QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant Qubit

Size: px
Start display at page:

Download "QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant Qubit"

Transcription

1 06 International Conference on Mathematical, Computational and Statistical Sciences and Engineering (MCSSE 06) ISBN: QISLSQb: A Quantum Image Steganography Scheme Based on Least Significant Qubit Tie-un ZHANG, Bassem Abd-El-Atty, Mohamed Amin and Ahmed A. Abd El-Latif,* School of software, Harbin niversity of Science and Technology, Harbin, China Department of Mathematics, Faculty of Science Menoufia niversity Shebin El-Koom 35, Egypt *Corresponding author Keywords: Quantum steganography, Quantum image processing, LSQb, Image scrambling. Abstract. In this paper, a new quantum image steganography scheme to embed quantum secrete gray image into quantum cover image is proposed. In the proposed scheme, the quantum secret image scrambled utilizing Arnold cat map and embedding the result into quantum cover image using two least significant qubit (LSQb).The extracting process need only stego image to extract the embedded secret image. The simulation results demonstrate that the proposed scheme has good invisibility and high capacity. Introduction Quantum steganography utilizes the effects of quantum mechanics such as quantum computation and quantum communication to achieve tasks of information hiding. Quantum steganography, can be defined as the classical steganography in the viewpoint of quantum mechanics, has become important researching area of quantum cryptography. Quantum image steganography based on quantum image processing techniques to improve many tasks in classical image steganography. The first step is to represent and store the classical images on quantum computers. There are many representations for classical images on quantum computers, such as flexible representation of quantum images (FRQI) [], which uses X + number of qubits to represent a gray image with size x x and the NEQR model for represent quantum images []. In spite of the used qubits of NEQR increases from x + qubits used in FRQI to X + q qubits, it is excellent for processing quantum image because the quantum representation is very similar to the representation of a classical image. In the earlier works, there is no quantum image steganography scheme to embed quantum gray image into quantum image. The quantum image steganography algorithms [3, 4] embed binary image or message as binary image with maximum capacity one bit per pixel. However, quantum image steganography algorithms [3, 4] broken to embed quantum gray image into quantum image. In [5], Wang et al. proposed an LSQb information hiding algorithm for quantum image, which embeds the secret information without scrambling into the first qubit of the cover image. Sang et al. In [6] proposed LSQb information hiding algorithm to embed quantum information into quantum color image. In [7], AL-Salhi et al. Presented a quantum image steganography algorithm based on the least significant Qu-block (LSQB). Heidari et al. In [8] proposed a Quantum watermarking technique based on least significant bit (LSB) to embed quantum binary image into cover image. In this paper, we propose a quantum image steganography scheme to embed quantum gray image instead of binary image into the quantum cover image. It utilizes NEQR for quantum representation, two LSQb and quantum image scrambling to increase the capacity and security of the proposed scheme. Experimental results demonstrate that, the maximum capacity increases from -bit per pixel in [3, 4, 5, 6, 8] to -bit per pixel in the proposed scheme and the invisibility is good. The rest of this paper is as follows. In section, we give a brief background on the NEQR representation, Arnold image scrambling and LSQb. Section 3 gives the proposed quantum 40

2 steganography approach. Section 4 is devoted to analysis and results in terms of visual quality and payload capacity. In section 5, we present a comparison with related algorithms. Finally, conclusions drown in section 6. Preliminaries NEQR for Quantum Images. The NEQR model has information about the pixels color and its related position of each pixel in the image. The mathematical representation of a quantum image for n n an image can be expressed as follows. where the binary sequence I ci i n () i0 q 0 k ci ci... ci ci, ci { 0,}, k q,...,,0, i 0,,..., q 0 ci... cici 0,,, encodes the color value, and the color range is q, i for i, are n dimension computational basis quantum states. Arnold Image Scrambling. The basic idea of image scrambling is to transform a meaningful image into a meaningless image by permutation the positions of pixels into new positions. Arnold image scrambling matrix is defined as x x modn y y () where N is the size of image. The input is the position information x and y of original image, and the output is the position information x and y of Arnold scrambled image. The inverse of Arnold image scrambling is defined as follows x x modn y y (3) Zhou et al. [9] gives a quantum Arnold image scrambling that can be defined as I S S ( I ci S ( i ) n i 0 S( i) can be defined according to Eq. as (4) S( i) S( y x) S( y) S( x) where S( x) = x + ymod N S( y) = x + ymod N (5) Least Significant Quantum Bit. In this way LSQb information hiding can be described by substituting the last qubit of cover image with the secret information. In [5], Wang et al. proposed least significant qubit information hiding algorithm for quantum image. In [5], the qubit of secret information c M 0 is compared with the last qubit color of cover image c0 in Eq.. If the output of comparison is the same apply to I otherwise apply i toi. 4

