1
|
Abd-El-Atty B, Abd EL-Latif AA. Applicable image cryptosystem using bit-level permutation, particle swarm optimisation, and quantum walks. Neural Comput Appl 2023; 35:18325-18341. [DOI: 10.1007/s00521-023-08643-5] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/02/2022] [Accepted: 05/02/2023] [Indexed: 09/01/2023]
|
2
|
Abd-El-Atty B. Efficient S-box construction based on quantum-inspired quantum walks with PSO algorithm and its application to image cryptosystem. COMPLEX INTELL SYST 2023. [DOI: 10.1007/s40747-023-00988-7] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/19/2023]
Abstract
AbstractAmidst the growth of the internet and communication technologies, the requirements for the security of data transmitted via these technologies are increasing. Visual data, like images and videos, are commonly utilized for representing the majority of data due to its having more detailed information. Until now, the physical implementation of quantum computers does not have enough capability for hacking any traditional image cryptosystem, but amidst the growth of quantum resources, enough capability may be available in the near future. Most data represented by images has a long lifetime, like personal, medical, military, etc. Therefore, new quantum-inspired-based designs for image cryptosystems are required to be performed on digital resources and have the capability of defying the potential attacks from digital and quantum resources. In this study, a new substitution box (S-box) mechanism is proposed, which is based on quantum-inspired quantum walks, Hénon map, and a customized particle swarm optimization algorithm. Performance analysis of the suggested S-box proves its effectiveness and its reliability in designing various cryptosystems. Based on the effectiveness of the presented S-box, a new image cryptosystem is proposed, in which its experiential outcomes prove its efficacy and security against various attacks. The average outcome of entropy is 7.99977, UACI is 33.484%, NPCR is 99.618%, and Chi-square is 249.481 for the constructed cipher images.
Collapse
|
3
|
Abd-El-Atty B, El-Affendi MA, Chelloug SA, Abd El-Latif AA. Double Medical Image Cryptosystem Based on Quantum Walk. IEEE ACCESS 2023; 11:69164-69176. [DOI: 10.1109/access.2023.3289932] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
Affiliation(s)
- Bassem Abd-El-Atty
- Department of Computer Science, Faculty of Computers and Information, Luxor University, Luxor, Egypt
| | - Mohammed A. El-Affendi
- EIAS Data Science Laboratory, College of Computer and Information Sciences, Prince Sultan University, Riyadh, Saudi Arabia
| | - Samia Allaoua Chelloug
- Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia
| | - Ahmed A. Abd El-Latif
- EIAS Data Science Laboratory, College of Computer and Information Sciences, Prince Sultan University, Riyadh, Saudi Arabia
| |
Collapse
|
4
|
El-Latif AAA, Abd-El-Atty B. Adaptive Particle Swarm Optimization With Quantum-Inspired Quantum Walks for Robust Image Security. IEEE ACCESS 2023; 11:71143-71153. [DOI: 10.1109/access.2023.3286347] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
Affiliation(s)
- Ahmed A. Abd El-Latif
- EIAS Data Science Laboratory, College of Computer and Information Sciences, Prince Sultan University, Riyadh, Saudi Arabia
| | - Bassem Abd-El-Atty
- Department of Computer Science, Faculty of Computers and Information, Luxor University, Luxor, Egypt
| |
Collapse
|
5
|
Abd-El-Atty B. Quaternion with quantum walks for designing a novel color image cryptosystem. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022. [DOI: 10.1016/j.jisa.2022.103367] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
|
6
|
Abd-El-Atty B. A robust medical image steganography approach based on particle swarm optimization algorithm and quantum walks. Neural Comput Appl 2022. [DOI: 10.1007/s00521-022-07830-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
Abstract
AbstractMedical information plays an essential task in our everyday lives, in which medical data privacy and security constitute an important issue. The confidentiality of medical data can be achieved by applying one or more encryption and data hiding methods. Amidst the development of quantum computers, most medical data confidentiality techniques may be hacked because their construction is based on mathematical models. Most medical data have a long lifetime exceeding 25 years. Therefore, it is an important issue to design a new medical data hiding technique that has the capability to withstand the probable attacks from the side of quantum or digital devices. In this article, we aim to present a novel medical image steganography strategy based on quantum walks, chaotic systems, and particle swarm optimization algorithm. A 3-D chaotic system and quantum walks are utilized for operating particle swarm optimization algorithm, in which the generated velocity sequence is utilized for substituting the confidential data, and the position sequence is utilized for selecting which position in the hosting image will be employed to host the substituted confidential data. The payload capacity of the suggested mechanism is 2 bits per 1 byte, and the average value for PSNR is 44.1, which is big enough for the naked eye to not differentiate the difference between the carrier image and its stego one.
Collapse
|