Abstract
Quantum processing inspired every field of science and technology. Quantum digital content privacy schemes usually employs photons to communicate a key. In this article, we are utilizing different states which correspond to diverse spinning. There are two fundamental particles namely fermions and bosons which are related to half spinning and full spinning. We have utilized the notions of quantum spinning, Hadamard and Redheffer matrices along with Brownian random motion to design robust encryption mechanism. The present scheme is further tested against numerous standards of information security. The simulation outcomes of our presented image encryption scheme attains high level of security, and declines the encryption and the decryption time of image data.
Similar content being viewed by others
References
Waseem, H.M., Khan, M.: Information confidentiality using quantum spinning, rotation and finite state machine. Int. J. Theor. Phys. 57(11), 3584–3594 (2018)
Premaratne, P., Premaratne, M.: Key-based scrambling for secure image communication. In International Conference on Intelligent Computing (pp. 259–263). Springer, Berlin, Heidelberg (2012)
Unnikrishnan, G., Joseph, J., Singh, K.: Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt. Lett. 25(12), 887–889 (2000)
Zhu, B., Liu, S., Ran, Q.: Optical image encryption based on multifractional Fourier transforms. Opt. Lett. 25(16), 1159–1161 (2000)
Peng, X., Yu, L., Cai, L.: Double-lock for image encryption with virtual optical wavelength. Opt. Express. 10(1), 41–45 (2002)
Nishchal, N.K., Joseph, J., Singh, K.: Securing information using fractional Fourier transform in digital holography. Opt. Commun. 235(4–6), 253–259 (2004)
Situ, G., Zhang, J.: A lensless optical security system based on computer-generated phase only masks. Opt. Commun. 232(1–6), 115–122 (2004)
Chen, L., Zhao, D.: Optical image encryption based on fractional wavelet transform. Opt. Commun. 254(4–6), 361–367 (2005)
Meng, X.F., Cai, L.Z., He, M.Z., Dong, G.Y., Shen, X.X.: Cross-talk-free double-image encryption and watermarking with amplitude–phase separate modulations. J. Opt. A Pure Appl. Opt. 7(11), 624 (2005)
La Mela, C., Iemmi, C.: Optical encryption using phase-shifting interferometry in a joint transform correlator. Opt. Lett. 31(17), 2562–2564 (2006)
Hwang, H.E., Han, P.: Fast algorithm of phase masks for image encryption in the Fresnel domain. JOSA A. 23(8), 1870–1874 (2006)
Tao, R., Xin, Y., Wang, Y.: Double image encryption based on random phase encoding in the fractional Fourier domain. Opt. Express. 15(24), 16067–16079 (2007)
Liu, Z., Liu, S.: Double image encryption based on iterative fractional Fourier transform. Opt. Commun. 275(2), 324–329 (2007)
Ge, F., Chen, L., Zhao, D.: A half-blind color image hiding and encryption method in fractional Fourier domains. Opt. Commun. 281(17), 4254–4260 (2008)
Liu, Z., Li, Q., Dai, J., Sun, X., Liu, S., Ahmad, M.A.: A new kind of double image encryption by using a cutting spectrum in the 1-D fractional Fourier transform domains. Opt. Commun. 282(8), 1536–1540 (2009)
Wang, B., Zhang, Y.: Double images hiding based on optical interference. Opt. Commun. 282(17), 3439–3443 (2009)
Meng, X.F., Cai, L.Z., Wang, Y.R., Yang, X.L., Xu, X.F., Dong, G.Y., Shen, X.X.: Digital image synthesis and multiple-image encryption based on parameter multiplexing and phase-shifting interferometry. Opt. Lasers Eng. 47(1), 96–102 (2009)
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)
Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379–423 (1948)
Khan, M., Waseem, H.M.: A novel digital contents privacy scheme based on Kramer's arbitrary spin. Int. J. Theor. Phys. 58, 2720–2743 (2019)
Waseem, H.M., Khan, M., Shah, T.: Image privacy scheme using quantum spinning and rotation. J. Electron. Imaging. 27(6), 063022 (2018)
Khan, M., Munir, N.: A novel image encryption technique based on generalized advanced encryption standard based on field of any characteristic. Wirel. Pers. Commun. (2019). https://doi.org/10.1007/s11277-019-06594-6
Batool, S.I., Waseem, H.M.: A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed. Tools Appl. (2019). https://doi.org/10.1007/s11042-019-07881-x
Khan, M., Masood, F.: A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed. Tools Appl. (2019). https://doi.org/10.1007/s11042-019-07818-4
Khan, M., Waseem, H.M.: A novel image encryption scheme based on quantum dynamical spinning and rotations. PLoS One. 13(11), e0206460 (2018)
