Abstract
Transmission of digital contents over public channel with access restricted to intended beneficiary even the contents are intercepted by others. In technological ages, cryptography plays a vital role in broadcasting, network communication, cell phones, etc. for transmitting sensitive information. The era of quantum information processing has many applications in daily life and one of its implications in data security. The data security and quantum information are two different modules of information processing that uses the notion of qubit model instead of classical information theory. It uses quantum mechanics instead of classical mechanics for information processing (covert communication). Elements of quantum theory have energy and angular momentum called spin, which carries the polarization. The purpose of writing this article is to introduce the concept spinning from quantum dynamics in data security, which leads to the development of quantum cryptography. The scope of this article is to protect contents’ privacy by polarized spin matrices passed by finite-state machine at secret phase information.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
Propagation of communication over public channels becomes very much popular and ensures that authorized access is essential [1]. The rapid growth in multimedia technology, and digital contents such as images, video, audio, etc. play imperative role in communication [2]. To fulfill the privacy prerequisite of such contents, worthy security tools have to be developed [3]. The traditional number theory-based algorithms, such as AES and DES, projected for encryption, but these algorithms rely on higher computational power and time complexity, so these found to be not suitable for digital images. Images possess resistance and redundancy among neighboring pixels, which mark difficulties for number theory-based procedures to tackle the real-time protection performance due to necessity of high computational complexity. In literature review, AES is vulnerable to square, side-channel, and differential attacks [4].
Different algorithms have been developed in the literature to provide the security to digital contents based on confusion and diffusion with multiple rounds and chaos theory [5,6,7,8,9,10,11,12,13,14,15,16,17]. The idea of quantum computers evolves nowadays and it is a serious threat for classical number theory-based algorithms. The conventional communication is a fine submission of 0 or 1 through public channels and several algorithms [18,19,20,21,22, 23] have been proposed that prevent the leakage of information as well as provide defense against information attacks. These algorithms were considered to be secure as long as quantum computers not available publically. In the age of quantum information, the idea of fast computation with several complication levels gets more legalistic due to quantum parallelism. The performance of a single-quantum computing machine is much better than hundreds of classical computers perform operation parallel. Quantum parallelism is performed by spin operations of quantum mechanics and this leads to a new paradigm of computing. The cryptography of prime factorization will fall as the computational complexity resolved by quantum machines in m-seconds [24]. Thirty classical machines having CPU 2.2 Ghz perform parallel operations for a year to factor 193 digits, while a single-quantum computer with the same specification as classical machine to calculate factors 193 digits in 0.1 s [25]. Quantum calculations allied in several branches of science nowadays and a novelty in image processing, computational complications, and pattern recognition. The feasibility of quantum mechanics properties of superposition and entanglement applied on the traditional cryptosystem at fundamental level has been discovered in scientific ages.
The first key distribution using quantum protocol was published in 1984 by Charles Bennet and Gilles Brassard named as BB84 [26]. Further advancement took place in 1991, when Ekert proposed the Einstein–Podolsky–Rosen (EPR) entanglement theory, whose security was based on Bell’s inequality [27, 28]. To transfer a qubit into an elementary particle form one side to another, either on free-space or fiber optics utilized by quantum channels, whereas both sides cannot be protected from illegitimate attempts [29]. Quantum channels are considered to be useful for traditional system security in the light of quantum standards of uncertainty principle by Heisenberg and no-cloning theorem that keeps the whole communication system unbroken [30,31,32,33,34,35,36,37,38,39,40].
Quantum algorithms processed into two channels; one is ERP (entangled state) channel and the second is qubit channel. In this article, we perform entanglement phenomenon on spin matrices to provide security to digital contents. Section 2 of this article provides the basic concept of spin matrices and their entanglement, and finite-state machine at which the entangled matrices applied. Section 3 demonstrates the experimentation of algorithm on standard images. Section 4 comprises of different analyses’ measures and comparison with the existing techniques. The final remarks about the article are presented in Sect. 5.
