Abstract

The ubiquity of image and video applications in our daily lives makes data security and privacy prominent concerns for everyone. Among others, various image cryptosystems are relied upon to provide the necessary safeguards. With the inevitable realisation of quantum computing hardware, however, the anticipated quantum supremacy entails effortless violation of the integrity of even the best cryptosystems. Quantum walks (QWs) utilise the potent properties of quantum mechanics to provide randomness via stochastic transitions between states. Our study exploits these properties of QWs to design a multi-image cryptosystem. Furthermore, we infuse the symmetricity and orthogonality of Chebyshev maps into the QWs to realise a powerful cryptosystem that guarantees data integrity, authentication, and anonymity of the resulting images. These properties are validated via extensive simulation-based experiments that produce average values of NPCR as 99.606%, UACI as 33.45%, global entropy as 7.9998, and chi-square test as 238.14. Therefore, the proposed cryptosystem provides ordnance to protect images from illicit tampering during the era.

1. Introduction

Today, data security and privacy are integral to our daily lives where more than 300 million images are unloaded on the internet daily [1]. Mylio, software company, estimates that 9.3 trillion images will be stored online by 2022 [2]. Considering the varying levels of confidentiality and precious memories in these images, their security and privacy is a major concern to many of us.

Presently, various technologies and cryptographic mechanisms are employed to encrypt, watermark, and secure these images including the use of steganographic data hiding schemes. While data encryption pervades access to unauthorised users by making such images unintelligible, chaotic systems exhibit sensitive dependence on original conditions, which implies that, for any small alteration, the dynamics of the system persistently magnifies the original conditions. This according to [3] implies that “two trajectories with initial conditions that are arbitrarily close will diverge at an exponential rate.” There are many single-image cryptosystems that have been proposed, including those based on colour codes [4], dynamic filtering [5], imitating jigsaw method [6], bit-level permutation [7], DNA sequence operation [8], and particle swarm optimization [9], besides chaos-based image cryptosystems.

Meanwhile, there are two major classifications of chaotic maps: one- and multi-dimensional chaotic systems. One-dimensional (1D) chaotic maps offer low computational complexity, simple architecture, and structure as well as accelerated processing [10]. Despite the enumerated properties, 1D chaotic systems are exposed to attacks due to their small key space and the chaotic discontinuous ranges of their primary values [11].

Due to the developments in communication networks and prevalence of bulk data processing, multiple-image cryptosystems potentially have important roles in data security and privacy in the emerging era of big data whereas single-image cryptosystems can be utilised to protect multiple images in a per process approach, but these processes pile up to reduce the effectiveness of encryption scheme [12]. To enhance this, various scholars have invested in utilising multi-image cryptosystems to protect multiple images. In doing so, the highlighted properties of chaotic systems are exploited to design multiple-image encryption schemes with many seemingly tamper-proof cryptosystems realised [1319]. For example, in [13], Shao et al. presented a new multiple-image encryption mechanism using logistic map and quaternion gyrator transform, while in [14], Zarebnia et al. suggested a multi-image encryption approach using chaotic maps and cyclic shift operation. Furthermore, in [15], Li et al. proposed a multi-image encryption approach in wavelet transformation domain based on a chaotic map. Similarly, in [18], Zhang and Wang presented a multi-image encryption mechanism using piecewise linear chaotic map and mixed image elements. While the highlighted schemes offer platforms to secure the images, our push towards the triple-S (speed, security, and size) limits of today’s technologies compels the need for more advanced computing infrastructure.

Quantum computers offer the promise of information processing beyond the capabilities of even the best of today’s supercomputers. The inevitable realisation of such hardware portends huge implications for available cryptosystems, making them vulnerable to many types of violations [20, 21]. Consequently, it is important to consider integrating this apparent “quantumness” into existing schemes to safeguard the confidentiality and integrity of images.

Quantum walks (QWs), which are quantum computing equivalents of the classical (i.e., nonquantum, or digital) random walks, provide high sensitivity to initial parameters and astounding nonperiodicity [22]. Furthermore, they exhibit significant stability and theoretically infinite key space allowance. These properties arise through reversible unitary evolution, nonrandom, quantum superposition of states, and collapse of the wave function due to state measurements [22]. The use of quantum walks in building efficient cryptosystems has been explored in many studies [20, 21, 2325]. Moreover, QWs have been used to construct exponential speed up algorithms, quantum simulations, universal quantum gates, etc. [22].

