Computer Science ›› 2023, Vol. 50 ›› Issue (6A): 220300034-8.doi: 10.11896/jsjkx.220300034
• Information Security • Previous Articles Next Articles
SU Yonghong, XIA Ting, WANG Xumei, QIAN Xiaohong
CLC Number:
[1]ZHU J N.Research status and Prospect of quantum watermar-king technology[J].Journal of Higher Correspondence Education(Natural Science Edition),2011,24(5):8-10. [2]MOU Q G,JIANG T F,LIU J.Image watermarking algorithm based on quantum Haar wavelet transform[J].Information Network Security,2015,(6):55-60. [3]WANG N,LIN S.Quantum image watermarking based on quantum least significant bit[J].Journal of Quantum Electronics,2015,32(3):263-269. [4]JIANG N,WANG L.A novel strategy for quantum image ste-ganography based on Moire pattern[J].International Journal of Theoretical Physics,2015,54(3):1021-1032. [5]LI T,HE H X,ZHAI Z G.An adaptive quantum steganography algorithm based on watermark quantum image[J].Computer Application Research,2018,35(2):503-506,526. [6]JI S,CHEN S Y,ZHAI Z G.A secure large capacity quantum image watermarking protocol[J].Computer Engineering,2018,44(5):234-239. [7]QU Z G,CHEN S Y,WANG X J.A secure controlled quantum image steganography algorithm[J].Quantum Information Processing,2020,19(10):1531-1540. [8]ZHANG Y,LU K,GAO Y H,et al.NEQR:a novel enhanced quantum representation of digital images[J].Quantum Information Processing,2013,12(26):2833-2860. [9]VEDRAL V,BARENCO A,EKERT A.Quantum networks for elementary arithmetic operations[J].Physical Review A,1996,54(1):147-153. [10]NIELSEN M A,CHUANG T L,ZHAO Q C.Quantum computing and quantum information(I)-quantum computing part[M].Beijing:Tsinghua University Press,2009. [11]FIJANY A,WILLIAMS C P.Quantum Wavelet Transform:Fast Algorithm and Complete Circuit[C]//Quantum Computing and Quantum Communications.Berlin,Heidelberg:Springer,1999:10-33. [12]ZHANG Z L,SUN L.Design and application of quantumHaar wavelet transform algorithm[J].Computer Engineering and Design,2008,29(11):2816-2820. [13]JIANG N,WANG L.Analysis and improvement of the quantum Arnold image scrambling[J].Quantum Information Processing,2014,13(7):1545-1551. |
[1] | ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169. |
[2] | YAN Meng, LIN Ying, NIE Zhi-shen, CAO Yi-fan, PI Huan, ZHANG Lan. Training Method to Improve Robustness of Federated Learning [J]. Computer Science, 2022, 49(6A): 496-501. |
[3] | ZHANG Cheng-rui, CHEN Jun-jie, GUO Hao. Comparative Analysis of Robustness of Resting Human Brain Functional Hypernetwork Model [J]. Computer Science, 2022, 49(2): 241-247. |
[4] | WANG Xiao-ming, WEN Xu-yun, XU Meng-ting, ZHANG Dao-qiang. Graph Convolutional Network Adversarial Attack Method for Brain Disease Diagnosis [J]. Computer Science, 2022, 49(12): 340-345. |
[5] | ZHANG Sai-nan, LI Qian-mu. Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping [J]. Computer Science, 2022, 49(1): 353-358. |
[6] | MU Jun-fang, ZHENG Wen-ping, WANG Jie, LIANG Ji-ye. Robustness Analysis of Complex Network Based on Rewiring Mechanism [J]. Computer Science, 2021, 48(7): 130-136. |
[7] | WANG Xue-guang, ZHANG Ai-xin, DOU Bing-lin. Non-linear Load Capacity Model of Complex Networks [J]. Computer Science, 2021, 48(6): 282-287. |
[8] | TONG Xin, WANG Bin-jun, WANG Run-zheng, PAN Xiao-qin. Survey on Adversarial Sample of Deep Learning Towards Natural Language Processing [J]. Computer Science, 2021, 48(1): 258-267. |
[9] | WU Qing-hong, GAO Xiao-dong. Face Recognition in Non-ideal Environment Based on Sparse Representation and Support Vector Machine [J]. Computer Science, 2020, 47(6): 121-125. |
[10] | LU Dong-dong, WU Jie, LIU Peng, SHENG Yong-xiang. Analysis of Key Developer Type and Robustness of Collaboration Network in Open Source Software [J]. Computer Science, 2020, 47(12): 100-105. |
[11] | CHEN Xiao-wen, LIU Guang-shuai, LIU Wang-hua, LI Xu-rui. Blurred Image Recognition Based on LoG Edge Detection and Enhanced Local Phase Quantization [J]. Computer Science, 2020, 47(12): 197-204. |
[12] | ZHAO Sai, LIU Hao, WANG Yu-feng, SU Hang, YAN Ji-wei. Fuzz Testing of Android Inter-component Communication [J]. Computer Science, 2020, 47(11A): 303-309. |
[13] | GAO Li-jian,MAO Qi-rong. Environment-assisted Multi-task Learning for Polyphonic Acoustic Event Detection [J]. Computer Science, 2020, 47(1): 159-164. |
[14] | ZHAO Zhi-gang, ZHOU Gen-gui, LI Hu-xiong. Study on Attack Strategy and Robustness of Complex Weighted Supply Chain Network [J]. Computer Science, 2019, 46(8): 138-144. |
[15] | LIANG Yan-hui, LI Guo-dong, WANG Ai-yan. Frequency Domain Adaptive Image Encryption Algorithm Based on Fractional Order Chen Hyperchaos [J]. Computer Science, 2019, 46(11A): 488-492. |
|