2 Initiations
The brief demonstration of spin matrices specified in this section, which have been devised in the light of rotation operators in quantum dynamics literature [41,42,43]. We pass the entangled matrices through finite-state machine [43, 44]. The spin matrices for rotation operators x, y, and z are as follows:
The image encryption algorithm design appeared in Fig. 1 and entanglement of spin matrices in two dimensions are as follows:
Entangle these \(2 \times 2\) spin matrices to produce a set F of \(4 \times 4\) entangled matrices, \(F=\{ {F_i} \in {F_{4 \times 4}}(I,X,Y,Z\,),i=1,2,...,24\}\).
We will get 24 matrices \(F=\{ {F_1},{F_2},{F_3},...,{F_{24}}\} .\)
The phase and key were kept secret. FSM or FSA (finite-state automation) used here with a limited number of conditions. The input symbols are digits defined by key. String belongs to image can be treated by deterministic finite-state or non-deterministic finite-state automaton (NDFA). We considered here NDFA whose output depends on the transitions [43].
3 Experimentation
The dimension of plain image \(P(i,j)\) is \(M \times N\), where \(P(i,j)\) is the ith row and jth column pixel value.
-
1.
Transform the image layers dimension into \(4 \times n\) direction.
-
2.
Specify the criteria for the selection of phase or simply phase kept secret between two parties for encryption and decryption and resolve the entangled matrices by placing phase information.
-
3.
Distribute the key secretly to encrypt or decrypt the data. Different spin matrices operated by FSM with respect to key.
-
4.
Transform the encrypted layers direction into plain image dimension.
-
5.
All the encrypted layers combine together to form a single ciphered image.
We consider here the phase value \(\theta =365.86\) and key K = 68. FSM converts the key into bits and performs encryption under 24 spin matrices, as shown in Table 1.
where P is the plane image and the final cipher image at the output of FSM is C7.
The experimentation results of designed technique on miscellaneous images of size 512 × 512 of SIPI image database is as follows (Figs. 2, 3).
4 Performance analyses
We have accomplished a few trials on th standard images to affirm the performance and security for the proposed scheme. These trials involve the susceptibility enquiry, factual investigation, and loophole assessment for encoded images. Each of these trials deliberated in detail in the associated subsections.
4.1 Histogram consistency analyses
To estimate the security of digital contents, histogram consistency of enciphered images is necessary [30]. We compute the histograms of two 256 color-level images of size \(512 \times 512\) that have varied ingredient. Refer to Figs. 4 and 5, plain image histograms comprise extensive sharp rises after sharp decreases and the enciphered image histograms under projected structure are genuinely uniform and pretty much change from the plain image histograms, which mark assessable attacks difficult (Figs. 6, 7, 8).
4.2 Randomness analyses
Entropy and NIST analyses are the most prominent feature of randomness. On the basis of random analysis, events from set of probable discrete events {x1, x2 ,…, xi} allied with probabilities {p(x1), p(x2),…, p(xi)}, then the average production of basis information is called entropy:
where xi is the basis image and \({2^N}\) is the collective data. The estimated Shannon entropy is 8 for perfectly indiscrimination of data. Several standard images and their ciphers entropies accounted in Table 2 and cipher images entropy esteem are very close the theoretical esteem 8. This indicates that the information leakage in encryption process is extraneous and the mechanism is protected upon entropy attacks [17]. We also compare the information entropies of enciphered images under the proposed scheme with latest developed techniques in Table 2.
The security of cryptosystem has a few possessions, e.g., extensive period, identical delivery, extraordinary complexity, and efficiency. With a definite aim to accomplish these requisites, we perform NIST analyses’ test. National Institute of Standards and Technology (NIST) develops Special Publication (SP) 1800 series and FIPS (Federal information Processing Standard) for cyber-security community to verify randomness introduced in their cryptosystems. We perform NIST SP 800-22 test to analyze the randomness in digital images. The enciphered Pepper image is utilized to analyze the results of NIST test and after effects of the test are appeared in Table 3.
