A novel image steganography technique based on quantum substitution boxes

Abstract Substitution boxes play an essential role in designing secure cryptosystems. With the evolution of quantum technologies, current data security mechanisms may be broken due to their construction based on mathematical computation. Quantum walks, a universal quantum computational model, play an essential role in designing quantum algorithms. We utilize the benefits of quantum walks to present a novel technique for constructing substitution boxes (S-boxes) based on quantum walks (QWs). The performance of the presented QWs S-box technique is evaluated by S-box evaluation criteria, and our results prove that the constructed S-box has vital qualities for viable applications in security purposes. Furthermore, a new technique for image steganography is constructed. The proposed technique is an integrated mechanism between classical data hiding and quantum walks to achieve better security for the embedded data. The embedding and extraction procedures are controlled by QWs S-box. The inclusion of cryptographic QWs S-box ensures the security of both embedding and extraction phases. At the extraction phase, only the stego image and the secret values are needed for constructing the secret data. Experimental results demonstrate that the presented technique has a high-security, high embedding capacity and good visual quality.

[1]  Xiaofeng Liao,et al.  A novel method for designing S-boxes based on chaotic maps , 2005 .

[2]  Frank Y. Shih,et al.  Digital Watermarking and Steganography: Fundamentals and Techniques , 2007 .

[3]  Fei Peng,et al.  Robust Coverless Image Steganography Based on DCT and LDA Topic Classification , 2018, IEEE Transactions on Multimedia.

[4]  Po-Yueh Chen,et al.  A DWT Based Approach for Image Steganography , 2006 .

[5]  E. O. Kiktenko,et al.  Quantum-secured blockchain , 2017, Quantum Science and Technology.

[6]  Sung Wook Baik,et al.  Image steganography for authenticity of visual contents in social networks , 2017, Multimedia Tools and Applications.

[7]  Atif Alamri,et al.  Efficient Quantum Information Hiding for Remote Medical Image Sharing , 2018, IEEE Access.

[8]  Ahmet Bedri Özer,et al.  A new S-box construction method based on the fractional-order chaotic Chen system , 2017, Signal Image Video Process..

[9]  Ahmed A. Abd El-Latif,et al.  QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant Qubit , 2017 .

[10]  Florent Retraint,et al.  Statistical detection of data hidden in least significant bits of clipped images , 2014, Signal Process..

[11]  Hui Chen,et al.  Discrete-time interacting quantum walks and quantum Hash schemes , 2013, Quantum Inf. Process..

[12]  Ahmed A. Abd El-Latif,et al.  New Quantum Image Steganography Scheme with Hadamard Transformation , 2016, AISI.

[13]  Tariq Shah,et al.  Stego optical encryption based on chaotic S-box transformation , 2014 .

[14]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[15]  Tariq Shah,et al.  A new approach for image encryption and watermarking based on substitution box over the classes of chain rings , 2016, Multimedia Tools and Applications.

[16]  Daniel A. Spielman,et al.  Exponential algorithmic speedup by a quantum walk , 2002, STOC '03.

[17]  Safya Belghith,et al.  Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption , 2016, Nonlinear Dynamics.

[18]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[19]  Andrew M. Childs,et al.  Universal computation by quantum walk. , 2008, Physical review letters.

[20]  Yimin Cheng,et al.  An active steganalysis approach for echo hiding based on Sliding Windowed Cepstrum , 2011, Signal Process..

[21]  Safya Belghith,et al.  A new adaptive image steganography scheme based on DCT and chaotic map , 2017, Multimedia Tools and Applications.

[22]  Salvador Elías Venegas-Andraca,et al.  Quantum walks: a comprehensive review , 2012, Quantum Information Processing.

[23]  Majid Mollaeefar,et al.  A novel method for digital image steganography based on a new three-dimensional chaotic map , 2017, Multimedia Tools and Applications.

[24]  Fenlin Liu,et al.  A review on blind detection for image steganography , 2008, Signal Process..

[25]  Hong Zhao,et al.  Steganalysis for palette-based images using generalized difference image and color correlogram , 2011, Signal Process..

[26]  Rui Yang,et al.  Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption , 2016, Scientific Reports.

[27]  Kevin Curran,et al.  A secure and improved self-embedding algorithm to combat digital document forgery , 2009, Signal Process..

[28]  Hui Tian,et al.  Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs , 2017, Signal Process..

[29]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[30]  Iqtadar Hussain,et al.  A novel approach of audio watermarking based on S-box transformation , 2013, Math. Comput. Model..

[31]  Andrew M. Childs,et al.  Quantum algorithms for algebraic problems , 2008, 0812.0380.

[32]  Hao Luo,et al.  Properties of long quantum walks in one and two dimensions , 2015, Quantum Inf. Process..

[33]  Ahmed Ghoneim,et al.  Secure Quantum Steganography Protocol for Fog Cloud Internet of Things , 2018, IEEE Access.

[34]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[35]  Nagy K. Hanna Mastering Digital Transformation , 2016 .

[36]  Li Li,et al.  Quantum color image encryption based on multiple discrete chaotic systems , 2017, 2017 Federated Conference on Computer Science and Information Systems (FedCSIS).

[37]  Yu-Guang Yang,et al.  Novel Image Encryption based on Quantum Walks , 2015, Scientific Reports.

[38]  Zeeshan Asghar,et al.  A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation , 2016, Neural Computing and Applications.

[39]  Nan Jiang,et al.  LSB Based Quantum Image Steganography Algorithm , 2015, International Journal of Theoretical Physics.

[40]  Pratistha Mathur,et al.  Efficient image steganography using graph signal processing , 2018, IET Image Process..

[41]  Bin Li,et al.  Steganalysis of a PVD-based content adaptive image steganography , 2013, Signal Process..

[42]  Eko Hari Rachmawanto,et al.  Secure Image Steganography Algorithm Based on DCT with OTP Encryption , 2017 .

[43]  Yuting Su,et al.  A video steganalytic algorithm against motion-vector-based steganography , 2011, Signal Process..

[44]  Tariq Shah,et al.  A Watermarking Technique with Chaotic Fractional S-Box Transformation , 2016, Wirel. Pers. Commun..

[45]  A. Bovik,et al.  A universal image quality index , 2002, IEEE Signal Processing Letters.

[46]  K. Birgitta Whaley,et al.  Quantum random-walk search algorithm , 2002, quant-ph/0210064.

[47]  Ahmed A. Abd El-Latif,et al.  Robust Encryption of Quantum Medical Images , 2018, IEEE Access.

[48]  Iqtadar Hussain,et al.  A New Algorithm to Construct Secure Keys for AES , 2010 .

[49]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[50]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.