Loading…

Performance comparison between Chaos and quantum-chaos based image encryption techniques

Today’s digital era has undertaken most of the responsibilities of public and private sectors, not only the industries or big organizations dependent on the internet but individual’s household needs also lying on it. To make the data transmission/reception confidential and secure for both internet u...

Full description

Saved in:
Bibliographic Details
Published in:Multimedia tools and applications 2021-10, Vol.80 (24), p.33213-33255
Main Authors: Kumari, Manju, Gupta, Shailender
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c474t-2341ef86da1ec89ccbf8bff6e4ac9c24d96814866cf5d5bf16c74fff08178e2a3
cites cdi_FETCH-LOGICAL-c474t-2341ef86da1ec89ccbf8bff6e4ac9c24d96814866cf5d5bf16c74fff08178e2a3
container_end_page 33255
container_issue 24
container_start_page 33213
container_title Multimedia tools and applications
container_volume 80
creator Kumari, Manju
Gupta, Shailender
description Today’s digital era has undertaken most of the responsibilities of public and private sectors, not only the industries or big organizations dependent on the internet but individual’s household needs also lying on it. To make the data transmission/reception confidential and secure for both internet users and internet service providers, a large number of researches have been done in this field. It has proved that cryptography is the best solution for solving this purpose. Mostly, digital images are continuously transferring on the network rather than texts. Enciphering a digital image is a much bulkier and a complex task. It has been evident from many types of research that chaotic logistic map-based equations provide a great level of randomness. Hence Chaotic logistic maps-based image encryption techniques (also called chaos techniques) were implemented to obtain highly random cipher images. On the other hand, time consumption must be as low as it can be possible to sustain real-time communication. Presently, the advanced encryption schemes based on quantum technology have enhanced efficiency and security because of having a large key-space and less time complexity along with randomness. The quantum-chaos based encryption is done by utilizing uncertainty principles of quantum mechanics on logistic maps. This paper is an effort to compare chaos and quantum chaos-based image encryption schemes. MATLAB 2016a software is used for the execution and the comparison is made based on various security attack analyses. Based on the study and experimental results, the quantum chaos techniques used for bit plane scrambling provides better results in terms of effectiveness, efficiency, and trustworthy that can be adopted for highly secured image encryption.
doi_str_mv 10.1007/s11042-021-11178-3
format article
fullrecord <record><control><sourceid>proquest_pubme</sourceid><recordid>TN_cdi_pubmedcentral_primary_oai_pubmedcentral_nih_gov_8363497</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2583230442</sourcerecordid><originalsourceid>FETCH-LOGICAL-c474t-2341ef86da1ec89ccbf8bff6e4ac9c24d96814866cf5d5bf16c74fff08178e2a3</originalsourceid><addsrcrecordid>eNp9kU1P3DAQhq2qqHy0f6CHKlIvXAwe24m9F6RqxZeEBAcq9WY5zng3aGMvdgLi32NYSoFDTx55nnnnHb2EfAd2AIypwwzAJKeMAwUApan4RHagVoIqxeFzqYVmVNUMtsluzjeMQVNz-YVsCylBKAY75M8VJh_TYIPDysVhbVOfY6haHO8RQzVf2pgrG7rqdrJhnAbqnn9am7Gr-sEusMLg0sN67MvYiG4Z-tsJ81ey5e0q47eXd4_8Pjm-np_Ri8vT8_mvC-qkkiPlQgJ63XQW0OmZc63XrfcNSutmjstu1miQummcr7u69dA4Jb33TJeDkVuxR442uuupHbBzGMZkV2adirf0YKLtzftO6JdmEe-MFo2QM1UE9l8EUnwyPpqhzw5XKxswTtnwunC8rJMF_fkBvYlTCuW8QmnBBZOSF4pvKJdizgn9qxlg5ik4swnOlODMc3BGlKEfb894HfmbVAHEBsilFRaY_u3-j-wjkZ-l-w</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2583230442</pqid></control><display><type>article</type><title>Performance comparison between Chaos and quantum-chaos based image encryption techniques</title><source>ABI/INFORM Global</source><source>Springer Nature</source><creator>Kumari, Manju ; Gupta, Shailender</creator><creatorcontrib>Kumari, Manju ; Gupta, Shailender</creatorcontrib><description>Today’s digital era has undertaken most of the responsibilities of public and private sectors, not only the industries or big organizations dependent on the internet but individual’s household needs also lying on it. To make the data transmission/reception confidential and secure for both internet users and internet service providers, a large number of researches have been done in this field. It has proved that cryptography is the best solution for solving this purpose. Mostly, digital images are continuously transferring on the network rather than texts. Enciphering a digital image is a much bulkier and a complex task. It has been evident from many types of research that chaotic logistic map-based equations provide a great level of randomness. Hence Chaotic logistic maps-based image encryption techniques (also called chaos techniques) were implemented to obtain highly random cipher images. On the other hand, time consumption must be as low as it can be possible to sustain real-time communication. Presently, the advanced encryption schemes based on quantum technology have enhanced efficiency and security because of having a large key-space and less time complexity along with randomness. The quantum-chaos based encryption is done by utilizing uncertainty principles of quantum mechanics on logistic maps. This paper is an effort to compare chaos and quantum chaos-based image encryption schemes. MATLAB 2016a software is used for the execution and the comparison is made based on various security attack analyses. Based on the study and experimental results, the quantum chaos techniques used for bit plane scrambling provides better results in terms of effectiveness, efficiency, and trustworthy that can be adopted for highly secured image encryption.