Abstract
The privacy of digital contents plays an important role in digitally advanced era. The transmission of digital information over public networks have extraordinary impact and gradually imperative due to theft and manipulation in contents. In this article, we have suggested a new encryption scheme based on Kramer’s arbitrary spinning in order to provide the confidentiality to digital contents. We have implemented our offered scheme on standard digital images and performed the security performance analyses to authentic the robustness against cryptographic attacks.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
There are numerous environments in everyday existence, when the secret contents conveyed over apprehensive line of communication. Most of the outmoded cryptosystems are utilized in literature to accomplish the security of confidential information [1]. Digital contents are transferred over communication medium, such as documents, advertisements and law enforcement constituents very extensively and security of information is vibrant issue. Due to thoughtful events of hackers, these contents can easily end up in the hands of unauthorized individuals. They can excerpt or alter the data without knowledge of appropriate receiver [2]. The research is going over the years in information theory and cryptology to offer the protection for digital contents. The vibrant issue in line of communication to shelter the privacy of appropriate users [3,4,5,6,7,8,9,10,11,12,13,14,15,16,17].
Modern ages of cryptography point out around 1950’s, when Claude Shannon produced an article ‘A mathematical theory of cryptography’ published in the Bell System Technical Journal in 1949 [18]. He was inspired during the World War II, when electromechanical cipher machines used very widely. He then identified the two main goals of cryptography: Confidentiality and Authenticity and wrote an article “A mathematical theory of communication” which highlights one of the most significant aspects of cryptography’s importance [19].
Different algorithms proposed in different times and DES of 56-bit long key approved and adopted by US agencies and considered to be secure, but improvements in technology have made it trivial to defeat. Although DES replaced by AES, but the fact is if powerful computers may crack DES in few hours, the area of risk in public key cryptography vulnerable to the future developments. This uncertainty provides potential threat to perfect security required at national and intellectual property level.
Various schemes produced in different ages to secure the communication in public channels. In this article, we developed a novel structure based on ‘Kramer’s arbitrary spin’ to provide security for digital contents.
In the light of quantum mechanics, Kramer’s theorem states that the time reversal symmetric system with half integer total spin for every energy eigenstate, there is at least one more eigenstate with the same energy. In simple words, each energy level is at least degenerate double if it has half integer spin. If we operate Hamiltonian operator with time reversal, then the time reversed state also act as an eigenstate with the same energy for every energy eigenstate and this state might be identical to the original state. In half integer spin systems, it reverses all angular momenta and cannot produce the same state as the magnetic quantum number can never be zero. The energy levels for a system with odd numbers of fermions, such as electrons, protons and neutrons, at least degenerate double in the presence purely electric field [20].
This article is organized in 5 sections. The preliminaries of this article including derivations presented in section 2. The proposed cryptosystem and its implementation on standard images followed in section 3. Experimentation and performance analyses for the proposed scheme conveyed in section 4 and section 5 comprises the concluding remarks.
2 Basic Terminologies
This section demonstrates the fundamental concepts of orthogonal codes, Redheffer codes and the derivations of Kramer’s arbitrary spin matrices.
2.1 Orthogonal Codes
Orthogonal codes introduced by Jacques Hadamard in 1893 and has a remarkable attention in coding theory. Code word set Hkcan be constructed in dimension of 2k × 2kand can also be entitled as Hadamard matrix. k-bit data set from Hk − 1 matrix as follows [21]:
One-bit data set can be encoded by using orthogonal code words of 2 digits each, described by the rows of matrix and the 2-bit data set can be transformed by extending the one-bit set both horizontally and vertically given as follows [21]:
2.2 Bi-Orthogonal Codes
Bi-Orthogonal set of total code words ‘M’ can be obtained from orthogonal set of code words M/2 by supplementing it with negative of each as follows [21]:
2.3 Redheffer Matrices
A Redheffer matrix is n × n square (0,1) matrix with elements ai j = 1, if j = 1 or i ∣ j (i divides j) and 0 otherwise. For n = 1, 2, ..., k, the first few matrices are:
Determinant of n × nmatrix equal to Mertens function M(n) [22]. For n = 1, 2, 3, …, first few values for the function are 1, 0, −1, −1, −2, −1, −2, −2, …. Eigenvalues of n × nRedheffer matrix for n > 1 equals to a(n) = n − ⌊lgn⌋ − 1 [23].
2.4 Kramer’s Spin Matrices
Kramer’s method gives high degree of naturalness. Let us introduce 2 spinor components u and v, i.e. \( \xi =\left(\begin{array}{c}u\\ {}v\end{array}\right)\kern0.37em \mathrm{is}\ \mathrm{a}\ \mathrm{complex}\ \mathrm{vector}\ \mathrm{by}\ \mathrm{nature} \) [24]. The spinor components in Euclidean space represented as:
where U∗U + V∗V = u∗u + v∗v, \( u=\sqrt{a_1-i{a}_2} \), \( v=i\sqrt{a_1+i{a}_2} \)and α = cos θ + i k3 sin θ, β = (k2 + i k1) sin θ assign as rotational interpretations in Euclidean space. These are so called Cayley-Klein parameters [25].
By applying Kramer’s method on Eq. (3), the result as follows:
Since in this case, \( {\alpha}_1^2+{\alpha}_2^2+{\alpha}_3^2=0, \) which implies
From the results of u, v and Eq. (5), we have
2.4.1 Spin S (1)
By using Eq. (4) to develop S (1) as follows:
Extract the matrices σ from Eq. (6) with respect to the results of α1, α2 and α3. The matrices are given as:
These 3 × 3 matrices σi, j are manifestly traceless hermitian. They are, unlike the Pauli’s matrices, not closed under multiplication, but closed under commutation [24]. The case is unitary and unimodular, St(1) S(1) = I and det S(1) = 1.In Pauli’s ½ spin case, \( {\sigma}_x^2+{\sigma}_y^2+{\sigma}_z^2=3\;I, \) while in the above case of Kramer spin \( {\sigma}_x^2+{\sigma}_y^2+{\sigma}_z^2=8\;I \). From the above results, we can calculate (2 l + 1) dimension traceless hermitian tuples.
2.4.2 Spin S (3/2)
By applying Kramer’s method for S (3/2) on Eq. (3), the result as follows:
The case is unitary and unimodular, St(3/2) S(3/2) = I and det (S(3/2)) = 1.By using values of α and β, we can transform the matrix S (3/2) as follows [26]:
Extract σx, σy and σz from Eq. (7) as follows:
where \( {\sigma}_x^2+{\sigma}_y^2+{\sigma}_z^2=15\;I. \).
2.4.3 Spin S (2)
By applying Kramer’s method on Eq. (3), S (2) is given as:
Extract σx, σy and σz from Eq. (8) as follows:\( {\sigma}_x=\frac{1}{2}\left(\begin{array}{ccccc}0& +2& 0& 0& 0\\ {}2& 0& +\sqrt{6}& 0& 0\\ {}0& \sqrt{6}& 0& +\sqrt{6}& 0\\ {}0& 0& \sqrt{6}& 0& +2\\ {}0& 0& 0& -2& 0\end{array}\right),\kern0.5em {\sigma}_y=i\frac{1}{2}\left(\begin{array}{ccccc}0& -2& 0& 0& 0\\ {}2& 0& -\sqrt{6}& 0& 0\\ {}0& \sqrt{6}& 0& -\sqrt{6}& 0\\ {}0& 0& \sqrt{6}& 0& -2\\ {}0& 0& 0& -2& 0\end{array}\right),\kern0.5em {\sigma}_z=\left(\begin{array}{ccccc}2& 0& 0& 0& 0\\ {}0& 1& 0& 0& 0\\ {}0& 0& 0& 0& 0\\ {}0& 0& 0& -1& 0\\ {}0& 0& 0& 0& -2\end{array}\right), \)where \( {\sigma}_x^2+{\sigma}_y^2+{\sigma}_z^2=6\;I \).
2.4.4 Spin S (5/2)
By applying Kramer’s method on Eq. (3) and extraction of σx, σy and σz from S (5/2) as follows:
where \( {\sigma}_x^2+{\sigma}_y^2+{\sigma}_z^2=\frac{35}{4}I. \).
