Abstract
The Caputo fractional order Lotka-Volterra system is time-consuming in practical applications, since its starting point is fixed. To tackle this problem, a short memory fractional order Lotka-Volterra system (SMFrLVS) is proposed, where the chaotic attractor of the short memory fractional order Lotka-Volterra system is achieved by the predictor-corrector method. Then, a multilayer fractional order Lotka-Volterra system with short memory (MSMFrLVS) is introduced, whose chaotic behaviors are explored via Poincare sections and frequency power spectra. A quantum image encryption algorithm is proposed by combining MSMFrLVS with quantum dual-scale triangular map. A quantum circuit of the dual-scale triangular map is designed with ADDER-MOD. At the permutation stage, the plaintext image is transformed into quantum form with the generalized quantum image representation model. The resulting quantum image is divided into sub-blocks and scrambled by the quantum dual-scale triangular map. Subsequently, the intra and the inter permutation operations on bit-planes are realized by sorting pseudo-random sequence and by quantum Gray code, respectively. At the diffusion stage, the initial values of the MSMFrLVS are generated with a plaintext correlation mechanism. The ciphertext image can be acquired by carrying out three-level diffusion operations. It is demonstrated that the proposed quantum image encryption algorithm performs better than some typical image encryption algorithm in terms of security, robustness, computational complexity and encryption speed.
1 Introduction
Lots of efficient quantum image encryption algorithms have been developed [1–5]. Since chaotic systems have good dynamic characteristics, they are very suitable for quantum image encryption [6–8]. Dai et al. presented an image encryption and compression algorithm based on 4D hyper-chaotic Henon map [9]. Zhou et al. designed a secure quantum image encryption algorithm based on 5D hyper-chaotic system [10]. Ye et al. explored a fast image encryption scheme based on public key cryptosystem, quantum logistic map and the substitution-permutation network [11]. Khan et al. proposed a fast quantum image encryption scheme based on affine transform and fractional order Lorenz-like chaotic dynamical system [12]. Signing et al. provided an image encryption algorithm by combining a chameleon chaotic system with dynamic DNA coding [13]. Wang et al. researched a color image encryption scheme by combining hyper-chaotic system with improved quantum revolving gate [14]. Li et al. proposed an image encryption scheme by combining quantum chaos with discrete fractional wavelet transform [15]. Wu et al. designed a quantum image encryption based on 2D logistic map and quantum Baker map [16]. Hu et al. presented an efficient quantum color image encryption scheme using a new 3D chaotic system [17]. Kamran et al. proposed a secure image encryption algorithm based on quantum walk and chaos [18].
There have been numerous proposals for quantum image encryption algorithms with image scrambling methods [19–21]. Hu et al. proposed a quantum image encryption algorithm based on Arnold transform and wavelet transform, where the wavelet coefficients are scrambled by the Arnold transform [22]. Liu et al. designed a quantum image encryption algorithm by combining general Arnold transform with substitution tables (S-box) scrambling [23]. Liu et al. developed a quantum block image encryption algorithm with quantum Arnold transform based on the superposition property of quantum states [24]. Zhou et al. suggested a multi-image encryption scheme based on quantum 3D Arnold transform [25]. However, these methods have some limitations and cannot be used to scramble the rectangle image. For any rectangle image, it should be expanded into the square image or divided into many square images before scrambling, which will add extra space and increase computational complexity.
A fast quantum image encryption scheme for a rectangle image based on the MSMFrLVS and quantum dual-scale triangular map is proposed. During the encryption process, the plaintext image is represented with the generalized quantum image representation (GQIR) model, the image sub-blocks are shuffled with quantum dual-scale triangular map. Subsequently, the bit-level permutation is performed by the random sequence generated by the MSMFrLVS and quantum Gray code, respectively. Then, the three-level diffusion operations among the pixel values, binary bits and pixel bits are implemented by the chaotic sequences originated by the MSMFrLVS. Simulation analyses show the proposed quantum image encryption algorithm has good encryption performance and can resist any key sensitivity attacks and any brute-force attacks.
The rest of this paper is organized as follows: The basic knowledge of the GQIR for images, the MSMFrLVS and the Gray code are introduced in Section 2. The quantum circuits of dual-scale triangular map are designed in Section 3. The proposed quantum image encryption scheme is shown in Section 4. Numerical simulation analyses are described in Section 5. Finally, a conclusion is given in Section 6.
2 Preliminaries
2.1 Generalized quantum image representation
In Ref. [26], the generalized quantum image representation (GQIR) can store arbitrary integer numbers quantum images with qubits, where is the image color depth, and remarked as and are the sizes of the Y-axis coordinate information and the X-axis coordinate information, respectively. Hence, an quantum image with GQIR can be expressed aswhere and are the location information and the color information, respectively.
