A New Quantum Watermarking Based on Quantum Wavelet Transforms
Heidari Shahrokh1, Naseri Mosayeb2, †, Gheibi Reza3, Baghfalaki Masoud4, Pourarian Mohammad Rasoul1, Farouk Ahmed5, 6
Young Researchers and Elite Club, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran
Department of Physics, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran
Department of Computer, Technical and Engineering College, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran
Department of Mathematics, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran
Computer Science Department, Faculty of Computers and Information, Mansoura University, Mansoura, Egypt
University of Science and Technology at Zewail City, Giza 12588, Egypt

 

† Corresponding author. E-mail: m.naseri@iauksh.ac.ir

Abstract
Abstract

Quantum watermarking is a technique to embed specific information, usually the owner’s identification, into quantum cover data such for copyright protection purposes. In this paper, a new scheme for quantum watermarking based on quantum wavelet transforms is proposed which includes scrambling, embedding and extracting procedures. The invisibility and robustness performances of the proposed watermarking method is confirmed by simulation technique. The invisibility of the scheme is examined by the peak-signal-to-noise ratio (PSNR) and the histogram calculation. Furthermore the robustness of the scheme is analyzed by the Bit Error Rate (BER) and the Correlation Two-Dimensional (Corr 2-D) calculation. The simulation results indicate that the proposed watermarking scheme indicate not only acceptable visual quality but also a good resistance against different types of attack.

PACS: 89.20.Ff
1 Introduction

Since the introduction of the first quantum key distribution protocol,[1] many researchers have contributed to treat the representation and processing of classical media quantum mechanically.[223]

Quantum information hiding including digital watermarking and steganography are efficient tools in secure digital information transmission and processing.

In 2010, Qu et al.[24] proposed a quantum steganography protocol using the entanglement swapping of Bell states, in which the secret messages are transmitted in a hidden channel. Later, Shaw et al. proposed two types of quantum steganography protocols with noisy quantum channels.[25] In the first protocol the secure quantum information was locally stored in the codeword. In the later protocols the hidden information was embedded in the space of error syndromes. In 2012, using entanglement swapping a secure quantum watermarking scheme was proposed by Fatahi, and Naseri.[26] Afterwards, a quantum method for images watermarking based on the flexible representation for quantum images (FRQI) was proposed in in 2013.[27] Very recently we proposed a novel LSB-based quantum watermarking protocol, where the NEQR method of quantum images representation is employed to represent the quantum images.[28]

In 2013, using the flexible representation of quantum image,[29] a quantum watermarking scheme based on quantum wavelet transform (QWT) was proposed by Song et al.,[30] where, to control the embedding strength a dynamic vector was used. In this scheme, the wavelet coefficients are extracted by executing QWT on quantum image. However, Yang et al. in 2014 analyzed the protocol and showed that the protocol proposed by Song et al. is not as applicable as the authors claimed.[31] Then they presented a simple improvement on the original protocol of dynamic watermarking scheme based on quantum wavelet transform.

Needles to say that there are two key properties that are required of a quantum data hiding scheme for an application, the invisibility and the robustness. However, to watermark, where the main purpose is copyright protection, the resistance against attacks, robustness is more important than the invisibility characteristics of the scheme. Unfortunately, in most of the proposed quantum watermarking schemes the authors only analyze the invisibility of their protocol.

In this contribution, a new quantum wavelet transforms based watermarking is proposed. By simulation analysis not only the invisibility but also the robustness of the proposed scheme is confirmed. The paper is organized as follows:

The next section presents a general preliminaries, which are used in the scheme. The quantum wavelet transform watermarking protocol is presented in Sec. 3. The software simulation of the protocol and analysis are given in the fourth section. Finally, short conclusions are drawn in the last section.

2 Preliminaries
2.1 A Novel Enhanced Quantum Representation of Digital Images

A novel enhanced quantum representation of digital images (NEQR) was introduced by Zhang et al. in 2013.[32] Based on NEQR scheme, a size quantum image is given as follows:

where and indicate the color and the corresponding positions, respectively. And, includes two parts: the vertical and the horizontal part.

The first n-qubit are encoded along the vertical location and the second n-qubit are encoded along the horizontal axis. Therefore, the NEQR model needs qubits to represent a size gray scale image with gray range 2q.

Figure 1 illustrates a 2 × 2 image and its NEQR representation, where 8 qubits are employed to represent the color information of gray scale range of possible values from 0 to 255.

