Image Encryption Application of Chaotic Sequences Incorporating Quantum Keys
This paper proposes an image encryption algorithm LQBPNN (logistic quantum and back propagation neural network) based on chaotic sequences incorporating quantum keys. Firstly, the improved one-dimensional logistic chaotic sequence is used as the basic key sequence. After the quantum key is introduced, the quantum key is incorporated into the chaotic sequence by nonlinear operation. Then the pixel confused process is completed by the neural network. Finally, two sets of different mixed secret key sequences are used to perform two rounds of diffusion encryption on the confusing image. The experimental results show that the randomness and uniformity of the key sequence are effectively enhanced. The algorithm has a secret key space greater than 2182. The adjacent pixel correlation of the encrypted image is close to 0, and the information entropy is close to 8. The ciphertext image can resist several common attacks such as typical attacks, statistical analysis attacks and differential attacks.
KeywordsLogistic chaotic system quantum key nonlinear operation sequence performance image encryption algorithm
Unable to display preview. Download preview PDF.
This work was supported by National Natural Science Foundation of China (No. 61402012) and Doctor Foundation of Anhui University of Science and Technology.
- E. Yavuz, R. Yazıcı, M. C. Kasapbaşi, E. Yamaç. Enhanced chaotic key-based algorithm for low-entropy image encryption. In Proceedings of the 22nd Signal Processing and Communications Applications Conference, IEEE, Trabzon, Turkey, pp.355–388, 2014. DOI: https://doi.org/10.1109/SIU.2014.6830246.Google Scholar
- Z. Y. Liu, T. C. Xia, J. B. Wang. Image encryption technique based on new two-dimensional fractional-order discrete chaotic map and Menezes-Vanstone elliptic curve cryptosystem. Chinese Physics B, vol. 27, no. 3, Article number 030502, 2018. DOI: https://doi.org/10.1088/1674-1056/27/3/030502.
- J. S. Li, Y. B. Xing, C. Y. Qu, J. X. Zhang. An image encryption method based on tent and Lorenz chaotic systems. In Proceedings of the 6th IEEE International Conference on Software Engineering and Service Science, Beijing, China, pp. 585–586, 2015. DOI: https://doi.org/10.1109/ICSESS.2015.7339125.
- M. Mishra, S. Pandit. Image encryption technique based on chaotic system and hash function. In Proceedings of IEEE International Conference on Computer Communication and Systems, Chennai, India, pp. 63–67, 2014. DOI: https://doi.org/10.1109/ICCCS.2014.7068169.
- Y. G. Yang, P. Xu, J. Tian, H. Zhang. Analysis and improvement of the dynamic watermarking scheme for quantum images using quantum wavelet transform. Quantum Information Processing, vol. 13, no. 9, pp. 1931–1936, 2014. DOI: https://doi.org/10.1007/s11128-014-0783-1.MathSciNetCrossRefzbMATHGoogle Scholar
- S. Behnia, P. Ayubi, W. Soltanpoor. Image encryption based on quantum chaotic map and FSM transforms. In Proceedings of the 15th International Telecommunications Network Strategy and Planning Symposium, IEEE, Rome, Italy, pp. 1–6, 2012. DOI: https://doi.org/10.1109/NETWKS.2012.6381669.Google Scholar
- P. Kurzyúski, A. Wójcik. Discrete-time quantum walk approach to state transfer. Physical Review A, vol.83, no. 6, Article number 062315, 2011. DOI: https://doi.org/10.1103/PhysRevA.83.062315.
- X. Zhan, H. Qin, Z. H. Bian, J. Li, P. Xue. Perfect state transfer and efficient quantum routing: a discrete-time quantum-walk approach. Physical Review A, vol. 90, no. 1, Article number 012331, 2014. DOI: https://doi.org/10.1103/PhysRevA.90.012331.
- M. Li, Y. S. Zhang, G. C. Guo. Quantum random walk in periodic potential on a line. Chinese Physics Letters, vol. 30, no. 2, Article number 020304, 2013. DOI: https://doi.org/10.1088/0256-307X/30/2/020304.
- Y. Wu, J. P. Noonan, S. Agaian. NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications, vol. 2, pp. 31–38, 2011.Google Scholar