一种新型的量子水印策略 英文

合集下载

数字水印技术英文文献

数字水印技术英文文献

Discussion on the digital watermarking technology in electronic reading business applicationsAbstract: the business era, the market competition is fierce day by day. Have broad prospects of electronic reading business may become the carrier of new profit growth point. Digital watermark technology in electronic reading content copyright protection of some of the application, make a preliminary study and discussion, and puts forward some suggestionsKey words: digital watermarking; copyright protection of electronic reading;PrefaceSince China telecom carrier recombination and 3G licences, the domestic telecommunication market competition is intense with each passing day. Facing market competition pressure, how to play their own advantages to gain competitive advantage, has become the major operators must solve the problem.In the telephone business is gradually replacing mobile communication, broadband market is nearing saturation, the traditional mobile voice revenue ARPU values in the great pressure of competition is also very difficult to have the breakthrough of the severe form, as an emerging business electronic reading become carriers of potential revenue growth.Electronic reading, is defined in PC, laptop, mobile phone and other portable electronic terminal reading novels, newspapers, magazines and pictures and other traditionally printed on paper carrier content reading. Compared with traditional way of reading, reading in the acquisition mode, distribution channels, sales management, payment means and environmental protection has natural advantage. With the 3G network of perfection and the mobile phone terminal screen, intelligent development trend, relying on more than 700000000 of mobile phone users, electronic reading have a broad market prospect.Electronic reading business core content is the use of the traditional means of communication to provide rich multimedia resources. At present, China's copyright protection situation is not optimistic, the literature works of infringement acts have occurred. Electronic reading success, largely dependent on the copyright management. Therefore, for copyright protection and digital watermarking technology in electronic reading business will play a very positive role.1 digital watermark1.1 What is the digital watermarking technologyDigital watermark technology is through a certain algorithm will landmark information directly embedded into the multimedia content, but not affect the original content value and use, and can not be aware of the perceptual system or pay attention to, only through a special detector or reader to extract. Digital watermarking technique can distinguish whether the object is under protection, monitoring of the protected data transmission, authentication and illegal copy, resolve copyright disputes, and to provide evidence to the court.Copyright protection digital watermarking to requirements1) validity: in copyright protection digital watermarking embedded content shouldhave authority, that is to say should be able to show that the carrier file ownership is recognized; 2): a robust watermarking anti-attack ability; 3) capacity: refers to embed information in the file number; 4) imperceptibility: refers to the embedded watermark information file with the original documents should be almost the same or does not influence the normal use of the files, but also users can not feel the existence of watermark.2 Digital watermarking technology in application of electronic readingDigital watermarking of a series of technical characteristics show that, in the rapid development of the electronic reading service, digital watermarking will be widely used.For image, video watermarking algorithmDiscrete cosine transform digital watermarking is often used as a basic transformation. First introduced the definition of discrete cosine transform:On digital image,The two dimensional DCT transform is defined as:Two dimensional inverse DCT transform ( IDCT ) is defined as:By 3.2 the original image can be expressed as, for a series of weightsWhen a pair of pixels in an image matrix after discrete cosine transform, the frequency domain matrix in left corner element value maximum, for the DC component, representing the whole image of the average brightness; while the remainder of each element value according to the corner element for fixed-pointtriangle lateral snaking arranged successively, representing the image low frequency, medium frequency components and high frequency components.Cox presents a global DCT domain watermarking algorithm:Selection of sequences of X = x1, x2, ... , xn as watermark, where Xi is satisfy the Gauss distribution of N (0, 1) of a random number. The algorithm first uses the discrete cosine transform of the original image I is transformed into the frequency domain, using the D representation of the data obtained. From the coefficient of D select n most important frequency component, consisting of sequences of V = V1,v2, ... , VN, in order to improve the robustness of image compression.Get the watermark array and frequency domain array, using the formula: Vi=vi ( 1+α XI ) digital watermark is embedded into the frequency domain array carrying watermark information, get new frequency domain array sequence of V = V1, v2, ... , VN, then the V' of each element in the frequency domain matrix D in the corresponding position of the V element replacement out, get a new frequency domain matrix D, the D inverse discrete cosine transform be containing the watermark watermark image I. In the watermark image I* for watermark detection, the whole process is the reverse process of embedding process almost. The first is to I* through DCT to obtain the frequency domain array sequence of V* = v1*, v2*, ... , vn*, then according to the formula Vi=vi ( 1+α XI ) inverse formula one watermark sequence of X* = x1*, x2*, ... , xn*, then calculate the watermark with the original watermark correlation of X* X.The algorithm is robust, can resist including scaling, JPEG compression, shear and jitter, printing and copy - scanning, image processing, and then embeddingMulti-watermarking, also can resist attacks multiple users, is a very effective watermarking algorithm.2.2 text digital watermarkingWith the picture or video files, text files without too much redundant information space, so the text based watermarking technique is far less than the image or video. Commonly used text watermarking is based mainly on the fixed format text watermarking. Commonly used methods: Based on the spacing of information representation, based on the word spacing information representation method and based on the character attribute information representation. In actual use, can these three kinds of information hiding methods combination.Based on the fixed format text watermarking, its biggest weakness is to retain the text but change the text format of soft copy sensitive. In order to solve this problem, people put forward based on the text semantic watermarking technology, but thistechnique is difficult to realize and watermark extraction need to provide source file control, maneuverability is not strong.In the actual electronic reading, we will be able to distribute content using the format developers to provide tools for content set can not be copied ( word, PDF have this feature ), to avoid illegal user to destroy the watermark information. In addition, also can be a text scanning for picture format, using the discrete cosine transform technology to embed the watermark, and then provided to the user.3 SummaryIn an electronic reading business applications, digital watermarking technology mainly focuses on the identification of the infringement, also cannot prevent and stop the infringement occurred. And the robustness of digital watermarking algorithm can not completely meet the needs of. But with the continuous progress of watermarking algorithm, and with the use of CA technology and the encryption technology, digital watermarking technology in electronic reading areas will have more extensive application.。

外文摘要

外文摘要

The research on DCT-domain digital watermarking algorithm based on chaotic sequence数字水印技术作为加密技术的补充,是保护数字作品版权的一种重要手段,近年来已成为学术界研究的一个热点.针对图像的水印方案是最近几年研究的主流方向,本文重点研究了基于DCT域的图像数字水印的设计和实现方法。

第一章介绍了数字水印目前的研究现状;第二章介绍了本文所涉及的主要相关知识和技术;首先介绍了数字水印技术,着重介绍了数字水印技术的基本原理、特征、典型算法;第三章讨论选择MATLAB作为实现系统的工具的目的和优势以及系统环境配置;第四章为本论文的主要部分,是系统实现的具体过程。

数字水印技术是一个新兴的研究领域,还需进一步深入研究。

.Digital watermarking technology as encryption technology added ,is to protect the copyright of digital works an important means In recent years,academic studies have become a hot topic.Image Watermarking against the program in recent years is the main research direction. This paper focuses on a DCT-based image digital watermark design and implementation. Chapter I provide a digital watermark current status of research and simple description of the idea;The second chapter describes the knowledge and technology the paper mainly related; The theme of the thesis is the Domain digital image watermarking algorithm ,it complete the following main aspects:This paper describes digital watermarking technology ,discussion of the digital watermark technology concepts,features,and other related knowledge;The third chapter discusses optioning MATLAB as a tool to achieve the purpose and advantages and the environment of the system configuration;Chapter IV of the main thesis of this part is the specific process of the system implementation.Digital watermarking technology is a new area ,needs further in-depth study.。

一种改进的量子“乒乓”协议安全检测策略及其安全性分析英文

一种改进的量子“乒乓”协议安全检测策略及其安全性分析英文
A : In or d er t o t r an s mi tt h e s ecur e m es s acan en s ur et h att h e "P i n gp on g" p r ot ocol i sm or e ges ,a d et er m i ni s t i cs ecu r e qu an t um d i r ectcom m us ecur e. � � � � � ni cat i on p r ot ocol,called t h e "Pi n gp on g"p r ot ocol K : s ecur e qu an t um d i r ect com m un i cat i on ; "P i n g-p on g " p r ot ocol ; p r ot ocol s ecu r i t y; w asp r op os ed by B os t r m an d F elbi n ger [P h ys . R ev . Let t . 89 ,187 9 0 2 ( 20 0 2) ] . B utt h ep r ot ocol eav es d r op p i ng d et ect i on w asp r ov ed t oh av e m an y v u ln er abi li t i es ,an d can be at t acked by eav es d r op p er s . To ov er com e t h e I. INT R O D U CT IO N pr oblem ,an i m pr ov ed s ecu r i t y det ect i on s t r at egy wh i chi ns er t st h e |0 � , |1� , |+�an d | -�p ar t i cles Q uan t um m ech an i csof f er ss om e un i que cap abi li t i es i nt ot h e m es s agesast h ed ecoy p ar t i clesr an d om ly i n s uchasquan t um com p ut at i on an d quan t um com m u t h e"Pi n gp on g"p r ot ocol i sp r es en t ed. D ur i ng t h e ni cat i on f ort h ep r oces s i n g ofi nf or m at i on . O v ert h e s ecur i t y an alys i s ,t h e m et h od of t h e en t r op y t h eor y las td ecad e,s ci en t i s t sh av e m ade d r am at i c pr ogr es s i n t h ef i eld of qu an t um com m un i cat i on . Th e qu an i si n s t r at egi es ar e t u m key d i s t r i bu t i on ( Q K D ) , w h os e t as k i st o cr ecom p ar ed quan t i t at i v ely by us i ng t h e con s t r ai n tbeat eapr i v at e key bet w een t wo r em ot e aut h or i z ed u s t w een t h ei nf or m at i on w h i ch eav es d r op p er scan ober s ,i son e of t h e m os tr em ar kable ap p li cat i on sof t ai n an dt h ei nt er f er en ce i nt r oduced . Becaus e oft h e quan t u m m ech an i cs . S i n ce B en n et t an d Br as s ar d pr es en ce of t h et r ap p ar t i cles | +� an d| -� ,t h e depr es en t ed t h e pi on eer Q K D p r ot ocol [1 ]( BB 84 t ect i on r at e wi ll be n o les st h an 25% w h en E v e at pr ot ocol ) i n 19 84 ,a lotof quan t um i nf or m at i on s et ackst h e com m un i cat i on . Th es ecur i t y an alys i sr ecur i t y pr oces s i n g m et h ods h av e been ad v an ced , s ul ts h ow st h att h e ef f i ci en cy of eav es d r op p i n g des uch as quan t um t elep or t at i on [27 ] , quan t um t ect i on i n t h e pr es en t ed p r ot ocol i sh i gh er t h an t h e den s e cod i n g [ 89 ] , an d quan t um s ecr et s h ar i ng ot h er t w o,s ot h e det ect i on s t r at egy i n t h epr ot ocol

