Universal share based quantum multi secret image sharing scheme
- URL: http://arxiv.org/abs/2509.12979v1
- Date: Tue, 16 Sep 2025 11:39:46 GMT
- Title: Universal share based quantum multi secret image sharing scheme
- Authors: Dipak K. Rabari, Yogesh K. Meghrajani, Laxmi S. Desai,
- Abstract summary: This research introduces a novel universal share-based quantum multi-secret sharing technique for secure image communication.<n>Quantum computing enables the scheme to exhibit high resilience to different eavesdropping threats.<n>The proposed method offers robust security solution for sharing confidential images across a range of applications.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Image security for information has become increasingly critical as internet become more prevalent due to hacking and unauthorized access. To ensure the security of confidential image data, image encryption using visual cryptography plays a crucial role. To share multiple images using visual cryptography, the company organizer utilizes the concept of a universal or common share. Likewise, quantum computing is an emerging technology that facilitates secure communication. The ability of quantum computers to solve certain mathematical problems efficiently threatens the security of many current encryption algorithms. Hence, to leverage the strengths of quantum computing and visual cryptography, this research introduces a novel universal share-based quantum multi-secret sharing technique for secure image communication. Quantum computing enables the scheme to exhibit high resilience to different eavesdropping threats. Consequently, the proposed method offers robust security solution for sharing confidential images across a range of applications, including enterprise data access and military communications.
Related papers
- Secure Intellicise Wireless Network: Agentic AI for Coverless Semantic Steganography Communication [39.51327882885523]
We propose an Agentic AI-driven SemSteCom scheme, which includes semantic extraction, digital token controlled reference image generation, coverless steganography, and semantic enhancement modules.<n>AgentSemSteCom achieves better transmission quality and higher security levels than the baseline scheme.
arXiv Detail & Related papers (2026-01-23T06:03:48Z) - Evaluating the Potential of Quantum Machine Learning in Cybersecurity: A Case-Study on PCA-based Intrusion Detection Systems [42.184783937646806]
We investigate the potential impact of quantum computing and machine learning (QML) on cybersecurity applications of traditional ML.<n>First, we explore the potential advantages of quantum computing in machine learning problems specifically related to cybersecurity.<n>Then, we describe a methodology to quantify the future impact of fault-tolerant QML algorithms on real-world problems.
arXiv Detail & Related papers (2025-02-16T15:49:25Z) - Optimizing Secure Quantum Information Transmission in Entanglement-Assisted Quantum Networks [0.0]
This work addresses issues by integrating Quantum Key Distribution (QKD) with Multi-Layer Chaotic Encryption.<n>The framework offers a future-proof approach for defining secure communication protocols in crucial sectors such as medical treatment, forensic computing, and national security.
arXiv Detail & Related papers (2025-01-17T00:51:37Z) - Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.<n>This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - Multi-Layered Security System: Integrating Quantum Key Distribution with Classical Cryptography to Enhance Steganographic Security [0.0]
We present a novel cryptographic system that integrates Quantum Key Distribution (QKD) with classical encryption techniques.
Our approach leverages the E91 QKD protocol to generate a shared secret key between communicating parties.
This key is then hashed using the Secure Hash Algorithm (SHA) to provide a fixedlength, high-entropy key.
arXiv Detail & Related papers (2024-08-13T15:20:29Z) - Post-Quantum Cryptography: Securing Digital Communication in the Quantum Era [0.0]
Post-quantum cryptography (PQC) is a critical field aimed at developing resilient cryptographic algorithms to quantum attacks.
This paper delineates the vulnerabilities of classical cryptographic systems to quantum attacks, elucidates impervious principles of quantum computing, and introduces various PQC algorithms.
arXiv Detail & Related papers (2024-03-18T12:51:56Z) - Designing Hash and Encryption Engines using Quantum Computing [2.348041867134616]
We explore quantum-based hash functions and encryption to fortify data security.
The integration of quantum and classical methods demonstrates potential in securing data in the era of quantum computing.
arXiv Detail & Related papers (2023-10-26T14:49:51Z) - Human-imperceptible, Machine-recognizable Images [76.01951148048603]
A major conflict is exposed relating to software engineers between better developing AI systems and distancing from the sensitive training data.
This paper proposes an efficient privacy-preserving learning paradigm, where images are encrypted to become human-imperceptible, machine-recognizable''
We show that the proposed paradigm can ensure the encrypted images have become human-imperceptible while preserving machine-recognizable information.
arXiv Detail & Related papers (2023-06-06T13:41:37Z) - Demonstration of quantum-digital payments [36.136619420474766]
We show how quantum light can secure daily digital payments by generating inherently unforgeable quantum cryptograms.
Unlike previously proposed protocols, our solution does not depend on long-term quantum storage or trusted agents and authenticated channels.
It is practical with near-term technology and may herald an era of quantum-enabled security.
arXiv Detail & Related papers (2023-05-23T20:20:14Z) - NEQRX: Efficient Quantum Image Encryption with Reduced Circuit Complexity [2.7985570786346745]
We propose an efficient implementation scheme for a quantum image encryption algorithm combining the generalized affine transform and logistic map.
We achieve a remarkable 50% reduction in cost while maintaining security and efficiency.
arXiv Detail & Related papers (2022-04-14T10:15:23Z) - Entanglement transfer, accumulation and retrieval via quantum-walk-based
qubit-qudit dynamics [50.591267188664666]
Generation and control of quantum correlations in high-dimensional systems is a major challenge in the present landscape of quantum technologies.
We propose a protocol that is able to attain entangled states of $d$-dimensional systems through a quantum-walk-based it transfer & accumulate mechanism.
In particular, we illustrate a possible photonic implementation where the information is encoded in the orbital angular momentum and polarization degrees of freedom of single photons.
arXiv Detail & Related papers (2020-10-14T14:33:34Z) - Single-Shot Secure Quantum Network Coding for General Multiple Unicast
Network with Free One-Way Public Communication [56.678354403278206]
We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network.
Our code correctly transmits quantum states when there is no attack.
It also guarantees the secrecy of the transmitted quantum state even with the existence of an attack.
arXiv Detail & Related papers (2020-03-30T09:25:13Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.