A secure controlled quantum image steganography algorithm

被引:35
作者
Qu, Zhiguo [1 ,2 ]
Chen, Siyi [3 ]
Wang, Xiaojun [4 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Minist Educ, Engn Res Ctr Digital Forens, Nanjing, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Jiangsu Collaborat Innovat Ctr Atmospher Environm, Nanjing, Peoples R China
[3] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Informat Secur Ctr, Beijing, Peoples R China
[4] Dublin City Univ, Sch Elect Engn, Dublin, Ireland
基金
中国国家自然科学基金;
关键词
Controlled flexible representation for quantum image; Controlled quantum image steganography; Security; Imperceptibility; Identity authentication; WATERMARKING SCHEME; REPRESENTATION; AUTHENTICATION; STEGANALYSIS; OPERATIONS;
D O I
10.1007/s11128-020-02882-4
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
A novel controlled flexible representation for quantum image(CFRQI) is firstly proposed in this paper based on flexible representation for quantum image (FRQI). The proposed CFRQI is able to effectively help the sender control the whole process of information transmission for better information security. Next, a novel secure controlled quantum image steganography algorithm is proposed by making full use of controlled access mechanism that comes with CFRQI. Compared with the previous quantum steganography algorithms, the new algorithm can make the sender control whether the receiver is enabled to correctly receive secret information or not for better imperceptibility. And it also can achieve better security by introducing the controlled access mechanism as an identity authentication system without the need of auxiliary information. Good applicability of the new algorithm is proved by the quantum circuits of embedding and extracting processes that are designed to implement. Furthermore, the new algorithm can effectively resist the phase-damping and amplitude-damping noises in quantum channel through theoretical analysis. Finally, the simulation experiment results are presented to prove our conclusions.
引用
收藏
页数:25
相关论文
共 28 条
  • [11] A flexible representation of quantum images for polynomial preparation, image compression, and processing operations
    Le, Phuc Q.
    Dong, Fangyan
    Hirota, Kaoru
    [J]. QUANTUM INFORMATION PROCESSING, 2011, 10 (01) : 63 - 84
  • [12] Quantum image processing?
    Mastriani, Mario
    [J]. QUANTUM INFORMATION PROCESSING, 2017, 16 (01)
  • [13] A quantum watermarking scheme using simple and small-scale quantum circuits
    Miyake, S.
    Nakamae, K.
    [J]. QUANTUM INFORMATION PROCESSING, 2016, 15 (05) : 1849 - 1864
  • [14] Qu ZG, 2017, INT J THEOR PHYS, V52, P2
  • [15] Dynamic watermarking scheme for quantum images based on Hadamard transform
    Song, Xianhua
    Wang, Shen
    Abd El-Latif, Ahmed A.
    Niu, Xiamu
    [J]. MULTIMEDIA SYSTEMS, 2014, 20 (04) : 379 - 388
  • [16] An RGB Multi-Channel Representation for Images on Quantum Computers
    Sun, Bo
    Iliyasu, Abdullah M.
    Yan, Fei
    Dong, Fangyan
    Hirota, Kaoru
    [J]. JOURNAL OF ADVANCED COMPUTATIONAL INTELLIGENCE AND INTELLIGENT INFORMATICS, 2013, 17 (03) : 404 - 417
  • [17] Multi-Channel Information Operations on Quantum Images
    Sun, Bo
    Iliyasu, Abdullah M.
    Yan, Fei
    Sanchez, Jesus A. Garcia
    Dong, Fangyan
    Al-Asmari, Awad Kh
    Hirota, Kaoru
    [J]. JOURNAL OF ADVANCED COMPUTATIONAL INTELLIGENCE AND INTELLIGENT INFORMATICS, 2014, 18 (02) : 140 - 149
  • [18] Storing, processing and retrieving an image using quantum mechanics
    Venegas-Andraca, SE
    Bose, S
    [J]. QUANTUM INFORMATION AND COMPUTATION, 2003, 5105 : 137 - 147
  • [19] Least significant qubit (LSQb) information hiding algorithm for quantum image
    Wang, Shen
    Sang, Jianzhi
    Song, Xianhua
    Niu, Xiamu
    [J]. MEASUREMENT, 2015, 73 : 352 - 359
  • [20] A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing
    Xia, Zhihua
    Wang, Xinhui
    Zhang, Liangao
    Qin, Zhan
    Sun, Xingming
    Ren, Kui
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (11) : 2594 - 2608