Novel quantum secret image-sharing scheme
Luo Gao-Feng1, 2, 3, Zhou Ri-Gui1, 3, †, Hu Wen-Wen1, 3
College of Information Engineering, Shanghai Maritime University, Shanghai 201306, China
College of Information Engineering, Shaoyang University, Shaoyang 422000, China
Research Center of Intelligent Information Processing and Quantum Intelligent Computing, Shanghai 201306, China

 

† Corresponding author. E-mail: rgzhou@shmtu.edu.cn

Abstract
Abstract

In this paper, we propose a novel quantum secret image-sharing scheme which constructs m quantum secret images into m+1 quantum share images. A chaotic image generated by the logistic map is utilized to assist in the construction of quantum share images first. The chaotic image and secret images are expressed as quantum image representation by using the novel enhanced quantum representation. To enhance the confidentiality, quantum secret images are scrambled into disordered images through the Arnold transform. Then the quantum share images are constructed by performing a series of quantum swap operations and quantum controlled-NOT operations. Because all quantum operations are invertible, the original quantum secret images can be reconstructed by performing a series of inverse operations. Theoretical analysis and numerical simulation proved both the security and low computational complexity of the scheme, which has outperformed its classical counterparts. It also provides quantum circuits for sharing and recovery processes.

1. Introduction

Recent years have witnessed a rapid development in information technology. However, security problems of digital images are a major problem in transmitting vital images. A large number of real-time image processing tasks have brought new challenges to classical computers. Fortunately, quantum computation[1] brings hope for traditional information processing. A quantum computer has been demonstrated to have bright prospects as compared with the classical computer, particular with respect to Feynmanʼs computation model,[2] Shorʼs integer factoring algorithm,[3] and Groverʼs database searching algorithm.[4]

With the development of quantum computation, an emerging branch, i.e., quantum image processing (QIP)[5,6] is attracting more and more attention. It focuses on extending classical image processing tasks and operations to the quantum computation framework. Available literature on QIP can be classified into two groups. In the first, methods to represent quantum images have been proposed, such as a flexible representation of quantum images,[7] a novel enhanced quantum representation (NEQR) of the digital image model,[8] and a normal arbitrary quantum superposition state.[9] In the second, QIP algorithms have been investigated, such as quantum image scaling,[10,11] quantum image matching,[12,13] quantum image steganography,[1416] and quantum image watermarking.[1720] In particular, quantum image encryption[2124] has begun to draw increasing attention in recent years. For example, in [21], a novel image encryption scheme based on quantum walks was proposed, which opens the door towards introducing quantum computation into image encryption. In [22], a novel quantum grayscale image encryption algorithm based on one-dimensional quantum cellular automata was proposed. The proposal has outperformed its classical counterpart in terms of security and computational complexity.

Just as the research on quantum image encryption has become an attractive field, quantum secret sharing,[2528] which is an important branch of quantum communication,[29] also attracts increasing attention nowadays. From a historical viewpoint, Naor and Shamir[30] presented a visual secret-sharing scheme first which encrypts a secret binary image into n meaningless share images such that the information of the secret image can be decrypted by superimposing all n share images. After that, secret sharing has become a favorite research topic, especially quantum schemes. Theoretically, as a quantum image is still a quantum state, it can also be shared. Quantum secret image sharing, different from traditional secret sharing, is sharing entangled states of a quantum image. To the best of our knowledge, few papers have been published on this issue previously. For example, a novel and flexible quantum image secret-sharing scheme was proposed,[31] which generates shares via measurement operations on the secret image. Two efficient remote medical image-sharing schemes were proposed,[32] which utilize quantum information hiding techniques. Obviously, the research on quantum image sharing is deficient at present. Inspired by the above-mentioned schemes of quantum image processing techniques, this paper mainly focuses on quantum secret image sharing, which constructs m quantum secret images into m+1 quantum share images.

The rest of this paper is organized as follows. Section 2 gives some preliminaries related to the work. Section 3 is devoted to the proposed scheme. Simulation-based experiments and an analysis are presented in Section 4. Finally, Section 5 draws conclusions.

2. Preliminaries
2.1. NEQR

The novel enhanced quantum image representation (NEQR) of digital images[8] using two entangled qubit sequences integrates quantum image information, including coordinates position and color information, into a normalized superposition quantum state. For a quantum image with grayscale ranged , the representative expression of the NEQR image is expressed as:

where the q-qubit sequence encodes the color information and two n-qubit sequences of and encode the position information in the vertical and horizontal directions, respectively.

To represent a quantum grayscale image, NEQR needs eight qubits encoding the pixel information, which have 256 grayscale densities. Figure 1 shows a quantum grayscale image and its NEQR expression.

Fig. 1. 2 × 2 quantum image and its NEQR expression (figure adapted from [8]).
2.2. Logistic map

As a classical algorithm, the logistic map plays an essential role in image encryption because of its high sensitivity to initial conditions, system parameters, and pseudo-random property. In the proposed quantum secret image-sharing scheme, the logistic map is used to generate pseudo-numbers, which are defined as

where , X0 is the initial value, , . When , it can generate pseudo-random numbers within the range (0,1).

2.3. Arnold transform

Arnold transform aims to transform an image into a meaningless one through permutation of the positions of the pixels into new positions. Assume that I(X,Y) is an original image with a size of and are corresponding coordinates of pixels for the original image and the scrambled image, respectively. The Arnold transform can be defined as:

where The inverse Arnold transformation is

2.4. Basic quantum gate operations and related circuits

(i) Controlled-NOT operation

In quantum computers, the basic controlled operation is the controlled-NOT (CNOT), which is a quantum gate with two qubits, namely the control qubit and the target qubit (Fig. 2). In terms of the computational basis, the action of the CNOT is given by . That is, if the control qubit is set to , the target qubit is flipped, otherwise the target qubit is left alone.

Fig. 2. Quantum CNOT gate.

(ii) Quantum swap gate

The quantum swap gate is a two-qubit gate, which can exchange two qubits. The corresponding quantum circuit is shown in Fig. 3.

Fig. 3. Quantum swap gate.

Zhou et al. designed the quantum equal (QE) circuit for comparing two qubit sequences.[33] The concrete quantum circuit and its simplified module are illustrated in Fig. 4, where , , , . The output qubit represents the compare result. If , ; otherwise, . Obviously, the QE module can be utilized to decide whether the coordinates of two quantum images of the same size are equal or not.

Fig. 4. (a) QE circuit and (b) simplified module of QE.
3. Proposed scheme

In this section, we will first provide a high-level description of our scheme. The intuition of our scheme using three phases including qubit scrambling, qubit swapping, and the qubit CNOT operation, is to share multiple quantum secret images. In the first phase, the original quantum secret images are scrambled by Arnold transform, which is often used as the image preprocessing method in information hiding. Furthermore, since a grayscale image can be decomposed into eight binary images, a quantum grayscale image also consists of eight binary qubits (i.e., eight qubit planes). To make the shares random, qubit planes are swapped with the participation of the quantum chaos image. Finally, to enhance the security, the quantum CNOT operation is employed, which makes the secret completely random and secure. The process of quantum secret image sharing and recovery is outlined in Fig. 5. More specific details are discussed subsequently.

Fig. 5. Quantum secret image-sharing framework.
3.1. Sharing process
3.1.1. Preparation

Assume there are m secret images, named I1, I2, …, Im, with the same dimensions and 8-bit grayscale. These secret images can be transformed into quantum states by using NEQR as follows:

where . and encode the position information in vertical and horizontal directions, respectively.

Meanwhile, in the proposed scheme, a meaningless chaotic image created by the logistic map is prepared. For logistic map and a given initial value X0 and μ, we do iterations. numbers ranged (0,1) are obtained. Then the normalization processing is carried out to generate a random matrix , , and . All values ranged [0, 255] would be viewed as the grayscale information of the chaotic image I0. The chaotic image can be transformed into quantum states by using NEQR as follows:

Thus, m quantum secret images and a quantum chaotic image are prepared and utilized to construct m+1 quantum share images.

3.1.2. Arnold scrambling

To enhance the confidentiality, the original quantum secret image ( ) is scrambled into a disordered image . In the proposed scheme, the main aim is to scramble the position of each pixel of the secret image. The quantum Arnold image scrambling in previous works[34,35] showed that it is a simple image scrambling method, with low computational complexity. Hence, Arnold scrambling is suitable for the proposed scheme. According to the classical Arnold transform introduced above, the quantum representation of the Arnold transform can be deduced. Here we define the Arnold transform as A (inverse Arnold transform as ), the scrambled quantum secret image as , and the process of scrambling can be defined as:

where

3.1.3. Qubit plane swapping

In this process, qubit planes of the scrambled quantum secret images and the quantum chaotic image are swapped in a predefined order. First, the coordinates of the quantum chaotic image are compared with those of the scrambled quantum secret images , , and through QE modules. The quantum circuit for comparing the coordinates is designed as shown in Fig. 6, where the output qubits ( ) act as the control qubits. If all of the output qubits satisfy , that is, the coordinate values of a certain pixel in all of the quantum images are equal, the following steps are performed.

