A New Quantum Watermarking Based on Quantum Wavelet Transforms

Size: px
Start display at page:

Download "A New Quantum Watermarking Based on Quantum Wavelet Transforms"

Transcription

1 Commun. Theor. Phys Vol. 67, No. 6, June, 207 A New Quantum Watermarking Based on Quantum Wavelet Transforms Shahrokh Heidari, Mosayeb Naseri, 2, Reza Gheibi, 3 Masoud Baghfalaki, 4 Mohammad Rasoul Pourarian, and Ahmed Farouk 5,6 Young Researchers and Elite Club, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran 2 Department of Physics, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran 3 Department of Computer, Technical and Engineering College, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran 4 Department of Mathematics, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran 5 Computer Science Department, Faculty of Computers and Information, Mansoura University, Mansoura, Egypt 6 University of Science and Technology at Zewail City, Giza 2588, Egypt Received October 28, 206; revised manuscript received December 29, 206 Abstract Quantum watermarking is a technique to embed specific information, usually the owner s identification, into quantum cover data such for copyright protection purposes. In this paper, a new scheme for quantum watermarking based on quantum wavelet transforms is proposed which includes scrambling, embedding and extracting procedures. The invisibility and robustness performances of the proposed watermarking method is confirmed by simulation technique. The invisibility of the scheme is examined by the peak-signal-to-noise ratio PSNR and the histogram calculation. Furthermore the robustness of the scheme is analyzed by the Bit Error Rate BER and the Correlation Two-Dimensional Corr 2-D calculation. The simulation results indicate that the proposed watermarking scheme indicate not only acceptable visual quality but also a good resistance against different types of attack. PACS numbers: Ff DOI: 0.088/ /67/6/732 Key words: quantum watermarking, quantum wavelet transforms, invisibility, robustness Introduction Since the introduction of the first quantum key distribution protocol, [] many researchers have contributed to treat the representation and processing of classical media quantum mechanically. [2 23] Quantum information hiding including digital watermarking and steganography are efficient tools in secure digital information transmission and processing. In 200, Qu et al. [24] proposed a quantum steganography protocol using the entanglement swapping of Bell states, in which the secret messages are transmitted in a hidden channel. Later, Shaw et al. proposed two types of quantum steganography protocols with noisy quantum channels. [25] In the first protocol the secure quantum information was locally stored in the codeword. In the later protocols the hidden information was embedded in the space of error syndromes. In 202, using entanglement swapping a secure quantum watermarking scheme was proposed by Fatahi, and Naseri. [26] Afterwards, a quantum method for images watermarking based on the flexible representation for quantum images FRQI was proposed in in 203. [27] Very recently we proposed a novel LSBbased quantum watermarking protocol, where the NEQR method of quantum images representation is employed to represent the quantum images. [28] In 203, using the flexible representation of quantum image, [29] a quantum watermarking scheme based on quantum wavelet transform QWT was proposed by Song et al., [30] where, to control the embedding strength a dynamic vector was used. In this scheme, the wavelet coefficients are extracted by executing QWT on quantum image. However, Yang et al. in 204 analyzed the protocol and showed that the protocol proposed by Song et al. is not as applicable as the authors claimed. [3] Then they presented a simple improvement on the original protocol of dynamic watermarking scheme based on quantum wavelet transform. Needles to say that there are two key properties that are required of a quantum data hiding scheme for an application, the invisibility and the robustness. However, to watermark, where the main purpose is copyright protection, the resistance against attacks, robustness is more important than the invisibility characteristics of the scheme. Unfortunately, in most of the proposed quantum watermarking schemes the authors only analyze the invisibility of their protocol. In this contribution, a new quantum wavelet transforms based watermarking is proposed. By simulation analysis not only the invisibility but also the robustness of the proposed scheme is confirmed. The paper is organized as follows: The next section presents a general preliminaries, Supported by Kermanshah Branch, Islamic Azad University, Kermanshah, Iran m.naseri@iauksh.ac.ir c 207 Chinese Physical Society and IOP Publishing Ltd

2 No. 6 Communications in Theoretical Physics 733 which are used in the scheme. The quantum wavelet transform watermarking protocol is presented in Sec. 3. The software simulation of the protocol and analysis are given in the fourth section. Finally, short conclusions are drawn in the last section. 2 Preliminaries 2. A Novel Enhanced Quantum Representation of Digital Images A novel enhanced quantum representation of digital images NEQR was introduced by Zhang et al. in 203. [32] Based on NEQR scheme, a 2 n 2 n size quantum image is given as follows: I = 2 n c i i, c i = c q i...c i c 0 i, c k i {0, }, k = q,...,, 0, i = 0,,..., 2 2n, where c i and i indicate the color and the corresponding positions, respectively. And, i includes two parts: the vertical and the horizontal part. i = y x = y n, y n 2...y 0 x n, x n 2...x 0, y j x j {0, }. 2 The first n-qubit y n, y n 2,..., y 0 are encoded along the vertical location and the second n-qubit x n, x n 2,..., x 0 are encoded along the horizontal axis. Therefore, the NEQR model needs q + 2n qubits to represent a 2 n 2 n size gray scale image with gray range 2 q. Figure illustrates a 2 2 image and its NEQR representation, where 8 qubits are employed to represent the color information of gray scale range of possible values from 0 to 255. I = [ ]. Fig. A simple image example and it s NEQR representation. 2.2 Quantum Plain Adder and Subtracter A quantum circuit for plain adding includes of quantum logic gates with time synchronized computational steps, [33] where the digital binaries are encoded in the quantum basis which are often called quantum registers. The addition of two quantum registers a and b is written as a, b a, a + b. The operation of the quantum plain adder is illustrated in Fig. 2. Fig. 2 Quantum plain adder and subtracter.

