Loading…
Performance comparison between Chaos and quantum-chaos based image encryption techniques
Today’s digital era has undertaken most of the responsibilities of public and private sectors, not only the industries or big organizations dependent on the internet but individual’s household needs also lying on it. To make the data transmission/reception confidential and secure for both internet u...
Saved in:
Published in: | Multimedia tools and applications 2021-10, Vol.80 (24), p.33213-33255 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c474t-2341ef86da1ec89ccbf8bff6e4ac9c24d96814866cf5d5bf16c74fff08178e2a3 |
---|---|
cites | cdi_FETCH-LOGICAL-c474t-2341ef86da1ec89ccbf8bff6e4ac9c24d96814866cf5d5bf16c74fff08178e2a3 |
container_end_page | 33255 |
container_issue | 24 |
container_start_page | 33213 |
container_title | Multimedia tools and applications |
container_volume | 80 |
creator | Kumari, Manju Gupta, Shailender |
description | Today’s digital era has undertaken most of the responsibilities of public and private sectors, not only the industries or big organizations dependent on the internet but individual’s household needs also lying on it. To make the data transmission/reception confidential and secure for both internet users and internet service providers, a large number of researches have been done in this field. It has proved that cryptography is the best solution for solving this purpose. Mostly, digital images are continuously transferring on the network rather than texts. Enciphering a digital image is a much bulkier and a complex task. It has been evident from many types of research that chaotic logistic map-based equations provide a great level of randomness. Hence Chaotic logistic maps-based image encryption techniques (also called chaos techniques) were implemented to obtain highly random cipher images. On the other hand, time consumption must be as low as it can be possible to sustain real-time communication. Presently, the advanced encryption schemes based on quantum technology have enhanced efficiency and security because of having a large key-space and less time complexity along with randomness. The quantum-chaos based encryption is done by utilizing uncertainty principles of quantum mechanics on logistic maps. This paper is an effort to compare chaos and quantum chaos-based image encryption schemes. MATLAB 2016a software is used for the execution and the comparison is made based on various security attack analyses. Based on the study and experimental results, the quantum chaos techniques used for bit plane scrambling provides better results in terms of effectiveness, efficiency, and
trustworthy
that can be adopted for highly secured image encryption. |
doi_str_mv | 10.1007/s11042-021-11178-3 |
format | article |
fullrecord | <record><control><sourceid>proquest_pubme</sourceid><recordid>TN_cdi_pubmedcentral_primary_oai_pubmedcentral_nih_gov_8363497</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2583230442</sourcerecordid><originalsourceid>FETCH-LOGICAL-c474t-2341ef86da1ec89ccbf8bff6e4ac9c24d96814866cf5d5bf16c74fff08178e2a3</originalsourceid><addsrcrecordid>eNp9kU1P3DAQhq2qqHy0f6CHKlIvXAwe24m9F6RqxZeEBAcq9WY5zng3aGMvdgLi32NYSoFDTx55nnnnHb2EfAd2AIypwwzAJKeMAwUApan4RHagVoIqxeFzqYVmVNUMtsluzjeMQVNz-YVsCylBKAY75M8VJh_TYIPDysVhbVOfY6haHO8RQzVf2pgrG7rqdrJhnAbqnn9am7Gr-sEusMLg0sN67MvYiG4Z-tsJ81ey5e0q47eXd4_8Pjm-np_Ri8vT8_mvC-qkkiPlQgJ63XQW0OmZc63XrfcNSutmjstu1miQummcr7u69dA4Jb33TJeDkVuxR442uuupHbBzGMZkV2adirf0YKLtzftO6JdmEe-MFo2QM1UE9l8EUnwyPpqhzw5XKxswTtnwunC8rJMF_fkBvYlTCuW8QmnBBZOSF4pvKJdizgn9qxlg5ik4swnOlODMc3BGlKEfb894HfmbVAHEBsilFRaY_u3-j-wjkZ-l-w</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2583230442</pqid></control><display><type>article</type><title>Performance comparison between Chaos and quantum-chaos based image encryption techniques</title><source>ABI/INFORM Global</source><source>Springer Nature</source><creator>Kumari, Manju ; Gupta, Shailender</creator><creatorcontrib>Kumari, Manju ; Gupta, Shailender</creatorcontrib><description>Today’s digital era has undertaken most of the responsibilities of public and private sectors, not only the industries or big organizations dependent on the internet but individual’s household needs also lying on it. To make the data transmission/reception confidential and secure for both internet users and internet service providers, a large number of researches have been done in this field. It has proved that cryptography is the best solution for solving this purpose. Mostly, digital images are continuously transferring on the network rather than texts. Enciphering a digital image is a much bulkier and a complex task. It has been evident from many types of research that chaotic logistic map-based equations provide a great level of randomness. Hence Chaotic logistic maps-based image encryption techniques (also called chaos techniques) were implemented to obtain highly random cipher images. On the other hand, time consumption must be as low as it can be possible to sustain real-time communication. Presently, the advanced encryption schemes based on quantum technology have enhanced efficiency and security because of having a large key-space and less time complexity along with randomness. The quantum-chaos based encryption is done by utilizing uncertainty principles of quantum mechanics on logistic maps. This paper is an effort to compare chaos and quantum chaos-based image encryption schemes. MATLAB 2016a software is used for the execution and the comparison is made based on various security attack analyses. Based on the study and experimental results, the quantum chaos techniques used for bit plane scrambling provides better results in terms of effectiveness, efficiency, and