2.2 Multilayer short memory fractional order Lotka-Volterra system
2.2.1 Short memory fractional order system
The order Caputo fractional derivative of function is defined as [27]where is the Gamma function. The standard Caputo fractional order system is illustrated aswhere is the fixed starting point of the fractional order system.
The standard fractional order system Eq. 3 stores memory from . Wu et al. proposed a short memory fractional order system which holds memory from and provides more freedom in the real-world applications [28], as shown in Figure 1. Let the interval be divided into subintervals of length such that , is an integer and . The short memory fractional order system is given as
FIGURE 1
2.2.2 Short memory fractional order Lotka-Volterra system
The fractional order Lotka-Volterra chaotic system is defined as [29].where represents the fractional order of the system Eq. 5, denotes the intrapopulation natural growth rate of the prey, denotes the effect of the predator on the prey, is the intrapopulation natural growth rate of the predator, is the positive effect of the prey on the predator, the parameters , and the constants are positive.
We define the SMFrLVS as
In Eq. 6, the starting point of the SMFrLVS is the variable point rather than a fixed point such that the SMFrLVS improves the speed of the numerical computation.
2.2.3 Predictor-corrector method for the SMFrLVS
The predictor-corrector method is one of the most widely methods used in the chaotic analysis of the fractional order system, which explains the approximate solution of the nonlinear fractional order differential equations. The SMFrLVS is solved by the predictor-corrector method as follows.
For the interval , the predicted values are given as
The numerical solutions are determined byFor , , and , the predicted values are defined aswhere the coefficient is expressed as
The numerical solutions are defined aswhere the coefficient is given as
The parameters are set as , , , , , , , , , and the initial values are taken as . When , the chaotic attractors of the SMFrLVS with phase portraits are plotted in Figure 2. When , the chaotic attractors of the SMFrLVS with phase portraits are described in Figure 3. The SMFrLVS can significantly save time and is more suitable for practical applications than the fractional order Lotka-Volterra system, since the SMFrLVS starts from , as shown in Table 1.
FIGURE 2
FIGURE 3
TABLE 1
| The SMFrLVS (s) | Fractional order Lotka-Volterra system (s) | |
|---|---|---|
| 4,000 | 0.863 | 14.575 |
| 8,000 | 0.992 | 66.054 |
| 16,000 | 1.077 | 226.386 |
| 30,000 | 1.272 | 1306.923 |
| 40,000 | 1.437 | 1802.287 |
| 50,000 | 1.624 | 3,256.137 |
Time comparison between the SMFrLVS and the fractional order Lotka-Volterra system.
2.2.4 Multilayer short memory fractional order Lotka-Volterra system
We propose the MSMFrLVS as followswhere the parameters , and the constants are positive, represent the fractional order of the MSMFrLVS, the starting point of the MSMFrLVS is . The numerical solutions of the MSMFrLVS are acquired with the predictor-corrector method, the chaotic attractors of the MSMFrLVS with phase portraits are depicted in Figure 4, when and takes 2000, 3000, 4000, 5000, the values of other parameters remain unchanged, it is illustrated that the number of layers of the MSMFrLVS increases with the increase of . When and , the values of other parameters remain unchanged, the chaotic attractors of the MSMFrLVS with phase portraits are displayed in Figure 5, it is shown that the number of layers of the MSMFrLVS decreases as the increase of the fractional order.
FIGURE 4
FIGURE 5
It is difficult to describe the orbits of a chaotic system concisely due to the disorder of the orbits. One of the ideas is to reduce the dimension of description and simplify the trajectory of the space into a series of discrete points, thus the Poincare section is observed. A large number of points observed at the intersection of the phase space trajectory and the Poincare section are a feature of the chaotic motion, as shown in Figure 6. In addition, the continuous frequency power spectrum is generally regarded as an indicator of chaos, the frequency power spectra of the MSMFrLVS are plotted in Figure 7.
FIGURE 6
FIGURE 7
2.3 Gray code
Gray code is a signal coding method and generally used in the digital conversions [30]. Gray code can be expressed aswhere is a positive integer with binary code .
3 Quantum realization of the dual-scale triangular map
3.1 Quantum representation of the dual-scale triangular map
Li et al. [31] proposed 2D dual-scale triangular map which can be utilized to scramble a rectangle image directly. For a given matrix, represent the pixel coordinates and corresponding to the changed pixel coordinates. 2D dual-scale triangular map is defined aswhere , and are non-negative integers. Note that and should be co-prime, so should and .
The inverse dual-scale triangular map iswhere and , denotes that each element of is rounded to the nearest integer greater than or equal to that element. and .
According to the classical dual-scale triangular map, the quantum representation of the dual-scale triangular map can be expressed as
Correspondingly, the quantum representation of the inverse dual-scale triangular map can be defined as
3.2 Quantum circuits for the dual-scale triangular map and the inverse dual-scale triangular map
3.2.1 Quantum circuits for the dual-scale triangular map
According to
Eq. 17, the states
and
are independent of each other. Therefore, the quantum circuits of
and
can be designed.