3 734 Vol. 67 By reversing the quantum plain adder circuit, the quantum circuit for subtracting is resulted. The output of quantum subtracter with the input a, b is a, a b when a > b. When a < b, the output is a, 2 n+ b a, where n + indicates the size of the second register. [33] 2.3 Quantum Xoring A circuit for quantum Xoring of two qubits is illustrated in Fig. 3, where, the symbols,, and, represent zero control, one control and NOT operations, respectively. Needles to say that a, b are the input qubit and c is the output of the corresponding state. The operation of this circuit is shown in Table. ja> jb> j0> jc> Fig. 3 Two qubit Xoring circuit, the symbols,, and, represent zero control, one control, and NOT operations, respectively. Table Procedure for the Xing. a b c Quantum Wavelet Transform Fourier transform is a useful and powerful tool in many area of science. However, there is another kind of unitary transforms, the wavelet transforms, which are as useful as the Fourier transform and can be used to expose the multi-scale structure of a signal and very useful for image processing and data compression. To analyze continuous waves, a mathematical representation is used. Therefore it is needed to transform continuous waves into a digital signal and analyze it. There are three kind of transformation, Fourier transform, short time Fourier transform, and wavelets transform. In definition, a wavelet is a small wave that start and stop. The energy of a wavelet which is concentrated in time is used to analyze transient, non-stationary, or timevarying phenomena. Two class of useful wavelets in signal processing are Haar and Daubechies wavelets. Quantum Haar and Daubechies wavelets circuits are proposed in Ref. [34], The whole quantum circuit of Daubechies fourth-order wavelet kernel is illustrated in Fig. 4, where a complete gate-level implementation of D 4 2n is presented.[35] Fig. 4 Quantum circuit of Daubechies fourth-order wavelet kernel. [35] 3 Quantum Wavelet Transform Watermarking In this section, our method for quantum watermarking based on QWT is presented, in which a 2 n 2 n sized binary image is embedded 2 n 2 n sized gray scale image. The proposed scheme includes three steps, scrambling, embedding, and extracting. 3. Quantum Scrambling The scrambling methods are considered as preprocessing tasks in most of the image processing algorithms, where an image is transformed into another disordered one. In the proposed watermarking scheme, to increase the security of the proposed methods, a simple scrambling method is employed. [28] Consider a binary 2 n 2 n sized watermark image. Using the NEQR representation, the watermark image is: W = 2 n w i i, w i 0,, i = 0,,..., 2 2n, i = y x = y n, y n 2,..., y 0 x n, x n 2,..., x 0, y j, x j 0,, 3 where, w i is color information in position i. For the aim of scrambling, two 2 n -bit keys M = M, M2,..., M2 n and N = N, N2,..., N2 n are generated randomly by the copyright owner. The scrambling task is accomplished as follows: If Mi Nj = then: The I operation is applied to the color value at position i, j of the watermark image. Otherwise, The X operation is applied to the color value at position i, j of watermark image, where, I = 0 0, X = To sum up, prior to embedding process watermark image W is scrambled to W. The quantum scrambling

4 No. 6 Communications in Theoretical Physics 735 circuit is shown in Fig. 5. jw i j > j0> j0> jn j > jm i > Fig. 5 Quantum circuit for scrambling. [28] 3.2 Embedding Procedure Consider a 2 n 2 n sized gray scale carrier image. Using NEQR model the carrier image is represented as: C = 2 n c i i, c i = c 7 i...c i c 0 i, c k i {0, }, k = 7,...,, 0, i = 0,,..., 2 2n. 5 For embedding purpose, the LSB XORing technique [36] and Quantum Wavelet Transform on carrier image are employed. The outline of the proposed embedding method is given in Fig. 6, where, the procedure can be done as follows: Step At first, an empty binary image T is defined. This image is used in the process of valuation of the QWT of carrier image. T = 2 n t i i, t i = 0, i = 0,,..., 2 2n. 6 Step 2 Using the quantum Xoring circuit in Fig. 3, the Xoring circuit is applied to the two LSBs qubits of carrier image c 0 i and c i, i.e., here, an XOR operation is applied on the first two LSBs and then, according to the result of XOR operation and the message bit to be embedded, the binary image T is modified or kept unchanged. The procedure is represented in Table 2. Table 2 Procedure for the LSB XORing technique. LSB Second LSB XOR If watermark bit is 0 If watermark bit is No Change t i is set 0 t i is set No Change 0 t i is set No Change 0 No Change t i is set Fig. 6 Outline of embedding procedure. As shown in Table 2, If c 0 i c i = 0 then If w i = 0, no change is needed. If w i =, t i is set to. If c 0 i c i = then If w i = 0, t i is set to. If w i =, no change is needed. When the value of t i t i = 0 has to be set to, the following unitary transformation is applied to the empty image T ; where Ω i = I Ω i i + I Ω = 0 0. j j, 7 It is worth pointing out that the above unitary transform is a CNOT gate and it is required to initialize the empty image T ;

5 736 Vol. 67 Ω i T = I Ω i i + I 2 2n j j 2 n t i i = 2 n I Ω i i + I + 2 n I Ω i i + I j j t j j = 2 n I Ω i i t i i + 2 n I j j t j j = 2 n Ω t i i + 2 n t j j = 2 n t i i + 2 n j j t i i t j j, 8 by considering on Table 2 one can find that: c 0 i c i = 0 and w i =, If or c 0 i c i = and w i = 0, then; t i =. Also when the value of t i t i = 0 is not to be changed, the following unitary transform is used: Ω j = I j j. 9 j=0 By applying the operation 2 2n Ω i to the image T, the scrambled watermark image w is copied to the initially empty image T. Step 3 Quantum Wavelet Transform on carrier image C is defined as follows; 2 2n WC = QWT C = QWT 2 n c i i = 2 n wc i i. 0 In this step, the embedder embeds the scrambled quantum watermark image W into the wavelet coefficient WC : For i = 0 to i = 2 2n ; if t i = then: the quantum wavelet transform for carrier image is modified as 2 2n w c i i = 2 2n wc i + φ i, End For where, 0 < φ < is determined by the embedder and it will be not changed during the process of embedding and extracting. A quantum circuit for embedding procedure is shown in Fig Extracting Procedure To extract the watermark image from embedded image, the original carrier image, its quantum wavelet transform, the proportion φ and the scrambling key sequences for In-scrambling procedure are needed. The procedure is as follows: Step In the first step, the scrambled watermark image is extracted from the embedded image. For the aim of extracting, a QWT is applied on both original carrier image C and watermarked image W out as below: 2 2n WC = QWT C = QWT 2 n c i i = 2 n wc i i, 2 2n WW = QWT W out = QWT 2 n w out i = 2 n ww i i. Assuming = ww i wc i, using two LSBs of original carrier image i.e. c 0 i, c i the watermark bits can be extracted as follows: If = 0, the watermark bit is c 0 i c i and else the watermark bit is c 0 i c i. Step 2 In this step, an empty binary image W ex is prepared, where; W ex = 2 n w exi i, w exi = 0, i = 0,,..., 2 2n. To extract watermark image, a unitary transformation χ i is defined as follows: χ i = I χ i i + I j j, 2 where χ = 0 0 Afterwards, by applying the unitary transform χ i to the empty binary image W ex, the extracted watermark bits are embedded on W ex. The procedure is as follows:.

6 No. 6 Communications in Theoretical Physics 737 Fig. 7 Quantum circuit of embedding procedure. χ i W ex = I χ i i + I 2 2n j j 2 n w exi i = 2 n I χ i i + I + 2 n I χ i i + I j j w exj j = 2 n I χ i i w ex i i + 2 n I = 2 n χ w ex i i + 2 n w exj j = 2 n w ex i i + 2 n j j w exj j w exi j, j j w exi i Considering on Table. 2, one can find that: c 0 i c i = 0 and = φ, If or c 0 i c i = and = 0, then w exi =. By applying the operation 2 2n χ i to the image W ex, the scrambled watermark image is extracted. Step 3 As soon as the first step is completed, the scrambled watermark image is extracted. Therefore, to obtain the original watermark image, an inverse scrambling Inscrambling procedure has to be applied to the extracted image. It is clear that using keys M and N introduced in Sec. 3, by applying the circuit illustrated in Fig. 5 in reverse order, the copyright owner can simply achieve his watermark copyright image. The details of the extracting procedure are shown in Table 3, and the outline of the extracting procedure is as shown in Fig. 8. Table 3 Procedure for extracting. LSB Second LSB XOR = 0 = φ watermark bit = 0 watermark bit = 0 watermark bit = watermark bit = 0 0 watermark bit = watermark bit = 0 0 watermark bit = 0 watermark bit =

