Image pixel value unification digital watermarking embedding method based on quantum key

被引:0
|
作者
Wu J. [1 ,2 ]
Zhang D. [1 ,2 ]
Wang H. [1 ,2 ]
Zhu D. [1 ,2 ]
Song L. [2 ,3 ]
机构
[1] College of Computer Science and Technology, Changchun University, Changchun
[2] Institute for Interdisciplinary Quantum Information Technology, Jilin Engineering Normal University, Changchun
[3] Jilin Engineering Laboratory for Quantum Information Technology, Jilin Engineering Normal University, Changchun
关键词
Digital watermarking; Frequency domain algorithms; Quantum key; Wavelet transform;
D O I
10.23940/ijpe.19.08.p28.22772284
中图分类号
学科分类号
摘要
At present, most watermarking algorithms use pseudo-random number sequences as watermarks, and the design of the algorithm is more focused on improving the concealment and robustness. The common problem is poor security of the watermark itself. At the same time, the frequency domain algorithm also has poor concealment. Based on quantum secure communication technology, this paper proposes a new frequency domain watermark embedding and extraction algorithm for secure communication. The algorithm, based on the principle of the BB84 protocol, uses the quantum key with true randomness generated by the mechanism for distributing the quantum key as the data source for preparing watermarks. Simultaneously, the quantum key is combined with the frequency domain wavelet transform watermarking algorithm to embed and extract the watermark. The results indicate that the proposed algorithm has high security, the same robustness as the classical frequency domain watermarking algorithm, and higher concealment than the frequency domain watermarking algorithm. © 2019 Totem Publisher, Inc. All rights reserved.
引用
收藏
页码:2277 / 2284
页数:7
相关论文
共 50 条
  • [1] Digital Watermarking Method by Selecting Suitable Pixel Value from Pixel Value Candidates Near to Original Pixel Value
    Iwata, Motoi
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012), 2012, : 629 - 633
  • [2] Criterial Image Preparation for a Search Method for Digital Watermarking Image Using Correlation Coefficient Between Pixel Value Histograms
    Imamura, Kousuke
    Kuroda, Hideo
    Fujimura, Makoto
    2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [3] Improving the Watermarking Embedding Algorithm Based on the Digital Image Technology
    Song, Jun
    Zhang, Lei
    Zhang, Kun
    2012 INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND COMMUNICATION TECHNOLOGY (ICCECT 2012), 2012, : 995 - 998
  • [4] A color image digital watermarking method based on valve-value surface
    Hu Zhihua
    Niu Jiping
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1312 - 1315
  • [5] A Novel Image Watermarking Method Based on Singular Value Decomposition and Digital Holography
    Cai Zhishan
    HYPERSPECTRAL REMOTE SENSING APPLICATIONS AND ENVIRONMENTAL MONITORING AND SAFETY TESTING TECHNOLOGY, 2016, 10156
  • [6] Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy
    Qin, Chuan
    Ji, Ping
    Zhang, Xinpeng
    Dong, Jing
    Wang, Jinwei
    SIGNAL PROCESSING, 2017, 138 : 280 - 293
  • [7] Reversible Watermarking Algorithm Based on Embedding Pixel Dependence
    Hsu, Te-Cheng
    Yein, Alan Dahgwo
    Hsieh, Wen-Shyong
    Chen, Nan-Tung
    Chiang, John Y.
    Su, Tung-Shih
    JOURNAL OF INTERNET TECHNOLOGY, 2012, 13 (04): : 571 - 580
  • [8] Digital Watermarking Algorithm for Pixel Flipped Text Image based on Calculus Operator
    Zhang, Lina
    Ding, Feng
    Liu, Zhendan
    Wang, Mengbo
    JOURNAL OF IMAGING SCIENCE AND TECHNOLOGY, 2024, 68 (01)
  • [9] Study of embedding an invisible signature watermarking in a digital image
    Zhou, Yaxun
    Ye, Qingwei
    Xu, Tiefeng
    2002, Science Press (24):
  • [10] Performance analysis of the embedding factor for the digital image watermarking
    Jin, C
    Peng, JX
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 2757 - 2760