QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant Qubit
|
|
- Posy Houston
- 5 years ago
- Views:
Transcription
1 06 International Conference on Mathematical, Computational and Statistical Sciences and Engineering (MCSSE 06) ISBN: QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant Qubit Tie-un ZHANG, Bassem Abd-El-Atty, Mohamed Amin and Ahmed A. Abd El-Latif,* School of software, Harbin niversity of Science and Technology, Harbin, China Department of Mathematics, Faculty of Science Menoufia niversity Shebin El-Koom 35, Egypt *Corresponding author Keywords: Quantum steganography, Quantum image processing, LSQb, Image scrambling. Abstract. In this paper, a new quantum image steganography scheme to embed quantum secrete gray image into quantum cover image is proposed. In the proposed scheme, the quantum secret image scrambled utilizing Arnold cat map and embedding the result into quantum cover image using two least significant qubit (LSQb).The extracting process need only stego image to extract the embedded secret image. The simulation results demonstrate that the proposed scheme has good invisibility and high capacity. Introduction Quantum steganography utilizes the effects of quantum mechanics such as quantum computation and quantum communication to achieve tasks of information hiding. Quantum steganography, can be defined as the classical steganography in the viewpoint of quantum mechanics, has become important researching area of quantum cryptography. Quantum image steganography based on quantum image processing techniques to improve many tasks in classical image steganography. The first step is to represent and store the classical images on quantum computers. There are many representations for classical images on quantum computers, such as flexible representation of quantum images (FRQI) [], which uses X + number of qubits to represent a gray image with size x x and the NEQR model for represent quantum images []. In spite of the used qubits of NEQR increases from x + qubits used in FRQI to X + q qubits, it is excellent for processing quantum image because the quantum representation is very similar to the representation of a classical image. In the earlier works, there is no quantum image steganography scheme to embed quantum gray image into quantum image. The quantum image steganography algorithms [3, 4] embed binary image or message as binary image with maximum capacity one bit per pixel. However, quantum image steganography algorithms [3, 4] broken to embed quantum gray image into quantum image. In [5], Wang et al. proposed an LSQb information hiding algorithm for quantum image, which embeds the secret information without scrambling into the first qubit of the cover image. Sang et al. In [6] proposed LSQb information hiding algorithm to embed quantum information into quantum color image. In [7], AL-Salhi et al. Presented a quantum image steganography algorithm based on the least significant Qu-block (LSQB). Heidari et al. In [8] proposed a Quantum watermarking technique based on least significant bit (LSB) to embed quantum binary image into cover image. In this paper, we propose a quantum image steganography scheme to embed quantum gray image instead of binary image into the quantum cover image. It utilizes NEQR for quantum representation, two LSQb and quantum image scrambling to increase the capacity and security of the proposed scheme. Experimental results demonstrate that, the maximum capacity increases from -bit per pixel in [3, 4, 5, 6, 8] to -bit per pixel in the proposed scheme and the invisibility is good. The rest of this paper is as follows. In section, we give a brief background on the NEQR representation, Arnold image scrambling and LSQb. Section 3 gives the proposed quantum 40
2 steganography approach. Section 4 is devoted to analysis and results in terms of visual quality and payload capacity. In section 5, we present a comparison with related algorithms. Finally, conclusions drown in section 6. Preliminaries NEQR for Quantum Images. The NEQR model has information about the pixels color and its related position of each pixel in the image. The mathematical representation of a quantum image for n n an image can be expressed as follows. where the binary sequence I ci i n () i0 q 0 k ci ci... ci ci, ci { 0,}, k q,...,,0, i 0,,..., q 0 ci... cici 0,,, encodes the color value, and the color range is q, i for i, are n dimension computational basis quantum states. Arnold Image Scrambling. The basic idea of image scrambling is to transform a meaningful image into a meaningless image by permutation the positions of pixels into new positions. Arnold image scrambling matrix is defined as x x modn y y () where N is the size of image. The input is the position information x