7 738 Vol. 67 R205a environment, the proposed scheme is simulated. The carrier images and the watermark images employed in the simulations are given in Fig Invisibility Fig. 8 Outline of extracting procedure. 4 Simulation and Analysis There are two key properties to be analyzed here, invisibility and robustness. Since the present state-of-theart quantum hardware currently cannot go beyond proofofprinciple outcomes, to analyze these two properties, using a computer with IntelR CoreTM i7-4500u CPU 2.40 GHz, 8.00 GB Ram equipped with the MATLAB Fig. 9 Invisibility represents the similarity between the original covers and the watermarked image. To analyze the invisibility of the proposed scheme two analyze methods are: taken into account the peak-signal-to-noise ratio PSNR analysis and the histogram analysis. i The peak-signal-to-noise ratio PSNR To compare the fidelity of a watermarked image with its original version, the peak-signal-to-noise ratio PSNR is often used. The PSNR is defined as follows: MAX C PSNR = 20log0, 3 MSE where MAXC is the maximum pixel value of image C and MSE is the mean squared error. For two m n monochrome images it is defined as follows: m n ] [ Ci, j CWi, j 2, 4 MSE = mn j =0 where C represents the carrier image and CW indicates watermarked image. The carrier images a-f and the watermark images g-i used in the simulations.

8 Communications in Theoretical Physics No. 6 Table 4 The calculated PSNR for different images in our simulations. Carrier image Watermark image PSNR Lena Peppers Elaine AirplaneF Man Fishing boat Lena Peppers Elaine AirplaneF Man Fishing boat The results of the PSNR calculation in our simulation are given in Table 4. Based on Table 4, one can see that the proposed scheme indicates an acceptable PSNR. 739 The visual effects of the proposed watermarking procedure are illustrated in Fig. 0. ii Histogram The images histogram analysis is an important method to evaluate the fidelity of a watermarked image with the carrier image. The histogram graph, indicates the frequency of pixels intensity values, where, the x axis refers to the gray level intensities and the y axis refers to the frequency of these intensities. Using the histogram analyzing one can judge if the images are match or not. The histogram graphs of the three carrier images and the histogram graphs of their corresponded watermarked images where the watermark. is considered as a watermark image are given in Fig. 0. Based on Fig. the histogram graphs of the watermarked images and of the original images are in good agreement. Fig. 0 The original carrier images are given in the first row, and the watermarked images are presented in the second row. Watermark image in all of second image is the watermark. 4.2 Robustness Robustness refers to the ability of message to survive in attacks.[37] The Bit Error Rate BER and the Correlation Two-Dimensional Corr2 D are two most useful quantities used in robustness analysis. i The Bit Error Rate BER This Bit Error Rate BER is defined as the inverse of PSNR: BER =. 5 PSNR The BER determines the portion of the original image s bits, which are changed during the watermarking procedure. For example, if the PSNR is 50 db, the BER would be 0.02, i.e., %2 of bits have been changed during the watermarking. The result of the BER values calculated in our simulation are given in Table 5. ii Correlation Two-Dimensional Corr 2 D Table 5 All the images BER in our simulations. Carrier image Watermark image BER Lena Peppers Elaine AirplaneF Man Fishing boat Lena Peppers Elaine AirplaneF Man Fishing boat The Correlation Two-Dimensional, i.e., Corr 2 D, determines the correlation rate between two images, say A

9 740 Vol. 67 and B, which is calculated as follow: A A B B Corr 2D =, A A 2 B B 2 where A and B correspond to the average pixel values in A and B, respectively. The Corr 2 D is a real number in the range of [-, ]. The positive or negative sign means the two input images have positive or negative correlation respectively. Notice that the output Corr 2 D = means the two images are exactly the same. In our simulation, to analyze the algorithm s resistance against attacks, we consider 6 different types of attacks which are exerted on the watermarked image. The watermarked image, after attack, is extracted and corresponded Corr 2 D is calculated. i.e., the correlation between original and extracted watermark image is achieved. The results are given in Table 6 and Fig. 2. Fig. The histogram graphs of the tree original images and the histogram graphs of their corresponded watermarked images is watermarked Increase Brightness Decrease Brightness Increase Contrast Decrease Contrast Without Attack Salty & Pepper JPEG Compression Noise Correlation Fig. 2 The correlation rate of extracted watermarks after attacks.

10 No. 6 Communications in Theoretical Physics 74 Increase Brightness 5% Decrease Brightness 5% Increase Contrast 5% Decrease Contrast 5% JPEG Compression 2% Salty & Pepper Noise 2% Fig. 3 Visual display of extracted watermark after attacks. Considering the results, which are presented in Table 6 and Fig. 2, one can judge that the proposed watermarking scheme indicates good resistance against the considered attacks. Figure 3 shows the visual display of the extracted watermark after attacks. As seen, the watermark image is recognizable and the proposed algorithm shows good resist against the attacks. Table 6 The correlation rate of extracted watermarks after attacks. Attack Correlation Increase Brightness 5% Decrease Brightness 5% Increase Contrast 5% Decrease Contrast 5% JPEG Compression, Rate 2% Salty and Pepper Noise, Rate 2% Conclusion Any applicable protocol of watermarking has to satisfy two key properties, invisibility and robustness. Invisibility means that there is an acceptable similarity between the original covers image and the watermarked image. Robustness refers to the resistance of the scheme against attacks. Here we have introduced a novel robust quantum watermarking protocol exhibits acceptable invisibility performance. In the proposed scheme, employing quantum wavelet transformation, a binary 2 n 2 n sized image is embedded in the 2 n 2 n sized gray scale image. To obtain better security, prior to the embedding procedure the watermark image is scrambled. Then an LSB XORing technique and quantum wavelet transform on carrier image are employed to embed the watermark image in the carrier one. It has been shown that by reversing the embedding and the scrambling procedures, the copyright owner can simply extract the watermark image. To evaluate the performances of the proposed scheme, the scheme is simulated, where by calculating PSNR and analyzing histogram graphs the invisibility characteristics of the protocol is confirmed. Furthermore, by examining the Bit Error Rate BER quantity and the Correlation Two- Dimensional Corr 2 D, the robustness of the scheme is proved. To summarize, when compared with previous watermarking schemes, the advantages and effectiveness of the proposed scheme can be summarized into five points. First, by introducing a scrambling method, the watermark image is converted into a scrambled image, which guarantees that the original watermark image will not be recovered by any attacker, even when he extracts the scrambled binary image. Second, as compared with the previous protocols, our scheme satisfies not only the invisibility performance but also its good robustness. Acknowledgement It is our pleasure to thank Dr. Alimorad Ahmadi for the final edition of the paper. M. Naseri would like to thank Soheila Gholipour, Yasna Naseri and Viana Naseri for their interests in this work.

11 742 Vol. 67 References [] C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, IEEE, New York 984 p. 75. [2] S. E. Venegas Andraca and S. Bose, Storing, Processing and Retrieving an Image Using Quantum Mechanics, in AeroSense 2003, pp International Scociety for Optic and Photonics [3] S. E. Venegas Andraca and J. L. Ball, Quantum Inf. Process [4] P. Q. Le, A. M. Iliyasu, F. Dong, and K. Hirota, Int. J. Appl. Math [5] P. Q. Le, F. Doyng, and K. Hirota, Quantum Inf. Process [6] Y. Zhang, K. Lu, Y. H. Gao, and M. Wang, Quantum Inf. Process [7] X. H. Song, S. Wang, S. Liu, A. A. Abd El-Latif, and X. M. Niu, Quantum Inf. Process [8] S. Yuan, X. Mao, L. Chen, and Y. Xue, Optik [9] X. H. Song, S. Wang, S. Liu, A. A. Abd El-Latif, and X. M. Niu, Multimedia Systems [0] Y. Zhang, K. Lu, Y. H. Gao, and Q. Sobel, Science China Information Sciences [] X. B. Chen, G. Xu, Y. Su, and Y. X. Yang, Quantum Inf. Comput [2] X. B. Chen, Y. Su, X. X. Niu, and Y. X. Yang, Quantum Inf. Process [3] X. B. Chen, Z. Dou, G. Xu, C. Wang, and Y. X. Yang, Quantum Inf. Process [4] N. Jiang, L. Wang, and W. Y. Wu, Int. J. Theor. Phys [5] R. G. Zhou, Y. J. Sun, and P. Fan, Quantum Inf. Process [6] N. R. Zhou, T. X. Hua, L. H. Gong, D. J. Pei, and Q. H. Liao, Quantum Inf. Process [7] T. Hua, J. Chen, D. Pei, W. Zhang, and N. R. Zhou, Int. J. Theor. Phys [8] Y. Zhang, K. Lu, K. Xu, Y. Gao, and R. Wilson, Quantum Inf. Process [9] R. G. Zhou and Y. J. Sun, Quantum Inf. Process [20] M. Naseri, et al., International Journal for Light and Electron Optics 206. [2] Z. Xia, X. Wang, X. Sun, and Q. Wang, IEEE Transactions on Parallel and Distributed Systems [22] Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, IEEE Transactions on Parallel and Distributed Systems [23] Zh. J. Fu, et al., IEICE Transactions on Communications E98-B [24] Z. G. Qu, X. B. Chen, X. J. Zhou, X. X. Niu, and Y. X. Yang, Opt. Commun [25] B. A. Shaw and T. A. Brun, Phys. Rev. A [26] N. Fatahi and M. Naseri, Int. J. Theor. Phys [27] W. W. Zhang, F. Gao, B. Liu, H.Y Jia, Q.Y. Wen, and H. Chen, Int. J. Theor. Phys [28] S. Heidari and M. Naseri, Int. J. Theor. Phys [29] P. Q. Le, F. Y. Dong, and K. Hirota, Quantum Inf. Process [30] X. H. Song, S. Wang, S. Liu, A. A. Abd El-Latif, and X. M. Niu, Quantum Inf. Process [3] Y. G. Yang, et al., Quantum Inf. Process [32] Y. Zhang, K. Lu, Y. H. Gao, and M. Wang, Quantum Inf. Process [33] V. Vedral, A. Barenco, and A. Ekert, Phys. Rev. A [34] A. Fijany and C. P. Williams, Quantum Wavelet Transform: Fast Algorithm and Complete Circuit, Quantum Computing and Quantum Communications, Springer Berlin, Heidelberg 999 pp [35] Y. Zhang, K. Lu, Y. H. Gao, and M. Wang, Quantum Inf. Process [36] H. B. Kekre and A. A. Archana, Int. J. Cryp. Secu [37] N. Jiang, N. Zhao, and L. Wang, Int. J. Theor. Phys

QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant Qubit

QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant Qubit 06 International Conference on Mathematical, Computational and Statistical Sciences and Engineering (MCSSE 06) ISBN: 978--60595-396-0 QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant

More information

arxiv: v1 [quant-ph] 23 Jan 2019

arxiv: v1 [quant-ph] 23 Jan 2019 Noname manuscript No. (will be inserted by the editor) Adaptive Quantum Image Encryption Method Based on Wavelet Transform Jian Wang Ya-Cong Geng Ji-Qiang Liu Received: date / Accepted: date arxiv:9.776v

More information

A Spatial Domain Quantum Watermarking Scheme

A Spatial Domain Quantum Watermarking Scheme Commun. Theor. Phys. 66 (2016) 66 76 Vol. 66, No. 1, July 1, 2016 A Spatial Domain Quantum Watermarking Scheme Zhan-Hong Wei (ï ), 1,2, Xiu-Bo Chen (í ), 2,3 Shu-Jiang Xu (Å ), 4 Xin-Xin Niu (± ), 2,3

More information

Security of NEQR Quantum Image by Using Quantum Fourier Transform with Blind Trent

Security of NEQR Quantum Image by Using Quantum Fourier Transform with Blind Trent Security of NEQR Quantum Image by Using Quantum Fourier Transform with Blind Trent Engin ŞAHİN*, İhsan YILMAZ** arxiv:1801.10364v1 [quant-ph] 31 Jan 2018 * Department of Computer and Instructional Technologies

More information

An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States Commun. Theor. Phys. 65 (2016) 705 710 Vol. 65, No. 6, June 1, 2016 An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States Shu-Jiang Xu (Å ), 1, Xiu-Bo

More information

Probabilistic Teleportation of an Arbitrary Two-Qubit State via Positive Operator-Valued Measurement with Multi Parties

Probabilistic Teleportation of an Arbitrary Two-Qubit State via Positive Operator-Valued Measurement with Multi Parties Commun. Theor. Phys. 67 (2017) 377 382 Vol. 67, No. 4, April 1, 2017 Probabilistic Teleportation of an Arbitrary Two-Qubit State via Positive Operator-Valued Measurement with Multi Parties Lei Shi ( 石磊

More information

Scheme for Asymmetric and Deterministic Controlled Bidirectional Joint Remote State Preparation

Scheme for Asymmetric and Deterministic Controlled Bidirectional Joint Remote State Preparation Commun. Theor. Phys. 70 (208) 55 520 Vol. 70, No. 5, November, 208 Scheme for Asymmetric and Deterministic Controlled Bidirectional Joint Remote State Preparation Jin Shi ( 施锦 ) and You-Bang Zhan ( 詹佑邦

More information

Efficient controlled quantum secure direct communication based on GHZ-like states

Efficient controlled quantum secure direct communication based on GHZ-like states Efficient controlled quantum secure direct communication based on GHZ-like states Shima Hassanpour a, and Monireh Houshmand b a MS Student, Department of Electrical Engineering, Imam Reza International

More information

Quantum secret sharing based on quantum error-correcting codes

Quantum secret sharing based on quantum error-correcting codes Quantum secret sharing based on quantum error-correcting codes Zhang Zu-Rong( ), Liu Wei-Tao( ), and Li Cheng-Zu( ) Department of Physics, School of Science, National University of Defense Technology,

More information

Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State

Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State Commun. Theor. Phys. 55 (2011) 984 988 Vol. 55, No. 6, June 15, 2011 Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State YUAN Hao ( ), 1, ZHOU Jun ( ), 1,2 ZHANG Gang

More information

arxiv:quant-ph/ v2 2 Jan 2007

arxiv:quant-ph/ v2 2 Jan 2007 Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding arxiv:quant-ph/06106v Jan 007 Jun Liu 1, Yan Xia and Zhan-jun Zhang 1,, 1

More information

1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai.

1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai. Copyright Protection by Watermarking for Color Images against Rotation and Scaling Attacks Using Coding and Synchronization of Peak Locations in DFT Domain Yen-Chung Chiu Department of Computer and Information

More information

Research Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking

Research Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking Research Journal of Applied Sciences, Engineering and Technology 7(24): 5157-5162, 2014 DOI:10.19026/rjaset.7.912 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

Perfect quantum teleportation and dense coding protocols via the 2N-qubit W state

Perfect quantum teleportation and dense coding protocols via the 2N-qubit W state Perfect quantum teleportation and dense coding protocols via the -qubit W state Wang Mei-Yu( ) a)b) and Yan Feng-Li( ) a)b) a) College of Physics Science and Information Engineering, Hebei ormal University,

More information

NEQR: a novel enhanced quantum representation of digital images

NEQR: a novel enhanced quantum representation of digital images Quantum Inf Process (2013) 12:2833 2860 DOI 10.1007/s11128-013-0567-z NEQR: a novel enhanced quantum representation of digital images Yi Zhang Kai Lu Yinghui Gao Mo Wang Received: 3 August 2012 / Accepted:

More information

QUANTUM computation and quantum information, an

QUANTUM computation and quantum information, an 1 Flexible Representation and Manipulation of Audio Signals on Quantum Computers Fei Yan, Yiming Guo, Abdullah M. Iliyasu, and Huamin Yang arxiv:1701.0191v1 [quant-ph] 5 Jan 017 Abstract By analyzing the

More information

Bidirectional quantum teleportation and secure direct communication via entanglement swapping

Bidirectional quantum teleportation and secure direct communication via entanglement swapping Bidirectional quantum teleportation and secure direct communication via entanglement swapping Shima Hassanpour a, and Monireh Houshmand b a MS Student, Department of Electrical Engineering, Imam Reza International

More information

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack A Modified Moment-Based Watermarking Method Robust to Cropping Attack Tianrui Zong, Yong Xiang, and Suzan Elbadry School of Information Technology Deakin University, Burwood Campus Melbourne, Australia

More information

Hiding Data in a QImage File

Hiding Data in a QImage File Hiding Data in a QImage File Gabriela Mogos Abstract The idea of embedding some information within a digital media, in such a way that the inserted data are intrinsically part of the media itself, has

More information

Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States

Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States Commun. Theor. Phys. 63 (015) 431 438 Vol. 63, No. 4, April 1, 015 Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States YE Tian-Yu

More information

Quantum Secure Direct Communication with Authentication Expansion Using Single Photons

Quantum Secure Direct Communication with Authentication Expansion Using Single Photons Commun. Theor. Phys. (Beijing, China) 54 (2010) pp. 829 834 c Chinese Physical Society and IOP Publishing Ltd Vol. 54, No. 5, November 15, 2010 Quantum Secure Direct Communication with Authentication Expansion

More information

2. Definition & Classification

2. Definition & Classification Information Hiding Data Hiding K-H Jung Agenda 1. Data Hiding 2. Definition & Classification 3. Related Works 4. Considerations Definition of Data Hiding 3 Data Hiding, Information Hiding Concealing secret

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution

More information

Quantum image processing: A review of advances in its security technologies

Quantum image processing: A review of advances in its security technologies International Journal of Quantum Information Vol. 15, No. 3 (2017) 1730001 (18 pages) #.c The Author(s) DOI: 10.1142/S0219749917300017 Quantum image processing: A review of advances in its security technologies

More information

arxiv:quant-ph/ v1 6 Dec 2005

arxiv:quant-ph/ v1 6 Dec 2005 Quantum Direct Communication with Authentication Hwayean Lee 1,,4, Jongin Lim 1,, HyungJin Yang,3 arxiv:quant-ph/051051v1 6 Dec 005 Center for Information Security TechnologiesCIST) 1, Graduate School

More information

Wavelet Packet Based Digital Image Watermarking

Wavelet Packet Based Digital Image Watermarking Wavelet Packet Based Digital Image ing A.Adhipathi Reddy, B.N.Chatterji Department of Electronics and Electrical Communication Engg. Indian Institute of Technology, Kharagpur 72 32 {aar, bnc}@ece.iitkgp.ernet.in

More information

Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State

Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State Commun. Theor. Phys. (Beijing, China) 49 (2008) pp. 1468 1472 c Chinese Physical Society Vol. 49, No. 6, June 15, 2008 Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure

More information

Controlled Quantum Teleportation via Four Particle Asymmetric Entangled State *

Controlled Quantum Teleportation via Four Particle Asymmetric Entangled State * IOSR Journal of Applied Physics (IOSR-JAP) e-issn: 2278-4861.Volume 9, Issue 1 Ver. III (Jan. Feb. 2017), PP 32-37 www.iosrjournals.org Controlled Quantum Teleportation via Four Particle Asymmetric Entangled

More information

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Navdeep Goel 1,a, Gurwinder Singh 2,b 1ECE Section, Yadavindra College of Engineering, Talwandi Sabo 2Research Scholar,

More information

Quantum communication protocols based on entanglement swapping

Quantum communication protocols based on entanglement swapping Journal of Physics: Conference Series PAPER OPEN ACCESS Quantum communication protocols based on entanglement swapping To cite this article: Guillermo Morales-Luna 015 J. Phys.: Conf. Ser. 64 01003 View

More information

Using Entropy and 2-D Correlation Coefficient as Measuring Indices for Impulsive Noise Reduction Techniques

Using Entropy and 2-D Correlation Coefficient as Measuring Indices for Impulsive Noise Reduction Techniques Using Entropy and 2-D Correlation Coefficient as Measuring Indices for Impulsive Noise Reduction Techniques Zayed M. Ramadan Department of Electronics and Communications Engineering, Faculty of Engineering,

More information

Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm

Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm Lifang Yu, Yao Zhao 1, Rongrong Ni, Ting Li Institute of Information Science, Beijing Jiaotong University, BJ 100044, China Abstract

More information

arxiv: v2 [quant-ph] 1 Aug 2017

arxiv: v2 [quant-ph] 1 Aug 2017 A quantum algorithm for greatest common divisor problem arxiv:1707.06430v2 [quant-ph] 1 Aug 2017 Wen Wang, 1 Xu Jiang, 1 Liang-Zhu Mu, 1, 2, 3, 4, and Heng Fan 1 School of Physics, Peking University, Beijing

More information

A Hybrid Method with Lorenz attractor based Cryptography and LSB Steganography

A Hybrid Method with Lorenz attractor based Cryptography and LSB Steganography International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article A Hybrid

