Skip to main content
Log in

A Novel LSB Based Quantum Watermarking

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

Quantum watermarking is a technique which embeds the invisible quantum signal such as the owners identification into quantum multimedia data (such as audio, video and image) for copyright protection. In this paper, using a quantum representation of digital images a new quantum watermarking protocol including quantum image scrambling based on Least Significant Bit (LSB) is proposed. In this protocol, by using m-bit embedding key K 1 and m-bit extracting key K 2 a m-pixel gray scale image is watermarked in a m-pixel carrier image by the original owner of the carrier image. For validation of the presented scheme the peak-signal-to-noise ratio (PSNR) and histogram graphs of the images are analyzed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Bennett, C.H., Brassard, G.. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984), p 175

  2. Zhang, Y.S., Li, C.F., Guo, G.C.: Quantum key distribution via quantum encryption. Phys. Rev. A 64, 024302 (2001)

    Article  ADS  MathSciNet  Google Scholar 

  3. Zhou, N., Zeng, G., Zeng, W., Zhu, F.: Cross-center quantum identification scheme based on teleportation and entanglement swapping. Opt. Commun. 254, 380 (2005)

    Article  ADS  Google Scholar 

  4. Zhou, N., Liu, Y., Zeng, G., Xiong, J., Zhu, F.: Novel qubit block encryption algorithm with hybrid keys. Phys. A 375, 693 (2007)

    Article  Google Scholar 

  5. Naseri, M.: Eavesdropping on secure quantum telephone protocol with dishonest server. Opt. Commun. 282, 278–282 (2009)

    Google Scholar 

  6. Zhou, N.R., Wang, L.J., Ding, J., Gong, L.H.: Quantum deterministic key distribution protocols based on the authenticated entanglement channel. Phys. Scr. 81, 045009 (2010)

    Article  ADS  MATH  Google Scholar 

  7. Naseri, M.: A weak blind signature based on quantum cryptography. Int. J. Phys. Sci. 6, 5051 (2011)

    MathSciNet  Google Scholar 

  8. Gao, G., Fang, M., Yang, R.M.: Quantum Secure Direct Communication by Swapping Entanglements of 3×3−Dimensional Bell States. Int. J. Theor. Phys. 50, 882–887 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  9. Liu, D., Chen, J. L., Jiang, W.: High-capacity quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom. Int. J. Theor. Phys. 51, 2923–2929 (2012)

    Article  MATH  Google Scholar 

  10. Sun, Z.W., Du, R.G., Long, D.Y.: Quantum secure direct communication with Two-Photon Four-Qubit cluster states. Int. J. Theor. Phys. 51, 1946–1952 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  11. Ren, B.C., etal: Photonic spatial Bell-state analysis for robust quantum secure direct communication using quantum dot-cavity systems. Eur. Phys. J. D 67, 30 (2013)

    Article  ADS  Google Scholar 

  12. Gu, B., etal: Robust quantum secure communication with spatial quantum states of single photons. Int. J. Theor. Phys. 52, 4461–4469 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  13. Zhang, Q.N., Li, C.C., Li, Y.H., Nie, Y.Y.: Quantum secure direct communication based on Four-Qubit cluster states. Int. J. Theor. Phys. 52, 22–27 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  14. Naseri, M., et al.: A scheme for secure quantum communication network with authentication using GHZ-like states and cluster states controlled teleportation. Quantum Inf. Process 14, 4279–4295 (2015)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  15. Venegas-Andraca, S.E., Bose, S.: Storing, processing and retrieving an image using quantum mechanics. Proceeding of the SPIE conference quantum information and computation (2003)

  16. Venegas-Andraca, S.E., Ball, J.L.: Processing images in entangled quantum systems. Quantum Inform. Process 9, 1–11 (2010)

    Article  MathSciNet  Google Scholar 

  17. Le, P.Q., Iliyasu, A.M., Dong, F., Hirota, K.: Fast geometric transformations on quantum images. Int. J. Appl. Math. 40(3), 113–123 (2010)

    MathSciNet  MATH  Google Scholar 

  18. Iliyasu, A.M., Le, P.Q., Dong, F., Hirota, K.: Watermarking and authentication of quantum images based on restricted geometric transformations. Inf. Sci. 186, 126–149 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  19. Le, P.Q., Doyng, F., Hirota, K.: A flexible representation of quantum images for polynomial preparation. Quantum Inf. Process. 10(1), 6384 (2011)

    Article  Google Scholar 

  20. Zhou, R.G., Wu, Q., Zhang, M.Q., Shen, C.Y.: Quantum image encryption and decryption algorithms based on quantum imagegeometric transformations. Int. J. Theor. Phys. 52(6), 1802–1817 (2013)

    Article  MathSciNet  Google Scholar 

  21. El-Latif, A.A.A., Li, L., Wang, N., Han, Q., Niu, X.: A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process. 93(11), 2986–3000 (2013)

    Article  Google Scholar 

  22. Yang, Y.G., Jia, X., Xu, P., Tian, J.: Analysis and improvement of the watermark strategy for quantum images based on quantum Fourier transform. Quantum Inf. Process 12(8), 2765–2769 (2013)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  23. Zhang, Y., Lu, K., Gao, Y.H., Wang, M.: NEQR: A novel enhanced quantum representation of digital images. Quantum Inf. Process 12(12), 2833–2860 (2013)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  24. Song, X.H., Wang, S., Liu, S., Abd El-Latif, A.A., Niu, X.M.: A dynamic watermarking scheme for quantum images using quantum wavelet transform. Quantum Inf. Process 12(12), 3689–3706 (2013)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  25. Yuan, S., Mao, X., Chen, L., Xuke, Y.: Quantum digital image processing algorithms based on quantum measurement. Optik 124(23), 6386–6390 (2013)

    Article  ADS  Google Scholar 

  26. Song, X.H., Wang, S., Liu, S., Abd El-Latif, A.A., Niu, X.M.: Dynamic watermarking scheme for quantum images based on Hadamard transform. Multimedia Systems 20(4), 379–388 (2014)

    Article  Google Scholar 

  27. Zhang, Y., Lu, K., Gao, Y.H., Sobel, Q.: A novel quantum image edge extraction algorithm. Sci. China Inf. Sci. 58(1), 1–13 (2014)

    Google Scholar 

  28. Jiang, N., Wang, L., Wu, W.Y.: Quantum Hilbert image scrambling. Int. J. Theor. Phys. 53(7), 2463–2484 (2014)

    Article  MATH  Google Scholar 

  29. Zhou, R.G., Sun, Y.J., Fan, P.: Quantum image Gray-code and bit-plane scrambling. Quantum Inf. Process 14(5), 1717–1734 (2015)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  30. Zhou, N.R., Hua, T.X., Gong, L.H., Pei, D.J., Liao, Q.H.: Quantum image encryption based on generalized Arnold transform and double random phase encoding. Quantum Inf. Process 14(4), 1193–1213 (2015)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  31. Hua, T., Chen, J., Pei, D., Zhang, W., Zhou, N.R.: Quantum image encryption algorithm based on image correlation decomposition. Int. J. Theor. Phys. 54(2), 526–537 (2015)

    Article  MATH  Google Scholar 

  32. Zhang, Y., Lu, K., Xu, K., Gao, Y., Wilson, R.: Local feature point extraction for quantum images. Quantum Inf. Process 14(5), 1573–1588 (2015)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  33. Zhou, R.G., Sun, Y.J.: Quantum multidimensional color images similarity comparison. Quantum Inf. Process 14(5), 1605–1624 (2015)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  34. Qu, Z.G., Chen, X.B., Zhou, X.J., Niu, X.X., Yang, Y.X.: Novel quantum steganography with large payload. Opt. Commun. 283(23), 47824786 (2010)

    Article  Google Scholar 

  35. Shaw, B.A., Brun, T.A.: Quantum steganography with noisy quantum channels. Phys. Rev. A 83, 022310 (2011)

    Article  ADS  Google Scholar 

  36. Fatahi, N., Naseri, M.: Quantum watermarking using entanglement swapping. Int. J. Theor. Phys. 51, 20942100 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  37. Zhang, W.W., Gao, F., Liu, B., Jia, H., Wen, Q.Y., Chen, H.: A quantum watermark protocol. Int. J. Theor. Phys. 52, 504–513 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  38. Zhang, W.W., Gao, F., Liu, B., Wen, Q.Y., Chen, H.: A watermark strategy for quantum images based on quantum Fourier transform. Quantum Inf. Process 12(4), 793–803 (2013)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  39. Song, X., Wang, S., El-Latif, A.A.A., Niu, X.: Dynamic watermarking scheme for quantum images based on Hadamard transform. Multimedia Systems 20, 379–388 (2014)

    Article  Google Scholar 

  40. Liu, L., Tang, G.M., Sun, Y.F., Yan, S.F.: Quantum steganography for multi-party covert communication. Int. J. Theor. Phys. 55, 191201 (2016)

    MATH  Google Scholar 

  41. Jiang, N., Zhao, N., Wang, L.: LSB Based Quantum Image Steganography Algorithm. Int. J. Theor. Phys. 55, 107123 (2016)

    MATH  Google Scholar 

  42. Caraiman, S., Vasile, M.: Histogram-based segmentationof quantum image. Theor. Comput. Sci. 529, 46–60 (2014)

    Article  MATH  Google Scholar 

Download references

Acknowledgments

This work is supported by Kermanshah Branch, Islamic Azad University, Kermanshah, IRAN. Also the authors would like to thank Alimorad Ahmadi for his helpful comments and the final edition of the paper and Soheila Gholipour, Yasna Naseri and Viana Naseri for their interests in this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mosayeb Naseri.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Heidari, S., Naseri, M. A Novel LSB Based Quantum Watermarking. Int J Theor Phys 55, 4205–4218 (2016). https://doi.org/10.1007/s10773-016-3046-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-016-3046-3

Keywords

Navigation