Abstract

The development of quantum information technology and increasing attention of people to the secure transmission of image information in the Internet have put forward higher requirements for traditional image encryption algorithms that not only take advantage of the exponential acceleration ability of quantum computing compared with classical computing but also reduce the risk of encryption algorithms being cracked. Therefore, in order to seek the combination of the advantages of quantum computing and classical image encryption algorithms, this paper proposes a new dynamic encryption image scheme of quantum walk and chaos-induced DNA. Firstly, the RGB three-channel pixels of the color image are extracted and combined into a one-dimensional array, and a random sequence is generated by quantum walk to reorder it to obtain a preliminary scrambled image; secondly, the color image is processed by the SHA-256 algorithm and divided into the generated message digest as the initial condition of the chaotic model. The random sequence was generated by the high-dimensional chaotic model which encodes each pixel independently and disorderly as DNA bases. The difference of the chaotic sequence ensures the dynamic selection of random DNA encoding and decoding rules during encryption. At the same time, the number of times of DNA encryption of the encoded pixel value is also controlled by the dynamic induction of the chaotic sequence, and ultimately, the DNA coding sequence is replaced with the decimal pixel value to obtain the encrypted image. The simulation results show that the information entropy of the encrypted image is above 7.99, and the correlation of each channel is close to 0, which can effectively resist brute force attacks, plaintext attacks, statistical analysis attacks, noise attacks, etc. In addition, in this paper, extracting the watermark embedded in the encrypted image to judge whether image information is tampered or forged further improves the security of the image information.

1. Introduction

With the rapid development of Internet communication, as the carrier of information, color images are widely used in personal information exchange, medical pathological images, trade secrets, military satellite images, and other fields. At the same time, image privacy information disclosure and vulnerability to illegal attacks or tampering by unsafe third parties in transmission are also becoming more and more prominent. Traditional encryption algorithms such as AES and RSA cannot satisfy the strong correlation of image pixels. Some novel encryption schemes, such as the DNA base rule has become a common image encryption method. Compressed sensing technology is also more and more integrated into the process of image encryption. The reversible data hidden in the encrypted image are also a manifestation of encryption which have been proposed by researchers [14]. With the development of quantum computing [5] and quantum communication [6], researchers urgently need to find an encryption scheme that can adapt to the characteristics of color images and generate effective and reliable keys. The advantages of the proposed scheme are reflected in the use of the quantum walk algorithm and dynamic DNA coding to improve the security performance of image encryption.

Quantum walk has the behavior similar to that of the chaotic system, which can produce a reliable pseudo-random number sequence as the key of image encryption. In quantum computing, quantum walk is exponentially faster than classical walk because of its parallel processing of quantum superposition states and the interference between qubits. This concept has been widely used since it was proposed by Aharonov et al. [7]. In 2011, Di Franco et al. [8] proposed to use the two-dimensional coin state to control the walker’s quantum walk on the two-dimensional plane. In theory, the infinite key space makes it impossible to crack the key. In 2020, Abd El-Latif et al. [9] proposed application of controlled alternating quantum walk as the pseudo-random number generator in quantum color image encryption shows good security and efficiency. Then in 2021, Abd-El-Atty et al. [10] proposed a new image encryption scheme based on quantum walk and double random phase coding, which achieved good results in correlation, histogram, sensitivity, and other simulation experiments. In the same year, Wang et al. [11] combined the random probability distribution matrix generated by quantum random walk with the DNA coding of the image, which proved that the color image encryption is effective and feasible.

Due to the advantages of a sensitive initial value, large key space, and unpredictability, high level chaos is more common. Yousif et al. [12] proposed a fusion of high-dimensional chaotic systems and DNA sequence coding operations. The techniques used will make cryptographic systems more robust to attacks. The chaotic system plays an important role in image encryption and often appears together with other encryption technologies, which reduces the correlation between adjacent pixels when encrypting color images and improves the security of encryption by modifying pixel values [1317]. In 2016, Tang and Jiang [18] used high-dimensional chaotic maps to encrypt images, which can effectively improve the key space of the encryption algorithm. In 2020, Hanif et al. [19] proposed an encryption system based on chaotic system, cyclic shift operation, and SHA-384 hash function, which increases the required key space and plaintext sensitivity. At the same time, the effectiveness, robustness, and practical applicability of the proposed RGB image cryptosystem are proved. In 2023, Zhang et al. [20] used a one-dimensional chaotic system to generate a series of new two-dimensional chaotic graphs with excellent chaotic performance, respectively, called 1D-NLSCM and 2D-NCTCM, and designed an adaptive image encryption algorithm to overcome the shortcomings of some existing encryption algorithms that are independent of the target image. Wu et al. [21] used the improved one-dimensional chaotic system to generate keys, and the key and the ordinary image were randomly transformed into the DNA matrix to strengthen the security of the encryption scheme.

