Sum of all the grayscale differences between cover image and stego image.
Based on the novel enhanced quantum representation for quantum image (NEQR), a new blind quantum steganography scheme is proposed. In this scheme, an improved quantum representation of text utilizing ASCII is provided that uses two qubit sequences to store the same quantum text message. The general embedding process of the scheme is as follows: firstly, the cover image of sized 2 n × 2 n will be divided into eight blocks of sized 2 n − 2 × 2 n − 1 , and the secret quantum text of sized 2 n − 2 × 2 n − 1 is scrambled by Gray code transform method. Then, the disorder quantum text is embedded into the eight blocks of cover image employing the Gray code as a judgment condition. Meanwhile, the corresponding quantum circuits are drawn. Through the analysis of all quantum circuits, it can be concluded that the scheme has a lower complexity, that is, O(n). And the performance of the proposed scheme is analyzing in terms of simulation results of three items: visual quality, circuit complexity, and robustness.
- quantum steganography
- quantum text
- Gray code
- quantum circuit
With the advantage of quantum physics, quantum computer has demonstrated a bright prospect over than the classic computer, especially in Grover’s database searching algorithm  and Shor’s prime factor decomposition algorithm .
Over the past few decades, teams of researchers have been noticed by quantum image processing that is a young emerging cross-discipline of image processing and quantum mechanics. The investigation in this direction is how to construct the quantum representations to represent images on quantum computer at first. So various quantum representations have been proposed, such as, Qubit Lattice , entangled image , real ket , flexible representation of quantum images (FRQI) , a novel enhanced quantum representation of digital images (NEQR) , multi-channel representation for quantum images (MCRQI) , a normal arbitrary quantum superposition state (NAQSS) , and a novel quantum representation for color digital images (NCQI) . Secondly, many kinds of quantum image processing algorithms were developed, such as geometric transformations [11, 12], image translation [13, 14, 15], image scaling [16, 17, 18], image scrambling [19, 20, 21], image segmentation , feature extraction , edge detection , and image matching [25, 26].
It is worth pointing out that the protection of network information, especially the increasing number of multimedia information on the network, has attracted researcher’s attention. Thus information hiding was came into being a hot issue, which utilizes the sensory redundancy of the human sense organ to the digital signal, hiding a message in another ordinary message without changing the essential characteristics and use value of the ordinary message.
Similarly, quantum information hiding also includes steganography and watermarking, which have been gradually studied as the two main branches of quantum information hiding technology. In 2012, Iliyasu et al. proposed a quantum image watermarking algorithm based on restricted geometric transformations . Zhang et al. introduced a protocol in 2013, that the watermark image was embedded into the Fourier coefficients of the quantum carrier image . Later on, a dynamic watermarking scheme for quantum images based on Hadamard transform was proposed by Song et al. . Two blind steganography algorithms based on LSB were proposed by Jiang et al. . Miyake proposed a quantum watermarking scheme using simple and small-scale quantum circuits . In this algorithm, the gray scale image was first used as a secret image. A watermarking scheme through Arnold scrambling and LSB was proposed by Zhou et al. , in which the quantum equal circuit was demonstrated. In 2017, Abd-El-Atty et al. proposed a new steganography scheme with Hadamard transformation . In this scheme, the quantum text message was hided into the cover image. In addition, some algorithms that adopt color image as cover image have also been reported [34, 35, 36, 37]. Wherein, a quantum copyright protection method based on a new quantum representation of text was presented by Heidari et al. .
In order to reduce the qubits of the representation of text in literature , we introduce an improved quantum representation of text. Then, the quantum text will be embedded in cover image through utilizing Gray code and quantum gates. Furthermore, the extracting procedure is absolutely blind and without any other help from classical computer.
The physical implementation of qubits and gates is difficult, for the same reasons that quantum phenomena are hard to observe in everyday life. One approach is to implement the quantum computers in superconductors, where the quantum effects become macroscopic, though at a price of extremely low operation temperatures.
In a superconductor, the basic charge carriers are pairs of electrons (known as Cooper pairs), rather than the single electrons in a normal conductor. At every point of a superconducting electronic circuit (that is a network of electrical elements), the condensate wave function describing the charge flow is well-defined by a specific complex probability amplitude. In a normal conductor electrical circuit, the same quantum description is true for individual charge carriers, however the various wave functions are averaged in the macroscopic analysis, making it impossible to observe quantum effects. The condensate wave function allows designing and measuring macroscopic quantum effects. And successive generations of IBM Q processors have demonstrated the potential of superconducting transmon qubits as the basis for electrically controlled solid-state quantum computers. But in this chapter, we focus on the theoretical design of quantum steganography scheme and describe it in the remaining sections.
The rest of the chapter is organized as follows. Section 2 gives fundamental knowledge of NEQR, Gray code and quantum equal circuit. The improved quantum representation of text is provided in Section 3. The proposed embedding and extracting procedures are depicted in Section 4. In Section 5, simulations and analysis that include visual quality, capacity, robustness, and computational complexity are provided. Finally, the conclusion is drawn in Section 6.
For a gray scale image, a novel enhanced quantum representation of digital images (NEQR) was proposed in 2013 . A quantum image can be described by the NEQR model as follows:
where, represents the position information and encodes the color information.
Thus, there are qubits being employed to store image information into a NEQR state for an image with gray range . An example of an 2 × 2 image with ranged , i.e.,
Replace the entirety of this text with the main body of your chapter. The main body is where the author explains experiments, presents and interprets data of one’s research. Authors are free to decide how the main body will be structured. However, you are required to have at least one heading. Please ensure that either British or American English is used consistently in your chapter.
2.2 Gray code
The typical binary Gray Code, called the Gray Code, was originally proposed by Frank Gray in 1953 for communication purposes and is now commonly used in analog-to-digital and position-to-digital conversion. In a group of Gray codes, there is only one different binary number between any two adjacent codes, as well as in the maximum and minimum numbers. By Gray code transform, the binary code can be converted into Gray code . Denote as a
and its inverse transform is:
The transformed binary code is defined as the
3. The improved representation of quantum text
ASCII (American Standard Code for Information Interchange) is a Latin alphabet-based computerized coding system that is the most versatile single-byte coding system available today . The ASCII code uses the specified combination of 7-bit or 8-bit binary sequence to represent 128 or 256 possible characters. A standard ASCII code that uses 7-bit binary sequence (a total 8-bit sequence and the remaining 1-bit is 0) to represent all uppercase and lowercase letters, Arabic numerals, punctuation marks, and special control characters used in American English. Zero to thirty one and 127 (33 in total) are special characters for control or communication, and the rest are displayable characters. Figure 5 shows a table of characters that can be displayed.
Through analysis of the quantum text representation model proposed in literature , it is known that the model uses a seven-qubit sequence to store one character in the text message. In our proposed scheme, an improved quantum representation of text based on ASCII is proposed. Like NEQR model, the model including text message and position information. The text message on the corresponding coordinates is encoded using ASCII of 8-bit binary sequence , this quantum text-representation model can be expressed as in Eq. (5) for a text.
Figure 6 illustrates an example of a 2 × 4 text and its representative expression, where eight qubits are desired to store the text message and three qubits to store the position information. Therefore, this model just needs qubits to represent a text, namely there are symbols be stored. It is can be captured according to  which fifty-six qubits and qubits are required to represent the text in this example and a text of symbols, respectively.
In order to embed the text information into quantum image, firstly, the text information needs to be transformed into a quantum state. The preparation procedure will now be described.
Step 1: this step is to prepare qubits that all are with state . The initial state can be expressed as in Eq. (6):
Step 2: two single-qubit gates,
Step 3: In this step, sub-operations used to store the text message value for every position. In position , the unitary operation is shown below:
where, is a unitary operation as shown in Eq. (11), which is manipulating on for altering digital representation of characters to the quantum state.
And if , is a (
Applying on intermediate state , the transformation is shown in Eq. (13).
To store all the values to the quantum state, the whole operation
4. Proposed scheme
This section will discuss the particulars of embedding and extracting procedures about the proposed steganography scheme that hides a secret text into a cover grayscale image. Assume that the sizes for cover image and secret text are and , respectively, the quantum representation can be formulated in Eqs. (15) and (16).
The general framework for the proposed scheme is shown in Figure 7, from which we can see that it is delineated into the classical and quantum domains. The preparation interface can transform classic image data into quantum states, which realizes the function of preparing the quantum image . After the quantum image is stored in quantum states, our proposed quantum image steganography scheme can be implemented to transform the original quantum states to the desired states through the designed embedding circuits. Then, the quantum measurement operation is utilized to retrieve the processed image information. And once identified, the stego image is sent to the receiver by the public channel. The extraction operations are similarly for the receiver.
4.1 Embedding procedure
The embedding procedure in the proposed scheme is as follows.
Transform a classical cover image with size and eight bits gray scale into a quantum image by NEQR, and transform a secret text with size into a quantum text by ASCII expression.
Scramble the secret text to be a meaningless text by Gray code transforming method.
The cover image will be divided into eight blocks of the same size and the secret text will be divided into eight bit-planes.
The divided eight bit-planes are embedded into eight blocks one by one.
For purpose of improving the security of secret text, the text message of will be scrambled by Gray code transform before the embedding procedure. As mentioned in Subsection 2.2, in the eight qubits which store the text message, seven CNOT gates are used according to Gray code transform method, while the qubits representing for position information are not changed by quantum gates, the corresponding circuit is demonstrated in Figure 8.
In the proposed scheme, the cover image is divided into blocks sized . We define these blocks as , where and are called control coordinates because if they are restricted as a specific value, then one of blocks will be selected. For example, if their values are equal to and , then pixels in the top-left corner, that is, the first block is designated. For quantum text, the binary length of text message is eight, i.e., the text can be separated into eight bit-planes. Assume that the highest bit is embedded in , the second highest bit is embedded in , and so on. An example of partition with cover image size of and secret text size of is illustrated in Figure 9.
After dividing the cover image, the quantum equal (QE) circuit is used to compare the coordinates of a block and quantum text. Then, the stego image is obtained after embedding process. More specifically, taking one of the blocks as an illustration, if the coordinates of is equal to the coordinates of , is embedded in by the following pseudo-code.
If is even
Else if is odd
If is even
Else if is odd
where the function is the Gray code value of
4.2 Extraction procedure
Like all the information hiding papers, only the receiver can extract the message. But it is worth pointing out the receiver only uses the stego image to extract the secret text in our scheme that means it is a blind scheme. The extracting procedure can be described as follows.
Extract and reorganize the bit plane from the stego image to obtain the disordered text .
Descramble by using inverse Gray code transform in order to obtain original secret text.
As can be seen from the above, the eight bit-planes of the secret text can be extracted from the eight blocks of the stego image. Accordingly, we can consider one block as an example. If the position of the stego image and the auxiliary blank quantum text are equal, and is even and or is odd and , then . The corresponding circuit is shown in Figure 11a, and a whole extracting circuit that combines the extraction of all eight blocks together is exposed in Figure 11b.
Due to the operators used in embedding process are unitary, for this step of extracting process, we can use the inverse transpose of operators used in the embedding process. Figure 12 affords the quantum circuit to extract the secret image from.
5. Simulations and analysis
In this section, some simulations and analysis of the results and properties of the proposed scheme are demonstrated. All the simulations are based on a classical computer equipped with software Matlab R2014b. The secret text of size 64 × 128 used in our proposed scheme is full of “Quantum Text and Quantum Image.” And all the cover images are with size of 256 × 256, and shown in Figure 13.
In general quantum image steganography scheme, the peak-signal-to-noise ratio (PSNR) is one of the most employed techniques to compare the fidelity of the stego image and the cover image. However, Iliyasu et al. explained that these available classical metrics are insufficient and/or ill-suited to effectively quantify the fidelity between two or more quantum images . And in Refs. [39, 40], a wholly quantum-based metric to assess fidelity between quantum images (QIFM) is proposed. By using a statistical analysis they established that the proposed QIFM metric had a better correlation with digital image quality assessments of congruity than the other quantum image quality measures. And the formulation of the QIFM metric is the important in ensuring that applications sensitive to the peculiarities of quantum computation are formulated for effective quantum image processing (QIP). Before this, inspired to Ref.  that proposed a method to analyze the similarity between two quantum images of the same size based on the flexible representation of quantum images, a quantum image matching algorithm was introduced in , which sums up all the grayscale differences between two quantum images. In this chapter, we use the above two algorithms to assess the similarity of two images.
5.1 Visual quality
To verify the visual quality of the proposed scheme, we use the algorithm introduced in  to compare the congruity of the stego image and the cover image. Here, we briefly describe the algorithm as follows and the details can be acquired in .
Quantum stego image is directly mapped with quantum cover image, i.e., the quantum register representing each corresponding pixel of the quantum template image is subtracted from that of the quantum reference image by running a quantum subtractor. According to the quantum measurement results, all the grayscale difference can be summed. The smaller the sum, the higher the similarity between two quantum images, that is, the better visual quality of the stego image.
Table 1 shows the sum of all the grayscale differences between the stego image and the cover image, in which the secret text 1 is embedded.
|Cover image||Stego image||Sum of differences|
Compared with the value 5,189,090 of Lena with watermark in Ref. , we can see that the values of the sum all the grayscale differences between cover image and stego image in our proposed scheme are smaller.
In a noise-free environment, the proposed scheme can extract an intact secret text. However, the text extracting procedure is not always performed in a noiseless environment. The fidelity of the extracted text from the stego image under noise (simulate with salt and pepper noise) is verified, that is, using the QIFM metric. In this chapter, we give an outline of the steps of QIFM metric. For more details of the concepts and principles of QIFM, the reader can referred to .
Based on a pixel threshold (p) that assigns a value of zero or one to the pixel when or , respectively. The content of both the cover and stego image is converted into their binary versions. Then the binary detail between cover image
where the for an pixel image is defined in:
Here, the notations and for the cover image and and for the stego image, which are referred to the number of white (0) and black (1) pixels in the cover and stego images.
Next, we count the number of pixel correspondences,
where BER denotes the bit error rate.
Finally, the fidelity of two images expressed in the form of a percentage is quantified by equation:
As can be found from Table 2, four frequently-used cover images are used here as examples, when the value of the noise densities is set to 0.1. The average value of QIFM values is around 91, which is considered that the extracted text have a good fidelity.
|Stego image||QIFM values of two texts|
5.3 Circuit complexity
The circuit complexity depends on the number of the elementary quantum gates. Thus, we take
In extracting part, the complexity of descrambling circuit is 7, and the extracting circuit is consist of eight QE circuits with three control qubits and eight extracting blocks with one control qubit. The complexity of extracting circuit is:
Therefore, the circuit complexity of the proposed scheme is , i.e., .
This chapter proposes a new grayscale image steganography scheme which using NEQR representation to represent a cover image and presenting an improved representation of quantum text to store secret text with symbols. The Gray code of the highest three qubits of the gray value of the cover image is used as a judgment condition in embedded procedure. The acquisition of secret text is a process of extracting and reorganizing and inversely scrambling eight bit-planes, and it is worth mentioning that the process is absolutely blind. In addition, simulation results about the visibility quality and robustness of the proposed scheme are provided. And the circuit complexity is analyzed at last.
This work is supported by the National Key R&D Plan under Grant No. 2018YFC1200200 and 2018YFC1200205, National Natural Science Foundation of China under Grant No. 61463016 and “Science and technology innovation action plan” of Shanghai in 2017 under Grant No. 17510740300.
Conflict of interest
The authors declare no conflict of interest.
Grover LK, Labs B, Avenue M, Nj MH. A fast quantum mechanical algorithm for database search. In: Twenty-Eighth ACM Symposium on Theory of Computing. 1996. pp. 212-219
Peter W, Labs AB, Ave M, Hill M. Algorithms for quantum computation: Discrete logarithms and factoring. In: Proceedings of 35th Annual Symposium on Foundations of Computer Scienece. 1994. pp. 124-134
Venegas-Andraca SE, Bose S. Storing, processing and retrieving an image using quantum mechanics. In: Proceedings of SPIE—The International Society for Optical Engineering. 2003
Venegas-Andraca SE, Ball JL. Processing images in entangled quantum systems. Quantum Information Processing. 2010; 9(1):1-11
Latorre JI. Image compression and entanglement. Quantum Physics. 2005; 3:3-6
Le PQ, Dong F, Hirota K. A flexible representation of quantum images for polynomial preparation, image compression, and processing operations. Quantum Information Processing. 2011; 10(1):63-84
Zhang Y, Lu K, Gao Y, Wang M. NEQR: A novel enhanced quantum representation of digital images. Quantum Information Processing. 2013; 12(8):2833-2860
Sun B, Le PQ, Iliyasu AM, Yan F, Garcia JA, Dong F, et al. A multi-channel representation for images on quantum computers using the RGB D color space. In: 2011 IEEE International Symposium on Intelligent Signal Processing (WISP). 2011
Qingxin HL, Zhou ZR, Yang LSX. Multi-dimensional color image storage and retrieval for a normal arbitrary quantum superposition state. Quantum Information Processing. 2014; 13:991-1011
Sang J, Wang S, Li Q. A novel quantum representation of color digital images. Quantum Information Processing. 2017; 16(2):42