and y of original image, and the output is the position information x and y of Arnold scrambled image. The inverse of Arnold image scrambling is defined as follows x x modn y y (3) Zhou et al. [9] gives a quantum Arnold image scrambling that can be defined as I S S ( I ci S ( i ) n i 0 S( i) can be defined according to Eq. as (4) S( i) S( y x) S( y) S( x) where S( x) = x + ymod N S( y) = x + ymod N (5) Least Significant Quantum Bit. In this way LSQb information hiding can be described by substituting the last qubit of cover image with the secret information. In [5], Wang et al. proposed least significant qubit information hiding algorithm for quantum image. In [5], the qubit of secret information c M 0 is compared with the last qubit color of cover image c0 in Eq.. If the output of comparison is the same apply to I otherwise apply i toi. 4
3 (6) q q i I X i i I 0, i (7) q I 0, i Where X 0 0 and 0 I 0 Proposed Quantum Image Steganography Scheme Here, we propose a quantum image steganography scheme based on NEQR for quantum images by utilizing quantum Arnold image and two least significant qubits. We assume that the cover image n n with size n n and secret image with size. The embedding procedures of the proposed quantum image steganography consist of three phases, which are given by the following steps. Phase : Preprocessing Images. Preprocessing images is given by the following steps. n n Step : The secret image with size and 8-bit is expanded to image with size n n and -bit. Step : The NEQR representations of the cover image and the secret image after expanding is I and J, respectively are shown as follows: I n q 0 k ci i, ci ci... cici, ci i 0, {0 } (8) 0 k J c, c c c, c { 0,} n 0 (9) Phase : Scrambling for Quantum Secret Image J. The quantum secrete image J scrambled using Arnold transformation as follows JS S ( J c S ( ) n (0) 0 Phase 3: Embedding Scrambled Image JS into Cover Image I. The quantum scrambled image JS embedded into quantum cover image I utilizing two least significant qubits. The two qubits of scrambled secret image JS color encoding information c and c0 in Eq. 0 compared with the two last qubits of cover image I color encoding information c and c0 in Eq. 8. If the output of comparison for c is the same apply to I otherwise apply i toi and if the output of comparison for c0 is the same apply to I otherwise apply 0 i toi. () q q i I X I i i I 0, i () q q 0i I X i i I 0, i 4
4 (3) q I 0, i Analysis and Results on Classical Computer Visual Quality. Visual quality is the amount of difference between the stego image and the original cover image in pixels values. There are many quantities to measure the difference of pixels between the stego image and the original cover image; one of the most used quantities is PSNR (peak signal to noise ratio). It is defined as the MSE (mean squared error) for two images X and Y with size i. MSE [ (, ) (, )] i i X x y Y x y (4) x0 y0 PSNR is defined as follows. MAX X PSNR 0 log 0( ) MSE Where, MAX X is the maximum value of pixels in the cover image X. In this scheme, Y related to the stego image and X related to the original cover image. In our experiments, we use images of size 8 8 as cover image and as secret image to simulate the proposed scheme. The following Figure describes experimental results of our scheme and Table gives the PSNR value between the original image and the stego image for different images. Table. PSNR (in db) values for different text messages. Cover image Secret image Lena Baboon Barbara Lena Baboon Barbara (5) Obviously, from Figure, human eyes cannot detect the difference between stego image and original image. From Table, we can see that the PSNR values are high enough. So we can conclude that our scheme has a good visual effect. Payload Capacity. The steganography capacity can be stated as the ratio between the number of embedded bits of the text message and the number of pixels for cover image. The proposed schemes capacity is given as follows: numberof embedded image pixels 0.5n 0.5n pixel C pixel / pixel number of cover image pixels n n pixel 4 The capacity of the proposed scheme is -bit per pixel, which is higher than of most of quantum image steganography algorithms. So we can conclude that our scheme has high capacity. Original cover image Stego image Secret image Extracted image (6) Figure. The visual effects of proposed scheme. 43