DNA sequence [22] operation has the merit of ultra-large-scale parallelism and high-density data storage to achieve fast encryption and decryption applications. The encrypted image algorithm which combines image hashing and chaotic sequence control DNA coding has increasingly become the future research trend [23, 24]. In 2021, Dong et al. [25] proposed a color image DNA encryption system based on multioptical chaos and pseudo-random substitution of pixel values. The author claims that this scheme is expected to be used in color image encryption applications in optical communication. In 2022, Huang and Zhou [26] generated the initial conditions of the chaotic system by calculating the SHA-512 hash function value of the plaintext image and the external key, compressing the original image, reencrypting the diffused DNA image by bit-level replacement, and improving global dynamic diffusion, which improved the encryption speed and reduced the transmission burden.

Based on the quantum walk algorithm and image watermarking algorithm, the encryption scheme proposed in this paper can ensure the secure transmission of image information [2730]. The main process of the encryption scheme in this paper is as follows: (1) reorder the random matrix of three-channel pixels of color images according to quantum walking as a means of image scrambling; (2) input the image hash value into the high-dimensional chaotic system to realize the correlation between plaintext and ciphertext; (3) set the key sequence to dynamically select eight DNA coding rules and replace pixel values to realize encryption. This process mainly involves different times of XOR operations, which increases the encryption complexity. Finally, the watermark information is introduced into the encryption link as a monitoring means to improve the security of image information.

The organizational structure of this paper is as follows: the first section is the introduction, the second section introduces the related work, the third section implements the specific encryption algorithm, the fourth section analyzes and compares the simulation results, and the final section draws a conclusion.

2.1. Quantum Walk

The quantum walk uses a quantum state with phase instead of classical bits. The walker divides the whole quantum system into position space and coin space in Hilbert space , in which the coin state can be expressed as follows:where indicates that the coin throwing result is upward, indicates that the coin throwing result is downward, and . Each walker performs two unitary operations. First, the coin flip operator is acted on the initial state of the coin state to flip the coin. A commonly used coin tossing operator is the Hadamard operator:

Its function is to obtain a superposition state:

The walking direction is determined according to the different coin throwing results, and the walking is realized by the offset operator S.

Then, under the action of the offset operator, the walkers in different initial states move to the next adjacent point along the direction after coin tossing:

The process of quantum walk is from the initial state to the final state after the T step. This evolution process iterates constantly and maintains the superposition, which can be obtained by measuring the final state. The probability distribution similar to the classical walk in each position is as follows:

2.2. Chaotic System

This paper adopts a high-dimensional Chen chaotic system in reference [31]. Its mathematical model is as follows, and it has high requirements on the initial value and control parameters and is sensitive to generate four chaotic sequences for encryption.

When the control parameter , and of the system is selected, the system has a chaotic attractor, and the chaotic system enters a chaotic state. Compared with low-dimensional chaos, the nonlinear behavior of high-dimensional chaos is more difficult to predict, which ameliorates the security performance of the image encryption algorithm.

2.3. DNA Sequence

The main function of the DNA sequence in image encryption technology is to encode and decode image pixels into specific DNA bases and carry out XOR operation to replace the original pixel values. For example, a color digital image with pixel values between 0 and 255. The 8-bit binary pixel value is represented as 4 DNA bases. For example, one pixel value is 77, and its binary value is “01 00 11 01.” The DNA encoding of changing this value depends on choosing a different encoding rule when encrypting the image. For example, if you choose rule 8, it will become “CTAC.” Using the same DNA rule 8, “CTAC” is converted to a digital format to get the same pixel value of 77. But if you choose another DNA rule to decode, such as rule 1, then “CTAC” will be“10 11 00 10,” and the pixel value will be 178. The eight DNA codes are as follows (Table 1). In addition, DNA base XOR operations are introduced in Table 2. XOR operation is used for encryption in this paper.

