Next Article in Journal
BRAQUE: Bayesian Reduction for Amplified Quantization in UMAP Embedding
Next Article in Special Issue
Multi-Receptive Field Soft Attention Part Learning for Vehicle Re-Identification
Previous Article in Journal
Quantum Machine Learning for Distributed Quantum Protocols with Local Operations and Noisy Classical Communications
Previous Article in Special Issue
An Infusion Containers Detection Method Based on YOLOv4 with Enhanced Image Feature Fusion
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Coupling Quantum Random Walks with Long- and Short-Term Memory for High Pixel Image Encryption Schemes

1
School of Information and Control Engineering, Qingdao University of Technology, Qingdao 266033, China
2
School of Environmental and Municipal Engineerin, Qingdao University of Technology, Qingdao 266033, China
3
School of Science, Qingdao University of Technology, Qingdao 266033, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(2), 353; https://doi.org/10.3390/e25020353
Submission received: 13 December 2022 / Revised: 7 February 2023 / Accepted: 9 February 2023 / Published: 14 February 2023

Abstract

:
This paper proposes an encryption scheme for high pixel density images. Based on the application of the quantum random walk algorithm, the long short-term memory (LSTM) can effectively solve the problem of low efficiency of the quantum random walk algorithm in generating large-scale pseudorandom matrices, and further improve the statistical properties of the pseudorandom matrices required for encryption. The LSTM is then divided into columns and fed into the LSTM in order for training. Due to the randomness of the input matrix, the LSTM cannot be trained effectively, so the output matrix is predicted to be highly random. The LSTM prediction matrix of the same size as the key matrix is generated based on the pixel density of the image to be encrypted, which can effectively complete the encryption of the image. In the statistical performance test, the proposed encryption scheme achieves an average information entropy of 7.9992, an average number of pixels changed rate (NPCR) of 99.6231%, an average uniform average change intensity (UACI) of 33.6029%, and an average correlation of 0.0032. Finally, various noise simulation tests are also conducted to verify its robustness in real-world applications where common noise and attack interference are encountered.

