Abstract
Based on the NEQR representation of quantum images and least significant bit (LSB) scheme, a novel quantum image steganography scheme is proposed. The sizes of the cover image and the original information image are assumed to be 4n × 4n and n × n, respectively. Firstly, the bit-plane scrambling method is used to scramble the original information image. Then the scrambled information image is expanded to the same size of the cover image by using the key only known to the operator. The expanded image is scrambled to be a meaningless image with the Arnold scrambling. The embedding procedure and extracting procedure are carried out by K1 and K2 which are under control of the operator. For validation of the presented scheme, the peak-signal-to-noise ratio (PSNR), the capacity, the security of the images and the circuit complexity are analyzed.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
1 Introduction
With the rapid development of quantum computation and quantum information, the research of quantum image processing is springing up. It can be divided into two directions: representations of quantum images and quantum image processing algorithms. The first direction, representations of quantum images, is the foundation of the quantum image processing. The task in this direction is the construction of a pattern to store the images on quantum computers. In recent years, lots of quantum image representations were studied, i.e., Qubit Lattice [1], Real Ket [2], Entangled Image [3], a flexible representation for quantum images (FRQI) [4], multi-channel representation of quantum image (MCRQI) [5], a normal arbitrary quantum superposition state (NAQSS) [6], and a novel enhanced quantum representation (NEQR) [7]. Of these quantum representation models, two of them are most commonly used: one is FRQI using an angle to encode color, and the other is NEQR using a qubit sequence to store the color value of every pixel.
Many algorithms have been proposed in the second direction as well, such as Geometric transformation [8, 9], Image scaling [10, 28], Color transformation [7], Image scrambling [11, 12], Feature extraction [13], Quantum image encryption [14,15,16,17,18], Quantum image information hiding [19,20,21,22,23,24,25,26,27], and so on.
The quantum image information hiding includes quantum watermarking and quantum steganography of which have many similarities. For example, the goal of both methods is to hide the information into the carrier. Moreover, they both include embedding and extracting procedures.
Due to quantum information hiding is important for hiding information into other images and protecting the image copyright. The quantum image information hiding has a wide range of uses. In recent years, researchers had been committed to study in it. In 2012 A.M. Iliyasu, et al. proposed a quantum image watermarking algorithm based on restricted geometric transformations [19]. Later on, in 2013, watermark image was embedded into the Fourier coefficients of the quantum carrier image in the protocol proposed by W. W. Zhang et al., in which the carrier images would not be visually affected by the watermark images [20]. Then X.H. Song et al. proposed a dynamic watermarking scheme for quantum images based on Hadamard transform [21]. Recently, a blind LSB steganography in the form of quantum circuits had been proposed by N. Jiang et al. [22]. In 2016, S. Heidari, et al. proposed a novel LSB based quantum watermarking protocol [23]. Before this, S. Miyake proposed a quantum watermarking scheme using simple and small-scale quantum circuits [24]. The proposed scheme took a gray scale image as the watermark image by extending a n × n sized image with eight bits of gray scale to a 2n × 2n sized image with two bits of gray scale. In 2017, B. Abd-El-Atty et al. proposed the New Quantum Image Steganography Scheme with Hadamard Transformation [26], in which the quantum text message was hided into the carrier image.
In order to enhance the security of the information image, a novel quantum steganography scheme based on LSB is proposed in this paper. The outline of this paper is structured as follows. Section 2 introduces the preliminary knowledge of quantum image model NEQR, LSB scheme, Bit-plane scrambling and Arnold scrambling methods. The proposed scheme is explained in Section 3 in detail. Section 4 presents the simulation and analysis of the scheme. Finally, a brief conclusion is drawn in Section 5.
2 Background
2.1 Novel Enhanced Quantum Representation for Quantum Images
A Novel Enhanced Quantum Representation of digital images (NEQR) was proposed in 2013 [7]. The expression form of a quantum image described by the NEQR model is:
where |YX〉 stands for position information and \(\vert C_{YX}^{i} \rangle \) is the color information.
Thus, there are q + 2n qubits to represent a quantum image of size 2n × 2n with the gray range of 2q. Figure 1 shows an example of an image of 2 × 2 and the corresponding NEQR representation is on the right of the image.
2.2 The Least Significant Bit (LSB)
The least significant bit is one of the pixel bits shown in Fig. 2. If the control bit is “1”, we only need to change the least significant bit from “1” to “0”, i.e., color value 227 is changed into 226. Simply, the change of pixel value is only one gray level, so the visual effect is not affected basically.
