{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:35:05Z","timestamp":1775745305276,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T00:00:00Z","timestamp":1658880000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T00:00:00Z","timestamp":1658880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003007","name":"Ministry of Scientific Research, Egypt","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003007","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,2]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Cloud computing plays a vital task in our daily lives, in which an enormous amount of data is stored daily on cloud storage. The highest priority for cloud data storage is guaranteeing the security of confidential data. The security of confidential data can be realised through utilising one of the cryptographic mechanisms including encryption and data hiding. With the rapid development for the realization of quantum computers, modern cryptosystems may be cracked including cloud systems. Accordingly, it is a crucial task for achieving confidentiality of data stored on cloud storage before the availability of quantum computers. Therefore, this study aims to utilise one of the quantum computational models, as a quantum-inspired system, to layout a new data confidentiality technique that can be applied in digital devices to have the capability for resisting the potential attacks from quantum and digital computers. In this paper, a new image security algorithm for real-time cloud applications using Gray code, quantum walks (QW), and Henon map is proposed. In the proposed image cryptosystem, the generated key streams from QW and Henon map is related to the plain image with high sensitivity of slight bit changes on the plain image. The outcomes based on deep analysis proves that the presented algorithm is efficient with high security for real-time application.<\/jats:p>","DOI":"10.1007\/s40747-022-00829-z","type":"journal-article","created":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T22:17:23Z","timestamp":1658960243000},"page":"609-624","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["A novel image cryptosystem using Gray code, quantum walks, and Henon map for cloud applications"],"prefix":"10.1007","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4739-0037","authenticated-orcid":false,"given":"Bassem","family":"Abd-El-Atty","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9349-1985","authenticated-orcid":false,"given":"Mohammed","family":"ElAffendi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5068-2033","authenticated-orcid":false,"given":"Ahmed A. Abd","family":"El-Latif","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,27]]},"reference":[{"key":"829_CR1","unstructured":"(2021) Sipi image database-misc. http:\/\/sipi.usc.edu\/database\/database.php?volume=misc. Accessed: 2021-4-20"},{"key":"829_CR2","unstructured":"(2021) Trends in cryptography part 2\u2014blockchain, iot and quantum technology. http:\/\/cryptomathic.com\/news-events\/blog\/cryptography-the-next-10-years-part-2. Accessed: 2021-3-26"},{"key":"829_CR3","doi-asserted-by":"crossref","unstructured":"Abd-El-Atty B, El-Latif AAA, Venegas-Andraca SE (2019) An encryption protocol for NEQR images based on one-particle quantum walks on a circle. Quantum Inf Process 18(9)","DOI":"10.1007\/s11128-019-2386-3"},{"issue":"11","key":"829_CR4","doi-asserted-by":"publisher","first-page":"3108","DOI":"10.3390\/s20113108","volume":"20","author":"B Abd-El-Atty","year":"2020","unstructured":"Abd-El-Atty B, Iliyasu AM, Alaskar H, El-Latif AAA (2020) A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based e-healthcare platforms. Sensors 20(11):3108","journal-title":"Sensors"},{"key":"829_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/6615512","volume":"2021","author":"A Alanezi","year":"2021","unstructured":"Alanezi A, Abd-El-Atty B, Kolivand H, El-Latif AAA, El-Rahiem BA, Sankar S, Khalifa HS (2021) Securing digital images through simple permutation-substitution mechanism in cloud-based smart city environment. Secur Commun Netw 2021:1\u201317","journal-title":"Secur Commun Netw"},{"issue":"3","key":"829_CR6","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1007\/s40747-020-00208-6","volume":"7","author":"O Alfarraj","year":"2021","unstructured":"Alfarraj O, Tolba A (2021) A two-level computer vision-based information processing method for improving the performance of human-machine interaction-aided applications. Complex Intell Syst 7(3):1265\u20131275","journal-title":"Complex Intell Syst"},{"issue":"6","key":"829_CR7","doi-asserted-by":"publisher","first-page":"4004","DOI":"10.1109\/JIOT.2020.3015432","volume":"8","author":"A