5 Comparison with Related Algorithms From the above section, the simulation results demonstrate that the proposed scheme has high capacity compared to the algorithms of [3-5]. The capacity of the proposed algorithm is -bit per pixel, while the capacity of algorithms in [3-5] is -bit per pixel. From Table, we can conclude that the proposed algorithm has high capacity, good visual effect and embedding quantum gray image instead of binary image. Table. Comparison with related algorithms. Items Proposed scheme Algorithm in [3] Algorithm in [4] Algorithm in [5] Maximum Capacity bit/pixel bit/pixel bit/pixel bit/pixel Embedding data Gray-scale image Binary image Message as binary image Any information Scrambling Quantum Arnold Quantum Hilbert - Image scrambling Image scrambling - Visual quality (PSNR) using Lena as cover image Conclusion In this paper, a quantum image steganography scheme based on the novel enhanced quantum representation (NEQR) for quantum images, quantum Arnold image scrambling and two least significant qubits have been proposed. The advantages of the proposed scheme are the extracting operation does not need the original cover image or the original secret image, good visibility and high capacity. Simulation results show the efficiency of the proposed quantum image steganography scheme. Acknowledgement This work is supported by Menoufia niversity under the proect number: A-WSN06, Guangdong Natural Science Foundation: 05A and Natural Science Foundation of Heilongiang Province, China: QC04C076, JJ06ZR068. References [] P.Q. Le, F. Dong, K. Hirota, A flexible representation of quantum images for polynomial preparation, image compression and processing operations, Quantum Inf Process, 0 (0) [] Y. Zhang, K. Lu,Y.H. Gao, M. Wang, NEQR: a novel enhanced quantum representation of digital images, Quantum Inf Process, (03) [3] Nan Jiang, LuoWang, A Novel Strategy for Quantum Image Steganography Based on Moir epattern, Int J TheorPhys, 54 (05) [4] Nan Jiang, Na Zhao, LuoWang, LSB Based Quantum Image Steganography Algorithm, Int J TheorPhys. 55 (06)07-3. [5] S. Wang, J. Sang, X. song, X. Niu, Least Significant Qubit (LSQb) Information Hiding Algorithm for Quantum Image, Measurement, 73 (05) [6] J. Sang, S. Wang, Q. Li, Least significant qubit algorithm for quantum images, Quantum Inf. -0 (06) 5 Process. [7] Y.E. AL-Salhi, S. Lu, Quantum Image Steganography and Steganalysis Based On LSQu-Blocks (06) 55 TheorPhys. Image Information Concealing Algorithm, Int J 44
6 [8] S. Heidari, M. Naseri, A Novel LSB Based Quantum Watermarking, Int J TheorPhys. 55 (06) [9] Nan Run Zhou, Tian Xiang Hua, Li Hua Gong, Dong Ju Pei, Qing Hong Liao, Quantum image encryption based on generalized Arnold transform and double random-phase encoding. Quantum Inf Process. 4 (05)
A New Quantum Watermarking Based on Quantum Wavelet Transforms
Commun. Theor. Phys. 67 207 732 742 Vol. 67, No. 6, June, 207 A New Quantum Watermarking Based on Quantum Wavelet Transforms Shahrokh Heidari, Mosayeb Naseri, 2, Reza Gheibi, 3 Masoud Baghfalaki, 4 Mohammad
More information2. Definition & Classification
Information Hiding Data Hiding K-H Jung Agenda 1. Data Hiding 2. Definition & Classification 3. Related Works 4. Considerations Definition of Data Hiding 3 Data Hiding, Information Hiding Concealing secret
More informationA Spatial Domain Quantum Watermarking Scheme
Commun. Theor. Phys. 66 (2016) 66 76 Vol. 66, No. 1, July 1, 2016 A Spatial Domain Quantum Watermarking Scheme Zhan-Hong Wei (ï ), 1,2, Xiu-Bo Chen (í ), 2,3 Shu-Jiang Xu (Å ), 4 Xin-Xin Niu (± ), 2,3
More informationarxiv: v1 [quant-ph] 23 Jan 2019
Noname manuscript No. (will be inserted by the editor) Adaptive Quantum Image Encryption Method Based on Wavelet Transform Jian Wang Ya-Cong Geng Ji-Qiang Liu Received: date / Accepted: date arxiv:9.776v
More informationSecurity of NEQR Quantum Image by Using Quantum Fourier Transform with Blind Trent
Security of NEQR Quantum Image by Using Quantum Fourier Transform with Blind Trent Engin ŞAHİN*, İhsan YILMAZ** arxiv:1801.10364v1 [quant-ph] 31 Jan 2018 * Department of Computer and Instructional Technologies
More informationImproved Adaptive LSB Steganography based on Chaos and Genetic Algorithm
Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm Lifang Yu, Yao Zhao 1, Rongrong Ni, Ting Li Institute of Information Science, Beijing Jiaotong University, BJ 100044, China Abstract
More informationA Hybrid Method with Lorenz attractor based Cryptography and LSB Steganography
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article A Hybrid
More informationResearch Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number
Applied Mathematics Volume 013, Article ID 189706, 8 pages http://dx.doi.org/10.1155/013/189706 Research Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number
More informationStego key searching for LSB steganography on JPEG decompressed image
. RESEARCH PAPER. SCIENCE CHINA Information Sciences March 2016, Vol. 59 032105:1 032105:15 doi: 10.1007/s11432-015-5367-x Stego key searching for LSB steganography on JPEG decompressed image Jiufen LIU
More informationResearch Article Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm
Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2010, Article ID 876946, 6 pages doi:10.1155/2010/876946 Research Article Improved Adaptive LSB Steganography Based
More informationNEQR: a novel enhanced quantum representation of digital images
Quantum Inf Process (2013) 12:2833 2860 DOI 10.1007/s11128-013-0567-z NEQR: a novel enhanced quantum representation of digital images Yi Zhang Kai Lu Yinghui Gao Mo Wang Received: 3 August 2012 / Accepted:
More informationHalftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion
1 Halftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion Yuanfang Guo, Member, IEEE, Oscar C. Au, Fellow, IEEE, Rui Wang, Member, IEEE, Lu Fang, Member, IEEE, Xiaochun Cao,
More informationQuantum image processing: A review of advances in its security technologies
International Journal of Quantum Information Vol. 15, No. 3 (2017) 1730001 (18 pages) #.c The Author(s) DOI: 10.1142/S0219749917300017 Quantum image processing: A review of advances in its security technologies
More informationNEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION
NEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION Sos S. Agaian 1 and Juan P. Perez 2 1NSP Lab, The University of Texas at San Antonio, Electrical Engineering Department,
More informationLearning outcomes. Palettes and GIF. The colour palette. Using the colour palette The GIF file. CSM25 Secure Information Hiding
Learning outcomes Palettes and GIF CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Learn how images are represented using a palette Get an overview of hiding techniques in
More informationReversible Data-Hiding Systems with Modified Fluctuation Functions and Reed-Solomon Codes for Encrypted Image Recovery
S S symmetry Article Reversible Data-Hiding Systems with Modified Fluctuation Functions and Reed-Solomon Codes for Encrypted Image Recovery Sunghwan Kim School of Electrical Engineering, University of
More informationHiding Data in a QImage File
Hiding Data in a QImage File Gabriela Mogos Abstract The idea of embedding some information within a digital media, in such a way that the inserted data are intrinsically part of the media itself, has
More informationA Color Image Encryption Scheme Based on Arnold Scrambling and Quantum Chaotic
International Journal of Network Security, Vol.19, No.3, PP.347-357, May 2017 (DOI: 10.6633/IJNS.201703.19(3).04) 347 A Color Image Encryption Scheme Based on Arnold Scrambling and Quantum Chaotic Hui
More informationInformation Hiding and Covert Communication
Information Hiding and Covert Communication Andrew Ker adk @ comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory Foundations of Security Analysis and Design
More informationA Pseudo Quantum Watermarking Algorithm in M-band Wavelet Domain
INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND INFORMATICS Volume, A Pseudo Quantum Watermarking Algorithm in M-band Wavelet Domain Tong Liu Department of Mathematical Science Tsinghua University Beijing,
More informationarxiv: v2 [cs.cr] 6 Aug 2017
Cryptanalyzing an Image Scrambling Encryption Algorithm of Pixel Bits Chengqing Li a,, Dongdong Lin a, Jinhu Lü b a Hunan Province Cooperative Innovation Center for Wind Power Equipment and Energy Conversion,
More informationAn Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States
Commun. Theor. Phys. 65 (2016) 705 710 Vol. 65, No. 6, June 1, 2016 An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States Shu-Jiang Xu (Å ), 1, Xiu-Bo
More informationAS A TECHNIQUE that embeds the secret message
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 22, NO. 7, JULY 2013 2775 Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression Weiming Zhang,
More informationNew Steganographic scheme based of Reed- Solomon codes
New Steganographic scheme based of Reed- Solomon codes I. DIOP; S.M FARSSI ;O. KHOUMA ; H. B DIOUF ; K.TALL ; K.SYLLA Ecole Supérieure Polytechnique de l Université Dakar Sénégal Email: idydiop@yahoo.fr;
More informationResearch Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking
Research Journal of Applied Sciences, Engineering and Technology 7(24): 5157-5162, 2014 DOI:10.19026/rjaset.7.912 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationarxiv: v1 [cs.cv] 28 Dec 2018
Image Processing in Quantum Computers arxiv:1812.11042v1 [cs.cv] 28 Dec 2018 Aditya Dukuri and Khoa Luu Computer Vision and Image Understanding Lab Computer Science and Computer Engineering Department,
More informationSteganalysis of ±k Steganography based on Noncausal Linear Predictor
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL ISSN 1841-9836, 9(5):623-632, October, 2014. Steganalysis of ±k Steganography based on Noncausal Linear Predictor K.M. Singh, Y.J. Chanu, T.