3 (6) q q i I X i i I 0, i (7) q I 0, i Where X 0 0 and 0 I 0 Proposed Quantum Image Steganography Scheme Here, we propose a quantum image steganography scheme based on NEQR for quantum images by utilizing quantum Arnold image and two least significant qubits. We assume that the cover image n n with size n n and secret image with size. The embedding procedures of the proposed quantum image steganography consist of three phases, which are given by the following steps. Phase : Preprocessing Images. Preprocessing images is given by the following steps. n n Step : The secret image with size and 8-bit is expanded to image with size n n and -bit. Step : The NEQR representations of the cover image and the secret image after expanding is I and J, respectively are shown as follows: I n q 0 k ci i, ci ci... cici, ci i 0, {0 } (8) 0 k J c, c c c, c { 0,} n 0 (9) Phase : Scrambling for Quantum Secret Image J. The quantum secrete image J scrambled using Arnold transformation as follows JS S ( J c S ( ) n (0) 0 Phase 3: Embedding Scrambled Image JS into Cover Image I. The quantum scrambled image JS embedded into quantum cover image I utilizing two least significant qubits. The two qubits of scrambled secret image JS color encoding information c and c0 in Eq. 0 compared with the two last qubits of cover image I color encoding information c and c0 in Eq. 8. If the output of comparison for c is the same apply to I otherwise apply i toi and if the output of comparison for c0 is the same apply to I otherwise apply 0 i toi. () q q i I X I i i I 0, i () q q 0i I X i i I 0, i 4

4 (3) q I 0, i Analysis and Results on Classical Computer Visual Quality. Visual quality is the amount of difference between the stego image and the original cover image in pixels values. There are many quantities to measure the difference of pixels between the stego image and the original cover image; one of the most used quantities is PSNR (peak signal to noise ratio). It is defined as the MSE (mean squared error) for two images X and Y with size i. MSE [ (, ) (, )] i i X x y Y x y (4) x0 y0 PSNR is defined as follows. MAX X PSNR 0 log 0( ) MSE Where, MAX X is the maximum value of pixels in the cover image X. In this scheme, Y related to the stego image and X related to the original cover image. In our experiments, we use images of size 8 8 as cover image and as secret image to simulate the proposed scheme. The following Figure describes experimental results of our scheme and Table gives the PSNR value between the original image and the stego image for different images. Table. PSNR (in db) values for different text messages. Cover image Secret image Lena Baboon Barbara Lena Baboon Barbara (5) Obviously, from Figure, human eyes cannot detect the difference between stego image and original image. From Table, we can see that the PSNR values are high enough. So we can conclude that our scheme has a good visual effect. Payload Capacity. The steganography capacity can be stated as the ratio between the number of embedded bits of the text message and the number of pixels for cover image. The proposed schemes capacity is given as follows: numberof embedded image pixels 0.5n 0.5n pixel C pixel / pixel number of cover image pixels n n pixel 4 The capacity of the proposed scheme is -bit per pixel, which is higher than of most of quantum image steganography algorithms. So we can conclude that our scheme has high capacity. Original cover image Stego image Secret image Extracted image (6) Figure. The visual effects of proposed scheme. 43

5 Comparison with Related Algorithms From the above section, the simulation results demonstrate that the proposed scheme has high capacity compared to the algorithms of [3-5]. The capacity of the proposed algorithm is -bit per pixel, while the capacity of algorithms in [3-5] is -bit per pixel. From Table, we can conclude that the proposed algorithm has high capacity, good visual effect and embedding quantum gray image instead of binary image. Table. Comparison with related algorithms. Items Proposed scheme Algorithm in [3] Algorithm in [4] Algorithm in [5] Maximum Capacity bit/pixel bit/pixel bit/pixel bit/pixel Embedding data Gray-scale image Binary image Message as binary image Any information Scrambling Quantum Arnold Quantum Hilbert - Image scrambling Image scrambling - Visual quality (PSNR) using Lena as cover image Conclusion In this paper, a quantum image steganography scheme based on the novel enhanced quantum representation (NEQR) for quantum images, quantum Arnold image scrambling and two least significant qubits have been proposed. The advantages of the proposed scheme are the extracting operation does not need the original cover image or the original secret image, good visibility and high capacity. Simulation results show the efficiency of the proposed quantum image steganography scheme. Acknowledgement This work is supported by Menoufia niversity under the proect number: A-WSN06, Guangdong Natural Science Foundation: 05A and Natural Science Foundation of Heilongiang Province, China: QC04C076, JJ06ZR068. References [] P.Q. Le, F. Dong, K. Hirota, A flexible representation of quantum images for polynomial preparation, image compression and processing operations, Quantum Inf Process, 0 (0) [] Y. Zhang, K. Lu,Y.H. Gao, M. Wang, NEQR: a novel enhanced quantum representation of digital images, Quantum Inf Process, (03) [3] Nan Jiang, LuoWang, A Novel Strategy for Quantum Image Steganography Based on Moir epattern, Int J TheorPhys, 54 (05) [4] Nan Jiang, Na Zhao, LuoWang, LSB Based Quantum Image Steganography Algorithm, Int J TheorPhys. 55 (06)07-3. [5] S. Wang, J. Sang, X. song, X. Niu, Least Significant Qubit (LSQb) Information Hiding Algorithm for Quantum Image, Measurement, 73 (05) [6] J. Sang, S. Wang, Q. Li, Least significant qubit algorithm for quantum images, Quantum Inf. -0 (06) 5 Process. [7] Y.E. AL-Salhi, S. Lu, Quantum Image Steganography and Steganalysis Based On LSQu-Blocks (06) 55 TheorPhys. Image Information Concealing Algorithm, Int J 44

6 [8] S. Heidari, M. Naseri, A Novel LSB Based Quantum Watermarking, Int J TheorPhys. 55 (06) [9] Nan Run Zhou, Tian Xiang Hua, Li Hua Gong, Dong Ju Pei, Qing Hong Liao, Quantum image encryption based on generalized Arnold transform and double random-phase encoding. Quantum Inf Process. 4 (05)

A New Quantum Watermarking Based on Quantum Wavelet Transforms

A New Quantum Watermarking Based on Quantum Wavelet Transforms Commun. Theor. Phys. 67 207 732 742 Vol. 67, No. 6, June, 207 A New Quantum Watermarking Based on Quantum Wavelet Transforms Shahrokh Heidari, Mosayeb Naseri, 2, Reza Gheibi, 3 Masoud Baghfalaki, 4 Mohammad

More information

2. Definition & Classification

2. Definition & Classification Information Hiding Data Hiding K-H Jung Agenda 1. Data Hiding 2. Definition & Classification 3. Related Works 4. Considerations Definition of Data Hiding 3 Data Hiding, Information Hiding Concealing secret

More information

A Spatial Domain Quantum Watermarking Scheme

A Spatial Domain Quantum Watermarking Scheme Commun. Theor. Phys. 66 (2016) 66 76 Vol. 66, No. 1, July 1, 2016 A Spatial Domain Quantum Watermarking Scheme Zhan-Hong Wei (ï ), 1,2, Xiu-Bo Chen (í ), 2,3 Shu-Jiang Xu (Å ), 4 Xin-Xin Niu (± ), 2,3

More information

arxiv: v1 [quant-ph] 23 Jan 2019

arxiv: v1 [quant-ph] 23 Jan 2019 Noname manuscript No. (will be inserted by the editor) Adaptive Quantum Image Encryption Method Based on Wavelet Transform Jian Wang Ya-Cong Geng Ji-Qiang Liu Received: date / Accepted: date arxiv:9.776v

More information

Security of NEQR Quantum Image by Using Quantum Fourier Transform with Blind Trent

Security of NEQR Quantum Image by Using Quantum Fourier Transform with Blind Trent Security of NEQR Quantum Image by Using Quantum Fourier Transform with Blind Trent Engin ŞAHİN*, İhsan YILMAZ** arxiv:1801.10364v1 [quant-ph] 31 Jan 2018 * Department of Computer and Instructional Technologies

More information

Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm

Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm Improved Adaptive LSB Steganography based on Chaos and Genetic Algorithm Lifang Yu, Yao Zhao 1, Rongrong Ni, Ting Li Institute of Information Science, Beijing Jiaotong University, BJ 100044, China Abstract

More information

A Hybrid Method with Lorenz attractor based Cryptography and LSB Steganography

A Hybrid Method with Lorenz attractor based Cryptography and LSB Steganography International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article A Hybrid

More information

Research Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number

Research Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number Applied Mathematics Volume 013, Article ID 189706, 8 pages http://dx.doi.org/10.1155/013/189706 Research Article A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number

More information

Stego key searching for LSB steganography on JPEG decompressed image

Stego key searching for LSB steganography on JPEG decompressed image . RESEARCH PAPER. SCIENCE CHINA Information Sciences March 2016, Vol. 59 032105:1 032105:15 doi: 10.1007/s11432-015-5367-x Stego key searching for LSB steganography on JPEG decompressed image Jiufen LIU

More information

Research Article Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm

Research Article Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2010, Article ID 876946, 6 pages doi:10.1155/2010/876946 Research Article Improved Adaptive LSB Steganography Based

More information

NEQR: a novel enhanced quantum representation of digital images

NEQR: a novel enhanced quantum representation of digital images Quantum Inf Process (2013) 12:2833 2860 DOI 10.1007/s11128-013-0567-z NEQR: a novel enhanced quantum representation of digital images Yi Zhang Kai Lu Yinghui Gao Mo Wang Received: 3 August 2012 / Accepted:

More information

Halftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion

Halftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion 1 Halftone Image Watermarking by Content Aware Double-sided Embedding Error Diffusion Yuanfang Guo, Member, IEEE, Oscar C. Au, Fellow, IEEE, Rui Wang, Member, IEEE, Lu Fang, Member, IEEE, Xiaochun Cao,

More information

Quantum image processing: A review of advances in its security technologies

Quantum image processing: A review of advances in its security technologies International Journal of Quantum Information Vol. 15, No. 3 (2017) 1730001 (18 pages) #.c The Author(s) DOI: 10.1142/S0219749917300017 Quantum image processing: A review of advances in its security technologies

More information

NEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION

NEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION NEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION Sos S. Agaian 1 and Juan P. Perez 2 1NSP Lab, The University of Texas at San Antonio, Electrical Engineering Department,

More information

Learning outcomes. Palettes and GIF. The colour palette. Using the colour palette The GIF file. CSM25 Secure Information Hiding

Learning outcomes. Palettes and GIF. The colour palette. Using the colour palette The GIF file. CSM25 Secure Information Hiding Learning outcomes Palettes and GIF CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Learn how images are represented using a palette Get an overview of hiding techniques in

More information

Reversible Data-Hiding Systems with Modified Fluctuation Functions and Reed-Solomon Codes for Encrypted Image Recovery

