu (2018)
Quantum Image Encryption Algorithm Based on Quantum Key ImageInternational Journal of Theoretical Physics, 58
Nanrun Zhou, Lang-Xin Huang, L. Gong, Qing-Wei Zeng (2020)
Novel quantum image compression and encryption algorithm based on DQWT and 3D hyper-chaotic Henon mapQuantum Information Processing, 19
Jian Zhang, Da Huo (2018)
Image encryption algorithm based on quantum chaotic map and DNA codingMultimedia Tools and Applications, 78
Z Man, J Li, X Di, O Bai (2019)
An image segmentation encryption algorithm based on hybrid chaotic systemIEEE Access, 7
MA Malik, Z Bashir, N Iqbal, MA Imtiaz (2020)
Color image encryption algorithm based on hyper-chaos and DNA computingIEEE Access, 8
Chunmeng Li, Xiaozhong Yang (2022)
An image encryption algorithm based on discrete fractional wavelet transform and quantum chaosOptik
Anjali Malik, Shailender Gupta, Sangeeta Dhal (2020)
Analysis of traditional and modern image encryption algorithms under realistic ambienceMultimedia Tools and Applications, 79
Ziyu Jiang, Xingbin Liu (2023)
Image Encryption Algorithm Based on Discrete Quantum Baker Map and Chen Hyperchaotic SystemInternational Journal of Theoretical Physics, 62
Wenwen Hu, Ri-gui Zhou, She-Xiang Jiang, Xingao Liu, Jia Luo (2020)
Quantum image encryption algorithm based on generalized Arnold transform and Logistic mapCCF Transactions on High Performance Computing, 2
S Karthick, S Perumal Sankar, T Raja Prathab (2018)
An approach for image encryption / decryption based on quaternion fourier transformIn Proceedings of 2018 international conference on emerging trends and innovations in engineering and technological research (ICETIETR)
RI Abdelfatah (2022)
Quantum image encryption using a self-adaptive hash function-controlled chaotic map (SAHF-CCM)IEEE Access, 10
Shenli Zhu, Xiao-Hua Deng, Wendong Zhang, Congxu Zhu (2023)
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA CodingMathematics
Mubashar Khan, A. Rasheed (2022)
A fast quantum image encryption algorithm based on affine transform and fractional-order Lorenz-like chaotic dynamical systemQuantum Information Processing, 21
R Santhiya Devi, R John Bosco Balaguru, R Amirtharajan, P Praveenkumar (2019)
A novel quantum encryption and authentication framework integrated with IoTSecurity, privacy and trust in the IoT environment
Bassem Abd-El-Atty, A. El-Latif (2023)
Applicable image cryptosystem using bit-level permutation, particle swarm optimisation, and quantum walksNeural Computing and Applications, 35
Xianhua Song, Guanglong Chen, A. El-Latif (2022)
Quantum Color Image Encryption Scheme Based on Geometric Transformation and Intensity Channel DiffusionMathematics
Deyun Wei, Mingjie Jiang, Yang Deng (2022)
A secure image encryption algorithm based on hyper-chaotic and bit-level permutationExpert Systems with Applications
Images are significant data carriers because they are more challenging to transfer or store securely than text data because they include large amounts of digital data with high redundancy and volume. As a result, image security has grown in importance and relevance to researchers. Images can be shielded against a variety of risks with security, including eavesdropping and illegal copying and alteration. To transform an image into an unidentified format that can be sent via a medium, image encryption is utilized. Because of the potential quantum risk to the existing cryptographic encryption methods and the quick advancement towards the development of quantum computers, quantum image encryption algorithms have recently drawn increasing amounts of attention. The majority of quantum image encryption techniques such as diffusion and scrambling, involve two separate rounds. In this model, the three different chaotic maps are used separately for scrambling the images to determine the performance of the quantum image cryptography with different combinations of the model. At first, the hash256 algorithm is used for generating the quantum key and the forward diffusion takes place for diffusing the first pixel to the final pixel of the input image information. Then, the three different chaotic maps such as pixel permutation, Chen attractor and Lorenz attractor are used for scrambling the input image. Finally, the bit-level permutation and backward diffusion process are considered for the scrambled image. For evaluating the performance of the quantum image cryptography based on the three different chaotic maps, the NPCR, UACI, Entropy, SSIM, correlation characteristics and histogram analysis are determined. From this evaluation, the Lorenz attractor chaotic map performs better than the pixel permutation and Chen attractor. The attained NPCR, UACI, Entropy and SSIM of the CASIA2 dataset for Lorenz attractor are improved than the pixel permutation and Chen attractor. Thus, from the attained values, the Quantum Image Cryptography Based on a Continuous Chaotic Map such as the Lorenz attractor, performs better for the statistical and differential analysis than the other chaotic maps.
Microsystem Technologies – Springer Journals
Published: Jun 1, 2025
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.