For example, in [23], Vlachou et al. proposed a public cryptographic system that utilises QW to generate a public key, which is similar to its use by Yang et al. to propose an image encryption approach based on QW in [25]. In their contribution [20], Abd-El-Atty et al. considered an optical image encryption based on QW. Specifically, they used the alternate QW in a dual encryption strategy that, first, uses double random phase encoding that is executed using permutation followed by substitution, and second, generation of random masks.

Similarly, in [8], Yan and Li utilised the controlled alternate QWs and DNA sequence operations for colour image encryption. They used controlled alternate QWs to generate pseudorandom number generator and two rounds of DNA operation rules to encrypt plaintext images. Furthermore, in [26], Shi et al. proposed a quantum blind signature approach with cluster states using a QW-based cryptosystem. They claim that in the initial signing and verification phases, a message encrypted using QW is sent to the receiver, who requests a blind signature. Subsequently, in the verification phase, the authenticity and integrity of the transmitted message is verified. Finally, in [27], Abd El-Latif et al. considered the use of cascaded QWs with induced chaotic dynamics for cryptographic purposes. Their scheme utilised QWs to construct substitution boxes and provide the necessary chaos inducement and random number generation; the properties they claimed were combined in their reported cryptosystem. Furthermore, the schemes in [20, 27] report high encryption speeds relative to those in competing studies.

Notwithstanding the performances of the highlighted schemes, a common problem with the use of chaotic systems in the reported schemes is the low stability due to periodicity of the chaotic mapping. Meanwhile, Chebyshev polynomials satisfy the two important properties of semigroup membership and chaos. For this, our proposed cryptosystem infuses the symmetric and correlational properties of Chebyshev maps [28] to permutate the composite image. Additionally, as a prelude to realising the cipher composite image, Chebyshev mapping is used to substitute the composite image. To further elucidate, the key contributions of this study include the following:(1)Integrating quantum walks with existing chaotic systems to design a multiple-image cryptosystem for safeguarding the confidentiality and integrity of images(2)Using QW to substitute the composite image and update encryption key parameters

The performance of our systems is validated via extensive simulation-based experiments to establish its effectiveness and reliability in cryptographic applications involving multiple images.

The remainder of the paper is organised as follows: background on both quantum walks, and Chebyshev maps are briefly highlighted in Section 2. Intrigues regarding the use of QWs and Chebyshev mapping to design our proposed cryptosystem are presented in Section 3, while evaluation of the performance of the proposed system is reported and discussed in Section 4. Section 5 concludes this study.

2. Preliminary Background on Quantum Walks and Chebyshev Map

This section presents brief overview of the main building blocks of our proposed cryptosystem (i.e., quantum walks and Chebyshev map).

2.1. Quantum Walks

Exploiting the essential properties of quantum mechanics, notably superposition, unitarity of state evolution, and wave function collapse [29], quantum walks were proposed as equivalents of the classical random walks.

There are two core elements of QWs: coin particle and walker space , both of which exist in a Hilbert space [22]. To transform the full quantum state, the evolution operator , defined in the following equation, is applied on the full quantum state:where implies the shift operator and it is depending on the coin system of the walker. Further, the shift operators of one-walker QW on a cycle of nodes can be expressed as

Additionally, a coin operator, , can be expressed as

Hence, the final state after t steps can be stated as follows:where indicates the primary state of the quantum system. Consequently, the probability of locating the particle at location x after t steps can be computed by making use of

2.2. Chebyshev Map

Chebyshev polynomials are two sequences of polynomials built on the sine and cosine functions, notated as and . These polynomials exhibit two important properties of semigroup and chaos. Of particular interest are mappings of Chebyshev polynomials for since any pair of such mappings commute and .

The structure of the described collection of mappings, known as Chebyshev map [28, 30], is among the widely used one-dimensional chaos systems, which is expressed aswhere is the original value of the chaotic map and is the control parameter and B ≥ 2.

3. Proposed Cryptosystem

This section outlines the use of the quantum walks and Chebyshev map highlighted in the previous section to design our proposed multiple-image cryptosystem. In summary, the proposed scheme involves the use of QW to substitute the plain composite image and the use of the substituted composite image to update key parameters of the Chebyshev map and subsequent permutation of the substituted composite image using QW and Chebyshev map. Finally, this permutated image is substituted using the Chebyshev map to realise the cipher composite image.