1. Introduction

With the rapid development of Internet technology, more and more high-value data and information is being transmitted over the Internet, and therefore the security of data transmission is becoming more and more important. While ordinary data can be hidden and protected by classical encryption schemes such as DES [1] and AES [2], the information contained in an RGB image is represented by the pixel values. Because of the strong correlation between the neighbouring pixel values of RGB images and the amount of information stored in images, classical encryption schemes are often unable to achieve good encryption of image information, so the encryption of image information is separated from classical data encryption and becomes a separate research direction, focusing on image specific encryption schemes from the data information characteristics of images [3,4,5,6,7,8]. One very promising direction is the application of neural networks to image encryption. This is because cryptography places particular emphasis on the introduction of nonlinear transformations, which is a distinctive feature of neural networks, and, in addition to this, neural networks have characteristics such as ultra-fast parallel processing and operate in matrix form, all of which are extremely well suited to the field of image encryption, making neural networks increasingly interesting in the field of image encryption [9,10,11].
The LSTM [12] is a special type of recurrent neural network (RNN) [13] that uses the ’inner loop’ of a neural network to preserve the contextual information of a time series, allowing the use of past signal data to infer an understanding of the current signal. Theoretically, RNN can retain information from any moment in time. However, in practice, the transfer of information tends to decay over long time intervals, and the effectiveness of the information is greatly reduced after a certain period of time. As a result, RNN is not well equipped to deal with the problem of long-term information dependence, resulting in a tendency to rely only on the most recent input information for inference. To overcome this problem, LSTM is proposed to solve the long-term dependency problem. In contrast to RNN, remembering the content of earlier moments is its default behaviour. Therefore, it does not require a significant cost specifically and works better.
Quantum computing is a new computing mode that follows the laws of quantum mechanics to regulate quantum information units for computing [14]. Quantum algorithm [15,16,17,18] is an algorithm based on quantum computation. By using the unique behavior of quantum mechanics, such as superposition, entanglement, and interference, some algorithms have achieved exponential acceleration compared with classical algorithms [17,19]. Quantum random walk (QW) is a quantum algorithm, which was first proposed by Aharonov et al. [20], including continuous time QW [21] and discrete time QW [22]. Compared with the classical random walk, the algorithm has a significant improvement in computational efficiency, and its time complexity is reduced from O(n 2 ) to O(n). On the basis of one-dimensional QW, Baryshnikov et al. studied the difference between two-dimensional and one-dimensional coordinate space, and expounded the advantages and unique properties of two-dimensional QW [23]. Although QW is a quantum algorithm, its probability matrix can be solved by classical computers, and the algorithm complexity is still O(n), which makes QW be able to be applied in classical computers in advance.
Both LSTM and QW have applications in image encryption. He et al. [24] proposed an OF-LSTMS that replaces the matrix operation in LSTM with an XOR operation to obtain an encrypted image after a single forward propagation. Yang et al. [25] studied the properties of one-dimensional QW and applied it to quantum image encryption for the first time. Abd et al. [26] analyzed the statistical properties of the probability distribution matrix of two-dimensional quantum walks and applied it to image encryption; Ma et al. [27] combined the discrete cosine transform (DCT) [28] and the probability matrix of alternating quantum walks (AQW) for image encryption, etc.
Although QW probability matrices have been widely used in the field of image encryption, they still have shortcomings and are too inefficient when dealing with high pixel images. The time complexity of the one-dimensional AQW probability matrix is O(n), and the computational complexity of the AQW probability matrix is O( n 2 ), which is still polynomial in time complexity, but the time consumed to generate the QW probability matrix is unacceptable in practical applications to encrypt high pixel value images. At the same time, we also found that the statistical properties required for the encryption of the QW probability matrix are not satisfactory, so when QW is used for encryption, other algorithms are often used to improve the encryption, e.g., Ma used a discrete cosine transform algorithm to perform further dislocation encryption in the DCT domain after applying QW to confuse the pixel values. This does not increase the encryption efficiency too much, but the use of separate algorithms for the scrambling and obfuscation phases nullifies the advantage of having an infinite key matrix for the QW, as it can only participate in one of the scrambling and obfuscation phases, and the two phases are independent of each other.
In order to optimize the statistical properties of the QW probability matrix and its performance on high pixel precision image encryption for better encryption, we propose an image encryption scheme that combines neural networks with quantum algorithms. By combining the QW with the LSTM, the initial matrix is generated using the QW probability matrix, and after training through the LSTM, a suitable prediction matrix is output as the key matrix for encryption according to the required pixel accuracy of the image to be encrypted. We show that this combination can improve the efficiency of the key matrix generation, and at the same time, because the QW probability matrix has strong randomness, the LSTM can not effectively find its pattern to predict, so the generated prediction matrix is also disordered, and has better statistical properties than the QW probability matrix for encryption, which can be better used as a key matrix for encryption. Section 2 of this paper presents the basics related to encryption schemes, including the study and analysis of LSTM and AQW. Section 3 presents specific encryption schemes. Section 4 presents the simulation and theoretical analysis of this paper for detecting the effectiveness of the encryption scheme and lists the comparison of similar schemes to the encryption scheme proposed in this paper. Section 5 concludes the work in this paper and also provides an outlook on the subsequent work. The most critical module of the LSTM is the cell state, which is represented by C t , the current state at the current moment, and is generated by the state C t 1 at the previous moment together with the signal input x t at the current moment, while C t will continue to be passed to the next moment together with x t + 1 to generate C t + 1 .

2. Related Work and Background Knowledge

2.1. Long Short-Term Memory

LSTM is a type of Recurrent Neural Network (RNN) that has been widely used in various applications, such as speech recognition, natural language processing, and time series prediction. Unlike traditional RNNs, LSTMs have an internal memory cell that enables them to maintain information over a longer period of time, making them well-suited for tasks that require modeling sequential data with long-term dependencies.
The core component of an LSTM unit is its memory cell, which is responsible for maintaining information over a long period of time. The memory cell is controlled by three types of gates: the input gate, the forget gate, and the output gate. The input gate controls the flow of new information into the memory cell, the forget gate controls the amount of information retained from the previous time step, and the output gate controls the flow of information out of the memory cell and into the hidden state of the LSTM unit.
The LSTM architecture is derived from the equations that govern the behavior of the gates and the memory cell. At each time step, the input, forget, and output gates are computed using a sigmoid activation function, while the memory cell is updated using a tanh activation function. The equations governing the behavior of the LSTM unit are given by:
i t = σ ( W i x x t + W i h h t 1 + b i )
f t = σ ( W f x x t + W f h h t 1 + b f )
o t = σ ( W o x x t + W o h h t 1 + b o )
c t = f t c t 1 + i t tanh ( W c x x t + W c h h t 1 + b c )
h t = o t tanh ( c t )
where x t is the input at time step t, h t 1 is the hidden state at the previous time step, i t , f t , and o t are the input, forget, and output gates at time step t, c t is the memory cell at time step t, and σ and tanh are the sigmoid and hyperbolic tangent activation functions, respectively.
The LSTM architecture has proven to be highly effective in various applications, due to its ability to capture long-term dependencies and selectively forget or retain information. The equations presented here provide a foundation for understanding the behavior of LSTMs and for developing new models that incorporate LSTM units.
The chain structure diagram of the LSTM is shown in Figure 1, which illustrates the chain relationship between the three adjacent substructures and the composition of each LSTM substructure.