4.3 Correlation analyses
It is prominent that adjoining pixels are extremely allied in directions either horizontal, vertical, or diagonal. Therefore, the strategy of encryption must abandon this bond to improve barrier contrary to assessable exploration. To affirm the affiliation among adjacent plain and ciphered image pixels, the associated technique is accomplished. Initially, 10,000 sets of two adjoining pixels from plain and corresponding ciphered image randomly selected [47]. The coefficients of correlation for each chain pairs determined by applying the following expression:
where \(x\,\,{\text{and}}\,y\) are the two adjacent pixel values at gray scale, \({\sigma _{x,y}}\) is the covariance, and \({\sigma _x}^{2}\) and \(\sigma _{y}^{2}\) are the variances of random variables \(x\,{\text{and}}\,y\) respectively.
The quantitative analysis of correlation coefficient for RGB layers is deliberated in Table 4, and presented the distribution in horizontal, vertical, and diagonal directions.
The above-calculated coefficients among numerous pairs of enciphered images are very close to zero, and hence, the plain and ciphered images are significantly diverged from each other. The assessment of correlation coefficients calculated by anticipated scheme at gray scale with the modern techniques using the standard images are presented in Table 5.
The outcomes of correlation analysis from anticipated scheme have smaller values than the projected techniques in the literature, which qualify the security measures for real-time applications.
4.4 Similarity analyses
Similarity analyses fundamentally expose the resemblance among different digital contents and the simplest digital content is image. The values of normalized cross-correlation and structure contents are quite closed to 1 for structurally similar digital contents. There are different sorts of similarity coefficient are utilized here to quantitatively find the structurally dissimilar digital contents. We investigated here different similarity measures between plain image \({P_{i,j}}\) and cipher images \({C_{i,j}}\) to approximate the structure dissimilarity among different digital contents from reference.
Structural similarity index metric (SSIM) compares the structure, luminance, and contrast between plain and cipher image. Consider the two images \({P_{i,j}}\,\) and \({C_{i,j}}\) with their mean values \({\mu _p}\), \({\mu _c}\), and the standard deviation \({\sigma _{{\text{pc}}}}\). If there is any similarity between images, the value approaches 1, while value away from 1 or approaches 0 represent the dissimilarity:
Normalized cross-correlation (NCC) measures the similarity of pixels between two images. It is determined by the following expression:
Structural content (SC) determines the amount of structural details as well as the quality of images in terms of sharpness and noise level. Higher value of SC shows the poor quality of image and it is calculated as follows (Table 6):
4.5 Difference analyses
The image quality evaluation based on pixel difference procedure executed here by calculating the mean absolute error, mean square error, and peak signal-to-noise ratio.
Mean absolute error (MAE) is the most common technique used to measure the accuracy for continues variables. It defines the average of absolute difference between plain and ciphered image. Higher the MAE esteem to enhance the security and it is defined as follows:
MSE and PSNR compare the image encryption quality. MSE indicates the collective squared error among the plain and ciphered images, while PSNR indicates the measure of peak error:
The encryption quality is acceptable by higher the MSE esteem and lower the PSNR or vice versa. The quality of ciphered images can be evaluated by utilizing the PSNR as follows:
where \({I_{{\text{MAX}}}}\) is the greatest pixel approximation of image contents and the feasibility of anticipated scheme evaluated for MSE and PSNR presented in Table 7.
4.6 Differential assault analyses
To affirm the image encryption scheme against differential assault, we require the impact of changing a single pixel in plain image and overall encrypted image and execute the number of pixels change rate (NPCR) and unified average intensity (UACI). We assumed two encoded images, whose source image just differs by a single pixel. The NPCR and UACI for two encoded images \({C_1}(i,j)\) and \({C_2}(i,j)\) can be assessed by the following expressions:
where
To examine the sensitivity of plain image, we have to encrypt it first and then change one pixel randomly in the plain image. The experimental results of these assessments are provided in Tables 8 and 9.
NPCR esteems using proposed technique are persistently correspondent to the perfect estimation of 1 and the assessment of differential assault analyses of anticipated process with modern approaches is also discussed in Tables 8 and 9.