3. Algorithm

In this paper, the algorithm firstly uses quantum walk to generate a random sequence to scramble the image, then uses classical high-dimensional chaos to generate a random sequence, controls and selects different DNA coding rules and XOR rules, and finally realizes the process of dynamic coding, which improves the coding randomness of image encryption pixel values and achieves high security encryption effect. However, based on the above encryption algorithm, the security of the image can only be guaranteed at the transmission source, and it is unable to detect whether the image information is attacked or whether the image information’s copyright is protected in the transmission process. Therefore, the sender embeds the imperceptible watermark information in the encrypted image, and the receiver recognizes the watermark information to know whether the encrypted image is from the other party and whether it is attacked.

3.1. Initial Scrambling

The image was separated by RGB three channels to obtain three matrices, and the pixel values were extracted by row and synthesized into a one-dimensional array of . Next, the two-dimensional quantum walk was adopted. That is, coin state is used to determine the left of the walker along the x-axis (up the y-axis), that is, coin state is used to determine the right of the walker along the x-axis (down the y-axis). The initial state is selected as follows:where indicates the walker’s position on the x-axis, indicates the walker’s position on the y-axis, and the state after performing a unitary operation after one step is as follows:

After walking N steps: , the probability distribution of the quantum walker in each position is calculated, the probability distribution value is multiplied by to get a large enough integer, and then the modulus of 255 is taken to get a series of random remainder sequence with a size of .

As shown in Figure 1, this sequence is used as the index of the abovementioned one-dimensional array , is arranged in ascending order while array is also rearranged, and then divided into three arrays and restored to the original pixel matrix position by row, thus achieving the initial scrambling effect of the image.

3.2. DNA Encryption

On the basis of Section 3.1, the SHA-256 algorithm is used to generate a series of fixed hash values for the scrambled image, which is represented as a hexadecimal message digest of 64 in length. Any slight change to the pixel of an image will produce different hash values. The message digest is divided into four blocks; each block contains 16 hexadecimal numbers, which are converted to floating-point values as input of new initial values of the chaotic system, where .

The plaintext image is associated with the generated chaotic sequence, which ensures that the encryption key depends on the image, resists the chosen-plaintext attack, and improves the security.

The chaotic system generates four chaotic sequences X, Y, Z, and W with a length of . In order to avoid the transient effect, the first t elements were taken out, the pixel values of the three channels of the image were converted into binary, and different DNA coding and decoding methods were independently selected for different ranges of random number values in the X sequence. Then, for the encoded DNA base, the XOR operation is carried out by randomly repeating a certain random number of chaotic sequences, and the Y and Z sequences are modified to get the following equation:

The new sequence elements are randomly arranged in integers of 0–7. The DNA sequence at the starting position of XOR operation is selected through sequence , and the number of XOR operations is determined through sequence . The sequence of DNA XOR rules is flexible. Different output chaotic sequence values dynamically select different DNA rules. This way of randomly and dynamically selecting rules determines the complexity of XOR operation. Compared with fixed selection, DNA coding encryption is more complex, which improves the difficulty of cracking.

Eight DNA XOR rules are put into an array with a length of 8 according to the custom order: D[8] = [ACGT, CTAG, TGCA, GATC, CATG, GTAC, TCGA, AGCT]. For example, a point with a pixel value of 77 is coded as CTAC by the x-sequence selection coding rule 8. If the values of the chaotic sequence at this time are and , the process of each operation is as follows: CTAC starts with the value TGCA at the position of D[2], and then XOR operation is performed in the order of D[2], D[3], D[4], D[5], i.e. TGCA, GATC, CATG, and GTAC. The result of each iteration is as follows:

The final output is TGCT. According to the chaotic sequence W according to the above rules, another decoding rule is selected to replace the pixel value and converted to decimal pixels. The image matrix is output, and the encryption is completed at this time. The image encryption process is shown in Figure 2.

3.3. Watermark Embedding

Immediately after the completion of Section 3.2 encryption, the watermarking algorithm based on DWT (discrete wavelet transform) and SVD (singular value decomposition) is used to embed and extract the watermark of the encrypted image. The whole process is shown in Figure 3. First, the image is transformed by DWT transform, and the DWT of the image with the size of is defined as follows:

Usually, let , where and . One scale function and three two-dimensional wavelet functions represent the changes of column direction, row direction, and diagonal direction, respectively. Haar wavelet is selected as wavelet basis function. The change of measurement function corresponds to the gray change of the image:where , and the expression of is obtained by inverse discrete wavelet transform.