Fig. 1. A simple image example and it’s NEQR representation.
2.2 Quantum Plain Adder and Subtracter

A quantum circuit for plain adding includes of quantum logic gates with time synchronized computational steps,[33] where the digital binaries are encoded in the quantum basis which are often called quantum registers. The addition of two quantum registers and is written as . The operation of the quantum plain adder is illustrated in Fig. 2.

Fig. 2. Quantum plain adder and subtracter.

By reversing the quantum plain adder circuit, the quantum circuit for subtracting is resulted. The output of quantum subtracter with the input is when . When , the output is , where n + 1 indicates the size of the second register.[33]

2.3 Quantum Xoring

A circuit for quantum Xoring of two qubits is illustrated in Fig. 3, where, the symbols “”, “”, and “”, represent zero control, one control and NOT operations, respectively. Needles to say that , are the input qubit and is the output of the corresponding state. The operation of this circuit is shown in Table 1.

Fig. 3. Two qubit Xoring circuit, the symbols “”, “”, and “”, represent zero control, one control, and NOT operations, respectively.
Table 1.

Procedure for the Xing.

.
2.4 Quantum Wavelet Transform

Fourier transform is a useful and powerful tool in many area of science. However, there is another kind of unitary transforms, the wavelet transforms, which are as useful as the Fourier transform and can be used to expose the multi-scale structure of a signal and very useful for image processing and data compression.

To analyze continuous waves, a mathematical representation is used. Therefore it is needed to transform continuous waves into a digital signal and analyze it. There are three kind of transformation, Fourier transform, short time Fourier transform, and wavelets transform.

In definition, a wavelet is a small wave that start and stop. The energy of a wavelet which is concentrated in time is used to analyze transient, non-stationary, or time-varying phenomena.

Two class of useful wavelets in signal processing are Haar and Daubechies wavelets. Quantum Haar and Daubechies wavelets circuits are proposed in Ref. [34], The whole quantum circuit of Daubechies fourth-order wavelet kernel is illustrated in Fig. 4, where a complete gate-level implementation of is presented.[35]

Fig. 4. Quantum circuit of Daubechies fourth-order wavelet kernel.[35]
3 Quantum Wavelet Transform Watermarking

In this section, our method for quantum watermarking based on QWT is presented, in which a sized binary image is embedded sized gray scale image. The proposed scheme includes three steps, scrambling, embedding, and extracting.

3.1 Quantum Scrambling

The scrambling methods are considered as preprocessing tasks in most of the image processing algorithms, where an image is transformed into another disordered one. In the proposed watermarking scheme, to increase the security of the proposed methods, a simple scrambling method is employed.[28]

Consider a binary sized watermark image. Using the NEQR representation, the watermark image is:

where, is color information in position .

For the aim of scrambling, two 2n-bit keys and are generated randomly by the copyright owner.

The scrambling task is accomplished as follows:

If then:

The I operation is applied to the color value at position of the watermark image.

Otherwise,

The X operation is applied to the color value at position of watermark image,

where,

To sum up, prior to embedding process watermark image is scrambled to . The quantum scrambling circuit is shown in Fig. 5.

Fig. 5. Quantum circuit for scrambling.[28]
3.2 Embedding Procedure

Consider a sized gray scale carrier image. Using NEQR model the carrier image is represented as:

For embedding purpose, the LSB XORing technique[36] and Quantum Wavelet Transform on carrier image are employed. The outline of the proposed embedding method is given in Fig. 6, where, the procedure can be done as follows:

Fig. 6. Outline of embedding procedure.
3.3 Extracting Procedure

To extract the watermark image from embedded image, the original carrier image, its quantum wavelet transform, the proportion φ and the scrambling key sequences for In-scrambling procedure are needed. The procedure is as follows:

The details of the extracting procedure are shown in Table 3, and the outline of the extracting procedure is as shown in Fig. 8.

Fig. 8. Outline of extracting procedure.
Table 3.

Procedure for extracting.

.
4 Simulation and Analysis

There are two key properties to be analyzed here, invisibility and robustness. Since the present state-of-the-art quantum hardware currently cannot go beyond proof-of-principle outcomes, to analyze these two properties, using a computer with Intel(R) Core(TM) i7-4500u CPU 2.40 GHz, 8.00 GB Ram equipped with the MATLAB R2015a environment, the proposed scheme is simulated. The carrier images and the watermark images employed in the simulations are given in Fig. 9.

Fig. 9. The carrier images ((a)-(f)) and the watermark images ((g)-(i)) used in the simulations.
4.1 Invisibility

Invisibility represents the similarity between the original covers and the watermarked image. To analyze the invisibility of the proposed scheme two analyze methods are: taken into account the peak-signal-to-noise ratio (PSNR) analysis and the histogram analysis.

