1 Introduction

In recent years, the development of quantum information processing shows that the development of quantum computer systems has a tremendous impact on the field of computer science. The fundamental reason is that quantum computers are beyond the reach of traditional computers [1,2,3]. One of the goals of quantum computers is to solve complex problems that cannot be solved even in supercomputers. Therefore, because of the remarkable nature of quantum computers, many innovative ideas have emerged in all related fields such as quantum image processing. However, the use of quantum computers to accelerate certain deterministic signal processing tasks still not be achieved. Similarly, quantum computers also have some potential roles in some areas. For example, running a new type of quantum Fourier transform [4], wavelet transform and discrete cosine transform [5] and so on. However, quantum image processing in quantum computing still faces a large number of fundamental issues, such as the storage and presentation of quantum images.

Although there are many fundamental problems in quantum image processing, many methods that presentation of a quantum image was proposed in recent years. For example, the quantum logarithmic polar representation (QUALPI) proposed in Ref. [6], a novel quantum color digital image representation (NCQI [7]), and so on. Under these quantum representations, quantum watermarking has appeared many research results, such as watermarking scheme based on the Quantum Fourier Transform [8], watermarking scheme based on wavelet transform [9] and the Hadamard gate transform [10] proposed by Song et al. Jiang propose the quantum watermarking scheme based on LSB and the encryption algorithm based on quantum LSB [11]. A simple small-scale quantum circuit watermarking scheme was proposed [12]. In 2016, the quantum least significant bit algorithm based on the NCQI representation [13] was proposed. In 2018, the least significant bit algorithm based on the INEQR was proposed [14]. Similarly, there are some achievements in the sub-directions in image processing. In 2017, quantum space value domain filtering was proposed [15]. In 2018, Li proposed an improved frequency domain filtering method based on quantum color images [16]. For 2015 years, Mario proposed a quantum logic image denoising method [17]. Hua proposed a quantum image encryption algorithm based on image correlation decomposition [18]. Song proposed a method based on constrained geometry and color transformed quantum image encryption algorithm [19]. Zhou proposed an encryption scheme based on quantum iterative Arnold transform and quantum image shift operation [20]. In summary, although there are some problems in the current stage of quantum image processing, these not stop the rapid development trend.

In this paper, a double embedded watermarking scheme is proposed. Firstly, the watermark image is scrambled by the bit-plane scrambling method. Secondly, the watermark image is expanded by the quantum expansion circuit. Thirdly, utilizes the Fibonacci scrambling method to scramble the expanded image. Finally, the watermark image is embedded in the carrier image.

The rest of the paper is organized as follows. A brief basic theoretic knowledge is given in Section 2. In Section 3 a new quantum embedded watermarking scheme is proposed. Section 4 is devoted to the simulation-based experiments and analysis. Finally, the conclusion is drawn in Section 5.

2 Basic Knowledge

2.1 The Novel Enhanced Quantum Representation (NEQR)

The NEQR was first proposed in 2013 [21]. It uses q quantum bits to store the color values of each pixel [22], which is more convenient for the operation of image colors. According to NEQR this Eq. (1) is shown.

$$ \mid \mathrm{I}\left\rangle =\frac{1}{2^n}\sum \limits_{Y=0}^{2^n-1}\sum \limits_{X=0}^{2^n-1}\mid f\left(Y,X\right)\right\rangle \mid YX\left\rangle =\frac{1}{2^n}\sum \limits_{Y=0}^{2^n-1}\sum \limits_{X=0}^{2^n-1}\underset{i=0}{\overset{q-1}{\otimes }}\mid {C}_{YX}^i\right\rangle \mid YX\Big\rangle $$
(1)
$$ f\left(Y,X\right)={C}_{YX}^0{C}_{YX}^1\dots {C}_{YX}^{q-2}{C}_{YX}^{q-1},{C}_{YX}^k\in \left\{0,1\right\},f\left\langle Y,X\right\rangle \in \left\{0,{2}^q-1\right\} $$
(2)

Where the binary sequence \( \mid {C}_{YX}^0\left\rangle \mid {C}_{YX}^1\right\rangle \dots \mid {C}_{YX}^{q-2}\left\rangle \mid {C}_{YX}^{q-1}\right\rangle \)encodes the color value, and the gray range is2n, ∣YX〉 =  ∣ yn − 1yn − 2y1y0〉 ∣ xn − 1xn − 2x1x0〉, ∣ ylxl〉 ∈ {0, 1}encodes the vertical and horizontal coordinates information. Therefore, NEQR needs q + 2n qubits to represent an 2n × 2n image with gray range2n.

