A secure controlled quantum image steganography algorithm

被引:0
作者
Zhiguo Qu
Siyi Chen
Xiaojun Wang
机构
[1] Nanjing University of Information Science and Technology,Engineering Research Center of Digital Forensics, Ministry of Education
[2] Nanjing University of Information Science and Technology,Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology
[3] Beijing University of Posts and Telecommunications,Information Security Center, State Key Laboratory of Networking and Switching Technology
[4] Dublin City University,School of Electronic Engineering
来源
Quantum Information Processing | 2020年 / 19卷
关键词
Controlled flexible representation for quantum image; Controlled quantum image steganography; Security; Imperceptibility; Identity authentication;
D O I
暂无
中图分类号
学科分类号
摘要
A novel controlled flexible representation for quantum image(CFRQI) is firstly proposed in this paper based on flexible representation for quantum image (FRQI). The proposed CFRQI is able to effectively help the sender control the whole process of information transmission for better information security. Next, a novel secure controlled quantum image steganography algorithm is proposed by making full use of controlled access mechanism that comes with CFRQI. Compared with the previous quantum steganography algorithms, the new algorithm can make the sender control whether the receiver is enabled to correctly receive secret information or not for better imperceptibility. And it also can achieve better security by introducing the controlled access mechanism as an identity authentication system without the need of auxiliary information. Good applicability of the new algorithm is proved by the quantum circuits of embedding and extracting processes that are designed to implement. Furthermore, the new algorithm can effectively resist the phase-damping and amplitude-damping noises in quantum channel through theoretical analysis. Finally, the simulation experiment results are presented to prove our conclusions.
引用
收藏
相关论文
共 93 条
  • [1] Chen XY(2017)Coverless information hiding method based on the Chinese character encoding J. Inter. Technol. 18 313-320
  • [2] Chen S(2014)Steganalysis of least significant bit matching using multi-order differences Secur. Commun. Netw. 7 1283-1291
  • [3] Wu YL(2016)Effective and efficient image copy detection with resistance to arbitrary rotation IEICE Trans. Inform. Syst. E99–D 1531-1540
  • [4] Xia ZH(2016)A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing IEEE Trans. Inf. Forensics Secur. 11 2594-2608
  • [5] Wang XH(2010)A flexible representation of quantum images for polynomial preparation, image compression and processing operations Quant. Inf. Process. 10 63-84
  • [6] Sun XM(2014)Quantum Computation-Based Image Representation. Processing Operations and Their Applications Entropy 16 5290-5338
  • [7] Wang BW(2017)Quantum image processing: a review of advances in its security technologies Int. J. Quant. Inform. 15 1730001-35
  • [8] Zhou ZL(2016)A survey of quantum image representations Quant. Inf. Process. 15 1-149
  • [9] Yang CN(2017)Quantum image processing Quant. Inf. Process. 16 27-149
  • [10] Chen BJ(2014)Multi-channel information operations on quantum images Adv. Comput. Intell. Intell. Inf. 18 140-513