Exploring the Implementation of Steganography Protocols on Quantum Audio Signals

被引:28
作者
Chen, Kehan [1 ]
Yan, Fei [1 ]
Iliyasu, Abdullah M. [2 ]
Zhao, Jianping [1 ]
机构
[1] Changchun Univ Sci & Technol, Sch Comp Sci & Technol, 7089 Weixing Rd, Changchun 130022, Jilin, Peoples R China
[2] Prince Sattam Bin Abdulaziz Univ, Coll Engn, Al Kharj 11942, Saudi Arabia
基金
中国国家自然科学基金;
关键词
Quantum computation; Quantum information; Quantum audio; Audio steganography; Least significant qubit; IMAGE; REPRESENTATION;
D O I
10.1007/s10773-017-3580-7
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Two quantum audio steganography (QAS) protocols are proposed, each of which manipulates or modifies the least significant qubit (LSQb) of the host quantum audio signal that is encoded as an FRQA (flexible representation of quantum audio) audio content. The first protocol (i.e. the conventional LSQb QAS protocol or simply the cLSQ stego protocol) is built on the exchanges between qubits encoding the quantum audio message and the LSQb of the amplitude information in the host quantum audio samples. In the second protocol, the embedding procedure to realize it implants information from a quantum audio message deep into the constraint-imposed most significant qubit (MSQb) of the host quantum audio samples, we refer to it as the pseudo MSQb QAS protocol or simply the pMSQ stego protocol. The cLSQ stego protocol is designed to guarantee high imperceptibility between the host quantum audio and its stego version, whereas the pMSQ stego protocol ensures that the resulting stego quantum audio signal is better immune to illicit tampering and copyright violations (a.k.a. robustness). Built on the circuit model of quantum computation, the circuit networks to execute the embedding and extraction algorithms of both QAS protocols are determined and simulation-based experiments are conducted to demonstrate their implementation. Outcomes attest that both protocols offer promising trade-offs in terms of imperceptibility and robustness.
引用
收藏
页码:476 / 494
页数:19
相关论文
共 22 条
[1]  
[Anonymous], ARXIV170101291
[2]   Increasing robustness of LSB audio steganography using a novel embedding method [J].
Cvejic, N ;
Seppänen, T .
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, :533-537
[3]   QUANTUM-THEORY, THE CHURCH-TURING PRINCIPLE AND THE UNIVERSAL QUANTUM COMPUTER [J].
DEUTSCH, D .
PROCEEDINGS OF THE ROYAL SOCIETY OF LONDON SERIES A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1985, 400 (1818) :97-117
[4]   SIMULATING PHYSICS WITH COMPUTERS [J].
FEYNMAN, RP .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 1982, 21 (6-7) :467-488
[5]  
Iliyasu Abdullah M., 2013, International Innovative Computing and Applications, V5, P85
[6]   Metric for Estimating Congruity between Quantum Images [J].
Iliyasu, Abdullah M. ;
Yan, Fei ;
Hirota, Kaoru .
ENTROPY, 2016, 18 (10)
[7]   Hybrid Quantum-Classical Protocol for Storage and Retrieval of Discrete-Valued Information [J].
Iliyasu, Abdullah M. ;
Venegas-Andraca, Salvador E. ;
Yan, Fei ;
Sayed, Ahmed .
ENTROPY, 2014, 16 (06) :3537-3551
[8]   Towards Realising Secure and Efficient Image and Video Processing Applications on Quantum Computers [J].
Iliyasu, Abdullah M. .
ENTROPY, 2013, 15 (08) :2874-2974
[9]   Watermarking and authentication of quantum images based on restricted geometric transformations [J].
Iliyasu, Abdullah M. ;
Le, Phuc Q. ;
Dong, Fangyan ;
Hirota, Kaoru .
INFORMATION SCIENCES, 2012, 186 (01) :126-149
[10]   A FRAMEWORK FOR REPRESENTING AND PRODUCING MOVIES ON QUANTUM COMPUTERS [J].
Iliyasu, Abdullah M. ;
Le, Phuc Q. ;
Dong, Fangyan ;
Hirota, Kaoru .
INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2011, 9 (06) :1459-1497