Abstract
Digital steganography is the art and science of hiding information in covert channels, so as to conceal the information and prevent the detection of hidden messages. On the classic computer, the principle and method of digital steganography has been widely and deeply studied, and has been initially extended to the field of quantum computing. Quantum image steganography is a relatively active branch of quantum image processing, and the main strategy currently used is to modify the LSB of the cover image pixels. For the existing LSB-based quantum image steganography schemes, the embedding capacity is no more than 3 bits per pixel. Therefore, it is meaningful to study how to improve the embedding capacity of quantum image steganography. This work presents a novel steganography using reflected Gray code for color quantum images, and the embedding capacity of this scheme is up to 6 bits per pixel. In proposed scheme, the secret qubit sequence is considered as a sequence of 6-bit segments. For 6 bits in each segment, the first 3 bits are embedded into the second LSB of RGB channels of the cover image, and the remaining 3 bits are embedded into the LSB of RGB channels of the cover image using reflected-Gray code to determine the embedded bit from secret information. Following the transforming rule, the LSBs of stego-image are not always same as the secret bits and the differences are up to almost 50%. Experimental results confirm that the proposed scheme shows good performance and outperforms the previous ones currently found in the literature in terms of embedding capacity.
Keywords
Introduction
Steganography is an early important branch of information hiding, which is a technique that embeds secret information into seemingly common other carrier information to prevent third parties from detecting secret information. The main requirement of steganography is undetectability, which, loosely defined, means that no algorithm exists that can determine whether a work contains a hidden message. Steganography and watermarking are both forms of data hiding and share some common foundations. Nevertheless, it is worth reiterating the goals of these two data-hiding applications in order to highlight the key differences. In steganography, the cover image is a mere decoy and has no relationship to the secret message. In contrast, a watermark usually carries supplemental information about the cover image or some other data related to the cover, such as labels identifying the sender or the receiver. The second and perhaps even more important difference between steganography and watermarking is the issue of the existence of a secret message in an image. While in steganography it is of utmost importance to make sure the image does not exhibit any traces of hidden data, the presence of a watermark is often advertised to deter illegal activity, such as unauthorized copying or redistribution. Additionally, steganography is a mode of communication and as such needs to allow sending large amounts of data. On the contrary, even a very short digital watermark can be quite useful. For example, the presence of a watermark (a one-bit payload) may testify about the image’s ownership. These very different requirements imposed on these two applications make their design and analysis quite different [1].
Since Feynman proposed a novel computation model (called quantum computers) [2] based on principles of quantum physics that seemed to be more powerful than classical ones in 1982, quantum computing, as a new computing method, has been paid more and more attention because of its high parallelism. In the near future, quantum computers are expected to replace the classic computer. Quantum Image Processing (QImP) is an emerging sub-discipline that focuses on extending conventional image processing tasks and operations to the quantum computing framework.
Research in the field of QImP started with proposals on quantum image representations. In 2003, Venegas-Andraca and Bose proposed the Qubit Lattice representation to encode quantum images [3]. This was closely followed by Latorre’s Real Ket representation for quantum images [4]. Years later, Le et al.’s FRQI (flexible representation for quantum images) was proposed in 2010 [5] and later reviewed in 2011 [6]. These three model are collectively regarded as the pioneers of the sub-discipline of quantum image processing [7]. A variety of models proposed later are a modification or extension of these three models. For example, similar to Qubit Lattice representation, radiation energy of objects is transformed into a quantum state
It is worth pointing out that researchers have focused on data-hiding methods in QImP as a recent field of study, which includes quantum image steganography and quantum image watermarking. In the quantum image watermarking, the work in [12] by Iliyasu et al. is credited as being the first quantum image security protocol. In that study, a scheme called WaQI was proposed based on restricted geometric transformations on the images. Following the WaQI scheme, its gray-scale version, the gray WaQI [13] (or gWaQI) was proposed. In [14], the quantum Fourier transform (QFT) was used to embed and extract the watermarking image without having to know what it looks like. In addition, two dynamic watermarking schemes, i.e. quantum wavelet transform (QWT)-based watermarking [15] and Hadamard transform-based watermarking [16] were proposed. Using the multichannel extension of the FRQI representation, i.e. the MCQI representation, [17] presented an MCQI extension of the WaQI scheme (the MC-WaQI). In extending quantum watermarking to gray-scale images, [18] proposed the use of simple and small-scale quantum circuits to embed a scrambled image onto the carrier image using CNOT gates. More recently, in the study presented in [19], a new watermarking strategy was investigated, which the carrier and the watermark images are stored in the
In the quantum image steganography, the cover image can be a gray-scale image or a color image. In general, the embedding capacity of color cover images is greater than that of gray-scale cover images. The following briefly reviews several existing scenarios of quantum image steganography.
