首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
We present a robust watermark strategy for quantum images. The watermark image is embedded into the fourier coefficients of the quantum carrier image, which will not affect the carrier image’s visual effect. Before being embedded into the carrier image, the watermark image is preprocessed to be seemingly meaningless using quantum circuit, which further ensures the security of the watermark image. The properties of fourier transform ensure that the watermark embedded in the carrier image resists the unavoidable noise and cropping.  相似文献   

2.
一种基于分数阶Fourier域的数字水印   总被引:1,自引:0,他引:1  
提出了一种分数阶Fourier域的水印嵌入算法。将一复伪随机序列作为水印信息嵌入到图像的分数阶Fourier域中。分数阶Fourier变换的变换角度(α,β)为水印增加了两个自由度,增强了水印的安全性。仿真结果验证了该算法的有效性。  相似文献   

3.
We investigate the dynamic watermarking scheme for quantum images using quantum wavelet transform (QWT) proposed by Song et al. (Quantum Inf Process 12(12):3689–3706, 2013). It is aimed to embed the watermark image into the wavelet coefficients of the quantum carrier image. However, in our opinion, the key procedures of the protocol are wrong. At last, a possible improvement strategy is presented.  相似文献   

4.
为了提高基于小波变换的图像数字水印算法抵御缩放等攻击的能力,提出了一种基于整数小波变换的图像盲数字水印算法.采用的整数小波变换利用了小波的多分辨分析特性能有效地匹配人类视觉系统模型的特点,更好地兼顾了水印透明性与鲁棒性之间的矛盾;算法中将嵌入的水印作为二值图像进行处理和隐藏,增强了水印所含信息的丰富性和直观性;多个水印副本的嵌入提高了图像抵御攻击的能力;数学形态学中的腐蚀与膨胀运算的运用提高了提取出水印的可辨识度.经过实验证明该算法具有较好的鲁棒性及实用性.  相似文献   

5.
乘法运算是许多量子算法中的基本运算之一.为了实现量子乘法运算并且尽可能少地使用辅助量子比特,提出了一种基于量子傅里叶变换算法的量子乘法器.在量子傅里叶加法电路基础上,设计了量子移位电路,并实现了两个n位二进制无符号数相乘的量子电路,其时间复杂度为O(n3).使用IBM提供的开源量子计算工具包Qiskit分别验证了两个2...  相似文献   

6.
Secret sharing plays a fundamental role in both secure multi-party computation and modern cryptography. We present a new quantum secret sharing scheme based on quantum Fourier transform. This scheme enjoys the property that each share of a secret is disguised with true randomness, rather than classical pseudorandomness. Moreover, under the only assumption that a top priority for all participants (secret sharers and recovers) is to obtain the right result, our scheme is able to achieve provable security against a computationally unbounded attacker.  相似文献   

7.
Quantum Fourier transform (QFT) plays a key role in many quantum algorithms, but the existing circuits of QFT are incomplete and lacking the proof of correctness. Furthermore, it is difficult to apply QFT to the concrete field of information processing. Thus, we firstly investigate quantum vision representation (QVR) and develop a model of QVR. Then, we design four complete circuits of QFT and inverse QFT and describe the functions of their components. Meanwhile, we prove the correctness of the four complete circuits using formula derivation. Next, 2D QFT and 3D QFT based on QVR are proposed for the first time. Experimental results with simulation show the proposed QFTs are valid and useful in processing quantum images and videos. In conclusion, this paper develops a complete framework of QFT based on QVR and provides a feasible scheme for QFT to be applied in quantum vision information processing.  相似文献   

8.
In this paper, a novel quantum representation and watermarking scheme based on the controlled rotation of qubits are proposed. Firstly, a flexible representation for quantum color image (FRQCI) is proposed to facilitate the image processing tasks. Some basic image processing operations based on FRQCI representation are introduced. Then, a novel watermarking scheme for quantum images is presented. In our scheme, the carrier image is stored in the phase \(\theta \) of a qubit; at the same time, the watermark image is embedded into the phase \(\phi \) of a qubit, which will not affect the carrier image’s visual effect. Before being embedded into the carrier image, the watermark image is scrambled to be seemingly meaningless using quantum circuits, which further ensures the security of the watermark image. All the operations mentioned above are implemented by the controlled rotation of qubits. The experimental results on the classical computer show that the proposed watermarking scheme has better visual quality under a higher embedding capacity and outperforms the existing schemes in the literature.  相似文献   

9.
In this paper, a novel watermarking scheme for quantum images based on Hadamard transform is proposed. In the new scheme, a unitary transform controlled by a classical binary key is implemented on quantum image. Then, we utilize a dynamic vector, instead of a fixed parameter as in other previous schemes, to control the embedding process. The dynamic embedding vector is decided by both the carrier quantum image and the watermark image, which is only known by the authorized owner. The proposed scheme is analyzed from visual quality, computational complexity, and payload capacity. Analysis and results show that the proposed scheme has better visual quality under a higher embedding capacity and lower complexity compared with other schemes proposed recently.  相似文献   

10.
基于小波变换的数字水印算法   总被引:6,自引:2,他引:6  
提出了一种基于小波变换的数字水印隐藏算法.在该算法中,原图像的小波分解区域与水印的小波分解区域相互匹配,水印隐蔽性强,对原始图像的影响基本上察觉不出来.叠加了水印的图像在经过多种强干扰及各种信号处理的变换之后,使用该算法仍能正确检测出水印的存在.  相似文献   

