Abstract

In order to boost the security and confidentiality of information in quantum images, on the foundation of the NEQR model, a novel quantum watermarking scheme combining quantum Hilbert scrambling with steganography based on the Moiré fringe is designed in this paper. First of all, for carrier image, and watermark image, the color information and position information are denoted, respectively, by the NEQR model. Next, the watermark image is converted to a disordered image by quantum Hilbert scrambling, and the message of the original watermark image cannot be gained from the disordered image. At last, the watermark image after scrambling is embedded into the carrier image through the steganography of the Moiré fringe, obtaining the watermarked image. Due to the unitary image of the quantum gate, quantum Hilbert inverse scrambling is the opposite process of quantum Hilbert scrambling. In addition, the watermark image can be completely extracted from the watermarked image. What’s more, the experimental simulation and performance analysis of the scheme are done. The experimental simulation proves the feasibility of this algorithm. Visually, there is no difference between the carrier image and the watermarked image. The PSNR between the watermarked image and the carrier image is measured, which quantitatively shows the high similarity. In addition, the time complexity of the quantum circuit is lower than some other quantum image watermarking schemes, which proves the simplicity of this scheme.

1. Introduction

As one of the main carriers of information transmission in modern society, images play a very important role in education, finance, and other fields. At present, protecting the security of image information is one of the research hotspots at home and abroad. The methods of protecting the secret image of an image are roughly divided into two categories: image watermarking [15] and image encryption [69]. Image watermarking is to embed the pixel data of the watermark image into the carrier image in a certain way, and there is no visual difference between the carrier image and the watermarked image, thus achieving the effect of hiding the watermark image. The essence of the image encryption is to change the value and position of the pixels in a certain method, and the message of the original image cannot be obtained in the encrypted image.

Quantum computing and quantum information have grown rapidly in recent years, guiding new directions for the development of many fields [1013]. Of course, quantum computing has laid a solid foundation for the rise of quantum imaging. The principle of quantum imaging is to express the image with quantum state, thus bringing a new development direction for the field of image processing. As a result of some inherent characteristics of quantum computing, such as parallelism and entanglement, quantum image processing and performance will be incomparable with classical images. The main advantages of quantum images compared with classical images lie in fast computing speed, high security, and small storage space. After the quantum computer is produced in the future, quantum images can greatly improve people’s production and life. Furthermore, the classical algorithm of image steganography has developed to a mature stage, while the related content of quantum image steganography is very little. In the future, so as to protect greatly the security and confidentiality of information in quantum images, it will be necessary to develop quantum image steganography. First and foremost, we must understand how to store and express images in quantum computer. For the representation of quantum images, domestic and foreign scholars have proposed several methods: Real Ket [14], Qubit Lattice [15], FRQI [16], NEQR [17], MCQI [18, 19], and so on. Among them, the first four are applicable to grayscale images. In the MCQI model, the gray information of the RGB three channels of color image is represented by three entangled quantum states, respectively, extending the expression of grey images to color images. Among the above representation methods of the quantum image, the NEQR is the only one model in which the ground state of qubits is used to express the pixel value, while the probability amplitude of ground state is used to represent the pixel value in other models. Compared with other representation models, the NEQR has the advantage that it will not have the negative effect stem from the collapse of the quantum state during the measurement procedure. It is the most widely used representation model of quantum image now.

Nowadays, the steganography of quantum image is primarily based on frequency domain and spatial domain. The principle of the steganography based on frequency domain is to superimpose the watermark image’s information on the frequency domain of carrier image, including quantum Fourier transform (QFT) [20, 21], and quantum wavelet transform (QWT) [2225]. In 2013, Zhang et al. presented a steganography of quantum images on the foundation of the quantum Fourier transform. Firstly, the carrier image was processed by the quantum Fourier transform, and the watermark image’s message was superimposed on the Fourier coefficients of the carrier image to achieve embedding process. There is no visual distinction between the watermarked image with the carrier image [26]. In 2019, on the basis of the FRQI model, Hu et al. put forward a quantum image steganography on the foundation of the Haar wavelet transform. The image is decomposed by the Haar wavelet transform. And the carrier image is decomposed to obtain its diagonal coefficient, and the diagonal coefficient changes in the light of the information of watermark image, thus realizing the embedding process in the watermark image [27]. The representative algorithms of quantum image steganography based on the spatial domain include the least significant bit algorithm (LSB) [2831] and the steganography on the basis of the Moiré fringe [32], which embed the message of the watermark image into the carrier image by changing the pixel value of the carrier image. In 2015, on the basis of NEQR, Jiang et al. designed a steganography of quantum images on the foundation of the Moiré fringes and quantum circuits. The processes of embedding and extraction in moiré gratings are achieved by quantum circuits [33]. In 2017, Heidari combined LSB with Gray code and hid two information qubits into the three lowest qubits in the color image by using Gray code, thus completing the embedding process of the watermark image [34].