In terms of the steganography of gray-scale cover images, in 2015, a novel strategy for quantum image based on Moire Pattern was proposed for the first time in [20]. The embedding process consisted of three steps: (1) Arbitrarily select an original image, which is also called a “moire grating”, as a carrier; (2) The original carrier image is processed using a deformation operation to obtain a moire pattern; (3) Using the denoising operation, the moire pattern is transformed into a carrier image containing hidden information. The embedding capacity of this scheme is 1 bit per pixel. Shortly thereafter, a Least significant qubit (LSQb) based quantum image steganography was proposed in [21]. Firstly, the QFT is applied to the carrier image, and then the LSB of the cover image is matched with the secret bit by the quantum comparator. Finally, the inverse QFT is carried out on the carrier image to complete the embedding process. The extraction process is relatively simple, and the LSBs of the corresponding pixels in the stego-image are secret information. The embedding capacity of this scheme is also 1 bit per pixel. In 2016, [22] proposed two blind LSB steganography algorithms, where one algorithm is plain LSB which uses the message bits to substitute for the pixels’ LSB directly, and the other is block LSB which embeds a message bit into a number of pixels that belong to one image block. The embedding capacity of the two methods is at most 1 bit per pixel. In 2017, a new secure quantum steganography scheme was investigated in [23]. In this scheme, in addition to using the LSB, the most significant bit (MSB) is also employed. In fact, in this method, only half of the secret information is embedded in the cover image, and the remaining half is treated as a key, and its embedding capacity is also 1 bit per pixel. Soon after, a novel steganography scheme based on Arnold scrambling and LSB is proposed in [24]. The scheme first expand a secret image with
A 
In terms of the steganography of color cover images, in 2016, by employing a novel quantum representation for color digital images, [25] investigated the feasibility of the classical image LSB information hiding algorithm on quantum computer, and proposed a LSB information hiding algorithm of quantum image. In this method, the secret information is embedded by replacing the LSB of RGB three-channel of the cover image directly as the message bits. Although the embedding capacity of this method reaches 3 bits per pixel, the security of this method is very low, because the embedded secret information can be obtained by directly extracting the LSB of the three channel of the cover image. In 2017, [26] investigated three quantum color images steganography algorithms based on LSB. In the first two methods, the message bits are embedded in the R channel or B channel of the cover image, and the embedding capacity is 1 bit per pixel. The third method embeds the message bits into the RG channel or RB channel, and the embedding capacity is 2 bit per pixel. Although the three methods proposed in [26] have better security, the embedding capacity is low. Not long after, [27] proposed a novel quantum LSB-based steganography method using the Gray code for colored quantum images. This method uses the Gray code to accommodate two secret qubits in 3 LSBs of each pixel simultaneously according to reference tables. Considering that four reference tables are needed in the process of embedding and extracting, this method is relatively complex. In addition, in this method, the advantage of Gray code has not been fully reflected. In other words, in [27], using ordinary binary code instead of the Gray code is exactly the same. Although this method has many advantages (e.g., high security, robustness, etc.), the embedding capacity is only 2 bits per pixel. In [28], a new blind quantum copyright protection method based on owner’s signature in RGB images is proposed, which utilizes one of RGB channels as indicator and two remained channels are used for embedding information about the owner. In this scheme, the owner’s signature is considered as a text. Unlike LSB steganography, the scheme embeds each message bit into the fourth bit of the three channel of the cover image, and the embedding capacity is only 1 bit per pixel.
