Skip to main content
Log in

A Privacy Scheme for Digital Images Based on Quantum Particles

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

Quantum processing inspired every field of science and technology. Quantum digital content privacy schemes usually employs photons to communicate a key. In this article, we are utilizing different states which correspond to diverse spinning. There are two fundamental particles namely fermions and bosons which are related to half spinning and full spinning. We have utilized the notions of quantum spinning, Hadamard and Redheffer matrices along with Brownian random motion to design robust encryption mechanism. The present scheme is further tested against numerous standards of information security. The simulation outcomes of our presented image encryption scheme attains high level of security, and declines the encryption and the decryption time of image data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Waseem, H.M., Khan, M.: Information confidentiality using quantum spinning, rotation and finite state machine. Int. J. Theor. Phys. 57(11), 3584–3594 (2018)

    MATH  Google Scholar 

  2. Premaratne, P., Premaratne, M.: Key-based scrambling for secure image communication. In International Conference on Intelligent Computing (pp. 259–263). Springer, Berlin, Heidelberg (2012)

    Google Scholar 

  3. Unnikrishnan, G., Joseph, J., Singh, K.: Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt. Lett. 25(12), 887–889 (2000)

    ADS  Google Scholar 

  4. Zhu, B., Liu, S., Ran, Q.: Optical image encryption based on multifractional Fourier transforms. Opt. Lett. 25(16), 1159–1161 (2000)

    ADS  Google Scholar 

  5. Peng, X., Yu, L., Cai, L.: Double-lock for image encryption with virtual optical wavelength. Opt. Express. 10(1), 41–45 (2002)

    ADS  Google Scholar 

  6. Nishchal, N.K., Joseph, J., Singh, K.: Securing information using fractional Fourier transform in digital holography. Opt. Commun. 235(4–6), 253–259 (2004)

    ADS  Google Scholar 

  7. Situ, G., Zhang, J.: A lensless optical security system based on computer-generated phase only masks. Opt. Commun. 232(1–6), 115–122 (2004)

    ADS  Google Scholar 

  8. Chen, L., Zhao, D.: Optical image encryption based on fractional wavelet transform. Opt. Commun. 254(4–6), 361–367 (2005)

    ADS  Google Scholar 

  9. Meng, X.F., Cai, L.Z., He, M.Z., Dong, G.Y., Shen, X.X.: Cross-talk-free double-image encryption and watermarking with amplitude–phase separate modulations. J. Opt. A Pure Appl. Opt. 7(11), 624 (2005)

    ADS  Google Scholar 

  10. La Mela, C., Iemmi, C.: Optical encryption using phase-shifting interferometry in a joint transform correlator. Opt. Lett. 31(17), 2562–2564 (2006)

    ADS  Google Scholar 

  11. Hwang, H.E., Han, P.: Fast algorithm of phase masks for image encryption in the Fresnel domain. JOSA A. 23(8), 1870–1874 (2006)

    ADS  Google Scholar 

  12. Tao, R., Xin, Y., Wang, Y.: Double image encryption based on random phase encoding in the fractional Fourier domain. Opt. Express. 15(24), 16067–16079 (2007)

    ADS  Google Scholar 

  13. Liu, Z., Liu, S.: Double image encryption based on iterative fractional Fourier transform. Opt. Commun. 275(2), 324–329 (2007)

    ADS  Google Scholar 

  14. Ge, F., Chen, L., Zhao, D.: A half-blind color image hiding and encryption method in fractional Fourier domains. Opt. Commun. 281(17), 4254–4260 (2008)

    ADS  Google Scholar 

  15. Liu, Z., Li, Q., Dai, J., Sun, X., Liu, S., Ahmad, M.A.: A new kind of double image encryption by using a cutting spectrum in the 1-D fractional Fourier transform domains. Opt. Commun. 282(8), 1536–1540 (2009)

    ADS  Google Scholar 

  16. Wang, B., Zhang, Y.: Double images hiding based on optical interference. Opt. Commun. 282(17), 3439–3443 (2009)

    ADS  Google Scholar 

  17. Meng, X.F., Cai, L.Z., Wang, Y.R., Yang, X.L., Xu, X.F., Dong, G.Y., Shen, X.X.: Digital image synthesis and multiple-image encryption based on parameter multiplexing and phase-shifting interferometry. Opt. Lasers Eng. 47(1), 96–102 (2009)

    Google Scholar 

  18. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)

    MathSciNet  MATH  Google Scholar 

  19. Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379–423 (1948)

    MathSciNet  MATH  Google Scholar 

  20. Khan, M., Waseem, H.M.: A novel digital contents privacy scheme based on Kramer's arbitrary spin. Int. J. Theor. Phys. 58, 2720–2743 (2019)

    MathSciNet  MATH  Google Scholar 

  21. Waseem, H.M., Khan, M., Shah, T.: Image privacy scheme using quantum spinning and rotation. J. Electron. Imaging. 27(6), 063022 (2018)

    Google Scholar 

  22. Khan, M., Munir, N.: A novel image encryption technique based on generalized advanced encryption standard based on field of any characteristic. Wirel. Pers. Commun. (2019). https://doi.org/10.1007/s11277-019-06594-6

    Google Scholar 

  23. Batool, S.I., Waseem, H.M.: A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed. Tools Appl. (2019). https://doi.org/10.1007/s11042-019-07881-x

    Google Scholar 

  24. Khan, M., Masood, F.: A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed. Tools Appl. (2019). https://doi.org/10.1007/s11042-019-07818-4

    Google Scholar 

  25. Khan, M., Waseem, H.M.: A novel image encryption scheme based on quantum dynamical spinning and rotations. PLoS One. 13(11), e0206460 (2018)

