首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
Quantum watermarking is a technique which embeds the invisible quantum signal such as the owners identification into quantum multimedia data (such as audio, video and image) for copyright protection. In this paper, using a quantum representation of digital images a new quantum watermarking protocol including quantum image scrambling based on Least Significant Bit (LSB) is proposed. In this protocol, by using m-bit embedding key K1 and m-bit extracting key K2 a m-pixel gray scale image is watermarked in a m-pixel carrier image by the original owner of the carrier image. For validation of the presented scheme the peak-signal-to-noise ratio (PSNR) and histogram graphs of the images are analyzed.  相似文献   

3.
Quantum watermarking technology protects copyright by embedding invisible quantum signal in quantum multimedia data. In this paper, a watermarking scheme based on INEQR was presented. Firstly, the watermark image is extended to achieve the requirement of embedding carrier image. Secondly, the swap and XOR operation is used on the processed pixels. Since there is only one bit per pixel, XOR operation can achieve the effect of simple encryption. Thirdly, both the watermark image extraction and embedding operations are described, where the key image, swap operation and LSB algorithm are used. When the embedding is made, the binary image key is changed. It means that the watermark has been embedded. Of course, if the watermark image is extracted, the key’s state need detected. When key’s state is |1〉, this extraction operation is carried out. Finally, for validation of the proposed scheme, both the Signal-to-noise ratio (PSNR) and the security of the scheme are analyzed.  相似文献   

4.
Quantum watermarking is a technique to embed specific information, usually the owner's identification,into quantum cover data such for copyright protection purposes. In this paper, a new scheme for quantum watermarking based on quantum wavelet transforms is proposed which includes scrambling, embedding and extracting procedures. The invisibility and robustness performances of the proposed watermarking method is confirmed by simulation technique.The invisibility of the scheme is examined by the peak-signal-to-noise ratio(PSNR) and the histogram calculation.Furthermore the robustness of the scheme is analyzed by the Bit Error Rate(BER) and the Correlation Two-Dimensional(Corr 2-D) calculation. The simulation results indicate that the proposed watermarking scheme indicate not only acceptable visual quality but also a good resistance against different types of attack.  相似文献   

5.

The study explores the implementation of watermarking schemes for quantum audio signals based on quantum Discrete Cosine Transform (qDCT). Dual Quantum Audio Watermarking (QAW) schemes, i.e. QAW-I and QAW-II, are proposed by utilizing the property of strong energy compaction of the qDCT. The qDCT transforms the host quantum audio signal which is encoded as an FRQA (Flexible Representation for Quantum Audio) content from time to frequency domain. To retain the high imperceptibility of the dual QAW schemes, the quantum watermark is embedded into the high-frequency portions of host quantum audio signal after the qDCT operation. The circuit networks to execute the embedding and extraction procedures of QAW-I and QAW-II schemes are designed. In addition, simulation-based experiments are conducted to demonstrate their implementation and conclude their advantages in terms of imperceptibility and robustness.

  相似文献   

6.
This paper presents a Bell-dual-basis-based quantum watermarking protocol composed of three major algorithms: watermark embedding and extracting and the intercepting test. The first two are completed by using the entanglement swapping property of Bell dual basis and the test is accomplished through IBF protocol to guarantee its bottom security. The watermarking protocol is mainly designed for the protection of digital copyright in the existence of classical information. This design finds that the quality of digital contents is not damaged with its zero-watermark attributes when embedding watermarks.  相似文献   

7.

Quantum watermarking technology protects copyright by embedding an invisible quantum signal in quantum multimedia data. This paper proposes a two-bit superposition method which embeds a watermark image (or secret information) into a carrier image. Firstly, the bit-plane is used to encrypt the watermark image. At the same time, the quantum expansion method is used to extend the watermark image to the same size with the carrier image, and then the image is encrypted through the Fibonacci scramble method again. Secondly, the first proposed method is the two bits of the watermark image which is embedded into the carrier image in accordance with the order of the high and lowest qubit, and the second proposed method which is the high bit of the watermark image is embedded to the lowest bit. Then the lowest bit of the watermark image is embedded in carrier image. Third, the watermark image is extracted through 1-CNOT and swap gates, and the watermark image is restored by inverse Fibonacci scramble, inverse expansion method and inverse bit-plane scramble method. Finally, for the validation of the proposed scheme, the signal-to-noise ratio (PSNR), the image histogram and the robustness of the two watermarking methods are analyzed.