Reversible Data-Hiding Systems with Modified Fluctuation Functions and Reed-Solomon Codes for Encrypted Image Recovery S S symmetry Article Reversible Data-Hiding Systems with Modified Fluctuation Functions and Reed-Solomon Codes for Encrypted Image Recovery Sunghwan Kim School of Electrical Engineering, University of

More information

Hiding Data in a QImage File

Hiding Data in a QImage File Hiding Data in a QImage File Gabriela Mogos Abstract The idea of embedding some information within a digital media, in such a way that the inserted data are intrinsically part of the media itself, has

More information

A Color Image Encryption Scheme Based on Arnold Scrambling and Quantum Chaotic

A Color Image Encryption Scheme Based on Arnold Scrambling and Quantum Chaotic International Journal of Network Security, Vol.19, No.3, PP.347-357, May 2017 (DOI: 10.6633/IJNS.201703.19(3).04) 347 A Color Image Encryption Scheme Based on Arnold Scrambling and Quantum Chaotic Hui

More information

Information Hiding and Covert Communication

Information Hiding and Covert Communication Information Hiding and Covert Communication Andrew Ker adk @ comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory Foundations of Security Analysis and Design

More information

A Pseudo Quantum Watermarking Algorithm in M-band Wavelet Domain

A Pseudo Quantum Watermarking Algorithm in M-band Wavelet Domain INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS AND INFORMATICS Volume, A Pseudo Quantum Watermarking Algorithm in M-band Wavelet Domain Tong Liu Department of Mathematical Science Tsinghua University Beijing,

More information

arxiv: v2 [cs.cr] 6 Aug 2017

arxiv: v2 [cs.cr] 6 Aug 2017 Cryptanalyzing an Image Scrambling Encryption Algorithm of Pixel Bits Chengqing Li a,, Dongdong Lin a, Jinhu Lü b a Hunan Province Cooperative Innovation Center for Wind Power Equipment and Energy Conversion,

More information

An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States Commun. Theor. Phys. 65 (2016) 705 710 Vol. 65, No. 6, June 1, 2016 An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States Shu-Jiang Xu (Å ), 1, Xiu-Bo

More information

AS A TECHNIQUE that embeds the secret message

AS A TECHNIQUE that embeds the secret message IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 22, NO. 7, JULY 2013 2775 Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression Weiming Zhang,

More information

New Steganographic scheme based of Reed- Solomon codes

New Steganographic scheme based of Reed- Solomon codes New Steganographic scheme based of Reed- Solomon codes I. DIOP; S.M FARSSI ;O. KHOUMA ; H. B DIOUF ; K.TALL ; K.SYLLA Ecole Supérieure Polytechnique de l Université Dakar Sénégal Email: idydiop@yahoo.fr;

More information

Research Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking

Research Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking Research Journal of Applied Sciences, Engineering and Technology 7(24): 5157-5162, 2014 DOI:10.19026/rjaset.7.912 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

arxiv: v1 [cs.cv] 28 Dec 2018

arxiv: v1 [cs.cv] 28 Dec 2018 Image Processing in Quantum Computers arxiv:1812.11042v1 [cs.cv] 28 Dec 2018 Aditya Dukuri and Khoa Luu Computer Vision and Image Understanding Lab Computer Science and Computer Engineering Department,

More information

Steganalysis of ±k Steganography based on Noncausal Linear Predictor

Steganalysis of ±k Steganography based on Noncausal Linear Predictor INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL ISSN 1841-9836, 9(5):623-632, October, 2014. Steganalysis of ±k Steganography based on Noncausal Linear Predictor K.M. Singh, Y.J. Chanu, T.

More information

Image Data Compression. Steganography and steganalysis Alexey Pak, PhD, Lehrstuhl für Interak;ve Echtzeitsysteme, Fakultät für Informa;k, KIT

Image Data Compression. Steganography and steganalysis Alexey Pak, PhD, Lehrstuhl für Interak;ve Echtzeitsysteme, Fakultät für Informa;k, KIT Image Data Compression Steganography and steganalysis 1 Stenography vs watermarking Watermarking: impercep'bly altering a Work to embed a message about that Work Steganography: undetectably altering a

More information

Fisher Information Determines Capacity of ε-secure Steganography

Fisher Information Determines Capacity of ε-secure Steganography Fisher Information Determines Capacity of ε-secure Steganography Tomáš Filler and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York 11th Information Hiding, Darmstadt,

More information

Detecting LSB Matching by Applying Calibration Technique for Difference Image

Detecting LSB Matching by Applying Calibration Technique for Difference Image Detecting LSB atching by Applying Calibration Technique for Difference Image iaolong Li Institute of Computer Science & Technology Peking University 87, Beijing, P. R. China lixiaolong@icst.pku.edu.cn

More information

arxiv: v1 [cs.cr] 18 Jul 2009

arxiv: v1 [cs.cr] 18 Jul 2009 Breaking a Chaotic Cryptographic Scheme Based on Composition Maps Chengqing Li 1, David Arroyo 2, and Kwok-Tung Lo 1 1 Department of Electronic and Information Engineering, The Hong Kong Polytechnic University,

More information

A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System

A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System entropy Article A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System Hegui Zhu 1, *, Xiangde Zhang 1, Hai Yu 2, Cheng Zhao 3 and Zhiliang Zhu 2 1 College of Sciences, Northeastern

More information

Lecture 5. Ideal and Almost-Ideal SG.

Lecture 5. Ideal and Almost-Ideal SG. Lecture 5. Ideal and Almost-Ideal SG. Definition. SG is called ideal (perfect or unconditionally undetectable ISG),if its detection is equivalently to random guessing of this fact even with the use of

More information

Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory

Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Kenneth Sullivan, Upamanyu Madhow, Shivkumar Chandrasekaran, and B.S. Manjunath Department of Electrical and Computer Engineering University

More information

Steganalysis with a Computational Immune System

Steganalysis with a Computational Immune System DIGITAL FORENSIC RESEARCH CONFERENCE Steganalysis with a Computational Immune System By Jacob Jackson, Gregg Gunsch, Roger Claypoole, Gary Lamont Presented At The Digital Forensic Research Conference DFRWS

More information

Complete characterization of perfectly secure stego-systems with mutually independent embedding operation

Complete characterization of perfectly secure stego-systems with mutually independent embedding operation Complete characterization of perfectly secure stego-systems with mutually independent embedding operation Tomáš Filler and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton,

More information

Quantum secret sharing based on quantum error-correcting codes

Quantum secret sharing based on quantum error-correcting codes Quantum secret sharing based on quantum error-correcting codes Zhang Zu-Rong( ), Liu Wei-Tao( ), and Li Cheng-Zu( ) Department of Physics, School of Science, National University of Defense Technology,

More information

1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai.

1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai. Copyright Protection by Watermarking for Color Images against Rotation and Scaling Attacks Using Coding and Synchronization of Peak Locations in DFT Domain Yen-Chung Chiu Department of Computer and Information

More information

Capacity-Approaching Codes for Reversible Data Hiding

Capacity-Approaching Codes for Reversible Data Hiding Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang 1,2,BiaoChen 1, and Nenghai Yu 1, 1 Department of Electrical Engineering & Information Science, University of Science and Technology

More information

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack A Modified Moment-Based Watermarking Method Robust to Cropping Attack Tianrui Zong, Yong Xiang, and Suzan Elbadry School of Information Technology Deakin University, Burwood Campus Melbourne, Australia

More information

Fast and Automatic Watermark Resynchronization based on Zernike. Moments

Fast and Automatic Watermark Resynchronization based on Zernike. Moments Fast and Automatic Watermark Resynchronization based on Zernike Moments Xiangui Kang a, Chunhui Liu a, Wenjun Zeng b, Jiwu Huang a, Congbai Liu a a Dept. of ECE., Sun Yat-Sen Univ. (Zhongshan Univ.), Guangzhou

More information

Encrypting More Information in Visual Cryptography Scheme

Encrypting More Information in Visual Cryptography Scheme Encrypting More Information in Visual Cryptography Scheme Feng Liu 1, Peng Li 2 and ChuanKun Wu 1 1 State Key Laboratory Of Information Security, Institute of Information Engineering, Chinese Academy of

More information

Wavelet Packet Based Digital Image Watermarking

Wavelet Packet Based Digital Image Watermarking Wavelet Packet Based Digital Image ing A.Adhipathi Reddy, B.N.Chatterji Department of Electronics and Electrical Communication Engg. Indian Institute of Technology, Kharagpur 72 32 {aar, bnc}@ece.iitkgp.ernet.in

More information

Imperfect Stegosystems

Imperfect Stegosystems DISSERTATION DEFENSE Imperfect Stegosystems Asymptotic Laws and Near-Optimal Practical Constructions Tomá² Filler Dept. of Electrical and Computer Engineering SUNY Binghamton, New York April 1, 2011 2

More information

Learning Outcomes. Information Theory and Synthetic Steganography. Reading. The communications problem

Learning Outcomes. Information Theory and Synthetic Steganography. Reading. The communications problem Learning Outcomes Information Theory and Synthetic Steganography CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Spring 2009 Week 8 understand the relationship between steganography

More information

Quantum Wireless Sensor Networks

Quantum Wireless Sensor Networks Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.

More information

MPSteg-color: a new steganographic technique for color images

MPSteg-color: a new steganographic technique for color images MPSteg-color: a new steganographic technique for color images Giacomo Cancelli, Mauro Barni Università degli Studi di Siena Dipartimento di Ingegneria dell Informazione, Italy {cancelli,barni}@dii.unisi.it

More information

Digital Image Processing Lectures 25 & 26

Digital Image Processing Lectures 25 & 26 Lectures 25 & 26, Professor Department of Electrical and Computer Engineering Colorado State University Spring 2015 Area 4: Image Encoding and Compression Goal: To exploit the redundancies in the image

More information

Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State

Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State Commun. Theor. Phys. 55 (2011) 984 988 Vol. 55, No. 6, June 15, 2011 Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State YUAN Hao ( ), 1, ZHOU Jun ( ), 1,2 ZHANG Gang

More information

A new pseudorandom number generator based on complex number chaotic equation

A new pseudorandom number generator based on complex number chaotic equation A new pseudorandom number generator based on complex number chaotic equation Liu Yang( 刘杨 ) and Tong Xiao-Jun( 佟晓筠 ) School of Computer Science and Technology, Harbin Institute of Technology, Weihai 264209,

More information

Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography

Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography Matrix Embedding with Pseudorandom Coefficient Selection and Error Correction for Robust and Secure Steganography Anindya Sarkar, Student Member, IEEE, Upamanyu Madhow, Fellow, IEEE, and B. S. Manjunath,

More information

NEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST

NEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST IGOR BELI^, ALEKSANDER PUR NEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST There are several problems where it is very important to know whether the tested data are distributed according to the

More information

Quantization Index Modulation using the E 8 lattice

Quantization Index Modulation using the E 8 lattice 1 Quantization Index Modulation using the E 8 lattice Qian Zhang and Nigel Boston Dept of Electrical and Computer Engineering University of Wisconsin Madison 1415 Engineering Drive, Madison, WI 53706 Email:

More information

An Efficient Image Encryption Algorithm for the Period of Arnold's CAT Map

An Efficient Image Encryption Algorithm for the Period of Arnold's CAT Map International Journal of Intelligent Systems and Applications in Engineering Advanced Technology and Science ISSN:2147-67992147-6799 www.atscience.org/ijisae Original Research Paper An Efficient Image

More information

ISeCure. Nowadays, copyright infringement, unauthorized. The ISC Int'l Journal of Information Security

ISeCure. Nowadays, copyright infringement, unauthorized. The ISC Int'l Journal of Information Security The ISC Int'l Journal of Information Security July 216, Volume 8, Number 2 (pp. 131 139) http://www.isecure-journal.org Optimum Decoder for Multiplicative Spread Spectrum Image Watermarking with Laplacian

More information

5618 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 26, NO. 12, DECEMBER 2017

5618 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 26, NO. 12, DECEMBER 2017 5618 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 26, NO. 12, DECEMBER 2017 Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-secret Image Sharing Long Bao, Student Member, IEEE, Shuang

More information

A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization

A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization A Prediction Mode-Based Information Hiding Approach for H.264/AVC Videos Minimizing the Impacts on Rate-Distortion Optimization Yu Wang 1,2(B), Yun Cao 1,2, Xianfeng Zhao 1,2, and Linna Zhou 3 1 State

More information

Information Theory and Synthetic Steganography

Information Theory and Synthetic Steganography Information Theory and Synthetic Steganography CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Spring 2009 Week 8 Dr Hans Georg Schaathun Information Theory and Synthetic Steganography

More information

Efficient controlled quantum secure direct communication based on GHZ-like states

Efficient controlled quantum secure direct communication based on GHZ-like states Efficient controlled quantum secure direct communication based on GHZ-like states Shima Hassanpour a, and Monireh Houshmand b a MS Student, Department of Electrical Engineering, Imam Reza International

More information

NO Distribute Apr_4_02

NO Distribute Apr_4_02 Capacity is the Wrong Paradigm Ira S. Moskowitz, LiWu Chang, and Richard E. Newman y Information Technology Division, Mail Code 5540 Center for High Assurance Computer Systems Naval Research Laboratory

More information

Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States

Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States Commun. Theor. Phys. 63 (015) 431 438 Vol. 63, No. 4, April 1, 015 Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States YE Tian-Yu

More information

arxiv:quant-ph/ v2 2 Jan 2007

arxiv:quant-ph/ v2 2 Jan 2007 Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding arxiv:quant-ph/06106v Jan 007 Jun Liu 1, Yan Xia and Zhan-jun Zhang 1,, 1

More information

Supporting information. One-step facile synthesis of novel β-amino alcohol functionalized

Supporting information. One-step facile synthesis of novel β-amino alcohol functionalized Electronic Supplementary Material (ESI) for RSC Advances. This journal is The Royal Society of Chemistry 2016 Supporting information One-step facile synthesis of novel β-amino alcohol functionalized carbon

More information

Study on form distribution of soil iron in western Jilin and its correlation with soil properties

Study on form distribution of soil iron in western Jilin and its correlation with soil properties 35 2 2016 6 GLOBAL GEOLOGY Vol. 35 No. 2 Jun. 2016 1004 5589 2016 02 0593 08 1 1 2 1 1 1. 130061 2. 130012 50 A > B > C > D > E > F > G A A CEC B ph C E A C D G B C D P595 S151. 9 A doi 10. 3969 /j. issn.

More information

Bilingual Information Hiding System: A Formalized Approach

Bilingual Information Hiding System: A Formalized Approach Bilingual Information Hiding System: A Formalized Approach 1 Riad Jabri, 2 Boran Ibrahim Faculty of Information Technology, Computer Science Department, University of Jordan, Amman, Jordan jabri@ju.eu.jo;

More information

Digital Image Watermarking Algorithm Based on Wavelet Packet

Digital Image Watermarking Algorithm Based on Wavelet Packet www.ijcsi.org 403 Digital Image ing Algorithm Based on Wavelet Packet 1 A.Geetha, 2 B.Vijayakumari, 3 C.Nagavani, 4 T.Pandiselvi 1 3 4 Faculty of Kamaraj College of Engineering and Technology Department

More information

Expand the Quantum Cipher-text Space by Using a Superposition Key

Expand the Quantum Cipher-text Space by Using a Superposition Key International Journal of Computer Networks and Communications Security VOL. 3, NO. 7, JULY 2015, 283 290 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Expand the