11.
The development of a system for automatically sorting a database of shoeprint images based on the outsole pattern in response to a reference shoeprint image is presented. The database images are sorted so that those from the same pattern group as the reference shoeprint are likely to be at the start of the list. A database of 476 complete shoeprint images belonging to 140 pattern groups was established with each group containing two or more examples. A panel of human observers performed the grouping of the images into pattern categories. Tests of the system using the database showed that the first-ranked database image belongs to the same pattern category as the reference image 65 percent of the time and that a correct match appears within the first 5 percent of the sorted images 87 percent of the time. The system has translational and rotational invariance so that the spatial positioning of the reference shoeprint images does not have to correspond with the spatial positioning of the shoeprint images of the database. The performance of the system for matching partial-prints was also determined.  相似文献   

12.
In this paper, we propose a new self-embedding watermarking scheme with hierarchical recovery capability. The binary bits in the adopted MSB layers are scrambled and individually interleaved with different extension ratios according to their importance to image visual quality. The interleaved data, which are regarded as reference bits for tampering recovery, are segmented into a series of groups corresponding to the divided non-overlapping blocks, and then embedded into the LSB layers of blocks together with authentication bits of tampering detection. Because the extension ratios of MSB-layer bits are based on the hierarchical mechanism, the efficiency of reference bits is increased, and higher MSB layers of tampered regions have greater probabilities to be recovered than lower MSB layers, which can improve the visual quality recovered results, especially for larger tampering rates. Experimental results demonstrate the effectiveness and superiority of the proposed scheme compared with some of state-of-the-art schemes.  相似文献   

13.
提出了一种可无损恢复的小波域可见数字水印算法.算法采用视觉对比模型和人类视觉系统特性计算水印拉伸系数,并由用户密钥生成随机模板确定水印信息的嵌入位置.实验结果表明本算法具有很好的可见性和鲁棒性.  相似文献   

14.
随着高分辨率扫描印刷设备的出现,印刷品的版权保护成为重要的研究课题。在分析图像经历正版与盗版印刷过程后几何和像素点失真情况的基础上,提出一种基于数字水印技术的印刷品防伪方法。该方法先将水印嵌入到具有几何不变性的Fourier-Mellin域中,以削弱正版印刷过程中的几何失真对水印的破坏;再利用Radon变换对由扫描印刷品所获得的图像进行矫正,并从图像中提取嵌入的水印信息;由于正版和盗版印刷过程对水印的破坏程度区别明显,该方法最终通过计算水印提取的正确率来度量这种破坏,并将其与预先制定的阈值进行比较来判定印刷品的正伪。实验表明,文中提出的半脆弱水印算法克服了已有印刷品防伪水印方法只考虑水印鲁棒性的不足,可用于各类印刷品的版权保护。  相似文献   

15.
The quantum Fourier transform offers an interesting way to perform arithmetic operations on a quantum computer. We review existing quantum Fourier transform adders and multipliers and comment some simple variations that extend their capabilities. These modified circuits can perform modular and non-modular arithmetic operations and work with signed integers. Among the operations, we discuss a quantum method to compute the weighted average of a series of inputs in the transform domain. One of the circuits, the controlled weighted sum, can be interpreted as a circuit to compute the inner product of two data vectors.  相似文献   

16.
Shor算法能够相对经典大整数分解算法实现指数加速,从而直接威胁到了RSA密码体制,而量子傅里叶变换是Shor算法中的一个关键变换,也能够相对经典离散傅里叶变换实现指数加速,从而引起了广泛关注。主要针对量子傅里叶变换的实现方案进行研究。首先介绍了IBM公司量子计算云服务的编程基础,随后设计了3比特量子傅里叶变换的量子线路,最后在IBM公司5超导量子比特的量子计算芯片上进行了实验验证。  相似文献   

17.
A novel gray-level image encryption/decryption scheme is proposed, which is based on quantum Fourier transform and double random-phase encoding technique. The biggest contribution of our work lies in that it is the first time that the double random-phase encoding technique is generalized to quantum scenarios. As the encryption keys, two phase coding operations are applied in the quantum image spatial domain and the Fourier transform domain respectively. Only applying the correct keys, the original image can be retrieved successfully. Because all operations in quantum computation must be invertible, decryption is the inverse of the encryption process. A detailed theoretical analysis is given to clarify its robustness, computational complexity and advantages over its classical counterparts. It paves the way for introducing more optical information processing techniques into quantum scenarios.  相似文献   

18.
Multimedia Tools and Applications - Here, we present a novel method for data protection to resolve the issue of mass-tampered regions of image watermarks. Our approach involves asymmetric...  相似文献   

19.
In this paper, a novel watermarking scheme based on quantum wavelet transform (QWT) is proposed. Firstly, the wavelet coefficients are extracted by executing QWT on quantum image. Then, we utilize a dynamic vector for controlling embedding strength instead of a fixed parameter for embedding process in other schemes. Analysis and results show that the proposed dynamic watermarking scheme has better visual quality under a higher embedding capacity and outperforms the existing schemes in the literature.  相似文献   

20.
Guo-Rui  Ling-Ge  Dong-Jian  Chen 《Pattern recognition》2005,38(12):2530-2536
Recently, watermarking synchronization and spread spectrum watermarking schemes have become two interesting, new focuses of study. In this paper, we propose a method based on the synchronization pre-estimation in order to resist geometric attacks. First, we utilize the global features by testing them against translation, rotation and scaling, and present a simple method to estimate the geometric transform kernel of the two-dimensional gray image. Maps, applying some correlative barycenters to the original are produced that can accurately reflect the affine transform feature of the image. Furthermore, unknown variables existing in the kernel of the transform are calculated. Secondly, the watermark is directly embedded in the spatial domain. Watermarking tracing is well performed on the watermarked image instead of performing an inverse geometrical transform on it. Experimental results show that the proposed scheme can work well under several kinds of geometrical attacks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号