This judgement illustrate that projected technique has extreme degree impatient to a trivial alteration in plain image, irrespective of two enciphered plain images which have 1− bit alteration, the two images are fairly dissimilar from each other. Hence, the anticipated strategy has greater ability to hostile the differential assaults.
4.7 Gray-level co− occurrence matrix analyses
To analyze the visual strength of proposed algorithm, gray-level co− occurrence matrix (GLCM) analyses exemplify homogeneity, contrast, and energy [53]. The homogeneity analysis for an image can be calculated using the following expression:
Homogeneity investigation accomplishes the closeness of distribution in GLCM to GLCM diagonally. Its range lies between 0 and 1, where 0 validates no variation and 1 validate large number of variation in image pixels.
The contrast analysis allows the observer to identify the object in the texture of an image and defined as follows:
The rage of contrast lies between 0 and \({({\text{size}}({\text{image}}) - 1)^2}\). The constant image has 0 contrast and greater the contrast value illustrates the large number of variations in the image’s pixels.
The energy exploration proceeds the sum of squared elements in GLCM and it is expressed as follows:
Its range lies between 0 and 1 and the constant image has 1 energy. Table 10 exhibits the GLCM analyses for enciphered images.
The corresponding homogeneity values for enciphered images are very close to 1 and contrast values are sufficiently large, which demonstrates the large number of variations in image pixels. The energy values for enciphered images approach 0, which proves that the image is not constant.
4.8 Time sensitivity analyses
The anticipated scheme in this article is very much effective than already existing techniques, because it uses minimum resources and least computation cost. To analyze the computational complication, we compare time complexity with the existing techniques in Table 11. The table demonstrates the time taken during encryption of plain images. Decryption time is almost equal to encryption time. The projected technique in Table 11 has less computational complexity than already existing approaches.
5 Conclusion
We have designed a new scheme based on quantum spinning to provide the security to digital contents. We consumed the half-spin phenomenon to add the confusion and diffusion abilities in our proposed structure. Cracking of keys and messages is not possible without knowledge of phase and entangled matrices. Due to half spinning, there are infinite points which lie between \(- {720^ \circ }\) and \({720^ \circ }\), while possible combinations of spin matrices are 4!. By utilizing the statistical analyses, our proposed technique is appropriate for real-time applications due to small processing time and superior performance than the existing schemes.
References
C.E. Shannon, Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)
A. Uhl, A. Pommer, 2004. Image and video encryption: from digital rights management to secured personal communication (Vol. 15). Springer, Heidelberg
B. Murugan, A.G. Nanjappa Gounder, S. Manohar, A hybrid image encryption algorithm using chaos and Conway’s game− of− life cellular automata. Secur. Commun. Netw. 9(7), 634–651 (2016)
S. Li, G. Chen, A. Cheung, B. Bhargava, K.T. Lo, On the design of perceptual MPEG− video encryption algorithms. IEEE Trans. Circ. Syst. Video Technol. 17(2), 214–223 (2007)
F. Pareschi, R. Rovatti, G. Setti, On statistical tests for randomness included in the NIST SP800− 22 test suite and based on the binomial distribution. IEEE Trans. Inf. Forensics Secur. 7(2), 491–505 (2012)
B. Yang, X. Liao. A new color image encryption scheme based on logistic map over the finite field Z N. Multimed. Tools Appl. 77(16), 21803–21821 (2018)