An example of 2 × 2 pixels image is shown in Fig. 1. In this example, the gray value ranges from 0 to 255, so the 8 qubits are needed to store this color information.

Fig. 1
figure 1

2 × 2 image

2.2 Fibonacci Image Scrambling

When the Fibonacci scrambling [23] acts on a digital classical image sized2n × 2n,this transformation can be defined as follows Eq. (3):

$$ \left(\begin{array}{c}{x}_F\\ {}{y}_F\end{array}\right)=\left(\begin{array}{cc}1& 1\\ {}1& 0\end{array}\right)\left(\begin{array}{c}x\\ {}y\end{array}\right)\left(\operatorname{mod}{2}^n\right)\kern0.1em $$
(3)

i.e.,

$$ {\displaystyle \begin{array}{c}{x}_F=\left(x\pm y\right)\operatorname{mod}{2}^n\\ {}{y}_F=x\end{array}} $$

(xF, yF) is the coordinates of the scrambled image.

The inverse Fibonacci transformation is defined as follows:

$$ \left(\begin{array}{c}x\\ {}y\end{array}\right)={\left(\begin{array}{cc}1& 1\\ {}1& 0\end{array}\right)}^{-1}\left(\begin{array}{c}{x}_F\\ {}{y}_F\end{array}\right)\left(\mathit{\operatorname{mod}}{2}^n\right)=\left(\begin{array}{cc}0& 1\\ {}1& -1\end{array}\right)\left(\begin{array}{c}{x}_F\\ {}{y}_F\end{array}\right)\left(\mathit{\operatorname{mod}}{2}^n\right) $$
(4)

i.e.,

$$ {\displaystyle \begin{array}{c}x={y}_F\\ {}y=\left({x}_F-{y}_F\right)\operatorname{mod}{2}^n\end{array}} $$

As shown in Eq. (4), the adder modulo plays an important role in the Fibonacci Scrambling, and its quantum circuit proposed in Ref. [23] is given as follows Fig. 3.

Plain adder network shown in Fig. 2 consists of basic sum circuit and carries circuit. Based on Plain adder, Ref. [23] designed a ADDER-MOD module as shown in Fig. 3.

Fig. 2
figure 2

Plain adder network

Fig. 3
figure 3

Adder modulo N

The reversible sum and reversible carries circuit proposed in Ref. [23] is shown in Fig. 4.

Fig. 4
figure 4

Basic sum and carry operation

3 Watermarking Scheme

At present, the implemented watermarking scheme usually uses the least significant bit algorithm. However, the embedded capacity is only a qubit. This paper proposes two kinds of watermarking scheme. One method is to embed the two bits of the watermark image into the image of the carrier image through the overlay method. Another method is to embed the two-qubit of the watermark image by itself, and then the operated watermark image is embedded into the carrier image. Next, the two kinds of watermarking methods are introduced.

3.1 Image Preprocessing

3.1.1 Image Bit-Plane Scramble

In 2015, the quantum image gray-code and bit-plane scrambling [24] was proposed by Zhou et al. Inspired by this article, this paper utilizes a similar pixel bit-plane algorithm. The bit-plane scramble circuit is shown in Fig. 5.

Fig. 5
figure 5

Bit-plane scramble circuit

Generally, an image has 8-pixel bit-plane. When the digital watermark image is transformed into a quantum watermark image through the NEQR, the digital bit-plane of the image becomes a qubit-plane. Next, watermark image is scrambled by a bit-plane scramble. Firstly, in accordance with the order of “0–4”, “1–5”, “2–6”, and “3–7”, these bit planes are exchanged through quantum swap gates. After the exchange is completed, if the quantum state of the pixel bit-plane in the original order “4567” is ∣1〉, 1-CNOT is used to change the other bit-plane pixel bit stream. Go through this operation, watermark image’s bit-plane order is changed and some bit-plane pixel’s bit stream is changed. Finally, the watermark image scramble is completed by means of the simple bit-plane scramble algorithm. Utilizes the scrambling circuit, the watermark image can be scrambled so as to achieve the scrambling effect in Fig. 6.

Fig. 6
figure 6

Bit-plane scramble effect

In Fig. 6, (a) is original watermark image, (b) scrambled watermark image. The grey-value image becomes chaotic after bit-plane scramble is executed. And then the scrambled image can’t be recognized.

3.1.2 Image Expand Method

The first step of the watermark image preprocessing has been completed. Next, utilizes the quantum expansion circuit to expand the scrambled watermark image, in order to gain the same size as carrier image. This expansion circuit is shown in Fig. 7.

Fig. 7
figure 7

quantum expansion circuit

Via the quantum expansion circuit, watermark image is expanded in accord with the order the clock-wise direction. Suppose there are a watermark image with the size of 1 × 1, and a carrier image with the size of4 × 4.Because of the original watermark image coordinate is [0, 0], expanded watermark image coordinate is [0, 0][0, 1][1, 0][1, 1]. Thus, utilizes the auxiliary qubits ∣0〉 record the expanded watermark image coordinate information and pixel bit-plane distribution information in Fig. 7. On account of the expand watermark image dependence the clock-wise direction, that’s the corresponding coordinates after the bit-plane expansion is “(0, 1) − [0, 0]”, “(2, 3) − [0, 1]”, “(4, 5) − [1, 1]”, “(6, 7) − [1, 0]”. Finally, the eight bit-plane is distributed and new watermark image is obtained. In the Fig. 7, \( \mid {C}_{xy}^0\cdots {C}_{xy}^7\Big\rangle \) represent the original watermark image bit-plane pixel value, auxiliary qubits ∣0〉 represent the coordinates and temporary memory pixel information, ∣x0xn − 1〉 ∣ y0yn − 1〉 represent original image coordinates information.

3.1.3 Image Fibonacci Scramble

Referring to the Fibonacci scramble formula (3) in Section 2.2, the expanded image can be encrypted through the scramble circuit in the Fig. 8.

Fig. 8
figure 8

Fibonacci scramble circuit

In Fig. 8, X and Y represent the expanded image’s coordinate information,XFand YF represent the scramble expanded image’s coordinate information. Through the scramble circuit, expanded watermark image is scrambled. However, expanded watermark image is sightless, so that the watermark image has an additional layer of protection and attacker cannot recognize the scrambled image.

3.2 Watermark Embedded Scheme

Through image preprocessing, the watermark image and the carrier image have the same size. All preparations have been completed. Next, the watermark image is need to be embedded in the carrier image. The entire embedded procedure is shown in Fig. 9.

Fig. 9
figure 9

Embedded procedure

Observe the Fig. 9, the watermark image is embedded in the carrier image after multiple operations. The first operation of the watermark image has been introduced in section 3.1. Next, the operation which the watermarking image is embedded, is shown in the following steps.

  1. Step 1:

    Watermark and carrier images are transformed into the quantum image ∣W〉and∣C〉through the NEQR.

  2. Step 2:

    Quantum watermark image is scrambled through the bit-plane scramble algorithm. The scrambled watermark image is disordered and chaotized, and then detail operation procedure is described in section 3.1.1. In the end, the scrambled watermark image ∣PW〉 is obtained.

  3. Step 3:

    The scrambled quantum watermark image is unable to embedded in the carrier, because of watermark image size is not the same as carrier image. Next, scrambled watermark image need to be expanded, so that watermark has the same size as carrier image. However, there is a problem that how to expand watermark image. In order to solve this problem, quantum expansion circuit is proposed in Fig. 7. Through quantum expansion circuit, watermark image ∣EPW〉 have the same size as carrier image and a detailed description of the expand procedure is shown in section 3.1.2.

According to the image preprocessing procedure, the extended watermark image needs to be re-encrypted by means of a Fibonacci scramble, so that the watermark image is less easily cracked by the attacker. This procedure is described in section 3.1.3.

  1. Step 4:

    In this step, the extended watermark image is embedded into the carrier image by two kinds of embedding methods. The descriptions of the two kinds of embedding methods are given in section 3.2.1 and 3.2.2.

3.2.1 Self-Embedded Watermark Scheme

In the previous section, the watermark was embedded into the carrier image, but it is not described that how to embed in carrier image. This section will introduce the first watermark embedding method in detail. a detailed embedded circuit is shown in Fig. 10.

Fig. 10
figure 10

Detailed Self-embedded circuit

In the Fig. 10, ∣K1〉 represent the least bit that the carrier image. Specific NEQR presentment is given in Eq. (5).

$$ \mid {K}_1\left\rangle =\frac{1}{2^n}\sum \limits_{Y=0}^{2^n-1}\sum \limits_{X=0}^{2^n-1}\underset{i=0}{\overset{q-1}{\otimes }}\mid {K}_{YX}^i\right\rangle \mid YX\Big\rangle \kern1.1em $$
(5)

Firstly, if the \( \mid {C}_{xy}^0\Big\rangle \) and \( \mid FEP{W}_{xy}^1\Big\rangle \) are equal, control swap gate is not performed. If the \( \mid {C}_{xy}^0\Big\rangle \) and \( \mid FEP{W}_{xy}^1\Big\rangle \) are not equal, this information is recorded through auxiliary qubit ∣0〉, and then \( \mid FEP{W}_{xy}^1\Big\rangle \) is embedded in \( \mid {C}_{xy}^0\Big\rangle \) through the control swap gates. Secondly, utilizes the ∣K1〉 record the recent carrier image \( \mid {C}_{xy}^0\Big\rangle \). Thirdly, if the \( \mid {C}_{xy}^0\Big\rangle \)and \( \mid FEP{W}_{xy}^0\Big\rangle \) are not equal, utilizes the auxiliary qubit∣0〉record this inequality information, and then auxiliary qubit state is ∣1〉when the \( \mid {C}_{xy}^0\Big\rangle \)and \( \mid FEP{W}_{xy}^0\Big\rangle \) are not equal, the carrier information is exchanged by the 1-CONT. In the end, quantum image ∣CW〉,∣K1〉and∣K2〉are obtained.

3.2.2 Superimposed Embedded Watermark Scheme

The first method of watermark image embedded scheme is introduced in section 3.2.1. Thus, the other method is introduced in this section and the detailed embedded circuit is shown in Fig. 11.

Fig. 11
figure 11

Detailed superimposed embedded circuit

Among them, ∣K1〉 represents an image with only one bit-plane, which is shown in Eq. (5),∣K2〉represents the key image that stores the original carrier image \( \mid {C}_{xy}^0\Big\rangle \)information. In this embedded circuit, firstly, utilizes the 1-CNOT record and store the \( \mid FEP{W}_{xy}^0\Big\rangle \) information. Secondly, if the state of the two bit-plane contained in the quantum image∣FEPW〉is not the same, the upper bit bit-plane is embedded in the low order through 1-CNOT. Finally, if the state of changed \( \mid FEP{W}_{xy}^0\Big\rangle \) and \( \mid {C}_{xy}^0\Big\rangle \)are not equal, this qubit is exchanged through the control swap gates. In the end, three quantum images ∣CW〉,∣K1〉and∣K2〉are obtained, and the quantum image ∣CW〉is the most important of the copyright businessman.

3.3 Watermark Extraction Scheme

The watermark image has been embedded in the carrier image through. However, if copyright businessman wants to get the embedded information that contained in the cover image, the extracting circuit is needed. Thus, the entire extracting circuit is introduced. The extract framework is shown in Fig. 12.

Fig. 12
figure 12

Watermark extract framework

In this figure, the quantum images ∣CW〉,∣K1〉and∣K2〉 are needed.

In Fig. 12, quantum images ∣CW〉,∣K1〉and∣K2〉 are obtained through NEQR, and then scrambled expanded watermark image is gained by quantum extract circuit. In the end, the original watermark image is restored through a set of reversible quantum circuits. The concrete operation can be divided into the following several steps.

  1. Step 1:

    A classical image that contained hidden information is loaded, next those relative key images are processed by NEQR quantum presentation.

  2. Step 2:

    After those relative images has been prepared, the carrier image that hidden secret information, and the key image is operated through the quantum extract circuit. Finally, the scrambled watermark image is gained. But due to the quantum extract circuit contain two kinds of watermark method, the watermark extract method is described in section 3.3.1and 3.3.2.

  3. Step 3:

    Quantum extract operation has been completed, but there gets a chaotic and unrecognized image that rooted in the carrier image. Next, reversible Fibonacci scramble is used to get the expanded watermark image. According to the Eq. (4), the chaotic and unrecognized image is restored, so that expanded watermark image is gotten. However, this image is not recognized, next the quantum restored circuit that shown in Fig. 13 is utilized to restore the watermark image.

    Fig. 13
    figure 13

    Quantum restored circuit

In the Fig. 13, ∣y0yn〉 and ∣x0xn〉 represents the expanded watermark’s coordinates information, ∣y0yn − 1〉 and ∣x0xn − 1〉represents the restored watermark’s coordinates information, \( \mid {C}_{xy}^0\cdots {C}_{xy}^7\Big\rangle \) represent the restored watermark’s bit-plane pixel information. Firstly, utilizes the quantum state ∣x0〉 and ∣y0〉 are used to express the expanded coordinates. Secondly, according to the relative coordinates, the original watermark image bit-plane pixels is assigned in new quantum coordinates. Finally, this image is restored through N-CNOT. However, this image is chaotic, so that watermark image is not recognized. On the basis of image preprocessing, reversible bit-plane is used to restore the original watermark image. According to the Fig. 5 bit-plane scramble circuit, reversible scramble circuit is shown in Fig. 14.

Fig. 14
figure 14

Reversible bit-plane scramble circuit

In Fig. 14, the scrambled image bit-plane is exchanged in accord with order “0–4”, “1–5”, “2–6”, “3–7”. And then 1-CNOT is utilized when the “0123” bit-plane quantum state is∣1〉.

  1. Step 4:

    the original watermark image is retrieved through quantum measurement.

3.3.1 Self-Embedded Extract Method

According to the step2, we will introduce the first method. This circuit is shown in Fig. 15.

Fig. 15
figure 15

Detailed extract circuit

Firstly, the watermarked carrier image \( \mid C{W}_{xy}^0\Big\rangle \) is recorded through auxiliary qubit ∣0〉, which represented the watermark least qubit\( \mid {W}_{xy}^0\Big\rangle \). Secondly, utilizes swap gates to restore carrier image, then the carrier image is restored. Finally, the key image ∣K1〉 is recorded through auxiliary qubit ∣0〉, which represented the watermark image qubit\( \mid {W}_{xy}^1\Big\rangle \). In the end, the watermark image is extracted.

3.3.2 Superimposed Embedded Extract Method

Compared with the first one self-embedded extract method, the other superimposed embedded extract method is simple and easy to implement. The detailed circuit is shown in Fig. 16.

Fig. 16
figure 16

Detailed extract circuit

In the Fig. 16, firstly, the original carrier image\( \mid C{W}_{xy}^0\Big\rangle \) is recorded through auxiliary qubit∣0〉, which represented the watermark qubit\( \mid {W}_{xy}^1\Big\rangle \). Secondly, the carrier image is restored by swap gates. Finally, the watermark image least qubit \( \mid {W}_{xy}^0\Big\rangle \) is restored through 1-CNOT recorded the key image ∣K1〉, so that encrypted watermark image is obtained. In the end, the original carrier image is restored while the encrypted watermark image is also acquired.

4 Experiments and Analysis

At present, quantum computers are in the theoretical stage and there is no available quantum computer to analyze this method. Thus, this article utilizes MATLAB2014b to simulate this experiment on a classical computer. So, this section gives the simulation experiment results of the proposed watermarking scheme [25]. The simulations are built on linear algebraic constructions. The quantum states and the quantum operations are simulated by complex vectors and unitary matrices [25]. In this experiment, we use bridge image [26], cameraman image, Barbara image and baboon image and so on to verify this idea. The watermark image size is256 × 256and carrier image size is512 × 512.

4.1 Robust Analysis

The robustness of the watermark, is the watermark information must be difficult to remove, or any attempt to destroy the watermark will result in a serious degradation of the image quality. Therefore, salt and pepper noise are added to the watermarked carrier image in this paper, and the robustness of the proposed scheme is obtained. as a rule, the PSNR is utilized to observe the watermark-image’s visually effect. If the visually effect is higher, the robustness of watermark is stronger. The PSNR as defined in the following Eq. (6). The robustness of the self-embedded method is shown in Table 1. The robustness of the superimposed embedded method is shown in Table 2.

Table 1 The robustness of the self-embedded method
Table 2 The robustness of the superimposed embedded method

In Table 1, it is seen that the comparison result between the extracted watermarked image and the original watermarked image. But the watermark image under this self-embedded method has a few missing, the robustness of self-embedded method is about 38db. Meanwhile, the robustness of superimposed embedded method is as same as the self-embedded method. In Table 2, the robustness of superimposed method is about 37db.