The imperceptibility and robustness of the watermark are considered to be contradictory. Generally, the low-frequency part concentrates most of the energy of the image. Although the robustness effect of embedding is good, it is easy to cause image distortion, and the high-frequency part is vulnerable to attack. Therefore, this paper comprehensively selects HL subband to embed the watermark information. Then, the HL subband is divided into blocks, and each block is SVD decomposed . Then, the watermark information is superimposed on the first singular value (maximum singular value) of according to the embedding factor, according to the following rules, where is the watermark embedding intensity factor, is the scrambled watermark information, and the embedded block is . Finally, the synthetic image embedded with watermark is obtained by IDWT transform.

3.4. Watermark Extraction

The receiver receives the image sent by the sender, which is composed of a watermark image embedded in an encrypted image. In this paper, the watermark is extracted by blind extraction, that is, DWT transformation is carried out on the synthetic image without the participation of the original image, and block processing is also carried out and decomposed according to SVD. . Let mod , then

Perform the next analysis based on the extracted watermark information. When the encrypted image is attacked, the change of the watermark information is the same as the image. Therefore, the identity information of the sender can be verified according to the integrity of the extracted watermark information and the content of the watermark information, and the receiver can know whether the image transmitted by the other party has been attacked by a third party. If there is no change in the information, the image is decrypted. The whole process is shown in Figure 3.

3.5. Reverse Decryption

In this paper, the process of image decryption is the inverse process of image encryption. The main process is as follows: the receiver of the image information firstly performs DWT and SVD transformation on the image. (1) If the completely effective and correct watermark information is extracted, the random sequence X, Y, Z, and W is used in encryption provided by the sender and the self-defined XOR rule D[8]. At this time, the decryption is carried out according to the following procedure:

The DNA coding of the pixel value is calculated with the W sequence to obtain , the application rule is reversed through to obtain the initial pixel coding , represents the number of XOR operations, and finally the uncoded pixel value of the scrambled image is obtained according to .

The initial state and walking steps of the quantum walk provided by the sender are calculated to obtain the sequence, which is divided into and arranged with the three channel pixels of the image. As shown below, are output to merge the original image.

(2) If the extracted watermark information is damaged, it will be deemed that the transmission is invalid and the sender will resend the encrypted information.

4. Experimental Simulation

4.1. Experimental Conditions

This paper uses plaintext images from the standard test diagram in the USC-SIPI database, where 4.1.07.tiff () and 4.1.08.tiff () are free to use. The simulation environment is Win10 operating system and 2.5 GHz CPU. Pycharm software and tool libraries such as Qiskit, Numpy, and Scipy are used to program and run Python code and show the results.

4.2. Encryption Effect and Security Analysis
4.2.1. Key Sensitivity Analysis

The change of any bit of the key used in the ideal image encryption scheme will cause a completely different encryption and decryption result. The key sensitivity of the chaotic system is related to the initial value and control parameters. When the value of one of the decryption keys is changed by , the original plaintext image cannot be recovered, which proves that the encryption system is very sensitive to the key change. After changing the encryption key by one bit, is obtained. The same image is encrypted with and , respectively. Comparing the pixel change rate after two encryptions, the key is only different by one bit. By comparing the difference between the two ciphertext images, the number of pixel change rate (NPCR in Section 4.3.1) is 99.5941%, and it shows that the key sensitivity is very high. The test of plaintext sensitivity is explained in the differential attack.

4.2.2. Time Complexity Analysis

In the process of replacing image pixels with random sequences generated by quantum walk, three channel images are processed separately, with a time complexity of . In the process of encrypting image pixels with DNA base coding pixels, a total of four chaotic sequences are involved, with a time complexity of (N is the image size). The key generation time is 0.447 s, and the encryption and decryption time of DNA encoded pixels is shown in Table 3.

4.2.3. Histogram Analysis

The histogram shows the statistical information of the image through the distribution of the gray values of the pixels in the color image. The more uniform the histogram distribution of the encrypted image is, the more difficult it is for the attacker to decipher the transformation relationship between the plaintext and ciphertext image through statistical analysis. The effect of image histogram before and after encryption is shown in Figures 4 and 5.