2.3 Bit-Plane Scrambling
The pixel values in the image are represented by its corresponding binary values. And then, every single bit of all the pixels will constitute a binary image, it is called bit-plane. For example, if the gray range is between 0 and 28, the image will be separated into 8 bit-planes. Figure 3 shows the result of bit-planes of Lena image of size 28 × 28.
From above, it can be known that different bit-planes carry different visual information. If these bit-planes are measured, the information will become disordered. By scrambling the bit-plane, the image will be scrambled.
2.4 Arnold Scrambling
Arnold scrambling is used to change the pixel horizontal and vertical coordinates to disrupt the original image information. The Arnold scrambling for a digital image can be illustrated specifically as following.
Supposing that there is an original image with size of 2n × 2n, the pixel coordinates of the original image and the scrambled image are (X, Y ) and (X A , Y A ), respectively. Two-dimensional Arnold scrambling process is expressed by (3) and its inverse operation is shown in (4).
The inverse operation is:
According to literature [11], the circuits of Arnold scrambling and inverse-scrambling are shown in Figs. 4 and 5.
3 The Proposed Quantum Image Steganography Scheme
The proposed quantum image steganography scheme hides a gray scale image (secret information image) into the other gray scale image (cover image), and the size of two images is n × n and 4n × 4n, respectively. The embedding and extracting procedures are shown in Fig. 6, where Fig. 6a is embedding procedure and Fig. 6b is extracting procedure. The specific scheme is described as follows.
3.1 Preparation Procedure
In this section the original information image |I〉 should be scrambled by the bit-plane scrambling. Figure 7 shows an example of the circuit that is used for processing an image with gray scale of 28. Firstly, there are four SWAP gates and four CNOT gates utilized in this circuit. The lowest bit |C7〉 swaps with the highest bit |C0〉, the bit |C6〉 swaps with the bit |C1〉, the bit |C5〉 swaps with the bit |C2〉 and the bit |C4〉 swaps with the bit |C3〉. Then, four low bits will be the control bits and apply the results to four high bits. Therefore, the scrambled information image |I1〉 is prepared.
3.2 Embedding Procedure
The embedding procedure consists of four steps that illustrate as follows:
-
Step 1
The aim of this step expands the scrambled image to the expanded image which has same size with the cover image. An example, as shown in Fig. 8a, both of the key image |K〉 that only known to the operator and the gray scale image |I1〉 are size of 1 × 1, in which |K〉 is a binary image and |I1〉 will be expanded to a 4 × 4 binary image \(\vert I_{1}^{\prime } \rangle \). Figure 8b gives the concrete quantum circuit realization of expanding the scrambled image to the expanded image which has same size with the cover image, where the key image |K〉 and the gray scale image |I1〉 both are size of 2n × 2n, respectively. If the color value |Ki〉 of key |K〉 is equal to 1, an 8 bits string is divided into 8 single bits whose positions are (4i,4j + 1), (4i,4j + 2), (4i + 1,4j), (4i + 1,4j + 1), (4i + 1,4j + 2), (4i + 2,4j), (4i + 2,4j + 1) and (4i + 2,4j + 2), respectively. The value of the position (4i,4j) is equal to 1 as well. If the key |Ki〉 is equal to 0, an 8 bits string will be divided into 8 single bits by reverse permutation. Similarly, the value of the position (4i,4j) is equal to 0, and the rest of the expanded image is covered by the value 1.
-
Step 2
The Arnold scrambling is used for scrambling the expanded image \(\vert I_{1}^{\prime } \rangle \) to an unordered image |I2〉.