4.2 Visual Analysis

The peak-signal-to-noise ratio(PSNR), being one of the most used quantity in classical for comparing the fidelity of a watermarked image with its original version, will be used as our embedded carrier image evaluation quantity by transforming the quantum images into classical forms [26]. PSNR as defined in the following eq. (6). The more the watermarked image resembles its carrier image, the more the value of PSNR increases.

$$ PSNR=10\;{\log}_{10}\frac{MA{X}_I^2}{MSE}=20\;\log\;\frac{MA{X}_I}{\sqrt{MSE}}\kern0.2em $$
(6)

Therein, MAXIis the maximum possible gray-level value of the image. MSE is the mean squared error for two gray-scale images, a carrier image (or watermark) I and its watermarked version (or extracted watermark) O, as defined in the following Eq. (7).

$$ MSE=\frac{1}{mn}\;\sum \limits_{i=0}^{m-1}\sum \limits_{j=0}^{n-1}{\left[I\left(i,j\right)-O\left(i,j\right)\right]}^2\kern0.1em $$
(7)

The experiment result is shown in Fig. 17.

Fig. 17
figure 17

Experiment result

In the Fig. 17, (a) represent the carrier image, (b) represent the original watermark image, (c) represent the watermarked carrier image, (d) represent the extracted watermark image. In order to detect watermarked carrier image visual quality, the peak-signal-to-noise ratio is given in Tables 3 and 4.

Table 3 The PSNR values of the self-embedded method (PSNR [dB])
Table 4 The PSNR values of the superimposed embedded method (PSNR [dB])

Observe the peak signal-to-noise ratios of carrier image in the two watermarking embedded methods in Tables 3 and 4. The two watermark methods proposed in this paper have similar peak-to-noise ratios as same as others watermarking scheme. However, the two watermarking embedded methods in this paper have some other advantages. First, the embedding capacity is embedded 2-qubit information bit in the carrier image least significant qubit. Second, the circuit are simpler and more convenient in this paper.

4.3 Image Grey-Value Analysis

Now, there is another tool to evaluate the fidelity of the watermarking image, which is the histogram of the image. The images’ histogram is the frequency used to display the pixel intensity values. In the images’ histogram, the x-axis shows the grayscale intensity, and the y-axis shows the frequencies of these intensities. The histogram of the image has many applications in image processing. One of the applications is image analysis [27]. By looking at the histogram of the image, we can compare the grayscale and intensity of the image after the watermarked of the image. In order to further test the results of the experiment, a histogram of the three original carrier images and the embedded watermarked carrier image in Fig. 18. According to Fig. 18, the histogram of the watermarked image is very consistent with the histogram of the carrier image.

Fig. 18
figure 18

The histogram graphs of carrier images and watermarked images

5 Conclusion

In this article, two superimposed watermarking methods have been proposed. The watermark and carrier image sizes are used in this paper are 256 × 256 and 512 × 512, respectively.

In the paper, the two of the watermarking methods is proposed. Firstly, the watermark image and the carrier image are transformed into the quantum images by NEQR. Secondly, the watermark image is encrypted for the first time utilizes a new bit-plane scramble algorithm. Thirdly, the watermark image is extended to the same image as the carrier through the quantum expansion circuit. Fourthly, utilizes the Fibonacci scramble to encrypt the watermark image again. After the fourth operation has been completed, the watermark image will be embedded in the carrier image. The first self-embedded method is to separate all of the watermark image qubit planes, and then the qubit planes are respectively embedded in the least significant bits of the carrier image. Control swap gates and 1-CNOT gates is employed to complete this operation. The other superposition embedding method is to embed the high qubits of the watermark image in the least qubits of the watermark image, and then the operated lowest bits is embedded in the carrier image. Finally, a watermarked carrier image is obtained.

Next, the extraction of the watermark image is introduced. Firstly, the classical image is converted into a quantum image by NEQR. Secondly, the watermark image is extracted through detailed extract circuit, which is divided into two kinds of cases. The extracting method is similar, which is utilizes 1-CNOT and swap gate to accomplish this operation. Thirdly, the extracted watermark image is converted into the original watermark image by inverse Fibonacci, inverse extension and inverse qubit-plane scramble. Finally, the watermark image is restored.