You are on page 1of 11

Received November 7, 2020, accepted November 18, 2020, date of publication November 25, 2020,

date of current version December 9, 2020.


Digital Object Identifier 10.1109/ACCESS.2020.3040442

Quantum Steganography by Harnessing


Entanglement as a Degree of Freedom
MARIUS NAGY 1 AND NAYA NAGY 2
1 CybersecurityCenter, College of Computer Engineering and Science, Prince Mohammad Bin Fahd University, Al-Khobar 31952, Saudi Arabia
2 College of Computer Science and IT, Imam Abdulrahman Bin Faisal University, Dammam 34212, Saudi Arabia

Corresponding author: Marius Nagy (mnagy@pmu.edu.sa)

ABSTRACT The ability of a Mach-Zehnder interferometer to distinguish between a photon with a well-
defined, independent quantum state and one that is part of an entangled pair opens the door for entanglement
to be harnessed as a degree of freedom of the photon and, consequently, to encode information into the
entanglement domain of an elementary particle. In this article, we propose a new idea for a quantum
steganographic technique that exploits the entanglement domain as a secondary way to represent information.
Thus, if photons are used as the physical support for encoding information, the cover data can be encoded
into the polarization domain, while the concealed data is embedded into the entanglement domain. The
scheme has clear advantages compared to previous quantum steganographic attempts in terms of efficiency,
versatility and practicability.

INDEX TERMS Entanglement as a degree of freedom, photon interferometry, quantum steganography,


quantum image representation.

I. INTRODUCTION different approaches when it comes to how to protect sensitive


Steganography is generally understood as the art of hiding data, steganography and cryptography are not irreconcilable.
(or concealing) information by embedding it into innocent A hybrid approach is to use some cryptographic technique in
looking data (or cover data). Although both steganography order to encode the hidden information first, before embed-
and cryptography appear to perform a very similar function, ding it into the public data.
namely, transmitting secret information or messages, they Watermarking is a closely related field to steganography.
achieve this goal in fundamentally different ways. The phi- Primarily applied to images (although text documents can be
losophy behind steganography is based on the idea of ‘‘hiding watermarked as well), watermarking superimposes a second
in plain sight’’, that is, taking advantage of the unsuspicious image, in the form of a logo or a copyright notice, over the
nature of the information being transmitted. This strategy main image, such that direct copying of the original image
works particularly well if the amount of public information would still show its origin or owner. Note that, in this case,
circulating through the communication channel makes check- the second image (or watermark) is usually visible. The fact
ing everything for potentially harboring secret messages pro- that the main image carries information embedded into it that
hibitively expensive. is visible and does not constitute secret information intended
While steganography’s focus is to draw as little attention as to be communicated securely to another party are the distin-
possible on the carrier or cover data by finding clever patterns guishing features of watermarking relative to steganography.
to intermix the secret information within the structure of the Otherwise, both techniques are concerned with embedding
public data, cryptography, on the other hand, spends no effort some type of secondary information into the main data.
to make an encrypted message innocent-looking and blending Given the important success quantum cryptography has
with the flow of other information. Cryptography’s focus is been enjoying ever since the field started back in the 1980s,
to make the decrypting process as hard as possible for anyone it comes as no surprise that researchers have tried to apply
but the legitimate receiver of the message. Although they have the same quantum principles to steganography. Quantum
cryptography owns its flourishing development to two major
The associate editor coordinating the review of this manuscript and factors. The first is the nature of quantum mechanical princi-
approving it for publication was Siddhartha Bhattacharyya . ples, such as superposition of states, entanglement, inherent

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.


VOLUME 8, 2020 For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/ 213671
M. Nagy, N. Nagy: Quantum Steganography by Harnessing Entanglement as a Degree of Freedom

non-determinism, measurements and no-cloning principle, the carrier image is present in our quantum steganographic
which raise the level of security of quantum protocols procedure due to the fact that using a distinct degree of
beyond what classical cryptography can achieve, guarantee- freedom to encode the secret image ensures that the sacrificed
ing unbreakability with the very laws of quantum mechanics. bits are not taken from the cover image representation.
The second major contributor to the success of quantum In terms of the quantum image representation chosen
cryptography is the practical side of its techniques and proto- to support our steganographic procedure, we have opted
cols, most of which can easily be implemented with current for a qubit lattice (or array) representation, in which each
technology and do not have to wait until a full-scale quantum bit in the digital image is encoded into a separate qubit.
computer is built. We have thus avoided more pretentious encoding schemes
Trying to capitalize on the same strengths that proved that only apparently use fewer qubits by speculating on the
essential for the ascension of quantum cryptography, some theoretical advantages of large superposition states. Such
researchers have started to devise steganographic or water- approaches to quantum image steganography, whether they
marking schemes through quantum means [2], [3], [6], [8], are based on Cartesian coordinates for pixels (NEQR [27])
[9], [15]–[17], [21]–[23]. One of the most natural ways to used in [3], [8] or use quantum log-polar image representa-
disguise sensitive information is to take advantage of the tions (QUALPI [28]) to support image steganography [21],
particular characteristics of the communications channel, do not openly acknowledge the problem they have to retrieve
especially the ones that are naturally occurring, like noise. an image from its quantum representation. Precisely because
Indeed, many approaches to quantum steganography exploit the superpositions they employ have as many terms as there
the idea of hiding messages in quantum data by disguising are pixels in the digital image, it would take even more
it as deliberately inserted noise in a codeword of a quantum copies of the quantum representation to be able to retrieve
error-correcting code [2], [16], [17], [23]. Mihara [16], [17] all (or almost all) pixels in the image through measurements
also achieves a separation between the cover data and the (see [19] for a detailed analysis of this issue).
embedded secret message, such that embedding any secret Regardless of the particular way the cover data (be it an
text does not modify the content of cover data. This is a fea- image or not) is represented quantum mechanically, all the
ture that our quantum image steganography technique shares quantum steganographic proposals to date share the following
as well: the same cover image can be used with any embedded characteristic: in order to embed secret information in the
secondary image and a modification in one does not require quantum cover data (image), additional resources (in the form
a change in the other. However, while our protocol is free of of qubits) have to be allocated beside the ones used for
any pre-conditions that need to be satisfied, Mihara requires the public information, or alternatively, some of the qubits
pre-shared entanglement between the communicating parties, intended for the quantum image representation have to be
while other approaches, such as [2] use classical secret keys instead used to encode the secret information, at the expense
to encode the secret data, even if quantum error-correcting of the image quality. In this manuscript, we propose, for the
codes are employed. first time, a steganographic protocol that can reuse the qubits
Although, in general, both the cover data and the concealed that are the physical support of the cover data in order to
data can take any form (text, image, sound, video, etc.), encode the secret information as well. This is possible due to a
most steganographic procedures focus on hiding information double-encoding strategy, in which a primary degree of free-
within images. In this respect, the quantum image represen- dom of some particle (such as polarization of photons or spin
tation needed in a steganographic scheme is either a Qubit of electrons) is exploited together with its entanglement
Lattice [14], [25], [26], which mirrors the structure of a digital degree of freedom in order to encode within the quantum
image, or more economical alternatives that employ expo- state of the same particle a bit of information which is part
nentially fewer qubits by manipulating large superposition of the cover image representation, as well as some amount
states [1], [10]–[13], [24], [27], [28], but which suffer from of secret information. The entanglement degree of freedom
the measurement bottleneck problem [19]. that is central to our novel steganographic idea refers to a
For quantum steganographic approaches specifically particle’s property of being part of an entangled ensemble or
designed to work with digital images, the Least Significant having its own well-defined, independent quantum state. The
Bit (LSB) technique remains the most popular one, even in proposed method is conceptually clean, harnessing different
a quantum context [3], [8], [9]. Our approach also employs domains to separate the carrier data from the secret embedded
a variation of this technique, sacrificing several of the least data, is implementable with current technology, does not
significant bits in the gray level representation of a pixel require additional qubits for the secret information and can be
in order to allocate more resources to the most significant combined with cryptographic techniques to encode the secret
bits and thus, improving the quality of the recovered hidden data, if necessary.
image. This is in contrast to the standard LSB technique, The remainder of the paper is organized as follows. Next
in which the quality of the cover image is reduced (even if section provides the details of how a Mach-Zehnder interfer-
imperceptibly to the human eye) by using one or more of the ometer can be used to distinguish between a photon that is
least significant bits to encode the secret data at the expense of part of an entangled pair and a single, standalone photon.
the cover image. No degradation whatsoever in the quality of In Section 3, we show how solving this distinguishability

