Skip to main content

A Robust Quantum Watermark Algorithm Based on Quantum Log-Polar Images

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10603))

Included in the following conference series:

  • 2619 Accesses

Abstract

Copyright protection for quantum image is an important research branch of quantum information technology. In this paper, based on quantum log-polar image (QUALPI), a new quantum watermark algorithm is proposed to better protect copyright of quantum image. In order to realize quantum watermark embedding, the least significant qubit (LSQb) of quantum carrier image is replaced by quantum watermark image. Compared to previous quantum watermark algorithms, the new algorithm effectively utilizes two important properties of log-polar sampling, i.e., rotation and scale invariances. These invariances make quantum watermark image extracted have a good robustness when stego image was subjected to various geometric attacks, such as rotation and scaling. Experimental simulation based on MATLAB shows that the new algorithm has a good performance on robustness, transparency and capacity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
€32.70 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 85.59
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 105.49
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Venegas-Andraca, S.E., Bose, S.: Storing, processing and retrieving an image using quantum mechanics. In: Proceedings of the SPIE Conference on Quantum Information and Computation, vol. 5105, pp. 1085–1090 (2003)

    Google Scholar 

  2. Venegas-Andraca, S.E., Ball, J.L., Burnett, K., Bose, S.: Processing images in entangled quantum systems. Quantum Inf. Process. 9, 1–11 (2004)

    Article  MathSciNet  Google Scholar 

  3. Latorre, J.I.: Image compression and entanglement. Computer Science (2005)

    Google Scholar 

  4. Le, P.Q., Dong, F.Y., Hirota, K.: A flexible representation of quantum images for polynomial preparation, image compression, and processing operations. Quantum Inf. Process. 10, 63–84 (2011)

    Article  MATH  MathSciNet  Google Scholar 

  5. Zhang, Y., Lu, K., Gao, Y.H.: NEQR: a novel enhanced quantum representation of digital images. Quantum Inf. Process. 12, 2833–2860 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  6. Zhang, Y., Lu, K., Gao, Y.H., Xu, K.: A novel quantum representation for log-polar images. Quantum Inf. Process. 12, 3103–3126 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  7. Sang, J.Z., Wang, S., Li, Q.: A novel quantum representation for color digital images. Quantum Inf. Process. 16, 16–42 (2016)

    MathSciNet  Google Scholar 

  8. Chen, B.J., Shu, H.Z., Coatrieux, G., Chen, G., Sun, X.M., Coatrieux, J.L.: Color image analysis by quaternion-type moments. J. Math. Imaging Vis. 51, 124–144 (2015)

    Article  MATH  MathSciNet  Google Scholar 

  9. Xia, Z.H., Wang, X.H., Zhang, L.G., Qin, Z., Sun, X.M., Ren, K.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11, 2594–2608 (2016)

    Article  Google Scholar 

  10. Wang, J.W., Li, T., Shi, Y.Q., Lian, S.G., Ye, J.Y.: Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimedia Tools Appl. 1–17 (2016)

    Google Scholar 

  11. Yang, Y.G., Jia, X., Xu, P., Tian, J.: Analysis and improvement of the watermark strategy for quantum images based on quantum Fourier transform. Quantum Inf. Process. 12, 793–803 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  12. Song, X.H., Wang, S., Liu, S., El-Latif, A.A., Niu, X.M.: A dynamic watermarking scheme for quantum images using quantum wavelet transform. Quantum Inf. Process. 12, 3689–3706 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  13. Song, X.H., Wang, S., El-Latif, A.A., Niu, X.M.: Dynamic watermarking scheme for quantum images based on Hadamard transform. Multimedia Syst. 20, 379–388 (2014)

    Article  Google Scholar 

  14. Shailender, G., Bhushan, A.G.: Information hiding least significant bit steganography and cryptography. Int. J. Mod. Educ. Comput. Sci. 4, 27–34 (2012)

    Article  Google Scholar 

  15. Sang, J.Z., Wang, S., Li, Q.: Least significant qubit algorithm for quantum images. Quantum Inf. Process. 15, 1–20 (2016)

    Article  MATH  MathSciNet  Google Scholar 

  16. Wang, D., Liu, Z.H., Zhu, W.N., Li, S.Z.: Design of quantum comparator based on extended general Toffoli gates with multiple targets. Comput. Sci. 39, 302–306 (2012)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Nos. 61373131, 61303039, 61232016, 61501247), Sichuan Youth Science and Technique Foundation (No. 2017JQ0048), NUIST Research Foundation for Talented Scholars (2015r014), PAPD and CICAEET funds.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiguo Qu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Qu, Z., Cheng, Z., Wang, M. (2017). A Robust Quantum Watermark Algorithm Based on Quantum Log-Polar Images. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68542-7_38

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68541-0

  • Online ISBN: 978-3-319-68542-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics