Skip to main content
Log in

Quantum image encryption based on restricted geometric and color transformations

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

A novel encryption scheme for quantum images based on restricted geometric and color transformations is proposed. The new strategy comprises efficient permutation and diffusion properties for quantum image encryption. The core idea of the permutation stage is to scramble the codes of the pixel positions through restricted geometric transformations. Then, a new quantum diffusion operation is implemented on the permutated quantum image based on restricted color transformations. The encryption keys of the two stages are generated by two sensitive chaotic maps, which can ensure the security of the scheme. The final step, measurement, is built by the probabilistic model. Experiments conducted on statistical analysis demonstrate that significant improvements in the results are in favor of the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Deutsch, D.: Quantum theory, the Church-Turing principle and the universal quantum computer, Proc. R. Soc. London A400, 97–117 (1985)

  2. Le, P.Q., Iliyasu, A.M., Dong, F., Hirota, K.: Efficient color transformations on quantum images. J. Adv. Comput. Intell. Intell. Inform. 15(10), 698–706 (2011)

    MATH  Google Scholar 

  3. Barenco, A., Bennett, C.H., Cleve, R., DiVincenzo, D.P., Margolus, N., Shor, P.W., Sleator, T., Smolin, J.A., Weinfurter, H.: Elementary gates for quantum computation. Phys. Rev. Part A 52, 3457 (1995)

    Article  ADS  Google Scholar 

  4. Monz, T., Kim, K., Hansel, W., Riebe, M., Villar, A.S., Schindler, P., Chwalla, M., Hennrich, M., Blatt, R.: Realization of the quantum Toffoli gate with trapped ions. Phys. Rev. Let. 102, 040501 (2009)

    Article  ADS  Google Scholar 

  5. Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)

    MATH  Google Scholar 

  6. Venegas-Andraca, S.E., Bose, S.: Quantum computation and image processing: new trends in artifficial intelligence. Proceedings of the International Conference on Artifficial Intelligence IJCAI-03, pp. 1563–1564 (2003)

  7. Venegas-Andraca, S.E., Bose, S.: Storing, processing and retrieving an image using quantum mechanics. Proceedings of SPIE Conference Quantum Information and Computation, 5105, pp. 137–147 (2003)

  8. Lanzagorta, M., Uhlmann, J.: Quantum algorithmic methods for computational geometry. Math. Struct. Comput. Sci. 20(6), 1117–1125 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  9. Trugenberger, C.: Probabilistic quantum memories. Phys. Rev. Lett. 87, 067901 (2001)

    Article  ADS  Google Scholar 

  10. Trugenberger, C.: Phase transitions in quantum pattern recognition. Phys. Rev. Lett. 89, 277903 (2002)

    Article  ADS  Google Scholar 

  11. Trugenberger, C.: Quantum pattern recognition. Quantum Inf. Process. 1(6), 471–493 (2002)

    Article  MathSciNet  Google Scholar 

  12. Abal, G., Donangelo, R., Fort, H.: Conditional strategies in iterated quantum games. Physica A 387, 5326–5332 (2008)

    Article  MathSciNet  ADS  Google Scholar 

  13. Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. Proceedings of 35th Annual Symposium Foundations of 751 Computer Science, IEEE Computer Society. Press, Los Almitos, CA, 124 C134 (1994)

  14. Zhou, N., Ye, Liu: Novel qubit block encryption algorithm with hybrid keys. Physica A 375, 693–698 (2007)

    Article  ADS  Google Scholar 

  15. Yang Y.G., Xia J., Jia X., Zhang, H.: Novel image encryption/decryption based on quantum fourier transform and double phase encoding. Quantum Inf. Process., pp. 1–17 (2013)

  16. Le, P.Q., Dong, F., Hirota, K.: A flexible representation of quantum images for polynomial preparation, image compression and processing operations. Quantum Inf. Process. 10(1), 63–84 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  17. Latorre, J.I.: Image compression and entanglement. arXiv:quant-ph/0510031 (2005)

  18. Sun B., Le P.Q., Iliyasu A.M., Adrian Garcia J., Yan F., Dong J., F., Hirota, K.: A multi-channel representation for images on quantum computers using the RGB\(\alpha \) color space. Proceedings of the IEEE 7th International Symposium on Intelligent Signal Processing, pp. 160–165 (2011)

  19. Zhang, Y., Lu, K., Gao, Y.H., Wang, M.: NEQR: a novel enhanced quantum representation of digital images. Quantum Inf. Process. 12(8), 2833–2860 (2013)

  20. Simona C., Vasile, M.: Image representation and processing using ternary. Quantum Computing. Adaptive and Natural Computing Algorithms, pp. 366–375 (2013)

  21. Zhang, Y., Lu, K., Gao, Y.H., Xu, K.: A novel quantum representation for log-polar images. Quantum Inf. Process. 12(9), 3103–3126 (2013)

