A secure controlled quantum image steganography algorithm

被引:0
|
作者
Zhiguo Qu
Siyi Chen
Xiaojun Wang
机构
[1] Nanjing University of Information Science and Technology,Engineering Research Center of Digital Forensics, Ministry of Education
[2] Nanjing University of Information Science and Technology,Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology
[3] Beijing University of Posts and Telecommunications,Information Security Center, State Key Laboratory of Networking and Switching Technology
[4] Dublin City University,School of Electronic Engineering
来源
关键词
Controlled flexible representation for quantum image; Controlled quantum image steganography; Security; Imperceptibility; Identity authentication;
D O I
暂无
中图分类号
学科分类号
摘要
A novel controlled flexible representation for quantum image(CFRQI) is firstly proposed in this paper based on flexible representation for quantum image (FRQI). The proposed CFRQI is able to effectively help the sender control the whole process of information transmission for better information security. Next, a novel secure controlled quantum image steganography algorithm is proposed by making full use of controlled access mechanism that comes with CFRQI. Compared with the previous quantum steganography algorithms, the new algorithm can make the sender control whether the receiver is enabled to correctly receive secret information or not for better imperceptibility. And it also can achieve better security by introducing the controlled access mechanism as an identity authentication system without the need of auxiliary information. Good applicability of the new algorithm is proved by the quantum circuits of embedding and extracting processes that are designed to implement. Furthermore, the new algorithm can effectively resist the phase-damping and amplitude-damping noises in quantum channel through theoretical analysis. Finally, the simulation experiment results are presented to prove our conclusions.
引用
收藏
相关论文
共 50 条
  • [1] A secure controlled quantum image steganography algorithm
    Qu, Zhiguo
    Chen, Siyi
    Wang, Xiaojun
    [J]. QUANTUM INFORMATION PROCESSING, 2020, 19 (10)
  • [2] Dual Layered Secure Algorithm for Image Steganography
    Gowda, Shreyank N.
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 22 - 24
  • [3] A secure controlled quantum image steganography scheme based on the multi-channel effective quantum image representation model
    Mubashar Khan
    Amer Rasheed
    [J]. Quantum Information Processing, 22
  • [4] A secure controlled quantum image steganography scheme based on the multi-channel effective quantum image representation model
    Khan, Mubashar
    Rasheed, Amer
    [J]. QUANTUM INFORMATION PROCESSING, 2023, 22 (07)
  • [5] Image Hiding Algorithm Based on Secure Steganography Mechanism
    Zhao, Lian
    Zhang, Yingzhou
    Wang, Xing
    Chen, Xinghao
    [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 122 - 129
  • [6] Image Steganography using RSA Algorithm for Secure Communication
    Preksha, B.
    Harish, Rishika
    Sreenivas, B.
    Vasanthalakshmi, M.
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON MOBILE NETWORKS AND WIRELESS COMMUNICATIONS (ICMNWC), 2021,
  • [7] LSB Based Quantum Image Steganography Algorithm
    Jiang, Nan
    Zhao, Na
    Wang, Luo
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2016, 55 (01) : 107 - 123
  • [8] LSB Based Quantum Image Steganography Algorithm
    Nan Jiang
    Na Zhao
    Luo Wang
    [J]. International Journal of Theoretical Physics, 2016, 55 : 107 - 123
  • [9] Quantum Image Steganography Protocol Based on Quantum Image Expansion and Grover Search Algorithm
    Qu, Zhiguo
    Li, Zhengyan
    Xu, Gang
    Wu, Shengyao
    Wang, Xiaojun
    [J]. IEEE ACCESS, 2019, 7 : 50849 - 50857
  • [10] Matrix Coding-Based Quantum Image Steganography Algorithm
    Qu, Zhiguo
    Cheng, Zhenwen
    Wang, Xiaojun
    [J]. IEEE ACCESS, 2019, 7 : 35684 - 35698