2.2. Quantum Random Walk

This paper is based on the theory of discrete-time QW. The discrete-time QW consists of four main elements: the walker, the coins carried by the walker, the coin toss, and the walk rule.
The Hilbert space H ^ of a one-dimensional discrete-time QW tensor consists of the walker position space H w and the coin space H Γ : H ^ = H w H Γ . In a QW, each step of the walk is determined by a unique coin flip operator Γ :
Γ = cos β sin β sin β cos β
After the coin toss is completed, the movement of the walker is specified by the conditional displacement operator S i : S i | x ^ = x ^ + ( 1 ) Γ , Γ 0 , 1 The | x ^ ( x ^ Z ) in the above equation forms the base vector of the walker’s position space; the two base vectors | 0 , | 1 form the coin space. We specify: when the coin state is | 0 , the walker is manipulated to move one unit in the forward direction; when the coin state is | 1 , the walker is manipulated to move one unit in the reverse direction.
In the AQW used in this paper, the walker controlled by the coin operator alternates between two arbitrarily chosen vertical directions x ˜ and y ˜ , and the walking operator U ^ for the whole QW process can be described as:
U ^ = S ^ y ¯ I H Γ S ^ x ¯ I H Γ
where S ^ y ˜ , S ^ x ˙ are the displacement operators of the walker at each point on the x ˜ and y ˜ axes:
S ^ y ˜ = x ˜ , y ˜ N ( | x ˜ , ( y ˜ + 1 ) mod ϖ , 0 x ˜ , y ˜ , 0 | ) + x ˜ , y ˜ N ( | x ˜ , ( y ˜ 1 ) mod ϖ , 1 x ˜ , y ˜ , 1 | ) S ^ x ˙ = x ˜ , y N ( | ( x ˜ + 1 ) mod ϖ , y ˜ , 0 x ˜ , y ˜ , 0 | ) + x ˜ , y ˜ N ( | ( x ˜ 1 ) mod ϖ , y ˜ , 1 x ˜ , y ˜ , 1 | )
where ϖ indicates the prescribed walking boundary.
Suppose the initial moment: The walker’s location is 0 x ˜ , 0 y ˜ , and the coin is in the superposition state H Γ = cos α | 0 + sin α | 1 ; then, the initial moment system state is:
ψ 0 = φ 0 w ( cos α | 0 + sin α | 1 ) Γ
The system state after a T walk can be expressed as:
ψ T = U ^ T ψ 0

3. Algorithm Description

3.1. The Encryption Process

3.1.1. Preparation of Quantum Random Walk Probability Distribution Matrix

The data of the corresponding element in the matrix are the probability P ( δ , ϑ , T ) of the walker appearing at the coordinates δ x , ϑ y of the location, as can be deduced from the above:
P ( δ , ϑ , T ) = δ , ϑ , 0 U ^ T ψ 0 2 + δ , ϑ , 1 U ^ T ψ 0 2 δ x , ϑ y
The resulting probability distribution matrix M and its four sub-matrices M 1 , M 2 , M 3 , M 4 after equiproportional partitioning are as follows:
M = P 11 P 1 n P 11 P n n M 1 = P 11 P 1 n 2 P n 2 P n 2 1 2 M 2 = P 1 n 2 P 1 n P n 2 n 2 P n 2 n M 3 = P n 2 1 P n 2 n 2 P n 1 P n n 2 M 4 = P n 2 P n 2 n 2 P n 2 n p n n
We set the walker to be at the center of the Hilbert space H ^ tensed by H w and H c , so the four submatrices M 1 , M 2 , M 3 , M 4 are centrosymmetric about the point P n 2 in the final generation. To prevent the LSTM from learning the rule such that the statistical performance of the final generated key matrix is degraded, in this paper, only M ^ = M 1 is chosen as the required initial pseudo-random number matrix to participate in the encryption.