213672 VOLUME 8, 2020


M. Nagy, N. Nagy: Quantum Steganography by Harnessing Entanglement as a Degree of Freedom

where |Li describes the state of a photon traversing the inter-


ferometer through the lower arm and |U i can be assimilated
with the state of a photon going through the upper arm of
the interferometer. According to this basis, a photon hitting
BS1 from below (not pictured in Figure 1) is simultaneously
reflected into the lower arm and refracted into the upper
arm. Quantum mechanically, this corresponds to a unitary
evolution from state |Li (incoming vertically from below
BS1) to an equal superposition of basis vectors |Li and |U i,
each with its own relative phase shift:
1
BS1|Li = √ (e2iθ |Li + eiθ |U i). (3)
2
FIGURE 1. Mach-Zehnder interferometer.
In order to be reflected into the lower arm, the photon travels
problem lays out the foundation for encoding informa- an optical distance of 2δ through the material of the beam
tion in the entanglement degree of freedom of a particle. splitter (see Figure 1) and in the process, its phase is shifted
Section 4 puts forward our novel quantum image steganogra- by 2θ . Similarly, the component that goes through into the
phy scheme employing both the entanglement and the polar- upper arm travels only half that distance and, consequently,
ization degrees of freedom of a photon to embed a hidden acquires a phase shift of θ.
image into a non-secret one. A security analysis of our novel On the other hand, a photon that enters the Mach-Zehnder
steganographic technique is performed in Section 5, followed interferometer horizontally, from the left side, is in the initial
in Section 6 by a discussion of the advantages of our pro- state |ψ0 i = |U i. BS1 also transforms this state into a
posed scheme in the context of previous attempts at quantum superposition of basis vectors |Li and |U i, as follows:
steganography. The manuscript closes with a few conclusions 1
formulated in Section 7. |ψ1 i = BS1|ψ0 i = √ (eiθ |Li − |U i). (4)
2
II. DETECTING ENTANGLEMENT THROUGH The relative phase shift of θ for the |Li component is again
INTERFEROMETRY due to the optical path δ taken by the photon when it goes
Our quantum steganography scheme exploits the ability to through the semi-reflective surface of BS1 into the lower
encode information in the entanglement domain by distin- arm. The other phase shift of eiπ = −1 is picked up by the
guishing between a photon that is part of an entangled pair component reflected by BS1 into the upper arm. The reason
and a single, independent photon. This section explains in for this phase shift is that whenever a light beam is incident
detail how the two can be told apart with the help of single- on a surface and the material on the other side of the surface
photon interferometry. Figure 1 depicts the typical arrange- has a higher index of refraction than the medium that the light
ment of a Mach-Zehnder interferometer. is traveling from, then the reflected light beam is shifted in its
The first Beam Splitter (BS1) reflects half of an incident phase by exactly one half a wavelength.
beam, redirecting it to the upper arm (U) of the interferometer, The purpose of the two mirrors (M) is to bring the two arms
and lets the other half pass through into the lower arm (L). of the interferometer together again and their effect can easily
Technically, a beam splitter is a ‘‘half-silvered’’ mirror usu- be described through the following operator:
ally made up of some transparent material (such as glass) with  
−1 0
one semi-reflective side. Interestingly, and perhaps coun- M= = −I . (5)
0 −1
terintuitively, when a single photon hits the beam splitter,
quantum mechanics dictates that the photon is both reflected The mirror in each arm of the interferometer simply reflects
into the upper arm and passes through into the lower arm the incoming photon, while also shifting its phase by half a
simultaneously. This behavior can be properly formalized by wavelength since the mirror has a higher index of refraction
modeling the beam splitter as a quantum operator described than the air.
by the following matrix:
1
 2iθ iθ  |ψ2 i = M |ψ1 i = −I |ψ1 i = √ (|U i − eiθ |Li). (6)
1 e e 2
BS1 = √ iθ . (1)
2 e −1 Finally, the effect of the second beam splitter (BS2) is sim-
This operator acts on the state space spanned by the two basis ilar to the way BS1 acts on the two basis vectors |Li and |U i,
vectors: producing balanced superpositions of them. But, because the
    semi-reflective surface of BS2 is oriented downwards (see
1 0 Figure 1), the quantum operator associated with BS2 can be
|Li = , |U i = , (2)
0 1 obtained from the matrix describing BS1 by swapping both

VOLUME 8, 2020 213673


M. Nagy, N. Nagy: Quantum Steganography by Harnessing Entanglement as a Degree of Freedom

its two rows and its two columns:


−1 eiθ
 
1
BS2 = √ iθ 2iθ . (7)
2 e e
Thus, a photon that reaches BS2 from the lower arm, is simul-
taneously reflected with a phase shift of π and goes through
with a phase shift of θ. Similarly, when a photon traveling
through the upper arm reaches BS2, it continues through
acquiring a phase shift of θ and at the same time it is reflected
when it hits the semi-reflective surface of BS2 and picks up
a phase of 2θ in accordance with the optical path traversed
through the material the beam splitter is made of. FIGURE 2. A pair of entangled photons, each subjected to its own
Having all the optical components of the Mach-Zehnder Mach-Zehnder interferometer.
interferometer precisely described, we can proceed to analyze
what happens to a single photon that enters the interferometer Note that the term |Li|U 0 i, which corresponds to the two
horizontally, from the left side. Mathematically, the state of photons continuing straight through their respective beam
the photon is transformed by successively applying quantum splitters, has a relative phase shift of 2θ, to account for the
operators BS1, M and BS2: optical path traversed by each of the two photons through the
|ψ3 i = BS2 · M · BS1|ψ0 i = BS2 · M |ψ1 i = BS2|ψ2 i material from which the beam splitters are manufactured.
The state of the ensemble after being reflected by the
−1 eiθ
 iθ 
1 2eiθ
   
1 1 −e
= √ iθ 2iθ ·√ = mirrors remains unchanged because each of the two photons
2 e e 2 1 2 0
has its phase shifted by eiπ = −1:
= eiθ |Li. (8)
|ψ2 i = (M ⊗ M )|ψ1 i = ((−I ) ⊗ (−I ))|ψ1 i
Equation 8 clearly shows that any photon entering a 1
Mach-Zehnder interferometer horizontally, from the left side, = √ (|U i|L 0 i + ei2θ |Li|U 0 i). (10)
2
will always end up exiting horizontally and will therefore be
detected by photon detector D1. This is due to the interference The final state of the ensemble, as each photon leaves its
that takes place at BS2, which destroys the vertical compo- own interferometer, is obtained by applying operator BS2 ⊗
nent |U i that would have caused D2 to trigger and reinforces BS1 on state |ψ2 i, since the first photon in the ensemble
the horizontal component |Li. (traversing the right-hand side interferometer) goes through
The interference effect described above is only possible if a beam splitter described mathematically by operator BS2
no information can be obtained about which way the photon before being detected by either D1 or D2, and similarly,
takes from BS1 to BS2. Any attempt to measure the location the second photon (going through the left-hand side inter-
of the photon, as being in the upper arm or in the lower arm, ferometer) is subjected to a beam splitter whose effect is
will inevitably destroy interference at BS2 and, consequently, modeled formally as operator BS1 before triggering detector
the photon will have equal chances of leaving the interferom- D3 or D4.
eter horizontally and being detected by D1, or vertically and 1
|ψ3 i = (BS2 ⊗ BS1) √ (|U i|L 0 i + ei2θ |Li|U 0 i)
ending up in D2. 2
Now let us turn our attention to the case where the photon 1 e |Li + e2iθ |U i e2iθ |L 0 i + eiθ |U 0 i
 iθ 
entering the interferometer is part of an entangled pair of = √ √ ⊗ √
2 2 2
photons, possibly created through spontaneous parametric
e2iθ −|Li + eiθ |U i eiθ |L 0 i − |U 0 i
 
down-conversion (SPDC) [4], [5], [20]. This process uses +√ √ ⊗ √
a non-linear crystal to generate a pair of photons that are 2 2 2
momentum and position entangled. Figure 2 depicts an exper- e2iθ
= √ (|Li|U 0 i + e2iθ |U i|L 0 i). (11)
imental setup in which each photon from an entangled pair is 2
going through its own Mach-Zehnder interferometer.
The first observation we can formulate, based on state
Momentum conservation laws are responsible for the cor-
|ψ3 i, is that the two photons remain entangled even after
relations exhibited by the two particles in the entangled
leaving the experimental setup depicted in Figure 2. Their
ensemble, if their position through the corresponding inter-
conjugate properties are expressed in the simultaneous trig-
ferometer is to be observed. Thus, the two photons are
gering of detectors D1 and D3, respectively D2 and D4.
either both reflected by the first beam splitter they each
In other words, both photons exit the experimental apparatus
encounter, or they are both refracted, passing through the
horizontally or both vertically. However, this correlation is
glass material of the beam splitter. This position entangled
only apparent to an observer that has access to both inter-
state of the ensemble can be expressed formally as follows:
ferometers. If we follow the behavior of any one of the
1 two photons, there is an equal probability that it will exit
|ψ1 i = √ (|U i|L 0 i + ei2θ |Li|U 0 i). (9)
2 the interferometer horizontally or vertically. This behavior is
213674 VOLUME 8, 2020
M. Nagy, N. Nagy: Quantum Steganography by Harnessing Entanglement as a Degree of Freedom