    Google Scholar 

  26. Ali, K.M., Khan, M.: Application based construction and optimization of substitution boxes over 2D mixed chaotic maps. Int. J. Theor. Phys. (2019). https://doi.org/10.1007/s10773-019-04188-3

    ADS  MathSciNet  MATH  Google Scholar 

  27. Ali, K.M., Khan, M.: A New Construction of Confusion Component of Block Ciphers. Multimed. Tools Appl. (2019). https://doi.org/10.1007/s11042-019-07866-w

    Google Scholar 

  28. Khan, M., Shah, T.: An efficient chaotic image encryption scheme. Neural Comput. & Applic. 26(5), 1137–1148 (2015)

    Google Scholar 

  29. Younas, I., Khan, M.: A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy. 20(12), 913 (2018)

    ADS  Google Scholar 

  30. Arshad, U., Batool, S.I., Amin, M.: A novel image encryption scheme based on Walsh compressed quantum spinning chaotic Lorenz system. Int. J. Theor. Phys. (2019). https://doi.org/10.1007/s10773-019-04221-5

    ADS  MathSciNet  MATH  Google Scholar 

  31. Khan, M., Shah, T., Batool, S.I.: Texture analysis of chaotic coupled map lattices based image encryption algorithm. 3D Res. 5(3), 19

  32. Firdousi, F., Batool, S.I., Amin, M.: A novel construction scheme for nonlinear component based on quantum map. Int. J. Theor. Phys. (2019). https://doi.org/10.1007/s10773-019-04254-w

    ADS  MathSciNet  MATH  Google Scholar 

  33. Munir, N., Khan, M.: A Generalization of Algebraic Expression for Nonlinear Component of Symmetric Key Algorithms of Any Characteristic p. In 2018 International Conference on Applied and Engineering Mathematics (ICAEM) (pp. 48–52). IEEE (2018)

  34. Khan, M., Asghar, Z.: A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural Comput. Applic. 29, 993–999 (2018)

    Google Scholar 

  35. Khan, M., Shah, T.: A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dynamics. 76(1), 377–382 (2014)

    MathSciNet  MATH  Google Scholar 

  36. Khan, M., Shah, T., Batool, S.I.: A new implementation of chaotic S-boxes in CAPTCHA. SIViP. 10(2), 293–300 (2016)

    Google Scholar 

  37. Norouzi, B., Seyedzadeh, S.M., Mirzakuchaki, S., Mosavi, M.R.: A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed. Tools Appl. 74(3), 781–811 (2015)

    Google Scholar 

  38. Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S.M., Mosavi, M.R.: A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed. Tools Appl. 71(3), 1469–1497 (2014)

    Google Scholar 

  39. Waseem, H.M., Khan, M.: A new approach to digital content privacy using quantum spin and finite-state machine. Appl. Phys. B Lasers Opt. 125(2), 27 (2019)

    ADS  MathSciNet  Google Scholar 

  40. Stoyanov, B., Kordov, K.: Image encryption using Chebyshev map and rotation equation. Entropy. 17(4), 2117–2139 (2015)

    ADS  MathSciNet  Google Scholar 

  41. Boriga, R.E., Dăscălescu, A.C., Diaconu, A.V.: A new fast image encryption scheme based on 2D chaotic maps. IAENG Int. J. Comput. Sci. 41(4), 249–258 (2014)

    Google Scholar 

  42. Naseer, Y., Shah, T., Shah, D., Hussain, S.: A novel algorithm of constructing highly nonlinear S-p-boxes. Cryptography. 3(1), 6 (2019). https://doi.org/10.3390/cryptography3010006

    Article  Google Scholar 

  43. Shah, T., Shah, D.: Construction of highly nonlinear S-boxes for degree 8 primitive irreducible polynomials over ℤ2. Multimed. Tools Appl. 78, 1219–1234 (2019)

    Google Scholar 

  44. Naseer, Y., Shah, D., Shah, T.: A novel approach to improve multimedia security utilizing 3D mixed chaotic map. Microprocess. Microsyst. 65, 1–6 (2019)

    Google Scholar 

  45. Shah, D.: Tanveer ul Haq, Tariq Shah, Image Encryption Based on Action of Projective General Linear Group on a Galois Field GF(28), International Conference on Applied and Engineering Mathematics (ICAEM). IEEE, (2018)

  46. Ullah, A., Javeed, A., Shah, T.: A scheme based on algebraic and chaotic structures for the construction of substitution box. Multimed. Tools Appl. (2019). https://doi.org/10.1007/s11042-019-07957-8

    Google Scholar 

  47. Ullah, A., Javeed, A., Shah, T.: Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption. Multimed. Tools Appl. (2019). https://doi.org/10.1007/s11042-019-07981-8

    Google Scholar 

  48. Fick, A.: V. On liquid diffusion. The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science, 10(63), pp.30–39 (1855)

    Google Scholar 

  49. Crank, J.: The Mathematics of Diffusion. Oxford University Press, Oxford (1975)

    MATH  Google Scholar 

Download references

Acknowledgments

The authors extent their gratitude to the Deanship of Scientific Research at King Khalid University for funding this work through research groups program under grant number R. G. P-2/58/40.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Majid Khan.

Ethics declarations

Conflict of Interest

We have no conflict of interest to declare concerning the publication of this article among authors.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khan, M., Hussain, I., Jamal, S.S. et al. A Privacy Scheme for Digital Images Based on Quantum Particles. Int J Theor Phys 58, 4293–4310 (2019). https://doi.org/10.1007/s10773-019-04301-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-019-04301-6

Keywords

Navigation