MbrlCatalogueTitleDetail

Do you wish to reserve the book?
A Dynamic Image Encryption Scheme Based on Quantum Walk and Chaos-Induced DNA
A Dynamic Image Encryption Scheme Based on Quantum Walk and Chaos-Induced DNA
Hey, we have placed the reservation for you!
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
A Dynamic Image Encryption Scheme Based on Quantum Walk and Chaos-Induced DNA
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Title added to your shelf!
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
A Dynamic Image Encryption Scheme Based on Quantum Walk and Chaos-Induced DNA
A Dynamic Image Encryption Scheme Based on Quantum Walk and Chaos-Induced DNA

Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
How would you like to get it?
We have requested the book for you! Sorry the robot delivery is not available at the moment
We have requested the book for you!
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
A Dynamic Image Encryption Scheme Based on Quantum Walk and Chaos-Induced DNA
A Dynamic Image Encryption Scheme Based on Quantum Walk and Chaos-Induced DNA
Journal Article

A Dynamic Image Encryption Scheme Based on Quantum Walk and Chaos-Induced DNA

2023
Request Book From Autostore and Choose the Collection Method
Overview
The development of quantum information technology and increasing attention of people to the secure transmission of image information in the Internet have put forward higher requirements for traditional image encryption algorithms that not only take advantage of the exponential acceleration ability of quantum computing compared with classical computing but also reduce the risk of encryption algorithms being cracked. Therefore, in order to seek the combination of the advantages of quantum computing and classical image encryption algorithms, this paper proposes a new dynamic encryption image scheme of quantum walk and chaos-induced DNA. Firstly, the RGB three-channel pixels of the color image are extracted and combined into a one-dimensional array, and a random sequence is generated by quantum walk to reorder it to obtain a preliminary scrambled image; secondly, the color image is processed by the SHA-256 algorithm and divided into the generated message digest as the initial condition of the chaotic model. The random sequence was generated by the high-dimensional chaotic model which encodes each pixel independently and disorderly as DNA bases. The difference of the chaotic sequence ensures the dynamic selection of random DNA encoding and decoding rules during encryption. At the same time, the number of times of DNA encryption of the encoded pixel value is also controlled by the dynamic induction of the chaotic sequence, and ultimately, the DNA coding sequence is replaced with the decimal pixel value to obtain the encrypted image. The simulation results show that the information entropy of the encrypted image is above 7.99, and the correlation of each channel is close to 0, which can effectively resist brute force attacks, plaintext attacks, statistical analysis attacks, noise attacks, etc. In addition, in this paper, extracting the watermark embedded in the encrypted image to judge whether image information is tampered or forged further improves the security of the image information.