More information

A New Algorithm to Construct. Secure Keys for AES

A New Algorithm to Construct. Secure Keys for AES Int. J. Contemp. Math. Sciences, Vol. 5, 2010, no. 26, 1263-1270 A New Algorithm to Construct Secure Keys for AES Iqtadar Hussain Department of Mathematics Quaid-i-Azam University, Islamabad, Pakistan

More information

SIGNAL COMPRESSION. 8. Lossy image compression: Principle of embedding

SIGNAL COMPRESSION. 8. Lossy image compression: Principle of embedding SIGNAL COMPRESSION 8. Lossy image compression: Principle of embedding 8.1 Lossy compression 8.2 Embedded Zerotree Coder 161 8.1 Lossy compression - many degrees of freedom and many viewpoints The fundamental

More information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states

More information

Capacity is the Wrong Paradigm

Capacity is the Wrong Paradigm Capacity is the Wrong Paradigm Ira S. Moskowitz Center for High Assurance Computer Systems-5540 Naval Research Laboratory Washington, DC 20375 LiWu Chang Center for High Assurance Computer Systems-5540

More information

Quantitative Steganalysis of LSB Embedding in JPEG Domain

Quantitative Steganalysis of LSB Embedding in JPEG Domain Quantitative Steganalysis of LSB Embedding in JPEG Domain Jan Kodovský, Jessica Fridrich September 10, 2010 / ACM MM&Sec 10 1 / 17 Motivation Least Significant Bit (LSB) embedding Simplicity, high embedding

More information

arxiv: v1 [cs.cr] 31 Oct 2015

arxiv: v1 [cs.cr] 31 Oct 2015 Topological chaos and chaotic iterations Application to Hash functions Christophe Guyeux Jacques M. Bahi, Senior Member IEEE arxiv:1511.00117v1 [cs.cr] 31 Oct 2015 Abstract This paper introduces a new

More information

A Piggybank Protocol for Quantum Cryptography

A Piggybank Protocol for Quantum Cryptography Piggybank Protocol for Quantum Cryptography Navya Chodisetti bstract This paper presents a quantum mechanical version of the piggy-bank cryptography protocol. The basic piggybank cryptography idea is to

More information

A Comparative Study of Non-separable Wavelet and Tensor-product. Wavelet; Image Compression

A Comparative Study of Non-separable Wavelet and Tensor-product. Wavelet; Image Compression Copyright c 007 Tech Science Press CMES, vol., no., pp.91-96, 007 A Comparative Study o Non-separable Wavelet and Tensor-product Wavelet in Image Compression Jun Zhang 1 Abstract: The most commonly used

More information

Efficient Arnold and Singular Value Decomposition based Chaotic Image Encryption

Efficient Arnold and Singular Value Decomposition based Chaotic Image Encryption Efficient and Singular Value ecomposition based Chaotic Encryption Ashraf Afifi epartment of Computer Engineering Computers and Information Technology college Taif University, Al-Hawiya 974, Kingdom of

More information

Reduced-Error Constant Correction Truncated Multiplier

Reduced-Error Constant Correction Truncated Multiplier This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. IEICE Electronics Express, Vol.*, No.*, 1 8 Reduced-Error Constant Correction Truncated

More information

19. Coding for Secrecy

19. Coding for Secrecy 19. Coding for Secrecy 19.1 Introduction Protecting sensitive information from the prying eyes and ears of others is an important issue today as much as it has been for thousands of years. Government secrets,

More information

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Navdeep Goel 1,a, Gurwinder Singh 2,b 1ECE Section, Yadavindra College of Engineering, Talwandi Sabo 2Research Scholar,

More information

Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability

Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability Anindya Sarkar, Kaushal Solanki and and B. S. Manjunath Department of Electrical and Computer Engineering, University

More information

Exact Solutions for Generalized Klein-Gordon Equation

Exact Solutions for Generalized Klein-Gordon Equation Journal of Informatics and Mathematical Sciences Volume 4 (0), Number 3, pp. 35 358 RGN Publications http://www.rgnpublications.com Exact Solutions for Generalized Klein-Gordon Equation Libo Yang, Daoming

More information

Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key

Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key Home Search Collections Journals About Contact us My IOPscience Cryptosystem based on two-step phase-shifting interferometry and the RSA public-key encryption algorithm This content has been downloaded

More information

Scheme for Asymmetric and Deterministic Controlled Bidirectional Joint Remote State Preparation

Scheme for Asymmetric and Deterministic Controlled Bidirectional Joint Remote State Preparation Commun. Theor. Phys. 70 (208) 55 520 Vol. 70, No. 5, November, 208 Scheme for Asymmetric and Deterministic Controlled Bidirectional Joint Remote State Preparation Jin Shi ( 施锦 ) and You-Bang Zhan ( 詹佑邦

More information

Limitations on transversal gates

Limitations on transversal gates Limitations on transversal gates Michael Newman 1 and Yaoyun Shi 1,2 University of Michigan 1, Alibaba Group 2 February 6, 2018 Quantum fault-tolerance Quantum fault-tolerance Quantum fault-tolerance Quantum

More information

Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix

Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix Tamkang Journal of Science and Engineering, Vol. 10, No. 3, pp. 211220 (2007) 211 Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix Ching-Tang Hsieh 1 *, Yeh-Kuang Wu 1 and

