Watermarking and authentication of quantum images based on restricted geometric transformations. (English) Zbl 1239.94009

Summary: A secure, keyless, and blind watermarking and authentication strategy for images on quantum computers, WaQI, is proposed based on restricted geometric transformations. In contrast with conventional digital watermarking techniques where geometric transformations on the contents of an image are considered undesirable, the proposed WaQI scheme utilises the restricted variants (of the quantum versions) of these transformations as the main resources of the watermark embedding and authentication circuits. This is accomplished by a careful analysis of the classical content of the image – watermark pair, based on which a bespoke watermark map that translates into the gate sequences of the quantum watermark embedding and authentication circuits is realised. Simulation-based experimental results involving the classical (i.e. conventional or non-quantum) simulation of the input images, watermark signals, and quantum circuits yielded a 25% improvement in terms of overall watermark-embedding capacity and between 7% and 50.7% in terms of the visible quality of the watermarked images in comparison with select digital watermarking methods for various pairs, thus, demonstrating both the feasibility and capabilities of the proposed WaQI scheme when the necessary quantum hardware are realised physically. This scheme, provides the framework for representing two or more quantum data as a single quantum circuit, and opens the door for other applications aimed at quantum data protection.


94A08 Image processing (compression, reconstruction, etc.) in information and communication theory
94A62 Authentication, digital signatures and secret sharing
81P68 Quantum computation
Full Text: DOI


[1] Barenco, A., Elementary gates for quantum computation, Phys. rev. A, 52, 3457-3467, (1995)
[2] G. Beach, C. Lomont, C. Cohen, Quantum image processing (quip), in: Proceedings of Applied Imagery Pattern Recognition Workshop, 2003, pp. 39-44.
[3] Bennett, C.H.; Divincenzo, D.P., Quantum information and computation, Nature, 404, 247-255, (2000) · Zbl 1369.81023
[4] S. Caraiman, V.I. Manta, New applications of quantum algorithms to computer graphics: the quantum random sample consensus algorithm, in: Proceedings of the 6th ACM Conference on Computing Frontier, 2009, pp. 81-88.
[5] Chang, C.C., A high payload frequency-based reversible image hiding method, Information sciences, 188, 2286-2298, (2010)
[6] Cox, J.; Kilian, T.L.; Shamoon, T., Secure spread spectrum watermarking for multimedia, IEEE transactions on image processing, 6, 12, 1673-1687, (1997)
[7] Curtis, D.; Meyer, D.A., Towards quantum template matching, Proceedings of the SPIE, 5161, 134-141, (2004)
[8] Fijany, A.; Williams, C.P., Quantum wavelet transform: fast algorithm and complete circuits, Lncs, 1509, 10-33, (1999) · Zbl 0939.42020
[9] Gabriella, M., Hiding data in a qimage file, International journal of multimedia and ubiquitous engineering (IJMUE), 4, 2, 13-19, (2005)
[10] Gaitan, F., Quantum error correction and fault tolerant quantum computing, (2008), CRC Press, Taylor and Francis Group UK · Zbl 1167.81002
[11] Gea-Banacloche, J., Hiding messages in quantum data, Journal of mathematical physics, 43, 4531, 4531-4536, (2002) · Zbl 1060.94019
[12] L. Grover, A fast quantum mechanical algorithm for database search, in: Proceedings of the 28th Annual ACM Symposium on the Theory of Computing (STOC 1996), 1996, pp. 212-219. · Zbl 0922.68044
[13] Heylen, K.; Dams, T., An image watermarking tutorial tool using Matlab, Proceedings of the SPIE, 7075, 134-141, (2008)
[14] Huang, C.H.; Wu, J.L., Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes, Information sciences, 179, 791-808, (2009)
[15] A.M. Iliyasu, P.Q. Le, F. Dong, K. Hirota, Restricted geometric transformations and their applications for quantum image watermarking and authentication, in: Proceedings of the 10th Asian Conference on Quantum Information Science (AQIS 2010), 2010, pp. 212-214.
[16] Iliyasu, A.M.; Le, P.Q.; Dong, F.; Hirota, K., A framework for representing and producing movies on quantum computers, International journal of quantum information, 9, 6, (2011) · Zbl 1275.81020
[17] J.R. Kim, Y.S. Moon, A robust wavelet-based digital watermarking using level-adaptive thresholding, in: Proceedings of the IEEE International Conference on Image Processing, ‘ICIP 99’, vol. 2, 1999, pp. 226-230.
[18] A. Klappenecker, M. Rotteler, Discrete cosine transforms on quantum computers, in: Proceedings of the 2nd International Symposium on Image and Signal Processing and Analysis, 2001, pp. 464-468.
[19] Landauer, R., Information is a physical entity, Physica A, 263, 63-67, (1999)
[20] Le, P.Q.; Dong, F.; Hirota, K., A flexible representation of quantum images for polynomial preparation, image compression and processing operations, Journal of quantum information processing, (2010)
[21] Le, P.Q.; Iliyasu, A.M.; Dong, F.; Hirota, K., Fast geometric transformations on quantum images, IAENG international journal of applied mathematics, 40, 3, 113-123, (2010) · Zbl 1229.68080
[22] Le, P.Q.; Iliyasu, A.M.; Dong, F.; Hirota, K., Strategies for designing geometric transformations on quantum images, Theoretical computer science, 412, 1406-1418, (2011) · Zbl 1207.68427
[23] Le, P.Q.; Iliyasu, A.M.; Dong, F.; Hirota, K.; images, Efficient colour transformations on quantum, Journal of advanced computational intelligence and intelligent informatics (JACIII), 15, 6, 698-706, (2011)
[24] Liu, Q.; Sung, A.H., Image complexity and feature mining for steganalysis of least significant bit stegnography, Information sciences, 178, 1, 21-36, (2008)
[25] Luo, H., Reversible data hiding based on block Median preservation, Information sciences, 181, 308-328, (2011)
[26] Maity, S.P.; Kundu, M.K., Perceptually adaptive spread transform image watermarking scheme using Hadamard transform, Information sciences, 181, 450-465, (2011)
[27] Maslov, D.; Dueck, G.W., Level compaction in quantum circuits, IEEE transactions on computer-aided design of integrated circuits and systems, 27, 3, 436-444, (2008)
[28] Maslov, D.; Dueck, G.W.; Miller, D.M.; Camille, N., Quantum circuit simplification and level compaction, IEEE transactions on computer-aided design of integrated circuits and systems, 27, 3, 436-444, (2008)
[29] Nielsen, M.; Chuang, I., Quantum computation and quantum information, (2000), Cambridge University Press New York · Zbl 1049.81015
[30] Shor, P.W., Algorithms for quantum computation: discrete logarithms and factoring, (), 124-134
[31] C.C. Tseng, T.M. Hwang, Quantum circuit design of 8×8 discrete cosine transforms using its fast computation on graph, ISCAS 2005, vol. I, 2005, pp. 828-831.
[32] Tseng, H.W.; Hsieh, C.P., Prediction-based reversible data hiding, Information sciences, 179, 2460-2469, (2009) · Zbl 1192.68245
[33] Venegas-Andraca, S.E.; Ball, J.L., Processing images in entangled quantum systems, Journal of quantum information processing, 9, 1-11, (2010)
[34] Wooters, W.K.; Zurek, W.H., A single quantum cannot be cloned, Nature, 299, 5886, 802-803, (1982) · Zbl 1369.81022
[35] Yaghmaee, F.; Jamzad, M., Estimating watermarking capacity in gray scale images based on image complexity, EURASIP journal on advances in signal processing, (2010)
[36] Zhang, F.; Zhang, X.; Zhang, H., Digital image watermarking capacity and detection error rate, Pattern recognition letters, 28, 1-10, (2008)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.