1. Introduction
Given the outstanding advantages of entanglement, superposition, and parallelism, quantum computing is widely used in all aspects of information science [
1,
2,
3,
4]. Quantum information processing is a new cross-disciplinary discipline based on mathematics, physics, and computing, and has been widely used to increase the speed of information processing and enhance communication security [
5,
6,
7,
8,
9]. Focusing on the capture, operation, and recovery of classical images for various purposes using quantum computing techniques, Quantum IMage Processing (QIMP) [
10] has evolved into a hot research topic with huge storage capacity and parallel processing capability [
11,
12,
13,
14].
The first hurdle facing QIMP is how to use qubits to represent classical images in a way that can be recognized by quantum computers. Therefore, a number of quantum image representations [
15,
16,
17,
18,
19,
20,
21,
22,
23,
24,
25,
26,
27,
28,
29,
30] have been proposed, including, Qubit Lattice [
15], Real Ket [
16], Flexible Representation of Quantum Images (FRQI) [
17], Novel Enhanced Quantum Representation of digital images (NEQR) [
18], Multi-Channel Representation for Quantum Image (MCRQI) [
19], QUAntum Log-Polar Image (QUALPI) [
20], Flexible Quantum Representation for Color Images (FQRCI) [
21], Generalized Quantum Image Representation (GQIR) [
22], Quantum States for M Colors and N Coordinates of an image (QSMC&QSNC) [
23], Novel Quantum representation of Color digital Images (NCQI) [
24], Flexible Representation of Quantum Color Images (FRQCI) [
25], Quantum Representation of Multi-Wavelength images (QRMW) [
26], Improved Flexible Representation of Quantum Images (IFRQI) [
27], Quantum Representation model of Color digital Images (QRCI) [
28], and Fourier Transform Qubit Representation (FTQR) [
29]. Inspired by the ideas of FRQI [
17] and NEQR [
18], Quantum Image Representation based on the HSI color space (QIRHSI) [
30] was proposed. The model encodes hue (H) and saturation (S) through two angular vectors, respectively, and a binary sequence of
bits encodes intensity (I), not only making the number of qubits required to encode color information (10 bits) smaller but also easier to perform various operations on intensity channel.
Along with the development of quantum image representation, a number of quantum image encryption algorithms [
31,
32,
33,
34,
35,
36,
37,
38,
39,
40,
41,
42,
43,
44] have emerged. The proposed encryption algorithms can usually be divided into spatial and frequency domains. A novel quantum gray-scale image encryption algorithm based on one-dimensional quantum cellular automata was proposed by Yang et al. [
31]. Zhou et al. [
32] first designed a quantum realization of the generalized Arnold transform, based on which they proposed a quantum image encryption algorithm based on the generalized Arnold transform and double random phase encoding. A new quantum color image encryption algorithm based on hyper-chaotic systems was proposed by Tan et al. [
33]. Wang et al. [
34] proposed a quantum image encryption and decryption algorithm based on the frequency–spatial domain transform iteration framework. Li et al. [
35] designed a quantum encryption algorithm for NCQI images based on multiple discrete chaotic systems. Li et al. [
36] designed a quantum gray image encryption and compression scheme based on the quantum cosine transform and five-dimensional hyperchaotic system. Li et al. [
37] proposed an encryption algorithm based on NASS quantum images using the quantum geometric transform, phase-shift transform, and quantum Haar wavelet packet transform. The NEQR image encryption and decryption algorithm based on a discrete quantum walk on a circle was proposed by Abd-El-Atty et al. [
38]. Abd El-Latif et al. [
39] first used the controlled alternate quantum walk (CAQW) to create PRNG, and then proposed schemes for encryption of quantum color images by controlled quantum controlled NOT gates from key sequences generated by the PRNG mechanism. Jiang et al. [
40] proposed a quantum image encryption scheme based on GQIR representation and two-dimensional Henon mapping. Musanna and Kumar [
41] proposed an encryption algorithm for a quantum 3D Baker mapping to scramble the 3D quantum representation of an image. Zhou et al. [
42] proposed a new quantum image compression and encryption algorithm with Daubechies quantum wavelet transform (DQWT) and 3D hyperchaotic Henon maps. Zhou et al. [
43] proposed a quantum image encryption algorithm for improved FRQI (FRQIM) images based on Arnold scrambling and QWT. Liu, Xiao, and Liu et al. [
44] proposed a novel three-level quantum image encryption algorithm based on Arnold transform and logistic maps.
In order to improve the security of quantum encrypted images, this paper presents a color image encryption algorithm based on the QIRHSI representation of geometric transformation and intensity channel diffusion. The main contributions of the work in this paper are highlighted as follows: (1) The application of two-point swapping and a generalized logistic map to permutated pixel planes further improves security. (2) Cross-swapping and XOR, XNOR operations are applied to the intensity bit-plane to change the intensity values. (3) The quantum logistic map is used to diffuse the intensity to obtain the desired encryption effect.
The remainder of this paper is organized as follows.
Section 2 is devoted to the QIRHSI representation model, geometric transform, generalized logistic map, and quantum logistic map. The proposed quantum image encryption and decryption scheme are discussed in
Section 3.
Section 4 provides numerical simulations and a security analysis. Finally, conclusions and future research work are presented in
Section 5.
3. Quantum Color Image Encryption and Decryption
The novel quantum image encryption scheme constructed in this paper includes three steps. Firstly, the location information in the spatial domain is permuted using a generalized logistic map and two-point swap. Secondly, the intensity value is changed by the intensity bit-plane cross-swap and XOR, XNOR operations. Finally, the intensity values are diffused using a quantum logistic map to acquire the encrypted quantum image.
Figure 3 presents the flow chart of the quantum color image encryption and decryption algorithm.