More information

Research and prospect of reversible data hiding method with contrast enhancement

Research and prospect of reversible data hiding method with contrast enhancement 4 Vol. No.4 016 4 Chinese Journal of Network and Information Security April 016 1 1 1 1 1 1. 3007. 30039 TP393 A doi: 10.11959/.issn.096-109x.016.00045 Research and prospect of reversible data hiding method

More information

Breaking an encryption scheme based on chaotic Baker map

Breaking an encryption scheme based on chaotic Baker map Breaking an encryption scheme based on chaotic Baker map Gonzalo Alvarez a, and Shujun Li b a Instituto de Física Aplicada, Consejo Superior de Investigaciones Científicas, Serrano 144 28006 Madrid, Spain

More information

The Journal of MacroTrends in Technology and Innovation

The Journal of MacroTrends in Technology and Innovation MACROJOURNALS The Journal of MacroTrends in Technology and Innovation Digital Watermarking Model for CityGML Jongweon Kim Department of Electronics Engineering, Sangmyung University, Hongjimun2-gil, Jongno-gu,

More information

MINIMIZING ADDITIVE DISTORTION FUNCTIONS WITH NON-BINARY EMBEDDING OPERATION IN STEGANOGRAPHY. Tomáš Filler and Jessica Fridrich

MINIMIZING ADDITIVE DISTORTION FUNCTIONS WITH NON-BINARY EMBEDDING OPERATION IN STEGANOGRAPHY. Tomáš Filler and Jessica Fridrich MINIMIZING ADDITIVE DISTORTION FUNCTIONS WITH NON-BINARY EMBEDDING OPERATION IN STEGANOGRAPHY Tomáš Filler and Jessica Fridrich Department of ECE, SUNY Binghamton, NY, USA {tomas.filler, fridrich}@binghamton.edu

More information

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate

More information

On LSB Spatial Domain Steganography and Channel Capacity

On LSB Spatial Domain Steganography and Channel Capacity Naval Research Laboratory Washington, DC 20375-5320 NRL/MR/5540--08-9118 On LSB Spatial Domain Steganography and Channel Capacity Ir a S. Mo s k o w i t z Center for High Assurance Computer Systems Information

More information

Hidden Number Problem Given Bound of Secret Jia-ning LIU and Ke-wei LV *

Hidden Number Problem Given Bound of Secret Jia-ning LIU and Ke-wei LV * 2017 2nd International Conference on Artificial Intelligence: Techniques and Applications (AITA 2017) ISBN: 978-1-60595-491-2 Hidden Number Problem Given Bound of Secret Jia-ning LIU and Ke-wei LV * DCS

More information

Multiparty Quantum Remote Control

Multiparty Quantum Remote Control Multiparty Quantum Remote Control Yu-Ting Chen and Tzonelih Hwang Abstract This paper proposes a multiparty quantum remote control (MQRC) protocol, which allows several controllers to perform remote operations

More information

Bidirectional quantum teleportation and secure direct communication via entanglement swapping

Bidirectional quantum teleportation and secure direct communication via entanglement swapping Bidirectional quantum teleportation and secure direct communication via entanglement swapping Shima Hassanpour a, and Monireh Houshmand b a MS Student, Department of Electrical Engineering, Imam Reza International

More information

Image Interpolation Using Kriging Technique for Spatial Data

Image Interpolation Using Kriging Technique for Spatial Data Image Interpolation Using Kriging Technique for Spatial Data Firas Ajil Jassim, Fawzi Hasan Altaany Abstract Image interpolation has been used spaciously by customary interpolation techniques. Recently,

More information

Image Compression. Qiaoyong Zhong. November 19, CAS-MPG Partner Institute for Computational Biology (PICB)

Image Compression. Qiaoyong Zhong. November 19, CAS-MPG Partner Institute for Computational Biology (PICB) Image Compression Qiaoyong Zhong CAS-MPG Partner Institute for Computational Biology (PICB) November 19, 2012 1 / 53 Image Compression The art and science of reducing the amount of data required to represent

More information

New Construction of Single Cycle T-function Families

New Construction of Single Cycle T-function Families New Construction of Single Cycle T-function Families Shiyi ZHANG 1, Yongjuan WANG, Guangpu GAO Luoyang Foreign Language University, Luoyang, Henan Province, China Abstract The single cycle T-function is

More information

during transmission safeguard information Cryptography: used to CRYPTOGRAPHY BACKGROUND OF THE MATHEMATICAL

during transmission safeguard information Cryptography: used to CRYPTOGRAPHY BACKGROUND OF THE MATHEMATICAL THE MATHEMATICAL BACKGROUND OF CRYPTOGRAPHY Cryptography: used to safeguard information during transmission (e.g., credit card number for internet shopping) as opposed to Coding Theory: used to transmit

More information

CSE 123: Computer Networks

CSE 123: Computer Networks CSE 123: Computer Networks Total points: 40 Homework 1 - Solutions Out: 10/4, Due: 10/11 Solutions 1. Two-dimensional parity Given below is a series of 7 7-bit items of data, with an additional bit each

More information

Accurate Orthogonal Circular Moment Invariants of Gray-Level Images

Accurate Orthogonal Circular Moment Invariants of Gray-Level Images Journal of Computer Science 7 (5): 75-722, 20 ISSN 549-3636 20 Science Publications Accurate Orthogonal Circular Moment Invariants of Gray-Level Images Khalid Mohamed Hosny Department of Computer Science,

More information