期刊文献+

一种安全的大容量量子图像水印协议 被引量:3

A Secure Quantum Watermark Protocol with Large Payload
下载PDF
导出
摘要 基于量子图像的柔性表示法,提出一种安全的量子水印协议,借助连分式算法以加强水印图像的不可见性。在协议执行过程中,只有产权方才能提取和恢复水印,既保证了水印图像安全,又提供了有效的版权证明。实验结果表明,相比传统水印协议,该协议的水印图像尺寸达到最大,并且嵌入容量提高了8倍,能够更好地度量协议执行的计算负载性能。 Based on the Flexible Representation for Quantum Image( FRQI),a secure quantum watermark protocol is proposed. The new protocol is enhanced in invisibility by making full use of continued-fraction algorithm. It is impossible for anyone except the copyrighter to extract and recover the water image during the protocol execution,which ensures the security of the watermark image,while also providing effective copyright certificate. Simulation results show that compared with the traditional watermark protocol,the size of watermark image reaches the maximum value and the capacity of the new protocol is expanded to eight times that of the previous protocols,and it can better measure the performance of the computation load that is executed by the protocol.
作者 季赛 陈思怡 瞿治国 JI Sai;CHEN Siyi;QU Zhiguo(School of Computer and Software,Nanjing University of Information Science and Technology, Nanjing 210044, China;Jiangsu Engineering Center of Network Monitoring,Nanjing 210044, China;Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology,Nanjing 210044, China)
出处 《计算机工程》 CAS CSCD 北大核心 2018年第5期234-239,共6页 Computer Engineering
基金 国家自然科学基金(60772072 61373131 61303039 61232016 61501247) 江苏高校优势学科建设工程项目(PAPD) 南京信息工程大学江苏省大气环境与装备技术协同创新中心项目(CICAEET)
关键词 量子信息 量子图像水印 连分式算法 不可见性 大容量 quantum information quantum image watermark continued-fraction algorithm invisibility high capacity
  • 相关文献

参考文献1

二级参考文献26

  • 1Bors A G, et al. Image watermarking using DCT domain constraints[J].Proc. Int. Conf. Image Process., 1996, 3: 231-234.
  • 2Cox I J, Kilian J, Leighton T, et al. Secure spread spectrum watermarking for multimedia[J].IEEE T. Image Process., 1997, 6: 1673-1687.
  • 3Lee J, Won C S. Authentication and correction of digital watermarking images[J].Electron. Lett., 1999, 35: 886-887.
  • 4Barni M, Bartolini F, Pava A. Improved wavelet-based watermarking through pixel-wise masking[J].IEEE T. Image Process., 2001, 10: 783-791.
  • 5Hsieh C T, Wu Y K. Digital image multiresolution watermark based on human visual system using error correcting code[J].Tamk. J. Sci. Eng., 2001, 4(3): 201-208.
  • 6Zhang F, Zhang X, Zhang H. Digital image watermarking capacity and detection error rate[J].Pattern Recogn. Lett., 2008, 28: 1-10.
  • 7Yaghmaee F, Jamzad M. Estimating watermarking capacity in gray scale images based on image complexity[J].EURASIP J. Adv. Signal Process., 2010, doi: 10.1155/2010/851920.
  • 8Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing [C]. P. IEEE. Int. Conf. Comput. Syst. Sig. Process., 1984, 175-179.
  • 9Gisin N, Ribordy G, Tittel W, et al. Quantum cryptography[J].Rev. Mod. Phys., 2002, 74(1): 145-195.
  • 10Hillery M, Bu zek V, Berthiaume A. Quantum secret sharing[J].Phys. Rev. A, 1999, 59: 1829.

共引文献7

同被引文献10

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部