-
Step 3
The unordered information image |I2〉, the key |K1〉 and the cover image |C〉 have been prepared. Their NEQR representations are:
$$ \vert I_{2} \rangle =\frac{{1}}{{2}^{\mathrm{n}}}\sum\limits_{j = 0}^{2^{2n}-1} {\vert {I_{2}^{j}} \rangle} \otimes \vert YX\rangle ,{I_{2}^{j}} \in \left\{ {0,1} \right\} $$(5)$$ \vert K_{1} \rangle =\frac{{1}}{{2}^{\mathrm{n}}}\sum\limits_{j = 0}^{2^{2n}-1} {\vert {K_{1}^{j}} \rangle} \otimes \vert YX\rangle ,{K_{1}^{j}} \in \left\{ {0,1} \right\} $$(6)$$ \vert C\rangle =\frac{{1}}{{2}^{\mathrm{n}}}\sum\limits_{YX= 0}^{2^{2n}-1} {\mathop \otimes\limits_{i = 0}^{q-1} C_{YX}^{i}} \otimes \vert YX\rangle ,\vert C_{YX} \rangle =\vert C_{YX}^{0} C_{YX}^{1} \mathellipsis C_{YX}^{q-1} \rangle ,C_{YX}^{i} \in \left\{ {0,1} \right\},i = 0,1,...,q-1 $$(7)where |YX〉 = |yn− 1yn− 2...y0〉|xn− 1xn− 2...x0〉, y i , x i ∈ {0,1}, i = 0,1,..., n − 1
Each position in the unordered information image |I2〉 will be compared with the position in the cover image |C〉. Literature [25] proposed a quantum equal circuit presented in Fig. 9. The comparator compares |YX〉 and |AB〉, where |YX〉 = |Y 〉|X〉 = |yn− 1...y0〉|xn− 1...x0〉 and |AB〉 = |A〉|B〉 = |an− 1...a0〉|bn− 1...b0〉, y i , x i , a i , b i ∈ 0,1, i = n − 1,...,0. Qubit |c〉 is output. If |c〉 = |1〉, |YX〉 = |AB〉, otherwise, |YX〉≠|AB〉.
When the unordered information image is embedded, the steganography image and the binary image key |K2〉 are obtained. The quantum steganography embedding circuit is shown in Fig. 10. If the position is the same, then implement the embedding procedure as follows:
3.3 Extracting Procedure
Considering the security of the unordered information image, the extracting procedure is more complex than embedding procedure.
The first step extracts the information from the steganography image |CI〉 and the key |K2〉. It is necessary to have the cover image |C〉, the steganography image |CI〉 and two keys |K1〉 and |K2〉 extracted from the unordered information image. The quantum steganography extracting circuit is shown in Fig. 11.
If the position is the same, the corresponding color value will be compared. The extracting procedure can be done in the following steps:
The second step of extracting procedure is recovering the unordered information image |I2〉 to the expanded image \(\vert {I}^{\prime }_{1} \rangle \) by the inverse operation of the Arnold scrambling.
The third step is restoring the expanded image \(\vert {I}^{\prime }_{1} \rangle \) to the scrambled information image |I1〉. To judge the value of the position (i, j) in key |K〉, where i and j are less than n, if the value equals to 1, the 8 bits string of the gray scale of the pixel (i, j) in image |I1〉 equals to the value of these positions [(4i,4j + 1), (4i,4j + 2), (4i + 1,4j), (4i + 1,4j + 1), (4i + 1,4j + 2), (4i + 2,4j), (4i + 2,4j + 1), (4i + 2,4j + 2)] in image \(\vert {I}^{\prime }_{1} \rangle \); if the value equals to 0, the 8 bits string is in the opposite order. The restoring circuit is shown in Fig. 12.
The final step is the inverse bit-plane scrambling operation to the scrambled information image that is importing the color value in the right side of the circuit like Fig. 7.
4 Simulation and Analysis
Since there is no enough physical quantum hardware to implement the proposed scheme, the simulation of quantum operations is performed with MATLAB on the classical computer. Six familiar images (“Mandrill”, “Cameraman”, “Airplane”, “Pepper”, “Rice” and “Lena”) are used. And the sizes of cover image and information image are 256 × 256 and 64 × 64, respectively. The information images are shown in Fig. 13.
4.1 Visual Quality
There are quantities of techniques to measure the difference of pixels between the steganography image and the cover image, where the peak-signal-to-noise ratio (PSNR) is one of the most employed. It is defined as the mean squared error (MSE) for two m×n images P and Q.
PSNR is defined as:
where MAX P is the maximum pixel value of the cover image C. In our scheme, P is associated with the steganography image and Q is associated with the cover image.
Obviously, human eyes can’t identify the difference between the cover image and the steganography image, which is shown in Fig. 14. Compared Table 1 with Table 2, it can be obtained that the values of PSNR of our proposed scheme are higher than literature [24] which is also use the gray scale image as the information image.
4.2 Capacity
The steganography capacity can be stated as the ratio between the number of embedded bits of information image and the number of pixels of cover image. The proposed scheme’s capacity is given as follows:
In order to enhance the confidentiality, half of the pixels are not to carry information.
4.3 Security Analysis
In our proposed scheme, we put the security in a significant status. First, the original image is scrambled to a disordered image. And then the meaningless image consists of half of the information pixels and half of blank pixels will be hiding in the cover image. Furthermore, the extracting operation needs the cover image, the steganography image and two keys, which are all indispensable. In all, the security of the proposed scheme is excellent.
