Quantum meaningful visual cryptography

被引:1
|
作者
Zhao, Meng-Yuan [1 ]
Yan, Bin [1 ]
Pan, Jeng-Shyang [2 ]
Yang, Hong-Mei [2 ]
机构
[1] Shandong Univ Sci & Technol, Coll Elect & Informat Engn, Qingdao 266590, Shandong, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Shandong, Peoples R China
关键词
Meaningful share image; Quantum visual cryptography; Single-pixel parallel processing; n-qubit OR operation; ENTANGLEMENT;
D O I
10.1007/s11128-023-04066-2
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The quantum visual encryption scheme utilizes quantum property to encrypt secret information, which increases the security of secret information. However, its share images are meaningless noisy images. Therefore, the share image is vulnerable to be attacked after quantum measurement. To further improve the security of image data transmission, we propose a (n, n) quantum meaningful visual encryption scheme. The scheme consists of two phases, the encryption phase and the recovery phase. The secret image is a binary image and n cover images are halftone images. In the encryption phase, either the secret image pixel or the cover image pixel is randomly selected for encryption by a quantum selection circuit. The color information of each pixel of the secret image and the cover image is then encoded as n-qubit superposition state. Finally, these qubits are divided among the n participants. In the recovery stage, n participants work together to collect all the qubits of each pixel and perform n-qubit OR operation to recover the secret information. Simulations were carried out to verify the feasibility of this scheme. The share images in this scheme are meaningful and retain the advantage of single-pixel parallel processing.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Quantum meaningful visual cryptography
    Meng-Yuan Zhao
    Bin Yan
    Jeng-Shyang Pan
    Hong-Mei Yang
    Quantum Information Processing, 22
  • [2] Quantum Erasure Cryptography
    Salih, Hatim
    FRONTIERS IN PHYSICS, 2016, 4
  • [3] Optimization problem in quantum cryptography
    Brandt, HE
    JOURNAL OF OPTICS B-QUANTUM AND SEMICLASSICAL OPTICS, 2003, 5 (06) : S557 - S560
  • [4] Quantum computation and cryptography: An overview
    Calixto M.
    Natural Computing, 2009, 8 (4) : 663 - 679
  • [5] Review of Security Methods Based on Classical Cryptography and Quantum Cryptography
    Subramani, Shalini
    Selvi, M.
    Kannan, A.
    Svn, Santhosh Kumar
    CYBERNETICS AND SYSTEMS, 2025, 56 (03) : 302 - 320
  • [6] Semi-quantum cryptography
    Iqbal, Hasan
    Krawec, Walter O.
    QUANTUM INFORMATION PROCESSING, 2020, 19 (03)
  • [7] Quantum cryptography with structured photons
    Forbes, Andrew
    Youssef, Mostafa
    Singh, Sachleen
    Nape, Isaac
    Ung, Bora
    APPLIED PHYSICS LETTERS, 2024, 124 (11)
  • [8] Quantum asymmetric cryptography with symmetric keys
    Fei Gao
    QiaoYan Wen
    SuJuan Qin
    FuChen Zhu
    Science in China Series G: Physics, Mechanics and Astronomy, 2009, 52 : 1925 - 1931
  • [9] Quantum asymmetric cryptography with symmetric keys
    GAO Fei1
    2 National Laboratory for Modern Communications
    Science China(Physics,Mechanics & Astronomy), 2009, (12) : 1925 - 1931
  • [10] Quantum asymmetric cryptography with symmetric keys
    Gao Fei
    Wen QiaoYan
    Qin SuJuan
    Zhu FuChen
    SCIENCE IN CHINA SERIES G-PHYSICS MECHANICS & ASTRONOMY, 2009, 52 (12): : 1925 - 1931