14 December 2018 Image privacy scheme using quantum spinning and rotation
Hafiz Muhammad Waseem, Majid Khan, Tariq Shah
Author Affiliations +
Abstract
Privacy of information is one of the utmost vital issues in the epoch of digitally advanced communication. Privacy of information can be achieved through confidentiality, which is one of the most important pillars in information security. There are varieties of protocols and algorithms either symmetric or asymmetric claiming maximum security depending on key lengths, rounds, S-boxes, etc. Modern systems are based on mathematical and logical functions, and their algorithms are based on the fundamental process of factoring large integers into their primes. With the passage of time, there have been advancements in the field to show that, if the key length is not enough, substitution boxes are not too strong, or rounds of encryption are few, then the designed encryption scheme is vulnerable to threats. We have established a scheme using quantum spinning and rotation that is applied to both symmetric and asymmetric cryptographies with minimum key space and that provides maximum security. Our scheme is purely based on rotation of phases that adds a concept in quantum cryptography. The scope of this paper is to cover the fundamental concepts of spins ½ matrices (Pauli’s matrices) and their general rotation operators as applied to asymmetric systems.
© 2018 SPIE and IS&T 1017-9909/2018/$25.00 © 2018 SPIE and IS&T
Hafiz Muhammad Waseem, Majid Khan, and Tariq Shah "Image privacy scheme using quantum spinning and rotation," Journal of Electronic Imaging 27(6), 063022 (14 December 2018). https://doi.org/10.1117/1.JEI.27.6.063022
Received: 26 April 2018; Accepted: 20 November 2018; Published: 14 December 2018
Lens.org Logo
CITATIONS
Cited by 38 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image encryption

3D image processing

Matrices

Quantum cryptography

Quantum information

Information security

Quantum computing

RELATED CONTENT


Back to Top