IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v10y2022i23p4441-d983321.html
   My bibliography  Save this article

A 3D Cuboid Image Encryption Algorithm Based on Controlled Alternate Quantum Walk of Message Coding

Author

Listed:
  • Pai Liu

    (Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education, School of Software Engineering, Dalian University, Dalian 116622, China)

  • Shihua Zhou

    (Key Laboratory of Advanced Design and Intelligent Computing, Ministry of Education, School of Software Engineering, Dalian University, Dalian 116622, China)

  • Wei Qi Yan

    (School of Engineering, Computer and Mathematical Sciences, Auckland University of Technology, Auckland 1010, New Zealand)

Abstract

In order to solve various security risks faced by image privacy protection, we propose a 3D cuboid image encryption scheme based on message-encoded controlled alternate quantum walks. Firstly, we calculated the initial parameters of the quantum system and performed a one-dimensional quantum walk to generate a probability distribution sequence. Secondly, we encoded the sequence into a quaternary message using multiple sets of encoded messages to control the alternate quantum walk model, generating a 3D probability amplitude matrix and 3D probability distribution matrix to obtain the 3D quantum hash sequence through the 3D probability distribution matrix. Then, the image was divided into blocks and integrated into a cuboid. The image cuboid was scrambled between layers using the probability value sequence, and the 3D probability distribution matrix was used to complete the scrambling of the cross-section between layers. Finally, we converted each pixel value of the scrambled cuboid into a binary cube and controlled it to perform the rotation operation through the 3D probability magnitude matrix, then used the 3D quantum hash sequence to XOR the obtained cuboid image and tilted it to obtain the final encrypted image. The simulation results show that the image encryption scheme can resist various typical attacks and has good security performance.

Suggested Citation

  • Pai Liu & Shihua Zhou & Wei Qi Yan, 2022. "A 3D Cuboid Image Encryption Algorithm Based on Controlled Alternate Quantum Walk of Message Coding," Mathematics, MDPI, vol. 10(23), pages 1-26, November.
  • Handle: RePEc:gam:jmathe:v:10:y:2022:i:23:p:4441-:d:983321
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/10/23/4441/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/10/23/4441/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. EL-Latif, Ahmed A. Abd & Abd-El-Atty, Bassem & Venegas-Andraca, Salvador E., 2020. "Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 547(C).
    2. Man, Zhenlong & Li, Jinqing & Di, Xiaoqiang & Sheng, Yaohui & Liu, Zefei, 2021. "Double image encryption algorithm based on neural network and chaos," Chaos, Solitons & Fractals, Elsevier, vol. 152(C).
    3. Yu, Jinwei & Xie, Wei & Zhong, Zhenyu & Wang, Huan, 2022. "Image encryption algorithm based on hyperchaotic system and a new DNA sequence operation," Chaos, Solitons & Fractals, Elsevier, vol. 162(C).
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Bowen Zhang & Lingfeng Liu, 2023. "Chaos-Based Image Encryption: Review, Application, and Challenges," Mathematics, MDPI, vol. 11(11), pages 1-39, June.
    2. Xiaoqiang Zhang & Mi Liu & Xiaochang Yang, 2023. "Color Image Encryption Algorithm Based on Cross-Spiral Transformation and Zone Diffusion," Mathematics, MDPI, vol. 11(14), pages 1-28, July.
    3. Ahmed A. Abd El-Latif & Janarthanan Ramadoss & Bassem Abd-El-Atty & Hany S. Khalifa & Fahimeh Nazarimehr, 2022. "A Novel Chaos-Based Cryptography Algorithm and Its Performance Analysis," Mathematics, MDPI, vol. 10(14), pages 1-22, July.
    4. Cang, Shijian & Wang, Luo & Zhang, Yapeng & Wang, Zenghui & Chen, Zengqiang, 2022. "Bifurcation and chaos in a smooth 3D dynamical system extended from Nosé-Hoover oscillator," Chaos, Solitons & Fractals, Elsevier, vol. 158(C).
    5. Gao, Ya-jun & Xie, Hong-wei & Zhang, Jun & Zhang, Hao, 2022. "A novel quantum image encryption technique based on improved controlled alternated quantum walks and hyperchaotic system," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 598(C).
    6. Mohamed Abd Elaziz & Esraa Osama Abo Zaid & Mohammed A. A. Al-qaness & Rehab Ali Ibrahim, 2021. "Automatic Superpixel-Based Clustering for Color Image Segmentation Using q-Generalized Pareto Distribution under Linear Normalization and Hunger Games Search," Mathematics, MDPI, vol. 9(19), pages 1-18, September.
    7. Haider, Muhammad Imran & Shah, Tariq & Ali, Asif & Shah, Dawood & Khalid, Ijaz, 2023. "An Innovative approach towards image encryption by using novel PRNs and S-boxes Modeling techniques," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 209(C), pages 153-168.
    8. Xianhua Song & Guanglong Chen & Ahmed A. Abd El-Latif, 2022. "Quantum Color Image Encryption Scheme Based on Geometric Transformation and Intensity Channel Diffusion," Mathematics, MDPI, vol. 10(17), pages 1-23, August.
    9. Man, Zhenlong, 2023. "Biometric information security based on double chaotic rotating diffusion," Chaos, Solitons & Fractals, Elsevier, vol. 172(C).
    10. Wang, Ping & Gu, Changgui & Yang, Huijie & Wang, Haiying & Moore, Jack Murdoch, 2023. "Characterizing systems by multi-scale structural complexity," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 609(C).
    11. Lu, Yang & Gong, Mengxin & Gan, Zhihua & Chai, Xiuli & Cao, Lvchen & Wang, Binjie, 2023. "Exploiting one-dimensional improved Chebyshev chaotic system and partitioned diffusion based on the divide-and-conquer principle for 3D medical model encryption," Chaos, Solitons & Fractals, Elsevier, vol. 171(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:10:y:2022:i:23:p:4441-:d:983321. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.