3.1. Encryption Algorithm

Figure 1 presents a graphical outline of the proposed encryption approach which is executed in the steps enumerated as follows:(1)Merge all plain images (Ig01, Ig02, …, Ig0N) into one composite image (Pim), and then convert Pim into a vector ImVec.where m, n, and c are the dimension of the composite image.(2)Select the primary key parameters (, t, µ, and ω) for operating QWs t times on a cycle of odd nodes to produce a probability distribution P of size . Here, the primary state of the coin walker is , and ω is used to construct the coin operator (equation (3)), where .(3)Resize P to the dimension of the composite image ImVec (m × n × c). This action accommodates composite images of different dimensions. In this study, the bicubic interpolation method [31] is used for the resizing process.(4)Obtain the key sequence (Key1) via conversion of ReP into integer values.where floor is the floor operation that rounds each value of towards zero (e.g., floor (4.736) = 4).(5)Execute the Bitwise XOR operation process on the composite image ImVec and key1 to obtain the substituted composite image SimVec as(6)Select the primary key parameters (x0, B) for the Chebyshev map, and then update the initial key parameter x0 as specified in the following equations:(7)Apply Chebyshev mapping using xu and B for m × n × c times to produce a sequence X.(8)Add the elements of sequence X to the elements of sequence ReP to obtain sequence R as follows:(9)Arrange the elements of R in ascending order as RA and retrieve the index of each element of RA in R as PerVec.(10)Permutate the substituted composite image SimVec using the generated PerVec such that(11)Obtain the key sequence (Key2) by transforming the sequence X into integer values.(12)Execute Bitwise XOR process on the permutated composite image PerIm and key2 to obtain the cipher composite image Cim as

3.2. Decryption Algorithm

The decryption method (Figure 2) of the proposed cryptosystem is the reverse process of the encryption process, and it is executed in the steps enumerated as follows:(1)Convert the cipher composite image Cim into a vector CimVec.(2)Use the primary key parameters (x0, B) for the Chebyshev map to update the initial key parameter x0 using δ.(3)Apply Chebyshev mapping using xu and B for m × n × c times to produce a sequence X.(4)Obtain the key sequence (DKey1) by converting the sequence X into integer values.(5)Execute Bitwise XOR operation on CimVec and DKey1 to obtain the permutated composite image PerIm.(6)Use the primary key parameters (, t, µ, ω) for operating QWs t times on a cycle of odd nodes to produce a probability distribution P of size .(7)Resize P to the dimension of the composite image CimVec (m × n × c).(8)Add the elements of sequence X to the elements of sequence ReP to obtain sequence R.(9)Arrange the elements of R in ascending order (as RA) and retrieve the index of each element of RA in R as DPerVec.(10)Rearrange (or depermutate) the permutated composite image PerIm using the generated DPerVec such that(11)Obtain the key sequence (DKey2) via conversion of ReP into integer values.(12)Execute the Bitwise XOR operation process on the depermutated composite image DPerIm and DKey2 to obtain the DimVec and decrypted composite image DecIm as(13)Decomposite the decrypted composite image DecIm to get the decrypted images (DIg01, DIg02, …, DIg0N).

4. Experimental Validation

To appraise the performance of the proposed multi-image cryptosystem, experiments executed using a laptop with Intel Core™ i5-2450M, 6 GB RAM and implemented using MATLAB R2016b are reported in this section. The dataset used are sourced from the Signal and Image Processing Institute (SIPI) database in [32]. Four images each of size 512 × 512 and labelled as Ig01 through Ig04 (see Figure 3) were selected and used for the experiments.

Whereas the initial values for key parameters (i.e., , t, µ, ω, x0, and B) can be selected according to their ranges, in this study, the used initial parameter settings for running the QWs are set as , t = 325, µ = 0, and ω = π/6. Similarly, initial parameter settings for iterating the Chebyshev map are set as x0 = 0.6743 and B = 55. Figure 4 presents the plain composite image consisting of input images Ig01 (Baboon), Ig02 (Airplane), Ig03 (Boat), and Ig04 (Peppers) as well as the resulting cipher composite image obtained using our multi-image cryptosystem and the decrypted composite image obtained using our multi-image cryptosystem for the provided initial key parameters. To guarantee the effectiveness of our cryptosystem, in addition to the composite images, we analysed the properties of the input images (Ig01, Ig02, Ig03, and Ig04) and their respective decomposed cipher composite image versions (Cipher-Ig01, Cipher-Ig02, Cipher-Ig03, and Cipher-Ig04) as presented in Figure 5.

The remainder of this section presents an extensive analysis of our proposed scheme using the dataset introduced earlier (in Figure 3). However, throughout the ensuing discussion and performance evaluation, we shall refer to the pristine or unadulterated input images (i.e., Ig01, Ig02, Ig03, and Ig04 and their composite image) as the pristine group whilst their corresponding ciphered versions are collectively referred to as the cipher group.