  相似文献   

8.
Cryptography is the essential subject for network information security to protect important data. Although following the symmetric cryptosystem for which the participations in the communication keep exactly the same keys, the special for the encryption and decryption algorithms proposed in this paper lays in the operational objectives, the quantum image. Firstly, extracts the properties of gray-scale and position from the quantum gray-scale image which the storage expression of image in quantum states is achieved. Along with the geometric transformations in classical images, this article realizes the quantum image geometric transforms by means of designing quantum circuits. Eventually, through a combination of the proposals in previous, the encryption and decryption algorithms on quantum gray-scale images is finally accomplished, which could ensure the confidentiality and security of the information in delivery. The algorithms belong to the application of quantum image geometric transformations, for further, the new explorations for quantum image cryptography researches.  相似文献   

9.
Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.  相似文献   

10.
One iterative in Grover's original quantum search algorithm consists of two Hadamard-Walsh transformations, a selective amplitude inversion and a diffusion amplitude inversion. We concentrate on the relation among the probability of success of the algorithm, the phase shifts, the number of target items and the number of iterations via replacing the two amplitude inversions by phase shifts of an arbitrary φ = ψ(0 ≤, ψ≤ 27r). Then, according to the relation we find out the optimal phase shifts when the number of iterations is given. We present a new quantum search algorithm based on the optimal phase shifts of 1.018 after 0.57π√M/N iterations. The new algorithm can obtain either a single target item or multiple target items in the search space with the probability of success at least 93.43%  相似文献   

11.
An interpretation of quantum mechanics is discussed. It is assumed that quantum is energy. An algorithm by means of the energy interpretation is discussed. An algorithm, based on the energy interpretation, for fast determining a homogeneous linear function f(x) := s.x = s 1 x 1 + s 2 x 2 + ? + s N x N is proposed. Here x = (x 1, … , x N ), x j R and the coefficients s = (s 1, … , s N ), s j N. Given the interpolation values \((f(1), f(2),...,f(N))=\vec {y}\), the unknown coefficients \(s = (s_{1}(\vec {y}),\dots , s_{N}(\vec {y}))\) of the linear function shall be determined, simultaneously. The speed of determining the values is shown to outperform the classical case by a factor of N. Our method is based on the generalized Bernstein-Vazirani algorithm to qudit systems. Next, by using M parallel quantum systems, M homogeneous linear functions are determined, simultaneously. The speed of obtaining the set of M homogeneous linear functions is shown to outperform the classical case by a factor of N × M.  相似文献   

12.
The paper is devoted to the problem of multivariate polynomial interpolation and its application to quantum secret sharing. We show that using quantum Fourier transform one can produce the protocol for quantum secret sharing distribution.  相似文献   

13.
一类基于ENO插值的守恒重映算法   总被引:5,自引:3,他引:2  
王永健  赵宁 《计算物理》2004,21(4):329-334
在大变形流体力学问题的数值模拟中,常常会涉及到计算网格的重分.基于不同网格的物理量传递便是所谓的重映技术.基于ENO插值的思想,发展了一类适用于任意网格的ENO守恒重映算法,并给出了数值结果.  相似文献   

14.
王兆清  李淑萍 《计算物理》2007,24(2):217-221
对多边形单元上平均值插值的误差进行分析,利用平均值插值形函数的性质和二元函数的Taylor展开式,证明平均值插值的误差估计不等式.给出平均值插值应用于凸域温度分布插值近似的算例,数值算例表明平均值插值能够表现出区域温度分布的特征.  相似文献   

15.
Two quantum audio steganography (QAS) protocols are proposed, each of which manipulates or modifies the least significant qubit (LSQb) of the host quantum audio signal that is encoded as an FRQA (flexible representation of quantum audio) audio content. The first protocol (i.e. the conventional LSQb QAS protocol or simply the cLSQ stego protocol) is built on the exchanges between qubits encoding the quantum audio message and the LSQb of the amplitude information in the host quantum audio samples. In the second protocol, the embedding procedure to realize it implants information from a quantum audio message deep into the constraint-imposed most significant qubit (MSQb) of the host quantum audio samples, we refer to it as the pseudo MSQb QAS protocol or simply the pMSQ stego protocol. The cLSQ stego protocol is designed to guarantee high imperceptibility between the host quantum audio and its stego version, whereas the pMSQ stego protocol ensures that the resulting stego quantum audio signal is better immune to illicit tampering and copyright violations (a.k.a. robustness). Built on the circuit model of quantum computation, the circuit networks to execute the embedding and extraction algorithms of both QAS protocols are determined and simulation-based experiments are conducted to demonstrate their implementation. Outcomes attest that both protocols offer promising trade-offs in terms of imperceptibility and robustness.  相似文献   

16.
This paper proposed a secure authenticated quantum video steganography protocol with large capacity. The new protocol can embed secret quantum information into carrier quantum video, and expand the embedding capacity to a large extent. It also manages to accomplish quantum information steganography process based on unique features of video as well as authentication mechanism for better security. Finally, the simulation experiment proves that the new protocol not only has good performance on imperceptibility and security, but also owns a large capacity.  相似文献   

17.
18.
We use the Clifford algebra technique (J. Math. Phys. 43:5782, 2002; J. Math. Phys. 44:4817, 2003), that is nilpotents and projectors which are binomials of the Clifford algebra objects γ a with the property {γ a ,γ b }+=2η ab , for representing quantum gates and quantum algorithms needed in quantum computers in a simple and an elegant way. We identify n-qubits with the spinor representations of the group SO(1,3) for a system of n spinors. Representations are expressed in terms of products of projectors and nilpotents; we pay attention also on the nonrelativistic limit. An algorithm for extracting a particular information out of a general superposition of 2 n qubit states is presented. It reproduces for a particular choice of the initial state the Grover’s algorithm (Proc. 28th Annual ACM Symp. Theory Comput. 212, 1996).  相似文献   

19.
Generative linguistic steganography encodes candidate words with conditional probability when generating text by language model, and then, it selects the corresponding candidate words to output according to the confidential message to be embedded, thereby generating steganographic text. The encoding techniques currently used in generative text steganography fall into two categories: fixed-length coding and variable-length coding. Because of the simplicity of coding and decoding and the small computational overhead, fixed-length coding is more suitable for resource-constrained environments. However, the conventional text steganography mode selects and outputs a word at one time step, which is highly susceptible to the influence of confidential information and thus may select words that do not match the statistical distribution of the training text, reducing the quality and concealment of the generated text. In this paper, we inherit the decoding advantages of fixed-length coding, focus on solving the problems of existing steganography methods, and propose a multi-time-step-based steganography method, which integrates multiple time steps to select words that can carry secret information and fit the statistical distribution, thus effectively improving the text quality. In the experimental part, we choose the GPT-2 language model to generate the text, and both theoretical analysis and experiments prove the effectiveness of the proposed scheme.  相似文献   

20.
As the prospect of commercial quantum computers turns ever more real in recent times, research in quantum algorithms becomes the center of attention. Due to the strong parallelism of quantum computing in Hilbert space, ordinarily intractable calculation problems could now be solved very efficiently with non-classical means. To exploit parallelism, creative quantum algorithms are required so that efficient quantum oracles can be tailor-designed to specific computation needs. Therefore, in the quest for quantum supremacy, quantum algorithms and their related applications are as important as the quantum computer hardware. This article covers the basic concepts of quantum computation and reviews some important quantum algorithms and their applications.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号