3 Proposed Algorithm
We develop arbitrary spin matrices by using Kramer’s transformation. In this section, we transformed these matrices to encrypt the data as well as key with the help of Hadamard and Redheffer matrices. Orthogonal or biorthogonal and Redheffer codes use to encrypt the key with respect to key length. Hadamard codes are singular, convert it into nonsingular by taking compliment before encryption. Redheffer matrix of order 2 × 2 and spin (1, 2, 3, ..., n, where n ∈ ℕ)matrices cannot be used because of following the singular property, while spin (1/2, 3/2, 5/2, ..., n/2), where n is odd number are nonsingular matrices and can be used to encrypt the data.
3.1 Spin S (1/2)
3.2 Spin S (3/2)
3.3 Spin S (5/2)
Let entangle these n × n matrices to form a set ‘A’ of 2n × 2n matrices [1].
3.4 Experimentation of Proposed Scheme
We have performed experimentation with key [00110 10,100] on standard images of size 512 × 512. The entangled matrices with respect to key are A6 and A14 and performed experiment on spin systems S (3/2) and S (5/2) respectively.
4 Performance Analyses for Anticipated Structure
Different standard performance analyses accomplished in this section on standard digital contents to assert the performance and security of anticipated algorithm (see Figs. 1, 2 and 3). These outcomes contain the factual investigation, sensibility examination and loophole test for encrypted data. Different analyses discussed in subsection of 4 in detail to examine the sensitivity of offered encryption mechanism.
4.1 Randomness Analyses
With a specific end goal to justify the prerequisites of long period, uniform scattering, high complexity and efficiency for proposed cryptosystem, we execute NIST SP 800–22 analysis to testify the randomness of digital contents [27]. The enciphered Lena image at S (5/2) is employed to accomplish the NIST tests and the aftereffects results presented in Tables 1, 2 and 3.
By analyzing the outcomes, the anticipated encryption scheme effectively passes all the NIST tests. The production of random ciphers using projected scheme are irregular in the light of accomplished outcomes.
4.2 Uniformity Analyses
Histograms uniformity of enciphered images estimates the security of encryption framework [28]. We have computed the histograms of 256 dark level original and encrypted images of size 512 × 512, that have different contents. The plain image histograms contain sharp upsurges took after sharp decline, while both enciphered images contain uniformity shown in Figs. 4, 5, 6, 7, 8 and 9, which makes statistical attacks tough.
4.3 Pixels’ Correlation Analyses
The neighboring pixels of an image are tremendously associated in horizontal, vertical and diagonal directions. The encrypted data must unrestraint this affiliation to improve the barrier contrary to quantifiable analysis. To testify the association among nearby pixels in plain and enciphered images, 10,000 sets of two nearby pixels from each digital content initially selected [29]. It is demonstrated by the following expression:
where x and y are values of two nearby pixels at gray scale, while σx2 and \( {\sigma}_y^2 \) represents the variances and σx, y is the covariance of random variables x and y.
The coefficients of correlation for plain and encrypted images having dissimilar contents conveyed in Table 4. The association among various couples of original and encrypted images evaluated by calculating the two dimensional correlation coefficients among the original encrypted images [30]. The succeeding calculation is employed to compute the correlation coefficients. The mathematical expression for correlation coefficient is given below:
where P and C signifies the plain and cipher images, \( \overline{P} \) and \( \overline{C} \)represents the mean values of P and C, M and N demonstrates the height and width of original / cipher images.
The plain and cipher contents are significantly dissimilar from each other as the coefficients of cipher images are very close to zero. The valuation for coefficients of correlation for anticipated design with recent approaches using standard images specified in Tables 5 and 6.
The outcomes of our proposed structure have inferior values coefficients, which meet the necessities for competent technique in real time application for enciphering.
4.4 Pixels’ Resemblance Analyses
The resemblance measures primarily reveal the similarity among diverse digital contents. The normalized cross correlation (NCC) and structural contents (SC) values are quite closed to 1 for digital contents structure similarity [29]. There are different types of resemblance coefficient are consumed in order to quantitatively find the structure dissimilarity in digital contents. We have analyzed the structural similarity index, normalized cross correlation and structural content between plain (Pi, j ) and cipher (Ci, j) images in order to estimate the structure dissimilarity among different digital contents from reference. Structural similarity index metric (SSIM) used to compare the assembly, luminance and divergence between original and enciphered images.
where μp and μc are the mean values,σpc is the standard deviation of Pi, j and Ci, j. The approximation of Eq. 11 approaches 1, if there is any resemblance between plain and cipher images. NCC measures the resemblance and traces of correlation between plain and enciphered images. We perform this test at the original and the encrypted images to analyze the similarity between them.
SC determines the structural details and quality of an image in terms of sharpness and noise level. The quality of an image assessed by the following equation and if the value of SC is higher, the quality of an image is poor.
4.5 Pixels’ Discrepancy Analyses
The eminence assessment of an image based on pixels’ discrepancy process analyzed here by evaluating the mean absolute error (MAE), mean square error (MSE) and peak signal to noise ratio (PSNR) [29]. MAE is the most communal method used to measure the accuracy for continues variables. The average absolute difference between original and encrypted images calculated by MAE and its esteem must be greater to enhance the encryption security and defined as:
Essentially encrypted digital contents have dissimilarity concerning the plain image. Both MSE and PSNR used to relate the image encryption quality, while MSE signifies the cumulative square error measure and PSNR indicates the peak error measurement between the original and ciphered image. By higher the MSE esteem and lower the PSNR values or vice versa signifies the better encryption quality.
where Pij and Cij refers the pixels position at ith row and jth column of plain and ciphered images distinctly. Superior the MSE esteem represents the enhancement of encryption strategy [30]. PSNR ratio determines the quality measure between plain and enciphered image described by the succeeding expression:
where IMAX is the utmost pixel’s estimation of image. On comparing with immense difference between the plain and ciphered images, PSNR should be low esteem. The feasibility of proposed approach assessed for MSE and PSNR for standard digital images presented in Table 7.
4.6 Entropy Analyses
The leading feature for specifying the randomness quantified by Entropy. Specified an independent source of random trials from set of probable distinct trials {x1, x2, x3, ..., xn} with allied possibilities, the average output of source evidence called entropy [33]. Entropy of an image can be calculated as:
where xi is the source image and 2N is the aggregate of data. For perfectly indiscrimination in digital contents, the ideal Shannon entropy is 8. The entropies of different standard plain images and their encrypted contents accounted in Table 8.
The entropy esteems of encrypted images are very close to ideal Shannon esteem, which implies the leakage of data in proposed encryption algorithm is inappropriate and the mechanism is secure upon entropy attacks [34]. The information entropies of suggested scheme for encrypted images have superior results, when compared with existing approaches. Table 9 demonstrate the comparison of proposed technique with existing approaches for standard images.
4.7 Gray Level Co-Occurrence Matrix (GLCM) Analyses
The visual strength of anticipated scheme analyzed here by homogeneity, contrast and energy assessments [35]. The image assessed by homogeneity defined as:
where i, j indicates the row and column position of image’s pixel. This analysis performs the closeness of distribution in GLCM to GLCM diagonally. Its range lies in between 0 and 1. The identification of an object in texture of image observed by contrast analysis and it is defined as:
The contrast test range lies in between 0 and (size (image) − 1)2. Greater the contrast value illustrates the large number of variations in the pixels of an image while constant image has 0 contrast value. The energy analysis of an image returns the sum of squared elements in GLCM and defined as:
The constant image has 1 energy, while range of energy lies in-between 0 and 1. GLCM analyses for plain and enciphered images for S (3/2) and S (5/2) demonstrated in Table 10.
4.8 Linear Attacks Analyses
To perform linear attacks, cryptanalyst has to identify the linear relation between some bits of plain image, cipher image and key. By considering this relation, cryptanalyst can easily understand the structure used in encryption and decryption [36]. The analyst decrypts each cipher using all possible keys to predict the sequence similarity in ciphers, but in our case, the analyst has no idea what spin system used for encryption. Either the message pass by one or multiple spin systems and each spin system has 24! states, and in each state there are infinite positions for encryption. All the spin matrices create confusion and also have infinite possibilities to create the keys. The analyst can focus on statistical analyses against multiple rounds of decryption but each time the results produced with proposed structure has no relation with any previous outcome.
4.9 Differential Attacks Analyses
To testify the robustness against differential attacks for anticipated scheme, an adjustment of one pixel in plain image modifies the encrypted image for comparing, with a probability of half pixel altering. For a change in ith chunk of permuted digital image affects the ith chunk of ciphered image directly. We certify that our structure has suitable affectability to plain images to affirm the impact of altering a single pixel in a plain image and the whole enciphered image. For a specific objective to measure the impact of minor alteration in plain image on its encrypted one, the number of pixels changing rate (NPCR) bound together to originate the unified average change intensity (UACI) [37, 38]. The NPCR and UACI can be assessed by utilizing the succeeding expressions for two encoded images C1(i, j) and C2(i, j), in which one have source image just varied by one pixel. The expression for NPCR and UACI are given below:
where
To evaluate the sensitivity of plain image, encrypt the plain image and randomly choose and altered one pixel in plain image. Tables 11, 12 and 13 provides the experimental outcomes for encrypted results of NPCR and UACI and their comparison with existing latest approaches.
Table 11 validates the NPCR esteems are correspondent to the perfect estimation of 1, while Table 12 correspond the UACI esteems which have better results than existing approaches. These outcomes show that projected technique has great degree sensitive to minor change in plane image, irrespective of whether the two ciphered images have one-bit alteration [30]. The anticipated structure has superior ability to hostile the differential assaults in investigation with alternative approaches.
4.10 Noise Attacks Analyses
It is possible that encrypted data affected by noises during transmission. The robustness of the proposed structure against Gaussian noise considered here. The normalized intensities of noise are set as 0.000001, 0.000003, 0.000005 and 0.000007 respectively.
As the intensity of noise change from 0.000001 to 0.000007, the PSNR value has very minute change or we can say its approximately same to the original, which depicts the proposed design has good robustness against noise attacks.
5 Conclusion
The proposed scheme is appropriate for real time applications due to small processing time and superior capacity to hostile the attacks and appropriate performance than other encryption systems. The Kramer’s spin system not only valid for RGB contents but it can be applied at variety of digital contents like audio, video, medical images and satellite images. In future, we would like to use quantum iterative maps instead of Redheffer and orthogonal codes to enhance security level.
References
Waseem, H.M., Khan, M.: Information confidentiality using quantum spinning, rotation and finite state machine. Int. J. Theor. Phys. 57(11), 3584–3594 (2018)
Premaratne, P., Premaratne, M.: Key-based scrambling for secure image communication. In: International Conference on Intelligent Computing, pp. 259–263. Springer, Berlin, Heidelberg (2012)
Unnikrishnan, G., Joseph, J., Singh, K.: Optical encryption by double-random phase encoding in the fractional Fourier domain. Opt. Lett. 25(12), 887–889 (2000)
Zhu, B., Liu, S., Ran, Q.: Optical image encryption based on multifractional Fourier transforms. Opt. Lett. 25(16), 1159–1161 (2000)
Peng, X., Yu, L., Cai, L.: Double-lock for image encryption with virtual optical wavelength. Opt. Express. 10(1), 41–45 (2002)
Nishchal, N.K., Joseph, J., Singh, K.: Securing information using fractional Fourier transform in digital holography. Opt. Commun. 235(4–6), 253–259 (2004)
Situ, G., Zhang, J.: A lensless optical security system based on computer-generated phase only masks. Opt. Commun. 232(1–6), 115–122 (2004)
Chen, L., Zhao, D.: Optical image encryption based on fractional wavelet transform. Opt. Commun. 254(4–6), 361–367 (2005)
Meng, X.F., Cai, L.Z., He, M.Z., Dong, G.Y., Shen, X.X.: Cross-talk-free double-image encryption and watermarking with amplitude–phase separate modulations. J. Opt. A Pure Appl. Opt. 7(11), 624–631 (2005)
La Mela, C., Iemmi, C.: Optical encryption using phase-shifting interferometry in a joint transform correlator. Opt. Lett. 31(17), 2562–2564 (2006)
Hwang, H.E., Han, P.: Fast algorithm of phase masks for image encryption in the Fresnel domain. JOSA A. 23(8), 1870–1874 (2006)
Tao, R., Xin, Y., Wang, Y.: Double image encryption based on random phase encoding in the fractional Fourier domain. Opt. Express. 15(24), 16067–16079 (2007)
Liu, Z., Liu, S.: Double image encryption based on iterative fractional Fourier transform. Opt. Commun. 275(2), 324–329 (2007)
Ge, F., Chen, L., Zhao, D.: A half-blind color image hiding and encryption method in fractional Fourier domains. Opt. Commun. 281(17), 4254–4260 (2008)
Liu, Z., Li, Q., Dai, J., Sun, X., Liu, S., Ahmad, M.A.: A new kind of double image encryption by using a cutting spectrum in the 1-D fractional Fourier transform domains. Opt. Commun. 282(8), 1536–1540 (2009)
Wang, B., Zhang, Y.: Double images hiding based on optical interference. Opt. Commun. 282(17), 3439–3443 (2009)
Meng, X.F., Cai, L.Z., Wang, Y.R., Yang, X.L., Xu, X.F., Dong, G.Y., Shen, X.X.: Digital image synthesis and multiple-image encryption based on parameter multiplexing and phase-shifting interferometry. Opt. Lasers Eng. 47(1), 96–102 (2009)
Shannon, C.E.: Communication theory of secrecy systems. Bell system technical journal. 28(4), 656–715 (1949)
Shannon, C.E.: A mathematical theory of communication. Bell system technical journal. 27(3), 379–423 (1948)
Kramers, H.A., 1930. HA Kramers Proc. roy. Acad. Amsterdam, 32 (1929). In Proc. roy. Acad. Amsterdam (Vol. 33, p. 959)
Sklar, B., 2001. Digital Communications: Fundamentals and Applications
Barrett, W.W., Jarvis, T.J.: Spectral properties of a matrix of Redheffer. Linear Algebra Appl. 162–164 (1992)
Will Dana. Eigenvalues of the Redheffer Matrix and their Relation to the Mertens Function, 2015
Wheeler, N., 2000. Spin matrices for arbitrary spin. Reed College Physics Department, Portland
Dresden, M.H.A.: Kramer’s: between Tradition and Revolution. springer (1987) ISBN 978-1-4612-4622-0
Umezawa, H., 1956. Quantum Field Theory
Younas, I., Khan, M.: A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy. 20(12), 913 (2018)
Khan, M., Asghar, Z.: A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S 8 permutation. Neural Comput. & Applic. 29(4), 993–999 (2018)
Waseem, H.M., Khan, M.: A new approach to digital content privacy using quantum spin and finite-state machine. Applied Physics B. 125(2), 27 (2019)
Khan, M., Waseem, H.M.: A novel image encryption scheme based on quantum dynamical spinning and rotations. PLoS One. 13(11), e0206460 (2018)
Stoyanov, B., Kordov, K.: Image encryption using Chebyshev map and rotation equation. Entropy. 17(4), 2117–2139 (2015)
Khan, M., Shah, T.: An efficient chaotic image encryption scheme. Neural Comput. & Applic. 26, 1137–1148 (2015)
Waseem, H.M., Khan, M., Shah, T.: Image privacy scheme using quantum spinning and rotation. Journal of Electronic Imaging. 27(6), 063022 (2018)
Munir, N. and Khan, M., 2018. A Generalization of Algebraic Expression for Nonlinear Component of Symmetric Key Algorithms of Any Characteristic p. In 2018 International Conference on Applied and Engineering Mathematics (ICAEM) (pp. 48–52). IEEE
Hussain, I., Anees, A., Aslam, M., Ahmed, R., Siddiqui, N.: A noise resistant symmetric key cryptosystem based on S 8 S-boxes and chaotic maps. The European Physical Journal Plus. 133, 1–23 (2018)
Blondeau, C., Leander, G., Nyberg, K.: Differential-linear cryptanalysis revisited. J. Cryptol. 30(3), 859–888 (2017)
Khan, M., Shah, T.: A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dynamics. 76(1), 377–382 (2014)
Khan, M., Shah, T., Batool, S.I.: A new implementation of chaotic S-boxes in CAPTCHA. SIViP. 10(2), 293–300 (2016)
Acknowledgments
Both authors Hafiz Muhammad Waseem and Dr. Majid Khan are highly grateful to Vice Chancellor Dr. Syed Wilayat Husain, Dean Iqbal Rasool Memon, and Director cyber and information security Lab Prof. Dr. Muhammad Amin, Institute of Space Technology, Islamabad Pakistan, for providing decent atmosphere for research and development.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
Both authors have no conflict concerning the publication of this article.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Khan, M., Waseem, H.M. A Novel Digital Contents Privacy Scheme Based on Kramer’s Arbitrary Spin. Int J Theor Phys 58, 2720–2743 (2019). https://doi.org/10.1007/s10773-019-04162-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-019-04162-z