  22. Zhou, R.G., Wu, Q., Zhang, M.Q., Shen, C.Y.: Quantum image encryption and decryption algorithm based on quantum image geometric transformations. Int. J. Theor. Phys. 52(6), 1802–1817 (2013)

  23. Abd El-Latif, A., Li, L., Zhang, T., Wang, N., Song, X., Niu, X.M.: Digital image encryption based on multiple chaotic systems. Sens. Imaging Int. J. 13(2), 67–88 (2012)

  24. Abd El-Latif A.A., Li, L., Wang, N., Han, Q., Niu, X.M.: A New approach to chaotic image encryption based on quantum chaotic systems, exploiting color spaces. Signal Process. 93(11), 2986–3000 (2013)

  25. Le, P.Q., Iliyasu, A.M., Dong, F., Hirota, K.: Strategies for designing geometric transformations on quantum images. Theor. Comput. Sci. 412, 1406–1418 (2011)

  26. Le, P.Q., Iliyasu, A.M., Dong, F., Hirota, K.: Fast geometric transformations on quantum images. IAENG Int. J. Appl. Math. 40(3), 113–123 (2010)

    MathSciNet  MATH  Google Scholar 

  27. Abd EI-Latif, A.A., Niu, X.M., Amin, M.: A new image cipher in time and frequency domains. Opt. Commun. 285, 4241–4251 (2012)

    Article  ADS  Google Scholar 

  28. Arroyo, D.: Framework for the Analysis and Design of Encryption Strategies Based on Discrete-Time Chaotic Dynamical Systems. Universidad Politecnica de Madrid, Madrid (2009)

    Google Scholar 

  29. Devaney, R.L.: An Introduction to Chaotic Dynamical Systems. Westview Press, Boulder (2003)

    MATH  Google Scholar 

  30. Kocarev, L., Galias, Z., Lian, S.: Intelligent Computing Based on Chaos. Springer, New York, Vol. 184 (2009)

  31. Behnia, S., Akhshani, A., Mahmodi, H., Akhavan, A.: A novel algorithm for image encryption based on mixture of chaotic maps. Chaos Solitons Fractals 35(2), 408–419 (2008)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  32. Song, X.H., Niu, X.M.: Comment on: Novel image encryption/decryption based on quantum fourier transform and double phase encoding. Quantum Inf. Process (2014). doi:10.1007/s11128-014-0738-6

  33. Yan, F., Le, P.Q., Iliyasu, A.M., Sun, B., Garcia, J.A., Dong, F.Y., Hirota, K.: Assessing the similarity of quantum images based on probability measurements. IEEE World Congress on Computational Intelligence, Brisbane, 10–15 June, pp. 1–6 (2012)

  34. The USC-SIPI Image Database. http://sipi.usc.edu/database/database.php

  35. Elashry, I.E.: Digital image encryption, MS Thesis, Department of Computer Science and Engineering, Faculty of Electronic Engineering, Menofia University (2010)

  36. Gray, R.: Entropy and Information Theory. Springer, New York (2010)

  37. Ahmad, J., Ahmed, F.: Efficiency analysis and security evaluation of image encryption schemes. Int. J. Video, Image Process. Network Sec. 12(4), 18–31 (2012)

  38. Ahmed, H., Kalash, H., Allah, O.: Implementation of rc5 block cipher algorithm for image cryptosystems. Int. J. Inf. Technol. 3(4) (2007)

  39. Enayatifar, R.: Image encryption via logistic map function and heap tree. Int. J. Phys. Sci. 6(2), 221 (2011)

    Google Scholar 

  40. Elashry, I., Allah, O., Abbas, A., El-Rabaie, S., El-Samie, F.: Homomorphic image encryption. J. Electron. Imaging 18, 033002 (2009)

    Article  ADS  Google Scholar 

  41. Fan, H., Wang, Y.N., Jing, L., Yue, J.D., Shi, H.D., Zhang, Y.L., Mu, L.Z.: Quantum cloning machines and the applications, arXiv preprint arXiv:1301.2956 (2013)

  42. Scheneie, B.: Applied Cryptography Second Edition: Protocols, Algorithms, and Source Code in C [M], 2nd edn. Wiley, New York (1996)

    Google Scholar 

Download references

Acknowledgments

The authors are very indebted to the anonymous reviewer for his helpful comments. This work is supported by the National Natural Science Foundation of China(61301099, 61100187, 11201100,61361166006), Heilongjiang Province Educational Department Funds of China (12521107), the Youth Foundation at the Harbin University of Science and Technology (2011YF009) and Ministry of Higher Education and Scientific Research (Egypt-Tunisia Cooperation program: 4-13-A1).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shen Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Song, XH., Wang, S., Abd El-Latif, A.A. et al. Quantum image encryption based on restricted geometric and color transformations. Quantum Inf Process 13, 1765–1787 (2014). https://doi.org/10.1007/s11128-014-0768-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-014-0768-0

Keywords

Navigation