different from the previous scenario, in which a single photon This quantity can be pushed arbitrarily close to 1, by encoding
entering a Mach-Zehnder interferometer horizontally always one bit over an arbitrary number of particles. For example,
exits the device in the same way (horizontally). assume that if we want to encode a 0, we prepare two inde-
In the case of the two entangled photons, entanglement pendent, standalone photons, while if we want to encode the
acts as some sort of measurement on the position of a pho- value 1 we generate two pairs of entangled photons, and
ton, destroying the interference brought about by the exper- use one photon from each pair to represent the bit 1. In this
imental apparatus. Since it is possible, even theoretically, case, the amount of information carried by the two photons
to obtain information about which path a particular photon increases to:
took through the interferometer by observing the position 3 5 1 1 4 4 5 8
of its ‘‘twin’’, the correlations between the entangled pho- · 1 + (1 − (− log − log )) = 1 + ( − log 5)
8 8 5 5 5 5 8 5
tons amount to a measurement on the position of any of ≈ 0.55 (13)
the two photons, which ultimately leads to non-interference.
However, the difference in behavior between a photon that Note in the above formula that in three out of eight cases
is part of an entangled pair and a single, standalone photon (when the photons are part of entangled pairs and at least
introduces a degree of freedom that can be harnessed for one exits the interferometer vertically) we know the encoded
various purposes. bit is a 1. On the other hand, when both photons emerge
horizontally (event that happens in five out of eight cases),
there is still a 1/5 probability that they encode a 1. In general,
III. CODING IN THE ENTANGLEMENT DOMAIN
when one bit is encoded over a group of n photons, the amount
Turning a photon (or, in general, any particle for which
of information carried becomes:
position-entangled pairs can be generated) into physical sup-
2n − 1 2n + 1 2n
port for encoding and transmitting information can be done
n+1
+ n+1 (1 + n · n − log (2n + 1))
easily by distinguishing between a photon with a well- 2 2 2 +1
n + 1 log (2n + 1)
defined, independent quantum state and a photon whose = − . (14)
quantum state can only be described as part of an entan- 2 2n+1
gled pair. The tool to achieve this distinguishability is a It is easy to check that, for all practical purposes,
Mach-Zehnder interferometer, as we have seen in detail in 9 or10 photons are enough to be able to distinguish between
the previous section, or a similar device that can be used a 0 and a 1 with very high probability. However, what
to achieve interference of other elementary particles used as makes encoding in the entanglement domain appealing is
physical support. Consequently, we can follow the convention the fact that it can be used as a secondary degree of free-
that a single, standalone photon always encodes the bit 0, dom to increase the amount of information that can be
while a photon that was generated through SPDC, for exam- stored/transmitted to more than one bit per particle. This
ple, encodes a 1. Thus, depending on the physical process strategy can be used, for instance, to improve the efficiency
that birthed the photon, we can encode information in the of quantum cryptographic protocols by exploiting the entan-
entanglement domain. glement degree of freedom of a photon together with its
In order to read the value of a bit encoded like this, we need polarization [18]. In the next section, we show how the
to pass the carrier photon through a Mach-Zehnder interfer- same technique of double encoding in the polarization and
ometer and observe which photon detector it will trigger. entanglement domains can be used to create a steganographic
A vertical exit, corresponding to a click registered by D2, algorithm with all the security benefits brought about by
is equivalent to reading a 1 (entangled photon), because non- quantum mechanics.
entangled photons always exit the apparatus horizontally.
A click registered by D1, on the other hand, cannot be inter- IV. QUANTUM STEGANOGRAPHY SCHEME
preted unambiguously. Assuming that, a priori, the photon Although, in general, both the concealed and the host data
is equally likely to carry a 0 or a 1, when we see the pho- can take any format (text, audio, image, video, etc.), for con-
ton exiting horizontally, there is a 2/3 probability the bit creteness, let us assume throughout this section that we intend
carried is 0 and a 1/3 probability that the photon is part to hide an image B within a host image A. More precisely,
of an entanglement and therefore, it carries a value of 1. we wish to conceal the Lena image (Figure 4) within the
Because a value of 0 cannot always be reliably distinguished image of Figure 3.
from a 1, if the information is encoded in the entanglement Both images are composed of 512 × 512 pixels, with the
domain, it follows that the amount of information carried by gray level of each pixel in the range [0..255] (encoded on
one particle is less than one bit. To be precise, the amount 8 bits). Our quantum steganography scheme uses a qubit
of information that can be encoded by a single photon lattice to represent both images (A and B) at the same time,
is: but using different degrees of freedom. Since each of the
two images can be thought of as a sequence of bits ai ,
1 3 1 1 2 2 1 3 2 respectively bi , with i = 0, 1, 2, . . . , 226 − 1, the quantum
· 1+ (1−(− log − log )) = + (1+ − log 3) image representation will require a sequence of photons φi
4 4 3 3 3 3 4 4 3
≈ 0.31 (12) with the same length. Each photon φi will be responsible of

VOLUME 8, 2020 213675


M. Nagy, N. Nagy: Quantum Steganography by Harnessing Entanglement as a Degree of Freedom

FIGURE 5. Measuring a photon in both the entanglement and the


polarization domain.

some of the classical bits used in the representation of the


resulting image are actually encoding the secret image, while
FIGURE 3. The host image A (512 × 512 × 8 bits grayscale image). the others are part of the cover image. This is not the case for
our quantum approach. The two images are simultaneously
encoded into two independent properties of photons (polar-
ization and entanglement) such that after the encoding phase,
all we have is a sequence or train of photons, where each
photon encodes both a bit from the cover image and a bit from
the hidden image.
In order to retrieve the values ai and bi from the state of
photon φi , we need to measure the photon in each of the
two bases used to encode the values ai and bi in the first
place. Figure 5 shows how these two measurements would
be accomplished in practice.
A measurement in the entanglement domain corresponds
to running the photon through a Mach-Zehnder interfer-
ometer in order to distinguish between a photon that is
part of an entangled pair and a single, standalone photon.
Section 2 describes this process in detail. As Figure 5 shows,
after the photon exits the interferometer, either horizon-
tally or vertically, a polarizer beam splitter is placed in its path
FIGURE 4. The concealed image B (512 × 512 × 8 bits grayscale image).
to further distinguish between a horizontally polarized photon
(described by basis state |H i) and a vertically polarized one
encoding the bit values ai and bi . Bit ai will be encoded in (corresponding to basis state |V i). We note in passing, that
the polarization domain, while bit bi will be encoded in the the direction the photon exits the interferometer (horizon-
entanglement domain. For this, an encoding basis has to be tally or vertically) is not related in any way to its polarization,
chosen in order to formally describe the possible states in since the two domains are fully independent.
each degree of freedom. A polarizer beam splitter (PBS) resembles the function
To encode a bit into the rectilinear polarization of a photon, of a beam splitter, in the sense that it splits the incoming
one can choose horizontal polarization |H i to encode a 0 and beam into two, but based on the polarization of each pho-
vertical polarization |V i to encode a 1. As for the entangle- ton. A calcite crystal is usually used for this purpose and if
ment degree of freedom, we can use a regular photon emitter properly positioned, it will separate the vertically polarized
to generate a photon that encodes a 0 and the signal photon photons from the horizontally polarized ones, sending them
from a spatially entangled paired generated using SPDC to along different directions and thus, effectively acting as a
encode a 1. In practice, the value bi is encoded first, because measurement device in the polarization domain.
we need to generate the photon differently, depending on the If a photon is detected by D1 or D2, we can conclude with
value bi encoded, and then we can use a polarizer on the certainty that the value ai corresponding to that photon is 0.
photon thus obtained to further encode the bit ai on the same Similarly, if D1’ or D2’ triggers, we know with certainty that
particle. the value ai encoded by that particular photon is 1. Unlike the
Note that in a classical steganographic approach, after the reliability characterizing the polarization degree of freedom,
hidden image is somehow embedded into the carrier image, where the two vectors |H i and |V i are orthogonal and can

213676 VOLUME 8, 2020


M. Nagy, N. Nagy: Quantum Steganography by Harnessing Entanglement as a Degree of Freedom

FIGURE 6. Recovered hidden image using a simple encoding/decoding FIGURE 7. Recovered hidden image using an encoding/decoding scheme
procedure. based on progressive allocation of resources for most significant bits in
the gray level representation.

always be distinguished unambiguously, we cannot achieve


full distinguishability in the entanglement domain. As we The same idea can be applied in our quantum steganogra-
have seen in Section 2, if the photon leaves the interferometer phy scheme, by allocating more resources (photons) to higher
vertically (ends up either in D2 or D2’, depending on its ranked bits in the 8-bit representation of the gray level of a
polarization), then we know with certainty that the photon pixel. Thus, Figure 7 shows the hidden image that can be
is entangled and therefore bi = 1. But if the photon causes recovered if only the four most significant bits (from the
either D1 or D1’ to trigger, then there is still a chance out of eight encoding the gray level) are encoded in the quantum
three for the photon to be entangled and, therefore, encode a image representation: 3 photons are used to encode the most
1, assuming a uniform distribution of zeros and ones as values significant bit b7 , two photons are used to encode each of
for bi . b6 and b5 and one bit is used for b4 . The four remaining
Therefore, since the values ai can always be recovered bits (the least significant ones) are deliberately ignored. The
exactly, the host image A can be decoded with perfect accu- improvement in quality compared to Figure 6 is evident.
racy from its quantum representation as a stream of pho- In general, the more photons are used to encode the value
tons. The hidden image B, on the other hand, cannot be of one bit in the entanglement domain, the higher the con-
recovered exactly, due to the ambiguity in distinguishing a fidence that the recovered value is correct. More precisely,
non-entangled photon from an entangled one. Assuming a if n photons are used as physical embodiment for each bit
simple decoding strategy, in which we set bi to 1 every time in the concealed image, then the probability of a bit 1 to
we observe the photon exiting the interferometer vertically be incorrectly decoded as 0 is 1/2n . It follows that more
and assign 0 to bi otherwise, some of the bits for bi will of the image originally hidden within the host image can
erroneously be set to 0. To be precise, one third of all bits be retrieved, if more photons are available in the quantum
that are recovered as 0, were originally encoded as 1. In other representation of the image.
words, all bits that are 0 are recovered as such, while only To exemplify, imagine now that the host image is a color
half of those that are 1 are retrieved correctly. Figure 6 image where each of the three channels, Red, Green and
shows the level of degradation for the recovered concealed Blue are encoded on 8 bits. If the concealed image remains a
image, by following the simple decoding procedure men- gray scale image of the same size as the host, then there are
tioned above. 24 photons available to encode the gray level of each pixel
The quality of the hidden image can be improved by taking in the concealed image. The extended resources available
advantage of the fact that not all bits bi have equal importance allow for almost a full recovery of the concealed image.
in the quality of image B. Among the 8 bits that encode Figure 8 depicts how much of the original Lena image can
the gray level of a pixel, the most significant ones are more be recovered with five photons allocated for each of b7 and
important to be decoded correctly than the least significant b6 (the most significant bits in the gray level encoding), four
ones. Classical steganography schemes are also taking advan- photons for each of b5 and b4 and three photons for each of
tage of the rank of a bit in the gray scale representation by b3 and b2 . One can see that the quality has been brought up
sacrificing the least significant bit (or bits) to encode a hidden almost to the level of the original Lena image.
message or picture, instead of the fine shades of gray in the Other factors that may influence the quality of the recov-
host image. ered image are the actual values of the parameters controlling

VOLUME 8, 2020 213677


M. Nagy, N. Nagy: Quantum Steganography by Harnessing Entanglement as a Degree of Freedom

encryption/decryption procedures. Consequently, a security


analysis is not looking at how difficult it is to decrypt the
cipher text, but perhaps at how likely it is for the hidden data
to be discovered within the public data.
Our steganographic procedure manipulates photon polar-
ization in order to encode the cover image. Due to the sim-
plicity of setting and measuring the polarization of a photon,
this is the typical degree of freedom exploited in conjunction
with photons, both for cryptographic and quantum computing
purposes. The degree of freedom opened by the possibility of
a photon to be part of an entangled pair is not used in practice,
perhaps because distinguishing between a single, indepen-
dent photon and one that is part of an entangled pair cannot be
done reliably and requires more advanced equipment, such as
a Mach-Zehnder interferometer. However, precisely because
it is not actually exploited in quantum cryptography, it may
serve as an ideal way to embed some secret information into
FIGURE 8. Further improvement of the recovered hidden image if this secondary domain, besides the information encoded in
24 photons are used as physical embodiment for each pixel in the image. the polarization, which everyone expects in a photon.
Nevertheless, the level of security of our steganographic
the optical devices used in order to generate the photons technique can be raised, if necessary, by exploiting specific
and to measure them. Thus, we can distinguish between the quantum mechanical properties in order to detect any unau-
transmitter bandwidth and the receiver bandwidth, as two thorized third party attempting to dig up the hidden image.
such parameters. These bandwidths are not defined in terms To achieve this goal, the procedure described in the previous
of range of frequencies because the photons are transmitted section has to be slightly modified, as follows. Assume that
one at the time, sequentially, and they can only have two Alice, the sender, wishes to transmit to Bob, the legitimate
frequencies: all photons that are not entangled have the same receiver, a secret image embedded within a public one. The
frequency being generated by the same low-intensity light physical support for the two images is a sequence of photons,
source and all entangled photons also share the same fre- one photon per each bit required to represent the digital
quency, being generated through the same SPDC process. image. The cover image is encoded in the polarization state
Therefore, we can define the transmitter bandwidth as the of the photons (either horizontal or vertical), while the hidden
number of photons that can be generated and transmitted per image is encoded in the entanglement degree of freedom of
time unit (second). This parameter depends on the optical the same photons. This means that a bit with value 0 in the
characteristics of the light sources used and the non-linear hidden image corresponds to a ‘‘regular’’ photon generated
crystal responsible for generating the pair of entangled pho- from a low-intensity photon emitter and a bit with value 1 is
tons through SPDC. On the other hand, the receiver band- physically embodied in the signal photon generated through
width is defined as the number of photons that can be received SPDC.
and measured per time unit (second). The latter depends Once each photon is double-encoded with the value of the
on the optical characteristics of the elements composing the corresponding bit in the cover image and the hidden image,
Mach-Zehnder interferometer and the polarizer beam split- the position of each pixel in the image is given by the position
ters. Naturally, the receiver bandwidth needs to be at least of the encoding photons in the train (array) of photons (the
as high as the transmitter bandwidth, otherwise photon loss bi-dimensional images can be encoded in row order, column
will occur, which will reduce the resolution of the recovered order or following any other similar convention). However,
image. in order to prevent an unauthorized third-party, Eve, from
gaining access to the secret image, the bits of the secret image
V. SECURITY ANALYSIS are scrambled before encoding. Consequently, even if Eve
The field of steganography is usually concerned with clever measures the train of photons in the two bases (see Figure 5)
methods to disguise sensitive information as part of incon- like a legitimate receiver, she cannot put together the bits from
spicuous, routine public data. According to this philosophy, the secret image in the correct order. Furthermore, the act of
effort and creativity are spent in order to make secret informa- measurement disturbs the entangled states created through
tion look like a lot of other information transferred through a the SPDC process and paves the way for detecting Eve’s
communication channel, such that a superficial monitoring actions.
of the channel does not raise any flags and does not ulti- While the signal photon in an entangled pair is sent to Bob
mately reveal the hidden data. Therefore, unlike cryptogra- after encoding, its ‘‘twin’’, the idler photon, is kept in Alice’s
phy, steganography does not usually encrypt the data it aims possession and undergoes its own Mach-Zehnder interferom-
to hide by spending resources on computationally intensive eter (see Figure 2), with Alice recording where each photon