trustworthy
that can be adopted for highly secured image encryption.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-021-11178-3</identifier><identifier>PMID: 34413701</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Complexity ; Computer Communication Networks ; Computer Science ; Cryptography ; Data Structures and Information Theory ; Data transmission ; Digital imaging ; Encryption ; Internet service providers ; Multimedia Information Systems ; Quantum mechanics ; Randomness ; Scrambling (communication) ; Security ; Special Purpose and Application-Based Systems ; Uncertainty principles</subject><ispartof>Multimedia tools and applications, 2021-10, Vol.80 (24), p.33213-33255</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c474t-2341ef86da1ec89ccbf8bff6e4ac9c24d96814866cf5d5bf16c74fff08178e2a3</citedby><cites>FETCH-LOGICAL-c474t-2341ef86da1ec89ccbf8bff6e4ac9c24d96814866cf5d5bf16c74fff08178e2a3</cites><orcidid>0000-0001-8888-0222</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2583230442/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2583230442?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>230,314,776,780,881,11667,27901,27902,36037,36038,44339,74638</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/34413701$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Kumari, Manju</creatorcontrib><creatorcontrib>Gupta, Shailender</creatorcontrib><title>Performance comparison between Chaos and quantum-chaos based image encryption techniques</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><addtitle>Multimed Tools Appl</addtitle><description>Today’s digital era has undertaken most of the responsibilities of public and private sectors, not only the industries or big organizations dependent on the internet but individual’s household needs also lying on it. To make the data transmission/reception confidential and secure for both internet users and internet service providers, a large number of researches have been done in this field. It has proved that cryptography is the best solution for solving this purpose. Mostly, digital images are continuously transferring on the network rather than texts. Enciphering a digital image is a much bulkier and a complex task. It has been evident from many types of research that chaotic logistic map-based equations provide a great level of randomness. Hence Chaotic logistic maps-based image encryption techniques (also called chaos techniques) were implemented to obtain highly random cipher images. On the other hand, time consumption must be as low as it can be possible to sustain real-time communication. Presently, the advanced encryption schemes based on quantum technology have enhanced efficiency and security because of having a large key-space and less time complexity along with randomness. The quantum-chaos based encryption is done by utilizing uncertainty principles of quantum mechanics on logistic maps. This paper is an effort to compare chaos and quantum chaos-based image encryption schemes. MATLAB 2016a software is used for the execution and the comparison is made based on various security attack analyses. Based on the study and experimental results, the quantum chaos techniques used for bit plane scrambling provides better results in terms of effectiveness, efficiency, and
trustworthy
that can be adopted for highly secured image encryption.</description><subject>Algorithms</subject><subject>Complexity</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Data Structures and Information Theory</subject><subject>Data transmission</subject><subject>Digital imaging</subject><subject>Encryption</subject><subject>Internet service providers</subject><subject>Multimedia Information Systems</subject><subject>Quantum mechanics</subject><subject>Randomness</subject><subject>Scrambling (communication)</subject><subject>Security</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Uncertainty principles</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><recordid>eNp9kU1P3DAQhq2qqHy0f6CHKlIvXAwe24m9F6RqxZeEBAcq9WY5zng3aGMvdgLi32NYSoFDTx55nnnnHb2EfAd2AIypwwzAJKeMAwUApan4RHagVoIqxeFzqYVmVNUMtsluzjeMQVNz-YVsCylBKAY75M8VJh_TYIPDysVhbVOfY6haHO8RQzVf2pgrG7rqdrJhnAbqnn9am7Gr-sEusMLg0sN67MvYiG4Z-tsJ81ey5e0q47eXd4_8Pjm-np_Ri8vT8_mvC-qkkiPlQgJ63XQW0OmZc63XrfcNSutmjstu1miQummcr7u69dA4Jb33TJeDkVuxR442uuupHbBzGMZkV2adirf0YKLtzftO6JdmEe-MFo2QM1UE9l8EUnwyPpqhzw5XKxswTtnwunC8rJMF_fkBvYlTCuW8QmnBBZOSF4pvKJdizgn9qxlg5ik4swnOlODMc3BGlKEfb894HfmbVAHEBsilFRaY_u3-j-wjkZ-l-w</recordid><startdate>20211001</startdate><enddate>20211001</enddate><creator>Kumari, Manju</creator><creator>Gupta, Shailender</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><scope>7X8</scope><scope>5PM</scope><orcidid>https://orcid.org/0000-0001-8888-0222</orcidid></search><sort><creationdate>20211001</creationdate><title>Performance