4.1. Correlation Analysis

To assess the concordance between neighbouring pixels X and Y in an image, we use correlation coefficient, , where it is established that pristine (i.e., unadulterated) images exhibit correlation values near 1 in each direction and that of a cipher image from a well-designed cryptosystem should be close to 0 [27]. To calculate the correlation coefficients for our multiple-image cryptosystem, we picked 104 pairs of neighbouring pixels per direction at random and is computed usingwhere ak, and bk are the values of the two adjacent pixel values, and N denotes the total number of adjacent pixel pairs per direction.

Table 1 presents the outcomes of the correlation coefficient test, where we see that the correlation coefficient values of the cipher images are close to 0. Similarly, the correlation distributions for the red, blue, and green channels of the composite image are presented in Figures 68, respectively. It is apparent from these outcomes that no intelligible information about the composite image can be obtained from the figures.

4.2. Histogram Analysis

Histogram analysis is a widely used image evaluation that reflects the frequency distribution of pixels in an image [27]. A well-designed cryptosystem should produce ciphers with uniformly distributed histogram. Figure 9 presents the histograms of the plain composite image and its corresponding cipher composite image. From these plots, we can deduce that the distributions of the plain composite image are markedly different for each channel whilst those for the ciphered composite image have flat histograms, which indicates the absence of useful information. Furthermore, we employ the chi-square measure to quantify the pixel distribution in the histograms as defined inwhere fk is the pixel value with frequency k, and N is the dimension of the image.

It is instructive that by assuming a significant level , then for the maximum greyscale value . Therefore, an image with less than has a uniform pixel distribution. Otherwise, the histogram is considered nonuniformly distributed. Based on this, Table 2 presents results of the test for our pristine and cipher groups, respectively. The outcomes show that all images in the cipher group have values less than the threshold value of 293.3, which conforms with the flat-out plots of their histograms presented earlier in Figure 9. Hence, it can be concluded that our multiple-image cryptosystem can withstand histogram-based attacks.

4.3. Entropy Analysis

Information entropy is a test used to compute the concentration of pixel values per bit-level in an image . It is considered a measure of efficiency of a cryptosystem [27], and it can be computed usingwhere p(xk) indicates the probability of xk.

Theoretically, grey scale images with 28 values should have an optimal entropy of 8 bits. In other words, when efficiently ciphered, such an image should have an entropy value close to 8. However, this global entropy does not consider the apparent randomness in such ciphered images, which motivates the use of a modified or local entropy measure is used to atone for the randomness. The local entropy is the average values of global entropy in nonoverlapping blocks (i.e., 1936 pixels within the block).

Like in the global entropy, values of local entropy closer to 8 are indications of an efficient cryptosystem. Table 3 presents a summary of local and global entropies for the pristine and cipher groups of our performance analysis. As deduced from the table, all global entropies for the cipher group are within a difference of 0.0002 from the expected value of 8, which validates the efficiency of our proposed scheme in terms of its ability to withstand different entropy-based attacks.

4.4. Differential Test

In addition to performing creditably in the statistical tests, a well-designed cryptosystem should exhibit sensitivity to tiny modifications in the composition of its pristine version. In this study, we utilise two measures: the number of pixels change rate (NPCR) and unified average changing intensity (UACI) defined in equations (26) and (27) for the differential test [33] to assess these modifications.where T is the total pixels within the image, while C1 and C2 are cipher composite images for a pristine (i.e., original or plane) composite image with just one bit modified.

Computations of the NPCR and UACI (in %) when making tiny modifications in pixel value at position (1, 1) from 164 to 165 of the red channel of the pristine composite image are presented in Table 4. Theoretically, for an image to be considered uniformly distributed, its respective NPCR and UACI values should be as close to 99.6% and 33.33% as possible.

Results reported in Table 4 show that, on average, our proposed scheme is within 0.01% and 0.1% of the expected ranges of the NPCR and UACI, respectively, which validates its capability to in withstand differential attacks.

4.5. Contrast Test

Contrast analysis (T) is a statistical measure used to assess the local intensity variation in an image. T can be defined as presented in the following equation [34]:where p(i, j) indicates the number of grey level co-occurrence matrices.

Given an image, high contrast values signify presence of significantly distinct grey levels while lower values indicate constant grey levels. The outcomes of the contrast test presented in Table 5 show that the cipher images obtained from our scheme exhibit higher contrast values relative to their corresponding pristine versions.