213678 VOLUME 8, 2020


M. Nagy, N. Nagy: Quantum Steganography by Harnessing Entanglement as a Degree of Freedom

ended up: in detector D3 or D4. This allows Alice and Bob to image, nothing has to be changed in the way the secret image
determine if a third party (Eve) meddled with the photons in is encoded and viceversa, changing the secret image does not
transit. Once Bob has received all the photons and measured entail modifications in the polarizations encoding the cover
them, the photons belonging to an entangled pair must exit image.
the sender and respectively the receiver’s interferometer both A common method in classical image steganography,
horizontally or both vertically, as detailed in Section 2. Any where each pixel in the digital image is represented either
mismatch points to a possible eavesdropper at work. Alice as a single grayscale value or as three individual values for
and Bob can take advantage of this property and verify a an RGB color image, is to sacrifice the resources allocated
small fraction of the entangled photons if their measurement to represent the Least Significant Bit(s) (LSB) and use them
outcomes coincide. Only then, Alice can disclose the correct to encode the secret information instead. It is only natu-
order of the bits through a classical public communication ral that this idea made its way through to quantum image
channel allowing Bob to correctly reconstruct the hidden steganography as well [3], [8], [9]. We have also adapted
image. it, in the previous section, in order to increase the quality
For each entangled photon disturbed by Eve, there is a 50% of the concealed image. Thus, instead of distributing the
chance of a mismatch between what Alice and Bob observe available resources (photons) uniformly over all bit-planes,
through their interferometers, so the probability of detecting we have devised a progressive allocation scheme that rewards
an eavesdropper (Eve) increases rapidly with each entangled the most significant bits in the pixel value. However, unlike
state collapsed by Eve and tested by Alice and Bob: previous applications of this idea, in our protocol there is
no degradation whatsoever in the quality of the cover image
1
Pdetect = 1 − (15) because of the resources sacrificed from its representation,
2n even if this degradation may seem imperceptible to the human
where n is the number of entangled states tested. The postu- eye.
lates of quantum mechanics, such as measurements collapse Some quantum steganographic protocols impose pre-
the quantum state or the no-cloning theorem, which are very conditions that must be met in order for the procedure to
useful in quantum cryptography in general, also guarantee the unfold successfully. These pre-conditions usually take the
security of the modified protocol above. form of some shared resource, such as a classical secret
key or an entangled state, between the parties that want to
VI. DISCUSSION communicate secret information disguised within innocent-
Having described our main idea for quantum steganography looking data [17], [22], [23]. These shared resources are
and some ways to optimize its applicability or enhance its either used as part of the steganographic procedure to hide
security, we proceed in this section to an enumeration of its the secret information within the structure of the public
advantages, discussed in the context of existing techniques data or they are used to encrypt the secret information prior
proposed in this area. Undoubtedly, the main advantages to being embedded into the carrier data, as a precautionary
of our scheme stem from the double encoding technique measure, in case the hiding technique fails.
employed, namely, working with two different and com- Ensuring that both the sender and the intended receiver
pletely independent degrees of freedom of a photon: its polar- share some resources prior to the execution of the stegano-
ization and its ability to be entangled with another photon. graphic protocol raises problems of its own and our stegano-
Being able to encode the pixel values making up the graphic scheme is not relying on any such pre-conditions
secret image within the same particles that constitute the being satisfied. It is true that, in our scheme, the hidden
physical support for representing the non-secret or cover data is not normally encrypted in any way, but, if neces-
image positively impacts the efficiency of our scheme, as no sary, encryption of the secret data could be achieved without
additional resources (taking the form of qubits, at a generic any supplementary resources or requirements. The sender
level, or photons, at a practical level) are required for embed- can, as we have described in detail in the previous section,
ding the secret information. This one-to-one correspondence scramble the order of the pixels in the concealed image and
between the number of photons employed in the quantum only reveal the correct order to the intended receiver through
image representation and the number of bits the cover image a public channel, after the photons have been received
is composed of also avoids raising suspicions about possible and measured, provided that no eavesdropping activity is
secret information hidden within the representation, as each detected.
photon may be interpreted as the physical embodiment of a As another point we wish to make in regard to our
bit in the public image and nothing more. steganography technique, we mention its general applicabil-
At the same time, the complete independence between the ity and versatility. We have exemplified our novel idea on
two encoding domains, the fact that if a photon is spatially the particular case of concealing a digital image by encoding
entangled or not has no consequence whatsoever on the polar- it on the same physical support as another digital image,
ization state of that photon, also helps keep the two image playing the role of a carrier or cover data. However, nothing
representations fully independent. What this means is that, precludes the technique described herein to be applied to
if we want to make any modification to the public, carrier any other form of digital information (that is, information