R. Enayatifar, A.H. Abdullah, I.F. Isnin, A. Altameem, M. Lee, Image encryption using a synchronous permutation− diffusion technique. Opt. Lasers Eng. 90, 146–154 (2017)
R. Hamza, F. Titouna, A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Inform. Secur. J. A Glob. Perspect. 25(4–6), 162–179 (2016)
X.J. Tong, M. Zhang, Z. Wang, J. Ma, A joint color image encryption and compression scheme based on hyper− chaotic system. Nonlinear Dyn. 84(4), 2333–2356 (2016)
Y. Zhang, D. Xiao, Self− adaptive permutation and combined global diffusion for chaotic color image encryption. AEU Int. J. Electron. Commun. 68(4), 361–368 (2014)
X. Wang, L. Teng, X. Qin, A novel colour image encryption algorithm based on chaos. Sig. Process. 92(4), 1101–1108 (2012)
L. Zhang, X. Liao, X. Wang, An image encryption approach based on chaotic maps. Chaos, Solitons Fractals 24(3), 759–765 (2005)
Q. Zhou, K.W. Wong, X. Liao, T. Xiang, Y. Hu, Parallel image encryption algorithm based on discretized chaotic map. Chaos, Solitons Fractals 38(4), 1081–1092 (2008)
H. Gao, Y. Zhang, S. Liang, D. Li, A new chaotic algorithm for image encryption. Chaos, Solitons Fractals 29(2), 393–399 (2006)
Y. Mao, G. Chen, S. Lian, A novel fast image encryption scheme based on 3D chaotic baker maps. Int. J. Bifurc. Chaos 14(10), 3613–3624 (2004)
S. Etemadi Borujeni, M. Eshghi, 2009. Chaotic image encryption design using Tompkins–Paige algorithm. Math. Probl. Eng. 2009
G. Zhang, Q. Liu, A novel image encryption method based on total shuffling scheme. Opt. Commun. 284(12), 2775–2780 (2011)
A.A. Abushgra, K.M. Elleithy, A shared secret key initiated By EPR authentication and Qubit transmission channels. IEEE Access 5, 17753–17763 (2017)
R.L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public− key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
W. Diffie, M. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
M.R. Albrecht, K.G. Paterson, G.J. Watson Plaintext recovery attacks against SSH. in 30th IEEE Symposium on Security and Privacy, 2009. (IEEE, 2009), pp. 16–26
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)
F. Ahmed, A. Anees, V.U. Abbas, M.Y. Siyal, A noisy channel tolerant image encryption scheme. Wirel. Personal Commun 77(4), 2771–2791 (2014)
J. Morris, Implications of quantum information processing on military operations. Cyber Def. Rev. 2(3) (2015)
J. Preskill, Introduction to quantum information (part 1). Institute for Quantum Computing—CSSQI 2012 (2012), Online Lecture, http://iqim.caltech.edu/2012/11/27/john-preskill-introduction-to-quantum-information-part-1-cssqi-2012/
C. H. Bennett, G. Brassard, Quantum cryptography: public key distribution and coin tossing, Theor. Comput. Sci. 560, 7–11 (2014)
R.J. Hughes, W.T. Buttler, P.G. Kwiat, S.K. Lamoreaux, G.G. Luther, G.L. Morgan, J.E. Nordholt, C.G. Peterson, Quantum cryptography for secure free− space communications. in Free− Space Laser Communication Technologies XI, vol. 3615 (International Society for Optics and Photonics, 1999), pp. 98–104
C.H. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, W.K. Wootters, Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channels. Phys. Rev. Lett. 70(13), 1895 (1993)
H.K. Lo, X. Ma, K. Chen, Decoy state quantum key distribution. Phys. Rev. Lett. 94(23), 230504 (2005)
M. Khan, H.M. Waseem, A novel image encryption scheme based on quantum dynamical spinning and rotations. PloS One 13(11), .e0206460 (2018)
S.E. Venegas− Andraca, S. Bose, Quantum computation and image processing: new trends in artificial intelligence. in IJCAI (2003) p. 1563
S.E. Venegas− Andraca, S. Bose, Storing, processing, and retrieving an image using quantum mechanics. In: Quantum Information and Computation, vol. 5105. (International Society for Optics and Photonics, 2003 ), pp. 137–148
