Computer Science ›› 2023, Vol. 50 ›› Issue (6A): 220300034-8.doi: 10.11896/jsjkx.220300034

• Information Security • Previous Articles     Next Articles

New Image Watermarking Algorithm Based on Quantum Wavelet Transform

SU Yonghong, XIA Ting, WANG Xumei, QIAN Xiaohong   

  1. Wuhan Huaxia Institute of Technology,Wuhan 430223,China
  • Online:2023-06-10 Published:2023-06-12
  • About author:SU Yonghong,born in 1980,master,lecturer.Her main research interests include network information security and information retrieval. XIA Ting,born in 1983,master,asso-ciate professor.Her main research in-terests include embedded technology and artificial intelligence.
  • Supported by:
    Guiding Project of Science and Technology Plan of Hubei Provincial Department of Education(B2017397).

Abstract: Image watermarking is a technology that embeds specific information into the carrier image for the purpose of copyright protection.A new image watermarking scheme based on quantum wavelet transform is studied,including scrambling process,embedding process and extraction process.The improved quantum Arnold scrambling method is used to scramble the binary image.The scrambled watermark image is applied to the least effective block qubit of the carrier image.For the carrier gray image,the quantum Haar wavelet transform and quantum least significant bit(LSB) blocking technology are used to embed the scrambled watermark image into the quantum wavelet coefficient.In the extraction process,firstly,the scrambled watermark image is extracted from the embedded image,and then the improved quantum Arnold inverse scrambling method is used to obtain the original watermark image.Simulation technology verifies the invisibility and high robustness of the watermark based on the quantum image watermarking method.The invisibility of the scheme is proved by peak signal-to-noise ratio(PSNR) test.The high robustness of the scheme is tested by bit error rate(BER) test and normalized correlation coefficient(NC).Simulation results show that the watermarking scheme not only has acceptable visual quality,but also has good resistance to different types of attacks.

Key words: Quantum wavelet transform, Image watermarking, Scrambling, Quantum least significant bit blocking, Invisibility, Robustnes

CLC Number: 

  • TP319
[1]ZHU J N.Research status and Prospect of quantum watermar-king technology[J].Journal of Higher Correspondence Education(Natural Science Edition),2011,24(5):8-10.
[2]MOU Q G,JIANG T F,LIU J.Image watermarking algorithm based on quantum Haar wavelet transform[J].Information Network Security,2015,(6):55-60.
[3]WANG N,LIN S.Quantum image watermarking based on quantum least significant bit[J].Journal of Quantum Electronics,2015,32(3):263-269.
[4]JIANG N,WANG L.A novel strategy for quantum image ste-ganography based on Moire pattern[J].International Journal of Theoretical Physics,2015,54(3):1021-1032.
[5]LI T,HE H X,ZHAI Z G.An adaptive quantum steganography algorithm based on watermark quantum image[J].Computer Application Research,2018,35(2):503-506,526.
[6]JI S,CHEN S Y,ZHAI Z G.A secure large capacity quantum image watermarking protocol[J].Computer Engineering,2018,44(5):234-239.
[7]QU Z G,CHEN S Y,WANG X J.A secure controlled quantum image steganography algorithm[J].Quantum Information Processing,2020,19(10):1531-1540.
[8]ZHANG Y,LU K,GAO Y H,et al.NEQR:a novel enhanced quantum representation of digital images[J].Quantum Information Processing,2013,12(26):2833-2860.
[9]VEDRAL V,BARENCO A,EKERT A.Quantum networks for elementary arithmetic operations[J].Physical Review A,1996,54(1):147-153.
[10]NIELSEN M A,CHUANG T L,ZHAO Q C.Quantum computing and quantum information(I)-quantum computing part[M].Beijing:Tsinghua University Press,2009.
[11]FIJANY A,WILLIAMS C P.Quantum Wavelet Transform:Fast Algorithm and Complete Circuit[C]//Quantum Computing and Quantum Communications.Berlin,Heidelberg:Springer,1999:10-33.
[12]ZHANG Z L,SUN L.Design and application of quantumHaar wavelet transform algorithm[J].Computer Engineering and Design,2008,29(11):2816-2820.
[13]JIANG N,WANG L.Analysis and improvement of the quantum Arnold image scrambling[J].Quantum Information Processing,2014,13(7):1545-1551.
[1] ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169.
[2] YAN Meng, LIN Ying, NIE Zhi-shen, CAO Yi-fan, PI Huan, ZHANG Lan. Training Method to Improve Robustness of Federated Learning [J]. Computer Science, 2022, 49(6A): 496-501.
[3] ZHANG Cheng-rui, CHEN Jun-jie, GUO Hao. Comparative Analysis of Robustness of Resting Human Brain Functional Hypernetwork Model [J]. Computer Science, 2022, 49(2): 241-247.
[4] WANG Xiao-ming, WEN Xu-yun, XU Meng-ting, ZHANG Dao-qiang. Graph Convolutional Network Adversarial Attack Method for Brain Disease Diagnosis [J]. Computer Science, 2022, 49(12): 340-345.
[5] ZHANG Sai-nan, LI Qian-mu. Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping [J]. Computer Science, 2022, 49(1): 353-358.
[6] MU Jun-fang, ZHENG Wen-ping, WANG Jie, LIANG Ji-ye. Robustness Analysis of Complex Network Based on Rewiring Mechanism [J]. Computer Science, 2021, 48(7): 130-136.
[7] WANG Xue-guang, ZHANG Ai-xin, DOU Bing-lin. Non-linear Load Capacity Model of Complex Networks [J]. Computer Science, 2021, 48(6): 282-287.
[8] TONG Xin, WANG Bin-jun, WANG Run-zheng, PAN Xiao-qin. Survey on Adversarial Sample of Deep Learning Towards Natural Language Processing [J]. Computer Science, 2021, 48(1): 258-267.
[9] WU Qing-hong, GAO Xiao-dong. Face Recognition in Non-ideal Environment Based on Sparse Representation and Support Vector Machine [J]. Computer Science, 2020, 47(6): 121-125.
[10] LU Dong-dong, WU Jie, LIU Peng, SHENG Yong-xiang. Analysis of Key Developer Type and Robustness of Collaboration Network in Open Source Software [J]. Computer Science, 2020, 47(12): 100-105.
[11] CHEN Xiao-wen, LIU Guang-shuai, LIU Wang-hua, LI Xu-rui. Blurred Image Recognition Based on LoG Edge Detection and Enhanced Local Phase Quantization [J]. Computer Science, 2020, 47(12): 197-204.
[12] ZHAO Sai, LIU Hao, WANG Yu-feng, SU Hang, YAN Ji-wei. Fuzz Testing of Android Inter-component Communication [J]. Computer Science, 2020, 47(11A): 303-309.
[13] GAO Li-jian,MAO Qi-rong. Environment-assisted Multi-task Learning for Polyphonic Acoustic Event Detection [J]. Computer Science, 2020, 47(1): 159-164.
[14] ZHAO Zhi-gang, ZHOU Gen-gui, LI Hu-xiong. Study on Attack Strategy and Robustness of Complex Weighted Supply Chain Network [J]. Computer Science, 2019, 46(8): 138-144.
[15] LIANG Yan-hui, LI Guo-dong, WANG Ai-yan. Frequency Domain Adaptive Image Encryption Algorithm Based on Fractional Order Chen Hyperchaos [J]. Computer Science, 2019, 46(11A): 488-492.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!