4.4 Circuit Complexity
In this section, the circuit complexity of the proposed scheme is discussed. We assume that the sizes of cover image and original information image are 2n × 2n and 2n− 2 × 2n− 2, respectively. Literature [10] pointed out that circuit complexity of a n-CNOT gate (\(n\geqslant \)3) is about 12n−9 and each swap gate can be realized by three CNOT gates.
-
a. The Time Complexity of Embedding Procedure
The embedding procedure is shown in Fig. 6a and the bit-plane scrambling circuit is shown in Fig. 7 of which complexity is (4 × 3 + 4). According to [11], the complexities of Arnold scrambling circuit |x A 〉 and |y A 〉 are 28n and 28n, respectively. The expanding circuit is shown in Fig. 8b, supposing it expands 2n− 2 × 2n− 2 pixels, and every pixel needs twenty-six (2n + 2)-CNOT gates (In order to facilitate the calculation, all CNOT gates are considered to have the same number of control bits). Thus, the complexity of the expanding circuit is 22n− 4 × 26 ×[12(2n + 2) − 9]. Additionally, Fig. 9 shows the complexity of single QE circuit is 4n + (12 × 2n − 9). Therefore, the complexity of the embedding circuit is 2 ×[4n + (12 × 2n − 9)] + 2 × 6. Consequently, the time complexity of the whole embedding procedure is:
-
b. The Time Complexity of Extracting Procedure
The extracting procedure is shown in Fig. 6b. Figure 11 shows extracting circuit in which the complexity is 3 ×[4n + (12 × 2n − 9)] + 2 ×(12 × 3 − 9) + 6. The complexities of inverse Arnold scrambling |x〉, |y〉 and bit-plane scrambling are 56n, 56n and (4 × 3 + 4), respectively. Finally, the complexity of restoring circuit is 22n− 4 × 16 ×[12(2n + 2) − 9]. In summary, the time complexity of the whole extracting procedure is:
According to the above analysis, the circuit complexity of embedding and extracting procedures of the proposed scheme is higher than [24]. But this paper designed the expanding and restoring circuit realization while other researchers have not mentioned it in their gray scale image steganography scheme.
5 Conclusion
Based on LSB scheme, a novel quantum image steganography scheme is proposed, where the NEQR representation is utilized. Therein, the image sizes for cover and information are 4n × 4n and n × n, respectively. The information hiding part contains two procedures. The first procedure is the preparation of scrambling the original information image. And the other procedure is embedding work which concludes three steps: The first step is expanding the scrambled information image to the same size as the cover image; the second step is to scramble the expanded image to a meaningless image; and the third step is embedding the unordered information image into the cover image. In the information extracting part, two keys that are only possessed by the operator are used for extracting the unordered information image from the steganography image and then the inverse operation of information hiding part will be executed. The experiments show that the scheme has a good visual quality than another scheme. Furthermore, the security of the scheme is excellent according to the analysis.
References
Venegas-Andraca, S.E., Bose, S.: Storing, processing and retrieving an image using quantum mechanics. Proc. SPIE Conf. Quantum Inf. Comput. 5105, 137–147 (2003)
Latorre, J.I.: Image compression and entanglement. arXiv:quant-ph/0510031 (2005)
Venegas-Andraca, S.E., Ball, J.L., Burnett, K., Bose, S.: Processing images in entangled quantum systems. Quantum Inf. Process. 9, 1–11 (2010)
Le, P.Q., Dong, F., Hirota, K.: A flexible representation of quantum images for polynomial preparation, image compression and processing operations. Quantum Inf. Process. 10(1), 63–84 (2010)
Sun, B., Le, P.Q., Iliyasu, A.M.: A multi-channel representation for images on qunatum computers using the R G B α color space. In: IEEE 7th International Symposium on Intelligent Signal Processing, Floriana, Malta, pp. 1–6 (2011)
Li, H.S., Zhu, Q., Zhou, R.G., Song, L., Yang, X.J.: Multi-dimensional color image storage and retrieval for a normal arbitrary quantum superposition state. Quantum Inf. Process. 13(4), 991–1011 (2014)
Zhang, Y., Lu, K., Gao, Y.H., Xu, K.: A novel quantum representation for log-polar images. Quantum Inf. Process. 12(9), 3103–3126 (2013)
Le, P.Q., Iliyasu, A.M., Dong, F.Y., Hirota, K.: Fast geometric transformation on quantum images. IAENG Int. J. Appl. Math. 40(3), 113–123 (2010)
Zhou, R-G, Tan, C.Y., Hou, I.: Global and local translation designs of quantum image based on FRQI. Int. J. Theor. Phys. 56(4), 1382–1398 (2017)
Jiang, N., Wang, J., Mu, Y.: Quantum image scaling up based on nearest-neighbor interpolation with integer scaling ratio. Quantum Inf. Process. 14(11), 4001–4026 (2015)
Jiang, N., Wang, L.: Analysis and improvement of the quantum Arnold image scrambling. Quantum Inf. Process. 13(7), 1545–1551 (2014)
Jiang, N., Wang, L., Wu, W.Y.: Quantum Hilbert image scrambling. Int. J. Theor. Phys. 53(7), 2463–2484 (2014)
Zhang, Y., Lu, K., Xu, K., Gao, Y.H., Wilson, R.: Local feature point extraction for quantum images. Quantum Inf. Process. 14(5), 1573–1588 (2015)
Zhou, R-G, Wu, Q., Zhang, M.-Q., et al.: Quantum image encryption and decryption algorithms based on quantum image geometric transformations. Int. J. Theor. Phys. 52, 1802–1817 (2013)
Zhou, R.-G., Sun, Y.-J., Fan, P.: Quantum image Gray-code and bit-plane scrambling. Quantum Inf. Process. 14, 1717–1734 (2015)
Wang, S., Song, X.H., Niu, X.M.: A novel encryption algorithm for quantum images based on quantum wavelet transform and diffusion. Adv. Intell. Syst. Comput. 298, 243–250 (2014)
Hua, T., Chen, J., Pei, D., et al.: Quantum image encryption algorithm based on image correlation decomposition. Int. J. Theor. Phys. 54(2), 526–537 (2015)
Gong, L-H, He, X-T, Cheng, S., et al.: Quantum Image Encryption Algorithm Based On Quantum Image XOR operations. Int. J. Theor. Phys. 55, 3234–3250 (2016)
Iliyasu, A.M., Le, P.Q., Dong, F., Hirota, K.: Watermarking and authentication of quantum images based on restricted geometric transformations. Inf. Sci. 186, 126–149 (2012)
Zhang, W.W., Gao, F., Liu, B., et al.: A watermark strategy for quantum images based on quantum Fourier transform. Quantum Inf. Process. 12(4), 793–803 (2013)
Song, X.H., Wang, S., Liu, S., Abd El-Latif, A.A., Niu, X.M.: Dynamic watermarking scheme for quantum images based on Hadamard transform. Multimed. Syst. 20(4), 379–388 (2014)
Jiang, N., Zhao, N., Wang, L.: LSB based quantum image steganography algorithm. Int. J. Theor. Phys. 55, 107–123 (2015)
Heidari, S., Naseri, M.: A novel LSB based quantum watermarking. Int. J. Theor. Phys. 55, 4205–4218 (2016)
Miyake, S., Nakamae, K.: A quantum watermarking scheme using simple and small-scale quantum circuits. Quantum Inf. Process. 15, 1849–1864 (2016)
Zhou, R-G, Hu, W.W., Fan, P.: Quantum watermarking scheme through Arnold scrambling and LSB steganography. Quantum Inf. Process. 16(9), 212 (2017)
Abd-El-Atty, B., Abd El-Latif, A.A., Amin, M.: New quantum image steganography scheme with hadamard transformation. Adv. Intell. Syst. Comput. 533, 342–352 (2017)
Li, P, Zhao, Y, Xiao, H, et al.: An improved quantum watermarking scheme using small-scale quantum circuits and color scrambling. Quantum Inf. Process. 16(5), 127 (2017)
Zhou, R.-G., Hu, W.W., Fan, P., Hou, I.: Quantum realization of the bilinear interpolation method for NEQR. Sci. Rep. 7(1), 2511 (2017)
Acknowledgements
This work is supported by the National Natural Science Foundation of China under Grant No. 61463016, Training program of Academic and technical leaders of Jiangxi Province under Grant No. 20153BCB22002 and the advantages of scientific and technological innovation team of Nanchang City under Grant No. 2015CXTD003.
Author information
Authors and Affiliations
Corresponding author
Additional information
Ri-Gui Zhou and Jia Luo are both first authors
Rights and permissions
About this article
Cite this article
Zhou, RG., Luo, J., Liu, X. et al. A Novel Quantum Image Steganography Scheme Based on LSB. Int J Theor Phys 57, 1848–1863 (2018). https://doi.org/10.1007/s10773-018-3710-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-018-3710-x