Fig. 6. Quantum circuit for the comparison with coordinates.

Step 1 Swap four most significant qubit (MSQb) planes of with four least significant qubit (LSQb) planes of .

Step 2 Swap four MSQb planes of with four LSQb planes of .

Step 3 Swap four MSQb planes of with four LSQb planes of ( ).

Step 4 Swap four MSQb planes of with four LSQb planes of .

The quantum swapping circuit is illustrated in Fig. 7. It is not difficult to find that all the shares appear to be random after the swapping process of qubit planes. For convenience, we call them immediate shares, , , …, and .

Fig. 7. Swapping circuit.
3.1.4. Quantum controlled-NOT operation

To obtain the final quantum share images, the quantum controlled-NOT operation (introduced in Subsection 2.4) is utilized to realize a quantum image XOR operation. We define

that is,
For a quantum image with a size of , the quantum controlled-NOT operations on grayscale information of every pixel can be divided into sub-operations TYX. It can be constructed by the controlled-NOT operation UYX as follows:
where TYX is a unitary matrix and satisfies , and is the Hermitian conjugation matrix of TYX. Obviously, each sub-operation can only implement the XOR operation on the grayscale information for its corresponding pixel. The XOR operations for quantum images are defined as
As mentioned above, QE modules are also used to compare the coordinates of , , …, and . The output qubits of the QE module act as the control qubits of the quantum image XOR operation circuit, which is shown in Fig. 8.

Fig. 8. Quantum image XOR operation.
3.2. Recovery process

All m+1 quantum share images collected together are used to reconstruct the original quantum secret images. The recovery process consists of four steps.

Step 1 To obtain the immediate shares, the controlled-NOT operation is also utilized to realize the quantum image XOR operation, as follows:

that is
where .

Step 2 Execute the reverse operation for qubit plane swapping, and the scrambled quantum secret images , , , and are obtained.

Step 3 Perform the inverse Arnold transform on quantum images , , , and , the original quantum secret images , , , and are obtained.

Step 4 Quantum images , , , and are measured to obtain m classical digital images with 8-bit grayscale and a size of .

3.3. A simple example

To demonstrate the computation steps in the sharing and recovery processes, we give a trivial example for m = 2. That is, two quantum secret images would be utilized to construct three quantum share images. Assume there are one chaos quantum image ( ) with a size of 2 × 2, and two scrambled quantum secret images ( and ) with a size of 2 × 2, as shown in Figs. 9(a), 9(b), and 9(c), respectively.

Fig. 9. An example of three quantum images.

The pixel values in their qubit form are shown as follows:

After the swapping circuit is executed, the intermediate quantum images are formed as follows:
To describe the swapping process clearly, four MSQbs and LSQbs of the first pixel are tagged in Eqs. (15) and (16). Finally, three quantum share images , , and can be obtained by using the quantum image XOR operation. The results are as follows:

Since all quantum secret images are distinct and the quantum chaotic image is random, the obtained quantum share images are also random and distinct. Thus, , , and do not reveal any information of the original quantum secret images.

In summary, compared with the traditional secret image-sharing schemes, which involve complex computation, the proposed scheme constructs the shares only using some basic quantum gate operations. Using quantum parallel processing, the computational efficiency is considerably improved. In addition, the proposed scheme can share m secret images rather than one image only, that is, m quantum secret images can be shared at once by means of sharing m+1 quantum share images. Theoretically, it is simple and efficient.

4. Simulation and analysis

To demonstrate the feasibility of the proposed scheme, the simulations were conducted using MATLAB 2014b on a classical computer. In the numerical simulations, to generate the chaotic quantum image I0 (Fig. 10(a)), the parameters in the logistic map are set as , . The Lena image (I1) and Peppers image (I2) with a size of 256 × 256 and 8-bit grayscale are used as the quantum secret images (Figs. 10(b) and 10(c)). Figure 10(d)10(f) show three quantum share images: S1, S2, and S3, respectively. Figure 10(g) and 10(h) show the reconstructed secret images.

Fig. 10. (a) Chaotic image, (b) secret image Lena, (c) secret image Peppers, (d)–(f) three share images, and (g)–(h) reconstructed images.
4.1. Security analysis

In this subsection, we analyze the security of the proposed quantum image-sharing scheme from two aspects. On the one hand, we analyze the security issue based on statistical properties. On the other hand, we analyze the security issue based on quantum effects.