More information

Research Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number

Research Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number Applied Mathematics Volume 013, Article ID 189706, 8 pages http://dx.doi.org/10.1155/013/189706 Research Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number

More information

Anti-synchronization of a new hyperchaotic system via small-gain theorem

Anti-synchronization of a new hyperchaotic system via small-gain theorem Anti-synchronization of a new hyperchaotic system via small-gain theorem Xiao Jian( ) College of Mathematics and Statistics, Chongqing University, Chongqing 400044, China (Received 8 February 2010; revised

More information

Reversible Data-Hiding Systems with Modified Fluctuation Functions and Reed-Solomon Codes for Encrypted Image Recovery

Reversible Data-Hiding Systems with Modified Fluctuation Functions and Reed-Solomon Codes for Encrypted Image Recovery S S symmetry Article Reversible Data-Hiding Systems with Modified Fluctuation Functions and Reed-Solomon Codes for Encrypted Image Recovery Sunghwan Kim School of Electrical Engineering, University of

More information

Digital Image Watermarking Algorithm Based on Wavelet Packet

Digital Image Watermarking Algorithm Based on Wavelet Packet www.ijcsi.org 403 Digital Image ing Algorithm Based on Wavelet Packet 1 A.Geetha, 2 B.Vijayakumari, 3 C.Nagavani, 4 T.Pandiselvi 1 3 4 Faculty of Kamaraj College of Engineering and Technology Department

More information

Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels

Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels Anindya Sarkar and B. S. Manjunath Department of Electrical and Computer Engineering, University

More information

A Pseudo Quantum Watermarking Algorithm in M-band Wavelet Domain

A Pseudo Quantum Watermarking Algorithm in M-band Wavelet Domain INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND INFORMATICS Volume, A Pseudo Quantum Watermarking Algorithm in M-band Wavelet Domain Tong Liu Department of Mathematical Science Tsinghua University Beijing,

More information

arxiv: v1 [cs.cv] 28 Dec 2018

arxiv: v1 [cs.cv] 28 Dec 2018 Image Processing in Quantum Computers arxiv:1812.11042v1 [cs.cv] 28 Dec 2018 Aditya Dukuri and Khoa Luu Computer Vision and Image Understanding Lab Computer Science and Computer Engineering Department,

More information

A Quantum Multi-Proxy Blind Signature Scheme Based on Entangled Four-Qubit Cluster State

A Quantum Multi-Proxy Blind Signature Scheme Based on Entangled Four-Qubit Cluster State Commun. Theor. Phys. 70 (018) 43 48 Vol. 70, No. 1, July 1, 018 A Quantum Multi-Proxy Blind Signature Scheme Based on Entangled Four-Qubit Cluster State Xu-Feng Niu ( 牛旭峰 ), 1 Jian-Zhong Zhang ( 张建中 ),

More information

New Steganographic scheme based of Reed- Solomon codes

New Steganographic scheme based of Reed- Solomon codes New Steganographic scheme based of Reed- Solomon codes I. DIOP; S.M FARSSI ;O. KHOUMA ; H. B DIOUF ; K.TALL ; K.SYLLA Ecole Supérieure Polytechnique de l Université Dakar Sénégal Email: idydiop@yahoo.fr;

More information

arxiv: v2 [quant-ph] 9 Nov 2011

arxiv: v2 [quant-ph] 9 Nov 2011 Intercept-resend attacks on Semiquantum secret sharing and the Improvements arxiv:1106.4908v2 [quant-ph] 9 Nov 2011 Jason Lin, Chun-Wei Yang, Chia-Wei Tsai, and Tzonelih Hwang Abstract Recently, Li et

More information

A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System

A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System entropy Article A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System Hegui Zhu 1, *, Xiangde Zhang 1, Hai Yu 2, Cheng Zhao 3 and Zhiliang Zhu 2 1 College of Sciences, Northeastern

More information

5618 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 26, NO. 12, DECEMBER 2017

5618 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 26, NO. 12, DECEMBER 2017 5618 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 26, NO. 12, DECEMBER 2017 Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-secret Image Sharing Long Bao, Student Member, IEEE, Shuang

More information

Projective synchronization of a complex network with different fractional order chaos nodes

Projective synchronization of a complex network with different fractional order chaos nodes Projective synchronization of a complex network with different fractional order chaos nodes Wang Ming-Jun( ) a)b), Wang Xing-Yuan( ) a), and Niu Yu-Jun( ) a) a) School of Electronic and Information Engineering,

More information

Architecture of Multicast Network Based on Quantum Secret Sharing and Measurement

Architecture of Multicast Network Based on Quantum Secret Sharing and Measurement Architecture of Multicast Network Based on Quantum Secret Sharing and Measurement Ahmed F. Metwaly 1, M. Z. Rashad 2, Fatma A. Omara 3, Adel A. Megahed 4 1 Senior lecturer, Information Technology Department,

More information

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation

More information

arxiv:quant-ph/ v2 3 Oct 2000

arxiv:quant-ph/ v2 3 Oct 2000 Quantum key distribution without alternative measurements Adán Cabello Departamento de Física Aplicada, Universidad de Sevilla, 0 Sevilla, Spain January, 0 arxiv:quant-ph/990v Oct 000 Entanglement swapping

More information

Circular Semi-Quantum Secret Sharing Using Single Particles

Circular Semi-Quantum Secret Sharing Using Single Particles Commun. Theor. Phys. 70 (018) 661 671 Vol. 70 No. 6 December 1 018 Circular Semi-Quantum Secret Sharing Using Single Particles Chong-Qiang Ye ( 叶崇强 ) and Tian-Yu Ye ( 叶天语 ) College of Information & Electronic

More information

Knotted Pictures of Hadamard Gate and CNOT Gate

Knotted Pictures of Hadamard Gate and CNOT Gate Commun. Theor. Phys. (Beijing, China) 51 (009) pp. 967 97 c Chinese Physical Society and IOP Publishing Ltd Vol. 51, No. 6, June 15, 009 Knotted Pictures of Hadamard Gate and CNOT Gate GU Zhi-Yu 1 and

More information

Knotted pictures of the GHZ states on the surface of a trivial torus

Knotted pictures of the GHZ states on the surface of a trivial torus Chin. Phys. B Vol. 1, No. 7 (01) 07001 Knotted pictures of the GHZ states on the surface of a trivial torus Gu Zhi-Yu( 顾之雨 ) a) and Qian Shang-Wu( 钱尚武 ) b) a) Physics Department, Capital Normal University,

More information

Multiparty Quantum Remote Control

Multiparty Quantum Remote Control Multiparty Quantum Remote Control Yu-Ting Chen and Tzonelih Hwang Abstract This paper proposes a multiparty quantum remote control (MQRC) protocol, which allows several controllers to perform remote operations

More information

arxiv:quant-ph/ v1 13 Jan 2003

arxiv:quant-ph/ v1 13 Jan 2003 Deterministic Secure Direct Communication Using Ping-pong protocol without public channel Qing-yu Cai Laboratory of Magentic Resonance and Atom and Molecular Physics, Wuhan Institute of Mathematics, The