量子计算外文翻译中英文2019

量子计算外文翻译中英文2019

量子计算中英文2019英文FROM BITS TO QUBITS, FROM COMPUTING TO QUANTUM COMPUTING: AN EVOLUTION ON THE VERGE OF A REVOLUTION IN THE COMPUTINGLANDSCAPEPi rjan Alexandru; Petroşanu Dana-Mihaela.ABSTRACTThe "Quantum Computing" concept has evolved to a new paradigm in the computing landscape, having the potential to strongly influence the field of computer science and all the fields that make use of information technology. In this paper, we focus first on analysing the special properties of the quantum realm, as a proper hardware implementation of a quantum computing system must take into account these properties. Afterwards, we have analyzed the main hardware components required by a quantum computer, its hardware structure, the most popular technologies for implementing quantum computers, like the trapped ion technology, the one based on superconducting circuits, as well as other emerging technologies. Our study offers important details that should be taken into account in order to complement successfully the classical computer world of bits with the enticing one of qubits.KEYWORDS: Quantum Computing, Qubits, Trapped Ion Technology, Superconducting Quantum Circuits, Superposition, Entanglement, Wave-Particle Duality, Quantum Tunnelling1. INTRODUCTIONThe "Quantum Computing" concept has its roots in the "Quantum Mechanics" physics subdomain that specifies the way how incredibly small particles, up to the subatomic level, behave. Starting from this concept, the Quantum Computing has evolved to a new paradigm in the computing landscape. Initially, the concept was put forward in the 1980s as a mean for enhancing the computing capability required tomodel the way in which quantum physical systems act. Afterwards, in the next decade, the concept has drawn an increased level of interest due to the Shor's algorithm, which, if it had been put into practice using a quantum computing machine, it would have risked decrypting classified data due to the exponential computational speedup potential offered by quantumcomputing [1].However, as the development of the quantum computing machines was infeasible at the time, the whole concept was only of theoretical value. Nowadays, what was once thought to be solely a theoretical concept, evolved to become a reality in which quantum information bits (entitled "qubits") can be stored and manipulated. Both governmental and private companies alike have an increased interest in leveraging the advantages offered by the huge computational speedup potential provided by the quantum computing techniques in contrast to traditional ones [2].One of the aspects that make the development of quantum computers attractive consists in the fact that the shrinkage of silicon transistors at the nanometer scale that has been taking place for more than 50 years according to Moore's law begins to draw to a halt, therefore arising the need for an alternate solution [3].Nevertheless, the most important factor that accounts for boosting the interest in quantum computing is represented by the huge computational power offered by these systems and the fact that their development from both hardware and software perspectives has become a reality. Quantum computing managed to surpass the computability thesis of ChurchTuring, which states that for any computing device, its power computation could increase only in a polynomial manner when compared to a "standard" computer, entitled the Turing machine [4].During the time, hardware companies have designed and launched "classical" computing machines whose processing performance has been improving over the time using two main approaches: firstly, the operations have been accelerated through an increased processing clock frequency and secondly, through an increase in the number of operations performed during each processing clock's cycle [5].Although the computing processing power has increased substantially after having applied the above-mentioned approaches, the overall gain has remained inaccordance with the thesis of Church-Turing. Afterwards, in 1993, Bernstein and Vazirani have published in [6] a theoretical analysis stating that the extended Church-Turing thesis can be surpassed by means of quantum computing. In the following year, Peter Shor has proved in his paper that by means of quantumcomputing the factorization of a large number can be achieved with an exponentially computing speedup when compared to a classical computing machine [7-9]. Astonishing as the theoretical framework was, a viable hardware implementation was still lacking at the time.The first steps for solving this issue have been made in 1995, when scientists have laid the foundations for a technology based on a trapped ion system [10] and afterwards, in 1999, for a technology employing superconducting circuits [11]. Based on the advancement of technology, over the last decades, researchers have obtained huge progress in this field, therefore becoming able to build and employ the first quantum computing systems.While in the case of a classical computing machine the data is stored and processed as bits (having the values 0 or 1), in the case of a quantum computingmachine, the basic unit of quantum information under which the data is stored and processed is represented by the quantum bits, or qubits that can have besides the values of 0 and 1, a combination of both these values in the same time, representing a "superposition" of them [12].At a certain moment in time, the binary values of the n bits corresponding to a classical computer define a certain state for it, while in the case of a quantumcomputer, at a certain moment in time, a number of n qubits have the possibility to define all the classical computer's states, therefore covering an exponential increased computational volume. Nevertheless, in order to achieve this, the qubits must be quantum entangled, a non-local property that makes it possible for several qubits to be correlated at a higher level than it was previously possible in classical computing. In this purpose, in order to be able to entangle two or several qubits, a specific controlled environment and special conditions must be met [13].During the last three decades, a lot of studies have been aiming to advance thestate of knowledge in order to attain the special conditions required to build functional quantum computing systems. Nowadays, besides the most popular technologies employed in the development of quantum computing systems, namely the ones based on trapped ion systems and superconducting circuits, a wide range of other alternative approaches are being extensively tested in complex research projects in order to successfully implement qubits and achieve quantum computing [14].One must take into account the fact that along with the new hardware architectures and implementations of quantum computing systems, new challenges arise from the fact that this new computing landscape necessitates new operations, computing algorithms, specialized software, all of these being different than the ones used in the case of classical computers.A proper hardware implementation of a quantum computing system must take into account the special properties of the quantum realm. Therefore, this paper focuses first on analyzing these characteristics and afterwards on presenting the main hardware components required by a quantum computer, its hardware structure, the most popular technologies for implementing quantum computers, like the trapped ion technology, the one based on superconducting circuits, as well as other emerging technologies. Our developed research offers important details that should be taken into account in order to complement successfully the classical computer world of bits with the enticing one of qubits.2.SPECIAL PROPERTIES OF THE QUANTUM REALMThe huge processing power of quantum computers results from the capacity of quantum bits to take all the binary values simultaneously but harnessing this vast amount of computational potential is a challenging task due to the special properties of the quantum realm. While some of these special properties bring considerable benefits towards quantum computing, there are others that can hinder the whole process.One of the most accurate and extensively tested theory that comprehensibly describes our physical world is quantum mechanics. While this theory offers intuitive explanations for large-scale objects, while still very accurate also at the subatomiclevel, the explanations might seem counterintuitive at the first sight. At the quantum level, an object does not have a certain predefined state, the object can behave like a particle when a measurement is performed upon it and like a wave if left unmeasured, this representing a special quantum property entitled wave-particle duality [15].The global state of a quantum system is determined by the interference of the multitude of states that the objects can simultaneously have at a quantum level, the state being mathematically described through a wave function. Actually, the system's state is often described by the sum of the different possible states of its components, multiplied by a coefficient consisting in a complex number, representing, for each state, its relative weight [16, 17]. For such a complex coefficient, by taking into consideration its trigonometric (polar) form, one can write it under the form Aew = A(cos6 + i sind), where A > 0 represents the module of this complex number and is denoted as the "amplitude", while в represents the argument of the complex number, being denoted as "the phase shift". Therefore, the complex coefficient is known if the two real numbers A and в are known.All the constitutive components of a quantum system have wave-like properties, therefore being considered "coherent". In the case of coherence, the different states of the quantum components interact between them, either in a constructive manner or in a destructive one [1]. If a quantum system is measured at a certain moment, the system exposes only a single component, the probability of this event being equal to the squared absolute value of the corresponding coefficient, multiplied by a constant. If the quantum system is measured, from that moment on it will behave like a classical system, therefore leading to a disruption of its quantum state. This phenomenon causes a loss of information, as the wave function is collapsed, and only a single state remains. As a consequence of the measurement, the wave function associated to the quantum obj ect corresponds only to the measured state [1, 17].Considering a qubit, one can easily demonstrate that its quantum state could be represented by a linear superposition of two vectors, in a space endowed with a scalar product having the dimension 2. The orthonormal basis in this space consists of thevectors denoted as |0 >= [Jj and |1 >= [°j. If one considers two qubits, they could be represented as a linear combination of the 22 elements of the base, namely the ones denoted as .... Generally, in the case of n qubits, they could be represented by a superposition state vector in a space having the dimension 2n [2].Another special property of the quantum realm consists in the entanglement, a property that has the ability to exert a significant influence on quantumcomputing and open up a plethora of novel applications. The physical phenomenon of quantum entanglement takes place when two (or more) quantumobjects are intercorrelated and therefore the state of a quantum object influences instantaneously the state(s) of the other(s) entangled quantum object(s), no matter the distance(s) between these objects [16].Another important quantum mechanical phenomenon that plays a very important role in quantum computing is quantum tunneling that allows a subatomic particle to go through a potential barrier, which otherwise would have been impossible to achieve, if it were to obey only the physical laws of classical mechanics. An explanation of this different behavior consists in the fact that in quantum mechanics the matter is treated both as waves and particles, as we have described above, when we have presented the wave-particle duality concept [15].The Schrödinger equation describes the variation of the wave function, taking into account the energy environment that acts upon a quantum system, therefore highlighting the way in which this quantum system evolves. In order to obtain the mathematical description of the environment, of the energies corresponding to all the forces acting upon the system, one uses the Hamiltonian of the quantum system. Therefore, the control of a quantum system can be achieved by controlling its energy environment, which can be obtained by isolating the system from the external forces, and by subjecting the system to certain energy fields as to induce a specific behavior. One should note that a perfect isolation of the quantum system from the external world cannot be achieved, therefore in practice the interactions are minimized as much as possible. Over time, the quantum system is continuously influenced to a small extent by the external environment, through a process called "decoherence",process that modifies the wave function, therefore collapsing it to a certain degree [1].Figure 1 depicts the main special properties of the quantum realm, which, when precisely controlled, have the ability to influence to a large extent the performance of a quantum computer implementation, and open up new possibilities for innovation concerning the storing, manipulation and processing of data.In the following, we analyze a series of hardware components and existing technologies used for developing and implementing quantum computers.3.AN OVERVIEW OF THE NECESSARY HARDWARE AND OF THE EXISTING TECHNOLOGIES USED IN THE IMPLEMENTATIONS OF QUANTUM COMPUTERSA proper hardware architecture is vital in order to be able to program, manipulate, retrieve qubits and overall to achieve an appropriate and correct quantumcomputer implementation. When implementing a quantum computer at the hardware level, one must take into account the main hardware functions, a proper modularization of the equipment along with both similarities and differences between quantum and classic computer implementations. Conventional computers are an essential part in the successful implementation of a quantum computer, considering the fact that after having performed its computation, a quantumcomputer will have to interact with different categories of users, to store or transmit its results using classic computer networks. In order to be efficient, quantum computers need to precisely control the qubits, this being an aspect that can be properly achieved by making use of classic computing systems.The scientific literature [1, 18, 19] identifies four abstract layers in the conceptual modelling process of quantum computers. The first layer is entitled the "quantum data plane" and it is used for storing the qubits. The second layer, called "control and measurement plane", performs the necessary operations and measurement actions upon the qubits. The third layer entitled "control processor plane" sets up the particular order of operations that need to be performed along with the necessary measurement actions for the algorithms, while the fourth abstract layer, the "host processor", consists in a classical computer that manages the interface withthe different categories of personnel, the storage of data and its transmission over the networks.In the following, we present the two most popular technologies employed in the development of quantum computing systems, namely the ones based on trapped ion systems and superconducting circuits and, afterwards, other alternative approaches that are being extensively tested in complex research projects in order to successfully implement qubits and achieve quantum computing.By means of trapping atomic ions, based on the theoretical concepts presented by Cirac et al within [20], in 1995, Monroe et al [21] revealed the first quantumlogic gate. This was the starting point in implementing the first small scale quantum processing units, making it possible to design and implement a rich variety of basic quantum computing algorithms. However, the challenges to scale up the implementations of quantum computers based on the trapped ion technology are enormous because this process implies a synergy of complex technologies like coherent electronic controllers, laser, radio frequency, vacuum, microwave [1, 22].In the case of a quantum computer based on the trapped atomic ions technology, the qubits are represented by atomic ions contained within the quantum data plane by a mechanism that keeps them in a certain fixed location. The desired operations and measurement actions are performed upon the qubits using accurate lasers or a source of microwave electromagnetic radiation in order to alter the states of the quantum objects, namely the atomic ions. In order to reduce the velocity of the quantum objects and perform measurements upon them, one uses a laser beam, while for assessing the state of the ions one uses photon detectors [14, 23, 24]. Figure 2 depicts an implementation of the quantum trapping atomic ions technology.Another popular technology used in the development and implementation of quantum computers is based on superconducting quantum circuits. These quantum circuits have the property of emitting quantized energy when exposed to temperatures of 10-3K order, being referred in the literature as "superconducting artificial atoms" [25]. In contrast to classic integrated circuits, the superconducting quantum circuits incorporate a distinctive characteristic, namely a"Josephson junction" that uses wires made of superconducting materials in order to achieve a weak connection. The common way of implementing the junction consists in using an insulator that exposes a very thin layer and is created through the Niemeyer-Dolan technique which is a specialized lithographic method that uses thin layers of film in order to achieve overlapping structures having a nanometer size [26].Superconducting quantum circuits technology poses a series of important advantages, offering red3uced decoherence and an improved scale up potential, being compatible with microwaves control circuits, operating with time scales of the nanosecond order [1]. All of these characteristics make the superconducting quantum circuits an attractive and performant technique in developing quantum computers. A superconducting quantum circuit developed by D-Wave Systems Inc. is depicted in Figure 3.In order to overcome the numerous challenges regarding the scaling of quantum computers developed based on trapped ion systems and superconducting circuits, many scientists focus their research activity on developing emerging technologies that leverage different approaches for developing quantumcomputers.One of the alternatives that scientists investigate consists in making use of the photons' properties, especially of the fact that photons have a weak interaction between each other and also with the environment. The photons have been tested in a series of quantum experiments and the obtained results made the researchers remark that the main challenge in developing quantum computers through this approach is to obtain gates that operate on spaces of two qubits, as at the actual moment the photons offer very good results in terms of single qubit gates. In order to obtain the two-qubit gates, two alternative approaches are extensively being investigated as these have provided the most promising results.The first approach is based on operations and measurements of a single photon, therefore creating a strong interaction, useful in implementing a probabilistic gate that operates on a space of two qubits [1]. The second alternative approach employs semiconductor crystals structures of small dimensions in order to interact with the photons. These small structures can be found in nature, case in which they are called"optically active defects", but can also be artificially created, case in which they are called "quantum dots". An important challenge that must be overcome when analyzing quantum computers based on photons is their size. Until now, the development of this type of computers has been possible only for small dimensions, as a series of factors limit the possibility to increase the dimensions of photon quantum computers: the very small wavelengths of the photons (micron-size), their very high speed (the one of the light), the direction of their movement being along a certain dimension of the optical chip. Therefore, trying to significantly increase the number of qubits (represented by the photons) proves to be a difficult task in the case of a photonic device, much more difficult than in the case of other systems, in which the qubits are located in space. Nevertheless, the evolution of this emerging technology promises efficient implementations in the near future [27].Another technology that resembles the one of "trapping atomic ions" for obtaining qubits consists in the use and manipulation of neutral atoms by means of microwave radiation, lasers and optics. Just like in the case of the trapping atomic ions technology, the "cooling" process is achieved using laser sources. According to [1, 28], in 2018 there were implemented successfully quantum systems having 50 qubits that had a reduced space between them. By means of altering the space between the qubits, these quantum systems proved to be a successful analog implementation of quantum computers. In what concerns the error rates, according to [29], in 2018 there have been registered values as low as 3% within two-qubit quantum systems that managed to isolate properly the operations performed by nearby qubits. Since there are many similarities between the two technologies, the scaling up process faces a lot of the problems of the "trapping atomic ions" technology. However, the use of the neutral atoms technology offers the possibility of creating multidimensional arrays.A classification of semiconductor qubits is made according to the method used to manipulate the qubits that can be achieved either by photon manipulation or by using electrical signals. Quantum dots are used in the case of semiconductor qubits that are gated by optical means in order to assure a strong coupling of the photons while in the case of semiconductor qubits manipulated via electrical signals, voltages are usedupon lithographically metal gates for manipulating the qubits [1]. This quantum technology, although being less popular than other alternatives, resembles the existing classical electronic circuits, therefore one might argue that it has a better chance in attracting considerable investments that eventually will help speed up the scaling up process of quantum computers implementation.In order to scale up qubits that are optically gated, one needs a high degree of consistency and has to process every qubit separately at the optical level. In [30], Pla et al. state that even if the qubits that are gated electrically can be very dense, the material related problems posed not long-ago serious quality problems up to single qubits gates level. Although the high density provided by this type of quantum technology creates opportunities for integrating a lot of qubits on a single processor, complex problems arise when one has to manipulate this kind of qubits because the wiring will have to assure an isolation of the control signals as to avoid interference and crosstalk.Another ongoing approach in developing quantum computers consists in using topological qubits within which the operations to be performed upon are safeguarded due to a microscopically incorporated topological symmetry that allows the qubit to correct the errors that may arise during the computing process [1]. If in the future this approach materializes, the computational cost associated with correcting the quantum errors will diminish considerably or even be eliminated altogether. Although this type of technology is still in its early stages, if someday one is able to implement it and prove its technical feasibility, the topological quantum computers will become an important part of the quantum computing landscape.4. CONCLUSIONSQuantum computing represents a field in a continuous evolution and development, a huge challenge in front of researchers and developers, having the potential to influence and revolutionize the development of a wide range of domains like the computing theory, information technology, communications and, in a general framework, regarding from the time perspective, even the evolution and progress of society itself. Therefore, each step of the quantum computers' evolution has thepotential to become of paramount importance for the humanity: from bits to qubits, from computing to quantum computing, an evolution on the verge of a revolution in the computing landscape.中文从比特到量子比特,从计算到量子计算:计算机革命的演变抽象“量子计算”的概念已发展成为计算领域的一个新范例,具有极大地影响计算机科学领域和所有利用信息技术的领域的潜力。