4.1.1. Statistical analysis

First, as we know, the image histogram reflects the pixel distribution of an image. An idea share image should have a uniform frequency distribution. The histograms of the secret images and share images are shown in Fig. 11. It can be seen that the histograms of share images are significantly different from the histogram of the original secret images. Hence, it does not provide any useful statistic data in the share images to trigger any statistical attacks to the proposed scheme.

Fig. 11. (a)–(b) The histogram of the secret images Lena and Peppers, (c)–(f) the histogram of the three share images.

Second, since the correlation reflects the degree of similarity of two variables, each pixel in the original image is highly correlated with its adjacent pixels in general. The correlation coefficient R(x,y) of adjacent pixels is simply defined by the following equation:

where E(x) and D(x) denote the expectation and variance of the pixel grayscale values, respectively. To get the correlation of two adjacent pixels, 8000 pairs of two adjacent pixels (in the horizontal, vertical, and diagonal directions) are selected randomly from the original secret images and share images. The real correlation coefficients are shown in Table 1. It is easy to see that the correlations of the share images are close to 0 in each direction, while those of the original images are close to 1 in each direction. That is, the attacker cannot acquire any useful information via statistical analysis. The correlation distributions of horizontally, vertically, and diagonally adjacent pixels in the secret image Lena and one of the share images (S2) are demonstrated in Fig. 12.

Fig. 12. Distribution of two horizontal direction, vertical direction, and diagonal direction adjacent pixels, (a)–(c) the secret image Lena, (d)–(f) the share image S2.
Table 1.

Correlation coefficients of adjacent pixels.

.
4.1.2. Security analysis based on quantum effects

In the classical secret image-sharing scheme, the share images are easily affected by different types of noise and known attacks during transmission. It is necessary to discuss the security of the proposed scheme based on quantum effects.[22] As we know, the quantum no-cloning theorem forbids cloning an unknown quantum state accurately. When it is measured, an unknown quantum state will collapse. The no-cloning theorem provides another perspective on the lack of accessibility suffered by quantum information in comparison to classical information. Therefore, the characteristics of quantum mechanics can ensure the security of the proposed scheme to some extent. Although it seems unconditional security can be achieved in quantum communication in theory, when the quantum share images transmit in a practical quantum channel, the quantum states are destroyed by decoherence and quantum noise easily. Some strategies, such as quantum error correction[36] and quantum error rejection,[37,38] can be used in this case. That is, these solutions could be useful for the transmission of quantum share images theoretically. Through this method, the original quantum secret images can be reconstructed even if several qubits are flipped or lost.

4.2. Computational complexity

The quantum circuit complexity depends on the number of basic quantum gates.[36,39] It has been pointed that one Toffoli gate can be simulated by six CNOT gates and one swap gate can be simulated by three CNOT gates. In this paper, we choose the CNOT gate as the basic unit. The circuit complexity of the n-CNOT ( , where n denotes the number of the control qubit) gate is ,[10] and the complexity of single QE and Arnold scrambling is .[33] The quantum circuit of coordinate comparison module is shown in Fig. 6. It is easy to see that the numbers of the QE module and the output qubits are m. The complexity of the coordinate comparison quantum circuit is also O(n). According to Fig. 7, there are 4×(m+1) quantum swap gates, that is, 12(m+1) CNOT gates. For each swap gate, there are m control qubits. Hence, the numbers of m-CNOT gate are 12(m+1). The complexity of the quantum swap circuit is . Similarly, the numbers of m-CNOT gates are 8m according to Fig. 8. The complexity of the quantum image XOR operation is . Obviously, since m denotes the numbers of quantum secret images, the total complexity of the proposed scheme is O(n).

However, for a classical image with a size of , the number of pixels that need to be processed is . For example, the classical image XOR operations can be realized by using operations. The total computational complexity is no less than . This implies that the proposed quantum secret image-sharing scheme has the advantage over its classical counterparts in terms of computational complexity.

5. Conclusions

We have proposed a novel quantum secret image-sharing scheme which constructs m quantum secret images into m+1 quantum share images. The quantum image-sharing process can be realized by some basic quantum gate operations. Because all quantum operations are invertible, the quantum image recovery process is the inverse of the sharing process. Theoretical analysis and simulation experiments have shown that the proposal has outperformed its classical counterparts in terms of security and computational complexity. Moreover, multiple quantum secret images can be shared simultaneously without involving complex quantum operations, and the proposal is simple and efficient to implement due to quantum parallel processing. In the future, quantum secret image-sharing techniques may be used for real application, such as medical image sharing between two remote hospitals.