Assuming that the original color image to be encrypted is represented as
(where
equals 8), its QIRHSI state is:
where
,
,
,
.
3.1. Image Encryption Scheme
- (1)
Pixel plane permutation.
Step 1: We compute the integers with the help of , where function denotes the downward rounding operation.
Step 2: Using the initial value and parameter iterating Equation (4), is obtained. is then calculated.
Step 3: If for all , then store ; otherwise, there exists a such that , and we use Equation (4) to compute the next until we obtain all different , , obtained by .
Step 4: The operation of swapping two adjacent pixel positions
and
,
on the QIRHSI image is shown in Equation (6).
The operation
is applied to the QIRHSI image to obtain
We use Equation (7) twice to obtain Equation (8).
For a total pixel position of
, only
swaps are needed to traverse all pixel positions. From Equation (8), we can obtain
- (2)
Intensity bit-plane permutation.
The intensity bit-plane is intended to “tamper” with the intensity value at pixel position
. The intensity bit-plane cross-swap operation and XOR, XNOR operation are two ways in which the intensity bit-plane can be permuted. Quantum circuits for intensity bit-plane cross-swap operations are given
Figure 4 and
Figure 5, presenting quantum circuits for intensity bit-plane XOR, XNOR operations. The intensity bit-plane cross-swap operation will cause the intensity bit-planes to be misaligned. Applying the
operator shown in
Figure 5 to
yields
.
For an arbitrary pixel location
, the operator
is defined to act on
as follows.
Applying the operator
shown in
Figure 5 to Equation (10) in the intensity bit-plane XOR, XNOR operation gives
. We define the operator
as shown in Equation (11).
It should be specified that the 8-layer bit-plane representation of
is as follows:
Therefore, the intensity bit-plane permutation operator
can be defined as Equation (12),
and acting the operator
on the image
gives
- (3)
Intensity bit-plane chaotic diffusion
The intensity bit-plane chaotic diffusion operation is done with the help of the chaotic sequence produced by the quantum logistic map given in Equation (5). Using the given initial values
and parameters
, Equation (5) will produce three chaotic sequences. Here, we only take the pseudo-random sequence
generated by
, discarding the first
values to avoid transient effects. Since the elements in
take values in the range
, the elements in
are converted to integers by Equation (14).
The quantum operations in the quantum color image intensity bit-plane chaotic diffusion stage can divide into
XOR sub-operations to achieve XOR operations on the intensity of each pixel. To implement the sub-operation, the sequence
to control the NOT operation, where
,
,
,
. The operation
is defined in Equation (15). If
is equal to 1, then
is a NOT operation; otherwise, it is an identity operation
.
Thus, the XOR operation of the intensity of the image
can be realized by the operation
.
Then, the operation
is constructed from the XOR operation
, as shown in Equation (16).
The XOR operation on the intensity information can be implemented through the sub-operation
. The quantum circuit for the chaotic diffusion of the intensity bit-plane is seen in
Figure 6.
When
, we apply it to the image
, and obtain
From Equation (18), it follows that
3.2. Image Decryption Scheme
The whole encryption process is reversible because the quantum operation satisfies the unitary property. It is possible to recover the original image exactly. In the decryption scheme, there are three stages: inverse intensity bit-plane chaotic diffusion, inverse intensity bit-plane permutation, and inverse pixel plane permutation. The details are developed below.
- (1)
Inverse intensity bit-plane chaotic diffusion.
The image
is obtained using the same pseudo-random sequence generated during the chaotic diffusion of the intensity bit-plane. Applying the operator
to the ciphertext image
gives
- (2)
Inverse intensity bit-plane permutation.
The operator
acts on the image
as follows to give
.
- (3)
Inverse pixel plane permutation
The original image
was obtained using the same pseudo-random sequence generated during the pixel plane permutation. Performing the operation
on the image
yields
6. Conclusions
We propose a quantum color image encryption scheme based on geometric transformation and intensity channel diffusion. The scheme includes pixel plane permutation, intensity bit-plane permutation, and intensity bit-plane chaotic diffusion, and the corresponding quantum circuit is given. In order to make the pixel plane permutated “more random”, the pixel plane permutation stage is combined with a generalized logistic map for permuting, and the key space is increased by setting different initial values and parameters. During the intensity bit-plane permutation stage, cross-swapping and XOR, XNOR operations are used to tamper with the intensity values. In addition, the intensity bit-plane chaotic diffusion stage is accomplished by interacting the chaotic sequence generated by the quantum logistic mapping with the intensity bit-plane via the XOR operation.
After a series of tests and experimental analyses, the algorithm has high key sensitivity and a large key space. In addition, various statistical and differential analyses covering histogram, Shannon entropy, correlation coefficient, NPCR and UACI, spectrum analysis, MSE, and PSNR are performed in this paper. The Shannon entropy is very close to the ideal value of 8, the correlation coefficient is nearly 0, the value of NPCR is close to 99.60%, the standard deviation is almost 73.9, the MSE is approximately 8704.85, and the PSNR is close to 8.8153. Subsequently, it is verified that the algorithm has good robustness against occlusion attacks. The bit sequence of the ciphertext image passed the NIST random number detection.
The significance of this paper involves the combination of geometric transformation and the intensity channel with two chaos mappings, which, on the one hand, can combine geometric transformation (i.e., two-point swapping) with chaos mapping, and on the other hand can sufficiently apply chaos mapping to intensity channel diffusion. The quantum image encryption algorithm designed in this paper is not only resistant to various attacks, but it also has portability and is a secure and reliable quantum image encryption scheme.
Future focus should be on a further combination of the quantum image representation model QIRHSI with chaotic systems and its application in quantum cryptography or medical images.