3.1.2. Preparing the Encryption Key Matrix

Step 1: Ensure the reproducibility of the LSTM across devices. (i) Fix the random seeds of each dependency library so that each function is called with the same initial value and random value each time it is trained by the LSTM. (ii) Presetting the dropout function in the LSTM to 0, i.e., not dropping any nodes of the neural network, to ensure that the network model is fixed each time. (iii) Fixed platforms as well as devices, taking the current mainstream pytroch framework as an example, which still cannot guarantee the accuracy of model reproduction under different CPU and GPU pairings, and also requires CUDA environment variable configuration, etc. in order to further reduce uncertainty.
Step 2: Generate the LSTM input vector. Divide M ^ by column:
P 11 P 1 n 2 P n 2 1 P n 2 1 2 φ 1 , φ 2 , φ n 2 1 , φ n 2
M ^ is obtained by Min-Max normalization of M ^ :
φ 1 , φ 2 , φ n 2 1 , φ n 2 ξ 1 , ξ 2 , ξ j ξ n 2
ξ i is the vector to be input.
Step 3: Generate the key matrix required for encryption. Input the vectors ξ i in matrix M ^ into the LSTM in order for training, and set the LSTM prediction quantity as γ 2 to obtain the prediction matrix M ^ :
M ^ = ϖ 11 ϖ 1 γ ϖ γ 1 ϖ γ γ
Inverse normalization of M ^ yields M E :
ϖ 11 ϖ 1 γ ϖ γ 1 ϖ γ γ 11 1 γ γ 1 γ γ
In Figure 2, we show the comparison between the predicted data and the expected values formed from the accurate data after training the QW probability matrix as an LSTM training matrix. Subplot a shows the trend in randomness between predicted and expected values; subplot b shows the distribution between specific predicted and expected values.

3.1.3. Image Encryption

The R , G and B channels in our proposed encryption scheme are performed separately, and our encryption algorithm is described in terms of γ × γ pixels of RGB image I corresponding to a grey-scale map in the form of matrix M I .
Step 1: Hide the pixel information in M I by obfuscating the pixel values. Here, we borrow the heteroskedastic algorithm to implement the obfuscation operation:
M I = M I M E
Step 2: Generate matrix M E = M E , sort the index value matrix Ω of M E in order to obtain Ω , reorder the M I after the confusion operation according to the corresponding position in Ω , and achieve the dislocation of the image by destroying the relationship between adjacent pixel values to obtain M I . The schematic diagram of the dislocation algorithm is shown in Figure 3.

3.2. The Decryption Process

3.2.1. Preparing the Decryption Key Matrix

We use the probability distribution of the alternating quantum random walk algorithm at each grid point as the basis for generating the random number matrix required for encryption. The probability distribution matrix generated by the alternating quantum random walk has been shown to possess pseudo-randomness [22], i.e., the random number matrix M = M generated twice, provided that the initial parameters including α , β , ϖ are the same. Since we have removed the uncertainty and randomness from the LSTM, the M is processed once according to the encryption process for M , and finally the prediction matrix generated by the LSTM is processed to obtain M D = M E .

3.2.2. Decryption of Encrypted Image

Step 1: The encrypted image M I is obtained using the inverse permutation M I . This process is the inverse of the permutation operation, and the algorithm is shown in Figure 3:
Step 2: M I for obfuscation reduction to obtain M I .

3.3. Encryption and Decryption Algorithm Flow Chart

We show the key steps of our proposed image encryption scheme by means of a flowchart, including the generation of the QW probability density matrix, the process of generating the key matrix by LSTM, and the two key steps (scrambling, confusion) of the image encryption and decryption process using the key matrix, as shown in Figure 4.

4. Simulation and Analysis

To verify the resistance of the proposed scheme, three RGB images with a pixel size of 2000 × 2000 were encrypted and decrypted according to the proposed encryption scheme, and various statistical analyses were carried out on the encrypted images and the keys used, including histogram analysis, correlation analysis and information entropy analysis for the encrypted images; sensitivity analysis and key space analysis for the key matrix, etc.

4.1. Experimental Parameters and Encryption and Decryption Results

We use ϖ = 240 , α = π 23 , β = π 41 as the start parameters of the QW to prepare a QW probability matrix of size 100 × 2000 , and set the prediction length of the LSTM to 2000, i.e., to generate a key matrix of the same size as the RGB image to be encrypted. The encryption and decryption results are shown in Figure 5.

4.2. The Statistical Analysis

4.2.1. Correlation Analysis

Adjacent pixel correlation R A B is used to measure the degree of correlation of adjacent pixel values. Adjacent pixel values in RGB images often have strong correlations in horizontal, vertical and diagonal directions. Image encryption algorithms will destroy this correlation, and the degree of destruction can reflect the effect of encryption algorithms. The closer R A B is to 0, the better the destruction effect is, and the more difficult it is to obtain image information through the relationship between adjacent pixels [27].
R A B = cov ( A , B ) D ( A ) D ( B )
where cov ( A , B ) is the covariance of A , B , and D ( A ) and D ( B ) are the standard deviations of A and B , respectively. In this paper, the horizontal, vertical, and diagonal correlations of the three RGB images of Lena, Lemon, and Sakur are compared before and after encryption. The correlation values for the three RGB images are shown in Table 1, and the specific pixel distribution information is shown in Figure 6 and Figure 7.

4.2.2. Histogram Analysis

The histogram provides a visual representation of the statistical data of the pixel values in an RGB image. The histogram of a normal image usually has a distinct statistical pattern, and to resist statistical attacks [25], the histogram of an encrypted image must be as uniform and smooth as possible. The more such criteria are met, the more uniform the pixel distribution is, the less statistical information the image displays, the less information can be accurately predicted, and the more secure the image encryption scheme is [15]. In this paper, the histograms of the RGB three channels of Lena, Lemon, and Sakura images are analyzed separately, and the specific histograms are shown in Figure 8 and Figure 9.

4.2.3. Information Entropy Analysis

Information entropy H was proposed by Shannon, the father of information theory, to describe the uncertainty of the occurrence of each possible event of the information source. The pixel values of RGB images range from 0 to 255, so the information entropy H 8 . The closer the entropy value is to 8, the more information it carries and the more resistant it is to statistical attacks [11]. The formula for this is as follows:
H ( m ) = i = 0 N 1 P m i log 2 P m i
where m i is the grey scale value and P x i is the probability of m i occurrence. This paper analyzes the information entropy of the R , G , and B channels of the three different RGB images of Lena, Lemon, and Sakura. The relevant data are shown in Table 2.

4.2.4. Key Sensitivity Analysis

An effective key sensitivity means that a slight change in the key information will result in a significant change in the encrypted image. The ideal values of NPCR and UACI are 99.61 % and 33.46 % , respectively [29]. Higher calculated values of NPCI and UACI of an encryption scheme indicate that the encryption scheme is more resistant to differential attacks:
Γ ( i , j ) = f ( x ) = 1 , if C 1 ( i , j ) C 2 ( i , j ) 0 , otherwise
N P C R = i , j Γ ( i , j ) J × R × 100 %
U A C I = 1 J × R i , j C 1 ( i , j ) C 2 ( i , j ) 255 × 100 %
where , , R are the length and width of the encrypted image, Γ ( i , j ) is the above equation, and C1, C2 are the images after encryption with different keys.
In this paper, the key sensitivity of the R , G and B channels of the RGB images of Lena, Lemon, and Sakura were analyzed separately, and the relevant data are shown in Table 3.

4.2.5. The Key Space

The key space refers to the set of all possible keys used to generate the key and determines whether the encryption scheme can resist a brute-force attack. Cryptosystems with a key space size of 2 128 are effective in resisting brute force attacks. The key space calculation for the scheme proposed in this paper is based on quantum effects. Since in quantum theory the position of a particle in a defined space is not deterministic, each position has its probability of existence, only with different probabilities, and this probability can be changed by specifying the size of the space for a QW and the initial walking direction and forward direction. As the walk direction takes values from 0 to 2 π and the QW is extremely sensitive to accuracy, the change in probability is infinite as the accuracy of the computer increases, i.e., the key space established based on the QW is infinite.

4.2.6. Explicit Attack

  • Known plaintext attack: The attacker can recover the key by obtaining the decrypted image and comparing it with the ciphertext image. Since the algorithm in this paper has a good diffusion effect, the difficulty of obtaining the key by this method is close to that of a direct brute force attack, so the encryption scheme in this paper can effectively resist known plaintext attacks.
  • Selective plaintext attack: Assuming that the attacker has gained access to the encrypted machine, he can select an arbitrary number of plaintexts for the encryption algorithm under attack to encrypt and obtain the corresponding ciphertexts. The attacker’s goal is to gain some information about the encryption algorithm through this process that will allow the attacker to more effectively crack messages encrypted by the same encryption algorithm (and associated key) in the future. In the worst case, the attacker can simply obtain the key used for decryption. This scheme is commonly used against public key encryption schemes. The keys in this scheme are not universal, i.e., they are changed periodically, even differently each time, making it impossible for an attacker to obtain valid information.