Alwarafy","year":"2021","unstructured":"Alwarafy A, Al-Thelaya KA, Abdallah M, Schneider J, Hamdi M (2021) A survey on security and privacy issues in edge-computing-assisted internet of things. IEEE Int Things J 8(6):4004\u20134022","journal-title":"IEEE Int Things J"},{"issue":"1","key":"829_CR8","doi-asserted-by":"publisher","first-page":"44","DOI":"10.3390\/e21010044","volume":"21","author":"S Askar","year":"2019","unstructured":"Askar S, Karawia A, Al-Khedhairi A, Al-Ammar F (2019) An algorithm of image encryption using logistic and two-dimensional chaotic economic maps. Entropy 21(1):44","journal-title":"Entropy"},{"issue":"20","key":"829_CR9","doi-asserted-by":"publisher","first-page":"5780","DOI":"10.3390\/s20205780","volume":"20","author":"M Awais","year":"2020","unstructured":"Awais M, Ghayvat H, Krishnan Pandarathodiyil A, Nabillah Ghani WM, Ramanathan A, Pandya S, Walter N, Saad MN, Zain RB, Faye I (2020) Healthcare professional in the loop (HPIL): classification of standard and oral cancer-causing anomalous regions of oral cavity using textural analysis technique in autofluorescence imaging. Sensors 20(20):5780","journal-title":"Sensors"},{"key":"829_CR10","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1016\/j.jisa.2019.05.004","volume":"47","author":"A Broumandnia","year":"2019","unstructured":"Broumandnia A (2019) Designing digital image encryption using 2D and 3D reversible modular chaotic maps. J Inf Secur Appl 47:188\u2013198. https:\/\/doi.org\/10.1016\/j.jisa.2019.05.004","journal-title":"J Inf Secur Appl"},{"key":"829_CR11","doi-asserted-by":"publisher","first-page":"102553","DOI":"10.1016\/j.jisa.2020.102553","volume":"54","author":"A Broumandnia","year":"2020","unstructured":"Broumandnia A (2020) Image encryption algorithm based on the finite fields in chaotic maps. J Inf Secur Appl 54:102553. https:\/\/doi.org\/10.1016\/j.jisa.2020.102553","journal-title":"J Inf Secur Appl"},{"issue":"2","key":"829_CR12","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/MCOM.2017.1600522CM","volume":"55","author":"C Cheng","year":"2017","unstructured":"Cheng C, Lu R, Petzoldt A, Takagi T (2017) Securing the internet of things in a quantum world. IEEE Commun Mag 55(2):116\u2013120","journal-title":"IEEE Commun Mag"},{"issue":"7","key":"829_CR13","doi-asserted-by":"publisher","first-page":"768","DOI":"10.3390\/electronics8070768","volume":"8","author":"LM Dang","year":"2019","unstructured":"Dang LM, Piran MJ, Han D, Min K, Moon H (2019) A survey on internet of things and cloud computing for healthcare. Electronics 8(7):768","journal-title":"Electronics"},{"key":"829_CR14","doi-asserted-by":"crossref","unstructured":"Divya R, Peter JD (2021) Smart healthcare system-a brain-like computing approach for analyzing the performance of detectron2 and PoseNet models for anomalous action detection in aged people with movement impairments. Complex Intell Syst 1\u201320","DOI":"10.1007\/s40747-021-00319-8"},{"key":"829_CR15","doi-asserted-by":"crossref","unstructured":"Diyan M, Silva BN, Han J, Cao Z, Han K (2020) Intelligent internet of things gateway supporting heterogeneous energy data management and processing. Trans Emerg Telecommun Technol","DOI":"10.1002\/ett.3919"},{"key":"829_CR16","doi-asserted-by":"crossref","unstructured":"El-Latif AAA, Abd-El-Atty B, Amin M, Iliyasu AM (2020) Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications. Sci Rep 10(1)","DOI":"10.1038\/s41598-020-58636-w"},{"issue":"4","key":"829_CR17","doi-asserted-by":"publisher","first-page":"102549","DOI":"10.1016\/j.ipm.2021.102549","volume":"58","author":"AAA El-Latif","year":"2021","unstructured":"El-Latif AAA, Abd-El-Atty B, Mehmood I, Muhammad K, Venegas-Andraca SE, Peng J (2021) Quantum-inspired blockchain-based cybersecurity: securing smart edge utilities in IoT-based smart cities. Inf Process Manag 58(4):102549","journal-title":"Inf Process Manag"},{"key":"829_CR18","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1016\/j.future.2019.05.053","volume":"100","author":"AAA EL-Latif","year":"2019","unstructured":"EL-Latif AAA, Abd-El-Atty B, Venegas-Andraca SE, Mazurczyk W (2019) Efficient quantum-based security protocols for information sharing and data protection in 5G networks. Future Gener Comput Syst 100:893\u2013906","journal-title":"Future Gener Comput Syst"},{"issue":"11","key":"829_CR19","doi-asserted-by":"publisher","first-page":"7111","DOI":"10.1007\/s00521-018-3541-y","volume":"31","author":"Z hua Gan","year":"2018","unstructured":"hua Gan Z, li Chai X, jun Han D, ran Chen Y (2018) A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput Appl 31(11):7111\u20137130","journal-title":"Neural Comput Appl"},{"key":"829_CR20","doi-asserted-by":"crossref","unstructured":"Hasan FS, Saffo MA (2020) FPGA hardware co-simulation of image encryption using stream cipher based on chaotic maps. Sens Imaging 21(1)","DOI":"10.1007\/s11220-020-00301-7"},{"key":"829_CR21","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-0-387-21830-4_8","volume-title":"The theory of chaotic attractors","author":"M H\u00e9non","year":"1976","unstructured":"H\u00e9non M (1976) A two-dimensional mapping with a strange attractor. The theory of chaotic attractors. Springer, New York, pp 94\u2013102"},{"key":"829_CR22","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403\u2013419","journal-title":"Inf Sci"},{"key":"829_CR23","doi-asserted-by":"crossref","unstructured":"Huang HL, Wu D, Fan D, Zhu X (2020) Superconducting quantum computing: a review. Sci China Inf Sci 63(8)","DOI":"10.1007\/s11432-020-2881-9"},{"issue":"11","key":"829_CR24","doi-asserted-by":"publisher","first-page":"13391","DOI":"10.1007\/s11042-017-4953-x","volume":"77","author":"O Jallouli","year":"2017","unstructured":"Jallouli O, Assad SE, Chetto M, Lozi R (2017) Design and analysis of two stream ciphers based on chaotic coupling and multiplexing techniques. Multimed Tools Appl 77(11):13391\u201313417","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"829_CR25","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1109\/TNSE.2021.3059881","volume":"8","author":"AR Javed","year":"2021","unstructured":"Javed AR, Ur Rehman S, Khan MU, Alazab M, Reddy T (2021) Canintelliids: detecting in-vehicle intrusion attacks on a controller area network using CNN and attention-based GRU. IEEE Trans Netw Sci Eng 8(2):1456\u20131466","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"3","key":"829_CR26","doi-asserted-by":"publisher","first-page":"035004","DOI":"10.1088\/2058-9565\/aabc6b","volume":"3","author":"EO Kiktenko","year":"2018","unstructured":"Kiktenko EO, Pozhar NO, Anufriev MN, Trushechkin AS, Yunusov RR, Kurochkin YV, Lvovsky AI, Fedorov AK (2018) Quantum-secured blockchain. Quantum Sci Technol 3(3):035004","journal-title":"Quantum Sci Technol"},{"issue":"6","key":"829_CR27","doi-asserted-by":"publisher","first-page":"2322","DOI":"10.1109\/TCSI.2018.2888688","volume":"66","author":"C Li","year":"2019","unstructured":"Li C, Feng B, Li S, Kurths J, Chen G (2019) Dynamic analysis of digital chaotic maps via state-mapping networks. IEEE Trans Circuits Syst I Regul Pap 66(6):2322\u20132335","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"key":"829_CR28","doi-asserted-by":"crossref","unstructured":"Li C, Lin D, Feng B, Lu J, Hao F (2018) Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6:75834\u201375842","DOI":"10.1109\/ACCESS.2018.2883690"},{"issue":"16","key":"829_CR29","doi-asserted-by":"publisher","first-page":"6937","DOI":"10.1007\/s00500-018-3332-5","volume":"23","author":"C Meshram","year":"2018","unstructured":"Meshram C, Lee CC, Meshram SG, Li CT (2018) An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput 23(16):6937-6946","journal-title":"Soft Comput"},{"issue":"1","key":"829_CR30","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MCC.2017.9","volume":"4","author":"MB Mollah","year":"2017","unstructured":"Mollah MB, Azad MAK, Vasilakos A (2017) Secure data sharing and searching at the edge of cloud-assisted internet of things. IEEE Cloud Comput 4(1):34\u201342","journal-title":"IEEE Cloud Comput"},{"key":"829_CR31","doi-asserted-by":"crossref","unstructured":"Nanda A, Puthal D, Mohanty SP, Choppali U (2018) A computing perspective of quantum cryptography [energy and security]. IEEE Consum Electron Mag 7(6):57\u201359","DOI":"10.1109\/MCE.2018.2851741"},{"issue":"35\u201336","key":"829_CR32","doi-asserted-by":"publisher","first-page":"25613","DOI":"10.1007\/s11042-020-09237-2","volume":"79","author":"Y Niu","year":"2020","unstructured":"Niu Y, Zhou Z, Zhang X (2020) An image encryption approach based on chaotic maps and genetic operations. Multimed Tools Appl 79(35\u201336):25613\u201325633","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"829_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17485\/ijst\/2017\/v10i7\/110897","volume":"10","author":"RF Olanrewaju","year":"2017","unstructured":"Olanrewaju RF, Islam T, Khalifa OO, Anwar F, Pampori BR, Cryptography as a service (CaaS) (2017) Quantum cryptography for secure cloud computing. Indian J Sci Technol 10(7):1\u20136","journal-title":"Indian J Sci Technol"},{"key":"829_CR34","doi-asserted-by":"publisher","first-page":"102470","DOI":"10.1016\/j.jisa.2020.102470","volume":"52","author":"KAK Patro","year":"2020","unstructured":"Patro