More information

Deterministic secure communications using two-mode squeezed states

Deterministic secure communications using two-mode squeezed states Deterministic secure communications using twomode squeezed states Alberto M. Marino* and C. R. Stroud, Jr. The Institute of Optics, University of Rochester, Rochester, New York 467, USA Received 5 May

More information

arxiv:quant-ph/ v1 10 Apr 2006

arxiv:quant-ph/ v1 10 Apr 2006 Fake-signal-and-cheating attack on quantum secret sharing Fu-Guo Deng, 1,,3 Xi-Han Li, 1, Pan Chen, 4 Chun-Yan Li, 1, and Hong-Yu Zhou 1,,3 1 The Key Laboratory of Beam Technology and Material Modification

More information

arxiv: v7 [quant-ph] 20 Mar 2017

arxiv: v7 [quant-ph] 20 Mar 2017 Quantum oblivious transfer and bit commitment protocols based on two non-orthogonal states coding arxiv:1306.5863v7 [quant-ph] 0 Mar 017 Li Yang State Key Laboratory of Information Security, Institute

More information

Grover Algorithm Applied to Four Qubits System

Grover Algorithm Applied to Four Qubits System www.ccsenet.org/cis Computer and Inormation Science Vol., No. ; May Grover Algorithm Applied to Four Qubits System Z. Sakhi (Corresponding author) Laboratory o Inormation Technology and Modelisation, and

More information

Quantum Secure Direct Communication Based on Dense Coding and Detecting Eavesdropping with Four-Particle Genuine Entangled State

Quantum Secure Direct Communication Based on Dense Coding and Detecting Eavesdropping with Four-Particle Genuine Entangled State Entropy 5, 7, 67-675; doi:.9/e767 rticle OPEN CCESS entropy ISSN 99- www.mdpi.com/journal/entropy Quantum Secure Direct Communication Based on Dense Coding and Detecting Eavesdropping with Four-Particle

More information

Generation and classification of robust remote symmetric Dicke states

Generation and classification of robust remote symmetric Dicke states Vol 17 No 10, October 2008 c 2008 Chin. Phys. Soc. 1674-1056/2008/17(10)/3739-05 Chinese Physics B and IOP Publishing Ltd Generation and classification of robust remote symmetric Dicke states Zhu Yan-Wu(

More information

Research, Development and Simulation of Quantum Cryptographic Protocols

Research, Development and Simulation of Quantum Cryptographic Protocols http://dx.doi.org/1.5755/j1.eee.19.4.17 Research, Development and Simulation of Quantum Cryptographic Protocols C. Anghel 1 1 University Dunărea de Jos Galati, 2 Științei, 8146 Galati, Romania, phone:

More information

ISeCure. Nowadays, copyright infringement, unauthorized. The ISC Int'l Journal of Information Security

ISeCure. Nowadays, copyright infringement, unauthorized. The ISC Int'l Journal of Information Security The ISC Int'l Journal of Information Security July 216, Volume 8, Number 2 (pp. 131 139) http://www.isecure-journal.org Optimum Decoder for Multiplicative Spread Spectrum Image Watermarking with Laplacian

More information

Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography

Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography Anindya Sarkar, Student Member, IEEE, Upamanyu Madhow, Fellow, IEEE, and B. S. Manjunath,

More information

A new pseudorandom number generator based on complex number chaotic equation

A new pseudorandom number generator based on complex number chaotic equation A new pseudorandom number generator based on complex number chaotic equation Liu Yang( 刘杨 ) and Tong Xiao-Jun( 佟晓筠 ) School of Computer Science and Technology, Harbin Institute of Technology, Weihai 264209,

More information

A robust and efficient scheme for image encryption-decryption

A robust and efficient scheme for image encryption-decryption A robust and efficient scheme for image encryption-decryption Prerana Sharma 1, Dr. Shiv Kumar 1 M.Tech. Scholar, ACEIT, Kukas, Jaipur (Raj.), India Professor, ACEIT, Kukas, Jaipur (Raj.), India ABSTRACT

More information

Example: sending one bit of information across noisy channel. Effects of the noise: flip the bit with probability p.

Example: sending one bit of information across noisy channel. Effects of the noise: flip the bit with probability p. Lecture 20 Page 1 Lecture 20 Quantum error correction Classical error correction Modern computers: failure rate is below one error in 10 17 operations Data transmission and storage (file transfers, cell

More information

arxiv:quant-ph/ v1 27 Dec 2004

arxiv:quant-ph/ v1 27 Dec 2004 Multiparty Quantum Secret Sharing Zhan-jun Zhang 1,2, Yong Li 3 and Zhong-xiao Man 2 1 School of Physics & Material Science, Anhui University, Hefei 230039, China 2 Wuhan Institute of Physics and Mathematics,

More information

Expand the Quantum Cipher-text Space by Using a Superposition Key

Expand the Quantum Cipher-text Space by Using a Superposition Key International Journal of Computer Networks and Communications Security VOL. 3, NO. 7, JULY 2015, 283 290 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Expand the

More information

A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System

A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System Commun. Theor. Phys. (Beijing China) 44 (2005) pp. 1115 1124 c International Academic Publishers Vol. 44 No. 6 December 15 2005 A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized

More information

A Superluminal communication solution based on Four-photon entanglement

A Superluminal communication solution based on Four-photon entanglement A Superluminal communication solution based on Four-photon entanglement Jia-Run Deng cmos001@163.com Abstract : Based on the improved design of Four-photon entanglement device and the definition of Encoding

More information

Single-Qubit Operation Sharing with Bell and W Product States

Single-Qubit Operation Sharing with Bell and W Product States Commun. Theor. Phys. 60 (013) 165 170 Vol. 60, No., August 15, 013 Single-Qubit Operation Sharing with Bell and W Product States JI Qi-Bin ( É), 1 LIU Yi-Min ( ), LIU Xian-Song ( Ø), 1 YIN Xiao-Feng (

More information

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C Security of Quantum Cryptography using Photons for Quantum Key Distribution Karisa Daniels & Chris Marcellino Physics C191C Quantum Key Distribution QKD allows secure key distribution Keys are then used

More information

Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications

Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications Zhengjun Cao Abstract What is the behavior of an adversary to launch attacks against a communication? The good choice

More information

arxiv:quant-ph/ v2 23 Aug 2003

arxiv:quant-ph/ v2 23 Aug 2003 An Architecture of Deterministic Quantum Central Processing Unit arxiv:quant-ph/0207032v2 23 Aug 2003 Fei Xue a, Zeng-Bing Chen a Mingjun Shi a Xianyi Zhou a Jiangfeng Du a Rongdian Han a a Department

More information

Rotation, scale and translation invariant digital image watermarking. O'RUANAIDH, Joséph John, PUN, Thierry. Abstract

Rotation, scale and translation invariant digital image watermarking. O'RUANAIDH, Joséph John, PUN, Thierry. Abstract Proceedings Chapter Rotation, scale and translation invariant digital image watermarking O'RUANAIDH, Joséph John, PUN, Thierry Abstract A digital watermark is an invisible mark embedded in a digital image

More information

NOISE can sometimes improve nonlinear signal processing

NOISE can sometimes improve nonlinear signal processing 488 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 2, FEBRUARY 2011 Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding Ashok Patel, Member, IEEE, and Bart Kosko, Fellow,

More information

Quantum key distribution for the lazy and careless

Quantum key distribution for the lazy and careless Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center

More information

Research Article Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm

Research Article Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2010, Article ID 876946, 6 pages doi:10.1155/2010/876946 Research Article Improved Adaptive LSB Steganography Based

More information

Quantum Information Transfer and Processing Miloslav Dušek

Quantum Information Transfer and Processing Miloslav Dušek Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the

More information

Perfectly secure cipher system.