comparison between Chaos and quantum-chaos based image encryption techniques</title><author>Kumari, Manju ; Gupta, Shailender</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c474t-2341ef86da1ec89ccbf8bff6e4ac9c24d96814866cf5d5bf16c74fff08178e2a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Complexity</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Data Structures and Information Theory</topic><topic>Data transmission</topic><topic>Digital imaging</topic><topic>Encryption</topic><topic>Internet service providers</topic><topic>Multimedia Information Systems</topic><topic>Quantum mechanics</topic><topic>Randomness</topic><topic>Scrambling (communication)</topic><topic>Security</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Uncertainty principles</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kumari, Manju</creatorcontrib><creatorcontrib>Gupta, Shailender</creatorcontrib><collection>PubMed</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kumari, Manju</au><au>Gupta, Shailender</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Performance comparison between Chaos and quantum-chaos based image encryption techniques</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><addtitle>Multimed Tools Appl</addtitle><date>2021-10-01</date><risdate>2021</risdate><volume>80</volume><issue>24</issue><spage>33213</spage><epage>33255</epage><pages>33213-33255</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Today’s digital era has undertaken most of the responsibilities of public and private sectors, not only the industries or big organizations dependent on the internet but individual’s household needs also lying on it. To make the data transmission/reception confidential and secure for both internet users and internet service providers, a large number of researches have been done in this field. It has proved that cryptography is the best solution for solving this purpose. Mostly, digital images are continuously transferring on the network rather than texts. Enciphering a digital image is a much bulkier and a complex task. It has been evident from many types of research that chaotic logistic map-based equations provide a great level of randomness. Hence Chaotic logistic maps-based image encryption techniques (also called chaos techniques) were implemented to obtain highly random cipher images. On the other hand, time consumption must be as low as it can be possible to sustain real-time communication. Presently, the advanced encryption schemes based on quantum technology have enhanced efficiency and security because of having a large key-space and less time complexity along with randomness. The quantum-chaos based encryption is done by utilizing uncertainty principles of quantum mechanics on logistic maps. This paper is an effort to compare chaos and quantum chaos-based image encryption schemes. MATLAB 2016a software is used for the execution and the comparison is made based on various security attack analyses. Based on the study and experimental results, the quantum chaos techniques used for bit plane scrambling provides better results in terms of effectiveness, efficiency, and
trustworthy
that can be adopted for highly secured image encryption.</abstract><cop>New York</cop><pub>Springer US</pub><pmid>34413701</pmid><doi>10.1007/s11042-021-11178-3</doi><tpages>43</tpages><orcidid>https://orcid.org/0000-0001-8888-0222</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2021-10, Vol.80 (24), p.33213-33255 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_pubmedcentral_primary_oai_pubmedcentral_nih_gov_8363497 |
source | ABI/INFORM Global; Springer Nature |
subjects | Algorithms Complexity Computer Communication Networks Computer Science Cryptography Data Structures and Information Theory Data transmission Digital imaging Encryption Internet service providers Multimedia Information Systems Quantum mechanics Randomness Scrambling (communication) Security Special Purpose and Application-Based Systems Uncertainty principles |
title | Performance comparison between Chaos and quantum-chaos based image encryption techniques |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T17%3A41%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_pubme&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Performance%20comparison%20between%20Chaos%20and%20quantum-chaos%20based%20image%20encryption%20techniques&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Kumari,%20Manju&rft.date=2021-10-01&rft.volume=80&rft.issue=24&rft.spage=33213&rft.epage=33255&rft.pages=33213-33255&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-021-11178-3&rft_dat=%3Cproquest_pubme%3E2583230442%3C/proquest_pubme%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c474t-2341ef86da1ec89ccbf8bff6e4ac9c24d96814866cf5d5bf16c74fff08178e2a3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2583230442&rft_id=info:pmid/34413701&rfr_iscdi=true |