The rest of this paper is organized as follows. In Section 2, some preliminary knowledge related steganography scheme proposed in this paper are briefly reviewed. Then we introduce the proposed information hiding and extracting schemes in Section 3, which is the main contribution of this paper. Section 4 gives the complexity analysis. Section 5 is devoted to the experimental results with steganalysis and performance comparisons with several existing quantum color image steganography schemes. Finally, the conclusions are presented in Section 6.
NEQR representation of color image
For a monochrome image, NEQR encodes 8 bits of binary gray-scale value into 8 qubits. For a color images, NEQR encodes the RGB color values into 24 qubits. In NEQR, a color image of size
where
It is clear from [11] that NEQR needs
In 1891, Hilbert discovered a traversal curve in a two-dimensional space named the Hilbert curve and described by the Hilbert matrix. Along the Hilbert curve, the image can be scrambled, and the scrambling effect is better. For a
The Hilbert matrix
In
The hilbert curve at 
Obviously, for a
For the Hilbert scrambling of quantum images, the specific implementation method is given in [31]. In their method, first of all, three circuit modules (i.e. PARTITION
Because the quantum logic gates are unitary, the whole quantum Hilbert scrambling circuits are unitary. The quantum inverse Hilbert scrambling circuits can be obtained only by arranging all logic gates in the opposite order.
Complete hilbert scrambling circuits (figure adapted from [31]).
Gray codes are named after Frank Gray who first patented the idea for use in shaft encoders in 1953 [29]. In a group of codes, if any two adjacent codes have only one different binary number, it is called Gray Code. In addition, since there is only one digit difference between the maximum number and the minimum number, that is, “end to end”, it is also called cyclic code or reflection code. One possible way to produce a reflection Gray code with length
In order to convert a number in binary code
and the conversion of a reflected Gray code
Taking 4 bits Gray code
The quantum circuits that implements the conversion between binary code and gray code. (a) Quantum circuits of converting a number in binary code to its Gray code. (b) Quantum circuits of converting a Gray code to its corresponding binary code.
Quantum comparator (figure adapted from [32]).
In 2008, Chen and Chang [30] investigates the application of Gray code in LSB-based image steganography. In their proposed method, gray-scale images are used as cover images. The message is embedded according to the rules reflected-Gray code.
For the embedding process, let the Gray code function Gray (
The extraction process is relatively simple. When the last 4-bit Gray code of the stego-image pixel is odd, the embedded message bit is 1, and when it is even, the embedded message bit is 0. For example, if the value of the stego-image pixel is
The outstanding advantage of this scheme is that, following the transforming rule, the LSBs of stego-image are not always equal to the secret bits and the experiment shows that the differences are up to almost 50%. However, its embedded capacity is only 1 bit per pixel.
The quantum comparator occupies an important position in our proposed steganographic scheme. Here, we use the quantum comparator designed in [32], and its quantum circuit is shown in Fig. 5.
The quantum comparator compares
Quantum steganography using reflected gray code for color images
It is first pointed out that in this method, a
where
The steganographic scheme proposed in this paper consists of four processes: scrambling, embedding, extracting, and inverse scrambling, as shown in Fig. 6. Among them, the scrambling scheme uses the quantum Hilbert scrambling proposed in [31], and the inverse scrambling also adopts the corresponding method in [31]. Next, we introduce the embedding and extracting process of secret information using the reflected-Gray code in detail, which is the main contribution of this paper.
The outline of the steganographic scheme presented in this paper.
The quantum circuits that implements the secret image conversion.
As previously shown, in this paper, the secret information (i.e., messages that need to be embedded into the cover color image
Pixel decomposition of secret image
The basic idea of embedding message into cover image is: first, the secret qubit sequence in
In Fig. 7, the upper part is an original secret image (with gray range
From the decomposition process of the secret image, it can be seen that the decomposed secret image has the same number of columns as the cover image, and the number of rows is less than or equal to the number of rows of the cover image. Taking the secret image represented by Eq. (3.1.1) as an example, the decomposed secret image can be expressed as
Note: after the pixel decomposition, the secret image usually contains some redundant pixels. In this paper, the gray values of these redundant pixels are set to
Suppose the size of the cover image is
The hilbert curve at 
The basic idea of embedding secret image into cover image can be summarized as follows. The secret qubit
Next, taking a single pixel of secret image as an example, we give the concrete algorithm of embedding it into cover image.