More informationImage Data Compression. Steganography and steganalysis Alexey Pak, PhD, Lehrstuhl für Interak;ve Echtzeitsysteme, Fakultät für Informa;k, KIT
Image Data Compression Steganography and steganalysis 1 Stenography vs watermarking Watermarking: impercep'bly altering a Work to embed a message about that Work Steganography: undetectably altering a
More informationFisher Information Determines Capacity of ε-secure Steganography
Fisher Information Determines Capacity of ε-secure Steganography Tomáš Filler and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York 11th Information Hiding, Darmstadt,
More informationDetecting LSB Matching by Applying Calibration Technique for Difference Image
Detecting LSB atching by Applying Calibration Technique for Difference Image iaolong Li Institute of Computer Science & Technology Peking University 87, Beijing, P. R. China lixiaolong@icst.pku.edu.cn
More informationarxiv: v1 [cs.cr] 18 Jul 2009
Breaking a Chaotic Cryptographic Scheme Based on Composition Maps Chengqing Li 1, David Arroyo 2, and Kwok-Tung Lo 1 1 Department of Electronic and Information Engineering, The Hong Kong Polytechnic University,
More informationA Novel Image Encryption Scheme Using the Composite Discrete Chaotic System
entropy Article A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System Hegui Zhu 1, *, Xiangde Zhang 1, Hai Yu 2, Cheng Zhao 3 and Zhiliang Zhu 2 1 College of Sciences, Northeastern
More informationLecture 5. Ideal and Almost-Ideal SG.
Lecture 5. Ideal and Almost-Ideal SG. Definition. SG is called ideal (perfect or unconditionally undetectable ISG),if its detection is equivalently to random guessing of this fact even with the use of
More informationSteganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory
Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Kenneth Sullivan, Upamanyu Madhow, Shivkumar Chandrasekaran, and B.S. Manjunath Department of Electrical and Computer Engineering University
More informationSteganalysis with a Computational Immune System
DIGITAL FORENSIC RESEARCH CONFERENCE Steganalysis with a Computational Immune System By Jacob Jackson, Gregg Gunsch, Roger Claypoole, Gary Lamont Presented At The Digital Forensic Research Conference DFRWS
More informationComplete characterization of perfectly secure stego-systems with mutually independent embedding operation
Complete characterization of perfectly secure stego-systems with mutually independent embedding operation Tomáš Filler and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton,
More informationQuantum secret sharing based on quantum error-correcting codes
Quantum secret sharing based on quantum error-correcting codes Zhang Zu-Rong( ), Liu Wei-Tao( ), and Li Cheng-Zu( ) Department of Physics, School of Science, National University of Defense Technology,
More information1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai.
Copyright Protection by Watermarking for Color Images against Rotation and Scaling Attacks Using Coding and Synchronization of Peak Locations in DFT Domain Yen-Chung Chiu Department of Computer and Information
More informationCapacity-Approaching Codes for Reversible Data Hiding
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang 1,2,BiaoChen 1, and Nenghai Yu 1, 1 Department of Electrical Engineering & Information Science, University of Science and Technology
More informationA Modified Moment-Based Image Watermarking Method Robust to Cropping Attack
A Modified Moment-Based Watermarking Method Robust to Cropping Attack Tianrui Zong, Yong Xiang, and Suzan Elbadry School of Information Technology Deakin University, Burwood Campus Melbourne, Australia
More informationFast and Automatic Watermark Resynchronization based on Zernike. Moments
Fast and Automatic Watermark Resynchronization based on Zernike Moments Xiangui Kang a, Chunhui Liu a, Wenjun Zeng b, Jiwu Huang a, Congbai Liu a a Dept. of ECE., Sun Yat-Sen Univ. (Zhongshan Univ.), Guangzhou
More informationEncrypting More Information in Visual Cryptography Scheme
Encrypting More Information in Visual Cryptography Scheme Feng Liu 1, Peng Li 2 and ChuanKun Wu 1 1 State Key Laboratory Of Information Security, Institute of Information Engineering, Chinese Academy of
More informationWavelet Packet Based Digital Image Watermarking
Wavelet Packet Based Digital Image ing A.Adhipathi Reddy, B.N.Chatterji Department of Electronics and Electrical Communication Engg. Indian Institute of Technology, Kharagpur 72 32 {aar, bnc}@ece.iitkgp.ernet.in
More informationImperfect Stegosystems
DISSERTATION DEFENSE Imperfect Stegosystems Asymptotic Laws and Near-Optimal Practical Constructions Tomá² Filler Dept. of Electrical and Computer Engineering SUNY Binghamton, New York April 1, 2011 2
More informationLearning Outcomes. Information Theory and Synthetic Steganography. Reading. The communications problem
Learning Outcomes Information Theory and Synthetic Steganography CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Spring 2009 Week 8 understand the relationship between steganography
More informationQuantum Wireless Sensor Networks
Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.