Perfectly secure cipher system. Perfectly secure cipher system Arindam Mitra Lakurdhi, Tikarhat Road, Burdwan 713102 India Abstract We present a perfectly secure cipher system based on the concept of fake bits which has never been used

More information

Multiparty Quantum Secret Sharing Using Quantum Fourier Transform

Multiparty Quantum Secret Sharing Using Quantum Fourier Transform Commun. Theor. Phys. (Beijing, China) 51 (2009) pp. 221 226 c Chinese Physical Society and IOP Publishing Ltd Vol. 51, No. 2, February 15, 2009 Multiparty Quantum Secret Sharing Using Quantum Fourier Transform

More information

Research Article Design of PDC Controllers by Matrix Reversibility for Synchronization of Yin and Yang Chaotic Takagi-Sugeno Fuzzy Henon Maps

Research Article Design of PDC Controllers by Matrix Reversibility for Synchronization of Yin and Yang Chaotic Takagi-Sugeno Fuzzy Henon Maps Abstract and Applied Analysis Volume 212, Article ID 35821, 11 pages doi:1.1155/212/35821 Research Article Design of PDC Controllers by Matrix Reversibility for Synchronization of Yin and Yang Chaotic

More information

Research Article Novel Quantum Encryption Algorithm Based on Multiqubit Quantum Shift Register and Hill Cipher

Research Article Novel Quantum Encryption Algorithm Based on Multiqubit Quantum Shift Register and Hill Cipher Advances in High Energy Physics, Article ID 104325, 5 pages http://dx.doi.org/10.1155/2014/104325 Research Article Novel Quantum Encryption Algorithm Based on Multiqubit Quantum Shift Register and Hill

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

Technical Report Communicating Secret Information Without Secret Messages

Technical Report Communicating Secret Information Without Secret Messages Technical Report 013-605 Communicating Secret Information Without Secret Messages Naya Nagy 1, Marius Nagy 1, and Selim G. Akl 1 College of Computer Engineering and Science Prince Mohammad Bin Fahd University,

More information

Quantum Information Processing and Diagrams of States

Quantum Information Processing and Diagrams of States Quantum Information and Diagrams of States September 17th 2009, AFSecurity Sara Felloni sara@unik.no / sara.felloni@iet.ntnu.no Quantum Hacking Group: http://www.iet.ntnu.no/groups/optics/qcr/ UNIK University

More information

Quantum Wireless Sensor Networks

Quantum Wireless Sensor Networks Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.

More information

arxiv: v3 [quant-ph] 6 Sep 2009

arxiv: v3 [quant-ph] 6 Sep 2009 Semi-quantum secret sharing using entangled states Qin Li, 1 W. H. Chan, and Dong-Yang Long 1 1 Department of Computer Science, Sun Yat-sen University, Guangzhou 51075, China Department of Mathematics,

More information

Graphical Method of Reversible Circuits Synthesis

Graphical Method of Reversible Circuits Synthesis INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2017, VOL. 63, NO. 3, PP. 235-240 Manuscript received January 18, 2017; revised June, 2017. DOI: 10.1515/eletel-2017-0031 Graphical Method of Reversible

More information

Quantum gate. Contents. Commonly used gates

Quantum gate. Contents. Commonly used gates Quantum gate From Wikipedia, the free encyclopedia In quantum computing and specifically the quantum circuit model of computation, a quantum gate (or quantum logic gate) is a basic quantum circuit operating

More information

arxiv:quant-ph/ v3 11 Mar 2004

arxiv:quant-ph/ v3 11 Mar 2004 ariv:quant-ph/040148v3 11 ar 004 Generalized G States and Distributed Quantum Computing Anocha Yimsiriwattana and Samuel J. Lomonaco Jr. Abstract. A key problem in quantum computing is finding a viable

More information

Selection of unitary operations in quantum secret sharing without entanglement

Selection of unitary operations in quantum secret sharing without entanglement . RESEARCH PAPERS. SCIENCE CHINA Information Sciences September 2011 Vol. 54 No. 9: 1837 1842 doi: 10.1007/s11432-011-4240-9 Selection of unitary operations in quantum secret sharing without entanglement

More information

92 CHAPTER III. QUANTUM COMPUTATION. Figure III.11: Diagram for swap (from NC).

92 CHAPTER III. QUANTUM COMPUTATION. Figure III.11: Diagram for swap (from NC). 92 CHAPTER III. QUANTUM COMPUTATION Figure III.11: Diagram for swap (from NC). C.3 Quantum circuits 1. Quantum circuit: A quantum circuit isa sequential seriesofquantum transformations on a quantum register.

More information

LECTURE NOTES ON Quantum Cryptography

LECTURE NOTES ON Quantum Cryptography Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

Time-delay feedback control in a delayed dynamical chaos system and its applications

Time-delay feedback control in a delayed dynamical chaos system and its applications Time-delay feedback control in a delayed dynamical chaos system and its applications Ye Zhi-Yong( ), Yang Guang( ), and Deng Cun-Bing( ) School of Mathematics and Physics, Chongqing University of Technology,

More information

Sparse Solutions of Linear Systems of Equations and Sparse Modeling of Signals and Images: Final Presentation

Sparse Solutions of Linear Systems of Equations and Sparse Modeling of Signals and Images: Final Presentation Sparse Solutions of Linear Systems of Equations and Sparse Modeling of Signals and Images: Final Presentation Alfredo Nava-Tudela John J. Benedetto, advisor 5/10/11 AMSC 663/664 1 Problem Let A be an n

More information

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Rahul Jain U. Waterloo and Institute for Quantum Computing, rjain@cs.uwaterloo.ca entry editor: Andris Ambainis

More information

Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG

Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG Fault Tolerance Technique in Huffman Coding applies to Baseline JPEG Cung Nguyen and Robert G. Redinbo Department of Electrical and Computer Engineering University of California, Davis, CA email: cunguyen,

More information

o. 5 Proposal of many-party controlled teleportation for by (C 1 ;C ; ;C ) can be expressed as [16] j' w i (c 0 j000 :::0i + c 1 j100 :::0i + c

o. 5 Proposal of many-party controlled teleportation for by (C 1 ;C ; ;C ) can be expressed as [16] j' w i (c 0 j000 :::0i + c 1 j100 :::0i + c Vol 14 o 5, May 005 cfl 005 Chin. Phys. Soc. 1009-1963/005/14(05)/0974-06 Chinese Physics and IOP Publishing Ltd Proposal of many-party controlled teleportation for multi-qubit entangled W state * Huang

More information