(i) The peak-signal-to-noise ratio (PSNR)

To compare the fidelity of a watermarked image with its original version, the peak-signal-to-noise ratio (PSNR) is often used. The PSNR is defined as follows:

where is the maximum pixel value of image C and (MSE) is the mean squared error. For two monochrome images it is defined as follows:

where C represents the carrier image and CW indicates watermarked image.

The results of the PSNR calculation in our simulation are given in Table 4. Based on Table 4, one can see that the proposed scheme indicates an acceptable PSNR.

Table 4.

The calculated PSNR for different images in our simulations.

.

The visual effects of the proposed watermarking procedure are illustrated in Fig. 10.

Fig. 10. The original carrier images are given in the first row, and the watermarked images are presented in the second row. Watermark image in all of second image is the watermark 1.

(ii) Histogram

The images histogram analysis is an important method to evaluate the fidelity of a watermarked image with the carrier image. The histogram graph, indicates the frequency of pixels intensity values, where, the x axis refers to the gray level intensities and the y axis refers to the frequency of these intensities. Using the histogram analyzing one can judge if the images are match or not.

The histogram graphs of the three carrier images and the histogram graphs of their corresponded watermarked images where the watermark 1. is considered as a watermark image are given in Fig. 10. Based on Fig. 11 the histogram graphs of the watermarked images and of the original images are in good agreement.

Fig. 11. The histogram graphs of the tree original images and the histogram graphs of their corresponded watermarked images (“Watermark 1” is watermarked).
4.2 Robustness

Robustness refers to the ability of message to survive in attacks.[37] The Bit Error Rate (BER) and the Correlation Two-Dimensional () are two most useful quantities used in robustness analysis.

(i) The Bit Error Rate (BER)

This Bit Error Rate (BER) is defined as the inverse of PSNR:

The BER determines the portion of the original image’s bits, which are changed during the watermarking procedure. For example, if the PSNR is 50 db, the BER would be 0.02, i.e., %2 of bits have been changed during the watermarking. The result of the BER values calculated in our simulation are given in Table 5.

Table 5.

All the images’ BER in our simulations.

.

(ii) Correlation Two-Dimensional (Corr 2–D)

The Correlation Two-Dimensional, i.e., Corr 2–D, determines the correlation rate between two images, say A and B, which is calculated as follow:

where and correspond to the average pixel values in A and B, respectively.

The Corr 2–D is a real number in the range of [−1, 1]. The positive or negative sign means the two input images have positive or negative correlation respectively. Notice that the output means the two images are exactly the same.

In our simulation, to analyze the algorithm’s resistance against attacks, we consider 6 different types of attacks which are exerted on the watermarked image. The watermarked image, after attack, is extracted and corresponded Corr 2–D is calculated. i.e., the correlation between original and extracted watermark image is achieved. The results are given in Table 6 and Fig. 12.

Fig. 12. The correlation rate of extracted watermarks after attacks.
Table 6.

The correlation rate of extracted watermarks after attacks.

.

Considering the results, which are presented in Table 6 and Fig. 12, one can judge that the proposed watermarking scheme indicates good resistance against the considered attacks. Figure 13 shows the visual display of the extracted watermark after attacks. As seen, the watermark image is recognizable and the proposed algorithm shows good resist against the attacks.

Fig. 13. Visual display of extracted watermark after attacks.
5 Conclusion

Any applicable protocol of watermarking has to satisfy two key properties, invisibility and robustness. Invisibility means that there is an acceptable similarity between the original covers image and the watermarked image. Robustness refers to the resistance of the scheme against attacks. Here we have introduced a novel robust quantum watermarking protocol exhibits acceptable invisibility performance. In the proposed scheme, employing quantum wavelet transformation, a binary sized image is embedded in the sized gray scale image. To obtain better security, prior to the embedding procedure the watermark image is scrambled. Then an LSB XORing technique and quantum wavelet transform on carrier image are employed to embed the watermark image in the carrier one. It has been shown that by reversing the embedding and the scrambling procedures, the copyright owner can simply extract the watermark image. To evaluate the performances of the proposed scheme, the scheme is simulated, where by calculating PSNR and analyzing histogram graphs the invisibility characteristics of the protocol is confirmed. Furthermore, by examining the Bit Error Rate (BER) quantity and the Correlation Two-Dimensional (Corr 2–D), the robustness of the scheme is proved. To summarize, when compared with previous watermarking schemes, the advantages and effectiveness of the proposed scheme can be summarized into five points. First, by introducing a scrambling method, the watermark image is converted into a scrambled image, which guarantees that the original watermark image will not be recovered by any attacker, even when he extracts the scrambled binary image. Second, as compared with the previous protocols, our scheme satisfies not only the invisibility performance but also its good robustness.

