A quantum watermarking scheme using simple and small-scale quantum circuits

2016 ◽  
Vol 15 (5) ◽  
pp. 1849-1864 ◽  
Author(s):  
S. Miyake ◽  
K. Nakamae
2018 ◽  
Vol 16 (07) ◽  
pp. 1850058 ◽  
Author(s):  
Ri-Gui Zhou ◽  
Wen Wen Hu ◽  
Gao Feng Luo ◽  
Ping Fan ◽  
Hou Ian

Based on the NEQR representation of quantum grayscale images and binary images, the optimal LSBs-based quantum watermarking scheme is investigated in this paper, which embeds several binary images (watermark images) into a grayscale image (cover image). The size of the cover image and secret image are both assumed to be [Formula: see text]. Compared to quantum simple LSBs substitution method generating one stego-pixel, our presented quantum optimal LSBs-based method can generate three stego-pixel simultaneously first. Then one of them with lowest visual distortion is chosen as the final stego-pixel. To this end, first of all, the quantum circuits for a few basic quantum modules (i.e. Quantum Comparator, Parallel CNOT, Parallel Swap, ADDER MOD, Subtracter (SUB.ER) MOD and Absolute Value) are predefined. Following that, based on these simple modules, two composite quantum modules (i.e. the ADDER and SUB.ER MOD [Formula: see text] module and Choose final stego-pixel module) are further constructed. With the help of the basic and composite quantum modules, the integrated quantum circuit implementation of the optimal LSBs-based quantum watermark images embedding/extracting procedures are illustrated. Then, the experiment result are simulated under the classical computer software MATLAB 2014(b), which illustrates our presented optimal LSBs-based quantum watermarking methods are superior to the simple LSBs scheme in terms of PSNR and histogram graphs on the basis of visual effect, and the circuit’s complexity analysis also demonstrates our investigated scheme with a very low computational complexity. Finally, we analyze the security of quantum cryptography system, which verifies the quantum watermarking data can be securely transmitted to other legal normal users.


2016 ◽  
Vol 66 (1) ◽  
pp. 66-76 ◽  
Author(s):  
Zhan-Hong Wei ◽  
Xiu-Bo Chen ◽  
Shu-Jiang Xu ◽  
Xin-Xin Niu ◽  
Yi-Xian Yang

Optik ◽  
2017 ◽  
Vol 139 ◽  
pp. 77-86 ◽  
Author(s):  
Mosayeb Naseri ◽  
Shahrokh Heidari ◽  
Masoud Baghfalaki ◽  
Negin fatahi ◽  
Reza Gheibi ◽  
...  

Author(s):  
Noboru Kunihiro

Abstract It is known that Shor’s algorithm can break many cryptosystems such as RSA encryption, provided that large-scale quantum computers are realized. Thus far, several experiments for the factorization of the small composites such as 15 and 21 have been conducted using small-scale quantum computers. In this study, we investigate the details of quantum circuits used in several factoring experiments. We then indicate that some of the circuits have been constructed under the condition that the order of an element modulo a target composite is known in advance. Because the order must be unknown in the experiments, they are inappropriate for designing the quantum circuit of Shor’s factoring algorithm. We also indicate that the circuits used in the other experiments are constructed by relying considerably on the target composite number to be factorized.


2017 ◽  
Vol 57 (4) ◽  
pp. 1120-1131 ◽  
Author(s):  
Ri-Gui Zhou ◽  
Yang Zhou ◽  
Changming Zhu ◽  
Lai Wei ◽  
Xiafen Zhang ◽  
...  

2019 ◽  
Vol 42 ◽  
Author(s):  
William Buckner ◽  
Luke Glowacki

Abstract De Dreu and Gross predict that attackers will have more difficulty winning conflicts than defenders. As their analysis is presumed to capture the dynamics of decentralized conflict, we consider how their framework compares with ethnographic evidence from small-scale societies, as well as chimpanzee patterns of intergroup conflict. In these contexts, attackers have significantly more success in conflict than predicted by De Dreu and Gross's model. We discuss the possible reasons for this disparity.


2000 ◽  
Vol 179 ◽  
pp. 403-406
Author(s):  
M. Karovska ◽  
B. Wood ◽  
J. Chen ◽  
J. Cook ◽  
R. Howard

AbstractWe applied advanced image enhancement techniques to explore in detail the characteristics of the small-scale structures and/or the low contrast structures in several Coronal Mass Ejections (CMEs) observed by SOHO. We highlight here the results from our studies of the morphology and dynamical evolution of CME structures in the solar corona using two instruments on board SOHO: LASCO and EIT.


Sign in / Sign up

Export Citation Format

Share Document