More informationMPSteg-color: a new steganographic technique for color images
MPSteg-color: a new steganographic technique for color images Giacomo Cancelli, Mauro Barni Università degli Studi di Siena Dipartimento di Ingegneria dell Informazione, Italy {cancelli,barni}@dii.unisi.it
More informationDigital Image Processing Lectures 25 & 26
Lectures 25 & 26, Professor Department of Electrical and Computer Engineering Colorado State University Spring 2015 Area 4: Image Encoding and Compression Goal: To exploit the redundancies in the image
More informationTwo-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State
Commun. Theor. Phys. 55 (2011) 984 988 Vol. 55, No. 6, June 15, 2011 Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State YUAN Hao ( ), 1, ZHOU Jun ( ), 1,2 ZHANG Gang
More informationA new pseudorandom number generator based on complex number chaotic equation
A new pseudorandom number generator based on complex number chaotic equation Liu Yang( 刘杨 ) and Tong Xiao-Jun( 佟晓筠 ) School of Computer Science and Technology, Harbin Institute of Technology, Weihai 264209,
More informationMatrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography
Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography Anindya Sarkar, Student Member, IEEE, Upamanyu Madhow, Fellow, IEEE, and B. S. Manjunath,
More informationNEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST
IGOR BELI^, ALEKSANDER PUR NEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST There are several problems where it is very important to know whether the tested data are distributed according to the
More informationQuantization Index Modulation using the E 8 lattice
1 Quantization Index Modulation using the E 8 lattice Qian Zhang and Nigel Boston Dept of Electrical and Computer Engineering University of Wisconsin Madison 1415 Engineering Drive, Madison, WI 53706 Email:
More informationAn Efficient Image Encryption Algorithm for the Period of Arnold's CAT Map
International Journal of Intelligent Systems and Applications in Engineering Advanced Technology and Science ISSN:2147-67992147-6799 www.atscience.org/ijisae Original Research Paper An Efficient Image
More informationISeCure. Nowadays, copyright infringement, unauthorized. The ISC Int'l Journal of Information Security
The ISC Int'l Journal of Information Security July 216, Volume 8, Number 2 (pp. 131 139) http://www.isecure-journal.org Optimum Decoder for Multiplicative Spread Spectrum Image Watermarking with Laplacian
More information5618 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 26, NO. 12, DECEMBER 2017
5618 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 26, NO. 12, DECEMBER 2017 Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-secret Image Sharing Long Bao, Student Member, IEEE, Shuang
More informationA Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization
A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization Yu Wang 1,2(B), Yun Cao 1,2, Xianfeng Zhao 1,2, and Linna Zhou 3 1 State
More informationInformation Theory and Synthetic Steganography
Information Theory and Synthetic Steganography CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Spring 2009 Week 8 Dr Hans Georg Schaathun Information Theory and Synthetic Steganography
More informationEfficient controlled quantum secure direct communication based on GHZ-like states
Efficient controlled quantum secure direct communication based on GHZ-like states Shima Hassanpour a, and Monireh Houshmand b a MS Student, Department of Electrical Engineering, Imam Reza International
More informationNO Distribute Apr_4_02
Capacity is the Wrong Paradigm Ira S. Moskowitz, LiWu Chang, and Richard E. Newman y Information Technology Division, Mail Code 5540 Center for High Assurance Computer Systems Naval Research Laboratory
More informationFault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States
Commun. Theor. Phys. 63 (015) 431 438 Vol. 63, No. 4, April 1, 015 Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States YE Tian-Yu
More informationarxiv:quant-ph/ v2 2 Jan 2007
Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding arxiv:quant-ph/06106v Jan 007 Jun Liu 1, Yan Xia and Zhan-jun Zhang 1,, 1
More informationSupporting information. One-step facile synthesis of novel β-amino alcohol functionalized
Electronic Supplementary Material (ESI) for RSC Advances. This journal is The Royal Society of Chemistry 2016 Supporting information One-step facile synthesis of novel β-amino alcohol functionalized carbon
More informationStudy on form distribution of soil iron in western Jilin and its correlation with soil properties
35 2 2016 6 GLOBAL GEOLOGY Vol. 35 No. 2 Jun. 2016 1004 5589 2016 02 0593 08 1 1 2 1 1 1. 130061 2. 130012 50 A > B > C > D > E > F > G A A CEC B ph C E A C D G B C D P595 S151. 9 A doi 10. 3969 /j. issn.