4.2.7. Time Complexity Analysis

The time complexity analysis of an encryption scheme is an important indicator to evaluate the excellence of an encryption scheme, which will directly affect the encryption efficiency. The time consumption of our proposed scheme consists of two parts, one is the time required to generate the key matrix, and the other is the completion of the image encryption by the key matrix. Although the efficiency of generating the pseudo-random number matrix is important, it is not part of the time complexity of the encryption scheme as it is decoupled from the image encryption process. The encryption time complexity of our proposed scheme consists of a combination of pixel obfuscation and scrambling. The time complexity of this process is O( n 2 + n log n), as the time consumed by matrix permutation is O( n 2 ). In summary, the encryption time complexity of our proposed scheme is O( 2 n 2 + n log n).

4.2.8. Noise Robustness Testing

During the transmission of image information over the network, information may be lost or misplaced due to packet loss, malicious attacks, and so on. We simulate the continuous loss of image information due to network fluctuations using Gaussian noise and pretzel noise. A malicious attack was simulated using partial block replacement of the encrypted image. Figure 10 shows the decrypted image of the Lena encrypted image with the addition of Gaussian noise, pretzel noise and a clipping attack.

4.3. Comparison of Encryption Schemes

In this section, we analyze and compare the use of QW alone, the encryption scheme proposed in this paper, and similar work in recent years in terms of the important measures of average relevance, information entropy, average NPCR, average UACI, and key space size to resist brute-force cracking, the data of which are presented in Table 4.

5. Conclusions

We propose a more efficient encryption scheme for the current lack of encryption schemes for high pixel images in the field of image encryption. The probability density matrix generated by the quantum random walk is trained by exploiting the memory learning capability of the LSTM and the nonlinear nature of the quantum random walk. It can take advantage of the nearly infinite key space brought by the quantum random walk algorithm, and also solve the shortcomings of the low generation efficiency of the quantum random walk itself. At the same time, both the permutation and obfuscation processes of our scheme make use of the key space of the quantum random walk, avoiding the shortage of key space in a particular process.

Author Contributions

Conceptualization, J.L. and Z.S. (Zhaoyang Song); methodology, J.L. and Z.S. (Zhaoyang Song); software, Z.S. (Zhaoyang Song) and Z.S. (Zhongwei Sun); validation, M.L. and H.M.; formal analysis, Z.S. (Zhongwei Sun); investigation, Z.S. (Zhaoyang Song); resources, J.L.; data curation, J.L.; writing—original draft preparation, J.L.; writing—review and editing, Z.S. (Zhaoyang Song) and M.L.; visualization, Z.S. (Zhongwei Sun); supervision, M.L. and H.M.; project administration, M.L. and H.M.; funding acquisition, H.M.; image encryption, J.L. and Z.S. (Zhaoyang Song). All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Natural Science Foundation of Shandong Province, China (Grant No. ZR2021MF049), the Joint Fund of the Natural Science Foundation of Shandong Province (Grant No. ZR2022LLZ012), the Joint Fund of the Natural Science Foundation of Shandong Province (Grant No. ZR2021LLZ001), the project supported by the National Natural Science Foundation of China (Grant No. 11975132), the National Natural Science Foundation of China (Grant No. 12005110), and the Natural Science Foundation of Shandong Province, China (Grant No. ZR2022JQ04).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data and information supporting this study can be provided at the request of the corresponding author at reasonable request.

Conflicts of Interest

The authors declare that there is no conflict of interests regarding the publication of this paper.