Le PQ, Iliyasu AM, Dong F, Hirota K. Fast geometric transformations on quantum images. International Journal of Applied Mathematics. 2010; 40(3):113-123
Fan P, Zhou R, Jing N, Li H. Geometric transformations of multidimensional color images based on NASS. Information Sciences. 2016; 340-341:191-208
Fan P, Zhou R. Quantum Gray-scale image translation transform the representation of quantum Gray-scale image. Quantum Information Processing. 2015; 23:8763-8770
Zhou R, Tan C, Ian H. Global and local translation designs of quantum image based FRQI. International Journal of Theoretical Physics. 2017; 56(4):1382-1398
Wang J, Jiang N, Wang L. Quantum image translation. Quantum Information Processing. 2015; 14:1589-1604
Zhou R, Hu W, Fan P, Ian H. Quantum realization of the bilinear interpolation method for NEQR. Scientific Reports. 2017; 7(1):2511
Sang J, Wang S, Niu X. Quantum realization of the nearest-neighbor interpolation method for FRQI and NEQR. Quantum Information Processing. 2016; 15(1):37-64
Jiang N, Wang L. Quantum image scaling using nearest neighbor interpolation. Quantum Information Processing. 2015; 14(5):1559-1571
Heidari S, Vafaei M, Houshmand M, Tabatabaey-Mashadi N. A dual quantum image scrambling method. Quantum Information Processing. 2019; 2:1-23
Jiang N, Luo WW. The quantum realization of Arnold and Fibonacci image scrambling. 2014; 13:1223-1236
Sun RZY, Fan P. Quantum image Gray-code and bit-plane scrambling. Quantum Information Processing. 2015; 14:1717-1734
Caraiman S, Manta VI. Image segmentation on a quantum computer. Quantum Information Processing. 2015; 14(5):1693-1715
Zhang Y, Lu K, Xu K, Gao Y, Wilson R. Local feature point extraction for quantum images. Quantum Information Processing. 2015; 14:1573-1588
Yi Z, Kai LU, Yinghui GAO. QSobel: A novel quantum image edge extraction algorithm. Science China Information Sciences. 2015; 58(1):1-13
Zhou RG, Liu XA, Zhu C, Wei L, Zhang X, Ian H. Similarity analysis between quantum images. Quantum Information Processing. 2018; 17(6):1-12
Yang YG, Zhao QQ, Sun SJ. Novel quantum gray-scale image matching. Optik. 2015; 126(22):3340-3343
Iliyasu AM, Le PQ, Dong F, Hirota K. Watermarking and authentication of quantum images based on restricted geometric transformations. Information Sciences. 2012; 186(1):126-149
Zhang W-W, Gao F, Liu B, Wen Q-Y, Chen H. A watermark strategy for quantum images based on quantum fourier transform. Quantum Information Processing. 2013; 12(2):793-803
Song X, Wang S, Abd AA. Dynamic watermarking scheme for quantum images based on Hadamard transform. Multimedia Systems. 2014; 20(4):379-388
Jiang N, Zhao N, Wang L. LSB based quantum image steganography algorithm. International Journal of Theoretical Physics. 2016; 55:107-123
Miyake S, Nakamae K. A quantum watermarking scheme using simple and small-scale quantum circuits. Quantum Information Processing. 2016; 15(5):1849-1864
Wenwen RZ, Ping H. Quantum watermarking scheme through Arnold scrambling and LSB steganography. Quantum Information Processing. 2017; 16(9):212-242
Sang J, Wang S, Li Q. Least significant qubit algorithm for quantum images. Quantum Information Processing. 2016; 15(11):4441-4460
Heidari S, Gheibi R, Houshmand M, Nagata KA. Robust blind quantum copyright protection method for colored images based on owner’s signature. International Journal of Theoretical Physics. 2017; 56(8):2562-2578
Li P, Zhao Y, Xiao H, Cao M. An improved quantum watermarking scheme using small-scale quantum circuits and color scrambling. Quantum Information Processing. 2017; 16(5):127
Qu Z, He H, Li T, Liu K, Li J, Zhu J, et al. Novel quantum watermarking algorithm based on improved least significant qubit modification for quantum audio. Chinese Physics B. 2018; 27(1):010306
Heidari S, Farzadnia E. A novel quantum LSB-based steganography method using the Gray code for colored quantum images. Quantum Information Processing. 2017; 16(10):1-28
Gorn S. Proposed revised american standard code for information interchange. Communications of the ACM. 1965; 8(4):207-214
Iliyasu AM, Abuhasel KA. A quantum-based image fidelity metric. In: 2015 Science and Information Conference (SAI); IEEE. 2015. pp. 664-671
Iliyasu AM, Yan F. Metric for estimating congruity between quantum images. Entropy. 2016; 18(10):360
Yan F, Le PQ, Iliyasu AM, Sun B, Garcia JA, Dong F, et al. Assessing the similarity of quantum images based on probability measurements. In: 2012 IEEE Congress on Evolutionary Computation. 2012. pp. 10-15
Barenco A, Bennett CH, Cleve R, Divincenzo DP, Margolus N, Shor P, et al. Elementary gates for quantum computation. Physical Review A. 1995; 52(5):3457-3467