M. Lanzagorta, J. Uhlmann, Quantum algorithmic methods for computational geometry. Math. Struct. Comput. Sci. 20(6), 1117–1125 (2010)
C.A. Trugenberger, Probabilistic quantum memories. Phys. Rev. Lett. 87(6), 067901 (2001)
C.A. Trugenberger, Phase transitions in quantum pattern recognition. Phys. Rev. Lett. 89(27), 277903 (2002)
C.A. Trugenberger, Quantum pattern recognition. Quantum Inf. Process. 1(6), 471–493 (2002)
G. Abal, R. Donangelo, H. Fort, Conditional strategies in iterated quantum games. Physica A 387(21), 5326–5332 (2008)
P.W. Shor, Algorithms for quantum computation: discrete logarithms and factoring. in 35th Annual Symposium on Foundations of Computer Science, 1994 Proceedings. (IEEE, 1994), pp. 124–134
N. Zhou, Y. Liu, G. Zeng, J. Xiong, F. Zhu, Novel qubit block encryption algorithm with hybrid keys. Physica A 375(2), 693–698 (2007)
Y.G. Yang, J. Xia, X. Jia, H. Zhang, Novel image encryption/decryption based on quantum Fourier transform and double phase encoding. Quantum Inf. Process. 12(11), 3477–3493 (2013)
J. Branson, Quantum Physics 130. UCSD (2002) https://quantummechanics.ucsd.edu/ph130a/130_notes/node275.html
T. Guhr, A. Müller–Groeling, H.A. Weidenmüller, Random-matrix theories in quantum physics: common concepts. Phy. Reports 299, 189–425 (1998)
H.M. Waseem, M. Khan, Information confidentiality using quantum spinning, rotation and finite state machine. Int. J. Theor. Phys. 57(11), 3584–3594 (2018)
H.M. Waseem, M. Khan, T. Shah, Image privacy scheme using quantum spinning and rotation. J. Electron. Imaging 27(6), 063022 (2018)
M. Khan, T. Shah, An efficient chaotic image encryption scheme. Neural Comput. Appl. 26(5), 1137–1148 (2015)
B. Stoyanov, K. Kordov, Image encryption using Chebyshev map and rotation equation. Entropy 17(4), 2117–2139 (2015)
M. Khan, A novel image encryption scheme based on multiple chaotic S− boxes. Nonlinear Dyn. 82(1–2), 527–533 (2015)
S.M. Seyedzadeh, B. Norouzi, M.R. Mosavi, S. Mirzakuchaki, A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn. 81(1–2), 511–529 (2015)
H. Varshney, H. Gupta, M. Kushwaha, Image encryption using chaotic logistic map. Int. J. Electr. Electron. Comput. Sci. Eng. 4, 40–45 (2017)
B. Norouzi, S.M. Seyedzadeh, S. Mirzakuchaki, M.R. Mosavi, A novel image encryption based on row− column, masking and main diffusion processes with hyper chaos. Multimed. Tools Appl. 74(3), 781–811 (2015)
B. Norouzi, S. Mirzakuchaki, S.M. Seyedzadeh, M.R. Mosavi, A simple, sensitive and secure image encryption algorithm based on hyper− chaotic system with only one round diffusion process. Multimed. Tools Appl. 71(3), 1469–1497 (2014)
R.E. Boriga, A.C. Dăscălescu, A.V. Diaconu, A new fast image encryption scheme based on 2D chaotic maps. IAENG Int. J. Comput. Sci. 41(4), 249–258 (2014)
I. Hussain, A. Anees, M. Aslam, R. Ahmed, N. Siddiqui, A noise resistant symmetric key cryptosystem based on S 8 S− boxes and chaotic maps. Eur. Phys. J. Plus 133, 1–23 (2018)
M. Khan, T. Shah, A novel image encryption technique based on Hénon chaotic map and S 8 symmetric group. Neural Comput. Appl. 25(7–8), 1717–1722 (2014)
J. Ahmad, S.O. Hwang, A secure image encryption scheme based on chaotic maps and affine transformation. Multimed. Tools Appl. 75(21), 13951–13976 (2016)
Acknowledgements
Both authors Dr. Majid Khan and Hafiz Muhammad Waseem are greatly thankful to Vice Chancellor Dr. Syed Wilayat Hussain and Dean Dr. Iqbal Rasool Memon, Institute of Space Technology, Islamabad Pakistan, for providing the decent environment for research and development.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Waseem, H.M., Khan, M. A new approach to digital content privacy using quantum spin and finite-state machine. Appl. Phys. B 125, 27 (2019). https://doi.org/10.1007/s00340-019-7142-y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s00340-019-7142-y