Quantum Information Processing, Journal Year: 2024, Volume and Issue: 23(10)
Published: Oct. 7, 2024
Language: Английский
Quantum Information Processing, Journal Year: 2024, Volume and Issue: 23(10)
Published: Oct. 7, 2024
Language: Английский
Future Internet, Journal Year: 2023, Volume and Issue: 15(3), P. 94 - 94
Published: Feb. 27, 2023
In recent years, the interdisciplinary field of quantum computing has rapidly developed and garnered substantial interest from both academia industry due to its ability process information in fundamentally different ways, leading hitherto unattainable computational capabilities. However, despite potential, full extent computing’s impact on healthcare remains largely unexplored. This survey paper presents first systematic analysis various capabilities enhancing systems, with a focus potential revolutionize compute-intensive tasks such as drug discovery, personalized medicine, DNA sequencing, medical imaging, operational optimization. Through comprehensive existing literature, we have taxonomies across dimensions, including background enabling technologies, applications, requirements, architectures, security, open issues, future research directions, providing panoramic view paradigm for healthcare. Our aims aid new experienced researchers by helping them understand current landscape, identifying opportunities challenges, making informed decisions when designing architectures applications
Language: Английский
Citations
101Fractal and Fractional, Journal Year: 2023, Volume and Issue: 7(12), P. 887 - 887
Published: Dec. 16, 2023
Chaos-based image encryption has become a prominent area of research in recent years. In comparison to ordinary chaotic systems, fractional-order systems tend have greater number control parameters and more complex dynamical characteristics. Thus, an increasing researchers are introducing enhance the security chaos-based encryption. However, their suggested algorithms still suffer from some security, practicality, efficiency problems. To address these problems, we first constructed new 3D Lorenz system 2D sinusoidally constrained polynomial hyper-chaotic map (2D-SCPM). Then, elaborately developed multi-image algorithm based on 2D-SCPM (MIEA-FCSM). The introduction with fourth parameter not only enables MIEA-FCSM significantly large key space but also enhances its overall security. Compared alternatives, structure is simpler conducive application implementation. our proposed MIEA-FCSM, multi-channel fusion initially reduces pixels one-sixth original. Next, after two rounds plaintext-related random substitution, dynamic diffusion, fast scrambling, fused pixel matrix eventually encrypted into ciphertext one. According numerous experiments analyses, obtained excellent scores for (2541), correlation coefficients (<0.004), information entropy (7.9994), NPCR (99.6098%), UACI (33.4659%). Significantly, attained average rate as high 168.5608 Mbps. Due superiority system, 2D-SCPM, targeted designs, outperforms many recently reported leading algorithms.
Language: Английский
Citations
74Chaos Solitons & Fractals, Journal Year: 2023, Volume and Issue: 178, P. 114361 - 114361
Published: Dec. 5, 2023
Language: Английский
Citations
56IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 27530 - 27555
Published: Jan. 1, 2024
In the contemporary landscape, where a huge amount of data plays vital role, importance strong and robust cybersecurity measures has become increasingly paramount. This research proposes review extensively explores techniques within domain machine/deep learning quantum techniques, with particular focus on cryptographic methods methodologies applied to image encryption. The proposed survey covers range including random number generation, secure transmission images, watermarking through methods, steganography. Moreover, it encryption, which integrates adversarial neural networks, deep machine learning, transformation chaotic networks that can be used digital from cyber attacks. Our extends beyond highlighting advances in investigating vulnerabilities existing techniques. By identifying challenges weaknesses, potential solutions are also presented, establishing foundation for future recommendations. These suggestions address overcome observed aim extensive analysis is provide understanding innovative diverse approaches domain. Simultaneously, aims create roadmap counter threats challenges.
Language: Английский
Citations
18The Visual Computer, Journal Year: 2022, Volume and Issue: 39(5), P. 1975 - 2003
Published: April 7, 2022
Language: Английский
Citations
52SN Computer Science, Journal Year: 2024, Volume and Issue: 5(2)
Published: Jan. 27, 2024
Language: Английский
Citations
5Optik, Journal Year: 2021, Volume and Issue: 251, P. 168409 - 168409
Published: Nov. 28, 2021
Language: Английский
Citations
32Expert Systems with Applications, Journal Year: 2025, Volume and Issue: 270, P. 126521 - 126521
Published: Jan. 16, 2025
Language: Английский
Citations
0Elsevier eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 43 - 62
Published: Jan. 1, 2025
Language: Английский
Citations
0Alexandria Engineering Journal, Journal Year: 2025, Volume and Issue: 121, P. 167 - 182
Published: Feb. 27, 2025
Language: Английский
Citations
0