(1) Quantum circuit . According to Eq. 17, can be achieved with steps.
from the first step to the last step can be acquired with the ADDER-MOD
network [
32], as shown in
Figure 8A.
(2) Quantum circuit . According to Eq. 17, can be realized with steps.
FIGURE 8
It shows that from the first step to the -th step can be obtained with the ADDER-MOD network. In the -th step, is substituted for . from the -th step to the last step can be constructed with the ADDER-MOD network. The quantum circuit is depicted in Figure 8B.
3.2.2 Quantum circuits for the inverse dual-scale triangular map
To recover the plaintext image from the scrambled image, the quantum circuits of
and
should be involved. From
Eq. 18, the inverse transform uses subtraction operation. A theorem stated in [
32] provides a solution to realizing the subtraction operation.
where
,
,
.
(1) Quantum circuit . From Eq. 18, it requires steps to realize , as illustrated in Figure 9A. can be constructed as
from the first step to the last step can be created with the ADDER-MOD
network.
FIGURE 9
It demonstrates that from the first step to the -th step can be obtained with the ADDER-MOD network. is superseded by in the -th step. In the -th step, is acquired with the help of the ADDER-MOD operation. In the -th step, is replaced by . From the -th step to the -th step, is generated with the ADDER-MOD network. In the -th step, is substituted for . In the last step, is accomplished by the ADDER-MOD network.
4 Quantum image encryption and decryption algorithm
4.1 Quantum image encryption algorithm
The proposed quantum image encryption scheme based on the MSMFrLVS and quantum dual-scale triangular map is shown in Figure 10. The plaintext image is represented with the GQIR model. During the permutation stage, the position information of the quantum image is shuffled by the block-level permutation and the intra and the inter bit-level permutation operations, while the color information of the quantum image remains unchanged. In the diffusion stage, three-level diffusion operations including pixel values, binary bits and pixel bits are accomplished for the scrambled image.
FIGURE 10
Assume the plaintext image of size with a color depth to be encrypted is expressed as and its GQIR representation can be written as
The specific encryption algorithm involves the following steps.
Step 1: Block-level scrambling is performed. To effectively realize the block-level arrangement, the plaintext image should be decomposed into sub-blocks. If the block size is , then the number of blocks is after division. Assume that represents the quantum dual-scale triangular map which is applied on the and qubits and the scrambled block image can be acquired.According to Eq. 17, the scrambled position qubits and can be obtained asThe circuit of image block-level permutation based on is depicted in Figure 11.
FIGURE 11
Step 2: To improve the security of the system, a plaintext correlation mechanism is employed to obtain the initial values of the MSMFrLVS. The method is expressed aswhere , , and are the initial values of Eq. 13, is a 256-bit hash value, , , and are the updated initial values of Eq. 13. Obviously, the new initial values are related to the plaintext image.
Step 3: The initial values , , and are iterated with Eq. 13 times, is set to 100. To avoid the harmful effect of transient procedure, a new chaotic sequence is obtained after abandoning the former elements, where .
Step 4: The new chaotic sequence is transformed into integer sequence, ,where rounds to the nearest integer towards zero.
Step 5: Bit-level permutation includes the intra bit-planes permutation and the inter bit-planes permutation. The intra bit-planes permutation is accomplished by sorting the sequence in ascending order. The corresponding quantum circuit is shown in Figure 12, where the exchange of bit-planes is implemented with quantum swap gate.For pixel , a quantum sub-operation can be constructed aswhere to realize bit-planes permutation operation is defined asBy applying the quantum sub-operation on the block-level permutation image , the bit-planes of pixel are scrambled.To complete bit-planes scrambling of all the pixels, a quantum operation is defined,
FIGURE 12
Step 6: The inter bit-planes permutation is accomplished with quantum Gray code. By scrambling quantum image with quantum Gray code, the scrambled quantum image is obtained. The circuit of quantum Gray code is shown in Figure 13A.
FIGURE 13
Step 7: The sequence is given byThe scrambled quantum image is chosen to perform diffusion operations among pixel values, binary bits and pixel bits according to the sequence .
Step 8: If , then the pixel values diffusion operation is performed.If , then the binary bits diffusion operation is performed.If , then the pixel bits diffusion operation is performed.According to Eq. 36, the hundreds place , tens place , and one place . They were then entered into Eq. 37 to obtain , , and . They are then substituted in Eq. 38 and combined to yield . Finally, the quantum ciphertext image can be generated by substituting them into Eq. 39.
4.2 Quantum image decryption algorithm
The decryption process is the reverse process of the encryption process, the specific image decryption process is as follows.
Step 1: The encryption quantum image performs three-level diffusion operations with the integer sequences and , the scrambled quantum image is retrieved.
Step 2: The quantum image is retrieved by the inverse quantum Gray code on the scrambled quantum image , the circuit of the inverse quantum Gray code is depicted in Figure 13B.
Step 3: The quantum image is obtained by the inverse bit-planes exchange operation on the quantum image .
Step 4: The plaintext image can be recovered by performing inverse on the quantum image .
5 Numerical simulation and discussion
The numerical simulations are run on a MATLAB R2019b platform due to a lack of equipment. To test the effectiveness and reliability of the proposed quantum image encryption algorithm, the plaintext images in Figures 14A–C are image “Barbara” of size , image “Arnav” of size , and color image “Girls” of size [33–35]. The block size has been set to four. The simulation parameters are as follows: , , , , , , , , , , , , , , and . The relevant ciphertext images are shown in Figures 14D–F. Because all ciphertext images are encrypted and exhibit chaotic behavior, attacks will have an enormously difficult time extracting the original plaintext images. When decrypted with the correct keys, Figures 14G–I show the corresponding decrypted images. There is no discernible difference between the original plaintext image and the decrypted image, indicating that the proposed fast quantum image encryption scheme based on a multilayer short memory fractional order Lotka-Volterra system and a dual-scale triangular map is effective.
FIGURE 14
The proposed algorithm was evaluated using three types of statistical property analyses, comprising histogram, correlation of adjacent pixels, and information entropy. The histogram assures that plaintext images and ciphertext images are different from each other. The association between two neighboring pixels was shown by the correlation of adjacent pixels. The information entropy looks at the encryption effect of the ciphertext images. In order to verify the proposed algorithm’s resistance to various attacks, differential attack analysis, noise attack analysis, and shear attack analysis were also carried out. To show the space and sensitivity of the keys, key space analysis and key sensitivity analysis are then done. The proposed algorithm’s computational complexity was then described. Last but not least, tests and comparisons of the encryption and decryption times in seconds were performed. All of the preceding analyses will guarantee that proposed algorithms would both be technically proficient and efficient.
5.1 Statistical property analysis
5.1.1 Histogram
The histograms of the color images “Girls,” “Sailboat,” and “Goldhill” are shown in Figures 15A–C, and the histograms of the corresponding ciphertext images are shown in Figures 15D–F. It is demonstrated that the histograms of ciphertext images differ noticeably from those of plaintext images. The pixel values of ciphertext images are evenly distributed and completely different from those of plaintext images. It demonstrates that the proposed quantum image encryption scheme can withstand the histogram attack.
FIGURE 15
Furthermore, the chi-square test is used to precisely measure the difference between the ciphertext image and the plaintext image.where is the observed number of the -th gray level and is the expected number of the -th gray level. Table 2 displays the results of the chi-square test on ciphertext and plaintext images. Table 2 shows that the chi-square values of ciphertext images are less than of the significance level, demonstrating that the proposed encryption scheme can withstand the histogram attack.
TABLE 2
| Image | Plaintext image | Ciphertext image | |
|---|---|---|---|
| Barbara | 1.6314e+05 | 235.6696 | |
| Arnav | 4.0976e+04 | 278.3243 | |
| Bridge | 1.5584e+05 | 265.5647 | |
| Lake | 1.5144e+05 | 259.4658 | |
| Baboon | 1.4652e+04 | 265.2458 | |
| R channel | 1.4164e+05 | 236.4007 | |
| Girls | G channel | 1.1872e+05 | 206.2859 |
| B channel | 1.6640e+05 | 234.2054 | |
| R channel | 1.6543e+05 | 256.5642 | |
| Sailboat | G channel | 1.2564e+05 | 286.2656 |
| B channel | 1.3654e+05 | 266.6462 | |
| R channel | 1.5621e+05 | 269.5354 | |
| Goldhill | G channel | 1.4365e+05 | 275.3564 |
| B channel | 1.6543e+05 | 265.3564 | |
| Critical value (5%) | 293.2478 | 293.2478 |
Chi-square test.
5.1.2 Correlation of adjacent pixels
Assume that pairs of adjacent pixels need to be randomly selected from the image to be investigated, and the gray values are recorded as , the correlation coefficient between two vectors is defined as
The correlation distribution of plaintext image “Girls” and ciphertext image “Girls” in horizontal, vertical and diagonal directions are depicted in Figure 16. The correlation coefficients of plaintext images and ciphertext images are edited in Table 3. As can be seen from Figure 16 and Table 3, the correlations between the adjacent pixels of plaintext images are extremely strong, while the correlations between the adjacent pixels of ciphertext images are close to 0, which are almost no correlations. Compared with [10, 24], the proposed image encryption scheme has stronger capacity to resist the correlation analysis attack.
FIGURE 16
TABLE 3
| Correlation coefficient | Horizontal | Vertical | Diagonal | |
|---|---|---|---|---|
| Plaintext Barbara | 0.9803 | 0.9806 | 0.9591 | |
| Ciphertext Barbara | 0.0079 | 0.0087 | 0.0035 | |
| Plaintext Arnav | 0.9844 | 0.9837 | 0.9730 | |
| Ciphertext Arnav | 0.0097 | 0.0100 | 0.0138 | |
| Plaintext Baboon | 0.9763 | 0.9356 | 0.9435 | |
| Ciphertext Baboon | 0.0053 | 0.0059 | 0.0043 | |
| Plaintext Bridge | 0.9786 | 0.9442 | 0.9624 | |
| Ciphertext Bridge | 0.0023 | 0.0045 | 0.0026 | |
| R channel | 0.9678 | 0.9494 | 0.9304 | |
| Plaintext Girls | G channel | 0.9456 | 0.9247 | 0.8827 |
| B channel | 0.9162 | 0.8944 | 0.8352 | |
| R channel | 0.0093 | 0.0303 | 0.0049 | |
| Ciphertext Girls | G channel | 0.0177 | 0.0203 | 0.0057 |
| B channel | 0.0155 | 0.0052 | 0.0117 | |
| Plaintext Sailboat | R channel | 0.9356 | 0.9869 | 0.9364 |
| G channel | 0.9468 | 0.9576 | 0.9567 | |
| B channel | 0.9256 | 0.9564 | 0.8967 | |
| R channel | 0.0053 | 0.0134 | 0.0036 | |
| Ciphertext Sailboat | G channel | 0.0054 | 0.0023 | 0.0054 |
| B channel | 0.0034 | 0.0098 | 0.0068 | |
| Reference [10] | 0.0423 | 0.0202 | 0.0212 | |
| Reference [24] | 0.0295 | 0.0187 | 0.0393 |
Correlation coefficients of adjacent pixels.
5.1.3 Information entropy
The information entropy calculation formula is written aswhere represents the probability of the gray value . The theoretical value of information entropy for a gray-scale random image with level 256 is 8 bits. The information entropy of plaintext images and ciphertext images is listed in Table 4. It is demonstrated that the information entropy of each ciphertext image approaches the theoretical value, whereas the information entropy of each plaintext image deviates significantly from the theoretical value, and the image encryption effect outperforms [10, 24].
TABLE 4
| Images | Plaintext image (bit) | Ciphertext image (bit) | |
|---|---|---|---|
| Barbara | 7.6578 | 7.9996 | |
| Arnav | 7.4914 | 7.9973 | |
| Baboon | 7.4465 | 7.9985 | |
| Bridge | 7.2645 | 7.9976 | |
| Lake | 7.6548 | 7.9992 | |
| R channel | 7.7771 | 7.9975 | |
| Girls | G channel | 7.5523 | 7.9981 |
| B channel | 7.2687 | 7.9975 | |
| R channel | 7.6782 | 7.9968 | |
| Sailboat | G channel | 7.6485 | 7.9978 |
| B channel | 7.4356 | 7.9986 | |
| R channel | 7.6897 | 7.9991 | |
| Goldhill | G channel | 7.8562 | 7.9981 |
| B channel | 7.7568 | 7.9985 | |
| Reference [10] | 7.1273 | 7.9970 | |
| Reference [24] | 7.0097 | 7.9970 |
Information entropy.
5.2 Differential attack analysis
To quantitatively measure the difference between two images of the same size, Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI) can be performed.
Besides NPCR and UACI, Block Average Changing Intensity (BACI) can also measure the difference between two random images.
If the NPCR of the two images is 100%, and the UACI is close to the theoretical value, but the visual effects of the two images are similar, it indicates that NPCR and UACI are still insufficient in describing the differences between the two images, and BACI makes up for this deficiency. The theoretical value of BACI is . From Table 5, NPCR, UACI and BACI are all close to the theoretical values. Therefore, the proposed encryption scheme is very sensitive to any small changes of the pixel of plaintext image.
TABLE 5
| Image | NPCR% | UACI% | BACI% | |
|---|---|---|---|---|
| Barbara | 99.6090 | 33.4476 | 26.7930 | |
| Arnav | 99.5820 | 33.3371 | 26.6211 | |
| Baboon | 99.6032 | 33.4562 | 26.7568 | |
| Bridge | 99.5962 | 33.3685 | 26.6238 | |
| Lake | 99.5658 | 33.3456 | 26.8664 | |
| R channel | 99.6237 | 33.4665 | 26.8179 | |
| Girls | G channel | 99.6538 | 33.3546 | 26.7534 |
| B channel | 99.5456 | 33.1562 | 26.6481 | |
| R channel | 99.6023 | 33.4356 | 26.5562 | |
| Sailboat | G channel | 99.6548 | 33.3346 | 26.7652 |
| B channel | 99.5964 | 33.3450 | 26.6724 | |
| R channel | 99.6432 | 33.3315 | 26.6482 | |
| Goldhill | G channel | 99.6023 | 33.3725 | 26.7315 |
| B channel | 99.6130 | 33.4456 | 26.6856 |
NPCR, UACI and BACI.
5.3 Key space analysis
The key space of the image cryptosystem should be large enough to resist brute force attack effectively. The key space should be at least . In the proposed scheme, the key space contains the parameters of quantum dual-scale triangular map, the initial values of the MSMFrLVS and the hash value of plaintext image. The key space of quantum dual-scale triangular map is estimated to be . The precision of the initial values of the MSMFrLVS is , the total key space is . Therefore, the key space of the proposed algorithm is large enough to resist the brute-force attack.
5.4 Key sensitivity analysis
A good image encryption system should have strong key sensitivity. To be more precise, the key sensitivity of the system is evaluated by the mean-squared error (MSE).where denotes the image size, and represents the pixel values of decryption image and plaintext image at the position , respectively. Figures 17B–E show the MSE curves with wrong keys , , and , respectively. As can be seen from Figure 17, the ciphertext images obtained under the condition of minor changes of the keys are quite different. Since the keys are randomly selected from the key space, it can be explained that each key in the key space is valid and sensitive.
FIGURE 17
5.5 Shear attack analysis
In addition to the noise attack, the ciphertext image is also susceptible to malicious cutting by the attacker during the process of transmission and processing, therefore it is necessary to analyze the anti-clipping ability of the proposed algorithm. Figure 18 shows the ciphertext images of different clipping regions and their corresponding decryption images. From Figure 18, the resolution of decryption images varies with the cutting degree of ciphertext images, but the crucial information of the decryption images can still be identified. Therefore, the proposed encryption algorithm has a certain ability to resist the shear attack.
FIGURE 18
5.6 Computational complexity
Assume that is an image, and is greater than . The computational complexity of the proposed quantum image encryption algorithm primarily depends on quantum dual-scale triangular map, the intra bit-planes permutation and quantum XOR operation. In the block-level permutation stage, the basic gates of ADDER-MOD are and the complexity of the ADDER-MOD is about [1]. Hence, the computational complexity of quantum dual-scale triangular map is . In addition, the intra bit-planes permutation involves four quantum swap gates, and each swap gate is achieved by three C-NOT gates, thus the intra bit-planes permutation is realized by basic gates, the computational complexity of the intra bit-planes permutation is . What’s more, the quantum XOR operation needs Toffoli gates [36], and each Toffoli gate is composed of six C-NOT gates, thus the quantum XOR operation involves basic gates, and the computational complexity of the quantum XOR operation is . Consequently, the computational complexity of the proposed quantum algorithm is , while the computational complexity of the corresponding classical image encryption scheme is . Obviously, the proposed quantum image encryption algorithm is better than its classical counterparts in terms of computational complexity.
5.7 Noise attack analysis
Assume that the ciphertext image “Arnav” is added with the Gaussian noise.where and are the noisy ciphertext images and the noise-free ciphertext images, represents noise intensity, is the Gaussian noise with zero mean and unit standard deviation. Figure 19A shows the MSE curves with different noise intensities, Figures 19B–E give the decryption images with noise intensities 2, 4, 6 and 8. From Figure 19, with the increase of noise intensity, decryption images become more and more blurred, but the outline of decryption images can still be seen clearly, the proposed image encryption scheme can resist the noise attack to some degree.
FIGURE 19
5.8 Encryption time analysis
The length of the execution time is an index to evaluate the quality of an encryption algorithm. The execution time of the proposed algorithm and Refs. [9, 12, 16, 17] are listed in Table 6. In [9, 16, 17], the pseudo-random sequences are originated by iterating the 4D hyper-chaotic Henon map, 2D logistic map and 3D chaotic system, respectively, which take too much time. In [12], the encryption process is time-consuming owing to the fractional-order Lorenz-like chaotic system. In our algorithm, the initial point of the MSMFrLVS is variable such that the algorithm can save the encryption time greatly, thus the proposed image encryption algorithm can be developed for fast image encryption.
6 Conclusion
The quantum image encryption scheme is proposed by combining the MSMFrLVS with the quantum dual-scale triangular map. The block-level permutation, intra and inter bit-plane permutations, and three-level diffusion operations are used to implement the encryption process. The independent parameters of quantum dual-scale triangular map, the initial values and the control parameters of the MSMFrLVS and the hash value of plaintext image consist of the keys of the proposed quantum image encryption algorithm. As a result, the encryption system’s key space is sufficiently large. Numerical simulation analyses demonstrate the proposed algorithm’s reliability and effectiveness, and it requires less computation time. Furthermore, the proposed image encryption algorithm has lower computational complexity than its conventional counterparts. In the future, we will focus on combining quantum image encryption with semi-quantum cryptography protocols [37] in order to propose an algorithm with improved security and quantum communication capacity.
Statements
Data availability statement
The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.
Author contributions
YM: Conceptualization, methodology, investigation; F-FY: Formal analysis, writing—original draft; L-HG: Validation, writing- reviewing and editing; W-PZ: Conceptualization, funding acquisition, resources, supervision, writing—review and editing.
Funding
This work is supported by the National Natural Science Foundation of China (Grant No. 61861029), the Top Double 1000 Talent Programme of Jiangxi Province (Grant No. JXSQ2019201055).
Conflict of interest
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Publisher’s note
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
References
1.
ZhouNRHuaTXGongLHPeiDJLiaoQH. Quantum image encryption based on generalized Arnold transform and double random-phase encoding. Quan Inf Process (2015) 14(4):1193–213. 10.1007/s11128-015-0926-z
2.
MalikADhallSGuptaS. An improved bit plane image encryption technique using RC4 and quantum chaotic demeanour. Multimed Tools Appl (2020) 80(5):7911–37. 10.1007/s11042-020-09973-5
3.
ZhuHHChenXBYangYX. A multimode quantum image representation and its encryption scheme. Quan Inf Process (2021) 20(9):315. 10.1007/s11128-021-03255-1
4.
ZhangJLHuangZJLiXWuMQWangXYDongYM. Quantum image encryption based on quantum image decomposition. Int J Theor Phys (Dordr) (2021) 60(8):2930–42. 10.1007/s10773-021-04862-5
5.
WangLRanQWMaJ. Double quantum color images encryption scheme based on DQRCI. Multimed Tools Appl (2020) 79(9-10):6661–87. 10.1007/s11042-019-08514-z
6.
VagishKDRajakumaranCKavithaR. Chaos based encryption of quantum images. Multimed Tools Appl (2020) 79(33-34):23849–60. 10.1007/s11042-020-09043-w
7.
ZhouNRHuangLXGongLHZengQW. Novel quantum image compression and encryption algorithm based on DQWT and 3D hyper-chaotic Henon map. Quan Inf Process (2020) 19(9):284. 10.1007/s11128-020-02794-3
8.
WangYChenLQYuKLGaoYMaY. An image encryption scheme based on logistic quantum chaos. Entropy (2022) 24(2):251. 10.3390/e24020251
9.
DaiJYMaYZhouNR. Quantum multi-image compression-encryption scheme based on quantum discrete cosine transform and 4D hyper-chaotic Henon map. Quan Inf Process (2021) 20(7):246. 10.1007/s11128-021-03187-w
10.
ZhouNRChenWWYanXYWangYQ. Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system. Quan Inf Process (2018) 17(6):137. 10.1007/s11128-018-1902-1
11.
YeGDJiaoKXHuangXLGoiBMYapWS. An image encryption scheme based on public key cryptosystem and quantum logistic map. Sci Rep (2020) 10(1):21044. 10.1038/s41598-020-78127-2
12.
KhanMRasheedA. A fast quantum image encryption algorithm based on affine transform and fractional-order Lorenz-like chaotic dynamical system. Quan Inf Process (2022) 21(4):134. 10.1007/s11128-022-03474-0
13.
SigningVRFTegueGAGKountchouMNjitackeZTTsafackNNkapkopJDDet alA cryptosystem based on a chameleon chaotic system and dynamic DNA coding. Chaos Solitons Fractals (2022) 155:111777. 10.1016/j.chaos.2021.111777
14.
WangXYSuYNLuoCNianFZTengL. Color image encryption algorithm based on hyperchaotic system and improved quantum revolving gate. Multimed Tools Appl (2022) 81(10):13845–65. 10.1007/s11042-022-12220-8
15.
LiCMYangXZ. An image encryption algorithm based on discrete fractional wavelet transform and quantum chaos. Optik (2022) 260:169042. 10.1016/j.ijleo.2022.169042
16.
WuWQWangQ. Quantum image encryption based on Baker map and 2D logistic map. Int J Theor Phys (Dordr) (2022) 61(3):64. 10.1007/s10773-022-04979-1
17.
HuWBDongYM. Quantum color image encryption based on a novel 3D chaotic system. J Appl Phys (2022) 131(11):114402. 10.1063/5.0084611
18.
KamranMIKhanMAAlsuhibanySAGhadiYYArshadAJAhmadJet alA highly secured image encryption scheme using quantum walk and chaos. Comput Mater Contin (2022) 73(1):657–72. 10.32604/cmc.2022.028876
19.
AlhumyaniHEl-BanbyGMEl-SayedHSEl-SamieFFaragallahOS. Efficient generation of cancelable face templates based on quantum image Hilbert permutation. Electronics (2022) 11(7):1040. 10.3390/electronics11071040
20.