On the foundation of the NEQR, a novel quantum image steganography combining quantum Hilbert scrambling [35] with information hiding about Moiré fringe is designed in this paper. The context of the article is as follows. The second part introduces the principle of NEQR, quantum Hilbert scrambling, and information hiding about the Moiré fringe. The third part introduces the specific operation process of the algorithm. The simulation experiment and performance analysis of the scheme are introduced in the fourth part. The conclusion is put at the end.

2.1. NEQR

The NEQR model divides the representation of a quantum image into two sections, including the color information and the position information, and they are expressed by a quantum state, respectively. Therefore, the representation of the whole quantum image is the superposition of two quantum states. With regard to a quantum image of size and pixel value range , the color information needs to be represented by qubits, while the representation of position information requires qubits. Thus, the expression of the entire quantum image is as follows:where, represent the color information and represent the position information.

2.2. Quantum Hilbert Scrambling

In 1870, the Hilbert curve was proposed by G. Peano, which was a special curve that could traverse all points in a set. Using the Hilbert curve for image pixel scrambling can achieve a good scrambling effect, and Hilbert scrambling comes from this. Applying Hilbert scrambling to a matrix with size of can get scrambled matrix . If the elements in are connected in the order before scrambling, the Hilbert curve can be found. Figure 1 is the corresponding Hilbert curve when takes value from 3 to 5.

The generation of the Hilbert matrix could be completed through step-by-step iteration. The generation iteration formula of the Hilbert matrix is as follows:where , . If is a matrix of size , then is the transposed matrix of , and is obtained by rotating around the center of .

It can be known from the iterative formula generated by the Hilbert matrix that the Hilbert matrix starts from the initial matrix and alternately iterates according to whether is odd or even. Therefore, the generation algorithm of the Hilbert matrix is divided into three parts: initialization, iterative process when is odd, and iterative process when is even. The generation iterative formula of the Hilbert matrix as the basis is used to rearrange all pixels of the watermark image in the algorithm of quantum Hilbert scrambling. When rearranging, the watermark image is split into subimages with a size of , and all image subblocks are rearranged according to the iterative principle of the Hilbert generating matrix. In the whole quantum image scrambling process, gradually increases from 1 to ; that is, the size of the image block increases with the raising of , so the arrangement process of pixel points is divided into times.

2.3. The Steganography of Quantum Image Based on Moiré Fringe

The steganography based on Moiré fringe comes from the Moiré effect. The Moiré effect is a special optical phenomenon that emerges when two dots or fringes with periodic characteristics are superimposed on each other. It is found that a new pattern will be generated when the two patterns are superimposed on each other under certain conditions. Based on the principle of the above phenomenon, a scheme for the steganography of images based on Moiré fringe is proposed.

The algorithm of the steganography of the quantum image based on Moiré fringe can be split into three parts, including the embedding process, the denoising process, and the extraction process [31]. The embedding process is to embed the watermark image into the carrier image; the obtained carrier image after the embedding process can be called a prewatermarked image. If the watermark image is directly extracted from the prewatermarked image, the extracted watermark image contains much noise. The function of the denoising process is to remove the noise from the prewatermarked image in order to make sure that the extracted watermark image has no noise. The denoising process can be said to be the optimization process of a watermark image’s embedding process. The final step is the extraction process.

3. The Specific Design of the Scheme

Based on the NEQR, a novel quantum image steganography combining quantum Hilbert scrambling with steganography based on the Moiré fringe is designed in this paper. The algorithm can be separated into two parts. One is the scrambling and restoration process of the quantum image based on the quantum Hilbert transformation. Another is the embedding and extraction process of the watermark image on the foundation of steganography which involves the Moiré fringe. Accordingly, quantum circuits are designed for each of the two sections. The principles and quantum circuit diagrams of the two parts are introduced below. The Figure 2 is flow chart of the whole scheme.

3.1. Quantum Circuit Module

According to the quantum Hilbert scrambling principle in Section 2.2, the scrambling process is divided into three parts including initialization, the iterative process when the time of iteration is odd and when the time of iteration is even. When designing quantum circuits for Hilbert scrambling of quantum images, three basic quantum circuit modules including module , module , and module need to be used. The quantum circuit of the initialization is layout based on the module ; the quantum circuit corresponding to the scrambling process when the time of iterations is odd is generated by the combination of the module and the module ; when the time of iterations is an even, the corresponding quantum circuit is generated by module and module . The functions and quantum circuit diagrams of the module , module , and module are introduced in .(1)The module can segment the quantum image and realize the generation iteration of the Hilbert matrix. The module can divide a quantum image with the size of into ( is an integer, and ) image subblocks with the size of . The Figure 3 is the quantum circuit diagram corresponding to this part. The module firstly swaps and , and ,…, and and finally swaps and .(2)The module is for the case when the number of iterations is odd in the iterative process of the quantum Hilbert matrix. Assuming that W, X, Y and Z are all matrices of size , the function of the module is to convert into . The quantum circuit corresponding to this section is clearly demonstrated in Figure 4. Below are the specific quantum circuit process of the module .(1)Swap and with SWAP gate, then add a CNOT gate, where controls .(2)The controlled SWAP gate are used to swap and and and , where the control qubit is .(3)The 2-qubit CNOT gate are used to flip , , , , and , where the control qubit is and .(3)The module is for the case when the number of iterations is even in the iterative process of the quantum Hilbert matrix. Assuming that W, X, Y, and Z are all matrices of size , the function of the module is to convert into . The Figure 5 is the quantum circuit diagram corresponding to this part. Below are the specific quantum circuit process of the module .

(1)Add a CNOT gate, where controls .(2)The controlled SWAP gate are used to swap and and and , where the control qubit is .(3)The 2-qubit CNOT gate are used to flip , , , , and , where the control qubit is and .
3.2. The Quantum Circuit Design of Quantum Hilbert Scrambling

In Section 3.1, we get the three basic modules of quantum circuits. Next, the three modules are used to design quantum circuits for the three parts of quantum Hilbert scrambling.

3.2.1. The Mole of Initialization

The function of initialization is to generate the initial Hilbert matrix . In this paper, the initialization module on the basis of the module is designed corresponding to , and just add a CNOT gate between the two lines and of module , where is the control qubit and is the controlled qubit. The Figure 6 is the quantum circuit corresponding to the initialization module.

3.2.2. The Process of Iteration

When the time of iteration is odd/even, the effect of the corresponding quantum circuit could convert the image block into . In this paper, the module and the module are combined to form the odd module, and the module and the module are combined to form the even module. The quantum circuit of odd module and even module are displayed in Figures 7 and 8, respectively.

According to the analysis of the iterative process of the generation about the Hilbert matrix, the corresponding quantum circuits are designed for each step in the generation process. Combining each unit circuit, the integral quantum circuit about the quantum Hilbert scrambling is displayed in Figure 9. As a result of the unitarity of quantum gate, the inverse circuit of the quantum Hilbert scrambling would be obtained by placing the quantum gates in the entire quantum circuit in reverse order.

3.3. The Quantum Circuit of the Steganography Based on Moiré Fringe

The quantum circuit of the steganography based on Moiré fringe is divided into three parts, including the embedding process, the denoising processing, and the extraction process. Firstly, the watermark image is embedded into the carrier image, thus getting the pre-watermarked image. Next, the prewatermarked image is subjected to denoising processing. If there is no the denoise processing, the extracted watermark image will be mixed with noise. At last, the watermark image is extracted from the watermarked image. The quantum circuit and design principles of each part are described, respectively, in detail below.

3.3.1. The Embedding Process

The embedding process can achieve embedding the watermark image into the carrier image in a certain way, thus getting the prewatermarked image . The principle formula about the embedding process is as follows:

We can draw a conclusion from the above formula that the quantum circuit corresponding to the embedding process is able to be completed by the quantum-controlled exchange gate. If the quantity of qubits controlling the color of the quantum watermark image is , the message about color of a pixel is expressed as . That is, the embedding process of watermark images can be achieved through using quantum-controlled exchange gates. Taking as the control bit, if , the corresponding carrier image remains unchanged; if , the carrier image is replaced by . The new matrix obtained is the matrix . The specific quantum circuit is demonstrated in Figure 10, where , is the color information of pixel .

3.3.2. The Denoising Process

The function of denoising process is to ensure that the extracted watermark image will not be mixed with noise after extraction. Because in the extraction process, the value of the qubit of the color message about the watermark image depends on whether and are equal. If they are not equal, , otherwise, . If the value of was originally equal to , this would make , but in fact, , so that some qubits of the watermark image take the opposite value. The denoising process can prevent this situation. When , flipping the least significant qubit of the prewatermarked image, that is, . Figure 11 is the quantum circuit corresponding to the denoising process. The embedding process and denoising process can be collectively referred to as the complete embedding process. The quantum circuit corresponding to the complete embedding process is displayed in the Figure 12.

3.3.3. The Extraction Process

The last step is the extraction process. That is, the watermark image is obtained through the watermarked image and the carrier image . If and are equal, then ; otherwise, , which is given in the following equation:

The design of quantum circuit corresponding to the extraction process is demonstrated in Figure 13.

4. Experimental Simulation and Analysis

Since the quantum computer has not yet come out, we use the classical computer and Matlab to carry out the experimental simulation of the proposed scheme. In addition to the advantage of not having the parallelism of quantum computers, classical computers can follow the processes of the algorithm to achieve the corresponding effect. Eight grayscale images with a size of are used in this experimental simulation, of which four images are watermark images and the others are carrier images. The eight images are shown in Figure 14, where (a)–(d) are watermark images and (e)–(h) are carrier images.

4.1. Experimental Results

First of all, perform Hilbert scrambling on the four watermark images in (a)–(d) of Figure 14, and the obtained scrambled watermark images are shown respectively in (a)–(d) of Figure 15. After that, the four scrambled watermark images are embedded into the four carrier images in (e)–(h) of Figure 14 by using the steganography of quantum image based on Moiré fringe. The obtained watermarked image is demonstrated in (a)–(d) of Figure 16. At last, the scrambled watermark image is extracted, and the function of the inverse Hilbert scrambling is to get the original watermark image. The obtained original watermark image is displayed in (a)–(d) of Figure 17.

It can be seen from Figures 14 and 16 that there is no visual difference between the carrier image and the watermarked image, indicating that the watermark image visually does not make a difference to the carrier image. Therefore, from a watermarked image, it is not easy for a third party to detect the existence of the watermark image. The function of quantum Hilbert scrambling is to scramble the pixel positions of the watermark image. In Figure 15, it is shown that the message of the watermark image cannot be obtained from the scrambled image. Even if a third party finds the existence of a watermarked image in the watermarked image, after extracting from the watermarked image, the watermark image’s message cannot be obtained, thereby further ensuring the security of the watermarked image. In Figure 17, it is obvious that the watermark image extracted and subjected to the inverse quantum Hilbert scrambling is identical with the original watermark image. It shows that the entire algorithm process will not change the message of the watermark image, so the entire scheme is feasible.

4.2. Visual Quality Analysis of the Watermarked Image

PSNR is usually adopted to assess the similarity of two similar images. The similarity between the two images is positively related to the value of PSNR. In order to measure the impact of embedding watermark image on the visual quality of the carrier image, a quantitative analysis by calculating the PSNR value between the watermarked image and the carrier image is done in this paper. For two images of size , the calculation equation of PSNR is as follows, where is the carrier image, is the watermarked image.where is the maximum gray value of the pixel, which is 255. In this paper, PSNR tests are performed on the four groups of watermarks and carrier images used in the experimental simulation. The experimental results obtained are presented in Table 1. The results show that the PSNR values of the measured images are about 51. The PSNR is about 30 in the reference [33], the comparison of PSNR which proves the superiority of this scheme.

4.3. The Time Complexity of Quantum Circuits

The time complexity of a quantum circuit is decided by the number of elementary quantum gates. Basic quantum gates are quantum gates containing one or two qubits, including NOT gates and CNOT gates. The time complexity of a basic quantum gate is 1.

First of all, the time complexity of the quantum circuit corresponding to the quantum Hilbert scrambling is calculated. The quantum Hilbert scrambling is displayed in Figure 9, which is composed of initialization module, odd module, and even module. The quantum circuits corresponding to the three modules are shown in Figures 68 respectively. The initialization module is composed of a Module and a CNOT gate. The quantum circuit of Module is presented in Figure 2, it consists of SWAP gates, where the value of is 0. The time complexity of a SWAP gate is equivalent to three CNOT gates, so the time complexity of the initialization is . The odd module consists of module and module . The module is demonstrated in Figure 3. The module consists of a SWAP gate, a CNOT gate, controlled SWAP gates, and 2-qubit CNOT gates. Because a controlled SWAP gate can be made up of 18 CNOT gates, the time complexity of the SWAP gate is 18. The time complexity of a 2-qubit CNOT gate is 8. As a consequence, the time complexity of the whole odd module is . Similarly, the time complexity of even module is . So the time complexity of the whole Hilbert scrambling is . Because of the unitarity of the quantum gate, the time complexity of the quantum circuit about Hilbert inverse scrambling is also . So the time complexity of the quantum Hilbert scrambling circuit is . However, the complexity of classical Hilbert scrambling is , so compared with classical scrambling methods, the quantum Hilbert scrambling has certain advantages [35].

Then calculating the time complexity of quantum circuit about the steganography of quantum image based on Moiré fringe. The quantum circuit of this section is divided into three parts, including the embedding process, the denoising process, and the extraction process. For a single pixel, the quantum circuit of the embedding process is demonstrated in Figure 10. It is made up with controlled SWAP gates, so the time complexity of this part is . The quantum circuit about denoising processing is shown in Figure 11. It consists of 2-qubit CNOT gates, NOT gates, a -qubit CNOT gate, and a CNOT gate. The time complexity of the CNOT gate controlled by qubits is , so the time complexity of the denoising quantum circuit is . The quantum circuit about the extraction process is shown in Figure 13, and this part consists of CNOT gates, NOT gates and a CNOT gate controlled by qubits, so the time complexity of the quantum circuit about this part is . Hence, the time complexity of the quantum circuit for the steganography of the quantum image’s single pixel based on Moiré fringe is . The maximum gray value of the image used in the experimental simulation is 256, so the value of is 8. For a quantum image of size , the time complexity of the quantum circuit is . To sum up, the complexity of the whole scheme is . Compared with some other quantum image watermarking algorithms (Table 2) [3638], the proposed scheme has lower complexity.

5. Conclusion

On the foundation of the NEQR, a quantum watermarking scheme combining quantum Hilbert scrambling with steganography about the Moiré fringe is designed in this paper. First of all, the quantum watermarked image is transformed by quantum Hilbert scrambling, obtaining an encrypted image. The message of the original watermark image cannot be obtained from the scrambled image. Next, the watermarked image after scrambling is embedded into the carrier image using the steganography of the Moiré fringe. At the same time, the quantum Hilbert inverse scrambling and the extraction processes can be completed. Last but not least, we have done a simulation experiment on the algorithm. The watermarked image is visually identical with the carrier image. We also tested the PSNR value of the watermarked image. And compared the results with other references, it is obvious that our scheme has greater performance. In addition, even if the third party found the existence of the watermark image and extracted it from the watermarked image. Because the watermark image is scrambled by quantum Hilbert scrambling, the third party still cannot obtain the message of the watermarked image. Therefore, the proposed algorithm has higher security. Besides, the complexity of the quantum circuit used in this scheme is calculated, which shows that the time complexity of this scheme is lower than some other related schemes.

Data Availability

The data are available upon reasonable request to the corresponding author.

Conflicts of Interest

The authors declare that there are no potential conflicts of interest.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant no. 61772295), Natural Science Foundation of Shandong Province, China (Grant nos. ZR2021MF049 and ZR2019YQ01), and Project of Shandong Provincial Natural Science Foundation Joint Fund Application (ZR202108020011).