Quantum Image Encryption and Decryption Algorithms Based on Quantum Image Geometric Transformations

Cryptography is the essential subject for network information security to protect important data. Although following the symmetric cryptosystem for which the participations in the communication keep exactly the same keys, the special for the encryption and decryption algorithms proposed in this paper lays in the operational objectives, the quantum image. Firstly, extracts the properties of gray-scale and position from the quantum gray-scale image which the storage expression of image in quantum states is achieved. Along with the geometric transformations in classical images, this article realizes the quantum image geometric transforms by means of designing quantum circuits. Eventually, through a combination of the proposals in previous, the encryption and decryption algorithms on quantum gray-scale images is finally accomplished, which could ensure the confidentiality and security of the information in delivery. The algorithms belong to the application of quantum image geometric transformations, for further, the new explorations for quantum image cryptography researches.

[1]  Sougato Bose,et al.  Storing, processing, and retrieving an image using quantum mechanics , 2003, SPIE Defense + Commercial Sensing.

[2]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[3]  Ranjan Bose,et al.  Information theory, coding and cryptography , 2003 .

[4]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[5]  Peter W. Shor,et al.  Algorithms for Quantum Computation: Discrete Log and Factoring (Extended Abstract) , 1994, FOCS 1994.

[6]  Kaoru Hirota,et al.  A flexible representation of quantum images for polynomial preparation, image compression, and processing operations , 2011, Quantum Inf. Process..

[7]  I. Chuang,et al.  Quantum Computation and Quantum Information: Introduction to the Tenth Anniversary Edition , 2010 .

[8]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[9]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[10]  José Ignacio Latorre,et al.  Image compression and entanglement , 2005, ArXiv.

[11]  Lov K. Grover A fast quantum mechanical algorithm for database search , 1996, STOC '96.

[12]  Ri-Gui Zhou,et al.  Quantum Associative Neural Network with Nonlinear Search Algorithm , 2012 .

[13]  Gábor Erdélyi,et al.  Quantum cryptography: A survey , 2007, CSUR.

[14]  Chao Yang Pang,et al.  Quantum Discrete Cosine Transform for Image Compression , 2006 .

[15]  Dengguo Feng,et al.  Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD , 2004, IACR Cryptol. ePrint Arch..

[16]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[17]  Barenco,et al.  Elementary gates for quantum computation. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[18]  Salvador E. Venegas-Andraca,et al.  Processing images in entangled quantum systems , 2010, Quantum Inf. Process..