公开发表科研论文统计

公开发表科研论文统计

题目 发表刊物 框架的应用研究 The Fuzzy Control Method in Advanced Materials Semi-active Suspension Research, ISSN: 1022-6680, ISSN/ISO: Adv. Mater. Res 网格计算环境下基于 PERT 方 山东理工大学学报 法的调度算法 MAX038 芯片在波形发生器中 现代电子技术 的应用 以 CzHQZn 为主体的有机发光 光电子.激光 器件的发光效率 以 CzHQZn 为空穴传输及发光 半导体光电 层的有机黄光器件 Struts 框架在 Web 开发中的应 通化师范学院学报 用 基于拉普拉斯算子的边缘检 长春师范学院自然科学版 测研究 MPLS VPN 动态路径管理算法, 计算机应用研究 基于 VBA 的考生座位混排算法 白城师范学院学报 离子刻蚀工艺对聚合物阵列 吉林大学学报(工学版) 波导光栅理论模拟的影响 氟化聚合物光谱响应平坦化 电子学报 阵列波导光栅的优化设计和 制备 基于 DSA-ph 的高效蓝色有机 液晶与显示 电致发光器件 基于 BAlq 的有机电致发光器 光电子.激光 件的磁效应 利用 DPVBi 插层提高蓝色荧光 物理学报 有机电致发光器件的效率 分布式呼叫中心 CRM 系统研究 微计算机信息 与实现 Decomposition Mechanism THEORY AND APPLICATIONS Studies of Energetic OF COMPUTATIONAL Molecules Using HOMO and CHEMISTRY—2008 LUMO Orbital Energy Driven AIP Conf. Proc. Molecular Dynamics 利用第一性原理计算 HgSe 的 吉林大学学报(理学版) 结构相变和光学性质 关联规则挖掘 Apriority 算法 吉林师范大学 自然科学 研究 版 基于 Her mite 算法的曲线拟 长春师范学院自然科学版 合 基于微处理器的并行信息处 吉林大学学报(理学版)

一种新的基于Legendre混沌神经网络的数字水印算法

一种新的基于Legendre混沌神经网络的数字水印算法

一种新的基于Legendre混沌神经网络的数字水印算法韩宝如;覃学峰;李文锋【摘要】In order to protect medical image information,this paper presents a new algorithm of medical volume data digital watermarking based on Legendre chaotic neural network.It integrates Legendre chaotic neural network,three-dimensional discrete Fourier transformation and zero-watermarking.On the one hand, a novel Legendre chaotic neural network is used to generate a chaotic sequence with a pseudo-random sequenc for scrambling the original watermark image.On the other hand,zero-watermarking is constructed in the three-dimensional discrete Fourier transforming domain of medical volume data.The simulation results show that the digital watermarking algorithm not only has good robustness,but also good security and confidentiality.%为了保护医学图像信息,提出一种新的基于Legendre混沌神经网络的医学体数据数字水印算法,将Legendre混沌神经网络、三维离散傅里叶变换和零水印有机地结合在一起.一方面,使用一种新型的Legendre混沌神经网络产生具有伪随机性的混沌序列进行置乱原始水印图像;另一方面,在医学体数据的三维离散傅里叶变换域上构造零水印,以提高数字水印的抗攻击能力.仿真结果表明,该数字水印算法不仅具有很好的鲁棒性,而且具有很好的安全性和保密性.【期刊名称】《苏州市职业大学学报》【年(卷),期】2015(026)004【总页数】6页(P1-6)【关键词】Legendre混沌神经网络;三维离散傅里叶变换;医学体数据【作者】韩宝如;覃学峰;李文锋【作者单位】海南软件职业技术学院电子工程系,海南琼海571400;海南软件职业技术学院电子工程系,海南琼海571400;海南软件职业技术学院电子工程系,海南琼海571400【正文语种】中文【中图分类】TP317.4随着科学技术的发展,医疗行业的数字信息越来越重要.医学信息的数字化为医学信息的储存和传输带来极大便利的同时,也存在恶意攻击、篡改、非法占有等严重的安全性问题[1-2].现今的加密方法和访问控制已经很难满足医学图像的信息安全要求,寻求新的信息安全技术措施己迫在眉睫.在医学领域,医学图像是医生获取患者生理疾病信息的重要依据,细小的改变都有可能导致严重的后果.传统上对患者的病理医学数据质量要求极其严格,往往不允许做任何改动[3].医学图像数字水印技术(medical image watermarking,MIW),是解决这一难题的一种有效方法[4].将具有特定含义的标识信息嵌入到载体医学图像,能实现医学图像的真实性和完整性认证,电子病历 EPR(electronic patientrecord)隐藏和版权保护.其特有的鲁棒性和安全性保证了在经历信息交流过程中的数据处理后,仍能完整可靠地提取水印标志,对医学图像的保护提供了有效的手段.最初数字水印技术是用于互联网上的数字媒体的版权保护[5-7],现在利用数字水印的不可见性、鲁棒性等特点,可以把病人的个人信息隐藏在其医学图像中,以保证在互联网上的安全传输.为了保护医学图像的安全,人们提出了许多传统的加密算法[8-11].利用混沌神经网络产生具有伪随机性的混沌序列,基于混沌序列对初始值极其敏感的特性[12],提出一种基于Legendre混沌神经网络的三维医学体数据数字水印算法.此方法能够适应医学图像体数据特点,能抵抗很强的攻击,具有很强的鲁棒性,采用混沌神经网络置乱具有很好的安全性.定义Legendre多项式是定义在[-1,1] 上关于权函数P(x)=1的n次Legendre正交多项式.混沌神经网络结构如图1所示,设Legendre混沌神经网络第一层的权值为wj,Legendre混沌神经网络第二层的权值为cj,隐层神经元采用Legendre正交多项式作为激励函数.隐层神经元的输入为netj=wjx,j=0,1,2,…,n.隐层神经元输出为一组Legendre正交多项式Pj(netj),j=0,1,2,…,n,可由式(1)递推求得.所以,Legendre混沌神经网络的输出为设x1=y(P-1),x2=y(P-2),…,xm=y(P-m);训练样本为(Tt,dt),t=1,2,…,l.l为样本数目,Legendre混沌神经网络的输入为Tt=(x1t,x2t,…,xmt),dt为Legendre混沌神经网络的期望输出.该混沌神经网络采用BP算法获得网络权值,其公式为三维离散傅里叶变换(3D-DFT)原理是通过时域信号向频域信号的转变,将原本具有强相关性的信号集中分布在某一特定区域,通过消除数据的空间冗余达到压缩目的,其公式为式中:f(x,y,z)是数据值;F(u,v,w)是3D-DFT变换系数.三维离散傅里叶反变换(3D-IDFT)公式为式中:f(x,y,z)为空间域采样值;F(u,v,w)为频率域采样值.由于零水印利用图像的重要特征构造水印信息,而不是修改原始图像的特征,因此在医学图像的版权保护中使用零水印.基于Legendre混沌神经网络的三维医学体数据,数字水印算法流程如图2所示.为了验证该数字水印算法的性能,利用Matlab2010a软件对该算法进行仿真.医学体数据采用Matlab2010a软件自带的医学体数据,其大小为128×128×27.为了测试该数字水印算法的抗攻击能力,依次进行了中值滤波[5×5]攻击、垂直下移攻击、顺时针旋转攻击和x轴方向剪切攻击.相关仿真结果如图3、图4、图5和图6所示.从各图中可以看出,在攻击下,提取的水印图像清晰可见,并且相关系数都很高.因此本文提出的数字水印算法具有很强的抗攻击能力,并且实现了水印的盲检测.由于水印图像的置乱采用了Legendre混沌神经网络,产生具有伪随机性的混沌序列,密钥量大,实现了一次一密,难以破解,提高了该数字水印算法的安全性.本研究与文献[13]的水印算法都是体数据数字水印算法,从仿真结果看,各水印算法都能很好地抵抗各种攻击.但是本研究的体数据来源于二维医学图像切片数据,而文献[13]的体数据来源于三维模型,因此嵌入的水印有所不同.文献[13]的水印算法是把水印嵌入到三维体数据的傅里叶变换域,而本研究的数字水印算法是把水印嵌入到每个二维医学图像切片.与文献[13]水印算法相比,本研究的数字水印算法简单易实现,水印的嵌入和提取具有快捷性且计算量小的特点.充分利用国内外相关领域的研究成果,以医学体数据的数字水印作为研究对象,研究具有鲁棒性的零水印技术,提出了一种医学体数据数字水印算法.该算法基于混沌神经网络将图像的特征提取和零水印技术有机地结合在一起,实现了对医学图像信息的保护,对医疗信息产业的发展具有显著的经济效益和社会效益.【相关文献】[1] KAUR S,FAROOQ O,SINGHAL R,et al.Digital watermarking of ECG data for secure wireless communication[C]//Proc of the 2010 IEEE International Conference on Recent Trends in Information,Telecommunication and Computing.Tunisia:2010:140-144. [2] NAVAS K A,SASIKUMAR M.Survey of medical image watermarkingalgorithms[C]//Proc of the 4th Sciences of Electronic Technologies of Information and Telecommunications International Conference.Tunisia:2007:25-29.[3] COATRIEUX G,MAITRE H,SANKUR B.Strict integrity control of biomedicalimages[C]//Proc of the International Society for Optical Engineering(SPIE) on Electronic Imaging,Security and Watermarking of Multimedia Contents.Tunisia:2001:229-240. [4] NAVAS K A, SASIKUMAR M.Survey of medical image watermarkingalgorithms[C]//Proc of the 4th International Conference,Sciences of Electronic,Technologies of Information and Telecommunications.Tunisia:2007:25-29,[5] COATRIEUX G,MAITRE H ,SANKUR B,et al.Relevance of watermarking in medical Imaging[C]//In Proc.IEEE Int.Conf.ITAB.Tunisia:2000:250-255.[6] 王鑫,聂春燕.混沌同步技术在保密通信中的应用[J].长春大学学报:自然科学版,2011,21(4):25-28.[7] 黄继武,谭铁牛.图像隐形水印综述[J].自动化学报,2000,25(5):643-653.[8] COUMOU D J,SHANNA G.Insertion,deletion codes with feature based embedding:A new paradigm for watermark sychronization with applications to speech watermarking[J].IEEE Transaction Son Information Forensics and Security,2008,3(2):153-165.[9] 曹光辉,胡凯,佟维. 基于Logistic均匀分布图像置乱方法[J]. 物理学报,2011,60(11):125-132.[10] 吴戈. 基于混沌加密和连词替换的文本水印算法[J]. 长春大学学报:自然科学版,2011,21(6):16-18.[11] 曹光辉,胡凯. 基于混沌序列加权抽样和排序变换的图像置乱[J]. 北京航空航天大学学报,2013,39(1):67-72.[12] 邹阿金,罗移祥. Legender神经网络建模及股票预测[J]. 计算机仿真,2005(11):241-242.[13] VASSILIOS S,IOANNIS P.Watermarking digital 3D volumes in the discrete fourier transform domain[J].IEEE Transactions on Multimedia,2007,9 (7):1373-1383.。

量子科技的应用作文英语

量子科技的应用作文英语

量子科技的应用作文英语Exploring the Quantum Frontier: Applications of Quantum Technology。

In the vast landscape of technological advancement, one realm stands out as both mysterious and promising: quantum technology. Harnessing the peculiar behaviors of quantum mechanics, quantum technology has the potential to revolutionize various fields, from computing to communication and beyond. In this essay, we will delve into the fascinating world of quantum technology, exploring its applications and envisioning its impact on the future.Quantum Computing: Unlocking Unprecedented Power。

At the forefront of quantum technology lies quantum computing, a paradigm-shifting approach to computation. Traditional computers rely on binary bits, which can exist in one of two states: 0 or 1. In contrast, quantum computers leverage quantum bits, or qubits, which can existin multiple states simultaneously due to the principle of superposition. This allows quantum computers to perform vast numbers of calculations simultaneously, leading to exponential increases in processing power.One of the most promising applications of quantum computing is in the field of cryptography. Current encryption methods, such as RSA, rely on the difficulty of factoring large numbers to ensure security. However, quantum computers could theoretically break these encryption schemes in a fraction of the time it would take traditional computers. Conversely, quantum cryptography offers a new paradigm for secure communication, utilizing the principles of quantum mechanics to enable unhackable encryption keys.Quantum Communication: The Dawn of Unbreakable Encryption。

陕西自然科学优秀学术论文评选结果

陕西自然科学优秀学术论文评选结果
彭彪林樊慧庆
张奇
一等
8
含微电网的主动配电系统的可靠性评估
Reliability Evaluation of Active Distribution Systems Including Microgrids
别朝红张鹏
李更丰华博文
M. Meehan
一等
9
基于非局部中心化稀疏模型的图像恢复
Nonlocally centralized sparse representation for image restoration
于立明梁宏亮
易定华段维勋俞世强
二等
33
ALCAT1调控脂肪肝发生与线粒体自噬缺陷导致肝细胞脂肪变性密切相关
ALCAT1 controls mitochondrial etiology of fatty liver disease, linking defective mitophagy to steatosis
Metabolic reprogramming in triple-negative breast cancer through Myc suppression of TXNIP
申亮亮
John M.O’Shea
Mohan R.Kaadige
Donald E.Ayer
二等
25
大鼠痛觉C纤维传导丢峰功能下调诱致糖尿病神经病理痛的作用及作用机制
二等
13
基于时滞分解方法的含参数不确定的时滞神经网络状态估计
张芬张艳邦
二等
14
WS2锁模的超快光纤激光器
WS2 mode-locked ultrafast fiber laser
毛东王亚东
马超杰韩磊姜碧强

l开头的创新的英文单词

l开头的创新的英文单词

l开头的创新的英文单词
一些以L开头的创新的英文单词包括:
1. "Laser"(激光)指一种通过受激辐射产生的高强度光束来进行加工、测量、通信等的装置或技术。

2. "Lithium-ion"(锂离子)指一种常见的充电电池技术,用于各种电子设备和汽车。

3. "Lidar"(激光雷达)指一种用激光来测量距离、速度和其他特性的技术,常用于自动驾驶汽车和地图制作。

4. "Low-carbon"(低碳)指一种环保的生产或生活方式,通过减少碳排放来降低对气候变化的影响。

5. "Lattice cryptography"(点阵密码学)指一种新兴的加密技术,利用数学上的点阵结构来保护数据安全。

这些单词都代表着不同领域的创新技术和概念,它们在科学、工程、环保和其他领域都有重要的应用和意义。

blindwatermark使用

blindwatermark使用

blindwatermark使用Blindwatermark是一种常用的数字图像水印技术,它可以在图像中嵌入不可见的信息,以确认图像的版权和完整性。

与传统的数字图像水印技术相比,Blindwatermark有更高的容忍度和更强的鲁棒性。

以下是一些与Blindwatermark相关的参考内容。

1. "Digital Image Watermarking Techniques: A Comprehensive Review" - 这篇论文对数字图像水印技术进行了全面的综述,包括Blindwatermark在内。

它讨论了不同的数字图像水印算法,并对它们的优缺点进行了比较和分析。

2. "BlindWaterMarking Algorithm for Image Authentication" - 这篇研究论文提出了一种基于Blindwatermark的图像认证算法。

它介绍了该算法的原理和实现细节,并对算法的性能进行了评估。

3. "A Robust Blind Watermarking Scheme Based on Discrete Wavelet Transform and Singular Value Decomposition" - 这篇论文提出了一种基于离散小波变换和奇异值分解的鲁棒性Blindwatermark方案。

它讨论了该方案的安全性和抗攻击能力,并进行了实验验证。

4. "Blind Watermarking for Image Tampering Detection and Recovery" - 这篇论文介绍了一种基于Blindwatermark的图像篡改检测和恢复方法。

它详细说明了该方法的步骤和流程,并通过实验结果验证了算法的有效性。

5. "A Survey on Digital Watermarking Techniques and its Applications" - 这篇综述性文章对数字水印技术及其应用进行了调研和总结。

数字水印技术毕业论文中英文资料对照外文翻译文献综述

数字水印技术毕业论文中英文资料对照外文翻译文献综述

数字水印技术毕业论文中英文资料对照外文翻译文献综述附件1 外文资料翻译译文:一种新的基于中国剩余数定理的多媒体内容认证水印算法关键字:数字水印中国剩余定理奇异值分解摘要数字水印技术已被提议作为一个解决保护多媒体数据版权问题的办法。

在本文中,我们提出一种新颖的基于中国剩余定理(CRT)的数字水印技术。

使用CRT 为这个目的提供了更多的安全以及抵抗常见的攻击。

我们已经表明这种技术对于添加的噪音有很强的适应性。

我们已经比较了所提出两种技术的性能,基于水印技术-奇异值分解(SVD)在篡改评估函数(TAF)、计算效率和峰值信噪比(PSNR)方面有更优越的表现。

例如,提出的基于CRT方法的嵌入时间比两种基于SVD方法的快6和3倍。

这种技术也可以应用于文档、音频和视频内容。

1、介绍现今的信息驱动经济是由巨大的互联网增长和爆炸式的大量的日常多媒体数据处理所支配的。

内容编辑软件的易获得,移动紧凑数码设备和英特网,使数字生活方式的普通人完全不同于几年前。

数字多媒体内容,例如,文本、图像、视频和音频,可以轻易改变,存储或立即传输到地球的任何地点。

然而,多媒体数字内容所有者怀疑把内容在互联网上由于缺乏知识产权保护可用。

为了解决这种情况,数字水印确实是解决保护这些内容所有权的方案。

在数字水印技术中,一些数字签名是所有者所独有的或把版权信息嵌入到宿主的多媒体内容。

签名嵌入仍然是无形的、难以察觉的,不能轻易删除甚至在某些操作,例如,添加噪声、压缩、篡改和缩放操作。

只有经过授权的接收者的数字内容可以从有水印的提取水印内容与知识的一些关键信息。

用这种方法可以提供给业主安全、内容完整性和知识产权保护。

在这个方向,从1990年代中期开始,一些研究人员报道许多数字水印技术在空间和变换域[1-3]。

一些重要的属性的一个有效的数字水印方案[1-3]:(i)未知性:不应该有任何明显的区别原始有水印的内容,(ii)鲁棒性:嵌入的水印应该能够承受某种程度上的内容操作。

量子力学英语词汇

量子力学英语词汇

量子力学专业英语词汇1、microscopic world 微观世界2、macroscopic world 宏观世界3、quantum theory 量子[理]论4、quantum mechanics 量子力学5、wave mechanics 波动力学6、matrix mechanics 矩阵力学7、Planck constant 普朗克常数8、wave-particle duality 波粒二象性9、state 态10、state function 态函数11、state vector 态矢量12、superposition principle of state 态叠加原理13、orthogonal states 正交态14、antisymmetrical state 正交定理15、stationary state 对称态16、antisymmetrical state 反对称态17、stationary state 定态18、ground state 基态19、excited state 受激态20、binding state 束缚态21、unbound state 非束缚态22、degenerate state 简并态23、degenerate system 简并系24、non-deenerate state 非简并态25、non-degenerate system 非简并系26、de Broglie wave 德布罗意波27、wave function 波函数28、time-dependent wave function 含时波函数29、wave packet 波包30、probability 几率31、probability amplitude 几率幅32、probability density 几率密度33、quantum ensemble 量子系综34、wave equation 波动方程35、Schrodinger equation 薛定谔方程36、Potential well 势阱37、Potential barrien 势垒38、potential barrier penetration 势垒贯穿39、tunnel effect 隧道效应40、linear harmonic oscillator 线性谐振子41、zero proint energy 零点能42、central field 辏力场43、Coulomb field 库仑场44、δ-function δ-函数45、operator 算符46、commuting operators 对易算符47、anticommuting operators 反对易算符48、complex conjugate operator 复共轭算符49、Hermitian conjugate operator 厄米共轭算符50、Hermitian operator 厄米算符51、momentum operator 动量算符52、energy operator 能量算符53、Hamiltonian operator 哈密顿算符54、angular momentum operator 角动量算符55、spin operator 自旋算符56、eigen value 本征值57、secular equation 久期方程58、observable 可观察量59、orthogonality 正交性60、completeness 完全性61、closure property 封闭性62、normalization 归一化63、orthonormalized functions 正交归一化函数64、quantum number 量子数65、principal quantum number 主量子数66、radial quantum number 径向量子数67、angular quantum number 角量子数68、magnetic quantum number 磁量子数69、uncertainty relation 测不准关系70、principle of complementarity 并协原理71、quantum Poisson bracket 量子泊松括号72、representation 表象73、coordinate representation 坐标表象74、momentum representation 动量表象75、energy representation 能量表象76、Schrodinger representation 薛定谔表象77、Heisenberg representation 海森伯表象78、interaction representation 相互作用表象79、occupation number representation 粒子数表象80、Dirac symbol 狄拉克符号81、ket vector 右矢量82、bra vector 左矢量83、basis vector 基矢量84、basis ket 基右矢85、basis bra 基左矢86、orthogonal kets 正交右矢87、orthogonal bras 正交左矢88、symmetrical kets 对称右矢89、antisymmetrical kets 反对称右矢90、Hilbert space 希耳伯空间91、perturbation theory 微扰理论92、stationary perturbation theory 定态微扰论93、time-dependent perturbation theory 含时微扰论94、Wentzel-Kramers-Brillouin method W. K. B.近似法95、elastic scattering 弹性散射96、inelastic scattering 非弹性散射97、scattering cross-section 散射截面98、partial wave method 分波法99、Born approximation 玻恩近似法100、centre-of-mass coordinates 质心坐标系101、laboratory coordinates 实验室坐标系102、transition 跃迁103、dipole transition 偶极子跃迁104、selection rule 选择定则105、spin 自旋106、electron spin 电子自旋107、spin quantum number 自旋量子数108、spin wave function 自旋波函数109、coupling 耦合110、vector-coupling coefficient 矢量耦合系数111、many-particle system 多子体系112、exchange forece 交换力113、exchange energy 交换能114、Heitler-London approximation 海特勒-伦敦近似法115、Hartree-Fock equation 哈特里-福克方程116、self-consistent field 自洽场117、Thomas-Fermi equation 托马斯-费米方程118、second quantization 二次量子化119、identical particles 全同粒子120、Pauli matrices 泡利矩阵121、Pauli equation 泡利方程122、Pauli’s exclusion principle泡利不相容原理123、Relativistic wave equation 相对论性波动方程124、Klein-Gordon equation 克莱因-戈登方程125、Dirac equation 狄拉克方程126、Dirac hole theory 狄拉克空穴理论127、negative energy state 负能态128、negative probability 负几率129、microscopic causality 微观因果性。

向量承诺的水印聚合

向量承诺的水印聚合

向量承诺的水印聚合
向量承诺(vector commitment)是一种密码学原语,由发送者生成一个向量的承诺(commitment),向量的每个元素都被隐藏在承诺中。

接收者可以用来验证某个元素是否包含在该向量中,但无法得知向量的其他元素。

水印聚合(watermark aggregation)是指将多个向量承诺聚合成一个承诺的过程。

水印聚合可以用于匿名通信、隐私保护等领域。

当多个参与者想要进行匿名通信时,他们可以生成各自的向量承诺,并使用水印聚合算法将这些承诺聚合成一个承诺。

这样,其他参与者无法得知每个参与者的具体元素,只能验证某个元素是否包含在整个向量中。

这样一来,即使有人试图追踪一些参与者的通信内容,也无法得知他们具体发送了哪些元素。

在实际应用中,水印聚合可以通过使用零知识证明(zero-knowledge proof)来完成。

参与者可以使用承诺的元素构造一个零知识证明,证明某个承诺确实包含了某个元素,而无需透露其他元素的信息。

其他参与者可以验证这个证明的有效性,而不需要知道具体的元素。

水印聚合在隐私保护方面具有重要意义,可以帮助保护个人信息的隐私性。

然而,水印聚合也面临一些挑战,比如性能问题和安全性问题。

因此,在实际应用中,需要权衡不同的因素,选择合适的水印聚合方案。

数字水印技术英文资料

数字水印技术英文资料

A.Lumini,D.Maio.A wavelet-based image watermarking scheme,Proc of IntConf.On Information Technology:Coding and Computing,2000:122-127.与Fourier变换相比,小波变换是空间(时间)和频率的局部变换,因而能有效地从信号中提取信息。

通过伸缩和平移等运算功能可对函数或信号进行多尺度的细化分析,解决了Fourier变换不能解决的许多困难问题。

小波变换联系了应用数学、物理学、计算机科学、信号与信息处理、图像处理、地震勘探等多个学科。

数学家认为,小波分析是一个新的数学分支,它是泛函分析、Fourier分析、样调分析、数值分析的完美结晶;信号和信息处理专家认为,小波分析是时间—尺度分析和多分辨分析的一种新技术,它在信号分析、语音合成、图像识别、计算机视觉、数据压缩、地震勘探、大气与海洋波分析等方面的研究都取得了有科学意义和应用价值的成果。

小波(Wavelet)这一术语,顾名思义,“小波”就是小的波形。

所谓“小”是指它具有衰减性;而称之为“波”则是指它的波动性,其振幅正负相间的震荡形式。

与Fourier 变换相比,小波变换是时间(空间)频率的局部化分析,它通过伸缩平移运算对信号(函数)逐步进行多尺度细化,最终达到高频处时间细分,低频处频率细分,能自动适应时频信号分析的要求,从而可聚焦到信号的任意细节,解决了Fourier变换的困难问题,成为继Fourier变换以来在科学方法上的重大突破。

有人把小波变换称为“数学显微镜”。

[C]小波分析的应用是与小波分析的理论研究紧密地结合在一起的。

现在,它已经在科技信息产业领域取得了令人瞩目的成就。

电子信息技术是六大高新技术中重要的一个领域,它的重要方面是图象和信号处理。

现今,信号处理已经成为当代科学技术工作的重要部分,信号处理的目的就是:准确的分析、诊断、编码压缩和量化、快速传递或存储、精确地重构(或恢复)。

基于小规模量子线路和格雷码置乱的量子水印方案

基于小规模量子线路和格雷码置乱的量子水印方案

基于小规模量子线路和格雷码置乱的量子水印方案李盼池;赵娅【期刊名称】《计算机辅助设计与图形学学报》【年(卷),期】2017(029)009【摘要】To solve the problem of watermark embedding and extracting of quantum color images, a method of using novel enhanced quantum representation and Gray-code scrambling was proposed. For the embedding proc-ess of quantum watermarking, at first, the position and color of pixels in watermark image were scrambled by the controlled-not gates, and then, the scrambled watermark with 2n×2n image size and 24 color qubits (8 qubits per channel) was expanded to an image with2n+1×2n+2 image size and 3 color qubits (1 qubit per channel). Finally, the color value of the expanded watermark image was added to the lowest qubit of color value of the carrier im-age sized 2n+1×2n+2 by modulo 2 additions. The watermark was extracted from the watermarked image by apply-ing operations in the reverse order. The experimental results show that the proposed method is superior to the contrast method in terms of four items: visual quality, robustness performance under noises, scrambling effect of watermark image, and computational complexity.%为解决量子彩色图像的水印嵌入和抽取问题,提出一种采用新颖的增强量子图像描述和格雷码置乱的实现方案.对于嵌入过程,首先采用受控非门对于水印图像像素的位置和颜色同时置乱;然后将置乱后水印图像的幅度从2n×2n扩展到2n+1×2n+2,将像素颜色值由24比特(每通道8比特)改为3比特(每通道1比特);最后将扩展后水印图像的颜色值,通过模2加运算嵌入到幅度为2n+1×2n+2载体图像颜色值的最低位中.抽取过程为嵌入的逆过程.仿真结果表明,该方案在可视化质量、噪声下的鲁棒性能、水印图像置乱效果和计算复杂度4个方面优于对比方案.【总页数】11页(P1624-1634)【作者】李盼池;赵娅【作者单位】东北石油大学计算机与信息技术学院大庆 163318;东北石油大学计算机与信息技术学院大庆 163318【正文语种】中文【中图分类】TP391.41【相关文献】1.一种基于四粒子cluster态的量子水印方案 [J], 查新未;夏佳凡2.一种基于含水印量子图像的自适应量子隐写算法 [J], 李涛;何煌兴;瞿治国3.基于完全互补码与量子进化算法的数字水印方案 [J], 蒋天发;牟群刚;周爽4.一种基于四粒子cluster态的量子水印方案 [J], 查新未;夏佳凡;5.基于像素颜色置乱的彩色量子图像加密方法 [J], 郭海儒;许权;杜娅颖因版权原因,仅展示原文概要,查看原文内容请购买。

一种基于含水印量子图像的自适应量子隐写算法

一种基于含水印量子图像的自适应量子隐写算法

一种基于含水印量子图像的自适应量子隐写算法李涛;何煌兴;瞿治国【期刊名称】《计算机应用研究》【年(卷),期】2018(35)2【摘要】Based on the novel enhanced quantum representation(NEQR),this paper proposed a new quantum steganography algorithm to realize the covert communication by using the quantum carrier image with the watermarking.The new algorithm was enhanced on the basis of the good robustness of the watermarking and the unique self-recoverypared with the previous quantum steganography algorithms,the new algorithm not only enhanced the robustness of the embedded secret information,but also improved the performability and efficiency.Through experimental results and the performance analysis verification,the new algorithm further improves the robustness and embedding rate of the secret information on the basis of retaining the original imperceptibility and security.%利用NEQR量子图像表示法,提出了一种能在含水印量子载体图像中实现隐蔽通信的量子隐写算法.新算法借助水印通常拥有很好的稳健性和其特有的自恢复系统,对秘密信息的稳健性进行了多重强化.相比于之前的量子隐写算法,新算法不仅强化了秘密信息自身的稳健性,而且通过量子线路的设计提高了其嵌入和提取的可执行性和执行效率.经实验仿真结果和性能分析验证,新算法在保留原有隐蔽性和安全性基础上,进一步提高了秘密信息的稳健性和嵌入率.【总页数】5页(P503-506,526)【作者】李涛;何煌兴;瞿治国【作者单位】南京信息工程大学电子与信息工程学院,南京210044;南京信息工程大学电子与信息工程学院,南京210044;南京信息工程大学计算机与软件学院,南京210044;江苏省网络监控工程中心,南京210044【正文语种】中文【中图分类】TP309.2【相关文献】1.基于Arnold变换的数字图像自适应隐写算法 [J], 李琪;廖鑫;屈国庆;陈国永;杜蛟2.基于隐写编码和Markov模型的自适应图像隐写算法 [J], 张湛;刘光杰;戴跃伟;王执铨3.基于复杂度的自适应分层图像隐写算法 [J], 吴贤城;刘光庆;谭舜泉4.基于灰狼优化边缘检测和XOR编码的图像自适应隐写算法 [J], 汤莉莉;王鸿辉;谢加良;陈明志5.基于灰狼优化边缘检测和XOR编码的图像自适应隐写算法 [J], 汤莉莉;王鸿辉;谢加良;陈明志因版权原因,仅展示原文概要,查看原文内容请购买。

基于完全互补码与量子进化算法的数字水印方案

基于完全互补码与量子进化算法的数字水印方案

基于完全互补码与量子进化算法的数字水印方案蒋天发;牟群刚;周爽【期刊名称】《中南民族大学学报(自然科学版)》【年(卷),期】2014(000)001【摘要】This paper proposes a complete complementary code ( CCC) and quantum evolutionary algorithm ( QEA) based digital watermarking scheme to embed a watermark generated by CCC method from watermark image into the original image . This scheme uses quantum theory and guarantees fast convergence while keeping the population diversity and overcoming the occurrence of premature convergence .The experiment results show that the scheme is faster than traditional watermarking algorithm and has some advantages such as more sensitive , higher robustness and lower computing complexity .At the same time, the scheme pursues the balance position between convergence and population diversity to achieve global optimization .%提出了一种基于完全互补码( CCC)和量子进化算法( QEA)相结合的数字水印方案,该方案在借鉴量子理论保证收敛较快的同时兼顾了种群多样性,从而克服早熟的发生。

一种基于四粒子cluster态的量子水印方案

一种基于四粒子cluster态的量子水印方案

一种基于四粒子cluster态的量子水印方案
查新未;夏佳凡
【期刊名称】《西安邮电学院学报》
【年(卷),期】2013(018)004
【摘要】为了将秘密信息嵌入信息序列并实现秘密信道更大比特容量,提出一种在控制量子安全直接通信过程中的基于纠缠交换和四粒子cluster态的量子水印方案.利用量子纠缠交换和幺正变换,在通信过程中,发送者在安全信息层建立一个用于嵌入水印信息的隐藏层,可实现将完整信息安全传送给接收者.通过分析,该方案验证了信息层与隐藏层的安全性,实现了秘密比特的更大容量.
【总页数】5页(P13-17)
【作者】查新未;夏佳凡
【作者单位】西安邮电大学理学院,陕西西安710121;西安邮电大学理学院,陕西西安710121
【正文语种】中文
【中图分类】TP301.2
【相关文献】
1.一种全概率联合远程制备四粒子cluster类态的方案 [J], 陈正飞;陈云峰;刘文杰
2.基于5粒子Cluster态的量子盲签名方案 [J], 曾川;张建中
3.一种基于四粒子cluster态的量子水印方案 [J], 查新未;夏佳凡;
4.基于五粒子Cluster态的受控双向量子隐形传态 [J], 郑晓毅
5.基于四粒子cluster态的N位量子态秘密共享方案 [J], 吴君钦;林慧英
因版权原因,仅展示原文概要,查看原文内容请购买。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

一种新型的量子水印策略张伟伟12,高飞1,刘斌1,贾恒越1,温巧燕1,陈晖31北京邮电大学网络与交换技术国家重点实验室,北京 1008762信息安全国家重点实验室(中国科学院软件研究所),北京1001903现代通信国家重点实验室,成都,610041摘要:随着量子计算机和量子网络的发展,量子数据的安全越来越重要。

量子水印是一种可以将包括身份信息等的不可见信号嵌入到包括音频,视频和图像等的量子多媒体数据中,起到版权保护的作用。

本文提出一种基于灵活量子图像表示的的新型水印策略。

之前提出的策略(唯一的一个基于量子图像的策略)只能用来验证载体图像的拥有者是否为所已知的身份。

与其相比,本文提出的策略能够找出真正的版权所有者,并且除版权所有者以外的任何人都不能清除或提取除水印图像。

关键词:量子计算,量子图像,量子水印中图分类号:O59A Novel Watermark Strategy For QuantumImagesWei-Wei Zhang12,Fei Gao1,Bin Liu1,Heng-Yue Jia1,Qiao-Yan Wen1,HuiChen31the State Key Laboratory of Networking and Switching Technology,Beijing University ofPosts and Telecommunications,Beijing1008762the State Key Laboratory of Information Security(Institute of Software,Chinese Academyof Sciences),Beijing1001903Science and Technology on Communication Security Laboratory,Chengdu,610041 Abstract:With the development of quantum computer and quantum network,the securityof quantum data becomes more and more important.Quantum watermarking is the technique which embeds the invisible quantum signal such as the owner’s identification into quantum multimedia data(such as audio,video and image)for copyright protection.In this paper,a novel watermark strategy for quantum images is proposed based onflexible representation for quantum images(FRQI).Compared with the former strategy(only one based on quantum 基金项目:NSFC(Grant Nos.61170270,61100203,60903152,61003286,60821001),NCET(Grant No.NCET-10-0260),SRFDP(Grant Nos.200800131016,20090005110010),Beijing Natural Science Foundation(Grant No.4112040),the Fundamental Research Funds for the Central Universities(Grant Nos.BUPT2011YB01,BUPT2011RC0505, 2011PTB-00-29,2011RCZJ15),Science and Technology on Communication Security Laboratory Foundation(Grant No.9140C110101110C1104).作者简介:Zhang Wei Wei(1987-),female,Master Student,major research direction:quantum key distribution, quantum secret sharing,and quantum images processing.Correspondence author:Gao Fei(1980-),male,professor,major research direction:quantum key distribution,quantum secret sharing,and quantum secure direct communication.images)which can only be used to verify the identity of the true owner of a carrier image,the proposed method can also be used tofind out who is the real owner.And it is impossible for anyone except the copyrighter to clear offor extract the watermark images.Key words:Quantum computation,Quantum image,Quantum watermarking.0IntroductionTHE high integration of the traditional computer has resulted in the appearing of quan-tum effects which greatly restricts the development of the classic computer.Recently,the quantum computer(QC)and the quantum network are developing rapidly.In2001,IBM de-veloped the world’sfirst7-qubit QC to give a demonstration.In2007,D-wave corporation in Canada announced that they hadfinished the16-qubit commercial QC for thefirst time and it was improved to48-qubit in2008.In2011,D-wave announced their achievement of 128-qubit commercial QC.The company had set goals for developing1024-qubit QC and pro-posed QC’s further application(such as releasing the quantum computing software system, providing interface for application program including SQL Prolog Lisp etc,developing the on-line commercial computation service).D-wave’s development implies that the principle of quantum computer has been matured and the practical technology also has made substantial progress.In the meantime,the quantum networks areflourishing.In2004,Raytheon BBN Technologies and Harvard university cooperatively constructed a quantum cryptography net-work Defense Advanced Research Projects Agency(DARPA)and successfully accomplished the mutual connection using the communication opticalfiber.Secure communication based on quantum cryptography(SECOQC)network was accomplished in2008,which was cooperatively fulfilled by41research institutions and enterprises from the European Union,Switzerland and Russia.In2010,based on the latest QKD technology,the Tokyo QKD network making use of JGN2plus(Japan’s Gigabit Network)was configured as a star network.This network con-nected the JGN2plus operation center in Otemachi with National Institute of Information and Communications Technology(NICT)’s Headquarter in Koganei as well as Tokyo University in Hongo and NICT’s research facility in Hakusan.With the development of quantum computer and quantum network,the security of quan-tum data becomes more and more important.Cryptography is the approach to protect data’s secrecy in public environment.As we know,the security of most classical cryptosystems is based on the assumption of computational complexity.But this kind of security is susceptible to the strong ability of quantum computation[1],[2].It means that many existing cryptosys-tems’s security will be threatened by quantum computer.Fortunately,this difficulty can be overcome by quantum cryptography[3],[4].Different from its classical counterpart,the secu-rity of quantum cryptography is assured by physical principles such as Heisenberg uncertaintyprinciple and quantum no-cloning theorem.Recently,quantum cryptography has obtained a great deal of attentions because it can stand against the threat from an attacker with the abil-ity of quantum computation.Quite a few branches of quantum cryptography develops greatly in recent years,including quantum key distribution(QKD)[5]-[10],quantum secret sharing (QSS)[11]-[13],quantum secure direct communication(QSDC)[14]-[18],quantum identity authentication[19]-[21],and so on.Different from cryptography,which is used to protect the secrecy of the message’s content, steganography aims at hiding the existence of message.Quantum watermarking is a kind of steganography,which is used to embed some symbolic quantum information into quantum multimedia content.It will not affect the usage of multimedia and others cannot feel the watermark’s existence.The watermark in the carrier is used to protect the copyright.Compared with theflourishing quantum cryptography,quantum steganography is still in its infancy.Images are good carriers and always used in steganography.Recently,a few strategies for quantum images’storing and retrieving have been proposed[22],[26],[27].Based on the presentations of quantum images,Le et al.proposed the strategies for quantum images’geometric transformations[25],[28]-[30].Besides,some quantum watermarking schemes[23], [24],[25],[32]were proposed,where[24]is the only andfirst one based on quantum images. But a significant limitation is that the proposed schemes in[24]based on quantum images can only be used to vertify the identity of carrier image’s true owner.That means we can only find out someone is using illegal carrier image,but we can notfind out where his/her images come from.This is a real limitation in practical application.In this paper,we propose a novel quantum watermarking strategy which is more universal,in the sense that it can be used to find out who is the real owner(or who leaks the carrier images to the illegal users)according to the watermark extracted from the carrier image.The rest of this paper is organized as follows.The next section introduces quantum information[31],theflexible representation of quantum images(FRQI)[27],which will be used in the following sections,and the watermarking scheme proposed by Le et al..In section III,we describe our quantum watermarking strategy detailedly and present the results and analysis of simulation-based experiments to demonstrate the realization of the watermarked carrier image. Finally,a short conclusion is given in Section IV.1Preliminaries1.1Quantum informationA quantum computer is a device for computations that makes direct use of quantum mechanical properties.Quantum computation and quantum information are based on the fundamental concept,the quantum bit,or qubit for short.Just like there exist a classical bit图1:Bloch sphere representation of a qubit|ψ⟩=cosθ2|0⟩+e iφsinθ2|1⟩[31].either0or1,a qubit also has a state.Their difference is that a qubit can be in any linear combinations of state|0⟩or|1⟩.It is often called superpositions:|ψ⟩=α|0⟩+β|1⟩.The numberαandβare complex numbers,and satisfy|α|2+|β|2=1.The computational basis states|0⟩and|1⟩form an orthonormal basis for a special vector space.We can think the qubit as the following geometric representations,which can be rewrite as the form of qubit as follows:|ψ⟩=cosθ2|0⟩+e iφsinθ2|1⟩,where theθandφare real numbers and define a point on theunit three–dimensional sphere,as shown in Fig.1.In principle,there are infinitely many points on the unit sphere,so that one could store an entire text of Shakespear in the infinite binary expansion ofθ[31].1.2Flexible representation of quantum imagesBased on the human perception of vision and the classical images’pixel representation, theflexible representation for quantum images(FRQI),a representation for quantum images, was proposed in[27].FRQI contains the color information and corresponding position of every pixel in image.According to the FRQI,a quantum image’s representation can be written as the form shown below.|c i⟩=n−1,where|0⟩,|1⟩are2-D computational basis quantum states,(θ0,θ1,...,θ22n−1)is the vector of angles encoding colors,and|i⟩,for i=0,...,22n−1,are(22n−1)-D computational basis.There图2:A simple image and its FRQI state:|I⟩=1[(cosθ0|0⟩+sinθ0|1⟩)⊗|00⟩+(cosθ1|0⟩+2sinθ1|1⟩)⊗|01⟩+(cosθ2|0⟩+sinθ2|1⟩)⊗|10⟩+(cosθ3|0⟩+sinθ3|1⟩)⊗|11⟩][24]are two parts in the FRQI of an image:c i and|i⟩,which encode information about the colors and their corresponding positions in the image,respectively.For2-D images,the location information encoded in the position qubit|i⟩includes two parts:the vertical and horizontal coordinates.For preparing quantum images in2n-qubit systems,or n-sized images,the vector|i⟩=|y⟩|x⟩=|y n−1y n−2...y0⟩|x n−1x n−2...x0⟩,|y i⟩|x i⟩∈{0,1},for every i=0,1,...,n,(y n−1,y n−2,...,y0)encodes thefirst n-qubit along the vertical location and(x n−1,x n−2,...,x0)encodes the second n-qubit along the horizontal axis.An example of a 2×2FRQJ image is shown in Fig.2.In[27],[28]-[30],[33],the methods for storing and retrieving quantum images are proposed.1.3Le et al.’s strategy based on restricted geometric transformationsIn[24],Le et al.proposed an algorithm for watermarking and authentication of quantum images based on restricted geometric transformations(including two-point swapping,the verti-calflip,the horizontalflip,the coordinate swap operations).It is a great progress for quantum images processing that they utilize the restricted variants(of the quantum versions)[28]of these transformations as the basic resources of the watermark embedding and authentication circuits.These procedures are available for the various stages by the copyright owners and users of the published(watermarked)images.The copyright owner has access to both the classical and quantum versions of the image and watermark signal.The end-users on their parts are图3:The outline of Le et al.’s watermark authentication procedure[24].restricted to only the published quantum versions of the watermarked images.The outline of quantum watermark image’s embedding procedure consists of two parts: thefirst part decides the watermark map with the classical versions of carrier and watermark images as input,the second part transforms the watermark map into quantum circuit accord-ing to a simple mapping between the map’s value(0,1or-1)and the quantum geometric transformations.The watermark authentication procedure,whose outline is shown in Fig.3,is only available to the copyright owner.He/she uses the inverse watermark-embedding circuit (comprising of the same gate sequence as the watermark-embedding circuit but in the reverse order)to authenticate the true ownership of an embedded carrier image.That means if the copyright owner want to authenticate some embedded carrier image,he/she has to know which watermark image is in the carrier image,i.e the unique embedding circuit.Therefore this scheme can only be used to verify the identity of a true owner of the carrier image.In this scheme,the copyrighters can onlyfind out someone is using illegal images,but they can not find out where his/her images come from.This is a real limitation in practical application.2Quantum watermark embedding and extracting procedureOur watermark embedding procedure is based on the idea that making a subtle change to the carrier image according to the watermarking image.The embedded carrier image and the original carrier image are indistinguishable by naked eyes.The extracting procedure can only be executed by the embedder,because the key used to decide the position of watermark and the original carrier image is only known to the embedder.2.1The embedding procedure of quantum watermark imageAs we known,an image consists of many pixels which are all pure colors.According to the FRQI,a pixel’s color in a quantum image can be written as I(θ)=cosθ|0⟩+sinθ|1⟩,where θrepresents the color of the pixel.The outline of the embedding procedure is shown in Fig.4.图4:The outline of watermark image’s embedding procedure.The concrete procedure is as following:(1)If the watermark image’s size is less than the carrier’s image,the embedder should polish it to the size of carrier image.Concretely,the embedder randomly cover the carrier image with the watermark image.The area in watermark image corresponding to the exposed region in carrier image is replenished with the corresponding pixels in the carrier image,thus the watermark image is the same size with the carrier image.Here the white pixels’position are only known to embedder.(2)The embedder produces a sequence of key k(unique to the carrier image).This key will be used to determine the position that the watermark image’s pixel will be embedded,and it is only known to the embedder.Specifically,if k=0the watermark image’s pixel is embedded in the cosine part,otherwise the sine part.(3)The embedder embeds the watermark image into the carrier image according to the following method,which makes a subtle change to the Taylor series expression of the carrier image’s pixels.The Taylor series of cos x and sin x iscos x=1−x22!+x44!−...+(−1)k x2k(2k)!+...(−∞<x<+∞)sin x=x−x33!+x55!−...+(−1)k−1x2k−1(2k−1)!+...(−∞<x<+∞)Assume the watermark image’s pixel is cosφ|0⟩+sinφ|1⟩.If the key in step(2)is0,the original pixel is approximated withα|0⟩+β|1⟩,whereα=cosθ=1−θ22!+θ44!−θ66!,β=√thus the pixel embedding watermark’s pixel isα′|0⟩+β′|1⟩,hereα′=cosθ′=1−θ22!+θ44!−φ66!,β=√1−α′2If the key in step(2)is1,the original pixel is approximated withα|0⟩+β|1⟩,where图5:The outline of watermark image’s extracting procedure.β=sin θ=θ−θ33!+θ55!−θ67!,α=√1−β2thus the embedding watermark’s pixel is α′|0⟩+β′|1⟩,hereβ′=sin θ′=θ−θ33!+θ55!−φ67!,α′=√1−β′2(4)Implement the above three steps for every carrier image’s pixel and watermark image’s pixel.2.2Quantum watermark image’s extracting procedureIn our scheme,the watermark extracting procedure is only available to the copyright owner (the embedder).He/She uses the key and the original carrier image to extract the watermark image from an embedded carrier image according to the extracting procedure (see Fig.5).Assume the color of the original carrier image’s pixel is I (θ)=cos θ|0⟩+sin θ|1⟩,the color of the embedded carrier image’s pixel is α′|0⟩+β′|1⟩.The concrete steps are as following:(1)According to the key (unique to the carrier image),the embedder get the position of watermark image’s every pixel.(2)If the key in step (1)is 0,the extracted watermark pixel is cos φ′|0⟩+sin φ′|1⟩,whereφ′=((1−θ22!+θ44!−α′)×6!)16If the key in step (1)is 1,the extracted watermark pixel is cos φ′|0⟩+sin φ′|1⟩,where φ′=((θ−θ33!+θ55!−β′)×7!)17(3)Implement the above two steps for every pixel of the embedded carrier image and get every pixel of the watermark image.2.3Simulations of quantum watermark embedding and extracting pro-cedureDue to the condition that the physical quantum hardware is not affordable for us to execute our protocol,we just make the simulations of the input quantum carrier images and watermark images.The tools needed and results obtained in our simulation experiments are presented and reviewed in this section.MATLAB(MATrix LABoratory)is a useful software tool for matrix manipulations,plot-ting of functions and data,implementation of algorithms,creation of user interfaces,and in-terfacing with programs.It isflexible in the representation and manipulation of large arrays of vectors and matrices.Because it is reasonable to treat the quantum images as large matrices and the transformations as matrix computations.Therefore,MATLAB is suitable to simulate quantum states(such as quantum images),although it has some limitations in simulating the image of huge size.MATLAB’s Image Processing Toolbox provides a comprehensive set of reference-standard algorithms and graphical tools for image processing,analysis,visualisation, and algorithm development.By using MATLAB,quantum images and their transformations can be effectively simulated[24].We demonstrate our quantum watermark embedding and ex-tracting procedure with a classical computer with Intel(R)Core(TM)2Duo CPU E75002.93 GHz,1.98GB Ram equipped with the MATLAB2009a environment.The peak-signal-to-noise ratio(PSNR),being one of the most used metrics in classical images for comparing thefidelity of a watermarked image with its original version,will be used as our watermarked image eval-uation metric by transforming the quantum images into classical forms,though there may be some influence on the results.It is most easily defined via the mean squared error(MSE),which for two m×n monochrome images(the original carrier image I and its watermarked version K) is defined asMSE=1mnm−1∑i=0n−1∑j=0[(I(i,j)−K(i,j))2]The PSNR is defined byP SNR=20log10(MAX I √MSE)Here,MAX I is the maximum possible pixel value of the image[24].2.3.1Simulation of gray imagesIn the simulation,we use256×256images of different types as carrier images and water-mark images.In Fig.6,a part of the embedded carrier images are shown at left and the right图6:The left are embedded carrier images.The right are extracted watermark images from the left.side is the watermark images extracted from the corresponding left images.And the PSNR is presented in Table I.表1:gray images’s PSNRcarrier image watermark image PSNRaerial sailboat50.8418baboon lena63.4885boat pepper63.5384lena baboon64.8810pepper boat64.2690sailboat aerial56.33472.3.2Simulation of color imagesIn the simulation,we use756×504and768×512images of different types and colors as carrier images and watermark images.In Fig.7,a part of the embedded carrier images are at left and the right side is the watermark images extracted from the corresponding left images. And the PSNR is presented in Table II.2.3.3AnalysisFrom Fig.6,Fig.7,Table I and Table II,we can see that the watermark image’s embedding doesn’t affect the carrier image’s visual effect.And the PSNR is obviously higher than theaverage level of the classical algorithms.图7:The left are embedded carrier images.The right are extracted watermark images from the left.表2:color images’s PSNRcarrier image watermark image PSNRsea lake78.6989green tree bar57.2443dancers building68.5769house boat76.6030temper huts76.0906mural wall infinitywall mural78.9717Due to the Minute changes to the original carrier images,users of the carrier images will not feel the exist of watermark images.Because the unique key of carrier image,the original carrier image and the embedding algorithm are only known to the embedder,the illegal operations of clearing away or extracting the watermark image are impossible.3ConclusionIn this paper,a novel watermarking algorithm for images on quantum computers is pro-posed based onflexible representation for quantum images(FRQI).Compared with the previous strategy[24]which can only be used to verify the identify of true owner of the carrier image, our method is more universal.It can be used tofind out who is the real owner.And it is impossible for a illegal users to clear offor extract the watermark images.Since the quantum computer and the quantum images study is only in their infancy,weonly give a exploratory algorithm.But the results may shine new light in the further research.参考文献(References)[1]P.W.Shor,Algorithms for quantum computation:Discrete logarithms and factoring,in Proc.35th put.Sci.,Santa Fe,NM,Nov.1994,pp.124-134.[2]L.K.Grover,A fast quantum mechanical algorithm for database search,in Proc.28th Annu.ACM Symp.Theory Comput.,Philadelphia,PA,May1996,pp.212-219.[3]N.Gisin,G.Ribordy,W.Tittel,and H.Zbinden,Quantum cryptography,Rev.Mod.Phys.,vol.74,no.1,pp.145-195,Mar.2002.[4]A.Tajima,A.Tanaka,W.Maeda,S.Takahashi,and A.Tomita,Practical quantum cryp-tosystem for metro area applications,IEEE J.Sel.Topics Quantum Electron.,vol.13,no.4,pp.1031-1038,Jul.-Aug.2007.[5]C.H.Bennett and G.Brassard,Quantum cryptography:Public key distribution and cointossing,in Proc.IEEE put.,Syst.Signal,Bangalore,India,Dec.1984,pp.175-179.[6]K.Inoue,Quantum key distribution technologies,IEEE J.Sel.Topics Quantum Electron.,vol.12,no.4,pp.888-896,Jul.-Aug.2006.[7]A.Tanaka,W.Maeda,S.Takahashi,A.Tajima,and A.Tomita,Ensuring quality of sharedkeys through quantum key distribution for practical application,IEEE J.Sel.Topics Quantum Electron.,vol.15,no.6,pp.1622-1629,Nov.-Dec.2009.[8]AH.P.Yuen,Key generation:Foundations and a new quantum approach,IEEE J.Sel.Topics Quantum Electron.,vol.15,no.6,pp.1630-1645,Nov.-Dec.2009.[9]W.Maeda,A.Tanaka,S.Takahashi,A.Tajima,and A.Tomita,Technologies for quantumkey distribution networks integrated with optical communication networks,IEEE J.Sel.Topics Quantum Electron.,vol.16,no.6,pp.1591-1601,Nov.-Dec.2009.[10]F.Xu,W.Chen,S.Wang,Z.Yin,Y.Zhang,Y.Liu,Z.Zhou,Y.Zhao,H.Li,D.Liu,Z.Han,and G.Guo,Field experiment on a robust hierarchical metropolitan quantum cryptography network,Chin.Sci.Bull.,vol.54,no.17,pp.2991-2997,2009.[11]R.Cleve,D.Gottesman,and H.-K.Lo,How to share a quantum secret,Phys.Rev.Lett.,vol.83,no.3,pp.648-651,Jul.1999.[12]M.Hillery,V.Bužek,and A.Berthiaume,Quantum secret sharing,Phys.Rev.A,vol.59,no.3,pp.1829-1834,Mar.1999.[13]A.Karlsson,M.Koashi,and N.Imoto,Quantum entanglement for secret sharing andsecret splitting,Phys.Rev.A,vol.59,no.1,pp.162-168,Jan.1999.[14]G.L.Long and X.S.Liu,Theoretically efficient high-capacity quantum-key-distributionscheme,Phys.Rev.A,vol.65,no.3,pp.032302-1-032302-3,Feb.2002.[15]K.Boström and T.Felbinger,Deterministic secure direct communication using entangle-ment,Phys.Rev.Lett.,vol.89,no.18,pp.187902-1-187902-4,Oct.2002.[16]F.-G.Deng,G.L.Long,and X.-S.Liu,Two-step quantum direct communication protocolusing the Einstein-Podolsky-Rosen pair block,Phys.Rev.A,vol.68,no.4,pp.042317-1-042317-6,Oct.2003.[17]W.Cao,Y.Yang,and Q.Wen,Quantum secure direct communication with cluster states,Sci.China Phys.Mech.Astron.,vol.53,no.7,pp.1271-1275,2010.[18]S.Qin,Q.Wen,L.Meng,and F.Zhu,Quantum secure direct communication over thecollective amplitude damping channel,Sci.China Ser.G,Phys.Mech.Astron.,vol.52,no.8,pp.1208-1212,2009.[19]M.Dušek,O.Haderka,M.Hendrych,and R.Myška,Quantum identification system,Phys.Rev.A,vol.60,no.1,pp.149-156,Jul.1999.[20]G.Zeng and W.Zhang,Identity verification in quantum key distribution,Phys.Rev.A,vol.61,no.2,pp.022303-1-022303-5,Jan.2000.[21]X.Zhang,One-way quantum identity authentication based on public key,Chin.Sci.Bull.,vol.54,no.12,pp.2018-2021,2009.[22]S.E.Venegas-Andraca,J.L.Ball,Processing images in entangled quantum systems,Journalof Quantum Information Processing9(2010)1–11.[23]J.Gea-Banacloche,Hiding messages in quantum data,Journal of Mathematical Physics43(4531)(2002)4531–4536.[24]A.M.Iliyasu et al,Watermarking and authentication of quantum images based on restrictedgeometric transformations,Inform.Sci.(2011),doi:10.1016/j.ins.2011.09.028.[25]A.M.Iliyasu,P.Q.Le,F.Dong,K.Hirota,Restricted geometric transformations and theirapplications for quantum image watermarking and authentication,in:Proceedings of the 10th Asian Conference on Quantum Information Science(AQIS2010),2010,pp.212–214.[26]A.M.Iliyasu,P.Q.Le,F.Dong,K.Hirota,A framework for representing and producingmovies on quantum computers,International Journal of Quantum Information9(6)(2011), doi:10.1142/S0219749911008015.[27]P.Q.Le,F.Dong,K.Hirota,Aflexible representation of quantum images for polynomialpreparation,image compression and processing operations,Journal of Quantum Information Processing(2010),doi:10.1007/s11128-010-0177-y.[28]P.Q.Le,A.M.Iliyasu,F.Dong,K.Hirota,Fast geometric transformations on quantumimages,IAENG International Journal of Applied Mathematics40(3)(2010)113–123.[29]P.Q.Le,A.M.Iliyasu,F.Dong,K.Hirota,Strategies for designing geometric transforma-tions on quantum images,Theoretical Computer Science412(2011)1406–1418.[30]P.Q.Le,A.M.Iliyasu,F.Dong,K.Hirota,Efficient colour transformations on quantum im-ages,Journal of Advanced Computational Intelligence and Intelligent Informatics(JACIII), 15(6)(2011)698–706.[31]M.Nielsen,I.Chuang,Quantum Computation and Quantum Information,Cambridge U-niversity Press,New York,2000.[32]D.P.Caetano and P.H.Souto Ribeiro,Quantum image control through polarization en-tanglement in parametric down-conversion,PHYSICAL REVIEW A68,023805(2003).[33]S.E.Venegas-Andraca and S.Bose,Storing,Processing and Retrieving an Image usingQuantum Mechanics,Proceedings of the SPIE Conference on Quantum Information and Computation pp.137-147(2003).。

相关文档
最新文档