References

  1. Coppersmith, D. The Data Encryption Standard (DES) and its strength against attacks. IBM J. Res. Dev. 1994, 38, 243–250. [Google Scholar] [CrossRef]
  2. Heron, S. Advanced encryption standard (AES). Netw. Secur. 2009, 12, 8–12. [Google Scholar] [CrossRef]
  3. Wang, X.; Yang, J. A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Inf. Sci. 2021, 569, 217–240. [Google Scholar] [CrossRef]
  4. Hua, Z.; Zhu, Z.; Chen, Y.; Li, Y. Color image encryption using orthogonal Latin squares and a new 2D chaotic system. Nonlinear Dyn. 2019, 104, 4505–4522. [Google Scholar] [CrossRef]
  5. Chai, X.; Zhi, X.; Gan, Z.; Zhang, Y.; Chen, Y.; Fu, J. Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption. Signal Process. 2021, 183, 108041. [Google Scholar] [CrossRef]
  6. Zhou, N.; Pan, S.; Cheng, S.; Zhou, Z. Image compression—Encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt. Laser Technol. 2016, 82, 121–133. [Google Scholar] [CrossRef]
  7. Duan, C.-F.; Zhou, J.; Gong, L.-H.; Wu, J.-Y.; Zhou, N.-R. New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method. Opt. Lasers Eng. 2022, 150, 106881. [Google Scholar] [CrossRef]
  8. Chuman, T.; Sirichotedumrong, W.; Kiya, H. Encryption-then-compression systems using grayscale-based image encryption for JPEG images. IEEE Trans. Inf. Forensics Secur. 2018, 14, 1515–1525. [Google Scholar] [CrossRef]
  9. Wang, X.-Y.; Li, Z.-M. A color image encryption algorithm based on Hopfield chaotic neural network. Opt. Lasers Eng. 2019, 115, 107–118. [Google Scholar] [CrossRef]
  10. Chen, L.; Yin, H.; Huang, T.; Yuan, L.; Zheng, S.; Yin, L. Chaos in fractional-order discrete neural networks with application to image encryption. Neural Netw. 2020, 125, 174–184. [Google Scholar] [CrossRef]
  11. Mani, P.; Rajan, R.; Shanmugam, L.; Joo, Y.H. Adaptive control for fractional order induced chaotic fuzzy cellular neural networks and its application to image encryption. Inf. Sci. 2019, 491, 74–89. [Google Scholar] [CrossRef]
  12. Hochreiter, S.; Schmidhuber, J. Long Short-Term Memory. Neural Comput. 1997, 9, 1735–1780. [Google Scholar] [CrossRef]
  13. Schmidhuber, J. Deep learning in neural networks: An overview. Neural Netw. 2015, 61, 85–117. [Google Scholar] [CrossRef]
  14. Steane, A. Quantum computing. Signal Process. Image Commun. 2022, 61, 116891. [Google Scholar] [CrossRef]
  15. Zhou, N.R.; Zhang, T.F.; Xie, X.W.; Wu, J.Y. Hybrid quantum–classical generative adversarial networks for image generation via learning discrete distribution. IBM J. Res. Dev. 2019, 115, 107–118. [Google Scholar] [CrossRef]
  16. Wang, H.; Xue, Y.; Qu, Y.; Mu, X.; Ma, H. Multidimensional Bose quantum error correction based on neural network decoder. NPJ Quantum Inf. 2022, 8, 134. [Google Scholar] [CrossRef]
  17. Long, G.-L. Grover algorithm with zero theoretical failure rate. Phys. Rev. A 2001, 64, 107–118. [Google Scholar] [CrossRef]
  18. Weinstein, Y.S.; Pravia, M.A.; Fortunato, E.M.; Lloyd, S.; Cory, D.G. Implementation of the Quantum Fourier Transform. Phys. Rev. Lett. 2001, 86, 1889–1891. [Google Scholar] [CrossRef]
  19. Harrow, A.W.; Hassidim, A.; Lloyd, S. Quantum algorithm for linear systems of equations. Phys. Rev. Lett. 2009, 103, 150502. [Google Scholar] [CrossRef]
  20. Aharonov, Y.; Davidovich, L.; Zagury, N. Quantum random walks. Phys. Rev. A 1993, 48, 107–118. [Google Scholar] [CrossRef]
  21. Farhi, E.; Gutmann, S. Quantum computation and decision trees. Phys. Rev. A 1998, 58, 915–928. [Google Scholar] [CrossRef]
  22. Watrous, J. Quantum simulations of classical random walks and undirected graph connectivity. J. Comput. Syst. Sci. 2001, 62, 376–391. [Google Scholar] [CrossRef]
  23. Baryshnikov, Y.; Brady, W.; Bressler, A.; Pemantle, R. Two-dimensional quantum random walk. J. Stat. Phys. 2011, 142, 78–107. [Google Scholar] [CrossRef]
  24. Zhao, Z.-P.; Zhou, S.; Wang, X.-Y. A new chaotic signal based on deep learning and its application in image encryption. Acta Phys. Sin. 2021, 70, 23. [Google Scholar] [CrossRef]
  25. Yang, Y.-G.; Pan, Q.-X.; Sun, S.-J.; Xu, P. Novel image encryption based on quantum walks. Sci. Rep. 2015, 5, 107–118. [Google Scholar] [CrossRef]
  26. Abd EL-Latif, A.A.; Abd-El-Atty, B.; Venegas-Andraca, S.E. Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption. Phys. A Stat. Mech. Appl. 2020, 547, 123869. [Google Scholar] [CrossRef]
