A secure controlled quantum image steganography algorithm

Abstract

A novel controlled flexible representation for quantum image(CFRQI) is firstly proposed in this paper based on flexible representation for quantum image (FRQI). The proposed CFRQI is able to effectively help the sender control the whole process of information transmission for better information security. Next, a novel secure controlled quantum image steganography algorithm is proposed by making full use of controlled access mechanism that comes with CFRQI. Compared with the previous quantum steganography algorithms, the new algorithm can make the sender control whether the receiver is enabled to correctly receive secret information or not for better imperceptibility. And it also can achieve better security by introducing the controlled access mechanism as an identity authentication system without the need of auxiliary information. Good applicability of the new algorithm is proved by the quantum circuits of embedding and extracting processes that are designed to implement. Furthermore, the new algorithm can effectively resist the phase-damping and amplitude-damping noises in quantum channel through theoretical analysis. Finally, the simulation experiment results are presented to prove our conclusions.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

References

  1. 1.

    Chen, X.Y., Chen, S., Wu, Y.L.: Coverless information hiding method based on the Chinese character encoding. J. Inter. Technol. 18(2), 313–320 (2017)

    Google Scholar 

  2. 2.

    Xia, Z.H., Wang, X.H., Sun, X.M., Wang, B.W.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014)

    Article  Google Scholar 

  3. 3.

    Zhou, Z.L., Yang, C.N., Chen, B.J., Sun, X.M., Liu, Q., Jonathan Wu, Q.M.: Effective and efficient image copy detection with resistance to arbitrary rotation. IEICE Trans. Inform. Syst. E99–D(6), 1531–1540 (2016)

    ADS  Article  Google Scholar 

  4. 4.

    Xia, Z.H., Wang, X.H., Zhang, L.G., Qin, Z., Sun, X.M., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(11), 2594–2608 (2016)

    Article  Google Scholar 

  5. 5.

    Venegas-Andraca, S.E., Bose, S.: Storing, processing and retrieving an image using quantum mechanics. In: Proceeding of the SPIE, Quantum Inf. and Comput. 5105(8), 1085-1090 (2003)

  6. 6.

    Le, P.Q., Dong, F., Hirota, K.: A flexible representation of quantum images for polynomial preparation, image compression and processing operations. Quant. Inf. Process. 10(1), 63–84 (2010)

    MathSciNet  MATH  Article  Google Scholar 

  7. 7.

    Latorre, J.I.: Image compression and entanglement (Book). Computer Science (2005)

  8. 8.

    Yan, F., Iliyasu, A., Jiang, Z.G.: Quantum Computation-Based Image Representation. Processing Operations and Their Applications. Entropy 16(10), 5290–5338 (2014)

    ADS  MathSciNet  Article  Google Scholar 

  9. 9.

    Yan, F., Iliyasu, A., Le, P.Q.: Quantum image processing: a review of advances in its security technologies. Int. J. Quant. Inform. 15(3), 1730001 (2017)

    MathSciNet  MATH  Article  Google Scholar 

  10. 10.

    Yan, F., Iliyasu, A., Dong, F., Venegas-Andrace, S.E.: A survey of quantum image representations. Quant. Inf. Process. 15(1), 1–35 (2016)

    ADS  MathSciNet  MATH  Article  Google Scholar 

  11. 11.

    Mario, M.: Quantum image processing. Quant. Inf. Process. 16(1), 27 (2017)

    ADS  MATH  Article  Google Scholar 

  12. 12.

    Sun, B., Iliyasu, A., Garcia, J., Dong, F., Al-Asmari, A., Hirota, K.: Multi-channel information operations on quantum images. Adv. Comput. Intell. Intell. Inf. 18(2), 140–149 (2014)

    Article  Google Scholar 

  13. 13.

    Iliyasu, A., Le, P., Dong, F., Hirota, K.: Watermarking and authentication of quantum images based on restricted geometric transformations. Inf. Sci. 186(1), 126–149 (2012)

    MathSciNet  MATH  Article  Google Scholar 

  14. 14.

    Zhang, W., Gao, F., Liu, B., Jia, H.: A quantum watermark protocol. Int. J. Theor. Phys. 52(2), 504–513 (2013)

    MathSciNet  MATH  Article  Google Scholar 

  15. 15.

    Jiang, N., Wang, L.: A novel strategy for quantum image steganography based on Moire patten. Int. J. Theor. Phys. 54(3), 1021–1032 (2015)

    MATH  Article  Google Scholar 

  16. 16.

    Wang, S., Sang, J.Z., Song, X.: LSQb information hiding algorithm for quantum image. Measurement 73, 352–359 (2015)

    Article  Google Scholar 

  17. 17.

    Jiang, N., Zhao, N., Wang, L.: LSB based quantum image steganography algorithm. Int. J. Theor. Phys. 55(1), 107–123 (2016)

    MATH  Article  Google Scholar 

  18. 18.

    Lau, L., Carlos, O., Dong, S.H., Cruz-Irisson, M.: Steganography on quantum pixel images using Shannon entropy. Int. J. Quantum Inform. 14(05), 1650021 (2016)

    ADS  MathSciNet  MATH  Article  Google Scholar 

  19. 19.

    Sun, B., Iliyasu, A., Yan, F., Dong, F., Hirota, K.: An RGB Multi-Channel Representation for Images on Quantum Computers. Adv. Comput. Intell. Intell. Inf. 17(3), 404–417 (2013)

    Article  Google Scholar 

  20. 20.

    Zhang, Y., Lu, K., Gao, Y., Xu, K.: A novel quantum representation for log-polar images. Quant. Inf. Process. 12(9), 3103–3126 (2013)

    ADS  MathSciNet  MATH  Article  Google Scholar 

  21. 21.

    Zhou, N., Hu, Y., Gong, L.: Quantum image encryption scheme with iterative generalized Arnold transforms and quantum image cycle shift operations. Quant. Inf. Process. 16(6), 5290–5338 (2017)

    MathSciNet  MATH  Google Scholar 

  22. 22.

    Wang, H., Wang, J., Geng, Y.C., Song, Y., Liu, J.Q.: Quantum image encryption based on iterative framework of frequency-spatial domain transforms. Int. J. Theor. Phys. 8, 1–21 (2017)

    MathSciNet  MATH  Google Scholar 

  23. 23.

    Chen, S.Y., Qu, Z.G.: Novel quantum video steganography and authentication protocol with large payload. Int. J. Theor. Phys. 57, 3689–3701 (2018)

    MATH  Article  Google Scholar 

  24. 24.

    Qu, Z.G., Chen, S.Y., Ji, S.: A Novel Quantum Video Steganography Protocol with Large Payload Based on MCQI Quantum Video. Int. J. Theor. Phys. 52, 2 (2017)

    MATH  Google Scholar 

  25. 25.

    Miyake, S., Nakamael, K.: A quantum watermarking scheme using simple and small-scale quantum circuits. Quant. Inf. Process. 15, 1849–1864 (2016)

    ADS  MathSciNet  MATH  Article  Google Scholar 

  26. 26.

    Song, X., Wang, S., El-Latif, A.A.A., Niu, X.: Dynamic watermarking scheme for quantum images based on Hadamard transform. Multimed. Syst. 20(4), 379–388 (2014)

    Article  Google Scholar 

  27. 27.

    AL-Salhi, Y.E.A., Lu, S.: Quantum Image Steganography and Steganalysis Based On LSQu-Blocks image information concealing algorithm. Int. J. Theor. Phys. 55(8), 3722–3736 (2016)

    MathSciNet  MATH  Article  Google Scholar 

  28. 28.

    Guan, X.-W., Chen, X.-B., Wang, L.-C., Yang, Y.-X.: Joint remote preparation of an arbitrary two-qubit state in noisy environments. Int. J. Theor. Phys. 53, 2236 (2014)

    MATH  Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (No. 61373131, 61303039, 61232016, 61501247) and PAPD and CICAEET funds.

Author information

Affiliations

Authors

Corresponding author

Correspondence to Zhiguo Qu.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Qu, Z., Chen, S. & Wang, X. A secure controlled quantum image steganography algorithm. Quantum Inf Process 19, 380 (2020). https://doi.org/10.1007/s11128-020-02882-4

Download citation

Keywords

  • Controlled flexible representation for quantum image
  • Controlled quantum image steganography
  • Security
  • Imperceptibility
  • Identity authentication