4.6. Key Sensitivity Test

A robustly efficient cryptosystem should show sensitivity to changes in the composition of its secret key. In other words, to withstand attacks, such as brute-force attacks, an efficient cryptosystem must be sensitive to alterations to its secret key parameters.

To analyse the key sensitivity of our proposed scheme, we considered recovery (i.e., decryption) of the ciphered composite image (in Figure 4(b)) for different modifications in the secret key parameters. The outcomes of this key sensitivity analysis are presented in Figure 10 for changes in , T, , , , and B, respectively. As manifested in these outcomes, for each modification, the pristine composite image is unrecovered.

Furthermore, by pairing the decrypted cipher image (i.e., in Figure 4(c)) with the decrypted images for slight modifications in secret key parameters (i.e., in Figure 10) and computing their respective pixel difference rate, namely, pairing of the targeted decrypted composite image with those for different alternations in key parameters, we establish the quantitative performance of the key sensitivity of our scheme. Results of our pixel difference rate (in %) are presented in Table 6 and outcomes therein suggest that, despite the slight changes in key parameters, a high pixel difference rate is high (approximately 99.61%) is maintained throughout. Furthermore, the recovered images are composed of unintelligible noise and the recovered images remain incongruous. This is a testimony of our proposed scheme’s sensitivity to alterations to the composition of its secret key parameters.

4.7. Noise and Occlusion Attacks

In the course of its transmission over different communication networks, data can be tampered, lost, or violated. Consequently, an efficient cryptosystem should be designed to curtail such attacks. To assess the ability of our proposed scheme to withstanding the enumerated violations, we report outcomes of noise and occlusion attacks.

For the noise attacks, we considered the impact of using Salt and Pepper (S&N) noise to tamper with the ciphered composite image in Figure 4(b). For effective analysis, the density of S&N noise was varied as 0.1, 0.15, and 0.25; outcomes for which are presented in Figures 11(a)11(c), respectively. Figures 11(d)11(f) present the recovered versions of the respective images.

Similarly, the occlusion attacks were assessed for different cut-outs occluding the parts of the same ciphered composite in Figure 4(b). The cut-out size was varied to cover 10%, 25%, and 35% of the ciphered image as presented in Figures 12(a)12(c), while the recovered versions of these images are presented in Figures 12(d)12(f).

In both analyses, we note the ability to recover clear versions of the input composite image despite the noise and occlusion attacks. This validates the ability of our proposed scheme to overcome such prevalent attacks.

4.8. Randomness Analysis

To validate the randomness of the constructed cipher composite image, the NIST SP 800-22 tests [35] were executed. The main goal of these tests is to detect any nonrandomness property in the constructed cipher composite image. These tests are executed on a sequence of 106 bits from the cipher composite image whose outcomes are presented in Table 7. It is apparent from these outcomes that the constructed cipher composite image obtained using the proposed cryptosystem is completely random.

4.9. Comparative Analysis

To establish the effectiveness of our proposed multi-image cryptosystem, we compare our results alongside those from other chaotic cryptosystems. Results reported in Table 8 show the average values of correlation coefficients UACI, NPCR, and global entropy for our cryptosystem and those indicated in the table. From these outcomes, it is apparent from these outcomes that the proposed scheme is effective and reliable for various cryptographic applications.

5. Concluding Remarks

Exploiting the stochastic transitions between states, and randomness attributed to quantum walks on the one side and the semigroup membership and chaos of Chebyshev map on the other, our study proposes an efficient multi-image cryptosystem that exhibits nonlinear chaotic dynamic behaviours. Simulation results prove that the proposed cryptosystem is effective and reliable across wide-range cryptographic applications.

Besides the merits ascribed to traditional chaos systems, our cryptosystem is an excellent tool to generate efficient encryption keys, espouse high sensitivity to initial and system parameters, manifest good unpredictability, pseudorandomness, stability, periodicity, and infinite key space needed to efficiently resist brute-force attacks.

In addition to designing reliable multi-image cryptosystems, a major objective of this study is advancing studies to integrate quantum computing models with digital computing models for designing reliable cryptosystems. Currently and in the future, we intend to extend this work towards designing new secret-sharing cryptosystems.

Data Availability

The datasets generated and analysed during the current study are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this study and its contents.

Acknowledgments

This study was sponsored by the Prince Sattam bin Abdulaziz University, Saudi Arabia, via the Deanship for Scientific Research funding for the Advanced Computational Intelligence and Intelligent Systems Engineering (ACIISE) Research Group (Project no. 2020/01/12173).