  27. Ma, Y.; Li, N.; Zhang, W.; Wang, S.; Ma, H. Image encryption scheme based on alternate quantum walks and discrete cosine transform. Opt. Express 2021, 29, 28338–28351. [Google Scholar] [CrossRef]
  28. Lam, E.Y.; Goodman, J.W. A mathematical analysis of the DCT coefficient distributions for images. IEEE Trans. Image Process. 2000, 9, 1661–1666. [Google Scholar] [CrossRef] [Green Version]
  29. Wu, Y.; Noonan, J.P.; Agaian, S. NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. 2011, 1, 31–38. [Google Scholar]
Figure 1. Chain model for LSTM.
Figure 1. Chain model for LSTM.
Entropy 25 00353 g001
Figure 2. LSTM generation key matrix.
Figure 2. LSTM generation key matrix.
Entropy 25 00353 g002
Figure 3. Encryption scheme—scrambling algorithm.
Figure 3. Encryption scheme—scrambling algorithm.
Entropy 25 00353 g003
Figure 4. Encryption and decryption process.
Figure 4. Encryption and decryption process.
Entropy 25 00353 g004
Figure 5. Image encryption before and after comparison.
Figure 5. Image encryption before and after comparison.
Entropy 25 00353 g005
Figure 6. Comparison of correlation before and after img_a encryption.
Figure 6. Comparison of correlation before and after img_a encryption.
Entropy 25 00353 g006
Figure 7. Comparison of correlation before and after img_b encryption.
Figure 7. Comparison of correlation before and after img_b encryption.
Entropy 25 00353 g007
Figure 8. Comparison of histogram before and after img_a encryption.
Figure 8. Comparison of histogram before and after img_a encryption.
Entropy 25 00353 g008
Figure 9. Comparison of histogram before and after img_b encryption.
Figure 9. Comparison of histogram before and after img_b encryption.
Entropy 25 00353 g009
Figure 10. Comparison of histogram before and after img_b encryption.
Figure 10. Comparison of histogram before and after img_b encryption.
Entropy 25 00353 g010
Table 1. Pixel correlation analysis data.
Table 1. Pixel correlation analysis data.
ImageChannelHorizontalVerticalDiagonal
Red0.88460.89240.8297
Unencrypted (img_a)Green0.90620.91460.8568
Blue0.92690.92720.8905
Red0.00060.00110.0032
Encrypted (img_a)Green0.00320.00270.0021
Blue0.00410.00160.0022
Red0.99300.99440.9869
Unencrypted (img_b)Green0.99400.99490.9897
Blue0.99270.99390.9876
Red0.00220.00110.0023
Encrypted (img_b)Green0.00210.00250.0014
Blue0.00090.00410.0013
Table 2. Entropy analysis.
Table 2. Entropy analysis.
ImageChannelImage Entropy (Bit)
Red7.9991
Encrypted (img_a)Green7.9996
Blue7.9989
Red7.9992
Encrypted (img_b)Green7.9992
Blue7.9994
Table 3. Key sensitivity analysis.
Table 3. Key sensitivity analysis.
ImageChannelNPCRUACI
ineRed99.6124%33.4216%
img_aGreen99.6088%33.3657%
Blue99.6003%34.2157%
ineRed99.6419%33.6114%
img_bGreen99.5986%33.4268%
Blue99.6036%33.5762%
Table 4. The comparison in this article is for reference only as the images used in the different solutions are different and have different pixels. As the pixel sizes vary in each scenario, we have used the largest pixel images from their scenarios for comparison and selected their average values as a reference.
Table 4. The comparison in this article is for reference only as the images used in the different solutions are different and have different pixels. As the pixel sizes vary in each scenario, we have used the largest pixel images from their scenarios for comparison and selected their average values as a reference.
SchemeNPCR (%)UACI (%)CorrelationEntropy (Bit)KeySpace
QW93.1432.360.01497.9947> 2 128
our99.610933.60240.00327.9992> 2 128
[3]99.612733.44710.0013 > 2 128
[4]99.633633.46360.00267.9937> 2 128
[5]99.632633.402200417.9973> 2 128
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liang, J.; Song, Z.; Sun, Z.; Lv, M.; Ma, H. Coupling Quantum Random Walks with Long- and Short-Term Memory for High Pixel Image Encryption Schemes. Entropy 2023, 25, 353. https://doi.org/10.3390/e25020353

AMA Style

Liang J, Song Z, Sun Z, Lv M, Ma H. Coupling Quantum Random Walks with Long- and Short-Term Memory for High Pixel Image Encryption Schemes. Entropy. 2023; 25(2):353. https://doi.org/10.3390/e25020353

Chicago/Turabian Style

Liang, Junqing, Zhaoyang Song, Zhongwei Sun, Mou Lv, and Hongyang Ma. 2023. "Coupling Quantum Random Walks with Long- and Short-Term Memory for High Pixel Image Encryption Schemes" Entropy 25, no. 2: 353. https://doi.org/10.3390/e25020353

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop