Quantum data hiding

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum data hiding

We expand on our work on Quantum Data Hiding [1] – hiding classical data among parties who are restricted to performing only local quantum operations and classical communication (LOCC). We review our scheme that hides one bit between two parties using Bell states, and we derive upper and lower bounds on the secrecy of the hiding scheme. We provide an explicit bound showing that multiple bits ca...

متن کامل

A quantum way to data hiding

Though security is nothing new, the way that security has become a part of our daily lives today is unprecedented. Today, steganography is most often associated with the high-tech variety, where data is hidden within other data in an electronic file. Steganography is hidden writing, whether it consists of invisible ink on paper or copyright information hidden in an audio or video file. This wor...

متن کامل

Quantized projection data hiding

In this paper we propose a novel data hiding procedure called Quantized Projection (QP), that combines elements from quantization (i.e. Quantization Index Modulation, QIM) and spread-spectrum methods. The method is based in quantizing a diversity projection of the host signal, inspired in the statistic used for detection in spread-spectrum algorithms. We carry on a theoretical analysis of QP to...

متن کامل

Hybrid GEMD Data Hiding

The rising popularity of Internet provides convenience while also raising the risk of disclosure from the viewpoint of information security. In particular, steganography is a common way to safeguard information because it can be used to embed the secret data into the meaningful message and the attacker cannot find it out. In order to increase embedding capacity and maintain others desirable ste...

متن کامل

Ensemble Reversible Data Hiding

The conventional reversible data hiding (RDH) algorithms often consider the host as a whole to embed a payload. In order to achieve satisfactory rate-distortion performance, the secret bits are embedded into the noise-like component of the host such as prediction errors. From the rate-distortion view, it may be not optimal since the data embedding units use the identical parameters. This motiva...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Theory

سال: 2002

ISSN: 0018-9448

DOI: 10.1109/18.985948