The experimental results show that the histogram effect distribution of the encryption algorithm is very uniform and can “hide” the pixel distribution characteristics of the original image, that is, the attacker cannot analyze the rules of ciphertext and plaintext, so it can resist statistical attacks. Figures 4 and 5, respectively, show the histogram distribution of the 4.1.07.tiff image before and after encryption and the 3D visual histogram effect. Figure 6, respectively, shows the histogram effect of the 4.1.08.tiff image before and after encryption.

According to reference [32], the same plaintext image is encrypted with different keys (key1 and key2) by changing one bit parameter in the encryption key, and the variance value of the histogram of the encrypted image is calculated. The variance value is around 5400, which indicates that the average gray value of each pixel fluctuates around 73. The closer the variance value of the two encryption results, the higher the uniformity of the encrypted image and the better the encryption performance when the key changes. The experimental results are shown in Table 4.

In addition, the similarity of the two histograms is judged by the Chi-Square experiment and calculating the Bhattacharyya distance of the histogram. For the image, the greater the chi-square value is, the lower the image similarity is; otherwise, the higher the similarity is, the maximum value has no upper bound and the minimum value is 0. Bhattacharyya distance is used to measure the similarity of two probability distributions. In fact, in image recognition, it is to judge the distribution of different pixels between them. The higher the Pap distance is, the lower the similarity is, the maximum value is 1, and the minimum value is 0. The experimental results are shown in Table 5.

4.2.4. Correlation Analysis

It is a necessary standard for the encryption algorithm to abate the correlation between adjacent pixels in the encrypted image. The correlation coefficient of adjacent pixels is calculated in each channel of the plaintext image and the ciphertext image, and adjacent pixels are randomly selected to compare in horizontal, vertical, and diagonal directions. The formula is as follows:

The experimental results in Figures 7 and 8 show that the pixels of each channel of the plaintext image are concentrated in the diagonal, while the pixels of the ciphertext image are uniformly distributed. The experimental results are shown in Table 6, which indicate that the correlation coefficient is lower than that of the plaintext image, indicating that the adjacent pixels are irrelevant and have a strong ability to resist statistical analysis.

4.2.5. Information Entropy Analysis

Image information entropy mainly measures the uncertainty or randomness of pixel information. For an image with completely random pixels, if its distribution is uniform enough, the ideal value of information entropy is 8. The calculation formula is as follows:where is the gray value and is the probability of the grayscale .

The experimental results are shown in Table 7, which show that the information entropy of the encrypted image reaches more than 7.99, which shows excellent performance, and indicate that the probability distribution of each gray value in the image is uniform, which can effectively resist statistical information attacks.

4.2.6. Randomness of Sequences

According to the requirements of the NIST SP 800-22 standard, this paper detects the randomness of the set of random numbers and encrypted image pixel values generated by the chaotic system. After several tests, it is found that the value of the test result is greater than 0.01, and it has passed 15 tests. The experimental results show that the Chaotic sequence as the key and the ciphertext image have good randomness, as shown in Table 8.

4.2.7. Gray Difference Analysis

Gray value difference (GVD) is a measure of randomness between the original image and the encrypted image. By comparing the information difference between the two images, if the two images are exactly the same, it is 0; otherwise, it is 1.where G(x, y) represents the gray value at position (x, y). The average neighborhood gray difference of the image is calculated, which can be calculated with the following formula: VN and represent the average neighborhood gray value.

The experimental results (Table 9) show that the gray difference of the encrypted image is very close to the ideal value 1, which is quite different from the original image. It is difficult to analyze the relationship between the two through statistical information to prove that the encryption security is high.

4.3. Robustness Analysis of Different Attacks
4.3.1. Differential Attack Analysis

The differential attack performance depends on the sensitivity to plaintext. A pixel is randomly selected in the plaintext image, and its pixel value is changed. Differential attack is a kind of selective plaintext attack, and the performance of resisting differential attack depends on the sensitivity to plaintext. In order to resist differential attack, the ciphertext image with great change is obtained by changing a pixel value in the same plaintext image, which shows that the stronger the ability to resist differential attack, the stronger the ability to resist selective plaintext attack. The number of pixels change rate (NPCR) and unified average changed in intensity (UACI) are defined as follows:

M and N are the width and height of two random images, which are defined as follows:

UACI can be used to measure the average value of color component contrast intensity. The calculation formula is as follows:

The experimental results (Table 10) show that the NPCR value of each channel pretty approaches its ideal value of 99.6094%, and the UACI value approaches its ideal value of 33.4635%.