VOLUME 8, 2020 213679


M. Nagy, N. Nagy: Quantum Steganography by Harnessing Entanglement as a Degree of Freedom

represented as a sequence of bits), in the case of both the No such degradation in the quality of the cover data is present
hidden information or the public, cover data. This comprises in our procedure.
audio files, text and digital video formats among others. The Although the technique we propose is easily imple-
protocol can also be applied as a watermarking technique by mentable with current photon technology, its versatility
replacing the hidden image with a logo or a copyright note. makes it adaptable to other physical support for which the
Removing it would amount to reconstructing the whole image entanglement degree of freedom can be exploited (such as
from scratch, bit by bit. electrons, for example) or other data formats besides images
Finally, the physical embodiment of a qubit throughout (such as text, audio, video, etc.). In case it is crucial that the
our protocol description is a photon, since a photon’s polar- secret information, once discovered, does not get decoded
ization and entanglement degrees of freedom are relatively by an unauthorized third party, the protocol can be extended
easy to manipulate with current technology. More specif- such that only the intended recipient can decode the secret
ically, single-photon interferometry, which is the corner- information, with the help of the sender, after eavesdropping
stone of harnessing the entanglement domain of a photon has been ruled out.
in order to encode information, is easy to bring about using For all the reasons enumerated above, we assert that our
a Mach-Zehnder interferometer. But the same underlying quantum steganography technique by harnessing entangle-
idea can be implemented with other elementary particles, ment as a degree of freedom has clear advantages over previ-
as long as some basic physical property of the particle can ous approaches in terms of efficiency of resource utilization,
be exploited for encoding information along with the ability security, versatility, extendability, adaptability and last, but
of the particle to interfere with itself and be entangled with not least, its implementability with current technology.
another entity. One such alternative is an electron, with its
spin serving as the primary degree of freedom for encod- REFERENCES
[1] S. Caraiman and V. Manta, ‘‘Image processing using quantum comput-
ing bits. As for electron interferometry, there exists devices ing,’’ in Proc. 16th Int. Conf. Syst. Theory, Control Comput. (ICSTCC),
similar to a Mach-Zehnder interferometer that can allow an Oct. 2012, pp. 1–6.
electron to interfere with itself [7]. [2] J. Gea-Banacloche, ‘‘Hiding messages in quantum data,’’ J. Math. Phys.,
vol. 43, no. 9, pp. 4531–4536, Sep. 2002, doi: 10.1063/1.1495073.
[3] S. Heidari, M. R. Pourarian, R. Gheibi, M. Naseri, and M. Houshmand,
VII. CONCLUSION ‘‘Quantum red–green–blue image steganography,’’ Int. J. Quantum Inf.,
The evidence presented in the paper supports the conclusion vol. 15, no. 5, 2017, Art. no. 1750039, doi: 10.1142/S0219749917500393.
[4] J. Horgan, ‘‘Quantum philosophy,’’ Sci. Amer., vol. 267, no. 1, pp. 94–105,
that harnessing entanglement as a degree of freedom is a 1992. [Online]. Available: http://www.jstor.org/stable/24939143
powerful and versatile tool for enhancing information encod- [5] J. C. Howell, R. S. Bennink, S. J. Bentley, and R. W. Boyd, ‘‘Realization
ing, when coupled with another way of representing infor- of the Einstein-Podolsky-Rosen paradox using Momentum- and position-
entangled photons from spontaneous parametric down conversion,’’ Phys.
mation, and it is a good choice for quantum steganography, Rev. Lett., vol. 92, no. 21, May 2004, Art. no. 210403. [Online]. Available:
in particular. https://link.aps.org/doi/10.1103/PhysRevLett.92.210403
The ease of manipulating photon polarizations makes it a [6] A. M. Iliyasu, P. Q. Le, F. Dong, and K. Hirota, ‘‘Watermarking
and authentication of quantum images based on restricted geometric
prime candidate for practical implementations of quantum transformations,’’ Inf. Sci., vol. 186, no. 1, pp. 126–149, Mar. 2012,
cryptographic protocols. Because everyone expects that a doi: 10.1016/j.ins.2011.09.028.
photon carries information encoded in its polarization state, [7] Y. Ji, Y. Chung, D. Sprinzak, M. Heiblum, D. Mahalu, and H. Shtrik-
man, ‘‘An electronic Mach–Zehnder interferometer,’’ Nature, vol. 422,
it also makes polarization as the ideal candidate for encod- pp. 415–418, Mar. 2003, doi: 10.1038/nature01503.
ing the public (non-secret) information in a steganographic [8] N. Jiang, N. Zhao, and L. Wang, ‘‘LSB based quantum image steganogra-
approach, thus deflecting attention from the more elusive phy algorithm,’’ Int. J. Theor. Phys., vol. 55, no. 1, pp. 107–123, Jan. 2016.
[9] J. Sang, S. Wang, and Q. Li, ‘‘Least significant qubit algorithm for quan-
hidden information encoded into the entanglement degree of tum images,’’ Quantum Inf. Process., vol. 15, no. 11, pp. 4441–4460,
freedom of the photon. The paper describes in detail how the Nov. 2016.
secret information can be retrieved using a Mach-Zehnder [10] R. A. Khan, ‘‘An improved flexible representation of quantum
images,’’ Quantum Inf. Process., vol. 18, no. 7, p. 201, Jul. 2019,
interferometer, while the cover data can be ‘‘read’’ easily doi: 10.1007/s11128-019-2306-6.
through a polarizer beam splitter. [11] P. Q. Le, F. Dong, and K. Hirota, ‘‘A flexible representation of quantum
The double-encoding idea supporting our approach to images for polynomial preparation, image compression, and processing
operations,’’ Quantum Inf. Process., vol. 10, no. 1, pp. 63–84, Feb. 2011,
steganography not only reduces the number of photons doi: 10.1007/s11128-010-0177-y.
required to implement the procedure, but because there are [12] H.-S. Li, Z. Qingxin, S. Lan, C.-Y. Shen, R. Zhou, and J. Mo, ‘‘Image
no additional photons used to embed the hidden data (the storage, retrieval, compression and segmentation in a quantum system,’’
Quantum Inf. Process., vol. 12, no. 6, pp. 2269–2290, Jun. 2013.
secret information is still encoded on the same photons that [13] H.-S. Li, Q. Zhu, R.-G. Zhou, L. Song, and X.-J. Yang, ‘‘Multi-dimensional
are used for the cover data), it makes the whole repre- color image storage and retrieval for a normal arbitrary quantum superposi-
sentation less suspicious to carry secret information. This tion state,’’ Quantum Inf. Process., vol. 13, no. 4, pp. 991–1011, Apr. 2014.
[14] X. Liu and R.-G. Zhou, ‘‘Color image storage and retrieval using quantum
is an important departure from all previous steganographic mechanics,’’ Quantum Inf. Process., vol. 18, no. 5, p. 132, May 2019,
attempts (whether classical or quantum), in which some of doi: 10.1007/s11128-019-2248-z.
the physical resources that are supposed to embody the public [15] K. Martin, ‘‘Steganographic communication with quantum information,’’
in Information Hiding (Lecture Notes in Computer Science), vol. 4567,
data are actually used to encode secret information, to the T. Furon, F. Cayre, G. Doërr, and P. Bas, Eds. Berlin, Germany: Springer,
detriment of the quality of the cover data representation. 2007, pp. 32–49.