The quantum circuits of implementing the above algorithm are shown in Fig. 10. At the input, there are 18 auxiliary qubits with initial values of
The outline of the embedding scheme presented in this paper.
Quantum circuits for embedding a single secret pixel into cover image.
The quantum circuits of embedding a whole secret image into the cover image are shown in Fig. 11, in which, the
Quantum circuits for embedding a whole secret image into the cover image.
The extraction of secret images is the inverse process of embedding. Figure 12 illustrates the specific extracting scheme. Taking the pixel at the position
The outline of the extracting scheme presented in this paper.
In stego-image, let
In Fig. 14, the
It is worth pointing out that the secret image extracted directly from the stego-image is a
Quantum circuits for extracting a single secret pixel from stego-image.
Quantum circuits for extracting a whole secret image from the stego-image.
In order to help readers understand the method proposed in this paper including the embedding and extracting clearly, an example is given here, which depicts how 6 secret qubits are embedded into a cover pixel and extracted form it. Assume that the color value of the cover pixel
(1) Embedding
Let
From
From
From
At this time, the cover pixel
Let
From
From
From
Therefore the corresponding stego-pixel is
(2) Extracting
For the extracting process, let
From
From
From
From
From
From
At this point, the extracted secret bits are 110101, which is exactly the same as embedded information.
Quantum circuits for secret image restoration.
Six cover images used in the experiments. (a) 512 
The circuit network complexity depends on the number of elementary gates used in the quantum image processing. The complexity of elementary quantum gates is taken to be unity. This includes the NOT-gate, Hadamard gate, Control-Not gate, and any
Some auxiliary modules. In the steganographic scheme proposed in this paper, the auxiliary modules used include: Hilbert scrambling, quantum comparator, Gray code conversion. From [31], it is clear that the complexity of Hilbert scrambling is Pixel decomposition of secret images. According to the pixel decomposition method of the secret image introduced in Section 3.1.1, the quantum circuits consists of Embedding a single secret pixel into cover image. From Fig. 10, this quantum circuits consists 12 Gray code conversions, 60 Control-Not gates, and 12 3-Control-NOT gates ( Embedding a whole image into the cover image. From Fig. 11, this quantum circuits consists 2 quantum comparators, 1 Single pixel embedding module. Obviously, the complexity of this circuits is Extracting a single secret pixel from stego-image. From Fig. 13, this quantum circuits consists 12 Gray code conversions, 54 Control-Not gates. Therefore, the complexity of this circuits is Extracting a whole secret image into the cover image. From Fig. 14, this quantum circuits consists 2 quantum comparators, 1 Single pixel extracting module. Obviously, the complexity of this circuits is Secret image restoration. From Fig. 15, the structure of this circuits is similar to that of Fig. 7, their complexity is the same, and so, the complexity of this circuits is also
The PSNR the four steganographic schemes for the various combinations of cover images and secret images
In summary, the complexity of the steganographic scheme is
In this Section, we make the simulations of steganoraphy scheme for several color images on a classical computer due to the condition that the physical quantum computer is not in our grasp right now. The simulations are demonstrated with a classical computer with Intel (R) Core (TM) i5-3470 CPU @ 3.20 GHz 4.00 GB RAM and 32-bit operating system. The simulations are based on linear algebra with complex vectors as quantum states and unitary matrices as unitary transforms using Matlab 7.8.0 (R2009a).
In order to reflect the advantages of steganoraphy scheme proposed in this paper, this scheme will be compared with other steganoraphy schemes in [25, 26, 27] under two cases of the same embedding amount and different embedding amount. Specific contrast items include: the peak signal-to-noise ratio of stego-image, robust performance in noisy environment, histogram and so on. The six
For a
Three 
Invisibility is a fundamental requirement for the performance of steganographic schemes, and is usually measured using two metrics: peak-signal-to-noise ratio (PSNR) and histogram analysis.
Comparison of PSNR of four steganographic schemes
Let
With the nine gray-scale images in Figs 17–19 as the secret images, the PSNRs of the four steganographic schemes are shown in Table 1. The visual effects of the proposed scheme in which the secret image in Fig. 19c is accommodated in the depicted cover images is illustrated in Fig. 20.