Four classical attacks are mentioned in reference [33]: ciphertext-only attack, known plaintext attack, plaintext selected attack, and ciphertext selected attack. If a cryptographic system can withstand selective plaintext attacks, it can withstand other types of attacks. The encryption scheme in this paper has the ability to resist statistical analysis attack, and the large key space cannot be used to brute force crack the plaintext image when only the ciphertext is known. At the same time, differential attack is a selective plaintext attack, and experimental results show that the encryption scheme can effectively resist this type of attack.

4.3.2. Noise Attack Analysis

The mean square error (MSE) and the peak signal to noise ratio (PSNR) are important indicators to measure image robustness. It is defined as follows: the smaller the mean square error, the higher the PSNR, which means that the distortion between the two images is smaller. Salt and pepper noise is achieved by randomly changing the original image pixels to black or white pixels. The proportion of added noise to the number of image pixels varies, and the number of noise also varies. In this chapter's experiment, the proportion added is 5%, 10%, and 50%. Gaussian noise refers to the addition of noise that follows a Gaussian distribution. The level of added noise can be controlled by adjusting the size of the Gaussian distribution standard deviation. The intensity added in this chapter's experiment is 0.002, 0.05, and 0.3, as shown in Figure 9. The comparison with other reference is shown in Table 11.

The experimental results show that although the PSNR of the encrypted image against the attack decreases after decryption, the original image can still be seen visually after decryption, indicating that the encryption algorithm has good security and certain robustness to noise attack.

4.3.3. Analysis of Occlusion Attack

The pixels of 1/16, 1/8, and 1/4 area of the whole image in the encrypted image are randomly removed or covered, and then its PSNR is decrypted and analyzed, as shown in Table 12.

The experimental results (Figure 10) show that the decrypted image can still restore the image to a certain extent, indicating that the encryption algorithm has strong robustness.

4.4. Watermark Attack Detection and Analysis
4.4.1. Imperceptibility Evaluation of Watermark

Taking the r-channel image in the RGB component of the encrypted test image as an example, this paper embeds a binary watermark QR code image. The experimental results (Figure 11) show that the embedded watermark image is almost the same as the encrypted image visually. The PSNR of the encrypted image is 41.24 db. The higher the PSNR value, the better the invisibility of the watermark.

4.4.2. Watermark Attack Detection

By simulating the addition of salt and pepper noise attack with a density of 0.005 (Figure 12(a)), Gaussian noise attack with a variance of 0.002 (Figure 12(b)), 1/8 clipping attack (Figure 12(c)), and 90-degree rotation attack (Figure 12(d)) to the encrypted image embedded with watermark, the watermark image is extracted as follows:

The experimental results show that according to the above simulation attack, the watermark information changes greatly intuitively, and the information in the two-dimensional code cannot be recognized. This paper does not aim at the robustness of the watermark but uses the change of the watermark information as a means of detecting the attack in the transmission process of the encrypted image so that the receiver can be keenly aware of the malicious attack and tampering in the transmission process according to the change of the watermark information and inform the sender to retransmit.

5. Conclusion

In this paper, the dynamic encryption algorithm based on quantum walking and chaos-induced DNA limits the access of image information at the source of transmission. In the classical chaotic control DNA image encryption algorithm based on improved encryption code complexity, the experimental results show that the randomness of the encrypted image information, key sensitivity, and information entropy effect are good. It can effectively resist statistical analysis attack and differential attack. In addition, the watermarking algorithm based on DWT and SVD detects whether the image is tampered or forged in the transmission process. The combination of the whole process establishes the secure transmission scheme of the image in the open network channel, which provides a new idea for the image encryption scheme. Of course, the time efficiency of the scheme still needs to be further optimized.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Authors’ Contributions

N.H. and X.X. proposed experimental ideas and completed experimental simulations. H.N. and H.L. completed experimental analysis. J.W. and H.L. wrote the manuscript. J.W. and J.L. reviewed and revised the manuscript.

Acknowledgments

This work was supported by the Natural Science Foundation of Shandong Province, China (Grant nos. ZR2021MF049 and ZR2019YQ01), NSFC under Grant no. 11975132, and Joint fund of the Shandong Natural Science Foundation in 2021 (Grant no. ZR202108020011).