213680 VOLUME 8, 2020


M. Nagy, N. Nagy: Quantum Steganography by Harnessing Entanglement as a Degree of Freedom

[16] T. Mihara, ‘‘Quantum steganography embedded any secret text without MARIUS NAGY received the B.Sc. degree in com-
changing the content of cover data,’’ J. Quantum Inf. Sci., vol. 2, no. 1, puter science from the Technical University of
pp. 10–14, 2012. Cluj-Napoca, Romania, in 1993, and the M.Sc. and
[17] T. Mihara, ‘‘Quantum steganography using prior entanglement,’’ Ph.D. degrees in computer science from Queen’s
Phys. Lett. A, vol. 379, nos. 12–13, pp. 952–955, Jun. 2015. University, Kingston, ON, in 2001 and 2007,
[Online]. Available: http://www.sciencedirect.com/science/article/pii/ respectively. His Ph.D. thesis focuses on novel
S0375960115000997 applications of quantum mechanics into informa-
[18] M. Nagy and N. Nagy, ‘‘Coding in the entanglement domain,’’ Quantum
tion processing and data security.
Inf. Process., vol. 19, no. 4, Apr. 2020, doi: 10.1007/s11128-020-02632-6.
He has worked as a Software Developer in
[19] M. Nagy and N. Nagy, ‘‘Image processing: Why quantum?’’ Quan-
tum Inf. Comput., vol. 20, nos. 7–8, pp. 616–626, 2020, doi: 10.26421/ Romania, until 1999, when he moved to Canada
QIC20.7-8. to pursue an academic career. He continued as a Postdoctoral Fellow
[20] J. W. Pan, Z. B. Chen, C. Y. Lu, H. Weinfurter, A. Zeilinger, and with the School of Computing, Queen’s University, until the end of 2008.
Z. M. Zfiukowski, ‘‘Multiphoton entanglement and interferometry,’’ In 2009, he took a position as a Sessional Instructor with the Department
Rev. Mod. Phys., vol. 84, pp. 777–838, May 2012. [Online]. Available: of Mathematics and Computer Science, Royal Military College of Canada.
https://link.aps.org/doi/10.1103/RevModPhys.84.777 In February 2010, he was appointed as an Assistant Professor with the
[21] Z. Qu, Z. Li, G. Xu, S. Wu, and X. Wang, ‘‘Quantum image steganography College of Computer Engineering and Science, Prince Mohammad Bin Fahd
protocol based on quantum image expansion and grover search algorithm,’’ University, Al Khobar, Saudi Arabia. His research interests include quan-
IEEE Access, vol. 7, pp. 50849–50857, 2019. tum information processing, particularly with applications to cryptography,
[22] Z.-G. Qu, X.-B. Chen, X.-J. Zhou, X.-X. Niu, and Y.-X. Yang, parallel, and unconventional models of computation and algorithms. His
‘‘Novel quantum steganography with large payload,’’ Opt. Commun., publication record includes several book chapters and more than 40 journal
vol. 283, no. 23, pp. 4782–4786, Dec. 2010. [Online]. Available: and conference papers.
http://www.sciencedirect.com/science/article/pii/ S0030401810006954 Dr. Nagy was awarded the Distinguished Thesis Award for the best
[23] B. A. Shaw and T. A. Brun, ‘‘Quantum steganography with noisy
M.Sc. thesis in the Department of Computing and Information Science,
quantum channels,’’ Phys. Rev. A, Gen. Phys., vol. 83, no. 2, Feb. 2011.
in 2001, while pursuing his graduate studies at Queen’s University. He
[Online]. Available: https://link.aps.org/doi/10.1103/PhysRevA.83.
022310 was also a recipient of the National Science and Engineering Research
[24] B. Sun, D. of Computational Intelligence, J. Systems ScienceTokyo Insti- Council (NSERC) Post Graduate Scholarship from September 2002 to
tute of TechnologyG3-494259 NagatsutaMidori-kuYokohama 226-8502, August 2004 and two Ontario Graduate Scholarships from Septem-
A. M. Iliyasu, F. Yan, F. Dong, and K. Hirota, ‘‘An RGB multi-channel ber 2004 to August 2006. He was the Queen’s University’s Nominee for
representation for images on quantum computers,’’ J. Adv. Comput. Intell. the 2008 NSERC Doctoral Prize in the engineering and computer sciences
Intell. Informat., vol. 17, no. 3, pp. 404–417, May 2013. category.
[25] S. E. Venegas-Andraca and S. Bose, ‘‘Storing, processing, and retrieving an
image using quantum mechanics,’’ in Quantum Information and Computa- NAYA NAGY received the Ph.D. degree in the
tion (International Society for Optics and Photonics), vol. 5105, E. Donkor, field of quantum cryptography from Queen’s
A. R. Pirich, and H. E. Brandt, Eds. Bellingham, WA, USA: SPIE, 2003,
University, Canada, in 2010. She is currently
pp. 137–147, doi: 10.1117/12.485960.
an Assistant Professor with Imam Abdulrahman
[26] S. Yuan, X. Mao, Y. Xue, L. Chen, Q. Xiong, and A. Compare, ‘‘SQR: A
simple quantum representation of infrared images,’’ Quantum Inf. Process., Bin Faisal University, Saudi Arabia. She has
vol. 13, no. 6, pp. 1353–1379, Jun. 2014. published more than 15 peer reviewed journal
[27] Y. Zhang, K. Lu, Y. Gao, and M. Wang, ‘‘NEQR: A novel enhanced articles. Her research interests include quantum
quantum representation of digital images,’’ Quantum Inf. Process., vol. 12, computation, cryptography, security, parallel and
no. 8, pp. 2833–2860, Aug. 2013. distributed algorithms, and recently bioinformat-
[28] Y. Zhang, K. Lu, Y. Gao, and K. Xu, ‘‘A novel quantum representation for ics. Her professional experience stems from ten
log-polar images,’’ Quantum Inf. Process., vol. 12, no. 9, pp. 3103–3126, years of teaching courses and supervising projects in computer science.
Sep. 2013, doi: 10.1007/s11128-013-0587-8.

VOLUME 8, 2020 213681

You might also like