Ali, K.M., Khan, M.: Application based construction and optimization of substitution boxes over 2D mixed chaotic maps. Int. J. Theor. Phys. (2019). https://doi.org/10.1007/s10773-019-04188-3
Ali, K.M., Khan, M.: A New Construction of Confusion Component of Block Ciphers. Multimed. Tools Appl. (2019). https://doi.org/10.1007/s11042-019-07866-w
Khan, M., Shah, T.: An efficient chaotic image encryption scheme. Neural Comput. & Applic. 26(5), 1137–1148 (2015)
Younas, I., Khan, M.: A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy. 20(12), 913 (2018)
Arshad, U., Batool, S.I., Amin, M.: A novel image encryption scheme based on Walsh compressed quantum spinning chaotic Lorenz system. Int. J. Theor. Phys. (2019). https://doi.org/10.1007/s10773-019-04221-5
Khan, M., Shah, T., Batool, S.I.: Texture analysis of chaotic coupled map lattices based image encryption algorithm. 3D Res. 5(3), 19
Firdousi, F., Batool, S.I., Amin, M.: A novel construction scheme for nonlinear component based on quantum map. Int. J. Theor. Phys. (2019). https://doi.org/10.1007/s10773-019-04254-w
Munir, N., Khan, M.: A Generalization of Algebraic Expression for Nonlinear Component of Symmetric Key Algorithms of Any Characteristic p. In 2018 International Conference on Applied and Engineering Mathematics (ICAEM) (pp. 48–52). IEEE (2018)
Khan, M., Asghar, Z.: A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural Comput. Applic. 29, 993–999 (2018)
Khan, M., Shah, T.: A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dynamics. 76(1), 377–382 (2014)
Khan, M., Shah, T., Batool, S.I.: A new implementation of chaotic S-boxes in CAPTCHA. SIViP. 10(2), 293–300 (2016)
Norouzi, B., Seyedzadeh, S.M., Mirzakuchaki, S., Mosavi, M.R.: A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed. Tools Appl. 74(3), 781–811 (2015)
Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S.M., Mosavi, M.R.: A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed. Tools Appl. 71(3), 1469–1497 (2014)
Waseem, H.M., Khan, M.: A new approach to digital content privacy using quantum spin and finite-state machine. Appl. Phys. B Lasers Opt. 125(2), 27 (2019)
Stoyanov, B., Kordov, K.: Image encryption using Chebyshev map and rotation equation. Entropy. 17(4), 2117–2139 (2015)
Boriga, R.E., Dăscălescu, A.C., Diaconu, A.V.: A new fast image encryption scheme based on 2D chaotic maps. IAENG Int. J. Comput. Sci. 41(4), 249–258 (2014)
Naseer, Y., Shah, T., Shah, D., Hussain, S.: A novel algorithm of constructing highly nonlinear S-p-boxes. Cryptography. 3(1), 6 (2019). https://doi.org/10.3390/cryptography3010006
Shah, T., Shah, D.: Construction of highly nonlinear S-boxes for degree 8 primitive irreducible polynomials over ℤ2. Multimed. Tools Appl. 78, 1219–1234 (2019)
Naseer, Y., Shah, D., Shah, T.: A novel approach to improve multimedia security utilizing 3D mixed chaotic map. Microprocess. Microsyst. 65, 1–6 (2019)
Shah, D.: Tanveer ul Haq, Tariq Shah, Image Encryption Based on Action of Projective General Linear Group on a Galois Field GF(28), International Conference on Applied and Engineering Mathematics (ICAEM). IEEE, (2018)
Ullah, A., Javeed, A., Shah, T.: A scheme based on algebraic and chaotic structures for the construction of substitution box. Multimed. Tools Appl. (2019). https://doi.org/10.1007/s11042-019-07957-8
Ullah, A., Javeed, A., Shah, T.: Cryptosystem techniques based on the improved Chebyshev map: an application in image encryption. Multimed. Tools Appl. (2019). https://doi.org/10.1007/s11042-019-07981-8
Fick, A.: V. On liquid diffusion. The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science, 10(63), pp.30–39 (1855)
Crank, J.: The Mathematics of Diffusion. Oxford University Press, Oxford (1975)
Acknowledgments
The authors extent their gratitude to the Deanship of Scientific Research at King Khalid University for funding this work through research groups program under grant number R. G. P-2/58/40.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
We have no conflict of interest to declare concerning the publication of this article among authors.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Khan, M., Hussain, I., Jamal, S.S. et al. A Privacy Scheme for Digital Images Based on Quantum Particles. Int J Theor Phys 58, 4293–4310 (2019). https://doi.org/10.1007/s10773-019-04301-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-019-04301-6