• Chinese Journal of Quantum Electronics
  • Vol. 32, Issue 3, 263 (2015)
Ning WANG1、2、* and Song LIN1、2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    DOI: 10.3969/j.issn.1007-5461. 2015.03.002 Cite this Article
    WANG Ning, LIN Song. A watermarking strategy for quantum image based on least significant bit[J]. Chinese Journal of Quantum Electronics, 2015, 32(3): 263 Copy Citation Text show less
    References

    [1] Bors A G, et al. Image watermarking using DCT domain constraints [J]. Proc. Int. Conf. Image Process., 1996, 3: 231-234.

    [2] Cox I J, Kilian J, Leighton T, et al. Secure spread spectrum watermarking for multimedia [J]. IEEE T. Image Process., 1997, 6: 1673-1687.

    [3] Lee J, Won C S. Authentication and correction of digital watermarking images [J]. Electron. Lett., 1999, 35: 886-887.

    [4] Barni M, Bartolini F, Pava A. Improved wavelet-based watermarking through pixel-wise masking [J]. IEEE T. Image Process., 2001, 10: 783-791.

    [5] Hsieh C T, Wu Y K. Digital image multiresolution watermark based on human visual system using error correcting code [J]. Tamk. J. Sci. Eng., 2001, 4(3): 201-208.

    [6] Zhang F, Zhang X, Zhang H. Digital image watermarking capacity and detection error rate [J]. Pattern Recogn. Lett., 2008, 28: 1-10.

    [7] Yaghmaee F, Jamzad M. Estimating watermarking capacity in gray scale images based on image complexity [J]. EURASIP J. Adv. Signal Process., 2010, doi: 10.1155/2010/851920.

    [8] Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing [C]. P. IEEE. Int. Conf. Comput. Syst. Sig. Process., 1984, 175-179.

    [9] Gisin N, Ribordy G, Tittel W, et al. Quantum cryptography [J]. Rev. Mod. Phys., 2002, 74(1): 145-195.

    [10] Hillery M, Bu zek V, Berthiaume A. Quantum secret sharing [J]. Phys. Rev. A, 1999, 59: 1829.

    [11] Karlsson A, Koashi M, Imoto N. Quantum entanglement for secret sharing and secret splitting [J]. Phys. Rev. A, 1999, 59: 162.

    [13] Bostrom K, Felbinger T. Deterministic secure direct communication using entanglement [J]. Phys. Rev. Lett., 2002, 89: 187902.

    [14] Long G L, Wang C, Li Y S, et al. Quantum secure direct communication [J]. Sci. China-Phys. Mech. Astron., 2011, 41(4): 332-342.

    [17] Venegas-Andraca S E, Bose S. Storing, processing and retrieving an image using quantum mechanics [J]. Proc. SPIE. Conf. Quantum Inf. Comput., 2003, 5105: 137-147.

    [18] Latorre J I. Image compression and entanglement [OL]. arXiv: quant-ph/0510031., 2005.

    [19] Sun B, Le P Q, Iliyasu A M, et al. A multi-channel representation for images on quantum computers using the RGB color space [C]. P. IEEE 7th Int. Sympo. Intell. Sign. Process., 2011, 160-165.

    [20] Le P Q, Dong F Y, Hirota K. A flexible representation of quantum images for polynomial preparation, image compression and processing operations [J]. Quantum Inf. Process., 2010, 10(1): 63-84.

    [21] Le P Q, Iliyasu A M, Dong F, et al. Fast geometric transformations on quantum images [J]. IAENG Int. J. Appl. Math., 2010, 40(3): 113-123.

    [22] Iliyasu A M, Phuc Q L, Dong F Y, et al. Watermarking and authentication of quantum images based on restricted geometric transformations [J]. Inf. Sci., 2011, 186: 126-149.

    [23] Zhang W W, Gao F, Liu B, et al. A quantum watermark protocol [J]. Int. J. Theor. Phys., 2012, 52: 504-513.

    [24] Zhang W W, Gao F,et al. A watermark strategy for quantum images based on quantum Fourier transform [J]. Quantum Inf. Process., 2012, 12: 793-803.

    [25] Yang Y G, Jia X, Xu P, et al. Analysis and improvement of the watermark strategy for quantum images based on quantum Fourier transform [J]. Quantum Inf. Process., 2013, 12: 2765-2769.

    [26] Zhou R G, Wu Q, Zhang M Q, et al. Quantum image encryption and decryption algorithms based on quantum image geometric transformations [J]. Int. J. Theor. Phys., 2012, 52: 1802-1817.

    WANG Ning, LIN Song. A watermarking strategy for quantum image based on least significant bit[J]. Chinese Journal of Quantum Electronics, 2015, 32(3): 263
    Download Citation