Quantum data hiding
نویسندگان
چکیده
منابع مشابه
Quantum data hiding
We expand on our work on Quantum Data Hiding [1] – hiding classical data among parties who are restricted to performing only local quantum operations and classical communication (LOCC). We review our scheme that hides one bit between two parties using Bell states, and we derive upper and lower bounds on the secrecy of the hiding scheme. We provide an explicit bound showing that multiple bits ca...
متن کاملA quantum way to data hiding
Though security is nothing new, the way that security has become a part of our daily lives today is unprecedented. Today, steganography is most often associated with the high-tech variety, where data is hidden within other data in an electronic file. Steganography is hidden writing, whether it consists of invisible ink on paper or copyright information hidden in an audio or video file. This wor...
متن کاملQuantized projection data hiding
In this paper we propose a novel data hiding procedure called Quantized Projection (QP), that combines elements from quantization (i.e. Quantization Index Modulation, QIM) and spread-spectrum methods. The method is based in quantizing a diversity projection of the host signal, inspired in the statistic used for detection in spread-spectrum algorithms. We carry on a theoretical analysis of QP to...
متن کاملHybrid GEMD Data Hiding
The rising popularity of Internet provides convenience while also raising the risk of disclosure from the viewpoint of information security. In particular, steganography is a common way to safeguard information because it can be used to embed the secret data into the meaningful message and the attacker cannot find it out. In order to increase embedding capacity and maintain others desirable ste...
متن کاملEnsemble Reversible Data Hiding
The conventional reversible data hiding (RDH) algorithms often consider the host as a whole to embed a payload. In order to achieve satisfactory rate-distortion performance, the secret bits are embedded into the noise-like component of the host such as prediction errors. From the rate-distortion view, it may be not optimal since the data embedding units use the identical parameters. This motiva...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Theory
سال: 2002
ISSN: 0018-9448
DOI: 10.1109/18.985948