ZhongHYLiGD. Multi-image encryption algorithm based on wavelet transform and 3D shuffling scrambling. Multimed Tools Appl (2022) 81:24757–76. 10.1007/s11042-022-12479-x
21.
ChenCZhangHYWuB. Image encryption based on arnod transform and fractional chaotic. Symmetry (Basel) (2022) 14(1):174. 10.3390/sym14010174
22.
HuWWZhouRGLuoJJiangSXLuoGF. Quantum image encryption algorithm based on Arnold scrambling and wavelet transforms. Quan Inf Process (2020) 19(3):82. 10.1007/s11128-020-2579-9
23.
LiuHZhaoBHuangL. Quantum image encryption scheme using Arnold transform and S-box scrambling. Entropy (2019) 21(4):343. 10.3390/e21040343
24.
LiuXBXiaoDHuangWLiuC. Quantum block image encryption based on Arnold transform and sine chaotification model. IEEE Access (2019) 7:57188–99. 10.1109/ACCESS.2019.2914184
25.
ZhouNRYanXYLiangHRTaoXYLiGY. Multi-image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system. Quan Inf Process (2018) 17(12):338. 10.1007/s11128-018-2104-6
26.
ZhouRGLiuXLuoJ. Quantum circuit realization of the bilinear interpolation method for GQIR. Int J Theor Phys (Dordr) (2017) 56(9):2966–80. 10.1007/s10773-017-3463-y
27.
LiYChenYQPodlubnyI. Stability of fractional-order nonlinear dynamic systems: Lyapunov direct method and generalized Mittag-Leffler stability. Comput Math Appl (2010) 59(5):1810–21. 10.1016/j.camwa.2009.08.019
28.
WuGCDengZGBaleanuDZengDQ. New variable-order fractional chaotic systems for fast image encryption. Chaos (2019) 29(8):083103. 10.1063/1.5096645
29.
AgrawalSKSrivastavaMDasS. Synchronization between fractional-order ravinovich-fabrikant and lotka-volterra systems. Nonlinear Dyn (2012) 69(4):2277–88. 10.1007/s11071-012-0426-y
30.
El-LatifAAAAbd-El-AttyBTalhaM. Robust encryption of quantum medical images. IEEE Access (2018) 6:1073–81. 10.1109/ACCESS.2017.2777869
31.
LiPSZhengQHongJGXingCH. 2D triangular mappings and their applications in scrambling rectangle image. Inf Tech J (2008) 7(1):40–7. 10.3923/itj.2008.40.47
32.
JiangNWangL. Analysis and improvement of the quantum Arnold image scrambling. Quan Inf Process (2014) 13(7):1545–51. 10.1007/s11128-014-0749-3
33.
University of Southern California. Signal and Image Processing Institute. USC-SIPI Image Database (1997) Available at: http://sipi.usc.edu/database (Online Accessed March 15, 2021).
34.
RotheRTimofteRGoolLV. Deep expectation of real and apparent age from a single image without facial landmarks. Int J Comput Vis (2018) 126(2):144–57. 10.1007/s11263-016-0940-3
35.
ArbelaezPMaireMFowlkesCMalikJ. Contour detection and hierarchical image segmentation. IEEE Trans Pattern Anal Mach Intell (2011) 33(5):898–916. 10.1109/TPAMI.2010161
36.
RalphTCReschKJGilchristA. Efficient Toffoli gates using qudits. Phys Rev A (Coll Park) (2007) 75(2):022313. 10.1103/PhysRevA.75.022313
37.
YeTYGengMJXuTJChenY. Efficient semiquantum key distribution based on single photons in both polarization and spatial-mode degrees of freedom. Quan Inf Process (2021) 21(4):123. 10.1007/s11128-022-03457-1
Summary
Keywords
quantum image encryption, fractional order differential equation, Lotka-Volterra system, predictor-corrector method, quantum dual-scale triangular map
Citation
Ma Y, Yu F-F, Gong L-H and Zou W-P (2022) Fast quantum image encryption scheme based on multilayer short memory fractional order Lotka-Volterra system and dual-scale triangular map. Front. Phys. 10:1028630. doi: 10.3389/fphy.2022.1028630
Received
26 August 2022
Accepted
23 September 2022
Published
18 October 2022
Volume
10 - 2022
Edited by
Tianyu Ye, Zhejiang Gongshang University, China
Reviewed by
Guodong Ye, Guangdong Ocean University, China
Xingbin Liu, Southwest University, China
Updates
Copyright
© 2022 Ma, Yu, Gong and Zou.
This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Correspondence: Wei-Ping Zou, zwp@ncu.edu.cn
This article was submitted to Quantum Engineering and Technology, a section of the journal Frontiers in Physics
Disclaimer
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.