Key Technology Breakthrough and Application Expansion of Image Encryption Authentication Based on SA-QE Collaboration

Authors

  • Qing Gan
  • Zihao Zhao
  • Yi Du
  • Mengyuan Sun
  • Haoran Zhang

DOI:

https://doi.org/10.54097/xhtpna28

Keywords:

Image authentication, sparse approximation, quantum encryption, digital watermarking, discrete wavelet transform, singular value decomposition

Abstract

With the rapid development of digital multimedia technology, images, as an important carrier of information dissemination, have been widely applied in fields such as healthcare, security, commerce, and social networking. However, images are highly susceptible to tampering, duplication, and illegal use during transmission and storage, posing severe challenges to their authenticity and integrity. Traditional image authentication techniques exhibit significant deficiencies in terms of security, robustness, and invisibility, making them difficult to meet the increasing security demands. This paper proposes a novel image authentication method that integrates Sparse Approximation (SA) and Quantum Encryption (QE), aiming to enhance the security and anti-attack capabilities of digital images. The method first performs subsampling and sparsification on the watermark image, extracts multi-scale features of the image using Discrete Wavelet Transform (DWT), and generates a highly random measurement matrix through quantum logic mapping to achieve encryption and exchange of sparse coefficients. Subsequently, Singular Value Decomposition (SVD) is employed to embed the encrypted watermark information into the low-frequency components of the host image, ensuring the invisibility and robustness of the watermark. Experimental results demonstrate that the proposed method exhibits excellent performance in resisting noise, geometric transformations, and enhancement attacks. When the correct key is used, the watermark can be accurately recovered, while the use of an incorrect key results in complete distortion of the watermark, effectively preventing illegal extraction. The research presented in this paper provides an efficient and secure technical path for digital image copyright protection and content authentication.

Downloads

Download data is not yet available.

References

[1] LvYanlin, Tao Yuting, Zhang Yan Analysis and Improvement of Image Encoding Algorithm Based on Sparse Approximation [J]. Journal of Jinling University of Science and Technology, 2020, 36 (04): 18-21.

[2] Shi Cuiping, Zhang Junping, Zhang Ye A new image sparse representation based on mixed transformation [J]. Journal of Harbin Institute of Technology, 2014, 46 (09): 36-42.

[3] Lu Aiping, Li Panchi Quantum Image Encryption Scheme Based on Chaotic Sequence [J]. Computer and Modernization, 2020, (03):86-92.

[4] Lu Aiping, Li Panchi Quantum encryption scheme for color images based on chaotic sequences [J]. Computer and Digital Engineering, 2021, 49 (04): 692-697+730.

[5] XieYuhui Research and Application of Chaos based Image Encryption Technology [D]. Lanzhou Jiaotong University, 2024.

[6] Chen Tong and Chen Xiuhong. Sparse low-rank approximation of matrix and local preservation for unsupervised image feature selection [J]. Applied Intelligence, 2023, 53(21): 25715-25730.

[7] Emerson Tegan H and Olson Colin and Doster Timothy. Path-Based Dictionary Augmentation: A Framework for Improving k-Sparse Image Processing. [J]. IEEE transactions on image processing: a publication of the IEEE Signal Processing Society, 2019, 29: 1259-1270.

[8] SaswatiTrivedy and Arup Kumar Pal. A Logistic Map-Based Fragile Watermarking Scheme of Digital Images with Tamper Detection [J]. Iranian Journal of Science and Technology, Transactions of Electrical Engineering, 2017, 41(2): 103-113.

[9] Gao Yuhui and Liu Jingyi and Chen Shiqiang. Image encryption algorithms based on two-dimensional discrete hyperchaotic systems and parallel compressive sensing [J]. Multimedia Tools and Applications, 2023, 83(19): 57139-57161.

[10] Xiuli Chai et al. Hiding cipher-images generated by 2-D compressive sensing with a multi-embedding strategy [J]. Signal Processing, 2020, 171: 107525-107525.

Downloads

Published

31-10-2025

Issue

Section

Articles