Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

被引:8
|
作者
AL-Salhi, Yahya E. A. [1 ]
Lu, Songfeng [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum steganography; Quantum Fourier Transforms; LSQu-block; Probabilistic clustering; LSQS; NEQR; REPRESENTATION;
D O I
10.1007/s10773-016-3001-3
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.
引用
收藏
页码:3722 / 3736
页数:15
相关论文
共 50 条
  • [1] Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm
    Yahya E. A. AL-Salhi
    Songfeng Lu
    [J]. International Journal of Theoretical Physics, 2016, 55 : 3722 - 3736
  • [2] An Information Theoretic Image Steganalysis for LSB Steganography
    Chhikara, Sonam
    Kumar, Rajeev
    [J]. ACTA CYBERNETICA, 2020, 24 (04): : 593 - 612
  • [3] Image steganography and steganalysis
    Bachrach, Mayra
    Shih, Frank Y.
    [J]. WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2011, 3 (03): : 251 - 259
  • [4] Universal Blind Steganalysis of Parity and Substitution Based Image Steganography Algorithm
    Patel, Chiragkumar B.
    Shah, Devangkumar U.
    Prajapati, Anjulkumari
    [J]. WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2017, VOL I, 2017, : 436 - 441
  • [5] Information theoretic steganalysis of processed image LSB steganography
    Chhikara, Sonam
    Kumar, Rajeev
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (09) : 13595 - 13615
  • [6] LSB Based Quantum Image Steganography Algorithm
    Jiang, Nan
    Zhao, Na
    Wang, Luo
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2016, 55 (01) : 107 - 123
  • [7] Information theoretic steganalysis of processed image LSB steganography
    Sonam Chhikara
    Rajeev Kumar
    [J]. Multimedia Tools and Applications, 2023, 82 : 13595 - 13615
  • [8] LSB Based Quantum Image Steganography Algorithm
    Nan Jiang
    Na Zhao
    Luo Wang
    [J]. International Journal of Theoretical Physics, 2016, 55 : 107 - 123
  • [9] Quantum Image Steganography Protocol Based on Quantum Image Expansion and Grover Search Algorithm
    Qu, Zhiguo
    Li, Zhengyan
    Xu, Gang
    Wu, Shengyao
    Wang, Xiaojun
    [J]. IEEE ACCESS, 2019, 7 : 50849 - 50857
  • [10] Technology of Image Steganography and Steganalysis Based on Adversarial Training
    Zhang, Han
    Song, Zhihua
    Feng, Boyu
    Zhou, Zhongliang
    Liu, Fuxian
    [J]. 2020 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2020), 2020, : 77 - 80