Three 384 
Three 
Six cover images used in the experiments. (a) 512 
By considering Table 1, after embedding the secret image with the same size, compared with other schemes, the PSNR of proposed scheme is only reduced by 2–4 dB. When the maximum embedding capacity is achieved, compared with schemes in [26, 27], although the PSNR is reduced by 6–8 dB, the embedding capacity is increased by two times, and compared with schemes in [25], although the PSNR is reduced by about 7 dB, the embedding capacity is doubled. In addition, for the proposed scheme, the PSNR values above 44 dB are also acceptable after reaching the maximum embedding capacity. Moreover, it can be seen from Fig. 20 that the original cover images and the corresponding stego-image are indistinguishable from the naked eye alone, which also verifies the security of this scheme in a certain extent.
Figure 21 shows the histogram of the three original cover images and the corresponding stego-versions where Fig. 19b is considered as a secret image. It is clear from Fig. 21 that, compared with the histogram of the original cover image, although the histogram of the stego-image has a slight jitter, they still maintain a high degree of consistency.
The histogram diagram of the images including the cover images’ histogram depicted in second column and the stego-images’ histogram depicted in third column where the gray-scale image in Fig. 19b is considered as the secret image. (a) Stego. (b) Histogram of cover Histogram of stego. (c) Stego. (d) Histogram of cover Histogram of stego. (e) Stego. (f) Histogram of cover Histogram of stego.
At present, many steganographic programs are designed by modifying the LSB of the cover image. In this section, we examine the security of the steganographic scheme by directly extracting the LSB of the stego-image. The specific extraction method is as follows.
For scheme in [26], the LSB of the R channel is first extracted as the first bit of the 2-bit segment, and then the LSB of the G or B channel is extracted as the second bit of the 2-bit segment. The extraction scheme in [27] is based on two previously obtained secret keys. For scheme in [25], because the secret information is directly used as the LSB of the RGB three-channel in the cover image, the LSB of RGB three-channel is directly extracted as the 3-bit segment of secret information. For scheme proposed in this paper, first, the second LSB of RGB three-channel is extracted as the first three bits of the 6-bit segment, and then three-channel’s LSB is extracted as the last three bits of the 6-bit segment. Figure 22 shows the results of the four steganographic schemes obtained by directly extracting the LSB of the stego-image, where the color image in Fig. 16a is considered as the cover image, and the gray-scale image in Fig. 17a is considered as the secret image.
As can be seen from Fig. 22, the scheme proposed in this paper and the scheme in [27] are safer, the security of the scheme in [26] is slightly less, and the scheme in [25] has no security at all.

Unlike the scheme in [25], in the scheme proposed in this paper, the secret bits are not directly embedded in the cover image. According to the reflected Gray-code rule, about 50% of the embedded secret bits has flipped in the stego-image. Taking the three secret images in Fig. 19 as an example, the specific numerical results are shown in Table 2.
Quantity comparison of hiding secret bits and LSBs of cover image
Table 2 gives the comparison results of hiding secret bits and LSBs of cover image. For instance, taking the cover image in Fig. 16a and the secret image in Fig. 19a as an example, the total secret bits are
Three secret images extracted from stego-images superimposed with different noises for proposed scheme, in which G represents Gauss, SP represents salt and pepper, and Q represents qubit flipping. (a) G noise. (b) SP noise. (c) Q noise.
The comparison of the correlation coefficients of the four schemes under Gaussian noise
Three secret images extracted from stego-images superimposed with different noises for schemes in [25, 26, 27], in which G represents Gauss, SP represents salt and pepper, and Q represents qubit flipping. (a) G noise. (b) SP noise. (c) Q noise. (d) G noise. (e) SP noise. (f) Q noise. (g) G noise. (h) SP noise. (i) Q noise.
In order to evaluate the robustness of the proposed steganographic scheme in the presence of channel noise, first, we mixed in with each stego-image one of three noise patterns: Gaussian noise with mean 0 and variance of 0.01, Salt-and-Pepper noise with a density of 0.1, and Qubit flip noise with a flipping probability of 0.01. We then extract the secret image from each noise-imposed stego-image. Finally, we investigate the correlation between the extracted secret image and the original secret image. To further verify the effectiveness of the proposed method, we also compared the performance of our method with that of [25, 26, 27].