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-021-11178-3</identifier><identifier>PMID: 34413701</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Complexity ; Computer Communication Networks ; Computer Science ; Cryptography ; Data Structures and Information Theory ; Data transmission ; Digital imaging ; Encryption ; Internet service providers ; Multimedia Information Systems ; Quantum mechanics ; Randomness ; Scrambling (communication) ; Security ; Special Purpose and Application-Based Systems ; Uncertainty principles</subject><ispartof>Multimedia tools and applications, 2021-10, Vol.80 (24), p.33213-33255</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c474t-2341ef86da1ec89ccbf8bff6e4ac9c24d96814866cf5d5bf16c74fff08178e2a3</citedby><cites>FETCH-LOGICAL-c474t-2341ef86da1ec89ccbf8bff6e4ac9c24d96814866cf5d5bf16c74fff08178e2a3</cites><orcidid>0000-0001-8888-0222</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2583230442/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2583230442?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>230,314,776,780,881,11667,27901,27902,36037,36038,44339,74638</link.rule.ids><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/34413701$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Kumari, Manju</creatorcontrib><creatorcontrib>Gupta, Shailender</creatorcontrib><title>Performance comparison between Chaos and quantum-chaos based image encryption techniques</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><addtitle>Multimed Tools Appl</addtitle><description>Today’s digital era has undertaken most of the responsibilities of public and private sectors, not only the industries or big organizations dependent on the internet but individual’s household needs also lying on it. To make the data transmission/reception confidential and secure for both internet users and internet service providers, a large number of researches have been done in this field. It has proved that cryptography is the best solution for solving this purpose. Mostly, digital images are continuously transferring on the network rather than texts. Enciphering a digital image is a much bulkier and a complex task. It has been evident from many types of research that chaotic logistic map-based equations provide a great level of randomness. Hence Chaotic logistic maps-based image encryption techniques (also called chaos techniques) were implemented to obtain highly random cipher images. On the other hand, time consumption must be as low as it can be possible to sustain real-time communication. Presently, the advanced encryption schemes based on quantum technology have enhanced efficiency and security because of having a large key-space and less time complexity along with randomness. The quantum-chaos based encryption is done by utilizing uncertainty principles of quantum mechanics on logistic maps. This paper is an effort to compare chaos and quantum chaos-based image encryption schemes. MATLAB 2016a software is used for the execution and the comparison is made based on various security attack analyses. Based on the study and experimental results, the quantum chaos techniques used for bit plane scrambling provides better results in terms of effectiveness, efficiency, and trustworthy that can be adopted for highly secured image encryption.</description><subject>Algorithms</subject><subject>Complexity</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Data Structures and Information Theory</subject><subject>Data transmission</subject><subject>Digital imaging</subject><subject>Encryption</subject><subject>Internet service providers</subject><subject>Multimedia Information Systems</subject><subject>Quantum mechanics</subject><subject>Randomness</subject><subject>Scrambling (communication)</subject><subject>Security</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Uncertainty principles</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><recordid>eNp9kU1P3DAQhq2qqHy0f6CHKlIvXAwe24m9F6RqxZeEBAcq9WY5zng3aGMvdgLi32NYSoFDTx55nnnnHb2EfAd2AIypwwzAJKeMAwUApan4RHagVoIqxeFzqYVmVNUMtsluzjeMQVNz-YVsCylBKAY75M8VJh_TYIPDysVhbVOfY6haHO8RQzVf2pgrG7rqdrJhnAbqnn9am7Gr-sEusMLg0sN67MvYiG4Z-tsJ81ey5e0q47eXd4_8Pjm-np_Ri8vT8_mvC-qkkiPlQgJ63XQW0OmZc63XrfcNSutmjstu1miQummcr7u69dA4Jb33TJeDkVuxR442uuupHbBzGMZkV2adirf0YKLtzftO6JdmEe-MFo2QM1UE9l8EUnwyPpqhzw5XKxswTtnwunC8rJMF_fkBvYlTCuW8QmnBBZOSF4pvKJdizgn9qxlg5ik4swnOlODMc3BGlKEfb894HfmbVAHEBsilFRaY_u3-j-wjkZ-l-w</recordid><startdate>20211001</startdate><enddate>20211001</enddate><creator>Kumari, Manju</creator><creator>Gupta, Shailender</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><scope>7X8</scope><scope>5PM</scope><orcidid>https://orcid.org/0000-0001-8888-0222</orcidid></search><sort><creationdate>20211001</creationdate><title>Performance comparison between Chaos and quantum-chaos based image encryption techniques</title><author>Kumari, Manju ; Gupta, Shailender</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c474t-2341ef86da1ec89ccbf8bff6e4ac9c24d96814866cf5d5bf16c74fff08178e2a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Complexity</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Data Structures and Information Theory</topic><topic>Data transmission</topic><topic>Digital imaging</topic><topic>Encryption</topic><topic>Internet service providers</topic><topic>Multimedia Information Systems</topic><topic>Quantum mechanics</topic><topic>Randomness</topic><topic>Scrambling (communication)</topic><topic>Security</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Uncertainty principles</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kumari, Manju</creatorcontrib><creatorcontrib>Gupta, Shailender</creatorcontrib><collection>PubMed</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kumari, Manju</au><au>Gupta, Shailender</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Performance comparison between Chaos and quantum-chaos based image encryption techniques</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><addtitle>Multimed Tools Appl</addtitle><date>2021-10-01</date><risdate>2021</risdate><volume>80</volume><issue>24</issue><spage>33213</spage><epage>33255</epage><pages>33213-33255</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Today’s digital era has undertaken most of the responsibilities of public and private sectors, not only the industries or big organizations dependent on the internet but individual’s household needs also lying on it. To make the data transmission/reception confidential and secure for both internet users and internet service providers, a large number of researches have been done in this field. It has proved that cryptography is the best solution for solving this purpose. Mostly, digital images are continuously transferring on the network rather than texts. Enciphering a digital image is a much bulkier and a complex task. It has been evident from many types of research that chaotic logistic map-based equations provide a great level of randomness. Hence Chaotic logistic maps-based image encryption techniques (also called chaos techniques) were implemented to obtain highly random cipher images. On the other hand, time consumption must be as low as it can be possible to sustain real-time communication. Presently, the advanced encryption schemes based on quantum technology have enhanced efficiency and security because of having a large key-space and less time complexity along with randomness. The quantum-chaos based encryption is done by utilizing uncertainty principles of quantum mechanics on logistic maps. This paper is an effort to compare chaos and quantum chaos-based image encryption schemes. MATLAB 2016a software is used for the execution and the comparison is made based on various security attack analyses. Based on the study and experimental results, the quantum chaos techniques used for bit plane scrambling provides better results in terms of effectiveness, efficiency, and trustworthy that can be adopted for highly secured image encryption.</abstract><cop>New York</cop><pub>Springer US</pub><pmid>34413701</pmid><doi>10.1007/s11042-021-11178-3</doi><tpages>43</tpages><orcidid>https://orcid.org/0000-0001-8888-0222</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1380-7501
ispartof Multimedia tools and applications, 2021-10, Vol.80 (24), p.33213-33255
issn 1380-7501
1573-7721
language eng
recordid cdi_pubmedcentral_primary_oai_pubmedcentral_nih_gov_8363497
source ABI/INFORM Global; Springer Nature
subjects Algorithms
Complexity
Computer Communication Networks
Computer Science
Cryptography
Data Structures and Information Theory
Data transmission
Digital imaging
Encryption
Internet service providers
Multimedia Information Systems
Quantum mechanics
Randomness
Scrambling (communication)
Security
Special Purpose and Application-Based Systems
Uncertainty principles
title Performance comparison between Chaos and quantum-chaos based image encryption techniques
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T17%3A41%3A46IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_pubme&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Performance%20comparison%20between%20Chaos%20and%20quantum-chaos%20based%20image%20encryption%20techniques&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Kumari,%20Manju&rft.date=2021-10-01&rft.volume=80&rft.issue=24&rft.spage=33213&rft.epage=33255&rft.pages=33213-33255&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-021-11178-3&rft_dat=%3Cproquest_pubme%3E2583230442%3C/proquest_pubme%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c474t-2341ef86da1ec89ccbf8bff6e4ac9c24d96814866cf5d5bf16c74fff08178e2a3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2583230442&rft_id=info:pmid/34413701&rfr_iscdi=true