Acknowledgments

The authors would like to thank the editor and anonymous reviewers for their constructive comments.

Reference
1 Fan H 2018 Acta Phys. Sin. 67 120301 in Chinese
2 Feynman R P 1982 Int. J. Theor. Phys. 21 467
3 Shor P W 1994 Proceedings of 35th Annual Symposium on Foundations of Computer Science 124 134 10.1109/SFCS.1994.365700
4 Grover L K 1996 Proceedings of the 28th Annual ACM symposium on the Theory of Computing 212 219 10.1145/237814.237866
5 Beach G Lomont C Cohen C 2003 Proceedings of the 32nd Applied Imagery Pattern Recognition Workshop 39 44 10.1109/AIPR.2003.1284246
6 Caraiman S Manta V 2012 IEEE International Conference on System Theory
7 Le P Q Dong F Hirota K 2011 Quantum Inform. Process 10 63
8 Zhang Y Lu K Gao Y Wang M 2013 Quantum Inform. Process. 12 2833
9 Li H S Zhu Q Zhou R G Song L Yang X 2014 Quantum Inform. Process. 13 991
10 Jiang N Wang J Mu Y 2015 Quantum Inform. Process. 14 4001
11 Zhou R G Hu W Fan P Ian H 2017 Sci. Rep. 7 2511
12 Jiang N Dang Y Wang J 2016 Quantum Inform. Process. 15 3543
13 Luo G Zhou R G Liu X Hu W Luo J 2018 Int. J. Theor. Phys. 57 2447
14 Li P Liu X 2018 Int. J. Quantum. Inform. 16 1850020
15 Jiang N Zhao N Wang L 2016 Int. J. Theor. Phys. 55 107
16 Li P Lu A 2018 Int. J. Theor. Phys. 57 1516
17 Luo G Zhou R G Luo J Hu W Zhou Y Ian H 2019 Quantum Inform. Process. 18 49
18 Luo G Zhou R G Hu W Luo J Liu X Ian H 2018 Quantum Inform. Process. 17 299
19 Hu W Zhou R G Luo J Liu B 2019 Quantum Inform. Process. 18 16
20 Qu Z G He H X Li T 2018 Chin. Phys. 27 010306
21 Yang Y G Pan Q X Sun S Xu P 2015 Sci. Rep. 5 7784
22 Yang Y G Tian J Lei H Zhou Y H Shi W M 2016 Inform. Sci. 345 257
23 Li P Zhao Y 2017 Int. J. Theor. Phys. 56 1961
24 Zhou N Chen W Yan X Wang Y 2018 Quantum Inform. Process. 17 137
25 Yang Y G Cao W F Wen Q Y 2010 Chin. Phys. 19 050306
26 Zhu Z C Zhang Y Q Fu A M 2012 Chin. Phys. 21 010307
27 Liang J W Cheng Z Shi J J Guo Y 2016 Acta Phys. Sin. 65 160301 in Chinese
28 Zhu Z C Hu A Q Fu A M 2016 Int. J. Theor. Phys. 55 2342
29 Long G L Sheng Y B Yin L G 2018 Physics 47 413 (in Chinese) http://www.wuli.ac.cn/CN/10.7693/wl20180701
30 Naor M Shamir A 1995 Lect. Notes Comput. Sci. 950 1
31 Song X Wang S Sang J Yan X Niu X 2014 IEEE Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing 215 218 10.1109/IIH-MSP.2014.60
32 El-latif A A A Abd-el-atty B Hossain M S 2018 IEEE Access 6 21075
33 Zhou R G Hu W Fan P 2017 Quantum Inform. Process. 16 212
34 Jiang N Wu W Y Wang L 2014 Quantum Inform. Process. 13 1223
35 Jiang N Wang L 2014 Quantum Inform. Process. 13 1545
36 Nielsen M A Chuang I L 2000 Quantum Computation and Quantum Information Cambridge Cambridge University Press
37 Kalamidas D 2005 Phys. Lett. 343 331
38 De D B Ramos R V 2006 Phys. Lett. 352 206
39 Barenco A Bennett C H Cleve R Divincenzo D P Margolus N Shor P Sleator T Smolin J A Weinfurter H 1995 Phys. Rev. 52 3457