Before beginning, we first explain what Qubit flip noise is. Qubit flip noise is essentially a channel noise that is caused when information is transmitted in a quantum channel. It is consistent with classic channel noise, i.e., “1” is received when “0” is sent, or “0” is received when “1” is sent. For a quantum image transmitted in a channel, the qubit flip noise transitions the state of the qubit from
Taking the secret image in Fig. 19a as an example, for the stego-image (where Fig. 16a is considered as a cover image) with superimposed noise, the extraction effect of the proposed scheme is shown in Fig. 23. Similarly, taking the secret image in Fig. 17a as an example, for the stego-image with superimposed noise, the extraction effect of the scheme in [27] is shown in Fig. 24a–c, and the extraction effect of the scheme in [26] is shown in Fig. 24d–f. Taking the secret image in Fig. 18a as an example, the extraction effect of the scheme in [25] is shown in Fig. 24g–i.
The simulation results show that the robust performance of several schemes is similar, that is, it has good adaptability to Salt and Pepper noise and Qubit flip noise, and is very fragile for Gaussian noise. To obtain a quantitative comparison of the robustness of the four schemes, we first define the correlation coefficient between the two images as follows.
where
Using the upper equation and taking
To make the contrasts clearer and more intuitive, we show the last column in Tables 3–5 as a bar graph, as shown in Fig. 25.
The comparison of average correlation coefficients of the four schemes under three different noise. (a) The comparison of average correlation coefficients of the four schemes under Gaussian noise. (b) The comparison of average correlation coefficients of the four schemes under Salt-and-Pepper noise. (c) The comparison of average correlation coefficients of the four schemes under Qubit flip noise.
The experimental results show that the robustness of the four schemes is quite poor for the Gaussian noise. For the Salt-and-Pepper noise, the robustness of proposed scheme is roughly equivalent to that of scheme in [25, 26], and is better than that of the scheme in [27]. For the Qubit flip noise, the proposed scheme is roughly equivalent to the scheme in [27], but is slightly weaker than that in [25, 26].
The comparison of the correlation coefficients of the four schemes under Salt-and-Pepper noise
The comparison of the correlation coefficients of the four schemes under Qubit flip noise
On the embedding capacity of the steganography scheme, [20] defines it as the ratio of the number of secret qubits and the number of cover pixels.
According to this definition, the implicit capacity of the proposed scheme is
As a comparison, the embedding capacity of the scheme in [25] is 3 bit/pixel, while in [26, 27], the embedding capacity of two schemes is only 2 bit/pixel.
Based on the above results, the proposed steganography scheme not only has the acceptable PSNR, high security and robustness, the most outstanding advantage is that it has a higher embedding capacity. At the same time embedding process shows that the scheme is not only no secret key, but it is blind.
Computer technology has made it a lot easier to hide messages and more difficult to discover them. Digital steganography is the science of hiding secret messages within digital media, such as digital images, audio files, or video files. There are many different methods for digital steganography, including least-significant-bit (LSB) substitution, message scattering, masking and filtering, and image-processing functions. These existing methods have been deeply studied on classical computers. However, similar studies on quantum computers are rare. This paper investigates the realization of color image steganography based on the idea of LSB substitution on quantum computer. The proposed scheme does not replace the LSBs of the cover image directly with the secret bits, but embeds the secret information indirectly into the LSBs by reflecting the Gray code rule, which enhances the security of the stego-image. Compared with several existing quantum steganography schemes for color images, this scheme has the advantages of acceptable PSNR and better security, and the most prominent advantage is that it has a larger embedded capacity of up to 6 bits per pixel. In addition, the proposed scheme is very sensitive to Gauss noise, and so, how to improve the robust performance under Gauss noise is the next step to be carried out.
Footnotes
Acknowledgments
This work was supported by the Youth Science Foundation of Northeast Petroleum University (Grant No. 2018QNL-08), and the Guiding Innovation Fund of Northeast Petroleum University (Grant No. 2018YDL-20).
