Skip to main content
Log in

A Novel Digital Contents Privacy Scheme Based on Kramer’s Arbitrary Spin

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

The privacy of digital contents plays an important role in digitally advanced era. The transmission of digital information over public networks have extraordinary impact and gradually imperative due to theft and manipulation in contents. In this article, we have suggested a new encryption scheme based on Kramer’s arbitrary spinning in order to provide the confidentiality to digital contents. We have implemented our offered scheme on standard digital images and performed the security performance analyses to authentic the robustness against cryptographic attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Waseem, H.M., Khan, M.: Information confidentiality using quantum spinning, rotation and finite state machine. Int. J. Theor. Phys. 57(11), 3584–3594 (2018)

    Article  MATH  Google Scholar 

  2. Premaratne, P., Premaratne, M.: Key-based scrambling for secure image communication. In: International Conference on Intelligent Computing, pp. 259–263. Springer, Berlin, Heidelberg (2012)

    Google Scholar 

  3. Unnikrishnan, G., Joseph, J., Singh, K.: Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt. Lett. 25(12), 887–889 (2000)

    Article  ADS  Google Scholar 

  4. Zhu, B., Liu, S., Ran, Q.: Optical image encryption based on multifractional Fourier transforms. Opt. Lett. 25(16), 1159–1161 (2000)

    Article  ADS  Google Scholar 

  5. Peng, X., Yu, L., Cai, L.: Double-lock for image encryption with virtual optical wavelength. Opt. Express. 10(1), 41–45 (2002)

    Article  ADS  Google Scholar 

  6. Nishchal, N.K., Joseph, J., Singh, K.: Securing information using fractional Fourier transform in digital holography. Opt. Commun. 235(4–6), 253–259 (2004)

    Article  ADS  Google Scholar 

  7. Situ, G., Zhang, J.: A lensless optical security system based on computer-generated phase only masks. Opt. Commun. 232(1–6), 115–122 (2004)

    Article  ADS  Google Scholar 

  8. Chen, L., Zhao, D.: Optical image encryption based on fractional wavelet transform. Opt. Commun. 254(4–6), 361–367 (2005)

    Article  ADS  Google Scholar 

  9. Meng, X.F., Cai, L.Z., He, M.Z., Dong, G.Y., Shen, X.X.: Cross-talk-free double-image encryption and watermarking with amplitude–phase separate modulations. J. Opt. A Pure Appl. Opt. 7(11), 624–631 (2005)

    Article  ADS  Google Scholar 

  10. La Mela, C., Iemmi, C.: Optical encryption using phase-shifting interferometry in a joint transform correlator. Opt. Lett. 31(17), 2562–2564 (2006)

    Article  ADS  Google Scholar 

  11. Hwang, H.E., Han, P.: Fast algorithm of phase masks for image encryption in the Fresnel domain. JOSA A. 23(8), 1870–1874 (2006)

    Article  ADS  Google Scholar 

  12. Tao, R., Xin, Y., Wang, Y.: Double image encryption based on random phase encoding in the fractional Fourier domain. Opt. Express. 15(24), 16067–16079 (2007)

    Article  ADS  Google Scholar 

  13. Liu, Z., Liu, S.: Double image encryption based on iterative fractional Fourier transform. Opt. Commun. 275(2), 324–329 (2007)

    Article  ADS  Google Scholar 

  14. Ge, F., Chen, L., Zhao, D.: A half-blind color image hiding and encryption method in fractional Fourier domains. Opt. Commun. 281(17), 4254–4260 (2008)

    Article  ADS  Google Scholar 

  15. Liu, Z., Li, Q., Dai, J., Sun, X., Liu, S., Ahmad, M.A.: A new kind of double image encryption by using a cutting spectrum in the 1-D fractional Fourier transform domains. Opt. Commun. 282(8), 1536–1540 (2009)

    Article  ADS  Google Scholar 

  16. Wang, B., Zhang, Y.: Double images hiding based on optical interference. Opt. Commun. 282(17), 3439–3443 (2009)

    Article  ADS  Google Scholar 

  17. Meng, X.F., Cai, L.Z., Wang, Y.R., Yang, X.L., Xu, X.F., Dong, G.Y., Shen, X.X.: Digital image synthesis and multiple-image encryption based on parameter multiplexing and phase-shifting interferometry. Opt. Lasers Eng. 47(1), 96–102 (2009)

    Article  Google Scholar 

  18. Shannon, C.E.: Communication theory of secrecy systems. Bell system technical journal. 28(4), 656–715 (1949)

    Article  MathSciNet  MATH  Google Scholar 

  19. Shannon, C.E.: A mathematical theory of communication. Bell system technical journal. 27(3), 379–423 (1948)

    Article  MathSciNet  MATH  Google Scholar 

  20. Kramers, H.A., 1930. HA Kramers Proc. roy. Acad. Amsterdam, 32 (1929). In Proc. roy. Acad. Amsterdam (Vol. 33, p. 959)

  21. Sklar, B., 2001. Digital Communications: Fundamentals and Applications

  22. Barrett, W.W., Jarvis, T.J.: Spectral properties of a matrix of Redheffer. Linear Algebra Appl. 162–164 (1992)

  23. Will Dana. Eigenvalues of the Redheffer Matrix and their Relation to the Mertens Function, 2015

    Google Scholar 

  24. Wheeler, N., 2000. Spin matrices for arbitrary spin. Reed College Physics Department, Portland

  25. Dresden, M.H.A.: Kramer’s: between Tradition and Revolution. springer (1987) ISBN 978-1-4612-4622-0

  26. Umezawa, H., 1956. Quantum Field Theory

  27. Younas, I., Khan, M.: A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy. 20(12), 913 (2018)

    Article  ADS  Google Scholar 

  28. Khan, M., Asghar, Z.: A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S 8 permutation. Neural Comput. & Applic. 29(4), 993–999 (2018)

    Article  Google Scholar 

  29. Waseem, H.M., Khan, M.: A new approach to digital content privacy using quantum spin and finite-state machine. Applied Physics B. 125(2), 27 (2019)

    Article  MathSciNet  Google Scholar 

  30. Khan, M., Waseem, H.M.: A novel image encryption scheme based on quantum dynamical spinning and rotations. PLoS One. 13(11), e0206460 (2018)

    Article  Google Scholar 

  31. Stoyanov, B., Kordov, K.: Image encryption using Chebyshev map and rotation equation. Entropy. 17(4), 2117–2139 (2015)

    Article  ADS  MathSciNet  Google Scholar 

  32. Khan, M., Shah, T.: An efficient chaotic image encryption scheme. Neural Comput. & Applic. 26, 1137–1148 (2015)

    Article  Google Scholar 

  33. Waseem, H.M., Khan, M., Shah, T.: Image privacy scheme using quantum spinning and rotation. Journal of Electronic Imaging. 27(6), 063022 (2018)

    Article  Google Scholar 

  34. Munir, N. and Khan, M., 2018. A Generalization of Algebraic Expression for Nonlinear Component of Symmetric Key Algorithms of Any Characteristic p. In 2018 International Conference on Applied and Engineering Mathematics (ICAEM) (pp. 48–52). IEEE

  35. Hussain, I., Anees, A., Aslam, M., Ahmed, R., Siddiqui, N.: A noise resistant symmetric key cryptosystem based on S 8 S-boxes and chaotic maps. The European Physical Journal Plus. 133, 1–23 (2018)

    Article  Google Scholar 

  36. Blondeau, C., Leander, G., Nyberg, K.: Differential-linear cryptanalysis revisited. J. Cryptol. 30(3), 859–888 (2017)

    Article  MathSciNet  MATH  Google Scholar 

  37. Khan, M., Shah, T.: A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dynamics. 76(1), 377–382 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  38. Khan, M., Shah, T., Batool, S.I.: A new implementation of chaotic S-boxes in CAPTCHA. SIViP. 10(2), 293–300 (2016)

    Article  Google Scholar 

Download references

Acknowledgments

Both authors Hafiz Muhammad Waseem and Dr. Majid Khan are highly grateful to Vice Chancellor Dr. Syed Wilayat Husain, Dean Iqbal Rasool Memon, and Director cyber and information security Lab Prof. Dr. Muhammad Amin, Institute of Space Technology, Islamabad Pakistan, for providing decent atmosphere for research and development.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Majid Khan.

Ethics declarations

Conflict of Interest

Both authors have no conflict concerning the publication of this article.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, M., Waseem, H.M. A Novel Digital Contents Privacy Scheme Based on Kramer’s Arbitrary Spin. Int J Theor Phys 58, 2720–2743 (2019). https://doi.org/10.1007/s10773-019-04162-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-019-04162-z

Keywords

Navigation