More informationBilingual Information Hiding System: A Formalized Approach
Bilingual Information Hiding System: A Formalized Approach 1 Riad Jabri, 2 Boran Ibrahim Faculty of Information Technology, Computer Science Department, University of Jordan, Amman, Jordan jabri@ju.eu.jo;
More informationDigital Image Watermarking Algorithm Based on Wavelet Packet
www.ijcsi.org 403 Digital Image ing Algorithm Based on Wavelet Packet 1 A.Geetha, 2 B.Vijayakumari, 3 C.Nagavani, 4 T.Pandiselvi 1 3 4 Faculty of Kamaraj College of Engineering and Technology Department
More informationExpand the Quantum Cipher-text Space by Using a Superposition Key
International Journal of Computer Networks and Communications Security VOL. 3, NO. 7, JULY 2015, 283 290 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Expand the
More informationA New Algorithm to Construct. Secure Keys for AES
Int. J. Contemp. Math. Sciences, Vol. 5, 2010, no. 26, 1263-1270 A New Algorithm to Construct Secure Keys for AES Iqtadar Hussain Department of Mathematics Quaid-i-Azam University, Islamabad, Pakistan
More informationSIGNAL COMPRESSION. 8. Lossy image compression: Principle of embedding
SIGNAL COMPRESSION 8. Lossy image compression: Principle of embedding 8.1 Lossy compression 8.2 Embedded Zerotree Coder 161 8.1 Lossy compression - many degrees of freedom and many viewpoints The fundamental
More informationTutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction
Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states
More informationCapacity is the Wrong Paradigm
Capacity is the Wrong Paradigm Ira S. Moskowitz Center for High Assurance Computer Systems-5540 Naval Research Laboratory Washington, DC 20375 LiWu Chang Center for High Assurance Computer Systems-5540
More informationQuantitative Steganalysis of LSB Embedding in JPEG Domain
Quantitative Steganalysis of LSB Embedding in JPEG Domain Jan Kodovský, Jessica Fridrich September 10, 2010 / ACM MM&Sec 10 1 / 17 Motivation Least Significant Bit (LSB) embedding Simplicity, high embedding
More informationarxiv: v1 [cs.cr] 31 Oct 2015
Topological chaos and chaotic iterations Application to Hash functions Christophe Guyeux Jacques M. Bahi, Senior Member IEEE arxiv:1511.00117v1 [cs.cr] 31 Oct 2015 Abstract This paper introduces a new
More informationA Piggybank Protocol for Quantum Cryptography
Piggybank Protocol for Quantum Cryptography Navya Chodisetti bstract This paper presents a quantum mechanical version of the piggy-bank cryptography protocol. The basic piggybank cryptography idea is to
More informationA Comparative Study of Non-separable Wavelet and Tensor-product. Wavelet; Image Compression
Copyright c 007 Tech Science Press CMES, vol., no., pp.91-96, 007 A Comparative Study o Non-separable Wavelet and Tensor-product Wavelet in Image Compression Jun Zhang 1 Abstract: The most commonly used
More informationEfficient Arnold and Singular Value Decomposition based Chaotic Image Encryption
Efficient and Singular Value ecomposition based Chaotic Encryption Ashraf Afifi epartment of Computer Engineering Computers and Information Technology college Taif University, Al-Hawiya 974, Kingdom of
More informationReduced-Error Constant Correction Truncated Multiplier
This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. IEICE Electronics Express, Vol.*, No.*, 1 8 Reduced-Error Constant Correction Truncated
More information19. Coding for Secrecy
19. Coding for Secrecy 19.1 Introduction Protecting sensitive information from the prying eyes and ears of others is an important issue today as much as it has been for thousands of years. Government secrets,
More informationStudy of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking
Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Navdeep Goel 1,a, Gurwinder Singh 2,b 1ECE Section, Yadavindra College of Engineering, Talwandi Sabo 2Research Scholar,
More informationObtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability
Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability Anindya Sarkar, Kaushal Solanki and and B. S. Manjunath Department of Electrical and Computer Engineering, University
More informationExact Solutions for Generalized Klein-Gordon Equation
Journal of Informatics and Mathematical Sciences Volume 4 (0), Number 3, pp. 35 358 RGN Publications http://www.rgnpublications.com Exact Solutions for Generalized Klein-Gordon Equation Libo Yang, Daoming
More informationCryptosystem based on two-step phase-shifting interferometry and the RSA public-key
Home Search Collections Journals About Contact us My IOPscience Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm This content has been downloaded
More informationScheme for Asymmetric and Deterministic Controlled Bidirectional Joint Remote State Preparation
Commun. Theor. Phys. 70 (208) 55 520 Vol. 70, No. 5, November, 208 Scheme for Asymmetric and Deterministic Controlled Bidirectional Joint Remote State Preparation Jin Shi ( 施锦 ) and You-Bang Zhan ( 詹佑邦
