Open Access
ARTICLE
Secure Image Communication Using Galois Field, Hyper 3D Logistic Map, and B92 Quantum Protocol
1 Faculty of Computer Science, Universitas Dian Nuswantoro, Semarang, 50131, Central Java, Indonesia
2 Research Center for Quantum Computing and Materials Informatics, Faculty of Computer Science, Universitas Dian Nuswantoro, Semarang, 50131, Central Java, Indonesia
3 Faculty of Information Technology, Universitas Merdeka, Malang, 65146, East Java, Indonesia
4 Faculty of Economics and Business, Universitas STRADA Indonesia, Kediri, 64133, East Java, Indonesia
5 Faculty of Informatics and Computing, Universiti Sultan Zainal Abidin, Campus Besut, Besut, 22200, Terengganu, Malaysia
6 Department of Mechanical Engineering, Universitas Muhammadiyah Tasikmalaya, Tamansari Gobras, Tasikmalaya, 46196, Indonesia
* Corresponding Author: Nova Rijati. Email:
Computers, Materials & Continua 2024, 81(3), 4435-4463. https://doi.org/10.32604/cmc.2024.058478
Received 13 September 2024; Accepted 14 November 2024; Issue published 19 December 2024
Abstract
In this paper, we propose a novel secure image communication system that integrates quantum key distribution and hyperchaotic encryption techniques to ensure enhanced security for both key distribution and plaintext encryption. Specifically, we leverage the B92 Quantum Key Distribution (QKD) protocol to secure the distribution of encryption keys, which are further processed through Galois Field (GF(28)) operations for increased security. The encrypted plaintext is secured using a newly developed Hyper 3D Logistic Map (H3LM), a chaotic system that generates complex and unpredictable sequences, thereby ensuring strong confusion and diffusion in the encryption process. This hybrid approach offers a robust defense against quantum and classical cryptographic attacks, combining the advantages of quantum-level key distribution with the unpredictability of hyperchaos-based encryption. The proposed method demonstrates high sensitivity to key changes and resilience to noise, compression, and cropping attacks, ensuring both secure key transmission and robust image encryption.Keywords
Cite This Article

This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.