KAK, Soni A, Netam PK, Acharya B (2020) Multiple grayscale image encryption using cross-coupled chaotic maps. J Inf Secur Appl 52:102470. https:\/\/doi.org\/10.1016\/j.jisa.2020.102470","journal-title":"J Inf Secur Appl"},{"key":"829_CR35","doi-asserted-by":"publisher","first-page":"153205","DOI":"10.1016\/j.aeue.2020.153205","volume":"121","author":"Z Qiao","year":"2020","unstructured":"Qiao Z, Assad SE, Taralova I (2020) Design of secure cryptosystem based on chaotic components and AES s-box. AEU-Int J Electron C 121:153205","journal-title":"AEU-Int J Electron C"},{"key":"829_CR36","doi-asserted-by":"crossref","unstructured":"Sajay K, Babu SS, Vijayalakshmi Y (2019) Enhancing the security of cloud data using hybrid encryption algorithm. J Ambient Intell Humaniz Comput 1\u201310","DOI":"10.1007\/s12652-019-01403-1"},{"key":"829_CR37","doi-asserted-by":"crossref","unstructured":"Seth B, Dalal S, Jaglan V, Le DN, Mohan S, Srivastava G (2020) Integrating encryption techniques for secure data storage in the cloud. Trans Emerg Telecommun Technol 33(4):e4108","DOI":"10.1002\/ett.4108"},{"key":"829_CR38","doi-asserted-by":"publisher","first-page":"77145","DOI":"10.1109\/ACCESS.2018.2874026","volume":"6","author":"K Shankar","year":"2018","unstructured":"Shankar K, Elhoseny M, Chelvi ED, Lakshmanaprabu SK, Wu W (2018) An efficient optimal key based chaos function for medical image security. IEEE Access 6:77145\u201377154","journal-title":"IEEE Access"},{"key":"829_CR39","doi-asserted-by":"crossref","unstructured":"Singh H, Sachdev A (2014) The quantum way of cloud computing. In: 2014 international conference on reliability optimization and information technology (ICROIT). IEEE, pp 397\u2013400","DOI":"10.1109\/ICROIT.2014.6798362"},{"issue":"4","key":"829_CR40","doi-asserted-by":"publisher","first-page":"3057","DOI":"10.1007\/s10586-020-03069-3","volume":"23","author":"E Subramanian","year":"2020","unstructured":"Subramanian E, Tamilselvan L (2020) Elliptic curve Diffie\u2013Hellman cryptosystem in big data cloud security. Clust Comput 23(4):3057\u20133067","journal-title":"Clust Comput"},{"issue":"5","key":"829_CR41","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1007\/s11128-012-0432-5","volume":"11","author":"SE Venegas-Andraca","year":"2012","unstructured":"Venegas-Andraca SE (2012) Quantum walks: a comprehensive review. Quantum Inf Process 11(5):1015\u20131106","journal-title":"Quantum Inf Process"},{"key":"829_CR42","doi-asserted-by":"crossref","unstructured":"Vengala DVK, Kavitha D, Kumar A (2021) Three factor authentication system with modified ECC based secured data transfer: untrusted cloud environment. Complex Intell Syst 1\u201314","DOI":"10.1007\/s40747-021-00305-0"},{"key":"829_CR43","doi-asserted-by":"crossref","unstructured":"Wang W, Xu H, Alazab M, Gadekallu TR, Han Z, Su C (2021) Blockchain-based reliable and efficient certificateless signature for IIoT devices. IEEE Trans Ind Inform","DOI":"10.1109\/TII.2021.3084753"},{"key":"829_CR44","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.ins.2019.02.049","volume":"486","author":"X Wang","year":"2019","unstructured":"Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340\u2013358","journal-title":"Inf Sci"},{"key":"829_CR45","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1016\/j.ins.2020.09.055","volume":"547","author":"Y Xian","year":"2021","unstructured":"Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci 547:1154\u20131169","journal-title":"Inf Sci"},{"key":"829_CR46","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.jnca.2017.11.012","volume":"103","author":"L Zhou","year":"2018","unstructured":"Zhou L, Wang Q, Sun X, Kulicki P, Castiglione A (2018) Quantum technique for access control in cloud computing II: encryption and key distribution. J Netw Comput Appl 103:178\u2013184","journal-title":"J Netw Comput Appl"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00829-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-022-00829-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00829-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,22]],"date-time":"2023-02-22T18:56:33Z","timestamp":1677092193000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-022-00829-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,27]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["829"],"URL":"https:\/\/doi.org\/10.1007\/s40747-022-00829-z","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,27]]},"assertion":[{"value":"27 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This research contains neither human or animal studies.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}}]}}