More informationLimitations on transversal gates
Limitations on transversal gates Michael Newman 1 and Yaoyun Shi 1,2 University of Michigan 1, Alibaba Group 2 February 6, 2018 Quantum fault-tolerance Quantum fault-tolerance Quantum fault-tolerance Quantum
More informationGeometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix
Tamkang Journal of Science and Engineering, Vol. 10, No. 3, pp. 211220 (2007) 211 Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix Ching-Tang Hsieh 1 *, Yeh-Kuang Wu 1 and
More informationResearch and prospect of reversible data hiding method with contrast enhancement
4 Vol. No.4 016 4 Chinese Journal of Network and Information Security April 016 1 1 1 1 1 1. 3007. 30039 TP393 A doi: 10.11959/.issn.096-109x.016.00045 Research and prospect of reversible data hiding method
More informationBreaking an encryption scheme based on chaotic Baker map
Breaking an encryption scheme based on chaotic Baker map Gonzalo Alvarez a, and Shujun Li b a Instituto de Física Aplicada, Consejo Superior de Investigaciones Científicas, Serrano 144 28006 Madrid, Spain
More informationThe Journal of MacroTrends in Technology and Innovation
MACROJOURNALS The Journal of MacroTrends in Technology and Innovation Digital Watermarking Model for CityGML Jongweon Kim Department of Electronics Engineering, Sangmyung University, Hongjimun2-gil, Jongno-gu,
More informationMINIMIZING ADDITIVE DISTORTION FUNCTIONS WITH NON-BINARY EMBEDDING OPERATION IN STEGANOGRAPHY. Tomáš Filler and Jessica Fridrich
MINIMIZING ADDITIVE DISTORTION FUNCTIONS WITH NON-BINARY EMBEDDING OPERATION IN STEGANOGRAPHY Tomáš Filler and Jessica Fridrich Department of ECE, SUNY Binghamton, NY, USA {tomas.filler, fridrich}@binghamton.edu
More informationLogic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation
Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate
More informationOn LSB Spatial Domain Steganography and Channel Capacity
Naval Research Laboratory Washington, DC 20375-5320 NRL/MR/5540--08-9118 On LSB Spatial Domain Steganography and Channel Capacity Ir a S. Mo s k o w i t z Center for High Assurance Computer Systems Information
More informationHidden Number Problem Given Bound of Secret Jia-ning LIU and Ke-wei LV *
2017 2nd International Conference on Artificial Intelligence: Techniques and Applications (AITA 2017) ISBN: 978-1-60595-491-2 Hidden Number Problem Given Bound of Secret Jia-ning LIU and Ke-wei LV * DCS
More informationMultiparty Quantum Remote Control
Multiparty Quantum Remote Control Yu-Ting Chen and Tzonelih Hwang Abstract This paper proposes a multiparty quantum remote control (MQRC) protocol, which allows several controllers to perform remote operations
More informationBidirectional quantum teleportation and secure direct communication via entanglement swapping
Bidirectional quantum teleportation and secure direct communication via entanglement swapping Shima Hassanpour a, and Monireh Houshmand b a MS Student, Department of Electrical Engineering, Imam Reza International
More informationImage Interpolation Using Kriging Technique for Spatial Data
Image Interpolation Using Kriging Technique for Spatial Data Firas Ajil Jassim, Fawzi Hasan Altaany Abstract Image interpolation has been used spaciously by customary interpolation techniques. Recently,
More informationImage Compression. Qiaoyong Zhong. November 19, CAS-MPG Partner Institute for Computational Biology (PICB)
Image Compression Qiaoyong Zhong CAS-MPG Partner Institute for Computational Biology (PICB) November 19, 2012 1 / 53 Image Compression The art and science of reducing the amount of data required to represent
More informationNew Construction of Single Cycle T-function Families
New Construction of Single Cycle T-function Families Shiyi ZHANG 1, Yongjuan WANG, Guangpu GAO Luoyang Foreign Language University, Luoyang, Henan Province, China Abstract The single cycle T-function is
More informationduring transmission safeguard information Cryptography: used to CRYPTOGRAPHY BACKGROUND OF THE MATHEMATICAL
THE MATHEMATICAL BACKGROUND OF CRYPTOGRAPHY Cryptography: used to safeguard information during transmission (e.g., credit card number for internet shopping) as opposed to Coding Theory: used to transmit
More informationCSE 123: Computer Networks
CSE 123: Computer Networks Total points: 40 Homework 1 - Solutions Out: 10/4, Due: 10/11 Solutions 1. Two-dimensional parity Given below is a series of 7 7-bit items of data, with an additional bit each
More informationAccurate Orthogonal Circular Moment Invariants of Gray-Level Images
Journal of Computer Science 7 (5): 75-722, 20 ISSN 549-3636 20 Science Publications Accurate Orthogonal Circular Moment Invariants of Gray-Level Images Khalid Mohamed Hosny Department of Computer Science,
More information