| Literature DB >> 33266591 |
Xingbin Liu1, Di Xiao1, Cong Liu2.
Abstract
Quantum image encryption offers major advantages over its classical counterpart in terms of key space, computational complexity, and so on. A novel double quantum image encryption approach based on quantum Arnold transform (QAT) and qubit random rotation is proposed in this paper, in which QAT is used to scramble pixel positions and the gray information is changed by utilizing random qubit rotation. Actually, the independent random qubit rotation operates once, respectively, in spatial and frequency domains with the help of quantum Fourier transform (QFT). The encryption process accomplishes pixel confusion and diffusion, and finally the noise-like cipher image is obtained. Numerical simulation and theoretical analysis verify that the method is valid and it shows superior performance in security and computational complexity.Entities:
Keywords: Arnold transform; information security; quantum Fourier transform; quantum image encryption; quantum image representation
Year: 2018 PMID: 33266591 PMCID: PMC7512429 DOI: 10.3390/e20110867
Source DB: PubMed Journal: Entropy (Basel) ISSN: 1099-4300 Impact factor: 2.524
The scrambling period of Arnold transform.
| Image Size | Period |
|---|---|
|
| 12 |
|
| 24 |
|
| 48 |
|
| 96 |
|
| 192 |
Figure 1The scrambling circuits for (a) and (b) .
Figure 2Three pairs of original images and corresponding cipher images.
Figure 3The histograms of original images and cipher images.
Correlation coefficients of original images and cipher images.
| Correlation Coefficient | Horizontal | Vertical | Diagonal |
|---|---|---|---|
| 0.5720 | 0.6781 | 0.5722 | |
| 0.9557 | 0.9231 | 0.8861 | |
| −0.0368 | −0.0111 | 0.0135 | |
| 0.8702 | 0.6628 | 0.6315 | |
| 0.9045 | 0.9315 | 0.8633 | |
| −0.0351 | 0.0396 | −0.0260 | |
| 0.9939 | 0.9859 | 0.9791 | |
| 0.9548 | 0.9565 | 0.9079 | |
| 0.0004 | −0.0121 | 0.0128 |
Figure 4The distribution of adjacent pixels in horizontal, vertical and diagonal directions.
The information entropy of original and cipher images.
| Images | IE |
|---|---|
| 7.1273 | |
| 7.5693 | |
| 7.7459 | |
| 7.1208 | |
| 6.7040 | |
| 7.7289 | |
| 7.4457 | |
| 7.5046 | |
| 7.7578 |
Figure 5The recovered results of different noise intensity attack.
Figure 6The mean square error (MSE) curves under different intensities of noise.
Figure 7The decryption result with (a) correct keys, (b) incorrect random rotation matrix , (c) incorrect random rotation matrix , (d) incorrect quantum Arnold transform (QAT) parameters, and (e) another pair of incorrect QAT parameters.
The key space comparison results.
| Encryption Algorithms | Key Space |
|---|---|
| Proposed algorithm |
|
| Reference [ |
|
| Reference [ |
|
| Reference [ |
|
| Reference [ |
|
| Reference [ |
|
The computational complexity of each step and overall complexity.
| Step 1 | Step 2 | Step 3 | Step 4 | Step 5 | Overall Complexity |
|---|---|---|---|---|---|
|
|
|
|
|
|
|