Reference
[1] Bennett C. H. Brassard G. Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing IEEE, Bangalore, India New York 1984 175
[2] Venegas Andraca S. E. Bose S. Storing, Processing and Retrieving an Image Using Quantum Mechanics AeroSense 2003 2003 137 147 International Scociety for Optic and Photonics
[3] Venegas Andraca S. E. Ball J. L. Quantum Inf. Process 9 2010 1
[4] Le P. Q. Iliyasu A. M. Dong F. Hirota K. Int. J. Appl. Math. 40 2010 113
[5] Le P. Q. Doyng F. Hirota K. Quantum Inf. Process 10 2011 631784
[6] Zhang Y. Lu K. Gao Y. H. Wang M. Quantum Inf. Process 12 2013 2833
[7] Song X. H. Wang S. Liu S. Abd El-Latif A. A. Niu X. M. Quantum Inf. Process 12 2013 3689
[8] Yuan S. Mao X. Chen L. Xue Y. Optik 124 2013 6386
[9] Song X. H. Wang S. Liu S. Abd El-Latif A. A. Niu X. M. Multimedia Systems 20 2014 379
[10] Zhang Y. Lu K. Gao Y. H. Sobel Q. Science China Information Sciences 58 2014 1
[11] Chen X. B. Xu G. Su Y. Yang Y. X. Quantum Inf. Comput. 14 2014 0589
[12] Chen X. B. Su Y. Niu X. X. Yang Y. X. Quantum Inf. Process 13 2014 101
[13] Chen X. B. Dou Z. Xu G. Wang C. Yang Y. X. Quantum Inf. Process 13 2014 85
[14] Jiang N. Wang L. Wu W. Y. Int. J. Theor. Phys. 53 2014 2463
[15] Zhou R. G. Sun Y. J. Fan P. Quantum Inf. Process 4 2015 1717
[16] Zhou N. R. Hua T. X. Gong L. H. Pei D. J. Liao Q. H. Quantum Inf. Process 14 2015 1193
[17] Hua T. Chen J. Pei D. Zhang W. Zhou N. R. Int. J. Theor. Phys. 54 2015 526
[18] Zhang Y. Lu K. Xu K. Gao Y. Wilson R. Quantum Inf. Process 14 2015 1573
[19] Zhou R. G. Sun Y. J. Quantum Inf. Process 14 2015 1605
[20] Naseri M. et al. International Journal for Light and Electron Optics 2016
[21] Xia Z. Wang X. Sun X. Wang Q. IEEE Transactions on Parallel and Distributed Systems 27 2016 340
[22] Fu Z. Ren K. Shu J. Sun X. Huang F. IEEE Transactions on Parallel and Distributed Systems 27 2016 2546
[23] Fu Zh. J. et al. IEICE Transactions on Communications E98-B 2015 190
[24] Qu Z. G. Chen X. B. Zhou X. J. Niu X. X. Yang Y. X. Opt. Commun. 283 2010 4782
[25] Shaw B. A. Brun T. A. Phys. Rev. A 83 2011 022310
[26] Fatahi N. Naseri M. Int. J. Theor. Phys. 51 2012 2094
[27] Zhang W. W. Gao F. Liu B. Y Jia H. Wen Q. Y. Chen H. Int. J. Theor. Phys. 52 2013 504
[28] Heidari S. Naseri M. Int. J. Theor. Phys. 55 10 2016 4205
[29] Le P. Q. Dong F. Y. Hirota K. Quantum Inf. Process 10 2011 63
[30] Song X. H. Wang S. Liu S. Abd El-Latif A. A. Niu X. M. Quantum Inf. Process 12 2013 3689
[31] Yang Y. G. et al. Quantum Inf. Process 13 2014 1931
[32] Zhang Y. Lu K. Gao Y. H. Wang M. Quantum Inf. Process 12 2013 2833
[33] Vedral V. Barenco A. Ekert A. Phys. Rev. A 54 1996 1
[34] Fijany A. Williams C. P. 1999 Quantum Wavelet Transform: Fast Algorithm and Complete Circuit, Quantum Computing and Quantum Communications Springer Berlin Heidelberg 10 33
[35] Zhang Y. Lu K. Gao Y. H. Wang M. Quantum Inf. Process 12 2013 2833
[36] Kekre H. B. Archana A. A. Int. J. Cryp. Secu. 1 2008 1
[37] Jiang N. Zhao N. Wang L. Int. J. Theor. Phys. 55 2016 107