Skip to main content
Log in

Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

Cryptography is the essential subject for network information security to protect important data. Although following the symmetric cryptosystem for which the participations in the communication keep exactly the same keys, the special for the encryption and decryption algorithms proposed in this paper lays in the operational objectives, the quantum image. Firstly, extracts the properties of gray-scale and position from the quantum gray-scale image which the storage expression of image in quantum states is achieved. Along with the geometric transformations in classical images, this article realizes the quantum image geometric transforms by means of designing quantum circuits. Eventually, through a combination of the proposals in previous, the encryption and decryption algorithms on quantum gray-scale images is finally accomplished, which could ensure the confidentiality and security of the information in delivery. The algorithms belong to the application of quantum image geometric transformations, for further, the new explorations for quantum image cryptography researches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Dagmar, B., Gabor, E., Tim, M., Tobias, R., Jorg, R., Quantum cryptography: a survey. ACM Comput. Surv. 39(2), 6 (2007)

    Article  Google Scholar 

  2. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)

    MathSciNet  MATH  Google Scholar 

  3. Stallings, W.: Cryptography and Network Security Principles and Practices, 5th edn. Prentice Hall, London (2010)

    Google Scholar 

  4. Bose, R.: Information Theory, Coding and Cryptography. Tata McGraw-Hill Education, New York (2002)

    Google Scholar 

  5. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory, 22, 644–654 (1967)

    Article  MathSciNet  Google Scholar 

  6. Wang, X.Y., Feng, D.G., Lai, X.J., et al.: Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD (2004). http://eprint.iacr.org/2004/199

  7. Shor, P.W.: Algorithms for quantum computation: discrete log and factoring. In: Foundations of Computer Science, Proceedings of the 35th Annual Symposium, pp. 124–134 (1994)

    Chapter  Google Scholar 

  8. Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eight Annual ACM Symposium on Theory of Computing, pp. 212–219 (1995)

    Google Scholar 

  9. Nielsen, M., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)

    MATH  Google Scholar 

  10. Venegas-Andraca, S.E., Bose, S.: Storing, processing and retrieving and image using quantum mechanics. Quantum Inf. Comput. 5105, 137–147 (2003)

    Google Scholar 

  11. Venegas-Andraca, S.E., Ball, J.L.: Processing images in entangled quantum systems. Quantum Inf. Process. 9(1), 1–11 (2010)

    Article  MathSciNet  Google Scholar 

  12. Pang, C., Zhou, Z.W., Guo, G.: Quantum discrete cosine transform for image compression. Quantum Phys. (2006). arXiv:quant-ph/0601043v2

  13. Latorre, J.I.: Image compression and entanglement. Quantum Phys. (2005). arXiv:quant-ph/0510031

  14. Le, P.Q., Dong, F., Hirota, K.: A flexible representation of quantum images for polynomial preparation, image compression, and processing operations. Quantum Inf. Process. 10, 63–84 (2010)

    Article  MathSciNet  Google Scholar 

  15. Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802–803 (1982)

    Article  ADS  Google Scholar 

  16. Zhou, R., Wang, H., Wu, Q., Shi, Y.: Quantum associative neural network with nonlinear search algorithm. Int. J. Theor. Phys. 51(3), 705–723 (2012)

    Article  MATH  Google Scholar 

  17. Barenco, A., Bennett, C.H., Cleve, R., DiVincenzo, D.P., Margolus, N., Shor, P., Sleator, T., Smolin, J., Weinfurter, H.: Elementary gates for quantum computation. Phys. Rev. A, Gen. Phys. 52(5), 3457–3467 (1995)

    Article  ADS  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China under Grant No. 61065002, the Key Project of Chinese Ministry of Education under Grant No. 212094, Humanities and Social Sciences planning project of Ministry of Education under Grant No. 12YJAZH050, the Foundation of Talent of Jinggang of Jiangxi Province under Grant No. 20112BCB23014, Project of International Cooperation and Exchanges of Jiangxi Province under Grant No. 20112BDH80007, Project of International Cooperation and Exchanges of Nanchang City and the item of science and technology awarded by Education Bureau of Jiangxi Province under Grant No. GJJ12311.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qian Wu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhou, RG., Wu, Q., Zhang, MQ. et al. Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations. Int J Theor Phys 52, 1802–1817 (2013). https://doi.org/10.1007/s10773-012-1274-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-012-1274-8

Keywords

Navigation